ASSALOY Identification Technologies RDHS-0404D1-0X RFID Reader User Manual

ASSA ABLOY Identification Technologies GmbH RFID Reader

User Manual

Download: ASSALOY Identification Technologies RDHS-0404D1-0X RFID Reader User Manual
Mirror Download [FCC.gov]ASSALOY Identification Technologies RDHS-0404D1-0X RFID Reader User Manual
Document ID795138
Application IDbX/MVyc2gfW4Of71OoUAag==
Document DescriptionUser Manual
Short Term ConfidentialNo
Permanent ConfidentialNo
SupercedeNo
Document TypeUser Manual
Display FormatAdobe Acrobat PDF - pdf
Filesize108.77kB (1359587 bits)
Date Submitted2007-05-22 00:00:00
Date Available2007-05-22 00:00:00
Creation Date2007-02-09 11:49:49
Producing SoftwareAcrobat Distiller 7.0.5 (Windows)
Document Lastmod2007-02-09 12:04:38
Document TitleUser Manual
Document CreatorAcrobat PDFMaker 7.0.7 für Word
Document Author: Stefan Trautner

ACGPass e-ID Desktop Reader
Document No.: 1510-USM-01-0-01
Firmware: Version Dual ISO 2.3
User Manual
ASSA ABLOY Identification Technologies GmbH
Am Klingenweg 6A
65396 Walluf
Germany
Phone +49 (0) 6123 791 0
Fax +49 (0) 6123 791 199
www.aaitg.com
Document Nr.: QSI-040902-OM-1-a-UserManual Dual ISO Module, V2.0
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
Edition One - October 2006
ASSA ABLOY Identification Technologies GmbH (ASSA ABLOY ITG) reserves the
right to make changes to its products or services or to discontinue any product or
service at any time without notice. ASSA ABLOY ITG provides customer assistance
in various technical areas, but does not have full access to data concerning the use
and applications of customer's products.
Therefore, ASSA ABLOY ITG assumes no liability and is not responsible for
customer applications or product or software design or performance relating to
systems or applications incorporating ASSA ABLOY ITG products. In addition, ASSA
ABLOY ITG assumes no liability and is not responsible for infringement of patents
and/or any other intellectual or industrial property rights of third parties, which may
result from assistance provided by ASSA ABLOY ITG.
ASSA ABLOY ITG products are not designed, intended, authorized or warranted to
be suitable for life support applications or any other life critical applications that could
involve potential risk of death, personal injury or severe property or environmental
damage.
With the edition of this document, all previous editions become void. Indications
made in this manual may be changed without previous notice.
Composition of the information in this manual has been done to the best of our
knowledge. ASSA ABLOY ITG does not guarantee the correctness and
completeness of the details given in this manual and may not be held liable for
damages ensuing from incorrect or incomplete information. Since, despite all our
efforts, errors may not be completely avoided, we are always grateful for your useful
tips.
The installation instructions given in this manual are based on advantageous
boundary conditions. ASSA ABLOY ITG does not give any guarantee promise for
perfect function in cross environments.
The ACG logo is a registered trademark of ASSA ABLOY Identification Technologies
GmbH.
Copyright © 2006 ASSA ABLOY Identification Technologies GmbH (ASSA ABLOY
ITG)
Microsoft®, Microsoft Windows 98SE®, Microsoft Windows ME®, Microsoft Windows
NT®, Microsoft Windows 2000® and Microsoft Windows XP® are registered
trademarks of the Microsoft Corporation USA.
Pentium® is a registered trademark of the Intel Corporation USA
mifare® is a registered trademark of NXP Semiconductor N.V.
ASSA ABLOY Identification Technologies GmbH
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
All other products mentioned in this document might be brands or brand names of
the different suppliers.
This document may be downloaded onto a computer, stored and duplicated as necessary to support the use of the related ASSA ABLOY ITG products. Any other type
of duplication, circulation or storage on data carriers in any manner not authorized by
ASSA ABLOY ITG represents a violation of the applicable copyright laws and shall
be prosecuted.
ASSA ABLOY Identification Technologies GmbH
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
Safety Instructions / Warning - Read before start-up!
•
The device may only be used for the intended purpose designed by for the
manufacturer. The operation manual should be conveniently kept available at
all times for each user.
•
Unauthorized changes and the use of spare parts and additional devices that
have not been sold or recommended by the manufacturer may cause fire,
electric shocks or injuries. Such unauthorized measures shall exclude any
liability by the manufacturer.
•
The liability-prescriptions of the manufacturer in the issue valid at the time of
purchase are valid for the device. The manufacturer shall not be held legally
responsible for inaccuracies, errors, or omissions in the manual or
automatically set parameters for a device or for an incorrect application of a
device.
•
Repairs may be executed by the manufacturer only.
•
Only qualified personnel should carry out installation, operation, and
maintenance procedures.
•
Use of the device and its installation must be in accordance with national legal
requirements and local electrical codes.
•
When working on devices the valid safety regulations must be observed.
ASSA ABLOY Identification Technologies GmbH
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
Preface
Read This First
About This Guide
This manual describes the ACGPass e-ID Desktop Reader. Its goal is to describe the
reader, how it works, how to integrate it and how to use it.
If You Need Assistance
Our application center is located in Europe to provide direct support. For more
information, please contact your nearest ASSA ABLOY ITG Sales Center. The
contact addresses can be found on our home page:
http://www.aaitg.com/
ASSA ABLOY Identification Technologies GmbH
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
Table of contents
Scope .............................................................................................. 12
Extended Documentation .............................................................. 12
Definitions and Abbreviations ...................................................... 13
3.1
Definitions .................................................................................................. 13
3.1.1
Anti-collision loop .................................................................................13
3.1.2
Hex notation .........................................................................................13
3.1.3
ASCII notation ......................................................................................13
3.2
Abbreviations.............................................................................................. 14
Supported tags............................................................................... 16
The mifare® Transponder Family .................................................. 17
5.1
mifare® Standard ........................................................................................ 17
5.1.1
Sector 0 / Block 0 .................................................................................17
5.1.2
Blocks 3, 7, 11, 15, … ..........................................................................18
5.2
State Diagram ............................................................................................ 19
5.3
mifare® Ultralight ........................................................................................ 20
5.4
mifare® 4k................................................................................................... 20
5.5
mifare® ProX............................................................................................... 20
5.6
mifare® DESFire ......................................................................................... 21
5.6.1
Memory organization............................................................................21
5.6.2
State diagram of mifare® DESFire........................................................22
5.6.2.1
Activate PICC............................................................................... 23
5.6.2.2
Select application......................................................................... 23
5.6.2.3
Login to application ...................................................................... 23
5.6.2.4
Select file ..................................................................................... 23
5.6.2.5
Change file................................................................................... 23
5.6.2.6
Commit / Abort transaction........................................................... 23
ISO 14443 Type B ........................................................................... 24
6.1
SR176 ........................................................................................................ 24
6.1.1
Memory organization............................................................................24
6.1.2
Serial number UID................................................................................24
6.1.3
Lock byte..............................................................................................25
6.1.4
Chip ID .................................................................................................25
6.2
SRIX4K ...................................................................................................... 25
6.2.1
Memory organization............................................................................25
6.2.2
Lock block ............................................................................................25
Hardware......................................................................................... 26
7.1
Mechanical dimensions .............................................................................. 27
7.1.1
Features ...............................................................................................28
ASSA ABLOY Identification Technologies GmbH
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
7.1.2
External Connections ...........................................................................29
7.1.2.1
USB Cable ................................................................................... 29
7.1.2.2
Power Supply............................................................................... 29
7.1.2.3
SAM Socket ................................................................................. 30
7.1.3
Function Control Indicator LEDs ..........................................................31
7.1.3.1
Power LED................................................................................... 32
7.1.3.2
RFID activity indicator LED .......................................................... 32
7.1.3.3
USB Online indicator LED............................................................ 32
7.1.3.4
Contact Interface activity indicator LED ....................................... 33
Software for contactless interface functions .............................. 34
8.1
ASCII Protocol............................................................................................ 34
8.2
Binary Protocol ........................................................................................... 34
8.2.1
STX ......................................................................................................35
8.2.2
Station ID .............................................................................................35
8.2.3
Length ..................................................................................................35
8.2.4
Flags ....................................................................................................35
8.2.5
Data .....................................................................................................35
8.2.6
Block Check Character (BCC)..............................................................36
8.2.7
ETX ......................................................................................................36
8.2.8
Remarks...............................................................................................36
8.2.9
Examples: ............................................................................................36
8.3
Register Set ............................................................................................... 37
8.3.1
EEPROM memory organization ...........................................................38
8.3.2
Unique device ID (00h – 04h)...............................................................39
8.3.3
Station ID (0Ah)....................................................................................39
8.3.4
Protocol configuration (0Bh).................................................................39
8.3.4.1
Auto start (default 1) .................................................................... 39
8.3.4.2
Protocol (default 0)....................................................................... 39
8.3.4.3
Multitag (default 0) ....................................................................... 39
8.3.4.4
New serial mode (default 0) ......................................................... 39
8.3.4.5
LED (default 0)............................................................................. 40
8.3.4.6
Single shot (default 0) .................................................................. 40
8.3.4.7
Extended Protocol (default 1)....................................................... 40
8.3.4.8
Extend ID (default 0) .................................................................... 41
8.3.5
BAUD, Baud rate control register (0Ch) ...............................................42
8.3.6
Command Guard Time (0Dh)...............................................................43
8.3.7
OPMODE, operating mode register (0Eh)............................................43
8.3.8
Single Shot Time-out (0Fh) ..................................................................44
8.3.9
Protocol configuration 2 (13h) ..............................................................44
8.3.9.1
Disable multi-tag reset (default 0) ................................................ 44
8.3.9.2
Disable start-up message (default 0) ........................................... 44
8.3.9.3
Enable binary frame v2 (default 0) ............................................... 44
ASSA ABLOY Identification Technologies GmbH
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
8.3.9.4
Noisy Environment (default 0)...................................................... 44
8.3.9.5
Reset Recovery Time Multiplier (default 0) .................................. 45
8.3.9.6
Enable ISO14443 B Anti-collision (default 0) ............................... 45
8.3.9.7
Disable ISO 14443-4 Error Handling (default 0)........................... 45
8.3.10 Reset Off Time (14h)............................................................................45
8.3.11 Reset Recovery Time (15h) .................................................................45
8.3.12 Application Family Identifier (16h) ........................................................45
8.3.13 Selection Time-out ISO 14443A (17h) .................................................46
8.3.14 Selection Time-out ISO 14443B (18h) .................................................46
8.3.15 Selection Time-out SR176 (19h) ..........................................................46
8.3.16 Protocol configuration 3 (1Bh)..............................................................46
8.3.16.1 Disable automatic ISO 14443-4 timeouts (default 0).................... 46
8.3.16.2 Page read (default 0) ................................................................... 47
8.3.16.3 ReqA Extended ID (default 0) ...................................................... 47
8.3.17 User data (80h - EFh) ..........................................................................47
8.4
Instruction Set ............................................................................................ 48
8.4.1
Overview ..............................................................................................48
8.4.2
Error Codes..........................................................................................51
8.4.3
Common commands ............................................................................52
8.4.3.1
Test Continuous Read ................................................................. 52
8.4.3.2
Continuous Read ......................................................................... 52
8.4.3.2.1 Multitag continuous read mode................................................. 53
8.4.3.2.2 Auto start .................................................................................. 53
8.4.3.2.3 Noisy Environment.................................................................... 53
8.4.3.2.4 Binary mode.............................................................................. 53
8.4.3.2.5 Simple access control applications ........................................... 53
8.4.3.3
Set LED........................................................................................ 54
8.4.3.4
DES encryption / decryption of data............................................. 55
8.4.3.5
Get ID........................................................................................... 56
