Skip to main content

 

FEATURES

KW2D series smart RFID increases tracking, security, access levels, and productivity of applications. Built for easy integration into industrial systems with Modbus TCP and EtherNet/IP communications, this RFID device lets OEM and end users implement secure equipment identification, access control, and traceability. It is designed for easy installation into typical 22mm panel-mount holes used with machinery and can be readily integrated with automation systems, enabling users to easily apply advanced authentication and authorization measures.

 

SOLUTIONS

sol-1

Machine Authorization

Some commercial and industrial equipment needs constant interaction from employees to load and unload materials and parts. Even highly automated machines and systems require occasional attention from operators, maintenance technicians, and supervisors. In these hard-working environments, what is the best way to ensure people are performing these tasks most effectively? Smart RFID systems enable efficient operations.

Access Control

Many people are familiar with RFID cards used for building or garage access. However, standard devices won’t hold up to heavy commercial or industrial use and may not integrate smoothly with typical industrial automation platforms. Whether the goal is controlling and tracking access to an industrial job site, a factory building, or an equipment work cell, industrial-grade RFID tags and smart readers are the secure and reliable way for monitoring and controlling personnel movements.
sol-2
sol-3

Clean Rooms and Hygienic Areas

Clean rooms and/or hygienic areas are specially constructed areas for fabricating delicate electronics, processing pharmaceuticals, processing foods and beverages, and performing other sensitive activities. In these locations, minimizing the risk of contamination due to foreign objects or particles is a leading consideration. Smart RFID readers built to withstand these washdown areas are a clean, simple, and no-contact method for handling worker access and equipment authorization in these demanding locations.

Industrial Safety

Personnel are trained to work safely in various facility locations, with machinery, and sometimes on or around heavy equipment and vehicles. Designers are always looking for additional guarding and automation methods to improve worker safety and ensure the right personnel are taking the right actions. Smart RFID readers and the associated tags are a practical reliable way for facilitating and tracking safe work.
sol-4

APPLICATIONS

  • 240_F_274775942_mRfNBRwHtQ6wAh4Nh5kPifjZu0mKwm5Z

    Food Machine

  • 240_F_285934002_2Lr553KfSkM4PR4ynqbEPh5oGgsHYQ8R

    Machine Tools

  • 240_F_165294159_svoQLvFyUOrAIH70HgFKomt0b0w9PSP8

    Automotive

  • 240_F_309673995_2h7o6okM6qB8bHUm2K10dA9iuTSQQp1I

    Semiconductor

  • 240_F_218627435_eEkh0B5tBjEIagxexEcj5jGYEsXz0qyU

    Injection Mold Machines

  • 240_F_140964001_bmjaGiGrQJQ5BRaheld1SKgaWr3PqpvI

    Gate / Door

FT2J-sol3-04

 

PRODUCT

Discover RFID Main Reader Units, Tags, and Accessories

RFID Main units
RFID Reader with and without holder

 

RFID Tags
Card or FOB tags
Accessories
Cover with our without holder

SOFTWARE

RFID Configuration Tool

IDEC provides the Windows-based RFID configuration software tool free of charge, so users can set up the reader IP address, Modbus TCP server details, tag information, and passwords. Users can take advantage of default authorization levels, or they can customize up to 500 tags with up to 255 authority levels. Configurations can be quickly modified, and lost tags can simply be blocked.
E_Setting tools_Screen (1)

KEY FEATURES

Operating Environment

Manage user authority for machines and equipment Control and track access to production sites

Item Details
 OS

 Windows 10

CPU 1.0GHz or more
Memory 1GB or more
Environment Microsoft.NET Framework 4.0 or later

 

 

tech-1

TECHNICAL ARTICLE

RFID Improves Machine Performance and Safety

RFID authentication devices on OEM machinery ensure the proper users are taking permitted actions, providing performance benefits and improved safety. Automated equipment and machinery can incorporate many ways for users to monitor and control operation, such as with buttons, switches, and touchscreens. When original equipment manufacturers (OEMs) design and build their machinery, they want to deliver easy-to-use functionality. However, they must carefully balance this desire with the need to verify authorized users are at the controls and making acceptable selections.

 
tech-2

TECHNICAL ARTICLE

Standard Security Methods and RFID Authentication for Machine Access and Management.

Security has become a critical factor in an ever-widening number of applications. But with the variety of choices available, which is right for your specific needs. This article will cover the benefits and drawbacks of several different security methods being used today.

Using the proper security devices in industrial settings for machines and other equipment is a critical factor in providing levels of engagement with highly sensitive operations. Industries already interested in such security include machine tools, material handling, injection molding, food and beverage, automotive and aerospace, and packaging.

 

#faqs

Frequently Asked Questions

Have Question? We are here to help.

Is it possible to issue a new tag without reprogramming using the software program and a computer?

Yes. This can be done by using the default authorization levels. All IDEC tags are color coded and come with default authorization levels.

What style of tag does IDEC offer?

IDEC offers color-coded fob or card style RFID tags which are easy to carry and withstand the elements.

How does the IDEC tag work?

Each tag carries a unique ID, which is readily associated with the specific worker or a user category to provide access control at varying levels.

What operating frequency does the IDEC RFID reader operate at?

The KW2D operates at standard 13.56 MHz high-frequency (Type A, F or V) standard.

What security features are available in IDEC solution?

Between the IDEC tags/fobs and the RFID reader, there is extra encrypted message exchange that provides additional security.

Can the IDEC tag be duplicated like generic one on the market?

If you have an application where tag copying is a big concern – we strongly suggest to use our KW2D and our tags. Our IDEC tag has an extra level of password encryption with a special bit to determine if the tag is an authentic IDEC tag or not. It gives us a lot of security over and above a typical RFID tag that you buy on the market.

What type of IDEC tag do you use?

The IDEC tag is passive, meaning it is lightweight and does not require batteries.

Do I have to use the IDEC tag to get the reader to work?

No, IDEC also support 3rd party tags or badges. Users can mix-and-match various RFID tag regardless of the shapes, as long as the tags are operating at 13.56 MHz (Type A, V or F) standards.

How do you mount this RFID device?

It installs into typical 22mm panel-mount holes right along with other switches, buttons, and lights.

Can I connect this product with other manufacturers PLC and HMI?

Yes. We support Modbus TCP Server, EtherNet/IP Adapter, CC-Link IE Field Basic Slave.

REACH OUT TO US TODAY