Suomen Tilaajavastuu Oy Version Published Page 1. Veronumero.fi

Size: px
Start display at page:

Download "Suomen Tilaajavastuu Oy Version Published Page 1. Veronumero.fi"

Transcription

1 Page 1 Suomen Tilaajavastuu Oy Veronumero.fi VALTTI SMART CARD Suomen Tilaajavastuu Oy Change history Date Changed by Change June 26, 2013 Suomen Tilaajavastuu Oy First version October 10, 2013 Suomen Tilaajavastuu Oy Security levels updated January 22, 2014 Suomen Tilaajavastuu Oy Card requirements adjusted February 20, Suomen Tilaajavastuu Oy Double chip added 2014 May 27, 2014 Lari Iso- Anttila English Version, Key handling corrected 10 March, 2015 Lari Iso- Anttila Terminal requirements updated

2 Page 2 Table of contents 1 Abbreviations and terminology Technical specification of ID card Card technology Identifying the card Managing the keys Creating a card- specific reading key Signing in on the card Keys to use with the card Mifare software directory Definition Security level definition Security level 0 definition Security level 0+ definition Security level 1 definition Security level 1+ definition ST card application and file Combination card Organisation s own RFID card s cooperation with the VALTTI card Terminal requirements ID card security Visual security Electronic identifiers Printing technology requirements Card provider requirements Further development plan Security levels + definition Managing the card keys Examples Identifying the card Identifying the card type Verifying the card version Authentication Requesting UID Requesting applications Authentication with an application ID Requesting file listing Reading selected file Registration and access list References... 18

3 Page 3 1 Abbreviations and terminology Abbreviation PrgD EV1 UID AID ST Stv T0 Security level 0 T1 Security level 1 T0+ Security level 0+ T1+ Security level 1+ RFID NFC Manufacture serial number Year of manufacture Week of manufacture RndID Application Explanation Programming device, card programming device MIFARE DESFire EV1 Unique card identifier Application ID Suomen Tilaajavastuu Oy The application on the EV1 card, the hex code of which is 0x Radio Frequency Identification Near Field Communication Batch number Production year Production week Random identifier Card s own application on the EV1 card/directory that contains the file created by ST

4 Page 4 2 Technical specification of ID card 2.1 Card technology The construction industry ID card s technology is based on the Mifare Desfire EV1. This technology makes it possible to use the card in several different services, for example, the card service of Suomen Tilaajavastuu Oy and the company s own system. The card uses commonly known encryption methods to secure air interface as well as the data recorded on the card. The selected card responds to the ISO/IEC Type- A definition. Each card allows 28 different applications to be saved and each application allows 32 files to be saved. The file size is defined when creating the file. This has a substantive impact on the number of files to be saved. The card offers a unique identifier and an optional random identifier against tapping. 2.2 Identifying the card The card identification procedure is described in the NXP document [2]. The Mifare products, Mifare Plus, Mifare Desfire and the SmartMX platform, follow the same standard as the Mifare Desfire EV1 card. Recognizing the card type is an important part of security. The Mifare Type Identification Procedure [3] and the MIFARE DESFire as Type 4 tag [2] documents include a description of how to identify the card (also in the Random ID mode). The card is identified using the model created by NXP to identify the EV1 card. The type of the ID card is identified as shown in the chart below. Chart 1 presents the procedure by which the Mifare Desfire EV1 card is identified. The procedure allows the separation of other cards and copies. It does not recognize emulation devices but these can be recognized as fakes visually. The card identification process starts by handling the Selective Acknowledge (SAK) response. The SAK value received from the response must be in binary format: 2nd bit is 0b 4th bit is 0b 5th bit is 0b 6th bit is 1b Next, the correct format of the final message is checked. Chart 1 (based on document [2]) Finally, the GetVersion Request is sent to the card. The response is an HW version, SW version, status on the card, UID if the Random ID has not been set, manufacture batch number, production week and production year. The card software must comply with format 1.x, otherwise the card is not of type Mifare Desfire EV1.

5 Page Managing the keys Using the card requires various keys, such as reading keys, registration keys and access keys. Below is a description of the use and purpose of the keys. Key Purpose User(s) Explanation Application key Application creation ST, partner companies Each partner has their own application key which functions as the card s master key. ST access key Card- specific reading key for the ST application Card- specific registration key for the ST application Authentication to ST application reading UID with Random ID. Can only read the ST application file and send it to the card service Used when creating the card ST, partner companies ST, partner companies ST The key is only revealed to partners. Diversified with data from the card Random Key 2.4 Creating a card- specific reading key Suomen Tilaajavastuu Oy s software (0x ) has its own access key used for authentication and meant for Suomen Tilaajavastuu Oy s application. After authentication the access control terminal (MD) can request the card for a true UID and other relevant information for creating a card- specific key. The card- specific key is used to read the file in Suomen Tilaajavastuu Oy s application. The card communication process is described later when defining the security levels. The card- specific reading key is created according to chart 2 using the CMAC method. The CMAC method is described in the NXP document MIFARE Symmetric key diversifications [4]. The final result of the operation is a unique key that only functions with one card. Chart 2 Versatile input for the card- specific key is a 16- byte string that consists of: Input Byte order Length Card UID Little- endian 7 bytes Card UID repeat Little- endian 7 bytes Fill 0xD8, 0x77 2 bytes

6 Page Signing in on the card The next chart presents the communication between the reader and the card in order to read the UID and the validation file that is on the card. The chart shows how to sign into the card in order to read its UID when the Random ID is on. The card allows reading of the data that is needed for the validation process of the ST card. In the chart the Reader sends a Select Application (0x765453) command to the Card and the card responds OK. If the response is different, the procedure must be interrupted and the user must be told that the application in question is not found on the card. After successfully selecting the application, identification on the card takes place by using the command Authenticate (AES, key 1, appauthkey). The response must be OK. Otherwise the procedure must be interrupted by informing the user of an identification failure. After an accepted identification, the card is read for its correct UID by using the command GetCardUID, to which the card responds with its correct UID. From here onwards the phases apply to security levels 1 and 1+. The data terminal device creates an appreadkey by using the UID, other card data, and the AppReadKeyBase. After the application reading key has been created, the data terminal signs into the card again by using the reading key. After sign- in, the data terminal device reads the data written for the application by using the command ReadData( 0, 0, 16). The returned authentication data is transmitted to the KorVa- service for authentication. KorVa- service will return OK message when card is genuine, if the validation fails then Korva- service returns error message. 2.6 Keys to use with the card Key number Key explanation 0 Master key, random Allows writing in the application. At the moment random and is forgotten after writing, so in practice the application is read- only. 1 File reading key, diversified by using the card UID and version details. Allows reading of the application files. 2 Authentication key, fixed Allows reading of the card UID and version details in order to form a reading key. Master Key Master key is provide separately

