GEE-KB-300 NFC key tags

GEE-KB-300 NFC key tags

Epoxy+ PVC, 42 mm x 26 mm, nxp nfc chips, 5 cm read distance, IEC14443 A& ISO18092 protocol, anti-friction, waterproof, fashion and easy for use, extremely practical in NFC mobile phone apps.  

Download Specification


GEE-KB-300 is one of high performance RFID cards, which worked at frequency of 13.56 mhz with NFC chip embedded. This type of NFC tags is widely used in NFC mobile phone apps as a shortcut of opening applications or change settings.


Main features:

•   Mini size with customize printing

•   Easy for carrying or hanging through its reserved hole

•   Fashioned crystal epoxy surface, free of scratch, abrasion, water, dust .

•   High performance NXP NFC chips

•   Automatic NFC  tags manufacturing technology ensured high performance and environment durability of NFC tags

•   Heidelberg 4 color offset craft maximized color reproduction

•   ISO9001 Quality control system guarantee diamond like quality

•   Green material with ROHS and SGS certification



IEC 14443, ISO18092 , ISO9001:2008
42 mm x 26 mm
5 mm
PVC + Epoxy, SGS approval
CMYK 4 color printing
Barcode, QR code, hotstamping, key ring...
200 pcs/box, 10 box/carton,  10 kg/ carton
NXP Mifare Ultralight/ Ultralightc/ Ntag203/ 1k s50/ 4k s70/ DESfire 2k/ Plus 2k
Memory size
64 Byte - 4k Byte 
13.56 MHz
Read distance
Up to 100 mm
Data transfer rate
106k bits/s
•    E-ticket in subway, bus, event
•    Prepaid card in retails or community
•    Access control
•    NFC Mobile Applications
-25 C to +70 C, 5~ 95% RH, no condensation
-5 C to + 45 C, 5~ 95% RH, no condensation


As RFID technology gradually involved in normal life, the usage of RFID technology have greatly change the way we living and bring signifition convenience to us.

Digit RFID library, which using RFID technology for management and control, was firstly introduced in National Singapore libraries with NXP ICODE Chip for indentifying and tracking, then the trends rapidly expanded into international, nowadays only in China, the number of digit libraries have exceeded over 100.

That is a tremendous achievement since the RFID technology first applied in early 21st century. And there are abundant reasons for RFID libraries completely replaced the traditional ones. 

Advantages of RFID Libraries

Rapid check-out / check-in

The use of RFID reduces the amount of time required to perform circulation operations. The most significant time savings are attributable to the facts that information can be read from RFID tags much faster than from barcodes and that several items in a stack can be read at the same time. While initially unreliable, the anti-collision algorithm that allows an entire stack to be check-out or check-in now appears to be working well.

The other time savings realized by circulation staff are modest unless the RFID tags replace both the EM security strips or RF tags of older theft detection systems and the barcodes of the library management system - i.e., the system is a comprehensive RFID system that combines RFID security and the tracking of materials throughout the library; or it is a hybrid system that uses EM for security and RFID for tracking, but handles both simultaneously with a single piece of equipment. There can be as much as a 50 percent increase in throughput. The time savings are less for check-out than for check-in because the time required for check-out usually is extended by social interaction with patrons.

Simplified patron self check-out / check-in

For patrons using self check out, there is a marked improvement because they do not have to carefully place materials within a designated template and they can check out several items at the same time.
Patron self check-in shifts that work from staff to patrons. Staff is relieved further when readers are installed in book-drops.

High reliability

1. The readers are highly reliable. RFID library systems claim an almost 100 percent detection rate using RFID tags.
2. There is no false alarm than with older technologies once an RFID system is properly tuned.
3. RFID systems encode the circulation status on the RFID tag. This is done by designating a bit as the "theft" (EAS) bit and turning it off at time of check-out and on at time of check-in. If the material that has not been properly check-out is taken past the exit sensors, an immediate alarm is triggered.

High-speed inventorying

A unique advantage of RFID systems is their ability to scan books on the shelves without tipping them out or removing them. A hand-held inventory reader can be moved rapidly across a shelf of books to read all of the unique identification information. Using wireless technology, it is possible not only to update the inventory, but also to identify items which are out of proper order.

Automated materials handling

Another application of RFID technology is automated materials handling. This includes conveyer and sorting systems that can move library materials and sort them by category into separate bins or onto separate carts. This significantly reduces the amount of staff time required to ready materials for re-shelving.

Long tag life
Finally, RFID tags last longer than barcodes because nothing comes into contact with them. Most RFID vendors claim a minimum of 100,000 transactions before a tag may need to be replaced.

It is not a new story that RFID applied into the access control sector. The earliest RFID technology that emerged in Access control setor shall turn back time to mid 20th century, And it was first introduced at low frequency of 125 khz, with a unique ID number inside the chip. EM4100 chip, as one of the most typical chips, emerged in this stage. It brought a hurricane to the traditional access control sector, which the traditional physical keys were gradually replaced by a piece of card. It not only brings convenience but also maintain high security.

Glory of ATT5557 chips in access control system

While as technology developed, the traditional EM4100 chip is no longer worked well, because the ID number could be easily duplicated, which make its safety severely be doubted. Then ATA5557 chips emerged in the stage, it is a chip with pin code embedded, which allow user to set up the password for safety concerns. To better protect the password, this T5557 chip also adopt a interesting settings, which if the password misread for over 3 times, the chip will permanently locked and can not be used any more. The market’s response is so appreciated that access control systems based on T5557 chips rapidly occupy the market.

Lord of chips for NXP Mifare 1k s50 chips

Time turns to 21st century, NXP mifare 1k chips, which worked at high frequency of 13.56 Mhz whipped up a thunderstorm. It was no longer merely bear UID code or passwords, it extended the multiple functions, up to 1kB memory organized in 16 independent sectors, each sectors could sets an application and its passwords. It is amazing function, which make multiple applications in one card possible, beside it contains a logical counter, which allows it able to conduct plus and deduct algorisms. It was so popular as if all the RFID cards bear this Mifare 1k chip in one night. It is still the most welcome chip in the market.

New Emperor- NFC mobile phones and bio technology in access control

Early at year 2005, Nokia have published its NFC mobile phone, which could conduct the same functions as Mifare 1k s50 chip does. This emerged NFC technology though is fantastic, it is not accepted by user’s then. In 2007, Apple launched innovative Iphone, which completely overturn the whole phone sector. And this impact also affect the newly born NFC technology, the Andriod Mobile phone is the first mobile that publicly support NFC technology. By using this technology, NFC that used in Access control is gradually into reality.

Advantages of RFID in access control

Contactless identification with limited read distance. Just a simply touch will the card be indentified.  Limited read range also provide user protecting their user’s data and prevent  unwanted operation 

Access control data management. RFID technology help users more efficiently manage visitor’s access data, such as vistor’s profile, password and access authority through relevant RFID software. Time attendance system is based on this idea. 

Security . RFID provides reliable security features either by its unique ID and password or by its encryption algorisms. Especially when advanced DES and 3DES encryption algorisms introduced, user data by nowadays technology is impossible to break.


Related Products

GEE-KF-300 Epoxy NFC key tags specification.pdf2012-10-05
313 KB
GEE-GT-200 heat transfer UHF RFID texitle Tag specification.pdf2017-10-05
2.1 MB
2 MB

Copyright@ 2020 GEE NFC LIMITED. All right reserved.Term of UsePrivacy Policy




If we are not online, please click on the button a message, we will respond to you as soon as possible.