原文地址

13.56 MHz RFID

Software

  • An Open Source implementation of an NFC stack, and various related utilities is available from the LibNFC project.
  • The author of this page has released a number of small utilities, and enhancements to third-party ones in a repository on BitBucket.
  • A link to a tool for examining data stored on Atmel CryptoRF tokens, and errata is available in this forum post.
  • The RFIDIOT project supply a package of tools for manipulating the contents of various types of RFID tokens, and examining Machine-Readable Travel Documents and EMV cards.
  • A driver that supposedly allows for use of LibNFC with generic PCSC-enabled applications is available from the ifdnfc project on SourceForge.

    This doesn't seem to build against the latest version of LibNFC:

ifd-nfc.c: In function ‘IFDHTransmitToICC’:ifd-nfc.c:355:17: error: too few arguments to function ‘nfc_initiator_transceive_bytes’/usr/local/include/nfc/nfc.h:80:19: note: declared here

Datasheets

  • A datasheet is available for the STMicroElectronics SRI512 ISO/IEC 14443-B chipset.
  • A datasheet is available from ACS for the InnoVision/Broadcom Topaz family of ISO/IEC 14443-A chipsets.
  • A redacted datasheet is available for Maxim's MAX66040 ISO/IEC 14443-B chipset.
  • A datasheet (MF0ICU1) is available for the MiFare UltraLight ISO/IEC 14443-A chipset.
  • A datasheet is available for FuDan's FM11RF08 chipset (which is supposedly compatible with existing MiFare Classic implementations).
  • The Users Manual for the NXP PN532 chipset is available.
  • A manual for a variant of the ACS ACR122U card reader is available.

Hardware

FeliCa tokens

Sony FeliCa Lite RC-S701

  • LibNFC's nfc-list -v command reports:
1 Felica (212 kbps) passive target(s) found:        ID (NFCID2): 01  27  00  5d  1a  05  88  cd      Parameter (PAD): 00  f0  00  00  02  06  03  00     System Code (SC): 88  b4  

1 Felica (424 kbps) passive target(s) found:        ID (NFCID2): 01  27  00  5d  1a  05  88  cd      Parameter (PAD): 00  f0  00  00  02  06  03  00     System Code (SC): 88  b4  
  • LibNFC's nfc-read-forum-tag3 command reports:
Place your NFC Forum Tag Type 3 in the field...NDEF Mapping version: 1.0NFC Forum Tag Type 3 capacity: 208 bytesNDEF data lenght: 60 bytes

libnfc.chip.pn53x - InListPassiveTarget libnfc.driver.acr122 - TX: ff 00 00 00 09 d4 4a 01 01 00 ff ff 01 00 libnfc.driver.acr122 - RX: d5 4b 01 01 14 01 01 27 00 5d 1a 05 88 cd 00 f0 00 00 02 06 03 00 88 b4 90 00

libnfc.chip.pn53x - InListPassiveTarget libnfc.driver.acr122 - TX: ff 00 00 00 09 d4 4a 01 02 00 ff ff 01 00 libnfc.driver.acr122 - RX: d5 4b 01 01 14 01 | 01 27 00 5d 1a 05 88 cd | 00 f0 00 00 02 06 03 00 | 88 b4 | 90 00

ISO/IEC 14443-A tokens

NXP MiFare Classic 4KB

  • LibNFC's nfc-list -v command reports:
1 ISO14443A passive target(s) found:    ATQA (SENS_RES): 00  02  * UID size: single* bit frame anticollision supported       UID (NFCID1): 7c  52  49  e4        SAK (SEL_RES): 18  * Not compliant with ISO/IEC 14443-4* Not compliant with ISO/IEC 18092Fingerprinting based on ATQA & SAK values:* Mifare Classic 4K* SmartMX with Mifare 4K emulation
  • Using the MFOC utility under Linux, it is possible to derive the sector keys for a genuine MiFare Classic card, whilst dumping and decrypting its entire contents in a reasonable timeframe (several minutes) on a moderately powerful PC.

    It appears that this tool does not work properly under VirtualBox, due to latency induced by its USB passthrough implementation.