7 Page Mifare software directory Definition The Mifare Application Directory version 3 (MAD3) functional mode is described in the NXP document MIFARE Application Directory (MAD) [1]. The Mifare Desfire EV1 card uses the MAD3 definition. When creating AID, it must be noted that the AIDs starting with 0xF have been defined to belong to the Mifare Classic card series [1]. 2.8 Security level definition Because there will be cards by several producers based on this standard in the field, security levels must consider the unique needs of the companies. These unique needs include, among others, various third- party systems, e.g. identification at lunch cafeterias. Thus some cards may not use the Random ID feature by default, while other cards may have this setting on. All data terminal devices must support the Random ID feature whether it is in use on the card or not Security level 0 definition At security level 0 (T0) the card is handled as simply as possible in order to ensure quick communication between the card and the device. The access control terminal (data terminal) must read the card s UID on the card. The device must clarify the card s UID in order for the card to be used in different services, such as the Kulkuri service of Suomen Tilaajavastuu Oy or the card- holder company s own data system. At T0 the device must go through the following steps: 1. Detect card 2. Select card 3. Read card s true UID. At T0, the mandatory data to read on the card include the UID. It is also possible to read the UID from the communication between the card and the access control terminal Security level 0+ definition At security level 0+ (T0+) the access control terminal, i.e. the data terminal device, must be able to read the correct UID on the card, even if the card is set on random ID. The device must clarify the card s UID in order for the card to be used in different services, such as the Kulkuri service of Suomen Tilaajavastuu Oy or the card- holder company s own data system. In addition to this, the data terminal device must be able to read the card s true UID. Card identification must be implemented on the access control terminal because that will remove simple copies, such as RFID and NFC programmes coded in a smart phone. At T0 the device must go through the following steps: 1. Detect card 2. Select card 3. Read card s true UID. At T0+, the mandatory data to read on the card include card s type and the UID Security level 1 definition At security level 1 (T1), the access control terminal, i.e. the end terminal device, must recognize the card as type EV1 and authenticate it in the Suomen Tilaajavastuu Oy application on the card. The access control terminal reads the data necessary to create a card- specific reading key. The access control terminal creates a card- specific reading key to read the file included in the Suomen Tilaajavastuu Oy application. The file is located on the card in the index 0x00 of the Suomen Tilaajavastuu Oy application. The file read from the card is sent to be checked by Suomen

8 Page 8 Tilaajavastuu Oy s card service. The card service returns information about the correctness of the checked card. The data on the card can be handled and communicated with the STV card storage service in the device manufacturer s background service. This checking does not need to be done in the end terminal device. Card identification should preferably be done when taking the card into use. It is not obligatory to identify the card with the end terminal device every time it is used. At T1, the access control terminal must go through the following steps: 1. Detect card 2. Select card 3. Authenticate in the ST application on the card 4. Request the card UID and read the data necessary to create a card- specific reading key 5. Read the file included in the ST application index 0x00h 6. Send the file to the card service directly or through the manufacturer s background service in order to check its validity. 7. Handle response from the card service At T1, the data obligatory to read from the card include - Card type - Card UID - Manufacture serial number - Year of manufacture - Week of manufacture Security level 1+ definition The only difference between the definitions of security levels 1 and 1+ is that at security level 1+, the card is set to Random ID. 2.9 ST card application and file The AID of the application on the card is 0x This application has been defined with a file that is the application file in index 0x00. A unique file including a random number series is created for each card. This file is created in the ST card service. The file s length is 16 bytes Combination card By a combination card we mean a card that includes two or three separate RFID chips. The first chip must be a Mifare Desfire EV1 and designed for use with the VALTTI smart card. The other chip s model of operation is defined in the sections below. The Mifare Desfire EV1 s functionality with the VALTTI card has been described in previous sections Organisation s own RFID card s cooperation with the VALTTI card When attaching an organisation s own RFID card to the VALTTI card, the type of card to attach must be taken into consideration. The attached card can be anything, and the operation of the organisation s card must not disturb the operation of the VALTTI card. When the end terminal device used on the working site detects two cards, it must select the Mifare Desfire EV1 card. The Mifare Desfire EV 1 can be identified based on the type and model of the card. Another way to identify the card is by the length of its UID. However, if both cards use a 7- byte UID, identification must be made by card type and model. The end terminal device receives this information when the device detects the cards Terminal requirements Terminal device must read other tag- types as well as VALTTI- card (MIFARE DESFire EV1). Reader must read following types MIFARE DESFire EV1 and Miface Classic tag. Other MIFARE tag types are optional.

9 Page 9

10 Page 10 3 ID card security 3.1 Visual security VALTTI smart card VALTTI ID card Visual identifiers on the VALTTI smart card and ID card Name Company logo Tax code Employer Validity data Photograph Bar code (smart card only) RFID/NFC identifier (smart card only) Electronic Unicus identifier (smart card only) The information on the VALTTI smart card has been printed on a plastic card which easily displays the name, tax code, company, business ID, and period of validity. The smart card contains a bar code and an RFID so that it is also easy to read electronically. 3.2 Electronic identifiers A access control terminal or any other ID- card reading device creates a card- specific reading key that can be used for the ST application to read the file saved in the application. The card may contain company- specific software, files, access rights or PIN codes. This document does not express any opinion on amendments made by a third party. 3.3 Printing technology requirements Offset printing of the cards must be done so that the cards comply with the ISO/IEC 7810 standard [6]. Visual personalization must be applied by laser scribing. 3.4 Card provider requirements The facilities used to manufacture and identify the cards must comply with the following requirements: Facility classification 3 (zone 3, restricted zone) according to EU security rules [7] The provider must comply with the ISO standard [8] or other commonly accepted data security standard. The security arrangements of the facilities, equipment capacity, and production system must form their own zone, technically separated from other zones in terms of security. The facilities used to manufacture and identify the cards must not have visual contact from outside the facilities. Access to the production facilities must be via a single central entrance.

11 Page 11 Access must be implemented so that only authorized persons are allowed in the facilities. Access to production facilities must be verifiable later. The facilities must be guarded and monitored to a high degree 24h/day. The monitoring and security system must include recording camera surveillance, access control, break and entry protection, and alarms directed to a manned control room. The cards must be kept in a EURO V level safe or equivalent storage, such as a vault.

12 Page 12 4 Further development plan This chapter addresses further development areas with respect to the construction industry card standard. These areas are not included in the current version mainly because the field does not yet offer wide- scale hardware support for these technologies. 4.1 Security levels + definition For the security levels defined above (e.g. T0), the standard will cover reinforced versions (e.g. T0+). The most important change in the security levels + definition is the use of RndID. Putting RndID into use affects the traffic between the access control terminal and the card in such a way that the reading device must be authenticated for the Suomen Tilaajavastuu Oy application and ask for the card UID. RndID will be introduced in 2H Managing the card keys Another area for further development is standardized key management and key updates.