8.4.3.5.1 Binary Protocol Version 2 ......................................................... 57
8.4.3.5.2 High speed select ..................................................................... 57
8.4.3.5.3 Answer from 0xh and 1xh ......................................................... 59
8.4.3.5.4 Answer from 2xh and 3xh ......................................................... 59
8.4.3.5.5 Select a single tag .................................................................... 59
8.4.3.5.6 Extended ID .............................................................................. 59
8.4.3.5.7 Multiple tags.............................................................................. 60
8.4.3.5.8 RATS Guard Time SFGT.......................................................... 60
8.4.3.6
Multi-Tag Selection / List.............................................................. 60
8.4.3.6.1 Multi-tag list............................................................................... 60
8.4.3.6.2 Reading distance ...................................................................... 61
8.4.3.6.3 Multi-tag select.......................................................................... 61
8.4.3.6.4 Multi-tag reset ........................................................................... 61
ASSA ABLOY Identification Technologies GmbH
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
8.4.3.6.5 Maximum number of tags ......................................................... 61
8.4.3.7
Include tag type............................................................................ 62
8.4.3.8
Exclude tag type .......................................................................... 63
8.4.3.9
Set tag type.................................................................................. 64
8.4.3.10 Set Configuration Flags................................................................ 65
8.4.3.10.1 Out of range failure 'R' ............................................................ 66
8.4.3.11 Set Configuration Register ........................................................... 67
8.4.3.11.1 Out of range failure 'R' ............................................................ 68
8.4.3.12 Antenna power on/off ................................................................... 69
8.4.3.12.1 Power off................................................................................. 69
8.4.3.12.2 Power on................................................................................. 69
8.4.3.13 Read/Write user port .................................................................... 70
8.4.3.13.1 Read port ................................................................................ 70
8.4.3.13.2 Write port ................................................................................ 71
8.4.3.14 Quiet ............................................................................................ 72
8.4.3.14.1 ISO 14443 Type A .................................................................. 72
8.4.3.14.2 ISO 14443 Type B .................................................................. 73
8.4.3.14.3 SR176..................................................................................... 73
8.4.3.15 Read block ................................................................................... 73
8.4.3.15.1 Read failure 'F' ........................................................................ 73
8.4.3.15.2 No tag in field 'N' ..................................................................... 74
8.4.3.15.3 Operation mode failure 'O' ...................................................... 74
8.4.3.15.4 Out of range failure 'R' ............................................................ 74
8.4.3.16 Read reader EEPROM ................................................................ 74
8.4.3.16.1 Out of range failure 'R' ............................................................ 74
8.4.3.17 Select ........................................................................................... 75
8.4.3.17.1 Select a single tag .................................................................. 75
8.4.3.17.2 Extended ID ............................................................................ 75
8.4.3.17.3 Multiple tags............................................................................ 75
8.4.3.18 Get Version .................................................................................. 76
8.4.3.19 Write DESFire key ....................................................................... 77
8.4.3.19.1 Out of range failure 'R' ............................................................ 77
8.4.3.19.2 Writing DESFire Keys ............................................................. 77
8.4.3.19.3 Using DESFire keys for authentication ................................... 77
8.4.3.20 Write master key .......................................................................... 78
8.4.3.20.1 Out of range failure 'R' ............................................................ 78
8.4.3.20.2 Writing master keys ................................................................ 78
8.4.3.20.3 Using master keys for authentication ...................................... 78
8.4.3.21 Write block ................................................................................... 79
8.4.3.21.1 Write failure 'F' ........................................................................ 79
8.4.3.21.2 No tag error 'N'........................................................................ 79
8.4.3.21.3 Operation mode failure 'O' ...................................................... 79
ASSA ABLOY Identification Technologies GmbH
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
8.4.3.21.4 Out of range failure 'R' ............................................................ 80
8.4.3.22 Write EEPROM ............................................................................ 80
8.4.3.22.1 Out of range failure 'R' ............................................................ 80
8.4.3.23 Reset............................................................................................ 81
8.4.3.23.1 Disable Start-up Message....................................................... 81
8.4.3.23.2 Reset Timing........................................................................... 81
8.4.3.24 Field Reset................................................................................... 82
8.4.4
ISO 14443 Type A only commands......................................................83
8.4.4.1
Increment value block (credit) ...................................................... 83
8.4.4.1.1 No value block 'I' ....................................................................... 83
8.4.4.1.2 Increment failure 'F'................................................................... 83
8.4.4.1.3 No tag error 'N'.......................................................................... 84
8.4.4.1.4 Operation mode failure 'O' ........................................................ 84
8.4.4.2
Decrement value block (debit) ..................................................... 84
8.4.4.2.1 No value block 'I' ....................................................................... 84
8.4.4.2.2 Decrement failure 'F' ................................................................. 85
8.4.4.2.3 No tag error 'N'.......................................................................... 85
8.4.4.2.4 Operation mode failure 'O' ........................................................ 85
8.4.4.3
Copy value block (backup)........................................................... 85
8.4.4.3.1 Target block .............................................................................. 86
8.4.4.3.2 No value block 'I' ....................................................................... 86
8.4.4.3.3 Copy failure 'F' .......................................................................... 86
8.4.4.3.4 No tag error 'N'.......................................................................... 86
8.4.4.3.5 Operation mode failure 'O' ........................................................ 86
8.4.4.4
Login (authenticate tag) ............................................................... 87
8.4.4.4.1 No tag error 'N'.......................................................................... 88
8.4.4.4.2 Operation mode failure 'O' ........................................................ 88
8.4.4.4.3 Out of range failure 'R' .............................................................. 88
8.4.4.4.4  ........................................................................................ 89
8.4.4.4.5 Login with key data from EEPROM .......................................... 89
8.4.4.4.6 Usage of key A, key B............................................................... 89
8.4.4.5
Read value block ......................................................................... 90
8.4.4.5.1 No value block 'I' ....................................................................... 90
8.4.4.5.2 No tag error 'N'.......................................................................... 90
8.4.4.5.3 General failure 'F'...................................................................... 90
8.4.4.5.4 Operation mode failure 'O' ........................................................ 90
8.4.4.6
Write value block.......................................................................... 91
8.4.4.6.1 Invalid value 'I' .......................................................................... 91
8.4.4.6.2 Write failure 'F' .......................................................................... 91
8.4.4.6.3 No tag error 'N'.......................................................................... 91
8.4.4.6.4 Operation mode failure 'O' ........................................................ 92
8.4.4.6.5 Writing values ........................................................................... 92
ASSA ABLOY Identification Technologies GmbH
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
8.4.5
SR176 only commands ........................................................................93
8.4.5.1
Lock block .................................................................................... 93
8.4.5.1.1 Operation mode failure 'O' ........................................................ 93
8.4.5.1.2 Apply settings ........................................................................... 93
8.4.6
DESFire command set .........................................................................94
8.4.6.1
Authenticate ................................................................................. 95
8.4.6.2
Change Key Settings ................................................................... 96
8.4.6.3
Get Key Settings .......................................................................... 97
8.4.6.4
Change Key ................................................................................. 98
8.4.6.5
Get Key Version........................................................................... 99
8.4.6.6
Create Application.......................................................................100
8.4.6.7
Delete Application .......................................................................101
8.4.6.8
Get Application IDs .....................................................................102
8.4.6.9
Select Application .......................................................................103
8.4.6.10 Format PICC ...............................................................................104
8.4.6.11 Get Version .................................................................................105
8.4.6.12 Get File IDs .................................................................................106
8.4.6.13 Get File Settings .........................................................................107
8.4.6.14 Select File ...................................................................................108
8.4.6.15 Change File Settings...................................................................109
8.4.6.16 Create Standard Data File ..........................................................110
8.4.6.17 Create Backup Data File .............................................................111
8.4.6.18 Create Value File ........................................................................112
8.4.6.19 Create Linear Record File ...........................................................113
8.4.6.20 Create Cyclic Record File ...........................................................114
8.4.6.21 Delete File...................................................................................115
8.4.6.22 Read Data / Records ..................................................................116
8.4.6.22.1 Our of range 'R'......................................................................116
8.4.6.23 Data files .....................................................................................117
8.4.6.24 Record file...................................................................................117
8.4.6.25 Write Data / Record ....................................................................118
8.4.6.25.1 Our of range 'R'......................................................................119
8.4.6.26 Get Value ....................................................................................119
8.4.6.27 Credit ..........................................................................................120
8.4.6.28 Debit ...........................................................................................121
8.4.6.29 Limited Credit..............................................................................122
8.4.6.30 Clear Record File ........................................................................123
8.4.6.31 Commit Transaction ....................................................................124
8.4.6.32 Abort Transaction........................................................................125
Software for contact interface functions ................................... 126
10
10.1
Frequently Asked Questions ................................................... 127
Getting Started ..........................................................................................127
ASSA ABLOY Identification Technologies GmbH
10
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
10.2 Personalized ACGPass e-ID Desktop Reader ..........................................127
10.3 What type of mifare® card should I use? ...................................................128
10.4 How safe is mifare® Standard for cashless payment?...............................128
10.5 Using a mifare® card .................................................................................130
10.6 Using a DESFire card................................................................................131
10.6.1 Create a plain standard data file ........................................................131
10.6.2 Use a plain standard data file.............................................................131
10.6.3 Create a value file ..............................................................................132
10.6.4 Use a DES secured value file.............................................................133
11
References................................................................................. 134
12
Appendix A: SAM ...................................................................... 135
13
Appendix C: Timings ................................................................ 136
14
Appendix D: Release Notes ..................................................... 138
14.1 Version History ..........................................................................................138
14.1.1 Dual 2.0..............................................................................................138
14.1.2 Dual 2.1..............................................................................................138
14.1.3 Dual 2.2..............................................................................................138
14.1.4 Dual 2.3..............................................................................................139
14.2 Revision history .........................................................................................139
15
15.1
15.2
15.3
Appendix F: Approvals / Certificates ...................................... 140
CE Declaration ..........................................................................................140
FCC Declaration........................................................................................141
RoHS Compliance.....................................................................................142
ASSA ABLOY Identification Technologies GmbH
11
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
Scope
The ACGPass e-ID Desktop Reader supports a broad range of tags compliant with
ISO 14443 type A and B standards, including SR176 tags and tags which belong to
the Philips mifare® family. An open command structure allows the device to
communicate with tags that use an operating system. The read/write unit supports
automatic chaining, 256 byte buffer and frame length, extended time framing and up
to 848kBaud transmission rates over the air interface.
