Check out our special report on Cybersecurity
HID DESFire ISO Card-1451/1457 Access control card/ tag/ fob
Technical Specification
- Make: HID
- Model code: DESFire ISO Card-1451/1457
- Card/ Tag/ Fob: Card
- Material: PVC / polymer composite
- ISO size Printable: Yes
The HID FlexSmart DESFire Card is an extra-secure credit card-sized credential that complies with ISO 7810 and 7813 standards. High Security - Mutual authentication, DES and triple-DES data encryption and unique 56-bit serial number. Read/write functionality. DESFire data can be encrypted with the highly secure Data Encryption Standard (3DES) algorithm assuring security before, during and after the transaction.
Read more| Make | HID |
|---|---|
| Manufacturer | HID |
| Category | Access Control>Access control cards/ tags/ fobs |
| Model code | DESFire ISO Card-1451/1457 |
| Card/ Tag/ Fob | Card |
| Material | PVC / polymer composite |
| ISO size Printable | Yes |
| Operating Frequency MHz | 13.56 |
| Transaction Time Sec | < 100 ms sec transaction time |
| Memory Size KB | 4 |
| Physical Specifications |
Dimensions mm: 54 x 85.7 x 0.76 Weight g: 6.8 |
| Environmental Specifications | Operating Humidity %: 5 ~ 95 |
| Additional info |
The HID FlexSmart DESFire Card is an extra-secure credit card-sized credential that complies with ISO 7810 and 7813 standards. High Security - Mutual authentication, DES and triple-DES data encryption and unique 56-bit serial number. Read/write functionality. DESFire data can be encrypted with the highly secure Data Encryption Standard (3DES) algorithm assuring security before, during and after the transaction. |
- See other HID products
- HID Access control readers
- HID Access control controllers
- HID Access control software
Related Whitepapers
A brief history of access control credentials
The 2024 state of physical access trend report
The truth behind 9 mobile access myths
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download

