PAC PAC-20204 proximity token
Technical Specification
- Make: PAC
- Model code: PAC-20204
- Card/ Tag/ Fob: Tag
- Technology Type: Proximity
- Material: UL rated ABS plastic
As an alternative to the traditional door key, PAC’s proximity ID tokens are used by millions of people as an easy and reliable means of gaining access to their homes, communal entrances, places of work and other secured access points, such as car park barriers and turnstiles. PAC tokens can be programmed into any of PAC’s residential or commercial access control systems so that the user’s movement can be monitored and the building protected. The token need only be held near a PAC door reader for the code to be read (access will be granted or denied within 0.5 of a second). And of course, if a PAC token is lost or stolen, it is easily replaced. Lost tokens can be deleted from the access control system.
Read moreMake | PAC |
---|---|
Manufacturer | PAC International, Ltd |
Category | Access Control>Access control cards/ tags/ fobs |
Model code | PAC-20204 |
Card/ Tag/ Fob | Tag |
Technology Type | Proximity |
Material | UL rated ABS plastic |
Transaction Time Sec | 0.5 sec transaction time |
Environmental Specifications | Protection: IP67 |
Additional info |
As an alternative to the traditional door key, PAC’s proximity ID tokens are used by millions of people as an easy and reliable means of gaining access to their homes, communal entrances, places of work and other secured access points, such as car park barriers and turnstiles. PAC tokens can be programmed into any of PAC’s residential or commercial access control systems so that the user’s movement can be monitored and the building protected. The token need only be held near a PAC door reader for the code to be read (access will be granted or denied within 0.5 of a second). And of course, if a PAC token is lost or stolen, it is easily replaced. Lost tokens can be deleted from the access control system. |
Download PDF version Download PDF version |
Related Whitepapers
Integrated access control: reap the benefits of connected security
A guide to specifying RFID readers
Three essential reasons to upgrade your access control technology in 2022
Palm vein recognition
DownloadThe key to unlocking K12 school safety grants
DownloadSelecting the right network video recorder (NVR) for any vertical market
DownloadPhysical access control
DownloadCybersecurity for enterprise: The essential guide to protecting your business
Download