HID DESFire ISO Card-1450/1456 Access control card/ tag/ fob
Technical Specification
- Make: HID
- Model code: DESFire ISO Card-1450/1456
- Card/ Tag/ Fob: Card
- Material: PVC / polymer composite
- ISO size Printable: Yes
The HID FlexSmart DESFire Card is an extra-secure credit card-sized credential that complies with ISO 7810 and 7813 standards. High Security - Mutual authentication, DES and triple-DES data encryption and unique 56-bit serial number. Read/write functionality. DESFire data can be encrypted with the highly secure Data Encryption Standard (3DES) algorithm assuring security before, during and after the transaction.
Read moreMake | HID |
---|---|
Manufacturer | HID |
Category | Access Control>Access control cards/ tags/ fobs |
Model code | DESFire ISO Card-1450/1456 |
Card/ Tag/ Fob | Card |
Material | PVC / polymer composite |
ISO size Printable | Yes |
Operating Frequency MHz | 13.56 |
Transaction Time Sec | < 100 ms sec transaction time |
Memory Size KB | 4 |
Physical Specifications |
Dimensions mm: 54 x 85.7 x 0.76 Weight g: 6 |
Environmental Specifications | Operating Humidity %: 5 ~ 95 |
Additional info |
The HID FlexSmart DESFire Card is an extra-secure credit card-sized credential that complies with ISO 7810 and 7813 standards. High Security - Mutual authentication, DES and triple-DES data encryption and unique 56-bit serial number. Read/write functionality. DESFire data can be encrypted with the highly secure Data Encryption Standard (3DES) algorithm assuring security before, during and after the transaction. |
Download PDF version Download PDF version |
- See other HID products
- HID Access control readers
- HID Access control controllers
- HID Access control software
Related Whitepapers
A brief history of access control credentials
The 2024 state of physical access trend report
The truth behind 9 mobile access myths
Palm vein recognition
DownloadThe key to unlocking K12 school safety grants
DownloadSelecting the right network video recorder (NVR) for any vertical market
DownloadPhysical access control
DownloadCybersecurity for enterprise: The essential guide to protecting your business
Download