Additionally this unit implements a DES cipher which enables to use mifare® DESFire
tags. These tags are designed for use in high security algorithms.
An internal SAM socket is also available.
Major applications are:
•
e-Passport
•
e-National ID Cards
•
e-Drivers Licenses
•
e-Government
•
e-Health Cards
•
e-Document Authentication
•
e-Document Issuing
Extended Documentation
Please note that all confidential material is excluded from this documentation in order
to comply with NDA requirements of our suppliers as well as prevention from
unauthorized copies of the reader modules for increasing the security in the
applications.
You can obtain the extended documentation containing the confidential information
after signing a NDA.
ASSA ABLOY Identification Technologies GmbH
12
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
Definitions and Abbreviations
3.1 Definitions
3.1.1 Anti-collision loop
An algorithm used to identify and handle a dialogue between a reader and one or
more tags in its antenna field.
3.1.2 Hex notation
A hexadecimal value is marked with the suffix ‘h’, i.e. A1h has the value A1
hexadecimal.
3.1.3 ASCII notation
ASCII characters are listed within apostrophes, i.e. ‘x’ means a single x.
ASSA ABLOY Identification Technologies GmbH
13
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
3.2 Abbreviations
Abbreviation
Description
AID
Application ID
ASCII
American Standard Code for Information Interchange
ATR
Answer to Reset
ATS
Answer to Select
Block
For the mifare® Standard one block contains 16 bytes
CID
Card Identifier (logical card address, ISO 14443-4)
CRC
Cyclic Redundancy Check
DES
Data Encryption Standard, for more details about DES
refer to [3].
EDC
Error Detection Code
EOF
End of Frame
Hex / xxh
Value in Hexadecimal notation
I-block
Information block
LSB
Least Significant Bit or Byte
MSB
Most Significant Bit or Byte
NAD
Node Address (ISO 14443-4)
OSI
Open System Interconnection
OTP
One time programmable
PCB
Protocol Control Byte (ISO 14443-4)
PCON
Protocol Configuration byte of the reader
PPS
Protocol and Parameter Selection
RATS
Request for Answer to Select
R-block
Receive ready block
REQA
Request ISO Type A
REQB
Request ISO Type B
RFU
Reserved for Future Use
S-block
Supervisory block
Sector
For the mifare® Standard one sector contains 4 blocks
SID
Station ID
SFGT
Guard time after RATS
SN
Serial Number of a tag (a 32 bit number)
SOF
Start of frame
ASSA ABLOY Identification Technologies GmbH
14
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
Abbreviation
Description
TDES
Triple DES
Value block
32 bit data block format. Used in ticketing application

Carriage return (0Dh)

Line feed (0Ah)
Figure 3-1: Abbreviations
ASSA ABLOY Identification Technologies GmbH
15
1
ASSA ABLOY Identification Technologies GmbH
ISO 14443 A compliant
(1)
ISO 14443 B
compliant()
√
√
Toshiba
TOSMART P032/064
√
√
Sharp
Sharp B
√
Various
ASK
ASK GTML
√
√
ASK
ASK GTML2 ISO
√
√
√
STM
SLIX 4K
√
√
√
√
√
√
√
√
√
√
√
√
√
Various
STM
SR176
Dual Interface
Infineon
SLE6666CL160S
ISO 14443 B
Philips
Philips
Philips
Philips
Philips
Infineon
Infineon
Philips
Innovision
Serial
Read
number block
√
√
√
√
√
√
√
√
√
√
√
√
√
√
√
√
√
√
√
√
√
√
√
√
Write Transfer
block command
Extended setup needed
Works only with ‘t’ command
Encryption included
Encryption not included
Encryption not included
Comments
mifare® Standard
mifare® 4k
mifare® Ultralight
mifare® ProX
mifare® DESFire
SLE66CLX320P
SLE 55R04/ 08
Smart MX
Jewel Tag
ISO 14443 A
Manufacturer
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
Supported tags
Figure 4-1: Supported labels
Performance varies
16
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
The mifare® Transponder Family
The mifare® transponder family consists of various 13.56 MHz transponder ICs, all
compliant to the ISO 14443 standard.
5.1 mifare® Standard
The mifare® Standard card consists of 16 sectors. A sector includes four blocks of 16
bytes each.
mifare® Standard
Sector 2
Sector 0 (Block: 0...3)
Block 8:
Data or value (16 bytes)
Sector 1 (Block: 4...7)
Block 9:
Data or value (16 bytes)
Sector 2 (Block 8...11)
Block 10:
Data or value (16 bytes)
...
Block 11:
bytes),
Access Conditions (4
Key A, Key B (16 bytes)
Sector 15 (Block 60...63)
Figure 5-1: mifare® Standard: sector diagram
5.1.1 Sector 0 / Block 0
Block 0 is read only.
Serial Number (4 bytes)
Check byte (1 byte)
Manufacturer data (11 bytes)
Figure 5-2: mifare® Standard: sector 0 / block 0
ASSA ABLOY Identification Technologies GmbH
17
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
5.1.2 Blocks 3, 7, 11, 15, …
Transport keys are set on delivery:
Key A (6 bytes)
Access Conditions (4 bytes)
Key B (6 bytes)
Figure 5-3: mifare® Standard: block 3, 7, 11, 15, …
Key A
A0 A1 A2 A3 A4 A5 (Infineon) or FF FF FF FF FF FF (new Philips cards)
Key B
B0 B1 B2 B3 B4 B5 (Infineon) or FF FF FF FF FF FF (new Philips cards)
Access Conditions
FF 07 80 xx (key A is used to read or write; key A itself is not readable; key B is data
only). For further information refer to the mifare® card manual.
Remarks
Enabled keys are always read as 00 00 00 00 00 00
Using key B as a data area will cause a security gap, due to the fact that it is
necessary to rewrite key A and the access conditions at each write process. It is not
recommended to use key B as a data storage area.
ASSA ABLOY Identification Technologies GmbH
18
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
5.2 State Diagram
All mifare® cards use the following state diagram.
Power Off
Reset
Reader Instruction Set
Idle
REQA
Select
ISO 14443 Commands
Ready
Halt
Wake Up
Select
Active
Anticollision Loop
Authenticate
Log In
read/write/...
Halt
Authenticated
Tag interfacing
commands
Figure 5-4: State diagram
ASSA ABLOY Identification Technologies GmbH
19
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
5.3 mifare® Ultralight
mifare® Ultralight cards have no encryption included. They only support plain text
data transmission.
mifare® Ultralight only supports 4 bytes per sector, but the command set uses 16
bytes per sector. Only the 4 least significant bytes are valid when using mifare®
Ultralight.
Ensure that the other bytes match with the tag content when using the write
command; otherwise the read back will fail.
5.4 mifare® 4k
mifare® 4k cards have an increased memory. Beginning from sector 32 (20h), sectors
have 16 blocks. Due to compatibility reasons, the sector indices have changed
according to the following table. The login sector has to be used to access the
corresponding sector on the card.
Sector
Block
Login sector
00h
00h – 03h
00h
01h
04h – 07h
01h
…
…
…
1Fh
7Ch – 7Fh
1Fh
20h
80h – 8Fh
20h
21h
90h – 9Fh
24h
22h
A0h – AFh
28h
23h
B0h – BFh
2Ch
24h
C0h – CFh
30h
25h
D0h – DFh
34h
26h
E0h – EFh
38h
27h
F0h – FFh
3Ch
Figure 5-5: mifare® 4k sector index table
5.5 mifare® ProX
mifare® ProX tags have an operating system onboard. Data organization depends on
the operating system installed on the card. These cards can include additional
functionalities such as DES or a proprietary encipher algorithm.
Before accessing the operating system, the card must be selected. Customized
commands are issued using the transfer command.
ASSA ABLOY Identification Technologies GmbH
20
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
5.6 mifare® DESFire
This tag supports additional security algorithms (DES, Triple-DES, MAC) for security
sensitive applications.
DESFire tags are addressed using a specific command set (see DESFire command
set).
5.6.1 Memory organization
The memory of a DESFire card can be personalized to specific requirements. The
card can be seen as data storage device like a hard disk in a PC. The memory is
divided into a maximum of 28 different applications (directories) with 16 files each. An
application has up to 14 keys. Depending on keys and access conditions a file can
be accessed in four different ways. Plain data is never secured. Data is secured
using a MAC, single DES or triple DES enciphers.
The following figure describes the memory organization of a DESFire card.
DESFire card (Application 0)
Application 1
File
ID 1
File
ID 2
...
File
ID n
...
File
ID n
...
File
ID n
Application 2
File
ID 1
File
ID 2
...
Application n
File
ID 1
File
ID 2
Figure 5-6: DESFire memory organization
ASSA ABLOY Identification Technologies GmbH
21
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
5.6.2 State diagram of mifare® DESFire
Activate DESFire card
Select Application
Login to Application
Select File with ID
Change File
Commit / Abort Transaction
Figure 5-7: mifare® DESFire state diagram
ASSA ABLOY Identification Technologies GmbH
22
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
5.6.2.1
Activate PICC
Before accessing a DESFire card, the card must be selected. A mifare® DESFire
card has a 7 byte UID. After activation, the card is powered up and ready to accept a
mifare® DESFire command. Application 0 is selected automatically.
5.6.2.2
Select application
To jump into another application, the application has to be selected. An application
can be seen as a directory, which contains up to 16 files. The size of the application
depends on the stored files.
5.6.2.3
Login to application
Specific access rights can be set for each application. Login to an application allows
to change the organization of the application. Login to a file opens a secured file for
access. A file can be accessed in four different ways: without any security or secured
with MAC, single DES or triple DES.
5.6.2.4
Select file
Before accessing a file, the file must be selected
5.6.2.5
Change file
A selected file can be changed according its access rights. If a file is secured, a login
is required before changes can be made.
5.6.2.6
Commit / Abort transaction
Value files, backup files, linear record files and cyclic record files only adapt their
values after the commit transaction command is given. Several files can be changed
within an application at the same time. The abort transactions command annuls all
changes within an application. Power loss will cancel all modifications too.
