ASSALOY Identification Technologies RDHS-0404D1-0X RFID Reader User Manual

ASSA ABLOY Identification Technologies GmbH RFID Reader

User Manual

        User Manual Firmware: Version Dual ISO 2.3 Document No.: 1510-USM-01-0-01 ACGPass e-ID Desktop Reader     Document Nr.: QSI-040902-OM-1-a-UserManual Dual ISO Module, V2.0  ASSA ABLOY Identification Technologies GmbHAm Klingenweg 6A 65396 Walluf Germany Phone +49 (0) 6123 791 0 Fax +49 (0) 6123 791 199 www.aaitg.com
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    ASSA ABLOY Identification Technologies GmbH 1 Edition One - October 2006  ASSA ABLOY Identification Technologies GmbH (ASSA ABLOY ITG) reserves the right to make changes to its products or services or to discontinue any product or service at any time without notice. ASSA ABLOY ITG provides customer assistance in various technical areas, but does not have full access to data concerning the use and applications of customer's products.  Therefore, ASSA ABLOY ITG assumes no liability and is not responsible for customer applications or product or software design or performance relating to systems or applications incorporating ASSA ABLOY ITG products. In addition, ASSA ABLOY ITG assumes no liability and is not responsible for infringement of patents and/or any other intellectual or industrial property rights of third parties, which may result from assistance provided by ASSA ABLOY ITG.  ASSA ABLOY ITG products are not designed, intended, authorized or warranted to be suitable for life support applications or any other life critical applications that could involve potential risk of death, personal injury or severe property or environmental damage.   With the edition of this document, all previous editions become void. Indications made in this manual may be changed without previous notice.  Composition of the information in this manual has been done to the best of our knowledge. ASSA ABLOY ITG does not guarantee the correctness and completeness of the details given in this manual and may not be held liable for damages ensuing from incorrect or incomplete information. Since, despite all our efforts, errors may not be completely avoided, we are always grateful for your useful tips. The installation instructions given in this manual are based on advantageous boundary conditions. ASSA ABLOY ITG does not give any guarantee promise for perfect function in cross environments.  The ACG logo is a registered trademark of ASSA ABLOY Identification Technologies GmbH.  Copyright © 2006 ASSA ABLOY Identification Technologies GmbH (ASSA ABLOY ITG) Microsoft®, Microsoft Windows 98SE®, Microsoft Windows ME®, Microsoft Windows NT®, Microsoft Windows 2000® and Microsoft Windows XP® are registered trademarks of the Microsoft Corporation USA. Pentium® is a registered trademark of the Intel Corporation USA  mifare® is a registered trademark of NXP Semiconductor N.V.
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    ASSA ABLOY Identification Technologies GmbH 2 All other products mentioned in this document might be brands or brand names of the different suppliers. This document may be downloaded onto a computer, stored and duplicated as nec-essary to support the use of the related ASSA ABLOY ITG products. Any other type of duplication, circulation or storage on data carriers in any manner not authorized by ASSA ABLOY ITG represents a violation of the applicable copyright laws and shall be prosecuted.
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    ASSA ABLOY Identification Technologies GmbH 3 Safety Instructions / Warning - Read before start-up! •  The device may only be used for the intended purpose designed by for the manufacturer. The operation manual should be conveniently kept available at all times for each user. •  Unauthorized changes and the use of spare parts and additional devices that have not been sold or recommended by the manufacturer may cause fire, electric shocks or injuries. Such unauthorized measures shall exclude any liability by the manufacturer. •  The liability-prescriptions of the manufacturer in the issue valid at the time of purchase are valid for the device. The manufacturer shall not be held legally responsible for inaccuracies, errors, or omissions in the manual or automatically set parameters for a device or for an incorrect application of a device. •  Repairs may be executed by the manufacturer only. •  Only qualified personnel should carry out installation, operation, and maintenance procedures. •  Use of the device and its installation must be in accordance with national legal requirements and local electrical codes. •  When working on devices the valid safety regulations must be observed.
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    ASSA ABLOY Identification Technologies GmbH 4 Preface  Read This First  About This Guide   This manual describes the ACGPass e-ID Desktop Reader. Its goal is to describe the reader, how it works, how to integrate it and how to use it.   If You Need Assistance  Our application center is located in Europe to provide direct support. For more information, please contact your nearest ASSA ABLOY ITG Sales Center. The contact addresses can be found on our home page: http://www.aaitg.com/
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    ASSA ABLOY Identification Technologies GmbH 5 Table of contents 1 Scope ..............................................................................................12 2 Extended Documentation..............................................................12 3 Definitions and Abbreviations ......................................................13 3.1 Definitions .................................................................................................. 13 3.1.1 Anti-collision loop .................................................................................13 3.1.2 Hex notation.........................................................................................13 3.1.3 ASCII notation......................................................................................13 3.2 Abbreviations.............................................................................................. 14 4 Supported tags...............................................................................16 5 The mifare® Transponder Family..................................................17 5.1 mifare® Standard........................................................................................ 17 5.1.1 Sector 0 / Block 0.................................................................................17 5.1.2 Blocks 3, 7, 11, 15, …..........................................................................18 5.2 State Diagram ............................................................................................ 19 5.3 mifare® Ultralight ........................................................................................ 20 5.4 mifare® 4k................................................................................................... 20 5.5 mifare® ProX............................................................................................... 20 5.6 mifare® DESFire......................................................................................... 21 5.6.1 Memory organization............................................................................21 5.6.2 State diagram of mifare® DESFire........................................................22 5.6.2.1 Activate PICC............................................................................... 23 5.6.2.2 Select application......................................................................... 23 5.6.2.3 Login to application ...................................................................... 23 5.6.2.4 Select file ..................................................................................... 23 5.6.2.5 Change file................................................................................... 23 5.6.2.6 Commit / Abort transaction........................................................... 23 6 ISO 14443 Type B...........................................................................24 6.1 SR176 ........................................................................................................ 24 6.1.1 Memory organization............................................................................24 6.1.2 Serial number UID................................................................................24 6.1.3 Lock byte..............................................................................................25 6.1.4 Chip ID .................................................................................................25 6.2 SRIX4K ...................................................................................................... 25 6.2.1 Memory organization............................................................................25 6.2.2 Lock block ............................................................................................25 7 Hardware.........................................................................................26 7.1 Mechanical dimensions.............................................................................. 27 7.1.1 Features...............................................................................................28
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    ASSA ABLOY Identification Technologies GmbH 6 7.1.2 External Connections...........................................................................29 7.1.2.1 USB Cable ................................................................................... 29 7.1.2.2 Power Supply............................................................................... 29 7.1.2.3 SAM Socket ................................................................................. 30 7.1.3 Function Control Indicator LEDs ..........................................................31 7.1.3.1 Power LED................................................................................... 32 7.1.3.2 RFID activity indicator LED .......................................................... 32 7.1.3.3 USB Online indicator LED............................................................ 32 7.1.3.4 Contact Interface activity indicator LED ....................................... 33 8 Software for contactless interface functions ..............................34 8.1 ASCII Protocol............................................................................................ 34 8.2 Binary Protocol........................................................................................... 34 8.2.1 STX......................................................................................................35 8.2.2 Station ID .............................................................................................35 8.2.3 Length ..................................................................................................35 8.2.4 Flags ....................................................................................................35 8.2.5 Data .....................................................................................................35 8.2.6 Block Check Character (BCC)..............................................................36 8.2.7 ETX......................................................................................................36 8.2.8 Remarks...............................................................................................36 8.2.9 Examples: ............................................................................................36 8.3 Register Set ............................................................................................... 37 8.3.1 EEPROM memory organization ...........................................................38 8.3.2 Unique device ID (00h – 04h)...............................................................39 8.3.3 Station ID (0Ah)....................................................................................39 8.3.4 Protocol configuration (0Bh).................................................................39 8.3.4.1 Auto start (default 1) .................................................................... 39 8.3.4.2 Protocol (default 0)....................................................................... 39 8.3.4.3 Multitag (default 0) ....................................................................... 39 8.3.4.4 New serial mode (default 0) ......................................................... 39 8.3.4.5 LED (default 0)............................................................................. 40 8.3.4.6 Single shot (default 0) .................................................................. 40 8.3.4.7 Extended Protocol (default 1)....................................................... 40 8.3.4.8 Extend ID (default 0).................................................................... 41 8.3.5 BAUD, Baud rate control register (0Ch)...............................................42 8.3.6 Command Guard Time (0Dh)...............................................................43 8.3.7 OPMODE, operating mode register (0Eh)............................................43 8.3.8 Single Shot Time-out (0Fh) ..................................................................44 8.3.9 Protocol configuration 2 (13h) ..............................................................44 8.3.9.1 Disable multi-tag reset (default 0) ................................................ 44 8.3.9.2 Disable start-up message (default 0) ........................................... 44 8.3.9.3 Enable binary frame v2 (default 0)............................................... 44
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    ASSA ABLOY Identification Technologies GmbH 7 8.3.9.4 Noisy Environment (default 0)...................................................... 44 8.3.9.5 Reset Recovery Time Multiplier (default 0) .................................. 45 8.3.9.6 Enable ISO14443 B Anti-collision (default 0) ............................... 45 8.3.9.7 Disable ISO 14443-4 Error Handling (default 0)........................... 45 8.3.10 Reset Off Time (14h)............................................................................45 8.3.11 Reset Recovery Time (15h) .................................................................45 8.3.12 Application Family Identifier (16h)........................................................45 8.3.13 Selection Time-out ISO 14443A (17h) .................................................46 8.3.14 Selection Time-out ISO 14443B (18h) .................................................46 8.3.15 Selection Time-out SR176 (19h)..........................................................46 8.3.16 Protocol configuration 3 (1Bh)..............................................................46 8.3.16.1 Disable automatic ISO 14443-4 timeouts (default 0).................... 46 8.3.16.2 Page read (default 0) ................................................................... 47 8.3.16.3 ReqA Extended ID (default 0) ...................................................... 47 8.3.17 User data (80h - EFh) ..........................................................................47 8.4 Instruction Set ............................................................................................ 48 8.4.1 Overview ..............................................................................................48 8.4.2 Error Codes..........................................................................................51 8.4.3 Common commands............................................................................52 8.4.3.1 Test Continuous Read ................................................................. 52 8.4.3.2 Continuous Read ......................................................................... 52 8.4.3.2.1 Multitag continuous read mode................................................. 53 8.4.3.2.2 Auto start .................................................................................. 53 8.4.3.2.3 Noisy Environment.................................................................... 53 8.4.3.2.4 Binary mode.............................................................................. 53 8.4.3.2.5 Simple access control applications ........................................... 53 8.4.3.3 Set LED........................................................................................ 54 8.4.3.4 DES encryption / decryption of data............................................. 55 8.4.3.5 Get ID........................................................................................... 56 8.4.3.5.1 Binary Protocol Version 2 ......................................................... 57 8.4.3.5.2 High speed select ..................................................................... 57 8.4.3.5.3 Answer from 0xh and 1xh ......................................................... 59 8.4.3.5.4 Answer from 2xh and 3xh ......................................................... 59 8.4.3.5.5 Select a single tag .................................................................... 59 8.4.3.5.6 Extended ID.............................................................................. 59 8.4.3.5.7 Multiple tags.............................................................................. 60 8.4.3.5.8 RATS Guard Time SFGT.......................................................... 60 8.4.3.6 Multi-Tag Selection / List.............................................................. 60 8.4.3.6.1 Multi-tag list............................................................................... 60 8.4.3.6.2 Reading distance ...................................................................... 61 8.4.3.6.3 Multi-tag select.......................................................................... 61 8.4.3.6.4 Multi-tag reset........................................................................... 61