13 Page 13 5 Examples Sample events between the access control terminal and the card. These examples are for FEIG reader not to raw ISO protocol. 5.1 Identifying the card Inventory Request >> = CRC, see AN10787.pdf page 9, section 3.7 CRC Calculation =? = The Inventory command << C 8B 5A 52 0C F8 OK 69 F8 = CRC 80 2C 8B 5A 52 0C = UID or Random ID = OPT Info 0x00 - Random ID, 0x01 - Card s true UID = Card model = Card type =? = OK (so called status byte) 5.2 Identifying the card type Part 1 RATS i.e. checking SAK >> C 8B 5A 52 0C 04 A3 A5 A3 A5 = CRC 80 2C 8B 5A 52 0C = UID or Random ID = = = Driver used for the card? = The Select command Response for Answer To Select = RATS << F1 D2 OK F1 D2 = CRC = ATS = TL = SAK see AN11004.pdf page 7, section = b, Select Acknowledge = SAK = ATQA see AN10833.pdf page 9, table = = OK

14 Page Verifying the card version Part 2 GetVersion(Req) >> EE B0 EE B0 = CRC =? = The Inventory command GetVersion(Resp) << C 52 5A 8B 2C 80 BA CF B 67 OK Part 1: << = HW Storage Size 18 = = HW Version number is = OK Part 2: C 52 5A 8B 2C C 52 5A 8B 2C 80 = UID, 0 if Random ID is on = Protocol = SW Storage Size = = SW version minor number is = SW version major number is = Vendor ID, type, sub type Part 3: BA CF B 67 OK 2B 67 = CRC = Production year = Production week BA CF = Batch number If the process has proceeded thus far without an error and the SW major version is = 1, then it is Mifare Desfire EV Authentication Selected Application authentication >> FA DB 92 DB = CRC = Desfire Key Number, this information is sent to the reader = Reader key Index, this information is sent to the reader = Application ID = FA... = The Authenticate command Resp << 00 8C 36 OK 8C 36 = CRC = OK

15 Page Requesting UID GetUID() >> C 6C 9C 6C = CRC = = = Get UID Resp << C 52 5A 8B 2C 80 B0 CC OK B0 CC = CRC 04 0C 52 5A 8B 2C = AppID = OK 5.5 Requesting applications GetApplicationID() >> 6A C3 94 C3 = CRC =? =? 6A... = Get UID << B FA OK 9B FA = CRC = AppID = AppID = OK 5.6 Authentication with an application ID AuthWithAppId() >> FA EC 14 EC 14 = CRC = Reader Key index = DESFire Key number = Stv App Id FA = The Auth command << 00 8C 36 OK 8C 36 = CRC = OK

16 Page Requesting file listing >> 6F FA 29 FA = CRC = Stv App Id 6F... = The GetFileIDs command << OK 29 FA = CRC = File ID 0x01 (if application includes several files, STV includes only one file) = File ID 0x = OK 5.8 Reading selected file >> BD FF EC 6E EC 6E = CRC FF = Length of file to be read =? = File ID = DesFire Key Number = Reader Key Index = App ID BD = The Read Standard Data command File contents in hexadecimal format << F 6D 65 6E C A F F B 6F E 75 6D F E DD OK

17 Page 17 6 Registration and access list The access control terminal must be registered in the Suomen Tilaajavastuu Oy card service (card storage). The device manufacturer is responsible for registering the device and updating the access list. Registration means attaching the access control terminal to Suomen Tilaajavastuu Oy s marking data background system. The marking data, i.e. the Kulkuri service [5], handles the card s time stamping data.

18 Page 18 7 References [1] AN10787 MIFARE Application Directory (MAD) [2] AN11004 MIFARE DESFire as Type 4 tag [3] AN10833 MIFARE Type Identification Procedure [4] AN10922 MIFARE Symmetric key diversifications [5] Kulkuri service [6] ISO / IEC [7] Facilities classification according to EU security rules [8] ISO

AN1305. MIFARE Classic as NFC Type MIFARE Classic Tag. Application note COMPANY PUBLIC. Rev. 1.3 2 October 2012 130513. Document information

AN1305. MIFARE Classic as NFC Type MIFARE Classic Tag. Application note COMPANY PUBLIC. Rev. 1.3 2 October 2012 130513. Document information MIFARE Classic as NFC Type MIFARE Classic Tag Document information Info Content Keywords NFC Forum, NFC data mapping, MIFARE Classic 1K/4K, MIFARE Classic 1K, MIFARE Classic 4K, MIFARE Plus X/S, NFC Type

More information

AN11004. MIFARE DESFire as Type 4 Tag. Rev. 2.4 22 May 2013 130224. Application note COMPANY PUBLIC. Document information.

AN11004. MIFARE DESFire as Type 4 Tag. Rev. 2.4 22 May 2013 130224. Application note COMPANY PUBLIC. Document information. Document information Info Content Keywords NFC Forum, NFC Forum data mapping, NFC Forum Type 4 Tag Operation version 2.0, Type 4 Tag version 2.0, MIFARE DESFire EV1, NDEF Tag Application Abstract The NFC

More information

AN1304. NFC Type MIFARE Classic Tag Operation. Application note PUBLIC. Rev. 1.3 2 October 2012 130413. Document information

AN1304. NFC Type MIFARE Classic Tag Operation. Application note PUBLIC. Rev. 1.3 2 October 2012 130413. Document information NFC Type MIFARE Classic Tag Operation Document information Info Content Keywords NDEF, NDEF data mapping, NDEF Data Exchange Format MIFARE Classic 1K, MIFARE Classic 4K, MIFARE Classic 1K/4K, MIFARE Plus

More information

Exercise 1: Set up the Environment

Exercise 1: Set up the Environment RFID Lab Gildas Avoine, 2014 Contact: gildas.avoine@irisa.fr Objective: Learn how much it is easy to read contactless tags, possibly simulate/clone. Requirement: Hardware: Reader SCL3711 or ACR122, Reader

More information

RFID MODULE Mifare Reader / Writer SL025B User Manual Version 1.4 Nov 2012 StrongLink

RFID MODULE Mifare Reader / Writer SL025B User Manual Version 1.4 Nov 2012 StrongLink RFID MODULE Mifare Reader / Writer User Manual Version 1.4 Nov 2012 StrongLink CONTENT 1. MAIN FEATURES... 3 2. PINNING INFORMATION... 4 3. BAUD RATE SETTING... 5 4. COMMUNICATION PROTOCOL... 5 4-1. COMMUNICATION

More information

ACR122 NFC Contactless Smart Card Reader

ACR122 NFC Contactless Smart Card Reader Datenblatt / Specifications ACR122 NFC Contactless Smart Card Reader Table of Contents 1. Introduction... 3 1.1. USB Interface... 3 2. Implementation... 4 2.1. Smart Card Reader Interface Overview... 5

More information

RFID MODULE Mifare Reader / Writer SL032 User Manual Version 1.5 Nov 2012 StrongLink

RFID MODULE Mifare Reader / Writer SL032 User Manual Version 1.5 Nov 2012 StrongLink RFID MODULE Mifare Reader / Writer User Manual Version 1.5 Nov 2012 StrongLink CONTENT 1. MAIN FEATURES... 3 2. PINNING INFORMATION... 4 3. BAUD RATE SETTING... 5 4. COMMUNICATION PROTOCOL... 5 4-1. Communication