For more details about application settings and access rights refer to [2].
ASSA ABLOY Identification Technologies GmbH
23
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
ISO 14443 Type B
ISO 14443 type B cards are supported.
6.1 SR176
The SR176 label contains only 30 bytes of data organized in two bytes per page.
6.1.1 Memory organization
block
address
Byte 1
0Fh
Lock byte
Byte 0
RFU
0Eh
User data
…
…
04h
User data
03h
Serial number
02h
Serial number
01h
Serial number
00h
Serial number
Chip ID
Figure 6-1: SR176 memory organization
6.1.2 Serial number UID
The UID is stored in the first 4 pages. Page 00h contains the LSB of the UID.
Page 03h
Byte 1h
Byte 0
Page 02h
Byte 1
Byte 0
Page 01h
Byte 1
Byte 0
Page 00h
Byte 1
Byte 0
Figure 6-2: SR176 Serial number
ASSA ABLOY Identification Technologies GmbH
24
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
6.1.3 Lock byte
Bit 2
Bit 1
Bit 0
Page 00h
Page 01h
Page 0Ah
Page 0Bh
Bit 3
Page 02h
Page 03h
Page 0Ch
Page 0Dh
Bit 4
Page 04h
Page 05h
Bit 5
Page 06h
Page 07h
Bit 6
Page 08h
Page 09h
Bit 7
Page 0Eh
Page 0Fh
The lock byte defines the write access condition of a pair of pages. Each bit can only
be set once. This procedure is irreversible. This byte is implemented as an OTP.
Figure 6-3: Lock byte
6.1.4 Chip ID
The Chip ID is defined in the low nibble of page 0Fh. It is manufacturer set and is
used internally to select and separate single tags.
6.2 SRIX4K
The SRIX4K label contains 512 bytes of data organized into four-byte pages.
6.2.1 Memory organization
Block
address
Byte 3
Byte 2
Byte 1
Byte 0
FFh
OTP Lock Reg
ST Reserved
ST Reserved
Fixed Chip ID
7Fh
User data
…
…
07h
User data
06h
32 bits binary counter
05h
32 bits binary counter
04h
32 bits Boolean Area
03h
32 bits Boolean Area
02h
32 bits Boolean Area
01h
32 bits Boolean Area
00h
32 bits Boolean Area
Figure 6-4: SRIX4K memory organization
6.2.2 Lock block
Locking of blocks is not supported with this tag.
ASSA ABLOY Identification Technologies GmbH
25
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
Hardware
Figure 7-1: Picture of the complete reader
ASSA ABLOY Identification Technologies GmbH
26
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
7.1 Mechanical dimensions
All Dimensions are in mm
Figure 7-2: Mechanical drawing with dimensions
ASSA ABLOY Identification Technologies GmbH
27
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
7.1.1 Features
•
Interface type:
USB 2.0
•
Dimensions:
205x130x93 (LxWxH), all in mm
•
Reading Distance:
up to 90mm, depending on tag type
•
SAM:
supported 2
•
Boot loader:
supported 3
•
Drivers:
virtual COM port driver, DLL driver available
•
Antenna:
on board
•
Signaling:
RFID activity indicator LED
Power LED
Contact Interface activity indicator LED
USB Online indicator LED
•
Power Supply:
via USB
The integrated SAM socket is accessible by opening the housing
The boot loader makes it easy to download a firmware to the unit without replacing/dismantling the
hardware.
ASSA ABLOY Identification Technologies GmbH
28
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
7.1.2 External Connections
7.1.2.1
USB Cable
The USB connector is located on the bottom side of the housing. Depending on the
users preferences the cable can be put and easily fixed within one of three cable
guides. Each cable guide leads the cable to one of three possible sides of the
housing.
Figure 7-3: mechanical drawing, bottom view
7.1.2.2
Power Supply
The power supply is automatically provided via the USB connection. Therefore the
unit can only be connected to a powered USB hub.
Non-powered USB hubs like often used in USB splitter units are not able to supply
the reader with enough power. Depending on the internal protection of these units,
they even may be damaged.
ASSA ABLOY Identification Technologies GmbH
29
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
7.1.2.3
SAM Socket
The integrated SAM socket is accessible only by opening the housing.
•
Before opening the housing an ESD protection has to be used.
•
The reader has to be unpowered and unpluged from the host system. It’s
recommended to remove the USB cable on the reader side.
•
Open the four screws on the bottom side with an appropriate screwdriver.
•
Carefully remove the bottom part of the housing. Install the SAM.
•
Close the bottom part of the housing and make sure both housing parts fit
together.
•
Carefully tighten the four screws again. If the screws are tightened too much,
then housing might break.
Figure 7-4: position of internal SAM Socket
ASSA ABLOY Identification Technologies GmbH
SAM Socket
30
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
7.1.3 Function Control Indicator LEDs
The reader comes with four integrated indicator LEDs.
Figure 7-5: Reader with activated indicator LEDs
ASSA ABLOY Identification Technologies GmbH
31
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
7.1.3.1
Power LED
This LED shows the status of the power supply. If on, then enough power is provided
by the USB hub to run the reader.
Figure 7-6: position and design of Power LED
7.1.3.2
RFID activity indicator LED
This LED shows any activities on the reader’s contactless RFID interface. LED On
means data is being sent to or received from the card.
Figure 7-7: position and design of RFID activity indicator LED
7.1.3.3
USB Online indicator LED
This LED shows the status of the USB connection. If on, then the reader is
connected with the host system.
Figure 7-8: position and design of USB Online indicator LED
ASSA ABLOY Identification Technologies GmbH
32
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
7.1.3.4
Contact Interface activity indicator LED
This LED shows any activities on the reader’s contact interface. LED On means data
is being sent to or received from the card.
Figure 7-9: position and design of contact interface activity indicator LED
ASSA ABLOY Identification Technologies GmbH
33
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
Software for contactless interface functions
By default, data is transmitted at 9600, n, 8, 1, no handshaking. Two protocol modes
are supported. The protocol mode is configured in the reader EEPROM. As factory
default, the ASCII protocol is used.
If the PC/SC driver has been installed on the host PC, then the commands of this
chapter can’t be used as such. Only the PC/SC specification is valid in this case. The
reader also can be installed with the standard USB driver. The driver can be
downloaded from http://www.aaitg.com. This driver enables the usage of a virtual
COM port on the host PC. Then all commands mentioned below can be used.
8.1 ASCII Protocol
This protocol is designed for easy handling. The commands are issued using a
terminal program. Data is transmitted as ASCII hexadecimal that can be displayed on
any terminal program (i.e. HyperTerminal).
Command
Data
Variable length
Variable length
Figure 8-1: ASCII protocol frame
8.2 Binary Protocol
This protocol is designed for industrial applications with synchronization and frame
checking. An addressing byte for party line (master/slave, multi-drop) is also
included.
The protocol usually requires a device driver. Data is transmitted in binary mode. The
reader uses an internal binary watchdog timer to ensure correct framing.
STX
Station ID
Length
Data
BCC
ETX
1 byte
1 byte
1 byte
Variable length
1 byte
1 byte
Figure 8-2: Binary Frame Version 1
The binary frame version 2 is only sent to the host. It is implemented to give
extended information to the host.
Version 2 must be enabled in the Protocol configuration 2 register.
STX
1 byte
Station ID Length
1 byte
1 byte
Flags
Data
1 byte
Variable length
BCC
ETX
1 byte 1 byte
Figure 8-3: Binary Frame Version 2
ASSA ABLOY Identification Technologies GmbH
34
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
8.2.1 STX
Start of transmission (02h)
8.2.2 Station ID
Unique ID of the station
00h:
FFh:
reserved for the bus master. Readers send response to this device ID.
Broadcast message. All devices will execute the command and send their
response.
8.2.3 Length
Length of the data block, including the flag byte, if binary protocol version 2 is
activated.
If length is set to zero, 256 data bytes are transmitted. The reader module only can
send 256 data bytes, but can not receive commands with 256 bytes.
8.2.4 Flags
The flag byte gives additional information to the host.
Bit 3 – Bit 7
Bit 1 – Bit 2
Bit 0
RFU
Leading Character Info
Error State
Error State
If cleared, the command was processed successfully.
If set, an error occurred.
Leading Character Info
Bit 1 & 2 defines how to interpret the data in the binary frame.
Bit 2
Bit 1
Description
No leading character available, all values are hexadecimal.
The data contains one leading character.
All data bytes are characters.
RFU
8.2.5 Data
This part contains the command and the data. The command values are the same as
in ASCII protocol mode (‘x’, ‘s’, …) whereas data is transmitted in binary mode.
The length of the command block depends on the instruction.
ASSA ABLOY Identification Technologies GmbH
35
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
8.2.6 Block Check Character (BCC)
The BCC is used to detect transmission errors. The BCC is calculated XOR-ing each
byte of the transmission frame excluding the STX/BCC and ETX characters. The
flags are part of the data.
BCC = ( StatID) XOR ( Length) XOR (Command / Data 0 ) XOR ... XOR (Command / Data N )
8.2.7 ETX
End of transmission. (03h)
8.2.8 Remarks
If the reader device receives an invalid instruction frame (i.e. wrong BCC) or the
requested station ID does not match the internal ID of the reader, the command is
not executed. The reader waits for the next valid frame.
The automatic binary time-out (see protocol configuration register) is used to detect
incomplete binary frames.
8.2.9 Examples:
02h
64h
01h
78h
1Dh
03h
STX
Station ID
Length
‘x’
BCC
ETX
This instruction frame will reset the reader module with the station ID 64h.
ASSA ABLOY Identification Technologies GmbH
36
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
8.3 Register Set
The reader has several system flags used for customization purposes. The flags are
stored in its non-volatile EEPROM. The reader accepts changes to these settings
only during the start-up phase. Clearing all RFU bits is recommended in order to
guarantee compatibility with future releases.
The reader can store up to 32 authentication keys internally to login standard mifare®
cards. An additional 32 keys can be stored for DESFire authentication. All keys are
read only and cannot be accessed via the interface lines.
ASSA ABLOY Identification Technologies GmbH
37
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
8.3.1 EEPROM memory organization
Register
Description
00h … 04h
Unique device ID; read only
05h … 09h
Administrative data; read only
0Ah
Station ID
0Bh
Protocol configuration
0Ch
Baud rate
0Dh
Command Guard Time
0Eh
Operation Mode
0Fh
Single shot time-out value
10h
Internal use / Do not change
11h
Internal use / Do not change
12h
Internal use / Do not change
13h
Protocol configuration 2
14h
Reset Off Time
15h
Reset Recovery Time
16h
Application Family Identifier
17h
ISO 14443A Selection Time-out
18h
ISO 14443B Selection Time-out
19h
SR176 Selection Time-out
1Ah
RFU
1Bh
Protocol configuration 3
1Ch
Page Start
1Dh
Internal use / Do not change
1Eh
Internal use / Do not change
1Fh
Page number
20h - 7Fh
80h … EFh
RFU
User data
Figure 8-4: EEPROM memory
ASSA ABLOY Identification Technologies GmbH
38
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
8.3.2 Unique device ID (00h – 04h)
The unique device ID identifies a reader module. It is factory programmed and
cannot be changed.