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    ASSA ABLOY Identification Technologies GmbH 8 8.4.3.6.5 Maximum number of tags ......................................................... 61 8.4.3.7 Include tag type............................................................................ 62 8.4.3.8 Exclude tag type .......................................................................... 63 8.4.3.9 Set tag type.................................................................................. 64 8.4.3.10 Set Configuration Flags................................................................ 65 8.4.3.10.1 Out of range failure 'R' ............................................................ 66 8.4.3.11 Set Configuration Register........................................................... 67 8.4.3.11.1 Out of range failure 'R' ............................................................ 68 8.4.3.12 Antenna power on/off................................................................... 69 8.4.3.12.1 Power off................................................................................. 69 8.4.3.12.2 Power on................................................................................. 69 8.4.3.13 Read/Write user port.................................................................... 70 8.4.3.13.1 Read port................................................................................ 70 8.4.3.13.2 Write port ................................................................................ 71 8.4.3.14 Quiet ............................................................................................ 72 8.4.3.14.1 ISO 14443 Type A .................................................................. 72 8.4.3.14.2 ISO 14443 Type B .................................................................. 73 8.4.3.14.3 SR176..................................................................................... 73 8.4.3.15 Read block................................................................................... 73 8.4.3.15.1 Read failure 'F'........................................................................ 73 8.4.3.15.2 No tag in field 'N'..................................................................... 74 8.4.3.15.3 Operation mode failure 'O' ...................................................... 74 8.4.3.15.4 Out of range failure 'R' ............................................................ 74 8.4.3.16 Read reader EEPROM ................................................................ 74 8.4.3.16.1 Out of range failure 'R' ............................................................ 74 8.4.3.17 Select........................................................................................... 75 8.4.3.17.1 Select a single tag .................................................................. 75 8.4.3.17.2 Extended ID............................................................................ 75 8.4.3.17.3 Multiple tags............................................................................ 75 8.4.3.18 Get Version.................................................................................. 76 8.4.3.19 Write DESFire key ....................................................................... 77 8.4.3.19.1 Out of range failure 'R' ............................................................ 77 8.4.3.19.2 Writing DESFire Keys ............................................................. 77 8.4.3.19.3 Using DESFire keys for authentication ................................... 77 8.4.3.20 Write master key.......................................................................... 78 8.4.3.20.1 Out of range failure 'R' ............................................................ 78 8.4.3.20.2 Writing master keys ................................................................ 78 8.4.3.20.3 Using master keys for authentication...................................... 78 8.4.3.21 Write block ................................................................................... 79 8.4.3.21.1 Write failure 'F' ........................................................................ 79 8.4.3.21.2 No tag error 'N'........................................................................ 79 8.4.3.21.3 Operation mode failure 'O' ...................................................... 79
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    ASSA ABLOY Identification Technologies GmbH 9 8.4.3.21.4 Out of range failure 'R' ............................................................ 80 8.4.3.22 Write EEPROM............................................................................ 80 8.4.3.22.1 Out of range failure 'R' ............................................................ 80 8.4.3.23 Reset............................................................................................ 81 8.4.3.23.1 Disable Start-up Message....................................................... 81 8.4.3.23.2 Reset Timing........................................................................... 81 8.4.3.24 Field Reset................................................................................... 82 8.4.4 ISO 14443 Type A only commands......................................................83 8.4.4.1 Increment value block (credit)...................................................... 83 8.4.4.1.1 No value block 'I'....................................................................... 83 8.4.4.1.2 Increment failure 'F'................................................................... 83 8.4.4.1.3 No tag error 'N'.......................................................................... 84 8.4.4.1.4 Operation mode failure 'O' ........................................................ 84 8.4.4.2 Decrement value block (debit) ..................................................... 84 8.4.4.2.1 No value block 'I'....................................................................... 84 8.4.4.2.2 Decrement failure 'F'................................................................. 85 8.4.4.2.3 No tag error 'N'.......................................................................... 85 8.4.4.2.4 Operation mode failure 'O' ........................................................ 85 8.4.4.3 Copy value block (backup)........................................................... 85 8.4.4.3.1 Target block.............................................................................. 86 8.4.4.3.2 No value block 'I'....................................................................... 86 8.4.4.3.3 Copy failure 'F' .......................................................................... 86 8.4.4.3.4 No tag error 'N'.......................................................................... 86 8.4.4.3.5 Operation mode failure 'O' ........................................................ 86 8.4.4.4 Login (authenticate tag) ............................................................... 87 8.4.4.4.1 No tag error 'N'.......................................................................... 88 8.4.4.4.2 Operation mode failure 'O' ........................................................ 88 8.4.4.4.3 Out of range failure 'R' .............................................................. 88 8.4.4.4.4 <CR> ........................................................................................ 89 8.4.4.4.5 Login with key data from EEPROM .......................................... 89 8.4.4.4.6 Usage of key A, key B............................................................... 89 8.4.4.5 Read value block ......................................................................... 90 8.4.4.5.1 No value block 'I'....................................................................... 90 8.4.4.5.2 No tag error 'N'.......................................................................... 90 8.4.4.5.3 General failure 'F'...................................................................... 90 8.4.4.5.4 Operation mode failure 'O' ........................................................ 90 8.4.4.6 Write value block.......................................................................... 91 8.4.4.6.1 Invalid value 'I' .......................................................................... 91 8.4.4.6.2 Write failure 'F' .......................................................................... 91 8.4.4.6.3 No tag error 'N'.......................................................................... 91 8.4.4.6.4 Operation mode failure 'O' ........................................................ 92 8.4.4.6.5 Writing values ........................................................................... 92
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    ASSA ABLOY Identification Technologies GmbH 10 8.4.5 SR176 only commands ........................................................................93 8.4.5.1 Lock block.................................................................................... 93 8.4.5.1.1 Operation mode failure 'O' ........................................................ 93 8.4.5.1.2 Apply settings ........................................................................... 93 8.4.6 DESFire command set .........................................................................94 8.4.6.1 Authenticate................................................................................. 95 8.4.6.2 Change Key Settings ................................................................... 96 8.4.6.3 Get Key Settings.......................................................................... 97 8.4.6.4 Change Key ................................................................................. 98 8.4.6.5 Get Key Version........................................................................... 99 8.4.6.6 Create Application.......................................................................100 8.4.6.7 Delete Application .......................................................................101 8.4.6.8 Get Application IDs .....................................................................102 8.4.6.9 Select Application .......................................................................103 8.4.6.10 Format PICC...............................................................................104 8.4.6.11 Get Version.................................................................................105 8.4.6.12 Get File IDs.................................................................................106 8.4.6.13 Get File Settings .........................................................................107 8.4.6.14 Select File ...................................................................................108 8.4.6.15 Change File Settings...................................................................109 8.4.6.16 Create Standard Data File ..........................................................110 8.4.6.17 Create Backup Data File.............................................................111 8.4.6.18 Create Value File ........................................................................112 8.4.6.19 Create Linear Record File...........................................................113 8.4.6.20 Create Cyclic Record File ...........................................................114 8.4.6.21 Delete File...................................................................................115 8.4.6.22 Read Data / Records ..................................................................116 8.4.6.22.1 Our of range 'R'......................................................................116 8.4.6.23 Data files.....................................................................................117 8.4.6.24 Record file...................................................................................117 8.4.6.25 Write Data / Record ....................................................................118 8.4.6.25.1 Our of range 'R'......................................................................119 8.4.6.26 Get Value....................................................................................119 8.4.6.27 Credit ..........................................................................................120 8.4.6.28 Debit ...........................................................................................121 8.4.6.29 Limited Credit..............................................................................122 8.4.6.30 Clear Record File ........................................................................123 8.4.6.31 Commit Transaction....................................................................124 8.4.6.32 Abort Transaction........................................................................125 9 Software for contact interface functions ...................................126 10 Frequently Asked Questions ...................................................127 10.1 Getting Started ..........................................................................................127
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    ASSA ABLOY Identification Technologies GmbH 11 10.2 Personalized ACGPass e-ID Desktop Reader ..........................................127 10.3 What type of mifare® card should I use? ...................................................128 10.4 How safe is mifare® Standard for cashless payment?...............................128 10.5 Using a mifare® card .................................................................................130 10.6 Using a DESFire card................................................................................131 10.6.1 Create a plain standard data file ........................................................131 10.6.2 Use a plain standard data file.............................................................131 10.6.3 Create a value file ..............................................................................132 10.6.4 Use a DES secured value file.............................................................133 11 References.................................................................................134 12 Appendix A: SAM......................................................................135 13 Appendix C: Timings ................................................................136 14 Appendix D: Release Notes .....................................................138 14.1 Version History..........................................................................................138 14.1.1 Dual 2.0..............................................................................................138 14.1.2 Dual 2.1..............................................................................................138 14.1.3 Dual 2.2..............................................................................................138 14.1.4 Dual 2.3..............................................................................................139 14.2 Revision history.........................................................................................139 15 Appendix F: Approvals / Certificates ......................................140 15.1 CE Declaration ..........................................................................................140 15.2 FCC Declaration........................................................................................141 15.3 RoHS Compliance.....................................................................................142
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    1 Scope The ACGPass e-ID Desktop Reader supports a broad range of tags compliant with ISO 14443 type A and B standards, including SR176 tags and tags which belong to the Philips mifare® family. An open command structure allows the device to communicate with tags that use an operating system. The read/write unit supports automatic chaining, 256 byte buffer and frame length, extended time framing and up to 848kBaud transmission rates over the air interface.  Additionally this unit implements a DES cipher which enables to use mifare® DESFire tags. These tags are designed for use in high security algorithms.  An internal SAM socket is also available.  Major applications are:  •  e-Passport •  e-National ID Cards •  e-Drivers Licenses •  e-Government •  e-Health Cards •  e-Document Authentication •  e-Document Issuing  2 Extended Documentation  Please note that all confidential material is excluded from this documentation in order to comply with NDA requirements of our suppliers as well as prevention from unauthorized copies of the reader modules for increasing the security in the applications. You can obtain the extended documentation containing the confidential information after signing a NDA. ASSA ABLOY Identification Technologies GmbH 12
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    3  Definitions and Abbreviations 3.1 Definitions 3.1.1 Anti-collision loop An algorithm used to identify and handle a dialogue between a reader and one or more tags in its antenna field. 3.1.2 Hex notation A hexadecimal value is marked with the suffix ‘h’, i.e. A1h has the value A1 hexadecimal. 3.1.3 ASCII notation ASCII characters are listed within apostrophes, i.e. ‘x’ means a single x. ASSA ABLOY Identification Technologies GmbH 13
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    3.2 Abbreviations  Abbreviation Description AID Application ID ASCII  American Standard Code for Information Interchange ATR  Answer to Reset ATS  Answer to Select Block  For the mifare® Standard one block contains 16 bytes CID  Card Identifier (logical card address, ISO 14443-4) CRC  Cyclic Redundancy Check DES  Data Encryption Standard, for more details about DES refer to [3]. EDC  Error Detection Code EOF  End of Frame Hex / xxh  Value in Hexadecimal notation I-block Information block LSB  Least Significant Bit or Byte MSB  Most Significant Bit or Byte NAD  Node Address (ISO 14443-4) OSI  Open System Interconnection OTP  One time programmable PCB  Protocol Control Byte (ISO 14443-4) PCON Protocol Configuration byte of the reader PPS  Protocol and Parameter Selection RATS  Request for Answer to Select R-block  Receive ready block REQA  Request ISO Type A REQB  Request ISO Type B RFU  Reserved for Future Use S-block Supervisory block Sector  For the mifare® Standard one sector contains 4 blocks SID Station ID SFGT  Guard time after RATS SN  Serial Number of a tag (a 32 bit number) SOF  Start of frame ASSA ABLOY Identification Technologies GmbH 14