More information

Gemalto Mifare 1K Datasheet

Gemalto Mifare 1K Datasheet Gemalto Mifare 1K Datasheet Contents 1. Overview...3 1.1 User convenience and speed...3 1.2 Security...3 1.3 Anticollision...3 2. Gemalto Mifare Features...4 2.1 Compatibility with norms...4 2.2 Electrical...4

More information

RFID MODULE Mifare Reader / Writer SL031 User Manual Version 2.7 Nov 2012 StrongLink

RFID MODULE Mifare Reader / Writer SL031 User Manual Version 2.7 Nov 2012 StrongLink RFID MODULE Mifare Reader / Writer User Manual Version 2.7 Nov 2012 StrongLink CONTENT 1. MAIN FEATURES... 3 2. PINNING INFORMATION... 4 3. BAUD RATE SETTING... 5 4. COMMUNICATION PROTOCOL... 5 4-1. Communication

More information

Training MIFARE SDK. Public. MobileKnowledge June 2015

Training MIFARE SDK. Public. MobileKnowledge June 2015 MIFARE SDK Public MobileKnowledge June 2015 Agenda Overview of MIFARE SDK related technologies NFC Technology (Read/Write mode) MIFARE, NTAG and ICODE products NFC in Android MIFARE SDK Introduction to

More information

Aperio Online System Description

Aperio Online System Description Aperio Online Aperio Online System Description Document No: ST-002326-B, Issue date: 4 August 2015 1 The global leader in Aperio Online Mechanical Installation Guide, Document No: ST-002326-PB, Date: Online

More information

Secure My-d TM and Mifare TM RFID reader system by using a security access module Erich Englbrecht (info@eonline.de) V0.1draft

Secure My-d TM and Mifare TM RFID reader system by using a security access module Erich Englbrecht (info@eonline.de) V0.1draft Application Report Secure My-d TM and Mifare TM RFID reader system by using a security access module Erich Englbrecht (info@eonline.de) V0.1draft Embedded RF ABSTRACT This application report describes

More information

MIFARE ISO/IEC 14443 PICC

MIFARE ISO/IEC 14443 PICC Rev. 3.0 26 June 2009 130830 Application note PUBLIC Document information Info Keywords Abstract Content Activate Card, MIFARE, Select Card This Application te shows the elementary communication for selecting

More information

USING MIFARE CLASSIC TAGS VERSION 100212

USING MIFARE CLASSIC TAGS VERSION 100212 USING MIFARE CLASSIC TAGS VERSION 100212 U s i n g M I F A R E C l a s s i c T a g s P a g e 2 TABLE OF CONTENTS 1 Overview... 4 1.1 Required Reading... 4 1.2 Document Scope... 4 1.3 MIFARE Features...

More information

RFID MODULE Mifare Reader / Writer SL030 User Manual Version 2.6 Nov 2012 StrongLink

RFID MODULE Mifare Reader / Writer SL030 User Manual Version 2.6 Nov 2012 StrongLink RFID MODULE Mifare Reader / Writer User Manual Version 2.6 Nov 2012 StrongLink CONTENT 1. MAIN FEATURES... 3 2. PINNING INFORMATION... 4 3. DEVICE OPERATION... 5 3-1. Clock and Data Transitions:... 5 3-2.

More information

Visa Smart Debit/Credit Certificate Authority Public Keys

Visa Smart Debit/Credit Certificate Authority Public Keys CHIP AND NEW TECHNOLOGIES Visa Smart Debit/Credit Certificate Authority Public Keys Overview The EMV standard calls for the use of Public Key technology for offline authentication, for aspects of online

More information

Using RFID Techniques for a Universal Identification Device

Using RFID Techniques for a Universal Identification Device Using RFID Techniques for a Universal Identification Device Roman Zharinov, Ulia Trifonova, Alexey Gorin Saint-Petersburg State University of Aerospace Instrumentation Saint-Petersburg, Russia {roman,

More information

Aperio Online. Aperio. Online Programming Application Manual. Aperio Online Quick Installation Guide, Document No: ST-001322-A, Date: 8 juli 2013

Aperio Online. Aperio. Online Programming Application Manual. Aperio Online Quick Installation Guide, Document No: ST-001322-A, Date: 8 juli 2013 Aperio TM Online Programming Application Manual Document No: ST-001321-A, Issue date: 8 July 2013 1 Aperio Online Quick Installation Guide, Document No: ST-001322-A, Date: 8 juli 2013 Table of Contents

More information

Mifare DESFire Specification

Mifare DESFire Specification Mifare DESFire Specification Version 1.0 29 th September 2009 Revision History Version Date Author Description of Changes 1.0 29/09/09 O McLaughlin Ratified by LASSeO 0.2 28/07/09 O McLaughlin Minor changes

More information

Application Programming Interface

Application Programming Interface Application Programming Interface Advanced Card Systems Ltd. Website: www.acs.com.hk Email: info@acs.com.hk CONTENTS Introduction 4 Features 4 USB interface 4 Contact and Contactless interface handling

More information

Smart Card Application Standard Draft

Smart Card Application Standard Draft Smart Card Application Standard Draft Contents 1 SCOPE... 6 1.1 DEFINITIONS / DOCUMENT CONVENTIONS... 6 2 KEY DATA ELEMENTS AND CONCEPTS... 7 2.1 STATIC CARD INFORMATION... 7 2.1.1 Card ID (CdID)... 7

More information

MIFARE Trademark Usage Guidelines

MIFARE Trademark Usage Guidelines Rev. 4.5 05.04.2016 Document information Info Keywords Abstract Security Status Content Trademark, Guideline, Rule, MIFARE, MIFARE DESFire, MIFARE Plus, MIFARE Ultralight, MIFARE Classic, MIFARE FleX This

More information

NFCulT. An easy a nice tool that will make you have fun, or... make profit!

NFCulT. An easy a nice tool that will make you have fun, or... make profit! NFCulT An easy a nice tool that will make you have fun, or... make profit Matteo Beccaro ( aka bughardy ) Student at Politecnico di Torino Computer Engineering Security Engineer and researcher at Secure

More information

NACCU 2013. Migrating to Contactless: 2013 1

NACCU 2013. Migrating to Contactless: 2013 1 NACCU 2013 Migrating to Contactless: 2013 1 AGENDA The demise of cards has been predicted for many years. When will this really happen? This presentation by two card industry experts will cover the rise

More information

The Answer to the 14 Most Frequently Asked Modbus Questions

The Answer to the 14 Most Frequently Asked Modbus Questions Modbus Frequently Asked Questions WP-34-REV0-0609-1/7 The Answer to the 14 Most Frequently Asked Modbus Questions Exactly what is Modbus? Modbus is an open serial communications protocol widely used in

More information

MF1 IC S50. 1. General description. Functional specification. 1.1 Contactless Energy and Data Transfer. 1.2 Anticollision. Energy

