ASSALOY Identification Technologies RDHS 0404D1 0X User Manual

ACGPass e-ID Desktop Reader
Document No.: 1510-USM-01-0-01
Firmware: Version Dual ISO 2.3
User Manual
Document Nr.: QSI-040902-OM-1-a-UserManual Dual ISO Module, V2.0
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
Edition One - October 2006
ASSA ABLOY Identification Technologies GmbH (ASSA ABLOY ITG) reserves the right to make changes to its products or services or to discontinue any product or service at any time without notice. ASSA ABLOY ITG provides customer assistance in various technical areas, but does not have full access to data concerning the use and applications of customer's products.
Therefore, ASSA ABLOY ITG assumes no liability and is not responsible for customer applications or product or software design or performance relating to systems or applications incorporating ASSA ABLOY ITG products. In addition, ASSA ABLOY ITG assumes no liability and is not responsible for infringement of patents and/or any other intellectual or industrial property rights of third parties, which may result from assistance provided by ASSA ABLOY ITG.
ASSA ABLOY ITG products are not designed, intended, authorized or warranted to be suitable for life support applications or any other life critical applications that could involve potential risk of death, personal injury or severe property or environmental damage.
With the edition of this document, all previous editions become void. Indications made in this manual may be changed without previous notice.
Composition of the information in this manual has been done to the best of our knowledge. ASSA ABLOY ITG does not guarantee the correctness and completeness of the details given in this manual and may not be held liable for damages ensuing from incorrect or incomplete information. Since, despite all our efforts, errors may not be completely avoided, we are always grateful for your useful tips.
The installation instructions given in this manual are based on advantageous boundary conditions. ASSA ABLOY ITG does not give any guarantee promise for perfect function in cross environments.
The ACG logo is a registered trademark of ASSA ABLOY Identification Technologies GmbH.
Copyright © 2006 ASSA ABLOY Identification Technologies GmbH (ASSA ABLOY ITG)
Microsoft®, Microsoft Windows 98SE®, Microsoft Windows ME®, Microsoft Windows NT®, Microsoft Windows 2000® and Microsoft Windows XP® are registered trademarks of the Microsoft Corporation USA.
Pentium® is a registered trademark of the Intel Corporation USA
mifare® is a registered trademark of NXP Semiconductor N.V.
ASSA ABLOY Identification Technologies GmbH 1
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 All other products mentioned in this document might be brands or brand names of
the different suppliers. This document may be downloaded onto a computer, stored and duplicated as nec-
essary to support the use of the related ASSA ABLOY ITG products. Any other type of duplication, circulation or storage on data carriers in any manner not authorized by ASSA ABLOY ITG represents a violation of the applicable copyright laws and shall be prosecuted.
ASSA ABLOY Identification Technologies GmbH 2
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3

Safety Instructions / Warning - Read before start-up!

The device may only be used for the intended purpose designed by for the manufacturer. The operation manual should be conveniently kept available at all times for each user.
Unauthorized changes and the use of spare parts and additional devices that have not been sold or recommended by the manufacturer may cause fire, electric shocks or injuries. Such unauthorized measures shall exclude any liability by the manufacturer.
The liability-prescriptions of the manufacturer in the issue valid at the time of purchase are valid for the device. The manufacturer shall not be held legally responsible for inaccuracies, errors, or omissions in the manual or automatically set parameters for a device or for an incorrect application of a device.
Repairs may be executed by the manufacturer only.
Only qualified personnel should carry out installation, operation, and
maintenance procedures.
Use of the device and its installation must be in accordance with national legal requirements and local electrical codes.
When working on devices the valid safety regulations must be observed.
ASSA ABLOY Identification Technologies GmbH 3
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3

Preface

Read This First

About This Guide

This manual describes the ACGPass e-ID Desktop Reader. Its goal is to describe the reader, how it works, how to integrate it and how to use it.