8.3.3 Station ID (0Ah)
The station ID is used in binary mode to address a device in party line set up. The
station ID can range from 01h to FEh and can be set freely. The value 00h is
reserved for the bus master. All readers send their response to this device.
The broadcast message (FFh) forces all readers to response to the command.
Default value is 01h.
8.3.4 Protocol configuration (0Bh)
The protocol configuration register (PCON) specifies general behavior of the reader
device.
Default value is 41h.
Protocol configuration register
Bit 7
Bit 6
Bit 5
Bit 4
Bit 3
Extended ID
Extended
Protocol
Singleshot
LED
New
serial
mode
Bit 2
Bit 1
Multitag Protocol
Bit 0
Autostart
Figure 8-5: Protocol configuration register
8.3.4.1
Auto start (default 1)
If set, the reader device will start up in continuous read mode automatically.
8.3.4.2
Protocol (default 0)
If set, the reader uses binary protocol mode. Refer to binary protocol for further
information on the binary protocol format.
Default setting = ASCII protocol (0).
8.3.4.3
Multitag (default 0)
The Multitag flag will enable multi-tag recognition in continuous read mode. All tags
are detected and displayed. Due to the more complex search algorithm, the
continuous read command decreases its detection speed.
8.3.4.4
New serial mode (default 0)
If set, new serial mode is enabled. The leading character ‘M’ is added to the serial
number of ISO 14443 type A tags, a leading 'Z' character is added to ISO 14443 type
B tags and a leading 'S' character for SR176 tags.
ASSA ABLOY Identification Technologies GmbH
39
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
8.3.4.5
LED (default 0)
If set the reader suppresses any LED activity. The user manages the state of the
LEDs.
8.3.4.6
Single shot (default 0)
If set, the reader displays the serial number of a tag in continuous read mode once
within a specified time-out. The time-out is defined at EEPROM register 0Fh.
The delay time can be adjusted stepwise in 100ms steps. 00h indicates no delay and
FFh indicates infinite delay.
8.3.4.7
Extended Protocol (default 1)
If set, the transfer data telegram command supports ISO14443-4.
The transfer data telegram command is only supported in normal mode, not in
transmit / receive mode.
ASSA ABLOY Identification Technologies GmbH
40
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
8.3.4.8
Extend ID (default 0)
If set, the reader extends the serial number of tags with additional bytes.
ISO 14443 A tags (5/8/11 bytes transmitted)
Tag type
Serial number
1 byte
4 / 7 / 10 bytes
Figure 8-6: ISO 14443 A Extended Serial number
The tag type byte indicates the type of cascade level.
Tag type
Description
01h
Cascade level 1 transponder
02h
Cascade level 2 transponder
03h
Cascade level 3 transponder
Figure 8-7: ISO 14443 A tag type
ISO 14443 B tags (12 bytes transmitted)
Serial number
Application data
Protocol info
CID
4 bytes
4 bytes
3 bytes
1 byte
Figure 8-8: ISO 14443 B Extended Serial number
For detailed description of Application Data, Protocol Info and CID, refer to the ISO
14443 documentation [1].
ASSA ABLOY Identification Technologies GmbH
41
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
8.3.5 BAUD, Baud rate control register (0Ch)
The baud rate register defines the communication speed of the reader device.
Default value is 00h.
Baud rate register
Bit 7
Bit 6
Bit 5
Bit 4
Bit 3
Bit 2
Bit 1
Bit 0
RFU
RFU
RFU
RFU
RFU
BS2
BS1
BS0
Figure 8-9: Baud rate register
This register defines the baud rate of the device.
BS2
BS1
BS0
Baud rate
9600 baud (default)
19200 baud
38400 baud
57600 baud
115200 baud
230400 baud (depends on the used interface
chip)
460800 baud (depends on the used interface
chip)
Figure 8-10: Baud rate settings
With the high baud rates (230400 and 460800 baud), proper operation depends on
the interface chip used. Please note that some of the interface chips available do not
support these high baud rates.
ASSA ABLOY Identification Technologies GmbH
42
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
The following table describes the exact baud rates used by the reader.
Baud rate
Exact baud rate
Difference
9600 baud
9576 baud
-0.25 %
19200 baud
19261 baud
0.32 %
38400 baud
38523 baud
0.32 %
57600 baud
58448 baud
1.47 %
115200 baud
113000 baud
-1.91 %
230400 baud
241545 baud
4.84 %
460800 baud
483091 baud
4.84 %
Figure 8-11: Exact baud rates
The following table describes the communication settings
Description
8 data bits
No parity bit
1 stop bit
No flow control
Figure 8-12: Communication settings
8.3.6 Command Guard Time (0Dh)
The Command Guard Time is used to ensure that commands are not sent to fast
consecutively. Following commands are sent after the guard time is elapsed. One
time slice is around 37,8us. The longest timeout value is 9,6ms (FFh).
The default value is 20h (1,2ms).
8.3.7 OPMODE, operating mode register (0Eh)
The operation mode register defines which tag types the reader supports. This
register enables fast tag recognition because only defined tag types are requested.
Bit 4
Bit 3
Bit 2
Bit 1
Bit 0
(LSB)
RFU
SR176
ISO
14443B
ISO
14443A
RFU
Bit 5
RFU
Bit 6
RFU
Bit 7
(MSB)
RFU
Operation mode register
Figure 8-13: Operation mode register
ASSA ABLOY Identification Technologies GmbH
43
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
8.3.8 Single Shot Time-out (0Fh)
The time-out value defines the delay time between two responses of the reader. It
only has effect in continuous read mode. To enable the time-out, the single shot flag
has to be set. See the protocol configuration register above. One time-out slice is
around 100ms. Exact timing depends on the protocol used.
Value 00h indicates no delay time.
Default value is 0Ah (1 second).
8.3.9 Protocol configuration 2 (13h)
The protocol configuration register 2 (PCON2) further specifies the general behavior
of the reader device.
Default value is 00h.
Protocol configuration 2 register
Bit 7
Bit 6
Bit 5
Bit 4
Disable Enable
Reset
ISO
ISO
Recovery
Time
14443B
14443 -4
Multiplier
AntiError
collision
Handling
Bit 3
Bit 2
Bit 1
Bit 0
Noisy
Environment
Enable
binary
frame
v2
Disable
start-up
message
Disable
multitag
reset
Figure 8-14: Protocol configuration register
8.3.9.1
Disable multi-tag reset (default 0)
If set, the reader does not reset before the multi-tag list and multi-select command
have been performed.
8.3.9.2
Disable start-up message (default 0)
If set, the reader suppresses the start-up message in ASCII mode. This flag is
ignored in binary protocol mode.
8.3.9.3
Enable binary frame v2 (default 0)
If set, the reader sends version 2 binary frames.
The get station ID command always sends version 1 binary frames!
8.3.9.4
Noisy Environment (default 0)
If set, the continuous read mode can only be aborted with the '.' character. When
working in a noisy environment, the probability for a reception of an
arbitrary/stochastic sign/command is quite high. This implies a high probability of an
unintentional command execution. To reduce this probability, only one character (out
of 255) is chosen (‘.’) to be interpreted as the continuous read stop command.
ASSA ABLOY Identification Technologies GmbH
44
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
8.3.9.5
Reset Recovery Time Multiplier (default 0)
Multiplies the Reset Recovery Time, including the recovery time of the field reset
command.
Reset Recovery Time Multiplier
Reset Recovery Time
1x
2x
3x
4x
Figure 8-15: Reset Recovery Time Multiplier
8.3.9.6
Enable ISO14443 B Anti-collision (default 0)
If set, the anti-collision algorithm for ISO 14443 B tags is enabled.
8.3.9.7
Disable ISO 14443-4 Error Handling (default 0)
If set, ISO14443-4 Error Handling is disabled. The error handling always uses the
TMR time-out.
8.3.10 Reset Off Time (14h)
The Reset Off Time register represents the field off time in ms.
This register is used for the select, continuous read and multi-tag commands.
Default value is 0Ah.
8.3.11 Reset Recovery Time (15h)
The Reset Recovery Time register represents the recovery time in ms after the field
is turned on.
This register is used for the select, continuous read and multi-tag commands.
Default value is 25h.
8.3.12 Application Family Identifier (16h)
The AFI (Application Family Identifier) is only supported for ISO14443B tags. If the
set value is different from 00h, the AFI is implemented in the ReqB command of
ISO14443B. Only transponders with an identical AFI will answer to the reader.
Default value is 00h.
ASSA ABLOY Identification Technologies GmbH
45
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
8.3.13 Selection Time-out ISO 14443A (17h)
The Selection Time-out represents the reader card communication time-out for the
select, high speed select, continuous read, multilist, multiselect and mifare® login
command with ISO 14443A tags. For a better reaction time use low values. One time
slice is around 300us.
The default value is 10h.
8.3.14 Selection Time-out ISO 14443B (18h)
The Selection Time-out represents the reader card communication time-out for the
select, high speed select, continuous read, multilist and multiselect commands with
ISO 14443B tags. For a better reaction time, use low values. One time slice is around
300µs.
The default value is 50h.
8.3.15 Selection Time-out SR176 (19h)
The Selection Time-out represents the reader card communication time-out for the
select, continuous read, multilist and multiselect command with SR176 tags. For a
better reaction time, use low values. One time slice is around 300µs.
The default value is 10h.
8.3.16 Protocol configuration 3 (1Bh)
The protocol configuration register 3 (PCON3) further specifies the general behavior
of the reader device.
Default value is 00h.
Protocol configuration 3 register
Bit 7
Bit 6
Bit 5
RFU
ReqA
Extended
ID
Bit 4
Bit 3
Internal use / do not
change
Bit 2
Page
Read
Bit 1
Bit 0
RFU
Disable
automatic
ISO 14443-4
timeouts
Figure 8-16: Protocol configuration register
8.3.16.1
Disable automatic ISO 14443-4 timeouts (default 0)
If set the automatic ISO 14443-4 timeouts are disabled. The timeouts specified with
TMR registers are used.
ASSA ABLOY Identification Technologies GmbH
46
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
8.3.16.2
Page read (default 0)
If set the continuous read mode retrieves the content of the tag instead of the serial
number. The register Page Start (1Ch) defines the start block and the Page Number
(1Fh) defines the number of blocks to be read.
8.3.16.3
ReqA Extended ID (default 0)
If set the Extended ID information for ISO14443 A tags replaces the cascade level
information (1 byte) with Request A answer (2 bytes).
