Check out our special report on Cybersecurity
HID ProxCard II 1326 Access control card/ tag/ fob
Technical Specification
- Make: HID
- Model code: ProxCard II 1326
- Series: Prox Series
- Card/ Tag/ Fob: Card
- Technology Type: Proximity
The RF-programmable ProxCard II is compatibility with all HID proximity readers. Provides an external number for easy ID and control. Supports formats up to 85 bits, with over 137 billion codes. Custom pre-printed artwork available. A PVC overlay allows for on-site photo ID using most direct image printers. Passive, no-battery design allows for an infinite number of reads. Strong, flexible and resistant to cracking and breaking.
Read more| Make | HID |
|---|---|
| Manufacturer | HID |
| Category | Access Control>Access control cards/ tags/ fobs |
| Model code | ProxCard II 1326 |
| Card/ Tag/ Fob | Card |
| Technology Type | Proximity |
| Material | PVC |
| ISO size Printable | Yes |
| Operating Frequency MHz | 125 kHz |
| Physical Specifications |
Dimensions mm: 85.7 x 54 x 1.8 Weight g: 6.8 |
| Environmental Specifications |
Operating Temp oC: -45 ~ +70 Protection: Weather Resistant |
| Additional info |
The RF-programmable ProxCard II is compatibility with all HID proximity readers. Provides an external number for easy ID and control. Supports formats up to 85 bits, with over 137 billion codes. Custom pre-printed artwork available. A PVC overlay allows for on-site photo ID using most direct image printers. Passive, no-battery design allows for an infinite number of reads. Strong, flexible and resistant to cracking and breaking. |
- See other HID products
- HID Access control readers
- HID Access control controllers
- HID Access control software
Related Whitepapers
A brief history of access control credentials
The 2024 state of physical access trend report
The truth behind 9 mobile access myths
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download