MF1 IC S50. 1. General description. Functional specification. 1.1 Contactless Energy and Data Transfer. 1.2 Anticollision. Energy Rev. 5.2 15 January 2007 Product data sheet 001052 PUBLIC 1. General description NXP has developed the Mifare to be used in contactess smart cards according to ISO/IEC 14443A. The communication layer (

More information

Secure Automatic Ticketing System

Secure Automatic Ticketing System Secure Automatic Ticketing System MARIUS POPA, CRISTIAN TOMA Department of Computer Science in Economics Academy of Economic Studies Bucharest Romana Square, No. 6, Bucharest ROMANIA marius.popa@ase.ro

More information

Access Control, Ticketing and Booking System for Sports Halls

Access Control, Ticketing and Booking System for Sports Halls Access Control, Ticketing and Booking System for Sports Halls SDD Information Technology Group has developed system for ticketing, booking and access control for sport objects. The system is based on contact

More information

INTEGRATED CIRCUITS I CODE SLI. Smart Label IC SL2 ICS20. Functional Specification. Product Specification Revision 3.1 Public. Philips Semiconductors

INTEGRATED CIRCUITS I CODE SLI. Smart Label IC SL2 ICS20. Functional Specification. Product Specification Revision 3.1 Public. Philips Semiconductors INTEGRATED CIRCUITS I CODE SLI Smart Label IC SL2 ICS20 Product Specification Revision 3.1 February July 2005 2001 Public Philips Semiconductors CONTENTS 1 FEATURES...4 1.1 I CODE SLI RF Interface (ISO/IEC

More information

Training. MIFARE4Mobile. Public. MobileKnowledge April 2015

Training. MIFARE4Mobile. Public. MobileKnowledge April 2015 MIFARE4Mobile Public MobileKnowledge April 2015 Agenda Why MIFARE4Mobile? MIFARE in Mobile related technologies MIFARE technology NFC technology MIFARE4Mobile technology High level system architecture

More information

NFC. Technical Overview. Release r05

NFC. Technical Overview. Release r05 Release r05 Trademarks The Bluetooth word mark and logos are owned by the Bluetooth SIG, Inc. and any use of such marks by Stollmann E+V GmbH is under license. Other trademarks and trade names are those

More information

BT LE RFID Reader v1.0

BT LE RFID Reader v1.0 BT LE RFID Reader v1.0 The board The BT LE RFID Reader board v1.0 is shown below. On the board there are the following components: Power connector J7 with positive voltage going to pin 1 (red wire) and

More information

SL-8800 HDCP 2.2 and HDCP 1.x Protocol Analyzer for HDMI User Guide

SL-8800 HDCP 2.2 and HDCP 1.x Protocol Analyzer for HDMI User Guide SL-8800 HDCP 2.2 and HDCP 1.x Protocol Analyzer for HDMI Simplay-UG-02003-A July 2015 Contents 1. Overview... 4 1.1. SL-8800 HDCP Protocol Analyzer Test Equipment... 4 1.2. HDCP 2.2/HDCP 1.x Protocol Analyzer

More information

UM0853 User manual. 1 Introduction. M24LRxx application software user guide

UM0853 User manual. 1 Introduction. M24LRxx application software user guide User manual M24LRxx application software user guide 1 Introduction The purpose of this user manual is to teach how to use the M24LRxx tool kit with the M24LRxx_Application_Software. It describes the M24LRxx_Application_Software

More information

MF3ICD81, MF3ICD41, MF3ICD21

MF3ICD81, MF3ICD41, MF3ICD21 MF3ICD81, MF3ICD41, MF3ICD21 Rev. 3 17 February 2009 Product short data sheet 1. General description MIFARE DESFire EV1 is ideal for service providers wanting to use multi-application smart cards in transport

More information

RFID READER 13.56MHz Reader / Writer SL500 User Manual Version 2.6 Nov 2011 StrongLink

RFID READER 13.56MHz Reader / Writer SL500 User Manual Version 2.6 Nov 2011 StrongLink RFID READER 13.56MHz Reader / Writer User Manual Version 2.6 Nov 2011 StrongLink CONTENT 1. GENERAL INFORMATION... 5 2. TYPES AND EXPLANATION... 6 3. CONNECTING TO PC... 6 3.1 -RS232... 6 3.2 -USB... 7

More information

Implementation of biometrics, issues to be solved

Implementation of biometrics, issues to be solved ICAO 9th Symposium and Exhibition on MRTDs, Biometrics and Border Security, 22-24 October 2013 Implementation of biometrics, issues to be solved Eugenijus Liubenka, Chairman of the Frontiers / False Documents

More information

MIFARE CONTACTLESS CARD TECHNOLOLGY AN HID WHITE PAPER

MIFARE CONTACTLESS CARD TECHNOLOLGY AN HID WHITE PAPER MIFARE CONTACTLESS CARD TECHNOLOLGY AN HID WHITE PAPER GENERAL The MIFARE contactless smart card and MIFARE card reader/writer were developed to handle payment transactions for public transportation systems.

More information

Hacking Mifare Classic Cards. Márcio Almeida (marcioalma@gmail.com)

Hacking Mifare Classic Cards. Márcio Almeida (marcioalma@gmail.com) Hacking Mifare Classic Cards Márcio Almeida (marcioalma@gmail.com) !! DISCLAIMERS!! Disclaimer 1: The content of this presentation results from independent research conducted by me on my own time and of

More information

Decimal to Binary Conversion

Decimal to Binary Conversion Decimal to Binary Conversion A tool that makes the conversion of decimal values to binary values simple is the following table. The first row is created by counting right to left from one to eight, for

More information

Network FAX Driver. Operation Guide

Network FAX Driver. Operation Guide Network FAX Driver Operation Guide About this Operation Guide This Operation Guide explains the settings for the Network FAX driver as well as the procedures that are required in order to use the Network

More information

EMV (Chip-and-PIN) Protocol

EMV (Chip-and-PIN) Protocol EMV (Chip-and-PIN) Protocol Märt Bakhoff December 15, 2014 Abstract The objective of this report is to observe and describe a real world online transaction made between a debit card issued by an Estonian

More information

ADDENDUM - Bluetooth interface Option Instructions for using Extech Printer with a Bluetooth device

ADDENDUM - Bluetooth interface Option Instructions for using Extech Printer with a Bluetooth device Introduction ADDENDUM - Bluetooth interface Option Instructions for using Extech Printer with a Bluetooth device Extech 3500T and 2500T thermal printers support full range of communication interfaces,

More information

RFID Penetration Tests when the truth is stranger than fiction

RFID Penetration Tests when the truth is stranger than fiction RFID Penetration Tests when the truth is stranger than fiction Dr. Tomáš Rosa, tomas.rosa@rb.cz Raiffeisenbank, a.s. Agenda Technology overview Physical layer of LF and HF bands The Unique ID phenomenon

More information

TT-RFID platform - Introduction

TT-RFID platform - Introduction TT-RFID platform - Introduction Version 0.7 01/06/2011 INDEX 1. RFID PROTOCOL - MAIN FEATURES...1 2. COMMAND DISPLAY FOR THE RFID PROTOCOL...2 3. GUIDELINES FOR USING THE RFID PROTOCOL... 4 3.1. CONFIGURATION

More information

ACR122U USB NFC Reader

ACR122U USB NFC Reader ACR122U USB NFC Reader Application Programming Interface V2.02 Subject to change without prior notice Table of Contents 1.0. Introduction... 4 1.1. Features... 4 1.2. USB Interface... 5 2.0. Implementation...

