pre-print_card_EG blank_card_EG NXP_EG
 
The ICODE SLIX2 proximity contactless card is widely used the third generation of RFID technology comply with RF interface ISO 15693 which provides long-range wireless read/write capability. The maximal read/write distance between ICODE SLIX2 smart card and reader is 1.5m, but actual distance depends on the field power generated by the reader and its antenna size. It is a great solution for access control, identification etc.
 
Card Features
1. Chip : ICODE SLIX2 (NXP)
2. Frequency : 13.56MHz
3. RF Protocol : ISO 15693
4. Card dimension : 86 x 54mm (CR80) or optional
5. Thickness : 0.84mm or optional
6. Material : PVC, PET, PETG, ABS, PC Tensile etc.
7. Surface : lamination (glossy/matte)
8. Print : blank, pre-printed
9. Data storage time : minimum 10 years
10. Operating temperature : -20 ~ +60°C
11. Stockage temperature : -20 ~ +65°C
12. Package : details...
 
Chip Features    datasheet_PDF_EGICODE SLIX2 SL2S2602 Datasheet
- 2560 bits user memory, organized in 80 blocks of 4 bytes each (last block reserved for counter feature)
- Fast data transfer: up to 53 kbit/s
- High data integrity: 16-bit CRC, framing
- True anticollision
- Unique identifier for each device (8 byte)
- 32 byte originality signature
- Lock mechanism for each user memory block (write protection)
- Lock mechanism for DSFID, AFI, EAS
- Password (32-bit) protected memory management for Read access
- Password (32-bit) protected memory management for Write access
- Password (32-bit) protected Label Destroy
- Password (32-bit) protected Privacy Mode
- Password (32-bit) protected EAS and AFI functionality
- 16 bit counter (optionally password protected with the read and write password)
 
Optional
1. Magnetic Stripes
- LoCo300
- HiCo2750/4000
- Magstripe encoding
2. Signature panel or Scratch off panel
3. Print of Serial Number, UID, Barcode
4. Print of Personalization: Name/Photo
5. Hot Foil, Hologram
6. Special colors: Silver/Gold/Metallic colors
7. Special overlay: UV/EVC
8. Punch Hole
more...
 
Applications
1. Libraries
2. Item level tagging in pharmaceutical supply chains
3. Counterfeit protection for consumer goods
4. Industrial applications
5. Asset and document tracking etc.