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    Abbreviation Description TDES Triple DES Value block  32 bit data block format. Used in ticketing application <CR>  Carriage return (0Dh) <LF>  Line feed (0Ah) Figure 3-1: Abbreviations ASSA ABLOY Identification Technologies GmbH 15
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    4 Supported tags  Comments      Encryption included Encryption not included Encryption not included  Works only with ‘t’ command      Extended setup needed      Transfer command  √ √ √ √ √ √ √ √ √  √ √ √ √ √ √ √  √ √ Write block  √ √ √ √ - - - - -  - √ √ - - - -  - - Read block  √ √ √ √ - - - - -  - √ √ - - - -  - - Serial number  √ √ √ √ √ √ √ √ -  √ √ √ √ √ √ √  √ √ Manufacturer  Philips Philips Philips Philips Philips Infineon Infineon Philips Innovision  Infineon STM STM ASK ASK Sharp Toshiba  Various Various  ISO 14443 A mifare® Standard mifare® 4k mifare® Ultralight mifare® ProX mifare® DESFire SLE66CLX320P SLE 55R04/ 08 Smart MX Jewel Tag ISO 14443 B SLE6666CL160S SR176 SLIX 4K ASK GTML2 ISO ASK GTML Sharp B TOSMART P032/064 Dual Interface ISO 14443 A compliant (1) ISO 14443 B compliant() Figure 4-1: Supported labels                                             1 Performance varies ASSA ABLOY Identification Technologies GmbH 16
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    5 The mifare® Transponder Family The mifare® transponder family consists of various 13.56 MHz transponder ICs, all compliant to the ISO 14443 standard.  5.1 mifare® Standard The mifare® Standard card consists of 16 sectors. A sector includes four blocks of 16 bytes each.  mifare® Standard    Sector 2 Sector 0 (Block: 0...3)    Block 8:   Data or value (16 bytes) Sector 1 (Block: 4...7)    Block 9:   Data or value (16 bytes) Sector 2 (Block 8...11)    Block 10:   Data or value (16 bytes) ...  Sector 15 (Block 60...63)  Block 11:   Access Conditions (4 bytes),   Key A, Key B (16 bytes) Figure 5-1: mifare® Standard: sector diagram  5.1.1  Sector 0 / Block 0 Block 0 is read only.  Serial Number (4 bytes)  Check byte (1 byte)  Manufacturer data (11 bytes) Figure 5-2: mifare® Standard: sector 0 / block 0  ASSA ABLOY Identification Technologies GmbH 17
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    5.1.2  Blocks 3, 7, 11, 15, … Transport keys are set on delivery:  Key A (6 bytes)  Access Conditions (4 bytes)  Key B (6 bytes) Figure 5-3: mifare® Standard: block 3, 7, 11, 15, …  Key A A0 A1 A2 A3 A4 A5 (Infineon) or FF FF FF FF FF FF (new Philips cards)  Key B B0 B1 B2 B3 B4 B5 (Infineon) or FF FF FF FF FF FF (new Philips cards) Access Conditions FF 07 80 xx (key A is used to read or write; key A itself is not readable; key B is data only). For further information refer to the mifare® card manual.  Remarks Enabled keys are always read as 00 00 00 00 00 00 Using key B as a data area will cause a security gap, due to the fact that it is necessary to rewrite key A and the access conditions at each write process. It is not recommended to use key B as a data storage area.  ASSA ABLOY Identification Technologies GmbH 18
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    5.2 State Diagram All mifare® cards use the following state diagram.  Power OffIdleReadyActiveAuthenticatedHaltAuthenticateSelectREQAResetWake Up HaltLog In Selectread/write/... Tag interfacingcommandsReader Instruction SetISO 14443 CommandsAnticollision Loop Figure 5-4: State diagram   ASSA ABLOY Identification Technologies GmbH 19
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    5.3 mifare® Ultralight mifare® Ultralight cards have no encryption included. They only support plain text data transmission.  mifare® Ultralight only supports 4 bytes per sector, but the command set uses 16 bytes per sector. Only the 4 least significant bytes are valid when using mifare® Ultralight. Ensure that the other bytes match with the tag content when using the write command; otherwise the read back will fail. 5.4 mifare® 4k mifare® 4k cards have an increased memory. Beginning from sector 32 (20h), sectors have 16 blocks. Due to compatibility reasons, the sector indices have changed according to the following table. The login sector has to be used to access the corresponding sector on the card.  Sector Block Login sector 00h  00h – 03h  00h 01h  04h – 07h  01h … … … 1Fh  7Ch – 7Fh  1Fh 20h  80h – 8Fh  20h 21h  90h – 9Fh  24h 22h  A0h – AFh  28h 23h  B0h – BFh  2Ch 24h  C0h – CFh  30h 25h  D0h – DFh  34h 26h  E0h – EFh  38h 27h  F0h – FFh  3Ch Figure 5-5: mifare® 4k sector index table 5.5 mifare® ProX mifare® ProX tags have an operating system onboard. Data organization depends on the operating system installed on the card. These cards can include additional functionalities such as DES or a proprietary encipher algorithm.  Before accessing the operating system, the card must be selected. Customized commands are issued using the transfer command. ASSA ABLOY Identification Technologies GmbH 20
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    5.6 mifare® DESFire This tag supports additional security algorithms (DES, Triple-DES, MAC) for security sensitive applications.  DESFire tags are addressed using a specific command set (see DESFire command set). 5.6.1 Memory organization The memory of a DESFire card can be personalized to specific requirements. The card can be seen as data storage device like a hard disk in a PC. The memory is divided into a maximum of 28 different applications (directories) with 16 files each. An application has up to 14 keys. Depending on keys and access conditions a file can be accessed in four different ways. Plain data is never secured. Data is secured using a MAC, single DES or triple DES enciphers.  The following figure describes the memory organization of a DESFire card. FileID 2Application 1FileID 1 ... FileID nFileID 2Application 2FileID 1 ... FileID nFileID 2Application nFileID 1 ... FileID n...DESFire card (Application 0) Figure 5-6: DESFire memory organization ASSA ABLOY Identification Technologies GmbH 21
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    5.6.2  State diagram of mifare® DESFire  Activate DESFire cardSelect ApplicationLogin to ApplicationSelect File with IDChange FileCommit / Abort Transaction Figure 5-7: mifare® DESFire state diagram  ASSA ABLOY Identification Technologies GmbH 22
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    5.6.2.1  Activate PICC  Before accessing a DESFire card, the card must be selected. A mifare® DESFire card has a 7 byte UID. After activation, the card is powered up and ready to accept a mifare® DESFire command. Application 0 is selected automatically. 5.6.2.2 Select application To jump into another application, the application has to be selected. An application can be seen as a directory, which contains up to 16 files. The size of the application depends on the stored files. 5.6.2.3  Login to application Specific access rights can be set for each application. Login to an application allows to change the organization of the application. Login to a file opens a secured file for access. A file can be accessed in four different ways: without any security or secured with MAC, single DES or triple DES. 5.6.2.4 Select file Before accessing a file, the file must be selected  5.6.2.5 Change file A selected file can be changed according its access rights. If a file is secured, a login is required before changes can be made. 5.6.2.6  Commit / Abort transaction Value files, backup files, linear record files and cyclic record files only adapt their values after the commit transaction command is given. Several files can be changed within an application at the same time. The abort transactions command annuls all changes within an application. Power loss will cancel all modifications too.  For more details about application settings and access rights refer to [2]. ASSA ABLOY Identification Technologies GmbH 23
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    6  ISO 14443 Type B ISO 14443 type B cards are supported.  6.1 SR176 The SR176 label contains only 30 bytes of data organized in two bytes per page. 6.1.1 Memory organization  block address  Byte 1  Byte 0 0Fh  Lock byte  RFU  Chip ID 0Eh User data … … 04h User data 03h Serial number 02h Serial number 01h Serial number 00h Serial number Figure 6-1: SR176 memory organization 6.1.2  Serial number UID The UID is stored in the first 4 pages. Page 00h contains the LSB of the UID.  Page 03h  Page 02h  Page 01h  Page 00h Byte 1h  Byte 0  Byte 1  Byte 0  Byte 1  Byte 0  Byte 1  Byte 0 Figure 6-2: SR176 Serial number ASSA ABLOY Identification Technologies GmbH 24
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    6.1.3 Lock byte The lock byte defines the write access condition of a pair of pages. Each bit can only be set once. This procedure is irreversible. This byte is implemented as an OTP.  Bit 7  Bit 6  Bit 5  Bit 4  Bit 3  Bit 2  Bit 1  Bit 0 Page 0Eh Page 0Fh Page 0Ch Page 0Dh Page 0Ah Page 0Bh Page 08h Page 09h Page 06h Page 07h Page 04h Page 05h Page 02h Page 03h Page 00h Page 01h Figure 6-3: Lock byte 6.1.4 Chip ID The Chip ID is defined in the low nibble of page 0Fh. It is manufacturer set and is used internally to select and separate single tags.  6.2 SRIX4K The SRIX4K label contains 512 bytes of data organized into four-byte pages. 6.2.1 Memory organization  Block address  Byte 3   Byte 2  Byte 1  Byte 0 FFh  OTP Lock Reg  ST Reserved  ST Reserved  Fixed Chip ID 7Fh User data … … 07h User data 06h  32 bits binary counter 05h  32 bits binary counter 04h  32 bits Boolean Area 03h  32 bits Boolean Area 02h  32 bits Boolean Area 01h  32 bits Boolean Area 00h  32 bits Boolean Area Figure 6-4: SRIX4K memory organization 6.2.2 Lock block Locking of blocks is not supported with this tag. ASSA ABLOY Identification Technologies GmbH 25
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    7 Hardware   Figure 7-1: Picture of the complete reader  ASSA ABLOY Identification Technologies GmbH 26
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    7.1 Mechanical dimensions  All Dimensions are in mm   Figure 7-2: Mechanical drawing with dimensions  ASSA ABLOY Identification Technologies GmbH 27
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    7.1.1 Features  •  Interface type:  USB 2.0 •  Dimensions:  205x130x93 (LxWxH), all in mm •  Reading Distance:  up to 90mm, depending on tag type •  SAM: supported2 •  Boot loader:  supported3 •  Drivers:  virtual COM port driver, DLL driver available •  Antenna: on board •  Signaling:  RFID activity indicator LED    Power LED    Contact Interface activity indicator LED    USB Online indicator LED •  Power Supply:  via USB                                              2 The integrated SAM socket is accessible by opening the housing 3 The boot loader makes it easy to download a firmware to the unit without replacing/dismantling the hardware. ASSA ABLOY Identification Technologies GmbH 28
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    7.1.2 External Connections 7.1.2.1 USB Cable The USB connector is located on the bottom side of the housing. Depending on the users preferences the cable can be put and easily fixed within one of three cable guides. Each cable guide leads the cable to one of three possible sides of the housing.  Figure 7-3: mechanical drawing, bottom view  7.1.2.2 Power Supply The power supply is automatically provided via the USB connection. Therefore the unit can only be connected to a powered USB hub. Non-powered USB hubs like often used in USB splitter units are not able to supply the reader with enough power. Depending on the internal protection of these units, they even may be damaged.  ASSA ABLOY Identification Technologies GmbH 29
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    7.1.2.3 SAM Socket The integrated SAM socket is accessible only by opening the housing.  •  Before opening the housing an ESD protection has to be used. •  The reader has to be unpowered and unpluged from the host system. It’s recommended to remove the USB cable on the reader side. •  Open the four screws on the bottom side with an appropriate screwdriver. •  Carefully remove the bottom part of the housing. Install the SAM. •  Close the bottom part of the housing and make sure both housing parts fit together. •  Carefully tighten the four screws again. If the screws are tightened too much, then housing might break.   Figure 7-4: position of internal SAM Socket  SAM Socket  ASSA ABLOY Identification Technologies GmbH 30
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    7.1.3  Function Control Indicator LEDs The reader comes with four integrated indicator LEDs.   Figure 7-5: Reader with activated indicator LEDs  ASSA ABLOY Identification Technologies GmbH 31
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    7.1.3.1 Power LED This LED shows the status of the power supply. If on, then enough power is provided by the USB hub to run the reader.     Figure 7-6: position and design of Power LED  7.1.3.2  RFID activity indicator LED This LED shows any activities on the reader’s contactless RFID interface. LED On means data is being sent to or received from the card.     Figure 7-7: position and design of RFID activity indicator LED  7.1.3.3  USB Online indicator LED This LED shows the status of the USB connection. If on, then the reader is connected with the host system.     Figure 7-8: position and design of USB Online indicator LED  ASSA ABLOY Identification Technologies GmbH 32
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    7.1.3.4 Contact Interface activity indicator LED This LED shows any activities on the reader’s contact interface. LED On means data is being sent to or received from the card.     Figure 7-9: position and design of contact interface activity indicator LED  ASSA ABLOY Identification Technologies GmbH 33
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    8  Software for contactless interface functions By default, data is transmitted at 9600, n, 8, 1, no handshaking. Two protocol modes are supported. The protocol mode is configured in the reader EEPROM. As factory default, the ASCII protocol is used. If the PC/SC driver has been installed on the host PC, then the commands of this chapter can’t be used as such. Only the PC/SC specification is valid in this case. The reader also can be installed with the standard USB driver. The driver can be downloaded from http://www.aaitg.com. This driver enables the usage of a virtual COM port on the host PC. Then all commands mentioned below can be used. 8.1 ASCII Protocol This protocol is designed for easy handling. The commands are issued using a terminal program. Data is transmitted as ASCII hexadecimal that can be displayed on any terminal program (i.e. HyperTerminal).  Command Data Variable length  Variable length Figure 8-1: ASCII protocol frame 8.2 Binary Protocol This protocol is designed for industrial applications with synchronization and frame checking. An addressing byte for party line (master/slave, multi-drop) is also included.  The protocol usually requires a device driver. Data is transmitted in binary mode. The reader uses an internal binary watchdog timer to ensure correct framing.   STX Station ID Length  Data  BCC  ETX 1 byte  1 byte  1 byte  Variable length  1 byte  1 byte Figure 8-2: Binary Frame Version 1  The binary frame version 2 is only sent to the host. It is implemented to give extended information to the host. Version 2 must be enabled in the Protocol configuration 2 register.  STX Station ID Length Flags  Data  BCC ETX 1 byte  1 byte  1 byte  1 byte  Variable length  1 byte  1 byteFigure 8-3: Binary Frame Version 2 ASSA ABLOY Identification Technologies GmbH 34
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    8.2.1 STX Start of transmission (02h) 8.2.2 Station ID Unique ID of the station 00h:  reserved for the bus master. Readers send response to this device ID. FFh:  Broadcast message. All devices will execute the command and send their response. 8.2.3 Length Length of the data block, including the flag byte, if binary protocol version 2 is activated. If length is set to zero, 256 data bytes are transmitted. The reader module only can send 256 data bytes, but can not receive commands with 256 bytes. 8.2.4 Flags The flag byte gives additional information to the host.  Bit 3 – Bit 7  Bit 1 – Bit 2  Bit 0 RFU  Leading Character Info  Error State  Error State If cleared, the command was processed successfully. If set, an error occurred.  Leading Character Info Bit 1 & 2 defines how to interpret the data in the binary frame.  Bit 2  Bit 1  Description 0  0  No leading character available, all values are hexadecimal.0  1  The data contains one leading character. 1  0  All data bytes are characters. 1 1  RFU 8.2.5 Data This part contains the command and the data. The command values are the same as in ASCII protocol mode (‘x’, ‘s’, …) whereas data is transmitted in binary mode. The length of the command block depends on the instruction. ASSA ABLOY Identification Technologies GmbH 35
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    8.2.6  Block Check Character (BCC) The BCC is used to detect transmission errors. The BCC is calculated XOR-ing each byte of the transmission frame excluding the STX/BCC and ETX characters. The flags are part of the data.  )/(...)/()()( 0NDataCommandXORXORDataCommandXORLengthXORStatIDBCC =   8.2.7 ETX End of transmission. (03h) 8.2.8 Remarks If the reader device receives an invalid instruction frame (i.e. wrong BCC) or the requested station ID does not match the internal ID of the reader, the command is not executed. The reader waits for the next valid frame. The automatic binary time-out (see protocol configuration register) is used to detect incomplete binary frames. 8.2.9 Examples:  02h 64h 01h 78h 1Dh 03h STX Station ID Length ‘x’  BCC ETX  This instruction frame will reset the reader module with the station ID 64h. ASSA ABLOY Identification Technologies GmbH 36