More information

Cleaning Encrypted Traffic

Cleaning Encrypted Traffic Optenet Documentation Cleaning Encrypted Traffic Troubleshooting Guide iii Version History Doc Version Product Date Summary of Changes V6 OST-6.4.300 01/02/2015 English editing Optenet Documentation

More information

OTP circumventing in MIFARE ULTRALIGHT: Who says free rides?

OTP circumventing in MIFARE ULTRALIGHT: Who says free rides? OTP circumventing in MIFARE ULTRALIGHT: Who says free rides? bughardy bughardy@cryptolab.net Eagle1753 eagle1753@onenetbeyond.org Introduction RFID technologies are becoming more and more prevalent in

More information

More effective protection for your access control system with end-to-end security

More effective protection for your access control system with end-to-end security More effective protection for your access control system with end-to-end security By Jeroen Harmsen The first article on end-to-end security appeared as long ago as 1981. The principle originated in ICT

More information

PayPass - M/Chip Requirements. 5 December 2011

PayPass - M/Chip Requirements. 5 December 2011 PayPass - M/Chip Requirements 5 December 2011 Notices Proprietary Rights The information contained in this document is proprietary and confidential to MasterCard International Incorporated, one or more

More information

Jolly Encoder Configuration Guide

Jolly Encoder Configuration Guide JOLLY TECHNOLOGIES Jolly Encoder Configuration Guide The purpose of this guide is to document the supported hardware, media and configuration process for the Jolly Encoder. Jolly Encoder The Jolly Encoder

More information

New Attacks against RFID-Systems. Lukas Grunwald DN-Systems GmbH Germany

New Attacks against RFID-Systems. Lukas Grunwald DN-Systems GmbH Germany New Attacks against RFID-Systems Lukas Grunwald DN-Systems GmbH Germany Agenda What is RFID? How to exploit and attack RFID systems Attacks against the middleware Reader-emulation, soft-tags Unexpected

More information

Electronic Access Control Security. Matteo Beccaro HackInTheBox Amsterdam, May 27 th, 2016

Electronic Access Control Security. Matteo Beccaro HackInTheBox Amsterdam, May 27 th, 2016 Electronic Access Control Security Matteo Beccaro HackInTheBox Amsterdam, May 27 th, 2016 Me Matteo Beccaro Founder & Chief Technology Officer at Opposing Force The first Italian company specialize in

More information

Ensto Chago Master EVM300 and EVM500 Operational description

Ensto Chago Master EVM300 and EVM500 Operational description Pages: 1 (8) Ensto Chago Master EVM300 and EVM500 Operational Pages: 2 (8) Contents 1 What is Ensto EVM... 3 2 EVM versions... 3 2.1 EVM300... 4 2.2 EVM500... 5 3 Technical information... 7 Pages: 3 (8)

More information

Measurement and Analysis Introduction of ISO7816 (Smart Card)

Measurement and Analysis Introduction of ISO7816 (Smart Card) Measurement and Analysis Introduction of ISO7816 (Smart Card) ISO 7816 is an international standard related to electronic identification cards with contacts, especially smart cards, managed jointly by

More information

Microtronics technologies Mobile: 99707 90092

Microtronics technologies Mobile: 99707 90092 For more Project details visit: http://www.projectsof8051.com/rfid-based-attendance-management-system/ Code Project Title 1500 RFid Based Attendance System Synopsis for RFid Based Attendance System 1.

More information

FEDERAL LAW GAZETTE FOR THE REPUBLIC OF AUSTRIA. Year 2015 Issued on December 11, 2015 Part II

FEDERAL LAW GAZETTE FOR THE REPUBLIC OF AUSTRIA. Year 2015 Issued on December 11, 2015 Part II 1 of 11 FEDERAL LAW GAZETTE FOR THE REPUBLIC OF AUSTRIA Year 2015 Issued on December 11, 2015 Part II 410th Regulation: Cash Register Security Regulation, [RKSV] 410th Regulation by the Federal Minister

More information

Using the RS232 serial evaluation boards on a USB port

Using the RS232 serial evaluation boards on a USB port Document information Info Content Keywords Serial evaluation Board, PN512,PN532, MFRC663, MFRC522, MFRC523, MFRC52x, MFRD522, MFRD523, MFRD52x MIFARE Contactless Smart Card Reader Reference Design, MIFARE

More information

Karsten Nohl University of Virginia. Henryk Plötz HU Berlin

Karsten Nohl University of Virginia. Henryk Plötz HU Berlin Karsten Nohl University of Virginia Henryk Plötz HU Berlin Radio Frequency IDentification Tiny computer chips Passively Powered Karsten Nohl, Henryk Plötz - RFID Security 2 Constant monitoring is already

More information

The Wireless LAN (Local Area Network) USB adapter can be operated in one of the two following networking configurations :

The Wireless LAN (Local Area Network) USB adapter can be operated in one of the two following networking configurations : SAGEM Wi-Fi 11g USB ADAPTER Quick Start Guide About this guide This Quick Start Guide describes how to install and operate your SAGEM Wi-Fi 11g USB ADAPTER. Please read this manual before you install the

More information

Guard All Security Symposium. Identity and Access Management

Guard All Security Symposium. Identity and Access Management Guard All Security Symposium Identity and Access Management The Complex Digital World Welcome to the Identiverse Segments / Brands Product Offerings Applications ID Management Solutions Governmental credentialing

More information

Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, 2006. Developed by: Smart Card Alliance Identity Council

Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, 2006. Developed by: Smart Card Alliance Identity Council Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions July, 2006 Developed by: Smart Card Alliance Identity Council Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked

More information

ABSTRACT List of tables List of figures List of abbreviations CHAPTER 1 INTRODUCTION 1.1 Background 1.2 Problem Statement 1.3 Objective 1.4 Scope 1.5 Thesis Organization Chapter 2 2.1 Automatic Identification

More information

MSR605. Programmer s Manual. Magnetic Stripe Card Reader/Writer (High & Low Coercivity) Revision B 2009-06-01

MSR605. Programmer s Manual. Magnetic Stripe Card Reader/Writer (High & Low Coercivity) Revision B 2009-06-01 MSR605 Magnetic Stripe Card Reader/Writer (High & Low Coercivity) Programmer s Manual Revision B 009-06-0 0 Table of Contents SECTION INTRODUCTION...... Accessories of MSR605...... Warranty...... SECTION

More information

MF3ICDx21_41_81. 1. General description. MIFARE DESFire EV1 contactless multi-application IC. Product short data sheet COMPANY PUBLIC

