Check Out Our Special Report On Cybersecurity
HID 205x ICLASS Key II Contactless Smart Key
Technical Specification
- Make: HID
- Model code: 205x iCLASS Key II
- Card/ Tag/ Fob: Tag
- Technology Type: Smart Card
- Operating Frequency MHz: 13.56
The iCLASS Key II provides the security and convenience of iCLASS 13.56 Mhz contactless smart card technology in a molded plastic key fob that is durable in harsh environments. This credential can be placed on a key ring or lanyard for access control applications that do not require a Photo ID. iCLASS was specifically designed to make access control more powerful, more versatile, and more secure. iCLASS 13.56 MHz read/write contactless smart card technology provides versatile interoperability in applications such as access control, network log-on security, cashless vending, time and attendance, event management and biometric identification.
Read more| Make | HID |
|---|---|
| Manufacturer | HID |
| Category | Access Control>Access control cards/ tags/ fobs |
| Model code | 205x iCLASS Key II |
| Card/ Tag/ Fob | Tag |
| Technology Type | Smart Card |
| Operating Frequency MHz | 13.56 |
| Memory Size KB | 16 |
| Additional info |
The iCLASS Key II provides the security and convenience of iCLASS 13.56 Mhz contactless smart card technology in a molded plastic key fob that is durable in harsh environments. This credential can be placed on a key ring or lanyard for access control applications that do not require a Photo ID. iCLASS was specifically designed to make access control more powerful, more versatile, and more secure. iCLASS 13.56 MHz read/write contactless smart card technology provides versatile interoperability in applications such as access control, network log-on security, cashless vending, time and attendance, event management and biometric identification. |
- See other HID products
- HID Access control readers
- HID Access control controllers
- HID Access control software
Related Whitepapers
A Brief History of Access Control Credentials
The Truth Behind 9 Mobile Access Myths
6 Good Reasons To Embrace Mobile Credentialing