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    8.3 Register Set The reader has several system flags used for customization purposes. The flags are stored in its non-volatile EEPROM. The reader accepts changes to these settings only during the start-up phase. Clearing all RFU bits is recommended in order to guarantee compatibility with future releases.  The reader can store up to 32 authentication keys internally to login standard mifare®  cards. An additional 32 keys can be stored for DESFire authentication. All keys are read only and cannot be accessed via the interface lines. ASSA ABLOY Identification Technologies GmbH 37
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    8.3.1  EEPROM memory organization  Register Description 00h … 04h  Unique device ID; read only 05h … 09h  Administrative data; read only 0Ah Station ID 0Bh Protocol configuration 0Ch Baud rate 0Dh  Command Guard Time 0Eh Operation Mode 0Fh  Single shot time-out value 10h  Internal use / Do not change 11h  Internal use / Do not change 12h  Internal use / Do not change 13h Protocol configuration 2 14h  Reset Off Time 15h  Reset Recovery Time 16h  Application Family Identifier 17h  ISO 14443A Selection Time-out 18h  ISO 14443B Selection Time-out 19h  SR176 Selection Time-out 1Ah RFU 1Bh Protocol configuration 3 1Ch Page Start 1Dh  Internal use / Do not change 1Eh  Internal use / Do not change 1Fh Page number 20h - 7Fh  RFU 80h … EFh  User data Figure 8-4: EEPROM memory ASSA ABLOY Identification Technologies GmbH 38
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    8.3.2  Unique device ID (00h – 04h) The unique device ID identifies a reader module. It is factory programmed and cannot be changed. 8.3.3  Station ID (0Ah) The station ID is used in binary mode to address a device in party line set up. The station ID can range from 01h to FEh and can be set freely. The value 00h is reserved for the bus master. All readers send their response to this device. The broadcast message (FFh) forces all readers to response to the command. Default value is 01h. 8.3.4 Protocol configuration (0Bh) The protocol configuration register (PCON) specifies general behavior of the reader device. Default value is 41h.  Protocol configuration register Bit 7   Bit 6  Bit 5  Bit 4  Bit 3  Bit 2  Bit 1  Bit 0  Extend-ed ID Extend-ed  Protocol Single- shot  LED  New serial mode  Multitag Protocol  Auto- start Figure 8-5: Protocol configuration register  8.3.4.1  Auto start (default 1) If set, the reader device will start up in continuous read mode automatically.  8.3.4.2  Protocol (default 0) If set, the reader uses binary protocol mode. Refer to binary protocol for further information on the binary protocol format. Default setting = ASCII protocol (0). 8.3.4.3  Multitag (default 0) The Multitag flag will enable multi-tag recognition in continuous read mode. All tags are detected and displayed. Due to the more complex search algorithm, the continuous read command decreases its detection speed.  8.3.4.4  New serial mode (default 0) If set, new serial mode is enabled. The leading character ‘M’ is added to the serial number of ISO 14443 type A tags, a leading 'Z' character is added to ISO 14443 type B tags and a leading 'S' character for SR176 tags. ASSA ABLOY Identification Technologies GmbH 39
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    8.3.4.5  LED (default 0) If set the reader suppresses any LED activity. The user manages the state of the LEDs. 8.3.4.6  Single shot (default 0) If set, the reader displays the serial number of a tag in continuous read mode once within a specified time-out. The time-out is defined at EEPROM register 0Fh.  The delay time can be adjusted stepwise in 100ms steps. 00h indicates no delay and FFh indicates infinite delay.  8.3.4.7 Extended Protocol (default 1) If set, the transfer data telegram command supports ISO14443-4. The transfer data telegram command is only supported in normal mode, not in transmit / receive mode. ASSA ABLOY Identification Technologies GmbH 40
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    8.3.4.8  Extend ID (default 0) If set, the reader extends the serial number of tags with additional bytes.  ISO 14443 A tags (5/8/11 bytes transmitted)  Tag type  Serial number 1 byte  4 / 7 / 10 bytes Figure 8-6: ISO 14443 A Extended Serial number  The tag type byte indicates the type of cascade level.  Tag type  Description 01h  Cascade level 1 transponder 02h  Cascade level 2 transponder 03h  Cascade level 3 transponder Figure 8-7: ISO 14443 A tag type  ISO 14443 B tags (12 bytes transmitted)  Serial number  Application data  Protocol info  CID 4 bytes  4 bytes  3 bytes  1 byte Figure 8-8: ISO 14443 B Extended Serial number  For detailed description of Application Data, Protocol Info and CID, refer to the ISO 14443 documentation [1].  ASSA ABLOY Identification Technologies GmbH 41
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    8.3.5  BAUD, Baud rate control register (0Ch) The baud rate register defines the communication speed of the reader device. Default value is 00h.  Baud rate register Bit 7   Bit 6  Bit 5  Bit 4  Bit 3  Bit 2  Bit 1  Bit 0  RFU RFU RFU RFU RFU BS2  BS1  BS0 Figure 8-9: Baud rate register  This register defines the baud rate of the device.  BS2 BS1 BS0 Baud rate 0 0 0 9600 baud (default) 0 0 1 19200 baud 0 1 0 38400 baud 0 1 1 57600 baud 1 0 0 115200 baud 1  0  1  230400 baud (depends on the used interface chip) 1  1  0  460800 baud (depends on the used interface chip) Figure 8-10: Baud rate settings  With the high baud rates (230400 and 460800 baud), proper operation depends on the interface chip used. Please note that some of the interface chips available do not support these high baud rates.  ASSA ABLOY Identification Technologies GmbH 42
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    The following table describes the exact baud rates used by the reader. Baud rate  Exact baud rate  Difference 9600 baud  9576 baud  -0.25 % 19200 baud  19261 baud  0.32 % 38400 baud  38523 baud  0.32 % 57600 baud  58448 baud  1.47 % 115200 baud  113000 baud  -1.91 % 230400 baud  241545 baud  4.84 % 460800 baud  483091 baud  4.84 % Figure 8-11: Exact baud rates  The following table describes the communication settings Description 8 data bits No parity bit 1 stop bit No flow control Figure 8-12: Communication settings 8.3.6  Command Guard Time (0Dh) The Command Guard Time is used to ensure that commands are not sent to fast consecutively. Following commands are sent after the guard time is elapsed. One time slice is around 37,8us. The longest timeout value is 9,6ms (FFh). The default value is 20h (1,2ms). 8.3.7  OPMODE, operating mode register (0Eh) The operation mode register defines which tag types the reader supports. This register enables fast tag recognition because only defined tag types are requested.  Operation mode register Bit 7 (MSB)  Bit 6  Bit 5  Bit 4  Bit 3  Bit 2  Bit 1  Bit 0 (LSB) RFU RFU RFU RFU RFU SR176 ISO 14443B ISO 14443A Figure 8-13: Operation mode register ASSA ABLOY Identification Technologies GmbH 43
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    8.3.8  Single Shot Time-out (0Fh) The time-out value defines the delay time between two responses of the reader. It only has effect in continuous read mode. To enable the time-out, the single shot flag has to be set. See the protocol configuration register above. One time-out slice is around 100ms. Exact timing depends on the protocol used. Value 00h indicates no delay time. Default value is 0Ah (1 second).  8.3.9  Protocol configuration 2 (13h) The protocol configuration register 2 (PCON2) further specifies the general behavior of the reader device. Default value is 00h.  Protocol configuration 2 register Bit 7   Bit 6  Bit 5  Bit 4  Bit 3  Bit 2  Bit 1  Bit 0  Disable ISO 14443 -4 Error Handling Enable ISO 14443B Anti-collision Reset Recovery Time Multiplier Noisy Environ-ment Enable binary frame v2 Disable start-up message Disable multi-tag reset Figure 8-14: Protocol configuration register  8.3.9.1  Disable multi-tag reset (default 0) If set, the reader does not reset before the multi-tag list and multi-select command have been performed. 8.3.9.2 Disable start-up message (default 0) If set, the reader suppresses the start-up message in ASCII mode. This flag is ignored in binary protocol mode. 8.3.9.3  Enable binary frame v2 (default 0) If set, the reader sends version 2 binary frames. The get station ID command always sends version 1 binary frames! 8.3.9.4 Noisy Environment (default 0) If set, the continuous read mode can only be aborted with the '.' character. When working in a noisy environment, the probability for a reception of an arbitrary/stochastic sign/command is quite high. This implies a high probability of an unintentional command execution. To reduce this probability, only one character (out of 255) is chosen (‘.’) to be interpreted as the continuous read stop command. ASSA ABLOY Identification Technologies GmbH 44
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    8.3.9.5  Reset Recovery Time Multiplier (default 0) Multiplies the Reset Recovery Time, including the recovery time of the field reset command.  Reset Recovery Time Multiplier  Reset Recovery Time 0 1x 1 2x 2 3x 3 4x Figure 8-15: Reset Recovery Time Multiplier 8.3.9.6  Enable ISO14443 B Anti-collision (default 0) If set, the anti-collision algorithm for ISO 14443 B tags is enabled. 8.3.9.7  Disable ISO 14443-4 Error Handling (default 0) If set, ISO14443-4 Error Handling is disabled. The error handling always uses the TMR time-out.  8.3.10 Reset Off Time (14h) The Reset Off Time register represents the field off time in ms. This register is used for the select, continuous read and multi-tag commands. Default value is 0Ah.  8.3.11 Reset Recovery Time (15h) The Reset Recovery Time register represents the recovery time in ms after the field is turned on. This register is used for the select, continuous read and multi-tag commands. Default value is 25h.  8.3.12 Application Family Identifier (16h) The AFI (Application Family Identifier) is only supported for ISO14443B tags. If the set value is different from 00h, the AFI is implemented in the ReqB command of ISO14443B. Only transponders with an identical AFI will answer to the reader. Default value is 00h.  ASSA ABLOY Identification Technologies GmbH 45
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    8.3.13 Selection Time-out ISO 14443A (17h) The Selection Time-out represents the reader card communication time-out for the select, high speed select, continuous read, multilist, multiselect and mifare® login command with ISO 14443A tags. For a better reaction time use low values. One time slice is around 300us. The default value is 10h.  8.3.14 Selection Time-out ISO 14443B (18h) The Selection Time-out represents the reader card communication time-out for the select, high speed select, continuous read, multilist and multiselect commands with ISO 14443B tags. For a better reaction time, use low values. One time slice is around 300µs. The default value is 50h.  8.3.15 Selection Time-out SR176 (19h) The Selection Time-out represents the reader card communication time-out for the select, continuous read, multilist and multiselect command with SR176 tags. For a better reaction time, use low values. One time slice is around 300µs. The default value is 10h.  8.3.16 Protocol configuration 3 (1Bh) The protocol configuration register 3 (PCON3) further specifies the general behavior of the reader device. Default value is 00h.  Protocol configuration 3 register Bit 7   Bit 6  Bit 5  Bit 4  Bit 3  Bit 2  Bit 1  Bit 0  RFU  ReqA Extended ID Internal use / do not change  Page Read  RFU Disable automatic  ISO 14443-4 timeouts Figure 8-16: Protocol configuration register  8.3.16.1 Disable automatic ISO 14443-4 timeouts (default 0) If set the automatic ISO 14443-4 timeouts are disabled. The timeouts specified with TMR registers are used.  ASSA ABLOY Identification Technologies GmbH 46
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    8.3.16.2  Page read (default 0) If set the continuous read mode retrieves the content of the tag instead of the serial number. The register Page Start (1Ch) defines the start block and the Page Number (1Fh) defines the number of blocks to be read.  8.3.16.3  ReqA Extended ID (default 0) If set the Extended ID information for ISO14443 A tags replaces the cascade level information (1 byte) with Request A answer (2 bytes).  8.3.17 User data (80h - EFh) These registers are for free use. ASSA ABLOY Identification Technologies GmbH 47
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    8.4 Instruction Set  Following table describes all the commands of the reader device. Each command returns an answer to the host. Exceptions are mentioned explicitly. The RFID activity indicator LED acknowledges a successfully executed command. The RFID activity indicator LED indicates an error by changing its color to red. 8.4.1 Overview Common commands '!'  Test continuous read 'c' Continuous read '.'  Abort continuous read, refer to continuous read 'dg' / 'dn' / 'dr'  Set LED 'ds'  DES encryption / decryption of data 'f'  DESFire command set 'g' Get ID  'h'  High speed select 'm'  MultiTag select / tag list 'o+a' / 'o+b' / 'o+s'  Include tag type 'o-a' / 'o-b' / 'o-s'  Exclude tag type 'oa' / 'ob' / 'ot' / 'os'  Set tag type 'of'  Set configuration flags 'og'  Set configuration register 'poff' / 'pon'  Antenna power off/on 'pr' / 'pw'  Read / write user port 'q' Quiet 'rp'  Read EEPROM register 'r' / 'rb'  Read block 's' Select 'v' Get version 'w' / 'wb'  Write block 'wf'  Write DESFire key 'wm'  Write master key 'wp'  Write EEPROM register 'x' Reset Figure 8-17: Command overview (Part 1)  ASSA ABLOY Identification Technologies GmbH 48
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3     Common commands (Part2) 'y' Field reset ISO 14443 Type A only commands '+'  Increment value block (credit) '-'  Decrement value block (debit) '='  Copy value block (backup) 'l'  Login (authenticate tag) 'rv'  Read value block 'wv'  Write value block SR176 only commands 'k' Lock block Figure 8-18: Command overview (Part 2) ASSA ABLOY Identification Technologies GmbH 49
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3     DESFire command set 00h Authenticate 01h  Change Key Settings 02h  Get Key Settings 03h Change Key 04h  Get Key Version 05h Create Application 06h Delete Application 07h  Get Application IDs 08h Select Application 09h Format PICC 0Ah Get Version 0Bh  Get File IDs 0Ch  Get File Settings 0Dh Select File 0Eh  Change File Settings 0Fh  Create Standard Data File 10h  Create Backup Data File 11h  Create Value File 12h  Create Linear Record File 13h  Create Cyclic Record File 14h Delete File 15h  Read Data / Records 16h  Write Data / Record 17h Get Value 18h Credit 19h Debit 1Ah Limited Credit 1Bh  Clear Record File 1Ch Commit Transaction 1Dh Abort Transaction Figure 8-19: Command overview (Part 3)  ASSA ABLOY Identification Technologies GmbH 50
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    8.4.2 Error Codes Following figure shows an overview of all error messages of the reader device.   Error Code  Description ‘?’ Unknown command 'C'  Collision or CRC/MAC Error ‘F’ General failure ‘I’  Invalid value format, specified block does not match the value format ‘N’  No tag in the field 'O'  Operation mode failure or file not selected ‘R’ Command parameter out of range 'X' Authentication failed Xxh  DESFire error code Figure 8-20: Error codes ASSA ABLOY Identification Technologies GmbH 51
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    8.4.3 Common commands 8.4.3.1  Test Continuous Read This command tests the state of the continuous read command. This command only works in ASCII mode.  Command  Command Data '!' None  Answer  Answer Description 'F'  Continuous read mode is not active. '!'  Continuous read mode is active.  8.4.3.2 Continuous Read The reader device reads and displays serial numbers continuously while one or more tags remain in the field. This command stops if any character is sent to the reader module. The reader module returns the character ‘S’ (53h). The reader supports different tag types at the same time. To increase the reading performance switch to a single tag mode. If more than one tag of the same type should be detected at the same time, the Multitag flag must be activated. The response data length depends on the tag type.  Command  Command Data 'c' none  Answer  Answer Description data  Serial number (n bytes) 'N'  Error: No Tag in the field (only binary protocol) ASSA ABLOY Identification Technologies GmbH 52
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    8.4.3.2.1  Multitag continuous read mode If the Multitag flag is set in the Protocol Configuration (PCON) register the reader reads multiple tags continuously. 8.4.3.2.2 Auto start The continuous read mode is started automatically. The auto start flag must be set in the PCON register. 8.4.3.2.3 Noisy Environment If the Noisy Environment flag is set, the continuous read mode can only be aborted with the '.' character. 8.4.3.2.4 Binary mode This command is not fully supported in binary protocol mode. Continuous Read in binary mode does not start-up automatically at boot time, even if the corresponding EEPROM flag is set. Within the single shot time-out, only one response is sent.  8.4.3.2.5  Simple access control applications Serial numbers are always sent plain. Data encryption is activated after a successful login. For simple access control applications the use read-only blocks for the identification of the tag is recommended. Reading any block (even the manufacturer block) of the transponder will increase your security. ASSA ABLOY Identification Technologies GmbH 53
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    8.4.3.3 Set LED This command controls the LED activity. If the LED flag is set, the automatic LED function is switched off. The user can set the state of the LED manually.  Command  Command Data 'dg' None 'dr' None 'dn' None  Answer  Answer Description 'DG' 'DR' 'DN' String of LED state  Example  Command Answer Description 'dg'  DG  Switch on LED green, LED red off 'dr'  DR  Switch on LED red, LED green off 'dn'  DN  Switch off both LEDs  ASSA ABLOY Identification Technologies GmbH 54