MF3ICDx21_41_81. 1. General description. MIFARE DESFire EV1 contactless multi-application IC. Product short data sheet COMPANY PUBLIC 145632 1. General description MIFARE DESFire EV1 (MF3ICD(H) 21/41/81), a Common Criteria (EAL4+) certified product, is ideal for service providers wanting to use secure multi-application smart cards in

More information

NXP Secure Smart Card Controllers P5CD016V1D / P5CD021V1D / P5CD041V1D / P5Cx081V1D with DESFire EV1

NXP Secure Smart Card Controllers P5CD016V1D / P5CD021V1D / P5CD041V1D / P5Cx081V1D with DESFire EV1 NXP Secure Smart Card Controllers P5CD016V1D / P5CD021V1D / P5CD041V1D / P5Cx081V1D with DESFire EV1 Rev. 1.1 24 October 2011 BSI-DSZ-CC-0707 Evaluation documentation Document information Info Keywords

More information

Mobile and Contactless Payment Security

Mobile and Contactless Payment Security Mobile and Contactless Payment Security v20111118 1/842 High Street East Kew 3102 Melbourne Australia Ph: +61 3 9846 2751 Fax: +61 3 9857 0350 Rambla de Catalunya 38, 8 planta 08007 Barcelona Spain Ph.

More information

Wireless LAN 802.11g USB Adapter

Wireless LAN 802.11g USB Adapter Wireless LAN 802.11g USB Adapter User s Guide Version 1.0 User s Guide 0 Copyright statement No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by

More information

1. Product Overview 2. Product Features 3. Comparison Chart 4. Product Applications 5. Order Information 6. Q & A

1. Product Overview 2. Product Features 3. Comparison Chart 4. Product Applications 5. Order Information 6. Q & A www.acs.com.hk 1. Product Overview 2. Product Features 3. Comparison Chart 4. Product Applications 5. Order Information 6. Q & A 2 3 ACOS5 Series (32KB EEPROM) Cryptographic Smart Card and Token Module

More information

NTAG213/215/216. The mechanical and electrical specifications of NTAG21x are tailored to meet the requirements of inlay and tag manufacturers.

NTAG213/215/216. The mechanical and electrical specifications of NTAG21x are tailored to meet the requirements of inlay and tag manufacturers. NFC Forum Type 2 Tag compliant IC with 144/504/888 bytes user memory 265332 1. General description NTAG213, NTAG215 and NTAG216 have been developed by NXP Semiconductors as standard NFC tag ICs to be used

More information

v. 2.4.1 v. 3.4.1 Alarm Notifications: [Y] Bounding boxes for analytics: [N]

v. 2.4.1 v. 3.4.1 Alarm Notifications: [Y] Bounding boxes for analytics: [N] VideoIQ Milestone Integration CCTV Systems AB, Nordic Agent for VideoIQ has together with VideoIQ and Milestone created this document. This document explains the different parts of software in Milestone

More information

Overview of Contactless Payment Cards. Peter Fillmore. July 20, 2015

Overview of Contactless Payment Cards. Peter Fillmore. July 20, 2015 Overview of Contactless Payment Cards Peter Fillmore July 20, 2015 Blackhat USA 2015 Introduction Contactless payments have exploded in popularity over the last 10 years with various schemes being popular

More information

Deltek Touch Time & Expense for GovCon. User Guide for Triumph

Deltek Touch Time & Expense for GovCon. User Guide for Triumph Deltek Touch Time & Expense for GovCon User Guide for Triumph November 25, 2014 While Deltek has attempted to verify that the information in this document is accurate and complete, some typographical or

More information

Spillemyndigheden s change management programme. Version 1.3.0 of 1 July 2012

Spillemyndigheden s change management programme. Version 1.3.0 of 1 July 2012 Version 1.3.0 of 1 July 2012 Contents 1 Introduction... 3 1.1 Authority... 3 1.2 Objective... 3 1.3 Target audience... 3 1.4 Version... 3 1.5 Enquiries... 3 2. Framework for managing system changes...

More information

The I2C Bus. NXP Semiconductors: UM10204 I2C-bus specification and user manual. 14.10.2010 HAW - Arduino 1

The I2C Bus. NXP Semiconductors: UM10204 I2C-bus specification and user manual. 14.10.2010 HAW - Arduino 1 The I2C Bus Introduction The I2C-bus is a de facto world standard that is now implemented in over 1000 different ICs manufactured by more than 50 companies. Additionally, the versatile I2C-bus is used

More information

Security & Chip Card ICs SLE 44R35S / Mifare

Security & Chip Card ICs SLE 44R35S / Mifare Security & Chip Card ICs SLE 44R35S / Mifare Intelligent 1 Kbyte EEPROM with Interface for Contactless Transmission, Security Logic and Anticollision according to the MIFARE -System Short Product Info

More information

NFC TagWriter by NXP

NFC TagWriter by NXP Rev. 1.6 27 April 2016 User manual Document information Info Content Keywords User manual Abstract This document describes the features of the TagWriter and steps to setup TagWriter application in smart

More information

SL2 ICS53/SL2 ICS54. 1. General description I CODE SLI-S/I CODE SLI-S HC. 1.1 Anticollision. 1.2 Contactless energy and data transfer

SL2 ICS53/SL2 ICS54. 1. General description I CODE SLI-S/I CODE SLI-S HC. 1.1 Anticollision. 1.2 Contactless energy and data transfer Rev. 3.0 14 March 2007 Product data sheet 113730 1. General description The IC is a dedicated chip for smart label applications with the need for a higher security level, larger memory and/or a product

More information

MBP_MSTR: Modbus Plus Master 12

MBP_MSTR: Modbus Plus Master 12 Unity Pro MBP_MSTR 33002527 07/2011 MBP_MSTR: Modbus Plus Master 12 Introduction This chapter describes the MBP_MSTR block. What s in this Chapter? This chapter contains the following topics: Topic Page

More information

Description of the Technical Component:

Description of the Technical Component: Confirmation concerning Products for Qualified Electronic Signatures according to 15 Sec. 7 S. 1, 17 Sec. 4 German Electronic Signature Act 1 and 11 Sec. 2 and 15 German Electronic Signature Ordinance

More information

SYMETRIX SOLUTIONS: TECH TIP August 2015

SYMETRIX SOLUTIONS: TECH TIP August 2015 String Output Modules The purpose of this document is to provide an understanding of operation and configuration of the two different String Output modules available within SymNet Composer. The two different

More information

Configuration Utility User Manual. pcprox Plus, pcprox Enroll & Wiegand Converter

Configuration Utility User Manual. pcprox Plus, pcprox Enroll & Wiegand Converter Configuration Utility User Manual pcprox Plus, pcprox Enroll & Wiegand Converter 99009010 Rev B2 2015 RF IDeas Configuration Utility User Manual P a g e 1 Thank You! Congratulations on the purchase of

More information

Tips on Encoding the Unique Item Identifier (UII) Mark and Building the Concatenated UII