If You Need Assistance

Our application center is located in Europe to provide direct support. For more information, please contact your nearest ASSA ABLOY ITG Sales Center. The contact addresses can be found on our home page:
http://www.aaitg.com/
ASSA ABLOY Identification Technologies GmbH 4
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
Table of contents
1 Scope ..............................................................................................12
2 Extended Documentation..............................................................12
3 Definitions and Abbreviations ......................................................13
3.1 Definitions .................................................................................................. 13
3.1.1 Anti-collision loop.................................................................................13
3.1.2 Hex notation.........................................................................................13
3.1.3 ASCII notation......................................................................................13
3.2 Abbreviations.............................................................................................. 14
4 Supported tags...............................................................................16
5 The mifare® Transponder Family..................................................17
5.1 mifare® Standard........................................................................................ 17
5.1.1 Sector 0 / Block 0.................................................................................17
5.1.2 Blocks 3, 7, 11, 15, …..........................................................................18
5.2 State Diagram ............................................................................................ 19
5.3 mifare® Ultralight ........................................................................................ 20
5.4 mifare® 4k................................................................................................... 20
5.5 mifare® ProX............................................................................................... 20
5.6 mifare® DESFire......................................................................................... 21
5.6.1 Memory organization............................................................................21
5.6.2 State diagram of mifare® DESFire........................................................22
5.6.2.1 Activate PICC............................................................................... 23
5.6.2.2 Select application......................................................................... 23
5.6.2.3 Login to application...................................................................... 23
5.6.2.4 Select file ..................................................................................... 23
5.6.2.5 Change file................................................................................... 23
5.6.2.6 Commit / Abort transaction........................................................... 23
6 ISO 14443 Type B...........................................................................24
6.1 SR176........................................................................................................ 24
6.1.1 Memory organization............................................................................24
6.1.2 Serial number UID................................................................................24
6.1.3 Lock byte..............................................................................................25
6.1.4 Chip ID.................................................................................................25
6.2 SRIX4K ...................................................................................................... 25
6.2.1 Memory organization............................................................................25
6.2.2 Lock block............................................................................................25
7 Hardware.........................................................................................26
7.1 Mechanical dimensions.............................................................................. 27
7.1.1 Features...............................................................................................28
ASSA ABLOY Identification Technologies GmbH 5
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
7.1.2 External Connections...........................................................................29
7.1.2.1 USB Cable................................................................................... 29
7.1.2.2 Power Supply............................................................................... 29
7.1.2.3 SAM Socket................................................................................. 30
7.1.3 Function Control Indicator LEDs ..........................................................31
7.1.3.1 Power LED................................................................................... 32
7.1.3.2 RFID activity indicator LED.......................................................... 32
7.1.3.3 USB Online indicator LED............................................................ 32
7.1.3.4 Contact Interface activity indicator LED ....................................... 33
8 Software for contactless interface functions ..............................34
8.1 ASCII Protocol............................................................................................ 34
8.2 Binary Protocol........................................................................................... 34
8.2.1 STX......................................................................................................35
8.2.2 Station ID .............................................................................................35
8.2.3 Length..................................................................................................35
8.2.4 Flags....................................................................................................35
8.2.5 Data .....................................................................................................35
8.2.6 Block Check Character (BCC)..............................................................36
8.2.7 ETX......................................................................................................36
8.2.8 Remarks...............................................................................................36
8.2.9 Examples: ............................................................................................36
8.3 Register Set ............................................................................................... 37
8.3.1 EEPROM memory organization...........................................................38
8.3.2 Unique device ID (00h – 04h)...............................................................39
8.3.3 Station ID (0Ah)....................................................................................39