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    8.4.3.4  DES encryption / decryption of data  This command returns 8 bytes of encrypted / decrypted data.   Command  Command Data 'ds' Options (1 byte) Key (8/16 bytes) / Key Number (1 byte) Data (8 byte)  Answer  Answer Description Data  Encrypted / Decrypted data (8 bytes)  Option byte  Option byte Bit 7   Bit 6  Bit 5  Bit 4  Bit 3  Bit 2  Bit 1  Bit 0  RFU RFU RFU RFU RFU Encode Key Length  Key Index  Key Index If set, the command only needs the key number (1 byte) instead of the key (8/16 bytes). The key number corresponds to the key number used in the "wf" command  Key Length If set, the command uses the TDES algorithm with 16-byte key. If cleared, the command uses the DES algorithm with 8-byte key.  Encode Setting this flag encodes the data. Clearing this flag decodes the data.  ASSA ABLOY Identification Technologies GmbH 55
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    8.4.3.5 Get ID This command returns the station ID of the reader device. The answer is time slotted to enable the detection of all devices in party line mode. The station ID has only effect in binary mode.  Command  Command Data 'g' None  Answer  Answer Description Data  Station ID of the reader device (1 byte)  ASSA ABLOY Identification Technologies GmbH 56
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    8.4.3.5.1  Binary Protocol Version 2 This command never sends version 2 binary frames. 8.4.3.5.2 High speed select This command selects a card in the antenna field (according to the selection criteria) or prepares a multiselect command, switches to high baud rates and enables 256-byte frames. If execution is successful, the command returns the UID of the selected card and the used baud rate. The reader automatically detects the maximum frame size of the card. The reader also tries to communicate to the transponder with the specified baud rate. If no communication is possible, the reader will automatically decrease the speed to the next lower value.  This command can also force the reader to the communication speed and frame size of the tag to the specified values. This is only needed if the high speed select is done manually with the transfer command.  Command  Command Data ‘h’  option byte (1 byte)  00h … select a single card with 106kBaud 02h … select a single card with 212kBaud 04h … select a single card with 424kBaud 08h … select a single card with 848kBaud  10h … prepare next multiselect for 106kbaud 12h … prepare next multiselect for 212kbaud 14h … prepare next multiselect for 424kbaud 18h … prepare next multiselect for 848kbaud  20h … forces reader to 106kBaud 22h … forces reader to 212kBaud 24h … forces reader to 424kBaud 28h … forces reader to 848kBaud  30h – 38h … force tag frame size  ASSA ABLOY Identification Technologies GmbH 57
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    Answer  Answer Description Data (n bytes) + frame size and baud rate (1byte) serial number + frame size used and baud rate 'F' Error: General failure ‘N’  Error: No Tag in the field  Example  Command Description h08 1234567890ABCD84  Select the card with UID 1234567890SABCD. The card supports a 256-byte frame size and 424kBaud on the air interface.  ASSA ABLOY Identification Technologies GmbH 58
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    8.4.3.5.3  Answer from 0xh and 1xh The lower nibble contains the baud rate used for the air interface.  Baud Rate  Description x0 106kBaud x2 212kBaud x4 424kBaud x8 848kBaud Figure 8-21: Baud Rate values  The higher nibble contains the frame size used for the air interface.  Frame Size  Description 0x 16 Bytes 1x 24 Bytes 2x 32 Bytes 3x 40 Bytes 4x 48 Bytes 5x 64 Bytes 6x 96 Bytes 7x 128 Bytes 8x 256 Bytes Figure 8-22: Frame Size 8.4.3.5.4  Answer from 2xh and 3xh The option byte is returned as the answer. 8.4.3.5.5  Select a single tag No previous continuous read is required. The command executes an automatic field reset.  8.4.3.5.6 Extended ID See above for more information on Extended ID.  The RATS answer is inserted between the serial number and baud rate / frame size byte for ISO14443 A tags. ASSA ABLOY Identification Technologies GmbH 59
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    8.4.3.5.7 Multiple tags This command with parameter 1xh prepares the next multiselect command as a high-speed select. Any other command will disable the preparation.  8.4.3.5.8  RATS Guard Time SFGT A high-speed select with parameters 0xh and 1xh automatically waits the SFGT guard time gotten from the tag before sending the PPS command.  8.4.3.6 Multi-Tag Selection / List This command detects several tags at the same time. It replaces the fast select command ('s') in multiple tag surroundings. The Multi-Tag List command lists all tags with their serial numbers. Use the Multi-Tag Select command to select a single tag. Each tag has to be selected separately.  Command  Command Data 'm'  Serial number (n bytes) <CR> (1 byte)  Answer  Answer Description Data serial number 'N'  Error: No Tag in the field  Example  Command Description m<CR> 04E9E700000000  first card 34030F07    second card 02      number of detected tagsm04E9E700000000<CR> Select card with its serial number   8.4.3.6.1 Multi-tag list Sending a <CR> as the first parameter, the reader returns a list of all tags present in the antenna field. In the end the total number of tags detected is returned.  ASSA ABLOY Identification Technologies GmbH 60
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    8.4.3.6.2 Reading distance Each card needs a specific amount of power. The reader always provides the same amount of power. Therefore, the reading distance will decrease if more tags are present. Basically, the reading distance depends on the tag, the antenna and the tuning of the antenna. 8.4.3.6.3 Multi-tag select Using the serial number with <CR> as parameter, the corresponding tag will be selected. High-level interactions can be performed addressing only this card. All other tags remain silent. 8.4.3.6.4 Multi-tag reset The antenna field reset can be deactivated with the Protocol configuration 2 register. By suppressing the antenna field reset, it is possible to detect only new tags in the antenna field. 8.4.3.6.5  Maximum number of tags The maximum number of tags in the antenna field is limited to 30 and by the physical characteristics of the antenna.  ASSA ABLOY Identification Technologies GmbH 61
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    8.4.3.7  Include tag type This command includes a specific tag type to those addressed by the reader device.  Command  Command Data ‘o+’  tag type (1 byte)  Answer  Answer Description 'O+' + tag type (1 byte)  Command code + String of tag type  Tag type character Refer to Set tag type.  Example  Command Description o+a  Include ISO14443-A to the tag types addressed by the reader device.  ASSA ABLOY Identification Technologies GmbH 62
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    8.4.3.8  Exclude tag type This command excludes a specific tag type from being addressed by the reader device.  Command  Command Data ‘o-’  Tag type (1 byte)  Answer  Answer Description 'O-' + tag type (1 byte)  Command code + String of tag type  Tag type character Refer to Set tag type.  Example  Command Description o-a  Exclude ISO14443-A from the tag types addressed by the reader device.  ASSA ABLOY Identification Technologies GmbH 63
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    8.4.3.9  Set tag type This command sets up the reader for a specific tag type. The continuous read function will speed up because only this type of tag is addressed. After a reset, the reader starts as defined in its start-up configuration.  Command  Command Data 'o'  ISO type (1 byte) 'a' … ISO 14443 Type A 'b' … ISO 14443 Type B 's' … SR176 't'  … activate all tags  Answer  Answer Description 'OA' 'OB' 'OS' 'OT' String of tag type  Example  Command Description oa  Sets the reader device to address ISO14443-A type tags.  ASSA ABLOY Identification Technologies GmbH 64
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    8.4.3.10  Set Configuration Flags This command allows setting some configuration flags just in time; no reset is needed. The values are not stored in the EEPROM, therefore the changed values are not available after a reset.  Command  Command Data of  flag type (1 byte) data (1 byte)  Answer  Answer Description Data (1 byte)  Current state of changed flag. 'R'  Error: Out of range  Example  Command Description of0101 Answer: 01 Enables the New Serial Mode flag.  ASSA ABLOY Identification Technologies GmbH 65
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    Flag Types The following table shows the Flag Type with its corresponding flag from the specified Protocol Configuration Register.  Flag Type  Corresponding Flag  Protocol Configuration Register Valid values 00h  Multitag  1  00 / 01 01h  New Serial Mode  1  00 / 01 02h  LED  1  00 / 01 03h  Single Shot  1  00 / 01 04h  Extended Protocol  1  00 / 01 05h  Extended ID  1  00 / 01 06h  Disable Multitag Reset  2  00 / 01 07h  Noisy Environment  2  00 / 01 08h  Reset Recovery Time Multiplier  2  00 … 03 09h  Enable ISO14443 B Anti-collision  2  00 / 01 0Ah  Disable ISO14443-4 Error Handling  2  00 / 01 0Bh  Disable automatic  ISO14443-4 timeouts  3  00 / 01 0Dh  Page Read  3  00 / 01 11h  ReqA Extended ID  3  00 / 01 Figure 8-23: Flag Type with corresponding flag 8.4.3.10.1  Out of range failure 'R' The entered flag type is out of range.  ASSA ABLOY Identification Technologies GmbH 66
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    8.4.3.11 Set Configuration Register This command allows setting some configuration registers just in time; no reset is needed. The values are not stored in the EEPROM; therefore the changed values are not available after a reset.   Command  Command Data og  Register type (1 byte) data (1 byte)  Answer  Answer Description Data (1 byte)  Current state of changed register. 'R'  Error: Out of range  Example  Command Description og0450 Answer: 50 Sets the Reset Recovery Time to 50h.  ASSA ABLOY Identification Technologies GmbH 67
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    Register Types The following table shows the Register Type with its corresponding register.  Register Type  Corresponding Register 00h  Single shot time-out value 01h  Internal use / Do not change 02h  Internal use / Do not change 03h  Reset Off Time 04h  Reset Recovery Time 05h  ISO 14443A Selection Time-out 06h  ISO 14443B Selection Time-out 07h  SR176 Selection Time-out 08h AFI 0Ch  Page Read Start 0Dh  Page Read Number 0Eh  Command Guard Time Figure 8-24: Register Type with corresponding register 8.4.3.11.1  Out of range failure 'R' The entered register type is out of range.  ASSA ABLOY Identification Technologies GmbH 68
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    8.4.3.12  Antenna power on/off This command controls the antenna power. It can be used to decrease the power consumption of the reader.  Command  Command Data 'pon'  Switch reader on 'poff'  Put reader in standby mode  Answer  Answer Description 'P' Positive acknowledge  Example  Command Description poff  Put reader in standby mode  8.4.3.12.1 Power off The reader enters standby mode. Power consumption is decreased. All tags in the antenna field are powered off and reset. Standby mode is only entered manually. To switch off the whole unit, pin 16 (Enable) has to be set to logic low. 8.4.3.12.2 Power on The reader leaves standby mode and is ready for the next command. Sending a tag command (i.e. select, continuous read) the reader is powered up. ASSA ABLOY Identification Technologies GmbH 69
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    8.4.3.13  Read/Write user port This command sets or reads the state of the user port (pin 14) of the OEM reader device. The port is set either as output or as input.  Command  Command Data 'pr' none 'pw'  State of user port (1 Byte)  Answer  Answer Description Data  State of user port (1 Byte) 'C'  Error: Error correction fails 'F'  Error: Transmission Error / No answer received  Example  Command Description pr  Reads user port pw01  Sets user port state to high  8.4.3.13.1 Read port The port read command returns the current state of the USER port.  Port state  Description 00h  USER port is low 01h  USER port is high Figure 8-25: Read USER port return values  ASSA ABLOY Identification Technologies GmbH 70
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    8.4.3.13.2 Write port If user port is used as an output, a 1kΩ resistor has to be integrated into the wire. Otherwise the reader device can be damaged.  Port state  Description 00h  Sets USER port to low 01h  Sets USER port to high 02h – 7Fh  RFU 80h - FFh  Sends a serial data frame and checks the received frame Figure 8-26: Write User port settings  Sending a Data Frame If the highest bit (MSB) is set in the State of the User Port, the command sends a serial data frame out the USER port. The frame includes a start bit, 8 data bits, parity bit and a stop bit.  Transmit Frame  Description Low Start bit Low RFU Data Bit 6  State of the User Port Bit 6 Data Bit 5  State of the User Port Bit 5 Data Bit 4  State of the User Port Bit 4 Data Bit 3  State of the User Port Bit 3 Data Bit 2  State of the User Port Bit 2 Data Bit 1  State of the User Port Bit 1 Data Bit 0  State of the User Port Bit 0 Parity Bit  Even Parity Bit High Stop Bit Figure 8-27: Sending Serial Data Frame  After 2ms Guard Time the answer should be received on the User Port otherwise an error is returned.   ASSA ABLOY Identification Technologies GmbH 71
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    Receive Frame  Description Low Start bit Error Bit  If set, an error was detected. Data Bit 6  State of the User Port Bit 6 Data Bit 5  State of the User Port Bit 5 Data Bit 4  State of the User Port Bit 4 Data Bit 3  State of the User Port Bit 3 Data Bit 2  State of the User Port Bit 2 Data Bit 1  State of the User Port Bit 1 Data Bit 0  State of the User Port Bit 0 Parity Bit  Even Parity Bit High Stop Bit Figure 8-28: Receiving Serial Data Frame  If the Error bit is set or the Parity Bit is not correct, the Write User Port command returns an error code.  8.4.3.14 Quiet This command sets a selected tag into halt state.  Command  Command Data 'q' none  Answer  Answer Description 'Q'  Halt state successfully set. 'N'  Error: No Tag in the field  8.4.3.14.1  ISO 14443 Type A With ISO14443 Type A tags, the Quiet command always answers with 'Q' because the halt command does not send any acknowledge.  ASSA ABLOY Identification Technologies GmbH 72
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    8.4.3.14.2  ISO 14443 Type B Some ISO14443 Type B tags do not support this command or do not respond. ‘Quiet’ is an ISO 14443-4 command, so it will work only if the ‘Deselect’ command is supported by the corresponding transponder. 8.4.3.14.3 SR176 With SR176 tags the Quiet command always answer with 'Q' because the completion command does not send any acknowledge.   8.4.3.15 Read block This command reads a data block on a card. The size of the returned data depends on the tag used. The block address range depends on the tag as well.  Command  Command Data 'r'  Block address (1 byte), valid range 00h – 40h 'rb'  Block address (1 byte)  Answer  Answer Description Data  data block (depends on tag type) 'F'  Error: read failure 'N'  Error: No tag in field 'O'  Error: Operation mode failure 'R'  Error: Out of range  Example  Command Description rb05  Reads block 05.  8.4.3.15.1  Read failure 'F' This error is returned if either the reader receives bad data or the block address exceeds the block address range of the sector. ASSA ABLOY Identification Technologies GmbH 73
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    8.4.3.15.2  No tag in field 'N' The tag does not respond. There is either no tag present or addressed. 8.4.3.15.3  Operation mode failure 'O' The presented tag is not ISO14443 type A compliant. 8.4.3.15.4  Out of range failure 'R' The block address of the 'r' command is higher than 40h.  The block address of the 'r' command conflicts with other commands, therefore the block address has to be limited to 40h. Use the 'rb' command instead.  8.4.3.16  Read reader EEPROM This command reads the internal reader EEPROM. It contains all start-up parameters and the device ID. Changes in the start-up settings will only go into effect after a reset of the device.  Command  Command Data 'rp'  EEPROM address (1 byte) 00h … EFh  Answer  Answer Description Data  EEPROM data (1 byte) 'R'  Error: Out of range failure  Example  Command Description rp0B  Reads protocol configuration register.  8.4.3.16.1  Out of range failure 'R' The entered EEPROM address is not valid. ASSA ABLOY Identification Technologies GmbH 74
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    8.4.3.17 Select This command selects a single card in the antenna field. It can only be used in single tag mode. If successfully executed, the command returns the UID of the selected card. The reader detects the length of the UID automatically.  Command  Command Data 's' None  Answer  Answer Description Data serial number 'N'  Error: No Tag in the field  Example  Command Description s 1234567890ABCD Select the card with UID 1234567890SABCD.  8.4.3.17.1  Select a single tag No previous continuous read is required. The command executes an automatic field reset.  8.4.3.17.2 Extended ID See above for more information on Extended ID. 8.4.3.17.3 Multiple tags This command is designed for fast access of a single tag in the field. If multiple cards are used the 'm' instruction has to be used instead. ASSA ABLOY Identification Technologies GmbH 75
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    8.4.3.18   Get Version This command returns the current version of the reader module.  Command  Command Data 'v' None  Answer  Answer Description 'Dual 2.2' + <CR> + <LF>  ASCII Mode 02 00 08 44 75 61 6C 20 32 2E 32 32 03  Binary Mode  Example  Command Description v ‘Dual 2.2’ Version of the reader module  ASSA ABLOY Identification Technologies GmbH 76