8.3.17 User data (80h - EFh)
These registers are for free use.
ASSA ABLOY Identification Technologies GmbH
47
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
8.4 Instruction Set
Following table describes all the commands of the reader device. Each command
returns an answer to the host. Exceptions are mentioned explicitly. The RFID activity
indicator LED acknowledges a successfully executed command. The RFID activity
indicator LED indicates an error by changing its color to red.
8.4.1 Overview
Common commands
'!'
Test continuous read
'c'
Continuous read
'.'
Abort continuous read, refer to continuous read
'dg' / 'dn' / 'dr'
Set LED
'ds'
DES encryption / decryption of data
'f'
DESFire command set
'g'
Get ID
'h'
High speed select
'm'
MultiTag select / tag list
'o+a' / 'o+b' / 'o+s'
Include tag type
'o-a' / 'o-b' / 'o-s'
Exclude tag type
'oa' / 'ob' / 'ot' / 'os'
Set tag type
'of'
Set configuration flags
'og'
Set configuration register
'poff' / 'pon'
Antenna power off/on
'pr' / 'pw'
Read / write user port
'q'
Quiet
'rp'
Read EEPROM register
'r' / 'rb'
Read block
's'
Select
'v'
Get version
'w' / 'wb'
Write block
'wf'
Write DESFire key
'wm'
Write master key
'wp'
Write EEPROM register
'x'
Reset
Figure 8-17: Command overview (Part 1)
ASSA ABLOY Identification Technologies GmbH
48
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
Common commands (Part2)
'y'
Field reset
ISO 14443 Type A only commands
'+'
Increment value block (credit)
'-'
Decrement value block (debit)
'='
Copy value block (backup)
'l'
Login (authenticate tag)
'rv'
Read value block
'wv'
Write value block
SR176 only commands
'k'
Lock block
Figure 8-18: Command overview (Part 2)
ASSA ABLOY Identification Technologies GmbH
49
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
DESFire command set
00h
Authenticate
01h
Change Key Settings
02h
Get Key Settings
03h
Change Key
04h
Get Key Version
05h
Create Application
06h
Delete Application
07h
Get Application IDs
08h
Select Application
09h
Format PICC
0Ah
Get Version
0Bh
Get File IDs
0Ch
Get File Settings
0Dh
Select File
0Eh
Change File Settings
0Fh
Create Standard Data File
10h
Create Backup Data File
11h
Create Value File
12h
Create Linear Record File
13h
Create Cyclic Record File
14h
Delete File
15h
Read Data / Records
16h
Write Data / Record
17h
Get Value
18h
Credit
19h
Debit
1Ah
Limited Credit
1Bh
Clear Record File
1Ch
Commit Transaction
1Dh
Abort Transaction
Figure 8-19: Command overview (Part 3)
ASSA ABLOY Identification Technologies GmbH
50
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
8.4.2 Error Codes
Following figure shows an overview of all error messages of the reader device.
Error Code
Description
‘?’
Unknown command
'C'
Collision or CRC/MAC Error
‘F’
General failure
‘I’
Invalid value format, specified block does not match the value
format
‘N’
No tag in the field
'O'
Operation mode failure or file not selected
‘R’
Command parameter out of range
'X'
Authentication failed
Xxh
DESFire error code
Figure 8-20: Error codes
ASSA ABLOY Identification Technologies GmbH
51
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
8.4.3 Common commands
8.4.3.1
Test Continuous Read
This command tests the state of the continuous read command.
This command only works in ASCII mode.
Command
Command
Data
'!'
None
Answer
Answer
Description
'F'
Continuous read mode is not active.
'!'
Continuous read mode is active.
8.4.3.2
Continuous Read
The reader device reads and displays serial numbers continuously while one or more
tags remain in the field. This command stops if any character is sent to the reader
module. The reader module returns the character ‘S’ (53h).
The reader supports different tag types at the same time. To increase the reading
performance switch to a single tag mode. If more than one tag of the same type
should be detected at the same time, the Multitag flag must be activated. The
response data length depends on the tag type.
Command
Command
Data
'c'
none
Answer
Answer
Description
data
Serial number (n bytes)
'N'
Error: No Tag in the field (only binary protocol)
ASSA ABLOY Identification Technologies GmbH
52
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
8.4.3.2.1
Multitag continuous read mode
If the Multitag flag is set in the Protocol Configuration (PCON) register the reader
reads multiple tags continuously.
8.4.3.2.2
Auto start
The continuous read mode is started automatically. The auto start flag must be set in
the PCON register.
8.4.3.2.3
Noisy Environment
If the Noisy Environment flag is set, the continuous read mode can only be aborted
with the '.' character.
8.4.3.2.4
Binary mode
This command is not fully supported in binary protocol mode.
Continuous Read in binary mode does not start-up automatically at boot time, even if
the corresponding EEPROM flag is set.
Within the single shot time-out, only one response is sent.
8.4.3.2.5
Simple access control applications
Serial numbers are always sent plain. Data encryption is activated after a successful
login.
For simple access control applications the use read-only blocks for the identification
of the tag is recommended.
Reading any block (even the manufacturer block) of the transponder will increase
your security.
ASSA ABLOY Identification Technologies GmbH
53
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
8.4.3.3
Set LED
This command controls the LED activity. If the LED flag is set, the automatic LED
function is switched off. The user can set the state of the LED manually.
Command
Command
Data
'dg'
None
'dr'
None
'dn'
None
Answer
Answer
Description
'DG'
'DR'
'DN'
String of LED state
Example
Command
Answer
Description
'dg'
DG
Switch on LED green, LED red off
'dr'
DR
Switch on LED red, LED green off
'dn'
DN
Switch off both LEDs
ASSA ABLOY Identification Technologies GmbH
54
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
8.4.3.4
DES encryption / decryption of data
This command returns 8 bytes of encrypted / decrypted data.
Command
Command
Data
'ds'
Options (1 byte)
Key (8/16 bytes) / Key Number (1 byte)
Data (8 byte)
Answer
Answer
Description
Data
Encrypted / Decrypted data (8 bytes)
Option byte
Option byte
Bit 7
Bit 6
Bit 5
Bit 4
Bit 3
Bit 2
Bit 1
Bit 0
RFU
RFU
RFU
RFU
RFU
Encode
Key
Length
Key
Index
Key Index
If set, the command only needs the key number (1 byte) instead of the key (8/16
bytes).
The key number corresponds to the key number used in the "wf" command
Key Length
If set, the command uses the TDES algorithm with 16-byte key.
If cleared, the command uses the DES algorithm with 8-byte key.
Encode
Setting this flag encodes the data.
Clearing this flag decodes the data.
ASSA ABLOY Identification Technologies GmbH
55
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
8.4.3.5
Get ID
This command returns the station ID of the reader device. The answer is time slotted
to enable the detection of all devices in party line mode.
The station ID has only effect in binary mode.
Command
Command
Data
'g'
None
Answer
Answer
Description
Data
Station ID of the reader device (1 byte)
ASSA ABLOY Identification Technologies GmbH
56
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
8.4.3.5.1
Binary Protocol Version 2
This command never sends version 2 binary frames.
8.4.3.5.2
High speed select
This command selects a card in the antenna field (according to the selection criteria)
or prepares a multiselect command, switches to high baud rates and enables 256byte frames. If execution is successful, the command returns the UID of the selected
card and the used baud rate. The reader automatically detects the maximum frame
size of the card. The reader also tries to communicate to the transponder with the
specified baud rate. If no communication is possible, the reader will automatically
decrease the speed to the next lower value.
This command can also force the reader to the communication speed and frame size
of the tag to the specified values. This is only needed if the high speed select is done
manually with the transfer command.
Command
Command
Data
‘h’
option byte (1 byte)
00h … select a single card with 106kBaud
02h … select a single card with 212kBaud
04h … select a single card with 424kBaud
08h … select a single card with 848kBaud
10h … prepare next multiselect for 106kbaud
12h … prepare next multiselect for 212kbaud
14h … prepare next multiselect for 424kbaud
18h … prepare next multiselect for 848kbaud
20h … forces reader to 106kBaud
22h … forces reader to 212kBaud
24h … forces reader to 424kBaud
28h … forces reader to 848kBaud
30h – 38h … force tag frame size
ASSA ABLOY Identification Technologies GmbH
57
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
Answer
Answer
Description
Data (n bytes) serial number + frame size used and baud rate
+ frame size
and baud rate
(1byte)
'F'
Error: General failure
‘N’
Error: No Tag in the field
Example
Command
Description
h08
1234567890ABCD84
Select the card with UID 1234567890SABCD.
The card supports a 256-byte frame size and 424kBaud on the
air interface.
ASSA ABLOY Identification Technologies GmbH
58
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
8.4.3.5.3
Answer from 0xh and 1xh
The lower nibble contains the baud rate used for the air interface.
Baud Rate
Description
x0
106kBaud
x2
212kBaud
x4
424kBaud
x8
848kBaud
Figure 8-21: Baud Rate values
The higher nibble contains the frame size used for the air interface.
Frame Size
Description
0x
16 Bytes
1x
24 Bytes
2x
32 Bytes
3x
40 Bytes
4x
48 Bytes
5x
64 Bytes
6x
96 Bytes
7x
128 Bytes
8x
256 Bytes
Figure 8-22: Frame Size
8.4.3.5.4
Answer from 2xh and 3xh
The option byte is returned as the answer.
8.4.3.5.5
Select a single tag
No previous continuous read is required. The command executes an automatic field
reset.
8.4.3.5.6
Extended ID
See above for more information on Extended ID.
The RATS answer is inserted between the serial number and baud rate / frame size
byte for ISO14443 A tags.
ASSA ABLOY Identification Technologies GmbH
59
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
8.4.3.5.7
Multiple tags
This command with parameter 1xh prepares the next multiselect command as a highspeed select. Any other command will disable the preparation.
8.4.3.5.8
RATS Guard Time SFGT
A high-speed select with parameters 0xh and 1xh automatically waits the SFGT
guard time gotten from the tag before sending the PPS command.
8.4.3.6
Multi-Tag Selection / List
This command detects several tags at the same time. It replaces the fast select
command ('s') in multiple tag surroundings. The Multi-Tag List command lists all tags
with their serial numbers. Use the Multi-Tag Select command to select a single tag.
Each tag has to be selected separately.
Command
Command
Data
'm'
Serial number (n bytes)
 (1 byte)
Answer
Answer
Description
Data
serial number
'N'
Error: No Tag in the field
Example
Command
Description
m
04E9E700000000
34030F07
02
m04E9E700000000
Select card with its serial number
8.4.3.6.1
first card
second card
number of detected tags
Multi-tag list
Sending a  as the first parameter, the reader returns a list of all tags present in
the antenna field. In the end the total number of tags detected is returned.