8.3.4 Protocol configuration (0Bh) .................................................................39
8.3.4.1 Auto start (default 1) .................................................................... 39
8.3.4.2 Protocol (default 0)....................................................................... 39
8.3.4.3 Multitag (default 0)....................................................................... 39
8.3.4.4 New serial mode (default 0)......................................................... 39
8.3.4.5 LED (default 0)............................................................................. 40
8.3.4.6 Single shot (default 0).................................................................. 40
8.3.4.7 Extended Protocol (default 1)....................................................... 40
8.3.4.8 Extend ID (default 0).................................................................... 41
8.3.5 BAUD, Baud rate control register (0Ch)...............................................42
8.3.6 Command Guard Time (0Dh)...............................................................43
8.3.7 OPMODE, operating mode register (0Eh)............................................43
8.3.8 Single Shot Time-out (0Fh)..................................................................44
8.3.9 Protocol configuration 2 (13h)..............................................................44
8.3.9.1 Disable multi-tag reset (default 0)................................................ 44
8.3.9.2 Disable start-up message (default 0)........................................... 44
8.3.9.3 Enable binary frame v2 (default 0)............................................... 44
ASSA ABLOY Identification Technologies GmbH 6
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
8.3.9.4 Noisy Environment (default 0)...................................................... 44
8.3.9.5 Reset Recovery Time Multiplier (default 0).................................. 45
8.3.9.6 Enable ISO14443 B Anti-collision (default 0)............................... 45
8.3.9.7 Disable ISO 14443-4 Error Handling (default 0)........................... 45
8.3.10 Reset Off Time (14h)............................................................................45
8.3.11 Reset Recovery Time (15h) .................................................................45
8.3.12 Application Family Identifier (16h)........................................................45
8.3.13 Selection Time-out ISO 14443A (17h) .................................................46
8.3.14 Selection Time-out ISO 14443B (18h) .................................................46
8.3.15 Selection Time-out SR176 (19h)..........................................................46
8.3.16 Protocol configuration 3 (1Bh)..............................................................46
8.3.16.1 Disable automatic ISO 14443-4 timeouts (default 0).................... 46
8.3.16.2 Page read (default 0) ................................................................... 47
8.3.16.3 ReqA Extended ID (default 0)...................................................... 47
8.3.17 User data (80h - EFh) ..........................................................................47
8.4 Instruction Set ............................................................................................ 48
8.4.1 Overview..............................................................................................48
8.4.2 Error Codes..........................................................................................51
8.4.3 Common commands............................................................................52
8.4.3.1 Test Continuous Read ................................................................. 52
8.4.3.2 Continuous Read......................................................................... 52
8.4.3.2.1 Multitag continuous read mode................................................. 53
8.4.3.2.2 Auto start.................................................................................. 53
8.4.3.2.3 Noisy Environment.................................................................... 53
8.4.3.2.4 Binary mode.............................................................................. 53
8.4.3.2.5 Simple access control applications........................................... 53
8.4.3.3 Set LED........................................................................................ 54
8.4.3.4 DES encryption / decryption of data............................................. 55
8.4.3.5 Get ID........................................................................................... 56
8.4.3.5.1 Binary Protocol Version 2......................................................... 57
8.4.3.5.2 High speed select..................................................................... 57
8.4.3.5.3 Answer from 0xh and 1xh......................................................... 59
8.4.3.5.4 Answer from 2xh and 3xh......................................................... 59
8.4.3.5.5 Select a single tag .................................................................... 59
8.4.3.5.6 Extended ID.............................................................................. 59
8.4.3.5.7 Multiple tags.............................................................................. 60
8.4.3.5.8 RATS Guard Time SFGT.......................................................... 60
8.4.3.6 Multi-Tag Selection / List.............................................................. 60
8.4.3.6.1 Multi-tag list............................................................................... 60
8.4.3.6.2 Reading distance...................................................................... 61
8.4.3.6.3 Multi-tag select.......................................................................... 61
8.4.3.6.4 Multi-tag reset........................................................................... 61
ASSA ABLOY Identification Technologies GmbH 7
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
8.4.3.6.5 Maximum number of tags......................................................... 61
8.4.3.7 Include tag type............................................................................ 62
8.4.3.8 Exclude tag type .......................................................................... 63
8.4.3.9 Set tag type.................................................................................. 64
8.4.3.10 Set Configuration Flags................................................................ 65
8.4.3.10.1 Out of range failure 'R'............................................................ 66
8.4.3.11 Set Configuration Register........................................................... 67
8.4.3.11.1 Out of range failure 'R'............................................................ 68
8.4.3.12 Antenna power on/off................................................................... 69
8.4.3.12.1 Power off................................................................................. 69
8.4.3.12.2 Power on................................................................................. 69
8.4.3.13 Read/Write user port.................................................................... 70