NXP MiFare DESFire EV1

  • LibNFC's nfc-list -v command reports:
1 ISO14443A passive target(s) found:    ATQA (SENS_RES): 03  44  * UID size: double* bit frame anticollision supported       UID (NFCID1): 04  8b  1f  f1  ad  26  80        SAK (SEL_RES): 20  * Compliant with ISO/IEC 14443-4* Not compliant with ISO/IEC 18092                ATS: 75  77  81  02  80  * Max Frame Size accepted by PICC: 64 bytes* Bit Rate Capability:  * PICC to PCD, DS=2, bitrate 212 kbits/s supported  * PICC to PCD, DS=4, bitrate 424 kbits/s supported  * PICC to PCD, DS=8, bitrate 847 kbits/s supported  * PCD to PICC, DR=2, bitrate 212 kbits/s supported  * PCD to PICC, DR=4, bitrate 424 kbits/s supported  * PCD to PICC, DR=8, bitrate 847 kbits/s supported* Frame Waiting Time: 77.33 ms* Start-up Frame Guard Time: 0.6041 ms* Node ADdress not supported* Card IDentifier supported* Historical bytes Tk: 80    * No COMPACT-TLV objects found, no status foundFingerprinting based on ATQA & SAK values:* Mifare DESFire / Desfire EV1

DESFire EV1 Oyster

  • The mifare-desfire-info utility reports:
===> 0000   90 60 00 00 00                                   |.`...           |<=== 0000   04 01 01 01 00 16 05 91 af                       |.........       |===> 0000   90 af 00 00 00                                   |.....           |<=== 0000   04 01 01 01 03 16 05 91 af                       |.........       |===> 0000   90 af 00 00 00                                   |.....           |<=== 0000   04 8b 1f f1 ad 26 80 00 00 00 00 00 42 08 91 00  |.....&......B...|===> Version information for tag 048b1ff1ad2680:UID:                      0x048b1ff1ad2680Batch number:             0x0000000000Production date:          week 42, 2008Hardware Information:    Vendor ID:            0x04    Type:                 0x01    Subtype:              0x01    Version:              1.0    Storage size:         0x16 (=2048 bytes)    Protocol:             0x05Software Information:    Vendor ID:            0x04    Type:                 0x01    Subtype:              0x01    Version:              1.3    Storage size:         0x16 (=2048 bytes)    Protocol:             0x05===> 0000   90 45 00 00 00                                   |.E...           |<=== 0000   0b 01 91 00                                      |....            |Master Key settings (0x0b):    0x08 configuration changeable;    0x00 PICC Master Key not required for create / delete;    0x02 Free directory list access without PICC Master Key;    0x01 Allow changing the Master Key;===> 0000   90 64 00 00 01 00 00                             |.d.....         |<=== 0000   31 91 00                                         |1..             |Master Key version: 49 (0x31)===> 0000   90 6e 00 00 00                                   |.n...           |<=== 0000   e0 04 00 91 00                                   |.....           |Free memory: 1248 bytesUse random UID: no

NXP MiFare UltraLight

  • LibNFC's nfc-list -v command reports:
1 ISO14443A passive target(s) found:    ATQA (SENS_RES): 00  44  * UID size: double* bit frame anticollision supported       UID (NFCID1): 04  45  57  ba  34  23  80        SAK (SEL_RES): 00  * Not compliant with ISO/IEC 14443-4* Not compliant with ISO/IEC 18092Fingerprinting based on ATQA & SAK values:* Mifare Ultralight* Mifare UltralightC

Orange Cash PayPass Card

  • LibNFC's nfc-list -v command reports:
1 ISO14443A passive target(s) found:    ATQA (SENS_RES): 00  04  * UID size: single* bit frame anticollision supported       UID (NFCID1): 29  8b  cf  51        SAK (SEL_RES): 28  * Compliant with ISO/IEC 14443-4* Not compliant with ISO/IEC 18092                ATS: 78  80  82  02  80  31  80  66  b0  84  12  01  6e  01  83  00  90  00  * Max Frame Size accepted by PICC: 256 bytes* Bit Rate Capability:  * Same bitrate in both directions mandatory* Frame Waiting Time: 77.33 ms* Start-up Frame Guard Time: 1.208 ms* Node ADdress not supported* Card IDentifier supported* Historical bytes Tk: 80  31  80  66  b0  84  12  01  6e  01  83  00  90  00    * Tk after 0x80 consist of optional consecutive COMPACT-TLV data objects;    the last data object may carry a status indicator of one, two or three bytes.    See ISO/IEC 7816-4 8.1.1.3 for more infoFingerprinting based on ATQA & SAK values:* JCOP31 v2.3.1* SmartMX with Mifare 1K emulation
  • Using the following TAMA script, it is possible to access the EMV Payment System Environment, and obtain the name of the first application:
02; // Get firmware version4A  01  00; // 1 target requested

// Select the payment system environment40 01 00 A4 04 00 0E 31 50 41 59 2E 53 59 53 2E 44 44 46 30 31;

40 01 80 A8 00 00 02 83 00;

40 01 00 c0 00 00 26;

40 01 00 b2 00 0c 00;

40 01 00 b2 01 0c 00;

40 01 00 b2 01 0c 21;

ISO/IEC 14443-B tokens

  • Issue #168 on the LibNFC project's issues list contains some details pertinent to the proprietary "14443-B'" technology used by some Calypso transport cards.

