Appendix B...31APDU Command and Response Flow for ISO 14443-Compliant Tags
Appendix C...32APDU Command and Response Flow for ISO 18092-Compliant Tags
.............................................................................................20Current LED State (1 Byte)
............................................................................................20Command Format (5 Bytes)
...........................................................................................20Response Format (10 bytes)
............................................................................................20Command Format (5 Bytes)
...............................................................................................21Response Format (1 byte)
............................................................................................21Command Format (5 Bytes)
...............................................................................................21Response Format (1 byte)
.............................................................21PICC Operating Parameter. Default Value = FF
...............................................................................................23ISO 7816-4 APDU Format
.............................................................23ISO 7816-4 Response Format (Data + 2 Bytes)
..........................................................................23Common ISO 7816-4 Response Codes
AET62 Reference Manual
Document Title Here
Document Title Here
Version 1.00
Document Title Here
Page 4 of 35
info@acs.com.hk
www.acs.com.hk
1.0. Introduction
The AET62 is a composite device, consisting ACS’ ACR122U NFC Reader’s core and UPEK’s swipe
fingerprint sensor. The NFC contactless smart card reader and the fingerprint sensor can be used
independently, but combining the two technologies provide a higher level of security in applications.
The AET62’s system diagram is shown below:
Figure 1: AET62 System Block Diagram
The purpose of this document is to describe the architecture and interface of AET62’s contactless
smart card reader module, which is based on the ACR122U core. For information on the architecture
and programming interface of the fingerprint module, please refer to the AET62 Fingerprint Reader
Application Programming Interface document (API_AET62_v1.0).
AET62 Reference Manual
Document Title Here
Document Title Here
Version 1.00
Document Title Here
Page 5 of 35
info@acs.com.hk
www.acs.com.hk
2.0. AET62 Contactless Smart Card Reader
The AET62 is a PC-linked contactless smart card reader/writer used for accessing ISO14443-4 Type
A and B, Mifare, ISO 18092 or NFC, and FeliCa tags. The AET62 Smart Card Reader is PCSCcompliant so it is compatible with existing PCSC applications. Furthermore, the standard Microsoft
CCID driver is used to simplify driver installation.
The AET62 serves as the mediating device between the personal computer and the contactless tag
via the USB interface. The reader carries out the command issued from the PC, whether the
command is used in order to communicate with a contactless tag or control the device peripherals (i.e.
bi-color LED).
The AET62 uses the PCSC APDUs for contactless tags following the PCSC Specification and makes
use of pseudo APDUs in sending commands for ISO 18092 tags and controlling the device
peripherals. This document will discuss how you can use the AET62 in your smart card system.
2.1. USB Interface
The AET62 is connected to a computer through USB as specified in the USB Specification 1.1. The
AET62 is working in Full speed mode, i.e. 12 Mbps.
Pin Signal Function
1 V
2 D3 D+
4 GND
BUS
+5V power supply for the reader (Max 200 mA, Normal 100 mA)
Differential signal transmits data between AET62 and PC.
Differential signal transmits data between AET62 and PC.
Reference voltage level for power supply
Table 1: USB Interface
AET62 Reference Manual
Document Title Here
Document Title Here
Version 1.00
Document Title Here
Page 6 of 35
info@acs.com.hk
www.acs.com.hk
3.0. Implementation
3.1. Communication Flow Chart of AET62
The Standard Microsoft CCID and PCSC drivers are used. Therefore, no ACS drivers are required
because the drivers are already built inside the windows operating system. You need to modify your
computer’s registry settings to be able to use the full capabilities of the AET62 NFC Reader. See
AET62 PCSC Escape
Command for more details.
3.2. Smart Card Reader Interface Overview
Just click the “Device Manager” to find out the “AET62 PICC Interface”. The standard Microsoft USB
CCID Driver is used.
AET62 Reference Manual
Document Title Here
Document Title Here
Version 1.00
Figure 2: Communication Flow Chart of AET62
Document Title Here
Page 7 of 35
info@acs.com.hk
www.acs.com.hk
4.0. PICC Interface Description
4.1. ATR Generation
If the reader detects a PICC, an ATR will be sent to the PCSC driver to identify the PICC.