8.4.3.13.1 Read port................................................................................ 70
8.4.3.13.2 Write port................................................................................ 71
8.4.3.14 Quiet ............................................................................................ 72
8.4.3.14.1 ISO 14443 Type A.................................................................. 72
8.4.3.14.2 ISO 14443 Type B.................................................................. 73
8.4.3.14.3 SR176..................................................................................... 73
8.4.3.15 Read block................................................................................... 73
8.4.3.15.1 Read failure 'F'........................................................................ 73
8.4.3.15.2 No tag in field 'N'..................................................................... 74
8.4.3.15.3 Operation mode failure 'O'...................................................... 74
8.4.3.15.4 Out of range failure 'R'............................................................ 74
8.4.3.16 Read reader EEPROM ................................................................ 74
8.4.3.16.1 Out of range failure 'R'............................................................ 74
8.4.3.17 Select........................................................................................... 75
8.4.3.17.1 Select a single tag .................................................................. 75
8.4.3.17.2 Extended ID............................................................................ 75
8.4.3.17.3 Multiple tags............................................................................ 75
8.4.3.18 Get Version.................................................................................. 76
8.4.3.19 Write DESFire key ....................................................................... 77
8.4.3.19.1 Out of range failure 'R'............................................................ 77
8.4.3.19.2 Writing DESFire Keys............................................................. 77
8.4.3.19.3 Using DESFire keys for authentication................................... 77
8.4.3.20 Write master key.......................................................................... 78
8.4.3.20.1 Out of range failure 'R'............................................................ 78
8.4.3.20.2 Writing master keys................................................................ 78
8.4.3.20.3 Using master keys for authentication...................................... 78
8.4.3.21 Write block................................................................................... 79
8.4.3.21.1 Write failure 'F'........................................................................ 79
8.4.3.21.2 No tag error 'N'........................................................................ 79
8.4.3.21.3 Operation mode failure 'O'...................................................... 79
ASSA ABLOY Identification Technologies GmbH 8
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
8.4.3.21.4 Out of range failure 'R'............................................................ 80
8.4.3.22 Write EEPROM............................................................................ 80
8.4.3.22.1 Out of range failure 'R'............................................................ 80
8.4.3.23 Reset............................................................................................ 81
8.4.3.23.1 Disable Start-up Message....................................................... 81
8.4.3.23.2 Reset Timing........................................................................... 81
8.4.3.24 Field Reset................................................................................... 82
8.4.4 ISO 14443 Type A only commands......................................................83
8.4.4.1 Increment value block (credit)...................................................... 83
8.4.4.1.1 No value block 'I'....................................................................... 83
8.4.4.1.2 Increment failure 'F'................................................................... 83
8.4.4.1.3 No tag error 'N'.......................................................................... 84
8.4.4.1.4 Operation mode failure 'O'........................................................ 84
8.4.4.2 Decrement value block (debit) ..................................................... 84
8.4.4.2.1 No value block 'I'....................................................................... 84
8.4.4.2.2 Decrement failure 'F'................................................................. 85
8.4.4.2.3 No tag error 'N'.......................................................................... 85
8.4.4.2.4 Operation mode failure 'O'........................................................ 85
8.4.4.3 Copy value block (backup)........................................................... 85
8.4.4.3.1 Target block.............................................................................. 86
8.4.4.3.2 No value block 'I'....................................................................... 86
8.4.4.3.3 Copy failure 'F'.......................................................................... 86
8.4.4.3.4 No tag error 'N'.......................................................................... 86
8.4.4.3.5 Operation mode failure 'O'........................................................ 86
8.4.4.4 Login (authenticate tag) ............................................................... 87
8.4.4.4.1 No tag error 'N'.......................................................................... 88
8.4.4.4.2 Operation mode failure 'O'........................................................ 88
8.4.4.4.3 Out of range failure 'R'.............................................................. 88
8.4.4.4.4 <CR>........................................................................................ 89
8.4.4.4.5 Login with key data from EEPROM .......................................... 89
8.4.4.4.6 Usage of key A, key B............................................................... 89
8.4.4.5 Read value block ......................................................................... 90
8.4.4.5.1 No value block 'I'....................................................................... 90
8.4.4.5.2 No tag error 'N'.......................................................................... 90
8.4.4.5.3 General failure 'F'...................................................................... 90
8.4.4.5.4 Operation mode failure 'O'........................................................ 90
8.4.4.6 Write value block.......................................................................... 91
8.4.4.6.1 Invalid value 'I' .......................................................................... 91
8.4.4.6.2 Write failure 'F'.......................................................................... 91
8.4.4.6.3 No tag error 'N'.......................................................................... 91
