Check out our special report on Cybersecurity
HID 1435 Adhesive Tag Access control card/ tag/ fob
Technical Specification
- Make: HID
- Model code: 1435 Adhesive Tag
- Series: Mifare Series
- Card/ Tag/ Fob: Tag
- Technology Type: Proximity
HID's innovative FlexSmart MIFARE Adhesive Tag can turn a plastic ID badge into a MIFARE credential. Effortlessly upgrade from prox, magstripe or barium ferrite technology by simply attaching the small, circular MIFARE Tag to your existing card. The MIFARE Adhesive Tag will also adhere to any non-metallic device, such as a cell phone or PDA, to instantly create a contactless smartcard.
Read more| Make | HID |
|---|---|
| Manufacturer | HID |
| Category | Access Control>Access control cards/ tags/ fobs |
| Model code | 1435 Adhesive Tag |
| Card/ Tag/ Fob | Tag |
| Technology Type | Proximity |
| Material | PVC |
| ISO size Printable | Yes |
| Operating Frequency MHz | 13.56 |
| Transaction Time Sec | <100 ms sec transaction time |
| Physical Specifications |
Dimensions mm: 32.6 (Dia) x 1.8 Weight g: 1.2 |
| Environmental Specifications |
Operating Temp oC: -40 ~ +65 Operating Humidity %: 5 ~ 95 |
| Additional info |
HID's innovative FlexSmart MIFARE Adhesive Tag can turn a plastic ID badge into a MIFARE credential. Effortlessly upgrade from prox, magstripe or barium ferrite technology by simply attaching the small, circular MIFARE Tag to your existing card. The MIFARE Adhesive Tag will also adhere to any non-metallic device, such as a cell phone or PDA, to instantly create a contactless smartcard. |
- See other HID products
- HID Access control readers
- HID Access control controllers
- HID Access control software
Related Whitepapers
A brief history of access control credentials
The 2024 state of physical access trend report
The truth behind 9 mobile access myths
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download