Maxim MAX66040E-000AA+

  • LibNFC's nfc-list -v command reports:
1 ISO14443B passive target(s) found:               PUPI: a2  a6  02  00     Application Data: 30  00  2b  e0        Protocol Info: 77  21  71  * Bit Rate Capability: * PICC to PCD, 1etu=64/fc, bitrate 212 kbits/s supported * PICC to PCD, 1etu=32/fc, bitrate 424 kbits/s supported * PICC to PCD, 1etu=16/fc, bitrate 847 kbits/s supported * PCD to PICC, 1etu=64/fc, bitrate 212 kbits/s supported * PCD to PICC, 1etu=32/fc, bitrate 424 kbits/s supported * PCD to PICC, 1etu=16/fc, bitrate 847 kbits/s supported* Maximum frame sizes: 32 bytes* Protocol types supported: ISO/IEC 14443-4* Frame Waiting Time: 38.66 ms* Frame options supported: NAD
  • These cards are advertised as having a 64-bit UID, consisting of data in the PUPI field (e.g. a2 a6 02 00 or 34 ab 02 00), and data in theApplication Data field (e.g. 77 21 71).
  • The Application Data field supposedly contains the "upper 32 bits of the UID" (which appears to be consistent between new cards); and the (variable) PUPI corresponds to the "lower 32 bits of the UID".
  • It is possible to run the Get System Information (0x2B) command using this PN532 TAMA shell script on a TouchATag reader:
02; // Get firmware version//4A  01  00; // 1 target requested4a 01 03 00;40 01 2B;
  • The TAMA commands are wrapped in an InDataExchange (0x40) packet that looks like d4 40 01 2b
  • The Get System Information command returns a result similar to 00 00 0f a2 a6 02 00 30 00 2b e0 00 00 13 07 b2

PN532 Pseudo-APDUs

  • ISO/IEC 14443-B
0000   d5 4b 01 01 50 34 ab 02 00 30 00 2b e0 77 21 710010   01 01 90 00
0000   d5 4b 01 01 50 a2 a6 02 00 30 00 2b e0 77 21 710010   01 01 90 00
  • DESFire EV1
0000   d5 4b 01 01 03 44 20 07 04 8b 1f f1 ad 26 80 060010   75 77 81 02 80 90 00
  • MiFare UltraLight
0000   d5 4b 01 01 00 44 00 07 04 2b 6e ba 34 23 80 900010   00
  • Sony FeliCa Lite RC-S701
0000   d5 4b 01 01 14 01 01 27 00 5d 1a 05 8a cd 00 f00010   00 00 02 06 03 00 88 b4 90 00

Hardware Suppliers

  • Atmel of the USA have a product sampling programme.

    Although the order process appears to be successful (since I receive an e-mail in my university account), I have had limited success with using the confirmation URL provided in said e-mail, and have not seen any evidence of a product delivery, or further confirmation to date.

  • Switch Science of Japan supply Sony FeliCa (RC-S701) tags on an international basis, and fulfil orders promptly. They are also quick to provide refunds, should buyers accidentally make multiple payments for an order. As of writing, the grand total cost of shipping 2 tags to the UK was JPY2,168 (£19.19 according to PayPal).
  • The Identive Group of the USA appear to be supplying Topaz 512-byte tags on an international basis - although the author cannot vouch for the company's service, due to having never utilised it.
  • Maxim supply a number of RFID-related products through a free sampling programme - although shipments are slightly delayed due to requiring internal Business Manager authorisation; and a commercial or academic e-mail address is required for successful order approval.

    Samples ordered within the UK are usually despatched from a UK-based warehouse, if memory serves correctly.

Other Information

  • The YobiWiki has a fairly exhaustive page on Radio Frequency Identification-related content.

转载于:https://www.cnblogs.com/h2zZhou/p/5239869.html

多种非接触卡 ATQA 字节说明相关推荐

  1. 非科班出身拿下字节跳动前端offer,我有一份50000字面试宝典分享给你!

    个人经历 本人211学校,回想我大一的时候,读的是机电工程,因为对计算机专业好就业比较看重,后来在大一下的时候开始了自己双学位之路,开始了学计算机专业,从此开始了科班生的生涯.接触前端也大概是在大一下 ...