8.4.4.6.4 Operation mode failure 'O'........................................................ 92
8.4.4.6.5 Writing values........................................................................... 92
ASSA ABLOY Identification Technologies GmbH 9
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
8.4.5 SR176 only commands........................................................................93
8.4.5.1 Lock block.................................................................................... 93
8.4.5.1.1 Operation mode failure 'O'........................................................ 93
8.4.5.1.2 Apply settings ........................................................................... 93
8.4.6 DESFire command set.........................................................................94
8.4.6.1 Authenticate................................................................................. 95
8.4.6.2 Change Key Settings ................................................................... 96
8.4.6.3 Get Key Settings.......................................................................... 97
8.4.6.4 Change Key................................................................................. 98
8.4.6.5 Get Key Version........................................................................... 99
8.4.6.6 Create Application.......................................................................100
8.4.6.7 Delete Application.......................................................................101
8.4.6.8 Get Application IDs .....................................................................102
8.4.6.9 Select Application .......................................................................103
8.4.6.10 Format PICC...............................................................................104
8.4.6.11 Get Version.................................................................................105
8.4.6.12 Get File IDs.................................................................................106
8.4.6.13 Get File Settings .........................................................................107
8.4.6.14 Select File...................................................................................108
8.4.6.15 Change File Settings...................................................................109
8.4.6.16 Create Standard Data File ..........................................................110
8.4.6.17 Create Backup Data File.............................................................111
8.4.6.18 Create Value File ........................................................................112
8.4.6.19 Create Linear Record File...........................................................113
8.4.6.20 Create Cyclic Record File ...........................................................114
8.4.6.21 Delete File...................................................................................115
8.4.6.22 Read Data / Records ..................................................................116
8.4.6.22.1 Our of range 'R'......................................................................116
8.4.6.23 Data files.....................................................................................117
8.4.6.24 Record file...................................................................................117
8.4.6.25 Write Data / Record ....................................................................118
8.4.6.25.1 Our of range 'R'......................................................................119
8.4.6.26 Get Value....................................................................................119
8.4.6.27 Credit ..........................................................................................120
8.4.6.28 Debit ...........................................................................................121
8.4.6.29 Limited Credit..............................................................................122
8.4.6.30 Clear Record File........................................................................123
8.4.6.31 Commit Transaction....................................................................124
8.4.6.32 Abort Transaction........................................................................125
9 Software for contact interface functions ...................................126
10 Frequently Asked Questions ...................................................127
10.1 Getting Started..........................................................................................127
ASSA ABLOY Identification Technologies GmbH 10
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
10.2 Personalized ACGPass e-ID Desktop Reader ..........................................127
10.3 What type of mifare® card should I use?...................................................128
10.4 How safe is mifare® Standard for cashless payment?...............................128
10.5 Using a mifare® card .................................................................................130
10.6 Using a DESFire card................................................................................131
10.6.1 Create a plain standard data file ........................................................131
10.6.2 Use a plain standard data file .............................................................131
10.6.3 Create a value file..............................................................................132
10.6.4 Use a DES secured value file.............................................................133
11 References.................................................................................134
12 Appendix A: SAM......................................................................135
13 Appendix C: Timings ................................................................136
14 Appendix D: Release Notes .....................................................138
14.1 Version History..........................................................................................138
14.1.1 Dual 2.0..............................................................................................138
14.1.2 Dual 2.1..............................................................................................138
14.1.3 Dual 2.2..............................................................................................138
14.1.4 Dual 2.3..............................................................................................139
14.2 Revision history.........................................................................................139
15 Appendix F: Approvals / Certificates ......................................140
15.1 CE Declaration..........................................................................................140
15.2 FCC Declaration........................................................................................141
15.3 RoHS Compliance.....................................................................................142
ASSA ABLOY Identification Technologies GmbH 11
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3