Tips on Encoding the Unique Item Identifier (UII) Mark and Building the Concatenated UII Tips on Encoding the Unique Item Identifier (UII) Mark and Building the Concatenated UII BASIC DEFINITIONS YOU NEED TO KNOW The unique item identifier (UII) is defined in two separate contexts: 1. DoD

More information

Dell OpenManage Mobile Version 1.4 User s Guide (Android)

Dell OpenManage Mobile Version 1.4 User s Guide (Android) Dell OpenManage Mobile Version 1.4 User s Guide (Android) Notes, cautions, and warnings NOTE: A NOTE indicates important information that helps you make better use of your computer. CAUTION: A CAUTION

More information

Windows Server Update Services 3.0 SP2 Step By Step Guide

Windows Server Update Services 3.0 SP2 Step By Step Guide Windows Server Update Services 3.0 SP2 Step By Step Guide Microsoft Corporation Author: Anita Taylor Editor: Theresa Haynie Abstract This guide provides detailed instructions for installing Windows Server

More information

Parallax Serial LCD 2 rows x 16 characters Non-backlit (#27976) 2 rows x 16 characters Backlit (#27977) 4 rows x 20 characters Backlit (#27979)

Parallax Serial LCD 2 rows x 16 characters Non-backlit (#27976) 2 rows x 16 characters Backlit (#27977) 4 rows x 20 characters Backlit (#27979) 599 Menlo Drive, Suite 100 Rocklin, California 95765, USA Office: (916) 624-8333 Fax: (916) 624-8003 General: info@parallax.com Technical: support@parallax.com Web Site: www.parallax.com Educational: www.stampsinclass.com

More information

AN11269. Software Design Guide for POS Development Kit OM5597/RD2663. Rev. 1.0 5 August 2014 242510. Application note COMPANY PUBLIC

AN11269. Software Design Guide for POS Development Kit OM5597/RD2663. Rev. 1.0 5 August 2014 242510. Application note COMPANY PUBLIC Software Design Guide for POS Development Kit OM5597/RD2663 Document information Info Content Keywords RC663, TDA8026, LPC1768, Point of Sale Development Kit design, POS, guide, firmware documentation,

More information

Interface Certification for a FIN Interface

Interface Certification for a FIN Interface Title Page Interface Certification for a FIN Interface BOX Messaging Hub (formerly known as BOX For SWIFTNet) Conformance Statement Table of Contents Title Page... 1 1 General Information... 3 1.1 Supplier...

More information

AVR151: Setup and Use of the SPI. Introduction. Features. Atmel AVR 8-bit Microcontroller APPLICATION NOTE

AVR151: Setup and Use of the SPI. Introduction. Features. Atmel AVR 8-bit Microcontroller APPLICATION NOTE Atmel AVR 8-bit Microcontroller AVR151: Setup and Use of the SPI APPLICATION NOTE Introduction This application note describes how to set up and use the on-chip Serial Peripheral Interface (SPI) of the

More information

DICOM Conformance Statement Merge Eye Care PACS v. 4.0

DICOM Conformance Statement Merge Eye Care PACS v. 4.0 DICOM Conformance Statement Merge Eye Care PACS v. 4.0 Merge Healthcare 900 Walnut Ridge Drive Hartland, WI 53029 USA 877.44.MERGE 2012 Merge Healthcare. The information contained herein is confidential

More information

RFID based Bill Generation and Payment through Mobile

RFID based Bill Generation and Payment through Mobile RFID based Bill Generation and Payment through Mobile 1 Swati R.Zope, 2 Prof. Maruti Limkar 1 EXTC Department, Mumbai University Terna college of Engineering,India Abstract Emerging electronic commerce

More information

Getting Started with IntelleView POS Administrator Software

Getting Started with IntelleView POS Administrator Software Getting Started with IntelleView POS Administrator Software Administrator s Guide for Software Version 1.2 About this Guide This administrator s guide explains how to start using your IntelleView POS (IntelleView)

More information

Reverse engineering smart cards

Reverse engineering smart cards Reverse engineering smart cards Christian M. Amsüss linuxwochen@christian.amsuess.com http://christian.amsuess.com/ 2010-05-06 Overview objective understand smart card communication based on sniffable

More information

MDG. MULTOS Developer's Guide. MAO-DOC-TEC-005 v1.40. 2015 MAOSCO Limited. MULTOS is a registered trademark of MULTOS Limited.

MDG. MULTOS Developer's Guide. MAO-DOC-TEC-005 v1.40. 2015 MAOSCO Limited. MULTOS is a registered trademark of MULTOS Limited. MDG MULTOS Developer's Guide MAO-DOC-TEC-005 v1.40 2015 MAOSCO Limited. MULTOS is a registered trademark of MULTOS Limited. MULTOS Developer s Guide Copyright Copyright 1999 2015 MAOSCO Limited. This document

More information

Automatic Ration Material Distributions and Payment System Based on GSM and RFID Technology

Automatic Ration Material Distributions and Payment System Based on GSM and RFID Technology Automatic Ration Material Distributions and Payment System Based on GSM and RFID Technology R. Senthil Kumar [1] Assistant professor, Dept. of ECE Jay Shriram Group of Institutions, Tirupur prof.senthilramalingam@gmail.com

More information

Level 2 Development Training. Level 2 Development Training. Level 2 Development Training. Technical Overview

Level 2 Development Training. Level 2 Development Training. Level 2 Development Training. Technical Overview Level 2 Development Training Level 2 Development Training Level 2 Development Training Technical Overview Contents 1 Introduction... 3 Overview... 3 2 Glossary... 4 3 Network Technology... 5 Fundamentals...

More information

CHAPTER 5 SMART CARD TECHNOLOGY

CHAPTER 5 SMART CARD TECHNOLOGY 56 CHAPTER 5 SMART CARD TECHNOLOGY 5.1 INTRODUCTION Today's society is often illustrated as an information society. Technological developments, particularly in the areas of computers and telecommunications

More information

Fingerprint Identity User Manual for the Griaule Biometric Framework 040-0103-01 Rev 1.00

Fingerprint Identity User Manual for the Griaule Biometric Framework 040-0103-01 Rev 1.00 Fingerprint Identity User Manual for the Griaule Biometric Framework 040-0103-01 Rev 1.00 www.griaulebiometrics.com Brazil Phone: 55-19-3289-2108 USA Phone: (408) 490 3438 Fingerprint Identity Index Getting

More information

NFC Tag Type 5 Specification

NFC Tag Type 5 Specification Document Type: Software Technical Specification Reference: STS_NFC_0707-001 Version 1.8 (14516) Release Date: Nov. 18, 2011 File Name: STS_NFC_0707-001 NFC Tag Type 5 Specification.pdf Security Level:

More information

SIM CARD PROTOCOLS. This paper attempts in broad strokes to outline the construction of these protocols and how they are used.

SIM CARD PROTOCOLS. This paper attempts in broad strokes to outline the construction of these protocols and how they are used. SIM CARD PROTOCOLS Though rarely thought about by most users their mobile phone contains a remarkable computing device that enables them to go about their business of making calls, text messaging or playing

More information