Product description

The VOXIO Jung readers are write/reader units, which can be used in combination with the SCALA EAC system. They are used for contactless identification in SCALA.

The SCALA reader VOXIO is eminently suitable for integration in existing flush-mounted boxes. With its flat, compact design, it can be easily fitted using standard, flush-mounted boxes. The reader can be mounted on most surfaces using the surface-mounted casing.

The reader is suitable for both indoor and outdoor installation. The reader is available in a pure RFID version and a version with RFID and PIN keypad.

Operation is extremely easy thanks to the clear signals. The display takes place both visually via LEDs and acoustically. The user therefore sees instantly whether access is being granted or whether new user rights are being written on the identification card.

With the modular construction system and the variants with and without PIN, the SCALA reader VOXIO offers particularly flexible use and provides the suitable solution depending on the requirements.

The data transmission takes place securely via the PHG-Crypt protocol.

All safety-relevant processes do not take place in the reader, but are controlled in the controller. This rules out tampering between the identification card, reader and controller based on the current state-of-the-art technology – such as tapping the encryption or replacing the reader with a compromised unit.

The available operating states are displayed via three LEDs and a Piezzo buzzer.

The communication between SCALA reader and controller takes place via a RS485 interface. The communication and the voltage supply takes place via the 4-wire cable.

The wiring of the reader takes place intuitively and is particularly easy.

The SCALA reader can be mounted on any standard flush-mounted box. The reader can also be surface-mounted using the surface-mounted casing.

  • Permanent open/permanent locking
  • Authorisation via identification card, identification card and PIN and PIN only
  • For authorisation via identification card and PIN, the sequence with which the user authentication takes place can be set in the software (SCALA net): First the identification card, then the PIN, or the PIN followed by the identification card
  • Door code (SCALA PIN reader)
  • Threat code (SCALA PIN reader)

Overview of Advantages

  • Integrated buzzer
  • 3 multi-coloured LEDs
  • RS485 interface (PHG crypt protocol)
  • Integrated read/write mode (can be set via the SCALA software)
  • Integrated encryption mode
  • Encrypted data transmission from the identification card to the door control
Technical data
Variants that can be ordered