ASSA ABLOY Identification Technologies GmbH
60
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
8.4.3.6.2
Reading distance
Each card needs a specific amount of power. The reader always provides the same
amount of power. Therefore, the reading distance will decrease if more tags are
present. Basically, the reading distance depends on the tag, the antenna and the
tuning of the antenna.
8.4.3.6.3
Multi-tag select
Using the serial number with  as parameter, the corresponding tag will be
selected. High-level interactions can be performed addressing only this card. All
other tags remain silent.
8.4.3.6.4
Multi-tag reset
The antenna field reset can be deactivated with the Protocol configuration 2 register.
By suppressing the antenna field reset, it is possible to detect only new tags in the
antenna field.
8.4.3.6.5
Maximum number of tags
The maximum number of tags in the antenna field is limited to 30 and by the physical
characteristics of the antenna.
ASSA ABLOY Identification Technologies GmbH
61
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
8.4.3.7
Include tag type
This command includes a specific tag type to those addressed by the reader device.
Command
Command
Data
‘o+’
tag type (1 byte)
Answer
Answer
Description
'O+' + tag type (1 byte)
Command code + String of tag type
Tag type character
Refer to Set tag type.
Example
Command
Description
o+a
Include ISO14443-A to the tag types addressed
by the reader device.
ASSA ABLOY Identification Technologies GmbH
62
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
8.4.3.8
Exclude tag type
This command excludes a specific tag type from being addressed by the reader
device.
Command
Command
Data
‘o-’
Tag type (1 byte)
Answer
Answer
Description
'O-' + tag type (1 byte)
Command code + String of tag type
Tag type character
Refer to Set tag type.
Example
Command
Description
o-a
Exclude ISO14443-A from the tag types
addressed by the reader device.
ASSA ABLOY Identification Technologies GmbH
63
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
8.4.3.9
Set tag type
This command sets up the reader for a specific tag type. The continuous read
function will speed up because only this type of tag is addressed. After a reset, the
reader starts as defined in its start-up configuration.
Command
Command
Data
'o'
ISO type (1 byte)
'a' … ISO 14443 Type A
'b' … ISO 14443 Type B
's' … SR176
't' … activate all tags
Answer
Answer
Description
'OA'
'OB'
'OS'
'OT'
String of tag type
Example
Command
Description
oa
Sets the reader device to address ISO14443-A type tags.
ASSA ABLOY Identification Technologies GmbH
64
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
8.4.3.10
Set Configuration Flags
This command allows setting some configuration flags just in time; no reset is
needed. The values are not stored in the EEPROM, therefore the changed values
are not available after a reset.
Command
Command
Data
of
flag type (1 byte)
data (1 byte)
Answer
Answer
Description
Data (1 byte)
Current state of changed flag.
'R'
Error: Out of range
Example
Command
Description
of0101
Answer: 01
Enables the New Serial Mode flag.
ASSA ABLOY Identification Technologies GmbH
65
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
Flag Types
The following table shows the Flag Type with its corresponding flag from the
specified Protocol Configuration Register.
Flag
Type
Corresponding Flag
Protocol
Configuration
Register
Valid
values
00h
Multitag
00 / 01
01h
New Serial Mode
00 / 01
02h
LED
00 / 01
03h
Single Shot
00 / 01
04h
Extended Protocol
00 / 01
05h
Extended ID
00 / 01
06h
Disable Multitag Reset
00 / 01
07h
Noisy Environment
00 / 01
08h
Reset Recovery Time
Multiplier
00 … 03
09h
Enable ISO14443 B Anticollision
00 / 01
0Ah
Disable ISO14443-4 Error
Handling
00 / 01
0Bh
Disable automatic
ISO14443-4 timeouts
00 / 01
0Dh
Page Read
00 / 01
11h
ReqA Extended ID
00 / 01
Figure 8-23: Flag Type with corresponding flag
8.4.3.10.1
Out of range failure 'R'
The entered flag type is out of range.
ASSA ABLOY Identification Technologies GmbH
66
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
8.4.3.11
Set Configuration Register
This command allows setting some configuration registers just in time; no reset is
needed. The values are not stored in the EEPROM; therefore the changed values
are not available after a reset.
Command
Command
Data
og
Register type (1 byte)
data (1 byte)
Answer
Answer
Description
Data (1 byte)
Current state of changed register.
'R'
Error: Out of range
Example
Command
Description
og0450
Answer: 50
Sets the Reset Recovery Time to 50h.
ASSA ABLOY Identification Technologies GmbH
67
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
Register Types
The following table shows the Register Type with its corresponding register.
Register Type
Corresponding Register
00h
Single shot time-out value
01h
Internal use / Do not change
02h
Internal use / Do not change
03h
Reset Off Time
04h
Reset Recovery Time
05h
ISO 14443A Selection Time-out
06h
ISO 14443B Selection Time-out
07h
SR176 Selection Time-out
08h
AFI
0Ch
Page Read Start
0Dh
Page Read Number
0Eh
Command Guard Time
Figure 8-24: Register Type with corresponding register
8.4.3.11.1
Out of range failure 'R'
The entered register type is out of range.
ASSA ABLOY Identification Technologies GmbH
68
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
8.4.3.12
Antenna power on/off
This command controls the antenna power. It can be used to decrease the power
consumption of the reader.
Command
Command
Data
'pon'
Switch reader on
'poff'
Put reader in standby mode
Answer
Answer
Description
'P'
Positive acknowledge
Example
Command
Description
poff
Put reader in standby mode
8.4.3.12.1
Power off
The reader enters standby mode. Power consumption is decreased. All tags in the
antenna field are powered off and reset. Standby mode is only entered manually.
To switch off the whole unit, pin 16 (Enable) has to be set to logic low.
8.4.3.12.2
Power on
The reader leaves standby mode and is ready for the next command. Sending a tag
command (i.e. select, continuous read) the reader is powered up.
ASSA ABLOY Identification Technologies GmbH
69
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
8.4.3.13
Read/Write user port
This command sets or reads the state of the user port (pin 14) of the OEM reader
device. The port is set either as output or as input.
Command
Command
Data
'pr'
none
'pw'
State of user port (1 Byte)
Answer
Answer
Description
Data
State of user port (1 Byte)
'C'
Error: Error correction fails
'F'
Error: Transmission Error / No answer received
Example
Command
Description
pr
Reads user port
pw01
Sets user port state to high
8.4.3.13.1
Read port
The port read command returns the current state of the USER port.
Port state
Description
00h
USER port is low
01h
USER port is high
Figure 8-25: Read USER port return values
ASSA ABLOY Identification Technologies GmbH
70
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
8.4.3.13.2
Write port
If user port is used as an output, a 1kΩ resistor has to be integrated into the wire.
Otherwise the reader device can be damaged.
Port state
Description
00h
Sets USER port to low
01h
Sets USER port to high
02h – 7Fh
RFU
80h - FFh
Sends a serial data frame and checks the received frame
Figure 8-26: Write User port settings
Sending a Data Frame
If the highest bit (MSB) is set in the State of the User Port, the command sends a
serial data frame out the USER port.
The frame includes a start bit, 8 data bits, parity bit and a stop bit.
Transmit
Frame
Description
Low
Start bit
Low
RFU
Data Bit 6
State of the User Port Bit 6
Data Bit 5
State of the User Port Bit 5
Data Bit 4
State of the User Port Bit 4
Data Bit 3
State of the User Port Bit 3
Data Bit 2
State of the User Port Bit 2
Data Bit 1
State of the User Port Bit 1
Data Bit 0
State of the User Port Bit 0
Parity Bit
Even Parity Bit
High
Stop Bit
Figure 8-27: Sending Serial Data Frame
After 2ms Guard Time the answer should be received on the User Port otherwise an
error is returned.
ASSA ABLOY Identification Technologies GmbH
71
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
Receive
Frame
Low
Description
Start bit
Error Bit
If set, an error was detected.
Data Bit 6
State of the User Port Bit 6
Data Bit 5
State of the User Port Bit 5
Data Bit 4
State of the User Port Bit 4
Data Bit 3
State of the User Port Bit 3
Data Bit 2
State of the User Port Bit 2
Data Bit 1
State of the User Port Bit 1
Data Bit 0
State of the User Port Bit 0
Parity Bit
Even Parity Bit
High
Stop Bit
Figure 8-28: Receiving Serial Data Frame
If the Error bit is set or the Parity Bit is not correct, the Write User Port command
returns an error code.
8.4.3.14
Quiet
This command sets a selected tag into halt state.
Command
Command
Data
'q'
none
Answer
Answer
Description
'Q'
Halt state successfully set.
'N'
Error: No Tag in the field
8.4.3.14.1
ISO 14443 Type A
With ISO14443 Type A tags, the Quiet command always answers with 'Q' because
the halt command does not send any acknowledge.
ASSA ABLOY Identification Technologies GmbH
72
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
8.4.3.14.2
ISO 14443 Type B
Some ISO14443 Type B tags do not support this command or do not respond. ‘Quiet’
is an ISO 14443-4 command, so it will work only if the ‘Deselect’ command is
supported by the corresponding transponder.
8.4.3.14.3
SR176
With SR176 tags the Quiet command always answer with 'Q' because the completion
command does not send any acknowledge.
8.4.3.15
Read block
This command reads a data block on a card. The size of the returned data depends
on the tag used. The block address range depends on the tag as well.
Command
Command
Data
'r'
Block address (1 byte), valid range 00h – 40h
'rb'
Block address (1 byte)
Answer
Answer
Description
Data
data block (depends on tag type)
'F'
Error: read failure
'N'
Error: No tag in field
'O'
Error: Operation mode failure
'R'
Error: Out of range
Example
Command
Description
rb05
Reads block 05.
8.4.3.15.1
Read failure 'F'
This error is returned if either the reader receives bad data or the block address
exceeds the block address range of the sector.
ASSA ABLOY Identification Technologies GmbH
73
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
8.4.3.15.2
No tag in field 'N'
The tag does not respond. There is either no tag present or addressed.
8.4.3.15.3
Operation mode failure 'O'
The presented tag is not ISO14443 type A compliant.
8.4.3.15.4
Out of range failure 'R'
The block address of the 'r' command is higher than 40h.
The block address of the 'r' command conflicts with other commands, therefore the
block address has to be limited to 40h.
Use the 'rb' command instead.
8.4.3.16
Read reader EEPROM
This command reads the internal reader EEPROM. It contains all start-up parameters
and the device ID. Changes in the start-up settings will only go into effect after a
reset of the device.
Command
Command
Data
'rp'
EEPROM address (1 byte) 00h … EFh
Answer
Answer
Description
Data
EEPROM data (1 byte)
'R'
Error: Out of range failure
Example
Command
Description
rp0B
Reads protocol configuration register.