1 Scope

The ACGPass e-ID Desktop Reader supports a broad range of tags compliant with ISO 14443 type A and B standards, including SR176 tags and tags which belong to the Philips mifare® family. An open command structure allows the device to communicate with tags that use an operating system. The read/write unit supports automatic chaining, 256 byte buffer and frame length, extended time framing and up to 848kBaud transmission rates over the air interface.
Additionally this unit implements a DES cipher which enables to use mifare® DESFire tags. These tags are designed for use in high security algorithms.
An internal SAM socket is also available.
Major applications are:
e-Passport
e-National ID Cards
e-Drivers Licenses
e-Government
e-Health Cards
e-Document Authentication
e-Document Issuing

2 Extended Documentation

Please note that all confidential material is excluded from this documentation in order to comply with NDA requirements of our suppliers as well as prevention from unauthorized copies of the reader modules for increasing the security in the applications.
You can obtain the extended documentation containing the confidential information after signing a NDA.
ASSA ABLOY Identification Technologies GmbH 12
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3

3 Definitions and Abbreviations

3.1 Definitions

3.1.1 Anti-collision loop

An algorithm used to identify and handle a dialogue between a reader and one or more tags in its antenna field.

3.1.2 Hex notation

A hexadecimal value is marked with the suffix ‘h’, i.e. A1h has the value A1 hexadecimal.

3.1.3 ASCII notation

ASCII characters are listed within apostrophes, i.e. ‘x’ means a single x.
ASSA ABLOY Identification Technologies GmbH 13
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3

3.2 Abbreviations

Abbreviation Description
AID Application ID ASCII American Standard Code for Information Interchange ATR Answer to Reset ATS Answer to Select Block For the mifare® Standard one block contains 16 bytes CID Card Identifier (logical card address, ISO 14443-4) CRC Cyclic Redundancy Check DES Data Encryption Standard, for more details about DES
refer to [3]. EDC Error Detection Code EOF End of Frame Hex / xxh Value in Hexadecimal notation I-block Information block LSB Least Significant Bit or Byte MSB Most Significant Bit or Byte NAD Node Address (ISO 14443-4) OSI Open System Interconnection OTP One time programmable PCB Protocol Control Byte (ISO 14443-4) PCON Protocol Configuration byte of the reader PPS Protocol and Parameter Selection RATS Request for Answer to Select R-block Receive ready block REQA Request ISO Type A REQB Request ISO Type B RFU Reserved for Future Use S-block Supervisory block Sector For the mifare® Standard one sector contains 4 blocks SID Station ID SFGT Guard time after RATS SN Serial Number of a tag (a 32 bit number) SOF Start of frame
ASSA ABLOY Identification Technologies GmbH 14
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
Abbreviation Description
TDES Triple DES Value block 32 bit data block format. Used in ticketing application <CR> Carriage return (0Dh) <LF> Line feed (0Ah)
Figure 3-1: Abbreviations
ASSA ABLOY Identification Technologies GmbH 15
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3

4 Supported tags

Comments
Transfer
command
Write
block
Read
block
Serial
number
Encryption included
Encryption not included
Encryption not included
Extended setup needed
Works only with ‘t’ command
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Philips
Philips
Philips
Philips
Philips
Philips
Infineon
Infineon
Innovision
STM
Infineon
STM
ASK
ASK
Sharp
Toshiba
Various
Various
Manufacturer
4k
®
Standard
®
ISO 14443 A
mifare
®
Ultralight
®
mifare
mifare
ProX
DESFire
®
mifare
SLE 55R04/ 08
SLE66CLX320P
mifare
Smart MX
Jewel Tag
ISO 14443 B
SLE6666CL160S
SR176
SLIX 4K
Sharp B
ASK GTML
ASK GTML2 ISO
Dual Interface
TOSMART P032/064
)
1
(
compliant()
ISO 14443 B
ISO 14443 A compliant
Figure 4-1: Supported labels
1
Performance varies
ASSA ABLOY Identification Technologies GmbH 16
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3

5 The mifare® Transponder Family

The mifare® transponder family consists of various 13.56 MHz transponder ICs, all compliant to the ISO 14443 standard.

5.1 mifare® Standard

The mifare® Standard card consists of 16 sectors. A sector includes four blocks of 16 bytes each.
mifare® Standard Sector 2 Sector 0 (Block: 0...3) Block 8: Data or value (16 bytes) Sector 1 (Block: 4...7) Block 9: Data or value (16 bytes) Sector 2 (Block 8...11) Block 10: Data or value (16 bytes) ... Sector 15 (Block 60...63)
Figure 5-1: mifare® Standard: sector diagram
Block 11: Access Conditions (4 bytes), Key A, Key B (16 bytes)

5.1.1 Sector 0 / Block 0

Block 0 is read only.
Serial Number (4 bytes) Check byte (1 byte) Manufacturer data (11 bytes)
Figure 5-2: mifare® Standard: sector 0 / block 0
ASSA ABLOY Identification Technologies GmbH 17
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3