This ATR has 6 bytes of ATS which is: [06 75 77 81 02 80]
Note: Use the APDU “FF CA 01 00 00” to distinguish the ISO14443A-4 and ISO14443B-4
PICCs, and retrieve the full ATS if available. The ATS is returned for ISO14443A-3 or
ISO14443B-3/4 PICCs.
Another example would be the ATR for ST19XRC8E which is:
ST19XRC8E (ATR) = 3B 8C 80 01 50 12 23 45 56 12 53 54 4E 33 81 C3 55
Since this card follows ISO 14443 Type B, the response would be ATQB which is 50 12 23 45 56 12
53 54 4E 33 81 C3 is12 bytes long with no CRC-B
Note: You can refer to the ISO7816, ISO14443 and PCSC standards for more details.
Page 9 of 35
AET62 Reference Manual
Document Title Here
Document Title Here
Version 1.00
Document Title Here
info@acs.com.hk
www.acs.com.hk
5.0. PICC Commands for General Purposes
5.1. Get Data
The “Get Data command” will return the serial number or ATS of the “connected PICC”.
Command Class INS P1 P2 Le
Get Data FF CA
Table 4: Get UID APDU Format (5 Bytes)
Response Data Out
Result UID
(LSB)
Table 5: Get UID Response Format (UID + 2 Bytes) if P1 = 0x00
Response Data Out
Result ATS SW1 SW2
00
01
00
UID
(MSB)
(Full Length)
SW1SW2
00
Table 6: Get ATS of a ISO 14443 A card (ATS + 2 Bytes) if P1 = 0x01
Results SW1 SW2 Meaning
Success 90 00
Error 63 00
Error 6A 81
Example:
1. To get the serial number of the “connected PICC”
UINT8 GET_UID[5]={0xFF, 0xCA, 0x00, 0x00, 0x04};
2. To get the ATS of the “connected ISO 14443 A PICC”
UINT8 GET_ATS[5]={0xFF, 0xCA, 0x01, 0x00, 0x04};
The operation is completed successfully.
The operation is failed.
Function not supported.
Table 7: Response Codes
AET62 Reference Manual
Document Title Here
Document Title Here
Version 1.00
Document Title Here
Page 10 of 35
info@acs.com.hk
www.acs.com.hk
6.0. PICC Commands (T=CL Emulation) for Mifare Classic
Memory Cards
6.1. Load Authentication Keys
The “Load Authentication Keys command” will load the authentication keys into the reader. The
authentication keys are used to authenticate the particular sector of the Mifare 1K/4K Memory Card.
Two kinds of authentication key locations are provided, volatile and non-volatile key locations
respectively.
Command Class INSP1 P2 Lc Data In
Load
Authentication
Keys
Table 8: Load Authentication Keys APDU Format (11 Bytes)
Key Structure (1 Byte):
0x00 = Key is loaded into the reader volatile memory.
Other = Reserved.
Key Number (1 Byte):
0x00 ~ 0x01 = Key Location. The keys will disappear once the reader is disconnected from the
PC.
Key (6 Bytes):
The key value loaded into the reader. E.g. {FF FF FF FF FF FF}
Table 9: Load Authentication Keys Response Format (2 Bytes)
Results SW1 SW2Meaning
Success 90 00
Error 63 00
Table 10: Load Authentication Keys Response Codes
Example:
Load a key {FF FF FF FF FF FF} into the key location 0x00.
APDU = {FF 82 00 00 06 FF FF FF FF FF FF}
FF 82
Response Data Out
Result SW1 SW2
The operation is completed successfully.
The operation is failed.
Key
Structure
Key
Number
06
Key
(6
bytes)
AET62 Reference Manual
Document Title Here
Document Title Here
Version 1.00
Document Title Here
Page 11 of 35
info@acs.com.hk
www.acs.com.hk
Loading...
+ 25 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.