Verex G-Prox II Proximity Cards Access control card/ tag/ fob
Technical Specification
- Make: Verex
- Model code: G-Prox II Proximity Cards
- Operating Temperature oC: -45 ~ +70
- Accessories: Proximity Cards
The G-Prox™ II proximity access cards permit convenient contact-less operation without the wear of a physical contact card. They are available blank (un-programmed) or in either industry standard 26 bit format or the VEREX exclusive 36 bit format. All G-Prox™ II cards and keychain tokens are fully compatible with all of the G-Prox™ II proximity reader line. User Programmable. The optional secure Lock Codes enable the installer to lock cards and readers to a specific and unique code providing enhanced security and anti-takeover features. Avaliable as G-ProxCard, G-ProxPhoto, G-ProxTwin and G-ProxKey access control proximity cards compatible with G-Prox II readers.
Read more| Make | Verex |
|---|---|
| Manufacturer | VEREX Technology |
| Category | Access Control>Access control cards/ tags/ fobs |
| Model code | G-Prox II Proximity Cards |
| Environmental Specifications | Operating Temperature oC: -45 ~ +70 |
| Accessories | Proximity Cards |
| Additional info | The G-Prox™ II proximity access cards permit convenient contact-less operation without the wear of a physical contact card. They are available blank (un-programmed) or in either industry standard 26 bit format or the VEREX exclusive 36 bit format. All G-Prox™ II cards and keychain tokens are fully compatible with all of the G-Prox™ II proximity reader line. User Programmable. The optional secure Lock Codes enable the installer to lock cards and readers to a specific and unique code providing enhanced security and anti-takeover features. Avaliable as G-ProxCard, G-ProxPhoto, G-ProxTwin and G-ProxKey access control proximity cards compatible with G-Prox II readers. |
Related Whitepapers
Integrated access control: reap the benefits of connected security
A guide to specifying RFID readers
Three essential reasons to upgrade your access control technology in 2022
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download