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    8.4.3.19  Write DESFire key This command is used to store a key into the DESFire key memory of the reader. The reader can store up to 32 keys. DESFire keys can be used for fast access to applications on a card.  Command  Command Data 'wf'  Key number (1 byte)  00h … 1Fh Key (16 bytes)  Answer  Answer Description data  Written key (16 bytes) 'F' Error: Write failure 'R'  Error: Out of range  Example  Command Description wf0000112233445566778899AABBCCDDEEFF  Store key 00112233445566778899AABBCCDDEEFFh in EEPROM (key number 0).  8.4.3.19.1  Out of range failure 'R' The entered key number exceeds the permitted range.  8.4.3.19.2  Writing DESFire Keys Keys are write only. It is not possible to read the keys. Nevertheless the reader returns correct error messages if the writing process fails. A verification of the DESFire key can only be done using an appropriate card and following successful login. 8.4.3.19.3 Using DESFire keys for authentication DESFire keys may be used for DESFire tag authentication or DES/TDES encryption/decryption. Each key is 16 bytes long and stored redundantly for data security. ASSA ABLOY Identification Technologies GmbH 77
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    8.4.3.20 Write master key This command stores a mifare® Standard key into the master key memory of the reader. The reader can store up to 32 keys.  Command  Command Data 'wm'  Key number (1 byte)  00h … 1Fh Key (6 bytes)  Answer  Answer Description data  Written key (6 bytes) 'F' Error: Write failure 'R'  Error: Out of range  Example  Command Description wm00112233445566 Store key 112233445566h in EEPROM (key number 0). wm02A0A1A2A3A4A5  Store transport key 1 in EEPROM key 2.  8.4.3.20.1  Out of range failure 'R' The entered key index exceeds the address range. 8.4.3.20.2 Writing master keys Keys are Write-Only. It is not possible to read the keys. Nevertheless the reader returns correct error messages if the writing process fails. A verification of the master key can only be done using an appropriate card and following successful login. 8.4.3.20.3 Using master keys for authentication Master keys may be used for ISO-14443 A tag authentication. It is possible to use every stored key for key A as well as key B authentication. Each key is 6 bytes long and stored redundantly for data security. ASSA ABLOY Identification Technologies GmbH 78
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    8.4.3.21   Write block This command writes data to a block. A read is done automatically after every write to ensure correct writing.  Command  Command Data 'w'  Block address (1 byte), valid range 00h – 40h Data (n bytes) 'wb'  Block address (1 byte) Data (n bytes)  Answer  Answer Description Data  Data block (depends on tag type) 'F' Error: Write failure 'N'  Error: No tag in field 'O'  Error: Operation mode failure 'R'  Error: Out of range  Example  Command Description wb0511223344 Writes data 11223344 on block 05.  8.4.3.21.1 Write failure 'F' This error is displayed if bad transmission conditions are given. If the block address exceeds the physical number of blocks of a tag, this error is shown. 8.4.3.21.2  No tag error 'N' This error is returned if no tag is present or the card does not respond. 8.4.3.21.3  Operation mode failure 'O' The tag is not ISO14443 type A compliant. ASSA ABLOY Identification Technologies GmbH 79
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    8.4.3.21.4  Out of range failure 'R' The block address of the 'w' command is higher than 40h.  The block address of the 'w' command conflicts with other commands, therefore the block address has to be limited to 40h. Use the 'wb' command instead. 8.4.3.22 Write EEPROM Writes to the internal reader EEPROM. It contains all start-up parameters and the device ID. Changes to the start-up settings will only go into effect after a reset of the device.  Command  Command Data 'wp'  Address (1 byte), valid range 0Ah - EFh Data (1 byte)  Answer  Answer Description Data  EEPROM data (1 byte) 'F'  Error: Read after write failure 'R'  Error: Out of range failure  Example  Command Description wp0A01  Set EEPROM address 0A (Station ID) to 01h  8.4.3.22.1  Out of range failure 'R' The entered address exceeds the address range. ASSA ABLOY Identification Technologies GmbH 80
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    8.4.3.23  Reset This command executes a power on (software) reset. New configuration settings will be loaded. It resets all tags in the antenna field.  Command  Command Data 'x' None  Answer  Answer Description 'Dual 2.2' + <CR> + <LF>  ASCII Mode None Binary Mode  8.4.3.23.1  Disable Start-up Message If the start-up message is disabled in the protocol configuration register 2, the ASCII mode does not respond with the version of the reader. 8.4.3.23.2 Reset Timing The power up timing depends on environmental conditions such as voltage ramp up. For handheld devices the timing can vary based on the charge state of the battery. ASSA ABLOY Identification Technologies GmbH 81
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    8.4.3.24 Field Reset The field reset switches off the antenna field for the specified duration. All tags need a certain amount of time to initialize before a command can be processed. The second byte specifies the field recovery time.  Command  Command Data 'y'  Off time in milliseconds (1 byte) Field recovery time in milliseconds (1 byte)  Answer  Answer Description 'Y'  After the field reset the reader sends back a ‘Y’ to acknowledge the command.  ASSA ABLOY Identification Technologies GmbH 82
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    8.4.4  ISO 14443 Type A only commands 8.4.4.1  Increment value block (credit) Increments a value block with a defined value. A read is done automatically after a write to verify data integrity. The command fails if the source block is not in value block format. A previous login is needed to access a block.  Command  Command Data '+'  Block (1 byte) Value (4 bytes)  Answer  Answer Description Data  Value (4 bytes) 'I'  Error: value block failure 'F'  Error: increment failure 'N'  Error: No tag in field 'O'  Error: Operation mode failure  Example  Command Description +0400000001  Adds 1 to value block 4 +0500000100  Adds 256 to value block 5  8.4.4.1.1  No value block 'I' Specified block does not match the value format. The value block is corrupted. A backup block can be used to restore the correct value. 8.4.4.1.2  Increment failure 'F' The Increment failure indicates a general failure during the increment procedure or inability to read after the write process. ASSA ABLOY Identification Technologies GmbH 83
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    8.4.4.1.3  No tag error 'N' The reader does not detect a response from the tag. There is either no tag present or the tag does not respond to the request. 8.4.4.1.4  Operation mode failure 'O' The tag is not ISO14443 type A compliant. 8.4.4.2  Decrement value block (debit) Decrements a value block with a defined value. A read is done automatically after the write to verify data integrity. The command fails if the source block is not in value block format. A previous login is needed to access a block.  Command  Command Data '-'  Block (1 byte)  Value (4 bytes)  Answer  Answer Description Data  Value (4 bytes) 'I'  Error: value block failure 'F'  Error: increment failure 'N'  Error: No tag in field 'O'  Error: Operation mode failure  Example  Command Description -0400000001  Subtract 1 to value block 4 -0500000100  Subtract 256 to value block 5  8.4.4.2.1  No value block 'I' Specified block does not match the value format. The value block is corrupted. A backup block can be used to restore the correct value. ASSA ABLOY Identification Technologies GmbH 84
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    8.4.4.2.2 Decrement failure 'F' The Decrement failure indicates a general failure during the decrement procedure or inability to read after the write process. 8.4.4.2.3  No tag error 'N' The reader does not detect a response from the tag. There is either no tag present or the tag does not respond to the request. 8.4.4.2.4  Operation mode failure 'O' The tag is not ISO14443 type A compliant. 8.4.4.3  Copy value block (backup) Copies a value block to another block of the same sector. A read is done automatically after the write to ensure data integrity. Used for backup and error recovery. A previous login is needed to access a block.  Command  Command Data '='  Source block (1 byte)  Target block (1 byte)  Answer  Answer Description Data  New value of target block (4 bytes). 'I'  Error: value block failure 'F'  Error: increment failure 'N'  Error: No tag in field 'O'  Error: Operation mode failure  Example  Command Description =0405  Copy value block 4 to block 5 =0506  Copy value block 5 to block 6  ASSA ABLOY Identification Technologies GmbH 85
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    8.4.4.3.1 Target block The target block does not need to be a valid value block. If the source block is not in value format, the command fails. 8.4.4.3.2  No value block 'I' Source value block is not in a valid value block. The value block is corrupted. A backup block can be used to restore the correct value. 8.4.4.3.3  Copy failure 'F' The Copy failure indicates a general failure during the copy procedure or inability to read after the write process. 8.4.4.3.4  No tag error 'N' The reader does not detect a response of the tag. There is either no tag present or the tag does not respond to the request. 8.4.4.3.5  Operation mode failure 'O' The tag is not ISO14443 type A compliant. ASSA ABLOY Identification Technologies GmbH 86
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    8.4.4.4  Login (authenticate tag) Performs an authentication in order to access one sector of a mifare® card. Only one sector can be accessed at a time. Optionally, the command can be used to transmit the key data to the reader-stored keys, in the reader EEPROM. To store keys in the EEPROM, the write master key command is used. It is possible to store up to 32 master keys in the reader EEPROM. The login requires a successful select.  Command  Command Data 'l'  Sector (1 byte), valid range 00h - 3Fh Key type (1 byte)    AAh  authenticate with key type A   FFh  authenticate with key type A, transport key   FFFFFFFFFFFFh   BBh  authenticate with key type B   10h … 2Fh  authenticate with key type A using stored    key (00h … 1Fh)   30h … 4Fh  authenticate with key type B using stored    key (00h … 1Fh) Key (6 bytes) / <CR> (1 byte), optional   By transmitting <CR> instead of the keydata   authentication is done with manufacturer’s transport    keys (A0A1A2A3A4A5h, B0B1B2B3B4B5h,  FFFFFFFFFFFFh).  Answer  Answer Description data  Login status (1 byte) 'L' Login success 'F' Error: General failure 'N' Error: No tag 'O'  Error: Operation mode failure 'R'  Error: Out of range 'X'  Error: Authentication failed  ASSA ABLOY Identification Technologies GmbH 87
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    Example  Command Description l02AA<CR>  Authenticate for sector 2, using the transport key A (A0A1A2A3A4A5h, key type A) l3FBB<CR>  Authenticate for sector 63, using the transport key 2 (B0B1B2B3B4B5h, key type B) l04FF<CR>  Authenticate for sector 4, using the transport key 3 (FFFFFFFFFFFFh, key type A) l0FAAFFFFFFFFFFFF  Authenticate for sector 15, using key  FFFFFFFFFFFFh, key type A l0E14  Authenticate for sector 14, using EEPROM key 4, key type A l0530  Authenticate for sector 5, using EEPROM key 0, key type B l0732  Authenticate for sector 7, using EEPROM key 2, key type B l0110  Authenticate for sector 1, using EEPROM key 0, key type A l0ABBFF12FFFFFF35  Authenticate for sector 10, using key FF12FFFFFF35h, key type B  8.4.4.4.1  No tag error 'N' The reader does not detect a response from the tag. There is either no tag present or the tag does not respond to the request. 8.4.4.4.2  Operation mode failure 'O' The tag is not ISO14443 type A compliant. 8.4.4.4.3  Out of range failure 'R' The entered key type or the sector is out of range. ASSA ABLOY Identification Technologies GmbH 88
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    8.4.4.4.4 <CR> Three transport keys are implemented to access cards quickly. By transmitting <CR> instead of the key, the reader module uses the transport keys for the login procedure.  Command Description LxxAA<CR>  Authenticate for sector xx, using the transport key 1 (A0A1A2A3A4A5h, key type A) LxxBB<CR>  Authenticate for sector xx, using the transport key 2 (B0B1B2B3B4B5h, key type B) LxxFF<CR>  Authenticate for sector xx, using the transport key 3 (FFFFFFFFFFFFh, key type A)  8.4.4.4.5 Login with key data from EEPROM Each key stored in the reader EEPROM can be used as type A or type B key. To use a key as type A, the value 10h must be added to the key index. 30h must be added to use a key as type B.  8.4.4.4.6 Usage of key A, key B mifare® cards support two different crypto keys for each sector. Each key is 32 bits long and is stored in the sector trailer (last block of the sector) on the card. It is possible to set different access rights for each key. ASSA ABLOY Identification Technologies GmbH 89
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    8.4.4.5  Read value block Reads a value block. The command checks if data is in value block format. The read value block command needs a successful login.  Command  Command Data 'rv'  Value block (1 byte)  Answer  Answer Description Data  Read value (4 bytes) 'F' Error: General failure 'I'  Error: value block failure 'N'  Error: No tag in field 'O'  Error: Operation mode failure  Example  Command Description rv04  Reads value of block 4.  8.4.4.5.1  No value block 'I' The value read back after the write value command is not a value block. Data was written corruptly. 8.4.4.5.2  No tag error 'N' This means that the tag does not respond, because either there is no tag present or none of the tags in the field are authenticated ('l' instruction). 8.4.4.5.3 General failure 'F' In addition to the case of a data read failure caused by bad transmission conditions, this error is returned if a sector is addressed which is not located in the authenticated area. 8.4.4.5.4  Operation mode failure 'O' The tag is not ISO14443 type A compliant. ASSA ABLOY Identification Technologies GmbH 90
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    8.4.4.6  Write value block This command formats a block as a value block containing a 32-bit value. A read is performed automatically after the write. Value blocks need a complete 16-byte block due to redundant storage. A successful login is required to run the command.  Command  Command Data 'wv'  Value block (1 byte) Value (4 bytes)  Answer  Answer Description Data  Written value (4 bytes) 'I'  Error: value block failure 'F'  Error: increment failure 'N'  Error: No tag in field 'O'  Error: Operation mode failure  Example  Command Description wv05010055EF  Writes value 010055EFh to block 5.  8.4.4.6.1  Invalid value 'I' The value read back after the write value command is not a value block. Data was written corruptly. 8.4.4.6.2 Write failure 'F' In addition to the case of a data read failure caused by bad transmission conditions, this error is returned if a sector is addressed which is not located in the authenticated area. 8.4.4.6.3  No tag error 'N' This error is returned if no tag is present or the card does not respond. ASSA ABLOY Identification Technologies GmbH 91
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    8.4.4.6.4  Operation mode failure 'O' The tag is not ISO14443 type A compliant. 8.4.4.6.5 Writing values The write value block command is designed to create blocks in value format. This command requires write access to the specified block. Using this instruction for ticketing operations is not recommended. For ticketing applications, special instructions (Increment/Decrement/Copy) are available. ASSA ABLOY Identification Technologies GmbH 92
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    8.4.5  SR176 only commands 8.4.5.1 Lock block This command locks a block permanently.   Command  Command Data 'k'  Block address (1 byte)  Answer  Answer Description data  'K' + page address 'F'  Error: Lock failure 'N'  Error: No tag in field 'O'  Error: Operation mode failure (only SR176 tags supported) 'X'  Error: Block already locked  Example  Command Description k05 K05 Lock block 05.  8.4.5.1.1  Operation mode failure 'O' The presented tag is not a SR176 tag. 8.4.5.1.2 Apply settings After locking a block permanently, the tag needs to be selected for the settings to apply.  ASSA ABLOY Identification Technologies GmbH 93
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    8.4.6  DESFire command set This command set provides easy communication with DESFire tags. The reader handles all encryption and decryption automatically. The length byte includes all data and command bytes. For more information about DESFire, refer to DESFire documentation [2].  The DESFire command set is only available for ISO 14443 Type A tags; with other tags, the Error Code 'O' is returned.  A DESFire command has the following syntax:  Command Data 'f'  Length byte (1 byte) DESFire Command Code (1 byte) Data (n bytes)  Example  Command Description f0107  Get Application IDs. f020D00  Select File 00h.  All the following DESFire commands are listed without length byte.  ASSA ABLOY Identification Technologies GmbH 94
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    8.4.6.1 Authenticate Authenticates to a DESFire card. Authentication depends on access conditions of an application or file. ROM keys can be used to login. The reader can store up to 32 keys internally.  Command  Command Data 00h  Key number on tag (1 byte) Key number (1 byte) / Key on reader (16 bytes)  Answer  Answer Description Data  Authentication status (1 byte) 'L' Login success 'F' Error: General failure 'N'  Error: No tag in field 'X'  Error: Authentication failed Xxh  DESFire status / error code, refer to DESFire documentation  Example  Command Description f03000000  Authenticate using key 00h of the tag and key 00h stored in reader ROM. f12020011223344556677 8899AABBCCDDEEFF  Authenticate using key 02h of the tag and key 00112233445566778899AABBCCDDEEFFh.  ASSA ABLOY Identification Technologies GmbH 95