5.1.2 Blocks 3, 7, 11, 15, …

Transport keys are set on delivery:
Key A (6 bytes) Access Conditions (4 bytes) Key B (6 bytes)
Figure 5-3: mifare® Standard: block 3, 7, 11, 15, …
Key A A0 A1 A2 A3 A4 A5 (Infineon) or FF FF FF FF FF FF (new Philips cards)
Key B
B0 B1 B2 B3 B4 B5 (Infineon) or FF FF FF FF FF FF (new Philips cards)
Access Conditions
FF 07 80 xx (key A is used to read or write; key A itself is not readable; key B is data only). For further information refer to the mifare® card manual.
Remarks Enabled keys are always read as 00 00 00 00 00 00 Using key B as a data area will cause a security gap, due to the fact that it is
necessary to rewrite key A and the access conditions at each write process. It is not recommended to use key B as a data storage area.
ASSA ABLOY Identification Technologies GmbH 18
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3

5.2 State Diagram

All mifare® cards use the following state diagram.
Power Off
Reset
Reader Instruction Set
read/write/...
Idle
Ready
Active
Log In Select
Authenticated
REQA
Wake Up
Select
Anticollision Loop
Authenticate
ISO 14443 Com m ands
Halt
Halt
Tag interfacing comm ands
Figure 5-4: State diagram
ASSA ABLOY Identification Technologies GmbH 19
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3

5.3 mifare® Ultralight

mifare® Ultralight cards have no encryption included. They only support plain text data transmission.
mifare® Ultralight only supports 4 bytes per sector, but the command set uses 16 bytes per sector. Only the 4 least significant bytes are valid when using mifare® Ultralight.
Ensure that the other bytes match with the tag content when using the write command; otherwise the read back will fail.

5.4 mifare® 4k

mifare® 4k cards have an increased memory. Beginning from sector 32 (20h), sectors have 16 blocks. Due to compatibility reasons, the sector indices have changed according to the following table. The login sector has to be used to access the corresponding sector on the card.
Sector Block Login sector
00h 00h – 03h 00h 01h 04h – 07h 01h
… … …
1Fh 7Ch – 7Fh 1Fh 20h 80h – 8Fh 20h
21h 90h – 9Fh 24h 22h A0h – AFh 28h 23h B0h – BFh 2Ch 24h C0h – CFh 30h 25h D0h – DFh 34h 26h E0h – EFh 38h 27h F0h – FFh 3Ch
Figure 5-5: mifare® 4k sector index table

5.5 mifare® ProX

mifare® ProX tags have an operating system onboard. Data organization depends on the operating system installed on the card. These cards can include additional functionalities such as DES or a proprietary encipher algorithm.
Before accessing the operating system, the card must be selected. Customized commands are issued using the transfer command.
ASSA ABLOY Identification Technologies GmbH 20
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3

5.6 mifare® DESFire

This tag supports additional security algorithms (DES, Triple-DES, MAC) for security sensitive applications.
DESFire tags are addressed using a specific command set (see DESFire command set).

5.6.1 Memory organization

The memory of a DESFire card can be personalized to specific requirements. The card can be seen as data storage device like a hard disk in a PC. The memory is divided into a maximum of 28 different applications (directories) with 16 files each. An application has up to 14 keys. Depending on keys and access conditions a file can be accessed in four different ways. Plain data is never secured. Data is secured using a MAC, single DES or triple DES enciphers.
The following figure describes the memory organization of a DESFire card.
DESFire card (Application 0)
Application 1
File
ID 1
File
ID 2
...
File
ID n
Application 2
File
ID 1
File
ID 2
...
File
ID n
...
Application n
File
ID 1
Figure 5-6: DESFire memory organization
ASSA ABLOY Identification Technologies GmbH 21
File
ID 2
...
File
ID n
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3

5.6.2 State diagram of mifare® DESFire

Activate DESFire card
Select Application
Login to Application
Se le c t F ile with ID
Change File
Comm it / Abort Transaction
®
Figure 5-7: mifare
DESFire state diagram
ASSA ABLOY Identification Technologies GmbH 22
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
5.6.2.1 Activate PICC
Before accessing a DESFire card, the card must be selected. A mifare® DESFire card has a 7 byte UID. After activation, the card is powered up and ready to accept a mifare® DESFire command. Application 0 is selected automatically.
5.6.2.2 Select application
To jump into another application, the application has to be selected. An application can be seen as a directory, which contains up to 16 files. The size of the application depends on the stored files.
5.6.2.3 Login to application
Specific access rights can be set for each application. Login to an application allows to change the organization of the application. Login to a file opens a secured file for access. A file can be accessed in four different ways: without any security or secured with MAC, single DES or triple DES.
5.6.2.4 Select file
Before accessing a file, the file must be selected
5.6.2.5 Change file
A selected file can be changed according its access rights. If a file is secured, a login is required before changes can be made.
5.6.2.6 Commit / Abort transaction
Value files, backup files, linear record files and cyclic record files only adapt their values after the commit transaction command is given. Several files can be changed within an application at the same time. The abort transactions command annuls all changes within an application. Power loss will cancel all modifications too.
For more details about application settings and access rights refer to [2].
ASSA ABLOY Identification Technologies GmbH 23
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3

6 ISO 14443 Type B

ISO 14443 type B cards are supported.

