Preview

MIFARE Type Identification Procedure

Satisfactory Essays
Open Document
Open Document
4899 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
MIFARE Type Identification Procedure
AN10833
MIFARE Type Identification Procedure
Rev. 3.4 — 11 December 2012 018434 Application note COMPANY PUBLIC

Document information Info Content Keywords Abstract MIFARE, ISO/IEC 14443 This document describes how to differentiate between the members of the MIFARE card IC family. ISO/IEC 14443-3 describes the initialization and anti-collision procedure, and ISO/IEC 14443-4 describes the protocol activation procedure. This document shows how to use these procedures to deliver the chip type information for all MIFARE ICs.

NXP Semiconductors

AN10833
MIFARE Type Identification Procedure

Revision history Rev Date 3.4 3.3 3.2 3.1 3 20121211 20110928 20110829 20090707 20090518

Description Update for MIFARE Implementation in a device Update for TNP3xxx Update for the new MIFARE Classic with 7 byte UID option Correction of Table 12 Third release (supersedes AN MIFARE Interface Platform, Type Identification Procedure, Rev. 1.3, Nov. 2004)

Contact information
For more information, please visit: http://www.nxp.com For sales office addresses, please send an email to: salesaddresses@nxp.com
AN10833 All information provided in this document is subject to legal disclaimers. © NXP B.V. 2012. All rights reserved.

Application note COMPANY PUBLIC

Rev. 3.4 — 11 December 2012 018434

2 of 14

NXP Semiconductors

AN10833
MIFARE Type Identification Procedure

1. Introduction
1.1 Terms and Abbreviations
Table 1 shows the terms and abbreviation used in this document. All the “Type A” related definitions are used and described in the ISO/IEC 14443 documents.
Table 1. Abbreviations

Abbreviation ATQA ATS DIF COS CL CT n.a. NFC PCD PICC PKE REQA SAK Select RID Answer To Request acc. to ISO/IEC 14443-4 Answer To Select acc. to ISO/IEC 14443-4 Dual Interface (cards) Card Operating System Cascade Level acc. to ISO/IEC 14443-3 Cascade Tag, Type A not applicable Near Field Communication Proximity Coupling Device (“Contactless Reader”) Proximity

You May Also Find These Documents Helpful

  • Better Essays

    (November 2013). Requirements and Security Assessment Procedures. Payment Card Industry (PCI) Data Security Standard, Version 3.0, 61-72. Retrieved from https://www.pcisecuritystandards.org/security_standards/documents.php…

    • 1344 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Chapter 2 Review

    • 762 Words
    • 4 Pages

    It transmits data by a mobile device, called a tag, which is read by an RFID reader and processed according to the need of an information system program.…

    • 762 Words
    • 4 Pages
    Good Essays
  • Better Essays

    The main components are: • Card reader. A device for reading credit cards. This device is either a standalone unit, such as the Verifone TRANZ system, or integrated into a cash register. It is most recognizable by the magnetic strip reader (MSR), numeric keypad, and receipt printer. Transaction unit. This device sends the credit card information to an authenticating source (e.g., Visa) and receives a transaction confirmation number. For Verifone, the card reader and transaction unit are integrated into an embedded device (although Verifone does sell individual components as well). The Verifone units consist of a digital display and a numeric keypad. For other devices, such as IBM SurePOS or Panasonic’s POS Workstations, the card reader and transaction unit may be integrated into a cash register…

    • 4017 Words
    • 17 Pages
    Better Essays
  • Powerful Essays

    Infinity Computers is pleased that you have chosen our firm to conduct and implement your system upgrading. We would like to take this opportunity to expand further on our previous Feasibility Study by providing you with our System Requirements and Project Analysis documentation. The information contained in this document is delineated below. Also included in this portion is the updated miscellaneous hardware section. This revision has also increased the price by a nominal amount but feel that this small increase in pricing will help further secure your network from unwanted parties. We have also contacted RAAK Technologies for securing smart card production and quotes.…

    • 2173 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    Verichip

    • 610 Words
    • 3 Pages

    • RFID technology has previously been used in tracking and access applications and refers to technologies that use low-frequency radio waves to identify individual items…

    • 610 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    E-Commerce Ch 1 Review

    • 536 Words
    • 3 Pages

    The handheld devices, including mobile telephones and tablet computer. RFID devices and smart cards are being combined with biometric technologies, such as fingerprint readers, and retina scanners…

    • 536 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    The A/S line card comprised two chip categories: standardized and proprietary. Standardized chips were interchangeable and produced by multiple suppliers. Proprietary chips manufactured by a…

    • 1097 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    SF 700 – Security Container Information – list the combo and point of contact info…

    • 2317 Words
    • 13 Pages
    Satisfactory Essays
  • Good Essays

    Electrical Wiring Rules

    • 95480 Words
    • 382 Pages

    Conditions of use This is a licensed electronic copy of a document where copyright is owned or managed by Standards Australia International. Your licence is a single user licence and the document may not be stored, transferred or otherwise distributed on a network. You may also make one paper copy of this document if required.…

    • 95480 Words
    • 382 Pages
    Good Essays
  • Satisfactory Essays

    E- Commerce

    • 881 Words
    • 4 Pages

    RFI, radio frequency identification and smart card device are tracking device combined with biometric technologies, such as retina scanners, finger print readers, to track more items and people in many different situation. These technologies are combined with each other and with communication systems that enable companies to communicate and share information with other such as customer demands, consumer behavior, inventory level and etc.…

    • 881 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    RFID is coming out as a major emerging technology for identifying and tracking goods and assets around the…

    • 3088 Words
    • 13 Pages
    Powerful Essays
  • Powerful Essays

    Chapter 1: Chapter 2: Chapter 3: Chapter 4: Chapter 5: Chapter 6: Chapter 7: Chapter 8: Chapter 9: Chapter 10: Chapter 11: Chapter 12: Chapter 13: Chapter 14: Chapter 15: Chapter 16: Chapter 17: Chapter 18: Chapter 19: Chapter 20:…

    • 21530 Words
    • 87 Pages
    Powerful Essays
  • Powerful Essays

    The following subsections of the Software Requirements Specifications (SRS) document provide an overview of the entire SRS.…

    • 1869 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    24. S. Sandoval-Reyes, J. L. Soberanes Perez, “Mobile RFID Reader with Database Wireless Synchronization”, CIE, Mexico, September, 2005…

    • 5778 Words
    • 24 Pages
    Powerful Essays
  • Powerful Essays

    modeling

    • 5987 Words
    • 23 Pages

    The special information that must be coded on the magnetic strip of the card would include, but would not necessarily be limited to:…

    • 5987 Words
    • 23 Pages
    Powerful Essays