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    8.4.6.2  Change Key Settings This command changes the key settings of a selected application.  Command  Command Data 01h  Settings (1 byte)  Answer  Answer Description data  Status code (1 byte) 00h Success 'N'  Error: No tag in field Xxh  DESFire status / error code, refer DESFire documentation  Example  Command Description f0201FF Answer: 00 change key settings to FFh.  ASSA ABLOY Identification Technologies GmbH 96
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    8.4.6.3  Get Key Settings This command gets the key settings of a selected application. Settings of the currently selected application are returned. Additionally the maximum number of keys that can be stored in the application is displayed.  Command  Command Data 02h none  Answer  Answer Description 00h + Key settings (1 byte) + max. number of keys (1 byte) Key settings 'N'  Error: No tag in field Xxh  DESFire status / error code, refer DESFire documentation  Example  Command Description f0102 Answer: 000F01 Key settings of the application are 0F and key number 01 is used.  ASSA ABLOY Identification Technologies GmbH 97
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    8.4.6.4 Change Key This command changes the key of a selected application.  Command  Command Data 03h  Key number on tag (1 byte) New key (16 bytes) Old key (16 bytes)  Answer  Answer Description Data  Status code (1 byte) 00h Success 'F' Error: General failure 'N'  Error: No tag in field Xxh  DESFire status / error code, refer to DESFire documentation  Example  Command Description f22030000112233445566778899AABBCCDDEEFF00000000000000000000000000000000 Answer: 00 Key 00h is changed to 00112233445566778899AABBCCDDEEFFh.  ASSA ABLOY Identification Technologies GmbH 98
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    8.4.6.5  Get Key Version This command reads the key version of a key of a selected application.  Command  Command Data 04h  Key number on tag (1 byte)  Answer  Answer Description 00h + Key version  (1 byte) Key version 'N'  Error: No tag in field Xxh  DESFire status / error code, refer to DESFire documentation  Example  Command Description f020400 Answer: 0000 Key version 00h.  ASSA ABLOY Identification Technologies GmbH 99
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    8.4.6.6 Create Application This command creates an application on a tag. Applications can only be created in the master application (000000h).  Command  Command Data 05h  Application ID (3 bytes) Key settings (1 byte) Number of keys (1 byte)  Answer  Answer Description Data  Status code (1 byte) 00h Success 'N'  Error: No tag in field Xxh  DESFire status / error code, refer to DESFire documentation  Example  Command Description f06050000100F01 Answer: 00 Create application 000010h with one key.  ASSA ABLOY Identification Technologies GmbH 100
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    8.4.6.7 Delete Application This command deletes an application on a tag.  Command  Command Data 06h  Application ID (3 bytes)  Answer  Answer Description Data  Status code (1 byte) 00h Success 'N'  Error: No tag in field Xxh  DESFire status / error code, refer to DESFire documentation  Example  Command Description f0406000010 Answer: 00 Delete application 000010h.  ASSA ABLOY Identification Technologies GmbH 101
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    8.4.6.8  Get Application IDs This command returns all application IDs on a tag.  Command  Command Data 07h None  Answer  Answer Description 00h + Application IDs (3 bytes each) Application IDs 'N'  Error: No tag in field Xxh  DESFire status / error code, refer to DESFire documentation  Example  Command Description f0107 Answer: 00000010 Application 000010h is available on the tag  ASSA ABLOY Identification Technologies GmbH 102
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    8.4.6.9 Select Application This command selects a specific application. An application must be selected to access all files stored in it.  Command  Command Data 08h  Application ID (3 bytes)  Answer  Answer Description Data  Status code (1 byte) 00h Success 'N'  Error: No tag in field Xxh  DESFire status / error code, refer to DESFire documentation  Example  Command Description f0408000010 Answer: 00 Application 000010h is selected.  ASSA ABLOY Identification Technologies GmbH 103
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    8.4.6.10 Format PICC This command formats the tag. All applications are deleted. The format command requires successful authentication.  Command  Command Data 09h None  Answer  Answer Description Data  Status code (1 byte) 00h Success 'N'  Error: No tag in field Xxh  DESFire status / error code, refer to DESFire documentation  Example  Command Description f0109 Answer: 00 The tag is formatted successfully. All applications and files have been deleted.  ASSA ABLOY Identification Technologies GmbH 104
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    8.4.6.11 Get Version This command returns the production data of a tag.  Command  Command Data 0Ah none  Answer  Answer Description Data  Version (28 bytes)  For more detailed information refer to DESFire documentation.'F' Error: General failure 'N'  Error: No tag in field Xxh  DESFire status / error code, refer to DESFire documentation.  Example  Command Description f010A Answer: 040101000218050401010004180504453101366E108E26515D502003 Version string of DESFire tag.  ASSA ABLOY Identification Technologies GmbH 105
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    8.4.6.12  Get File IDs This command returns all file IDs found for a selected application.  Command  Command Data 0Bh none  Answer  Answer Description 00h + File IDs (1 byte each)  File IDs 'N'  Error: No tag in field Xxh  DESFire status / error code, refer to DESFire documentation  Example  Command Description f010B Answer: 000005 File with ID 00h and 05h exists.  ASSA ABLOY Identification Technologies GmbH 106
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    8.4.6.13  Get File Settings This command returns additional information of a file.  Command  Command Data 0Ch  File number (1 byte)  Answer  Answer Description 00h + File settings (n bytes)  File settings Length depends on file type.  For more detailed information refer to DESFire documentation. 'F' Error: General failure 'N'  Error: No tag in field xxh  DESFire status / error code, refer to DESFire documentation  Example  Command Description f020C00 Answer: 000000EEEE100000 File 00h is a standard data file with access conditions EEEEh and data length 100000h.  ASSA ABLOY Identification Technologies GmbH 107
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    8.4.6.14 Select File This command selects a specific file.  Command  Command Data 0Dh  File number (1 byte)  Answer  Answer Description Data  Status code (1 byte) 00h  Standard Data File selected 01h  Backup Data File selected 02h Value File selected 03h  Linear Record File selected 04h  Cyclic Record File selected 'N'  Error: No tag in field Xxh  DESFire status / error code, refer DESFire documentation  Example  Command Description f020D00 Answer: 00 File 00h has been successfully selected.  ASSA ABLOY Identification Technologies GmbH 108
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    8.4.6.15  Change File Settings This command changes the access rights of a selected file.  Command  Command Data 0Eh  Communication settings (1 byte) Access rights (2 bytes)  Answer  Answer Description Data  Status code (1 byte) 00h  Standard Data File selected 'N'  Error: No tag in field 'O'  Error: No file selected Xxh  DESFire status / error code, refer to DESFire documentation  Example  Command Description f040E010000 Answer: 00 Sets file to MAC secured with key 0000h.  Note For further information on communication settings and access rights, refer to the DESFire documentation. [2] ASSA ABLOY Identification Technologies GmbH 109
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    8.4.6.16  Create Standard Data File This command creates a Standard Data File in a selected application.  Command  Command Data 0Fh  File number (1 byte) Communication settings (1 byte) Access rights (2 bytes) File size (3 bytes)  Answer  Answer Description Data  Status code (1 byte) 00h  Standard Data File created 'N'  Error: No tag in field Xxh  DESFire status / error code, refer to DESFire documentation  Example  Command Description f080F0000EEEE100000 Answer: 00 Create standard data file with ID 00h.  Note For further information on communication settings and access rights, refer to the DESFire documentation.  ASSA ABLOY Identification Technologies GmbH 110
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    8.4.6.17  Create Backup Data File This command creates a Backup Data File in a selected application. Backup data files use a shadow register for data manipulation operations. The file number must be in the range from 00h to 07h.  Command  Command Data 10h  File number (1 byte) Communication settings (1 byte) Access rights (2 bytes) File Size (3 bytes)  Answer  Answer Description Data  Status code (1 byte) 00h  Backup Data File created 'N'  Error: No tag in field Xxh  DESFire status / error code, refer to DESFire documentation  Example  Command Description f081001000000100000 Answer: 00 Create backup data file with ID 01h. File is only accessible after login with key 00h  Note For further information on communication settings and access rights, refer to the DESFire documentation.  ASSA ABLOY Identification Technologies GmbH 111
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    8.4.6.18  Create Value File This command creates a Value File in a selected application. Value blocks are signed long numbers, which are stored in Intel format (LSB first). Value files use a shadow register for data manipulation operations. The file number must be in the range from 00h to 07h.  Command  Command Data 11h  File number (1 byte) Communication settings (1 byte) Access rights (2 bytes) Low Limit (4 bytes) High Limit (4 bytes) Value (4 bytes) Enable Limited Credit (1 byte)  Answer  Answer Description Data  Status code (1 byte) 00h Value File created 'N'  Error: No tag in field Xxh  DESFire status / error code, refer to DESFire documentation  Example  Command Description f12110503000000000000 666666663333333300  Answer: 00 Value file with ID 05h created. Transmission is secured using DES encryption with key 00h. Lower limit is 00000000h and high limit 66666666h. Default value is 33333333h.  Note For further information on communication settings and access rights, refer to the DESFire documentation.  ASSA ABLOY Identification Technologies GmbH 112
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    8.4.6.19  Create Linear Record File This command creates a Linear Record File in a selected application. Linear record files use a shadow register for data manipulation operations. The file number must be in the range from 00h to 07h.  Command  Command Data 12h  File number (1 byte) Communication settings (1 byte) Access rights (2 bytes) Record Size (3 bytes) Number of Records (3 bytes)  Answer  Answer Description Data  Status code (1 byte) 00h  Linear Record File created. 'N'  Error: No tag in field Xxh  DESFire status / error code, refer to DESFire documentation  Example  Command Description f0B1202010000010000 100000  Answer: 00 Linear record file with ID 02 and MAC security is created. Record size is 000001h and number of records is 000010h.  Note For further information on communication settings and access rights, refer to the DESFire documentation.  ASSA ABLOY Identification Technologies GmbH 113
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    8.4.6.20  Create Cyclic Record File This command creates a Cyclic Record File in a selected application. Cyclic record files use a shadow register for data manipulation operations. The file number must be in the range from 00h to 07h.  Command  Command Data 13h  File number (1 byte) Communication settings (1 byte) Access rights (2 bytes) Record Size (3 bytes) Number of Records (3 bytes)  Answer  Answer Description Data  Status code (1 byte) 00h  Cyclic Record File created 'N'  Error: No tag in field Xxh  DESFire status / error code, refer to DESFire documentation  Example  Command Description f0B1303010000020000 100000  Answer: 00 Cyclic record file with ID 03 and MAC security is created. Record size is 000001h and number of records is 000010h.  Note For further information on communication settings and access rights, refer to the DESFire documentation.  ASSA ABLOY Identification Technologies GmbH 114
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    8.4.6.21 Delete File This command deletes a file on tag in a selected application.  Command  Command Data 14h  File number (1 byte)  Answer  Answer Description Data  Status code (1 byte) 00h  File is successfully deleted 'N'  Error: No tag in field Xxh  DESFire status / error code, refer to DESFire documentation  Example  Command Description f021403 Answer: 00 File with ID 03h is deleted.  ASSA ABLOY Identification Technologies GmbH 115
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    8.4.6.22  Read Data / Records This command reads data of a selected Data or Record file.  Command  Command Data 15h  Offset (3 bytes) Length (1 byte)  Answer  Answer Description 00h + Data (n bytes) Data 'C'  Error: CRC or MAC does not match 'N'  Error: No tag in field 'O'  Error: No file selected 'R'  Error: Out of range Xxh  DESFire status / error code, refer to DESFire documentation  Example  Command Description f051500000005 Answer: 000011223344 Read 5 bytes from offset 000000h. f051500000000 Answer: 0011112222 Read all records of the record file.   8.4.6.22.1  Our of range 'R' If the data received exceeds the maximum of 232 bytes, the error R ('Out of range') is returned.  Note If performance is important, 232 bytes should be used for plain data and 224 should be used for enciphered and MACed data, because in this case, the smaller frames from the DESFire tag are filled up completely. ASSA ABLOY Identification Technologies GmbH 116
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    8.4.6.23 Data files The offset defines the start address of the reading. The length specifies the number of bytes, which are read. The offset and length must not exceed the limits of the file. 8.4.6.24 Record file Records are always read one at a time. The offset points to the record within the record file from which the reading starts. The length defines the number of records that have to be read. The response always starts with the oldest record. Offset 000000h points to the latest record. Length 00h reads all records of the record file.  ASSA ABLOY Identification Technologies GmbH 117
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    8.4.6.25  Write Data / Record This command writes data to a selected Data or Record file. A write record command will append a new record to a linear record file until all records are filled up. Using cyclic record files, the oldest record is updated when all records are used up. The write record command must be validated with the commit/abort transaction command.  Command  Command Data 16h  Offset (3 bytes) Data (n bytes)  Answer  Answer Description Data  Status code (1 byte) 00h Success 'C'  Error: CRC or MAC does not match 'N'  Error: No tag in field 'O'  Error: No file selected 'R'  Error: Out of range Xxh  DESFire status / error code, refer to DESFire documentation  Example  Command Description f09160100001122334455 Answer: 00 Writes data 1122334455 starting at position 000001h to a data file or a new record.  ASSA ABLOY Identification Technologies GmbH 118
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    8.4.6.25.1  Our of range 'R' If sent data exceeds the maximum of 232 bytes, the error R ('Out of range') is returned.  Note If performance is important 232 bytes should be used for plain data and 224 should be used for enciphered and MACed data, because in this case the smaller frames from the DESFire tag are filled up completely.  8.4.6.26 Get Value This command reads a value block of a selected value file.  Command  Command Data 17h None  Answer  Answer Description 00h +  Value (4 bytes) Value 'C'  Error: CRC or MAC does not match 'N'  Error: No tag in field 'O'  Error: No file selected Xxh  DESFire status / error code, refer to DESFire documentation  Example  Command Description f0117 Answer: 0022222222 value 22222222h is currently stored in the value file.  ASSA ABLOY Identification Technologies GmbH 119
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    8.4.6.27 Credit This command increases a value in a selected value file. All value manipulation commands are accumulated in a shadow register. This shadow register is only written after a successful commit transaction command.  Command  Command Data 18h  Data (4 bytes)  Answer  Answer Description Data  Status code (1 byte) 00h Success 'N'  Error: No tag in field Xxh  DESFire status / error code, to refer DESFire documentation  Example  Command Description f051878563412 Answer: 00 The value 12345678h is added to the selected value file.  ASSA ABLOY Identification Technologies GmbH 120
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    8.4.6.28 Debit This command decreases a value in a selected value file. All value manipulation commands are accumulated in a shadow register. This shadow register is only written after a successful commit transaction command.  Command  Command Data 19h  Data (4 bytes)  Answer  Answer Description Data  Status code (1 byte) 00h Success 'N'  Error: No tag in field xxh  DESFire status / error code, refer to DESFire documentation  Example  Command Description f051944332211 Answer: 00 The value 11223344h is charged from the selected value file.  ASSA ABLOY Identification Technologies GmbH 121
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    8.4.6.29 Limited Credit This command limits the credit to a selected value file. The value depends on all previous debit values. It enables to cancel misattributed debits. All value manipulation commands are accumulated in a shadow register. This shadow register is only written after a successful commit transaction command.  Command  Command Data 1Ah  Data (4 bytes)  Answer  Answer Description Data  Status code (1 byte) 00h Success 'N'  Error: No tag in field Xxh  DESFire status / error code, refer to DESFire documentation  Example  Command Description f051A11111111 Answer: 00 The value 11111111h is added to the selected value file. A previous debit sum of at least 11111111h is needed.  ASSA ABLOY Identification Technologies GmbH 122
