Check out our special report on Cybersecurity
HID 1430 MIFARE ISO Card Access control card/ tag/ fob
Technical Specification
- Make: HID
- Model code: 1430 MIFARE ISO Card
- Series: Mifare Series
- Card/ Tag/ Fob: Card
- Technology Type: Smart Card
Manufactured to the highest quality standards, HID MIFARE credentials have the memory structure and capacity to store multiple applications on a single credential. Securely separated sectors, each protected by a set of two keys and programmable access conditions, allow complex applications and provide for future expansion. The data on the card is protected with encryption keys used in the mutual authentication process.
Read more| Make | HID |
|---|---|
| Manufacturer | HID |
| Category | Access Control>Access control cards/ tags/ fobs |
| Model code | 1430 MIFARE ISO Card |
| Card/ Tag/ Fob | Card |
| Technology Type | Smart Card |
| Material | PVC |
| ISO size Printable | Yes |
| Transaction Time Sec | <100 ms sec transaction time |
| Physical Specifications |
Dimensions mm: 54 x 85.7 x 0.76 Weight g: 6 |
| Environmental Specifications |
Operating Temp oC: -40 ~ +70 Operating Humidity %: 5 ~ 95 |
| Additional info |
Manufactured to the highest quality standards, HID MIFARE credentials have the memory structure and capacity to store multiple applications on a single credential. Securely separated sectors, each protected by a set of two keys and programmable access conditions, allow complex applications and provide for future expansion. The data on the card is protected with encryption keys used in the mutual authentication process. |
- See other HID products
- HID Access control readers
- HID Access control controllers
- HID Access control software
Related Whitepapers
A brief history of access control credentials
The 2024 state of physical access trend report
The truth behind 9 mobile access myths
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download

