Check out our special report on Cybersecurity
HID 232, 252 & 243 iCLASS + MIFARE Classic or MIFARE DESFire EV1
Technical Specification
- Make: HID
- Model code: 232, 252 & 243 iCLASS + MIFARE Classic or MIFARE DESFire EV1.
- Series: iCLASS Series
- Card/ Tag/ Fob: Card
- Technology Type: Mifare
Smart cards incorporating iCLASS + MIFARE Classic or iCLASS + MIFARE DESFire EV1, are great for organizations with multiple reader types and for those transitioning from one technology to another. HID can also embed a wide range of commercially available contact chips, or customers can select HID's off-the-shelf Crescendo® multi-technology smart card, providing strong authentication options with logical access systems.
Read more| Make | HID |
|---|---|
| Manufacturer | HID |
| Category | Access Control>Access control cards/ tags/ fobs |
| Model code | 232, 252 & 243 iCLASS + MIFARE Classic or MIFARE DESFire EV1. |
| Card/ Tag/ Fob | Card |
| Technology Type | Mifare |
| Memory Size KB | iCLASS: 2 MIFARE Classic: 1 |
| Physical Specifications |
Dimensions mm: 54 x 86 x 0.840 Weight g: 8 |
| Environmental Specifications | Operating Temp oC: -40 ~ 70 C (-40 ~ 158 F) |
| Additional info |
Smart cards incorporating iCLASS + MIFARE Classic or iCLASS + MIFARE DESFire EV1, are great for organizations with multiple reader types and for those transitioning from one technology to another. HID can also embed a wide range of commercially available contact chips, or customers can select HID's off-the-shelf Crescendo® multi-technology smart card, providing strong authentication options with logical access systems. |
- See other HID products
- HID Access control readers
- HID Access control controllers
- HID Access control software
Related Whitepapers
A brief history of access control credentials
The 2024 state of physical access trend report
The truth behind 9 mobile access myths
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download