6.1 SR176

The SR176 label contains only 30 bytes of data organized in two bytes per page.

6.1.1 Memory organization

block
address
0Fh Lock byte RFU Chip ID 0Eh User data
… … 04h User data 03h Serial number 02h Serial number 01h Serial number 00h Serial number
Byte 1 Byte 0
Figure 6-1: SR176 memory organization

6.1.2 Serial number UID

The UID is stored in the first 4 pages. Page 00h contains the LSB of the UID.
Page 03h Page 02h Page 01h Page 00h
Byte 1h Byte 0 Byte 1 Byte 0 Byte 1 Byte 0 Byte 1 Byte 0
Figure 6-2: SR176 Serial number
ASSA ABLOY Identification Technologies GmbH 24
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3

6.1.3 Lock byte

The lock byte defines the write access condition of a pair of pages. Each bit can only be set once. This procedure is irreversible. This byte is implemented as an OTP.
Bit 7 Bit 6 Bit 5 Bit 4 Bit 3 Bit 2 Bit 1 Bit 0
Page 08h
Page 0Fh
Page 0Eh
Page 0Ch
Page 0Dh
Page 0Ah
Page 0Bh
Figure 6-3: Lock byte
Page 09h
Page 06h
Page 07h
Page 04h
Page 05h
Page 02h
Page 03h
Page 00h
Page 01h

6.1.4 Chip ID

The Chip ID is defined in the low nibble of page 0Fh. It is manufacturer set and is used internally to select and separate single tags.

6.2 SRIX4K

The SRIX4K label contains 512 bytes of data organized into four-byte pages.

6.2.1 Memory organization

Block
address
FFh OTP Lock Reg ST Reserved ST Reserved Fixed Chip ID 7Fh User data
… … 07h User data 06h 32 bits binary counter 05h 32 bits binary counter 04h 32 bits Boolean Area
Byte 3 Byte 2 Byte 1 Byte 0
03h 32 bits Boolean Area 02h 32 bits Boolean Area 01h 32 bits Boolean Area 00h 32 bits Boolean Area
Figure 6-4: SRIX4K memory organization

6.2.2 Lock block

Locking of blocks is not supported with this tag.
ASSA ABLOY Identification Technologies GmbH 25
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3

7 Hardware

Figure 7-1: Picture of the complete reader
ASSA ABLOY Identification Technologies GmbH 26
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3

7.1 Mechanical dimensions

All Dimensions are in mm
Figure 7-2: Mechanical drawing with dimensions
ASSA ABLOY Identification Technologies GmbH 27
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3

7.1.1 Features

Interface type: USB 2.0
Dimensions: 205x130x93 (LxWxH), all in mm
Reading Distance: up to 90mm, depending on tag type
SAM: supported2
Boot loader: supported3
Drivers: virtual COM port driver, DLL driver available
Antenna: on board
Signaling: RFID activity indicator LED
Power LED Contact Interface activity indicator LED USB Online indicator LED
Power Supply: via USB
2
The integrated SAM socket is accessible by opening the housing
3
The boot loader makes it easy to download a firmware to the unit without replacing/dismantling the
hardware. ASSA ABLOY Identification Technologies GmbH 28
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3

7.1.2 External Connections

7.1.2.1 USB Cable
The USB connector is located on the bottom side of the housing. Depending on the users preferences the cable can be put and easily fixed within one of three cable guides. Each cable guide leads the cable to one of three possible sides of the housing.
Figure 7-3: mechanical drawing, bottom view
7.1.2.2 Power Supply
The power supply is automatically provided via the USB connection. Therefore the unit can only be connected to a powered USB hub.
Non-powered USB hubs like often used in USB splitter units are not able to supply the reader with enough power. Depending on the internal protection of these units, they even may be damaged.
ASSA ABLOY Identification Technologies GmbH 29
Loading...
+ 113 hidden pages