  2. 什么是接触卡和非接触卡?

    所谓的接触指芯片外露如手机卡芯片能看见要插进设备才能读写 非接触就是指卡于读写设备之间有一定距离时可读写 公交卡貌似挨着读写器,但这是非接触的.不信可以试试拿开一定距离设备1~3CM照读不误.有的更远 ...

  3. 非接触IC卡技术及应用

    互联网INTERNET的产生及其在全球范围内的飞速发展,使人类进入了信息盛世时代.IC(集成电路)智能卡正在并已经融入当今信息技术的主流.它以其高度的信息集成,高度的安全性,成为市场的宠物.其中非接触 ...

  4. 非接触式IC卡存储结构

    非接触式IC卡Contactless Smart Card(CSS),也称作感应卡.射频卡,由IC芯片.感应天线组成,并完全密封在一个标准PVC卡片中, 无外露部分,其结构示意图如下. 非接触IC卡工 ...

  5. 数据压缩及解压缩算法,多种文件的压缩与解压缩-java android

    > 数据压缩算法,文本压缩算法 几种压缩算法原理介绍- https://blog.csdn.net/clevercode/article/details/46691645 文本压缩算法的对比和选 ...

  6. 双非本科2022年秋招总结(Java后端开发岗)

    小米 9.1笔试(AK) 笔试挂 爱奇艺 8.22笔试 笔试挂 Soul 简历挂 Vivo 10.13投递 简历挂 OPPO 简历挂 货拉拉 简历挂 海康威视 简历挂 37互娱 笔试挂 顺丰 9.6笔 ...

  7. 非接触式IC卡中的射频识别技术

    非接触式IC卡中的射频识别技术 湖南大学电气与信息工程学院 刘铮 章兢 摘 要:介绍了射频识别技术在非接触式IC卡中的应用,对非接触式IC卡的射频通讯在实现中的问题作了探讨.并对Type At Typ ...

  8. 字节跳动3月面试遇到的高频算法题

    本文汇总了牛客2021.3.1~2021.3.30 面经考到的Leetcode题目 最终的高频题榜单数据可以在CodeTop题库(https://codetop.cc)查询,支持按部门.岗位分类筛选. ...

  9. 虚拟机字节码执行引擎

    1 概述 执行引擎是Java虚拟机核心的组成部分之一."虚拟机"是一个相对于"物理机"的概念,这两种机器都有代码执行能力,其区别是物理机的执行引擎是直接建立在处 ...

最新文章

  1. mysql的条件替换_MySQLwhere条件替换疑问?
  2. 待解决的问题--用DOS命令删除远程主机系统文件的方法
  3. 编译器优化陷阱之典型代码
  4. 多线程(what,why,when)
  5. IPv6的地址表达形式
  6. 尚学堂马士兵hibernate讲义
  7. 计算机和未来汽车有联系吗,汽车的未来是会奔跑的计算机?
  8. 基于SSM的Web网页聊天室系统
  9. c语言课程设计日程表,日程表:schedule用法大全
  10. 看两宋风云,搞清了四个之前对两宋历史认识错误的地方
  11. 今天终于知道了!阿里巴巴 P8、P9 及以上到底是什么水平?
  12. 南京大学计算机学类,并未开放计算机专业:南京大学2020年强基计划政策分析...
  13. MFCXTP库读取和写入XML文件
  14. html css 悬浮切换效果,CSS3悬浮动画效果_html/css_WEB-ITnose
  15. 【MapReduce】 MR初识
  16. Linux服务器集群系统(LVS)
  17. 高效推进“少山红杏”地理标志保护 工程建设
  18. SceneKit_入门11_粒子系统
  19. 手写一个抖音视频去水印Java工具,千万别刚一个程序员
  20. 数学计算开根号和一个数的平方

热门文章

  1. python中init和属性_python类的属性不在\uyu init中__
  2. 前端学习笔记之流程控制语句和数组(六)
  3. 你不知道的手动变速箱:换挡杆下的玄机
  4. respond.js IE8使用
  5. from origin ‘null‘ has been blocked by CORS policy: Cross origin requests are only supported for ...
  6. 一文带你读懂 Promise
  7. Geom error原因以及解决办法
  8. ModuleNotFoundError: No module named ‘pip‘;ERROR: Could not find a version that satisfies the requir
  9. jzoj5331 【NOIP2017提高A组模拟8.23】壕游戏
  10. 原有人陪你颠沛流离 昨日书