IFM Identification systems

Choose a subcategory:
Show all categories

Read/write head, Cylindrical type, M12 connector

Read/write head, Cylindrical type, M18 x 1, M12 connector

Read/write head, Cylindrical type, M12 connector

Read/write head, Cylindrical type, M12 connector

Read/write head, Rectangular, plastics, M12 connector, 5 positions of the sensing face selectable

  • Read/write head
  • DC
  • M12 Connector

RFID UHF antenna, Rectangular, plastics

RFID UHF antenna, Rectangular, plastics

RFID UHF antenna, Rectangular, plastics

RFID UHF antenna, Rectangular, plastics

RFID UHF antenna, Rectangular, plastics

DTRUHFA ADRWETTN04

Read/write head, Rectangular, plastics, AS-i, With integrated AS-i slave , profile 7.4, M12 connector

Read head, Rectangular, plastics, AS-i, with integrated AS-i slave , profile 7.3, M12 connector

Read/write head, Rectangular, plastics, AS-i, With integrated AS-i slave , profile 7.4, M12 connector, 5 positions of the sensing face selectable

Read head, Rectangular, plastics, AS-i, with integrated AS-i slave , profile 7.3, M12 connector, 5 positions of the sensing face selectable

Read/write head, Rectangular, plastics, AS-i, With integrated AS-i slave , profile 7.4, M12 connector

Read head, Rectangular, plastics, AS-i, with integrated AS-i slave , profile 7.3, M12 connector

DTSLF DCROASUS02

DTCHF MCRWCOUS03

RFID evaluation unit, for up to 4 read/write heads type ANT41x/ANT51x, 4 switch points

RFID evaluation unit, for up to 4 read/write heads type ANT41x/ANT51x, 4 switch points

RFID evaluation unit, for up to 4 read/write heads type ANT41x/ANT51x, 4 switch points

DTELF/HFABRWECUS00

RFID evaluation unit, for up to 4 read/write heads type ANT41x/ANT51x, 4 switch points

  • RFID UHF reader
  • Rectangular
  • plastics
  • M12 connector

RFID UHF sensor, Rectangular, plastics, M12 connector

  • RFID UHF reader
  • Rectangular
  • plastics
  • M12 connector
  • DTEUHFEA_ABRWETUSTN04
  • 24 DC V
  • 700 mA
  • 902…928 MHz

Read/write head, Metal thread, M18 x 1, M12 connector


In manufacturing, intralogistics and broadcast, automated authentication get a norm. Suchlike automated identification frames enable the requests-driven allocation of goods or fitting composition as well as their traceability intrinsically. Consequently, production and deliver operations can be in full automatically manageable and fluently documented.

In RF recognition systems, provision or loads carriers are notable by RFID transponders, i.e., ID tags. Aerials include non-relations interpretation and/or writing to such ID tags. These records are directly converted to an RFID rating unit, where they are cultivated. The evaluation device sends the data to the PLC via area bus interfaces, such as PROFIBUS DP, PROFINET, Ethernet IP, Ethernet TCP/IP or Ether CAT. Supplement are detected in fabrication lines, where the devices are used for matter stream check.

IFM identification systems include RFID (Radio Frequency Identification) and two-dimensional Data Matrix Code (2D) reading systems. They provide reliable tracking of objects in production, as well as their coding. IFM identification systems are light to use.

IFM authentication processes

Visual identification

• Bearings-irrespective rendition of 1D and 2D codes
• Confession of more than 20 varied code styles
• United key comparator scheme in the sensor
• For mounting and control seeing sensors
• Ultra-flat or roundirradiation units

1D/2D code readers

Announcement fields of the 1D/2D code calculator variety from commodity tracking and product inspection to make recognition.

The sensor candeclaim 1D and 2D codes oblivious of their status. Exactly if up to 25% of the code record turn damaged or stained, nevertheless read right. The reader can also be used for visual character confession (OCR), e.g. thereby distinguish goods based on type stickers or serial numbers.

Additional lighting calls a self light field - or for practically shadow-free facility illumination or for accentuating area performances. The working
working software lets for easy set of the 1D/2D code reader. The OPC server software insures an interface for unification into a higher step system. The Touch Panel PC guarantees configuration, set-up and check of object admission transducers, 3D sensors, code readers and RFID readers.

RFID

• Large sequence of interfaces for RFID rating devices
• Hard antennas and ID tags with long writing / reading length

Advantages

• Rerecording
These RFID tags are repeatedly overwritten and supplemented, while the data on the barcode is unchanged - recorded during printing.

• No need to be in sight
The RFID reader does not claim straight appearance of the tally to declaim the information. To deliver the evidence, it is fairly to enter the recording field, including when driving on it at high speed.

• Longer reading distance
Depending on the pattern of the tag and the creator counts ray is up to tens of meters.

• More storage space
A 1-square-centimeter chip can store up to 10,000 bytes, and barcodes contain 100 bytes (symbols) of information that claim an area the size of an A4 sheet to reproduce.

• Support for reading plural labels
Manufactured creators can contemporaneously read plenty of RFID tags per second using the collision avoidance feature.

• Read label data anywhere
For automatic reading of barcodes, norms committees (including EAN International) have educated rules for deployment barcodes on shipment and transport packaging.

• Resistance to environmental affects
RFID tags have enlargedpower and opposition to harsh working conditions, and the barcode is light. In applying where the idem object is used infinite times, the RFID tag is an excellent means of identification because it does not need to be placed outside the pack.

• Noetic actions
The RFID tag isas well used toexecute tasks other than storing and transferring data.

• Security
The eternal symbol number appointed to the tag in the middle of production surety the defense of signs from forgery. The RFID tag is protected if necessary by the password of the data write and read work, and is also encrypted. Both open and closed data can be stored in the same label at the same time.