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    8.4.6.30  Clear Record File This command clears the whole content of a selected record file. After a commit / abort transaction command the changes are written.  Command  Command Data 1Bh None  Answer  Answer Description Data  Status code (1 byte) 00h Success 'N'  Error: No tag in field Xxh  DESFire status / error code, refer to DESFire documentation  Example  Command Description f011B Answer: 00 All records of the record file are erased.  ASSA ABLOY Identification Technologies GmbH 123
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    8.4.6.31 Commit Transaction This command validates all previous write operations to backup data or record files and data manipulations on value files in a selected application. All changes are done at the same time.  Command  Command Data 1Ch None  Answer  Answer Description Data  Status code (1 byte) 00h Success 'N'  Error: No tag in field Xxh  DESFire status / error code, refer to DESFire documentation  Example  Command Description f011C Answer: 00 All changes successfully executed.  ASSA ABLOY Identification Technologies GmbH 124
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    8.4.6.32 Abort Transaction This command aborts all previous write operations to backup data or record files and data manipulations on value files of a selected application. No data is changed. Power loss will be interpreted as an abort transaction command.  Command  Command Data 1Dh None  Answer  Answer Description Data  Status code (1 byte) 00h Success 'N'  Error: No tag in field xxh  DESFire status / error code, refer to DESFire documentation  Example  Command Description f011D Answer: 00 All modifications are cancelled.   ASSA ABLOY Identification Technologies GmbH 125
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    9  Software for contact interface functions The contact interface is fully CCID and PC/SC compliant. Therefore there are no own commands available. The PC/SC documentation can be downloaded from PC/SC workgroup web site http://www.pcscworkgroup.com/.   In order to develop own application S/W it’s recommended to use the Microsoft SDK, as the reader supports ScardControl commands. ASSA ABLOY Identification Technologies GmbH 126
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    10  Frequently Asked Questions 10.1 Getting Started To test and interface the ACGPass e-ID Desktop Reader, you just need to connect the reader via the USB cable with a Microsoft Windows 2000® or Microsoft Windows XP® based PC. You do not need a power supply for the reader. Once the reader is connected then please just follow the instruction on the PC screen. The PC/SC driver for the reader should come together with the reader. It is also available via the next ASSA ABLOY ITG sales office, the web site http://www.aaitg.com/ 10.2 Personalized ACGPass e-ID Desktop Reader In applications that are using the binary protocol mode, personalization maybe required. Use the Utility program to set up your reader correctly. Ask the reseller or the ASSA ABLOY ITG sales representative for the Utility software or download it from http://www.aaitg.com/.  Minimum requirements are Microsoft Windows 2000®, Microsoft Windows XP® and the reader connected to the PC.   ASSA ABLOY Identification Technologies GmbH 127
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    10.3 What type of mifare® card should I use?  The mifare® standard is designed for multi-application environments. It contains 16 sectors each with 2 individual keys, access conditions, and 3 data or value blocks. Some applications use the 1 Kbytes of the mifare® Standard Card Memory only as storage area.  mifare® Ultralight has no crypto unit on chip. It only supports 16 blocks.  mifare® Standard 4k cards have the same features as mifare® Standard cards but increased memory capacity.  10.4 How safe is mifare® Standard for cashless payment? Security is always a feature of the overall system, not of the components. It requires careful design.  A properly designed system will require ALL barriers to be hacked in order to be broken. For good design start identifying possible attacks and then create barriers to block them. mifare® was specifically designed for cashless payment applications. The mifare® concept provides the following security barriers:   •  Anti-collision/-selection •  Atomic value transaction •  Ciphered communication •  Storage of values and data protected by mutual authentication •  Weak field keys that allow decrement only •  Stored keys in the reader that are not readable •  Keys in the card that are not readable •  A brute force attack based on trying many different keys is limited by the transaction time (several ms) of the card and would last virtually forever.  ASSA ABLOY Identification Technologies GmbH 128
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    The Application can and should provide more barriers: •  Sector access conditions. It is possible to assign access conditions in a way that only decrementing of values is allowed with the keys used in the field. So even a manipulated field station cannot be used to increment the value on the cards. As a general rule, key A is used as a field key, allowing only to read and decrement values, and key B is used to format the card or increment values. •  Diversified keys. To make life even harder for attackers, keys can be modified using the serial number and memory content of the card. So each card uses different keys and a listening attack on the reader interface would be hopeless.  •  Limiting cash volume stored on a card •  Do not use the transport keys (keys programmed at the time of delivery) for ticketing applications! •  Ciphered and scrambled data storage •  Sabotage alarm •  Even higher security with contact less controller cards like mifare® DESFire, mifare® ProX, mifare® Smart MX etc.  ASSA ABLOY Identification Technologies GmbH 129
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    10.5 Using a mifare® card This example demonstrates the detection of a card in the antenna field with continuous read and the reading of a page.  Command Answer c  Activate continuous read mode  B2197B58 a card responds with its serial number . S abort continuous read mode s B2197B58 select card l01AAFFFFFFFFFFFF L login into sector 1 with key FFFFFFFFFFFFh key type A rb04 00112233445566778899AABBCCDDEEFFread block 04 c  Activate continuous read mode to detect a new card Figure 10-1: Using a mifare® card  ASSA ABLOY Identification Technologies GmbH 130
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    10.6 Using a DESFire card 10.6.1 Create a plain standard data file After activation, application 0 is selected automatically. Default access rights of application 0 require a login to create an application. The following example illustrates the successful creation of a plain standard data file.  Command Answer s 04E10E00000000 activate card f1200000000000000000000000000 0000000000  L login to application 0 f06050000100F01 00 create application with ID 000010 f0408000010 00 select application with ID 000010 f080F0000eeee10000000 00 create plain standard data file with ID 00 Figure 10-2: Create plain standard data file of a DESFire card  10.6.2 Use a plain standard data file The next example demonstrates the use of a plain standard data file, such as that created in the previous example. No login needed since the file is plain.   Command Answer s 04E10E00000000 activate card f0408000010 00 select application with ID 000010 f020D00 00 select file with ID 00 f09160000001122334455 00 write data to standard data file f051500000010 0011223344550000000000000000000000read data from standard data file Figure 10-3: Change data of a plain standard data file ASSA ABLOY Identification Technologies GmbH 131
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    10.6.3 Create a value file Basically, each application is created in the same way. The access rights of an application can be adjusted to freeze the application organization. In this case, a login to the application is needed to make any changes to the application. Regardless of the application access rights, a file can be selected using its ID. Before accessing a secured file, a login to the application is needed. A successful login allows changing all the files in the application that use the same key. A value file has a special structure. If a value file is changed the changes are only accepted after a commit transaction command. This feature allows modifying several files of an application and changing all the contents at the same time.  The following example illustrates the creation of a value file using DES encipher.  Command Answer s 04E10E00000000 activate card f1200000000000000000000000000 0000000000  L login to application 0 f06050000110F01  00 create application with ID 000011 f0408000011 00 select application with ID 000011 f12110003000000000000FFFFFF 7Ff5555555500  00 create value file with initial value  55555555 with ID 00. File is secured with DES encipher Figure 10-4: Create a plain standard data file on a DESFire card ASSA ABLOY Identification Technologies GmbH 132
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    10.6.4 Use a DES secured value file The next example demonstrates the use of a DES secured value file, such as the one created in the previous example. After the selection of the application, a login with the key of the value file is needed to access the file. Modification of the value file is accepted after the commit transaction command is given.  Command Answer s 04E10E00000000 activate card f0408000011 00 select application with ID 000010 f03000000 L login to application  f020D00 02 select file with ID 00 (value file) f0117   0055555555 read value file data f051911111111 00 debit value file with 11111111 f0117 0055555555 read value file, no modification done f011c 00 commit transaction, modification is done f0117 0044444444 read value file, verify modification Figure 10-5: Change data of a plain standard data file  ASSA ABLOY Identification Technologies GmbH 133
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    11 References  [1]  ISO/IEC 14443 Part 1-4, Identification Cards – Contact less integrated circuit(s) cards – Proximity cards  [2]  DESFire Documentation, Philips, http://www.semiconductors.philips.com   [3]  Data Encryption Standard (DES), FIPS PUB 46-3,  Reaffirmed 1995 October 25  [4]  ASSA ABLOY ITG Antenna Design Guide  [5]  Philips; Application Note, mifare® & I-Code, Micore Reader IC family Directly Matched Antenna Design  ASSA ABLOY Identification Technologies GmbH 134
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    12 Appendix A: SAM  Please note that the power supply of the SAM adapter must be turned off during the entire card insertion period, otherwise SAM card damage might occur.  For proper usage of the SAM, a 100nF capacitor between Vcc and GND is necessary.  ASSA ABLOY Identification Technologies GmbH 135
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    13 Appendix C: Timings   tCMD tEXEC tRES      PC:  Request →        Reader:     ← Response  Command tEXEC [ms] Comments Common commands Cont. read (locked tag)  2.8 – 22.6 + Reset Off and Recovery Time Cont. read (worst case)  54  + 3x Reset Off and Recovery Time DES en/decryption  9.6 – 9.7   TDES en/decryption  28.7 – 28.8  High-speed select 'h08' (locked tag)  8.9 – 14.4 + Reset Off and Recovery Time + SFGT High-speed select 'h08' (no tag)  15  + 3x Reset Off and Recovery Time High-speed select 'h08' (worst case)  14.7  + 3x Reset Off and Recovery Time + SFGT Multiselect (locked tag)  5.8 – 11.4 + Reset Off and Recovery Time Multiselect (no tag)  67  + Reset Off and Recovery Time Multiselect (worst case)  67  + Reset Off and Recovery Time Antenna on  0.2  + Reset Recovery Time Antenna off  0.2   Port read  0.1   Port write  0.1   Read block  1.8 – 2.2   Write block  8.2 – 11   Reset 13.2  Select (locked tag)  5.4 – 22.8 + Reset Off and Recovery Time Select (no tag)  38  + 3x Reset Off and Recovery Time Select (worst case)  55  + 3x Reset Off and Recovery Time ASSA ABLOY Identification Technologies GmbH 136
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    Command tEXEC [ms] Comments ISO 14443 Type A only commands Increment value block  18.4   Decrement value block  18.4   Copy value block  18.5   Read value block  2.3   Write value block  7.9 - 10.5   Mifare Login  4.9   Power conditions Power on  79  Does not include rise time of power supply Enable on  85   Figure 13-1: Timings  Default Command Guard Time (20h = 1.2ms) was used.  All timing data is advisory application information and does not form part of the specifications. It may change in future firmware releases. Please also note that all values specified in the above table depend on the tag used and Command Guard Time. ASSA ABLOY Identification Technologies GmbH 137
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    14  Appendix D: Release Notes 14.1 Version History 14.1.1 Dual 2.0 Initial Release. 14.1.2 Dual 2.1 •  High-speed select supports anti-collision and the forcing of the air interface transmission rate and the frame size •  Automatic ISO 14443-4 error handling (can be switched on/off) •  RATS answer is returned with high-speed select command for ISO14443 A tags and with Extended ID flag set •  Support for the ISO14443 B anti-collision algorithm •  Extended Protocol flag now switches on/off, complete ISO14443-4 handling •  ISO14443-4 chaining and WTX improved •  'of' and 'og' commands get new parameters •  Selection time-out for ISO14443-4 A tags is set to 10h 14.1.3 Dual 2.2 •  Sending serial data frames over User Port •  Automatic ISO 14443-4 timeouts can be switched on/off •  Request A information within ISO 14443 A Extended ID answer can be switched on / off •  Command Guard Time added •  'of' and 'og' commands get new parameters •  Chaining of 256 byte frame support •  Support of ASK GTML tag •  Page read functionality added •  Additional protocol register PCON3 •  Some bug fixes  ASSA ABLOY Identification Technologies GmbH 138
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    14.1.4 Dual 2.3 •  Reset To Default via MCLR Pin possible •  Added 'ra' command: Resend last answer •  SAM Command: Option byte modified, Improvements •  Default value of ISO 14443B Selection timout register changed to 10h •  Asynchronous Baudrates possible with Highspeed select •  Added command that returns the version of the bootloader •  Added command "rd"/"wd": read/write multiple blocks •  "DisableReadAfterWrite" Flag added •  Bug fixes  14.2 Revision history  Date Revision number 02/18/2005  Version 2.1, Rev. 1.0 05/17/2005  Version 2.2, Rev. 1.0 ??/??/2006  Version 2.3, Rev. 1.0  ASSA ABLOY Identification Technologies GmbH 139
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    15  Appendix F: Approvals / Certificates 15.1 CE Declaration ASSA ABLOY Identification Technologies GmbH declares that, in conformity with the European CE requirements specified in the EMC Directive 89/336/EEC, ACGPass e-ID Desktop Reader, described in this manual is CE compliant  The relevant documents are available. If any of the ACGPass e-ID Desktop Reader is operated from a mains power supply, all power connections and additional components of the final device must also comply with the EMC Directive 89/336/EEC directive. Customers selling into Europe must themselves make sure that the final device conforms to the EMC Directive 89/336/EEC directive.  For ASSA ABLOY Identification Technologies GmbH, the compliance of important international regulations into business practices are a priority and the implementation of the EMC Directive 89/336/EEC is fully in line with the company’s commitment to continuously improve its Quality Management System.    Walluf, January 2006 ASSA ABLOY Identification Technologies GmbH  ASSA ABLOY Identification Technologies GmbH 140
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    15.2 FCC Declaration ASSA ABLOY Identification Technologies GmbH declares that, in conformity with the U.S. Directive FCC part 15, the ACGPass e-ID Desktop Reader described in this manual, is FCC part15 compliant  The relevant documents are available. If any of the ACGPass e-ID Desktop Reader is operated from a mains power supply, all power connections and additional components of the final device must also comply with the US FCC Part 15 directive. Customers selling into the USA must themselves make sure that the final device conforms to the US FCC Part 15 directive. Caution: Any changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate the equipment. For ASSA ABLOY Identification Technologies GmbH, the compliance of important international regulations into business practices are a priority and the implementation of the FCC part 15 is fully in line with the company’s commitment to continuously improve its Quality Management System.    Walluf, January 2006 ASSA ABLOY Identification Technologies GmbH  ASSA ABLOY Identification Technologies GmbH 141
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3    15.3 RoHS Compliance ASSA ABLOY Identification Technologies GmbH declares that, in conformity with the Directive 2002/95/EC about the Restriction of Hazardous Substances (RoHS), its ACGPass e-ID Desktop Reader products, listed in this manual, are RoHS compliant  The following substances    Cadmium and cadmium compounds  Lead and lead compounds  Mercury and mercury compounds  Hexavalent chromium compounds  Polybrominated biphenyls (PBB)  Polybrominated Diphenylethers (BPDE)  are contained in accordance with the limits required by the Directive.   For ASSA ABLOY Identification Technologies GmbH, the integration of environmental considerations into business practices are a priority and the implementation of RoHS Directive is fully in line with the company’s commitment to continuously improve its Quality Management System.    Walluf, January 2006 ASSA ABLOY Identification Technologies GmbH    ASSA ABLOY Identification Technologies GmbH 142

Navigation menu