Check out our special report on Cybersecurity
HID iCLASS Prox Card-2022 Access control card/ tag/ fob
Technical Specification
- Make: HID
- Model code: iCLASS Prox Card-2022
- Series: iCLASS Series
- Card/ Tag/ Fob: Card
- Technology Type: Proximity
2022 for 16K bit (2K Bytes) card with 16 application areas. The iCLASS Prox Card combines iCLASS 13.56 MHz contactless read/write smart card and Prox 125 kHz proximity technology on a single card with the ability to add magnetic stripe, barcode, and anti-counterfeiting features including custom artwork or a photo identification directly on the credential.
Read more| Make | HID |
|---|---|
| Manufacturer | HID |
| Category | Access Control>Access control cards/ tags/ fobs |
| Model code | iCLASS Prox Card-2022 |
| Card/ Tag/ Fob | Card |
| Technology Type | Proximity |
| Material | PVC |
| ISO size Printable | Yes |
| Operating Frequency MHz | 13.56 |
| Transaction Time Sec | <100 ms sec transaction time |
| Memory Size KB | 16 |
| Physical Specifications |
Dimensions mm: 54 x 85.7 x 0.84 Weight g: 6.8 |
| Environmental Specifications |
Operating Temp oC: -40 ~ +70 Operating Humidity %: 5 ~ 95 |
| Additional info |
2022 for 16K bit (2K Bytes) card with 16 application areas. The iCLASS Prox Card combines iCLASS 13.56 MHz contactless read/write smart card and Prox 125 kHz proximity technology on a single card with the ability to add magnetic stripe, barcode, and anti-counterfeiting features including custom artwork or a photo identification directly on the credential. |
- See other HID products
- HID Access control readers
- HID Access control controllers
- HID Access control software
Related Whitepapers
A brief history of access control credentials
The 2024 state of physical access trend report
The truth behind 9 mobile access myths
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download