8.4.3.16.1
Out of range failure 'R'
The entered EEPROM address is not valid.
ASSA ABLOY Identification Technologies GmbH
74
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
8.4.3.17
Select
This command selects a single card in the antenna field. It can only be used in single
tag mode. If successfully executed, the command returns the UID of the selected
card. The reader detects the length of the UID automatically.
Command
Command
Data
's'
None
Answer
Answer
Description
Data
serial number
'N'
Error: No Tag in the field
Example
Command
Description
1234567890ABCD
Select the card with UID 1234567890SABCD.
8.4.3.17.1
Select a single tag
No previous continuous read is required. The command executes an automatic field
reset.
8.4.3.17.2
Extended ID
See above for more information on Extended ID.
8.4.3.17.3
Multiple tags
This command is designed for fast access of a single tag in the field. If multiple cards
are used the 'm' instruction has to be used instead.
ASSA ABLOY Identification Technologies GmbH
75
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
8.4.3.18
Get Version
This command returns the current version of the reader module.
Command
Command
Data
'v'
None
Answer
Answer
Description
'Dual 2.2' +  + 
ASCII Mode
02 00 08 44 75 61 6C 20 32 2E 32 32 03
Binary Mode
Example
Command
Description
‘Dual 2.2’
Version of the reader module
ASSA ABLOY Identification Technologies GmbH
76
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
8.4.3.19
Write DESFire key
This command is used to store a key into the DESFire key memory of the reader.
The reader can store up to 32 keys. DESFire keys can be used for fast access to
applications on a card.
Command
Command
Data
'wf'
Key number (1 byte)
Key (16 bytes)
00h … 1Fh
Answer
Answer
Description
data
Written key (16 bytes)
'F'
Error: Write failure
'R'
Error: Out of range
Example
Command
Description
wf000011223344556677889
9AABBCCDDEEFF
Store key
00112233445566778899AABBCCDDEEFFh in
EEPROM (key number 0).
8.4.3.19.1
Out of range failure 'R'
The entered key number exceeds the permitted range.
8.4.3.19.2
Writing DESFire Keys
Keys are write only. It is not possible to read the keys. Nevertheless the reader
returns correct error messages if the writing process fails.
A verification of the DESFire key can only be done using an appropriate card and
following successful login.
8.4.3.19.3
Using DESFire keys for authentication
DESFire keys may be used for DESFire tag authentication or DES/TDES
encryption/decryption.
Each key is 16 bytes long and stored redundantly for data security.
ASSA ABLOY Identification Technologies GmbH
77
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
8.4.3.20
Write master key
This command stores a mifare® Standard key into the master key memory of the
reader. The reader can store up to 32 keys.
Command
Command
Data
'wm'
Key number (1 byte)
Key (6 bytes)
00h … 1Fh
Answer
Answer
Description
data
Written key (6 bytes)
'F'
Error: Write failure
'R'
Error: Out of range
Example
Command
Description
wm00112233445566
Store key 112233445566h in EEPROM (key
number 0).
wm02A0A1A2A3A4A5
Store transport key 1 in EEPROM key 2.
8.4.3.20.1
Out of range failure 'R'
The entered key index exceeds the address range.
8.4.3.20.2
Writing master keys
Keys are Write-Only. It is not possible to read the keys. Nevertheless the reader
returns correct error messages if the writing process fails.
A verification of the master key can only be done using an appropriate card and
following successful login.
8.4.3.20.3
Using master keys for authentication
Master keys may be used for ISO-14443 A tag authentication. It is possible to use
every stored key for key A as well as key B authentication.
Each key is 6 bytes long and stored redundantly for data security.
ASSA ABLOY Identification Technologies GmbH
78
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
8.4.3.21
Write block
This command writes data to a block. A read is done automatically after every write
to ensure correct writing.
Command
Command
Data
'w'
Block address (1 byte), valid range 00h – 40h
Data (n bytes)
'wb'
Block address (1 byte)
Data (n bytes)
Answer
Answer
Description
Data
Data block (depends on tag type)
'F'
Error: Write failure
'N'
Error: No tag in field
'O'
Error: Operation mode failure
'R'
Error: Out of range
Example
Command
Description
wb0511223344
Writes data 11223344 on block 05.
8.4.3.21.1
Write failure 'F'
This error is displayed if bad transmission conditions are given. If the block address
exceeds the physical number of blocks of a tag, this error is shown.
8.4.3.21.2
No tag error 'N'
This error is returned if no tag is present or the card does not respond.
8.4.3.21.3
Operation mode failure 'O'
The tag is not ISO14443 type A compliant.
ASSA ABLOY Identification Technologies GmbH
79
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
8.4.3.21.4
Out of range failure 'R'
The block address of the 'w' command is higher than 40h.
The block address of the 'w' command conflicts with other commands, therefore the
block address has to be limited to 40h.
Use the 'wb' command instead.
8.4.3.22
Write EEPROM
Writes to the internal reader EEPROM. It contains all start-up parameters and the
device ID. Changes to the start-up settings will only go into effect after a reset of the
device.
Command
Command
Data
'wp'
Address (1 byte), valid range 0Ah - EFh
Data (1 byte)
Answer
Answer
Description
Data
EEPROM data (1 byte)
'F'
Error: Read after write failure
'R'
Error: Out of range failure
Example
Command
Description
wp0A01
Set EEPROM address 0A (Station ID) to 01h
8.4.3.22.1
Out of range failure 'R'
The entered address exceeds the address range.
ASSA ABLOY Identification Technologies GmbH
80
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
8.4.3.23
Reset
This command executes a power on (software) reset. New configuration settings will
be loaded. It resets all tags in the antenna field.
Command
Command
Data
'x'
None
Answer
Answer
Description
'Dual 2.2' +  +  ASCII Mode
None
8.4.3.23.1
Binary Mode
Disable Start-up Message
If the start-up message is disabled in the protocol configuration register 2, the ASCII
mode does not respond with the version of the reader.
8.4.3.23.2
Reset Timing
The power up timing depends on environmental conditions such as voltage ramp up.
For handheld devices the timing can vary based on the charge state of the battery.
ASSA ABLOY Identification Technologies GmbH
81
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
8.4.3.24
Field Reset
The field reset switches off the antenna field for the specified duration. All tags need
a certain amount of time to initialize before a command can be processed. The
second byte specifies the field recovery time.
Command
Command
Data
'y'
Off time in milliseconds (1 byte)
Field recovery time in milliseconds (1 byte)
Answer
Answer
Description
'Y'
After the field reset the reader sends back a ‘Y’ to
acknowledge the command.
ASSA ABLOY Identification Technologies GmbH
82
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
8.4.4 ISO 14443 Type A only commands
8.4.4.1
Increment value block (credit)
Increments a value block with a defined value. A read is done automatically after a
write to verify data integrity. The command fails if the source block is not in value
block format. A previous login is needed to access a block.
Command
Command
Data
'+'
Block (1 byte)
Value (4 bytes)
Answer
Answer
Description
Data
Value (4 bytes)
'I'
Error: value block failure
'F'
Error: increment failure
'N'
Error: No tag in field
'O'
Error: Operation mode failure
Example
Command
Description
+0400000001 Adds 1 to value block 4
+0500000100 Adds 256 to value block 5
8.4.4.1.1
No value block 'I'
Specified block does not match the value format. The value block is corrupted. A
backup block can be used to restore the correct value.
8.4.4.1.2
Increment failure 'F'
The Increment failure indicates a general failure during the increment procedure or
inability to read after the write process.
ASSA ABLOY Identification Technologies GmbH
83
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
8.4.4.1.3
No tag error 'N'
The reader does not detect a response from the tag. There is either no tag present or
the tag does not respond to the request.
8.4.4.1.4
Operation mode failure 'O'
The tag is not ISO14443 type A compliant.
8.4.4.2
Decrement value block (debit)
Decrements a value block with a defined value. A read is done automatically after the
write to verify data integrity. The command fails if the source block is not in value
block format. A previous login is needed to access a block.
Command
Command
Data
'-'
Block (1 byte)
Value (4 bytes)
Answer
Answer
Description
Data
Value (4 bytes)
'I'
Error: value block failure
'F'
Error: increment failure
'N'
Error: No tag in field
'O'
Error: Operation mode failure
Example
Command
Description
-0400000001 Subtract 1 to value block 4
-0500000100 Subtract 256 to value block 5
8.4.4.2.1
No value block 'I'
Specified block does not match the value format. The value block is corrupted. A
backup block can be used to restore the correct value.
ASSA ABLOY Identification Technologies GmbH
84
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
8.4.4.2.2
Decrement failure 'F'
The Decrement failure indicates a general failure during the decrement procedure or
inability to read after the write process.
8.4.4.2.3
No tag error 'N'
The reader does not detect a response from the tag. There is either no tag present or
the tag does not respond to the request.
8.4.4.2.4
Operation mode failure 'O'
The tag is not ISO14443 type A compliant.
8.4.4.3
Copy value block (backup)
Copies a value block to another block of the same sector. A read is done
automatically after the write to ensure data integrity. Used for backup and error
recovery. A previous login is needed to access a block.
Command
Command
Data
'='
Source block (1 byte)
Target block (1 byte)
Answer
Answer
Description
Data
New value of target block (4 bytes).
'I'
Error: value block failure
'F'
Error: increment failure
'N'
Error: No tag in field
'O'
Error: Operation mode failure
Example
Command
Description
=0405
Copy value block 4 to block 5
=0506
Copy value block 5 to block 6
ASSA ABLOY Identification Technologies GmbH
85
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
8.4.4.3.1
Target block
The target block does not need to be a valid value block. If the source block is not in
value format, the command fails.
8.4.4.3.2
No value block 'I'
Source value block is not in a valid value block. The value block is corrupted. A
backup block can be used to restore the correct value.
8.4.4.3.3
Copy failure 'F'
The Copy failure indicates a general failure during the copy procedure or inability to
read after the write process.
8.4.4.3.4
No tag error 'N'
The reader does not detect a response of the tag. There is either no tag present or
the tag does not respond to the request.
8.4.4.3.5
Operation mode failure 'O'
The tag is not ISO14443 type A compliant.
ASSA ABLOY Identification Technologies GmbH
86
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
8.4.4.4
Login (authenticate tag)
Performs an authentication in order to access one sector of a mifare® card. Only one
sector can be accessed at a time.
Optionally, the command can be used to transmit the key data to the reader-stored
keys, in the reader EEPROM.
To store keys in the EEPROM, the write master key command is used. It is possible
to store up to 32 master keys in the reader EEPROM. The login requires a successful
select.
Command
Command
Data
'l'
Sector (1 byte), valid range 00h - 3Fh
Key type (1 byte)
AAh authenticate with key type A
FFh authenticate with key type A, transport key
FFFFFFFFFFFFh
BBh authenticate with key type B
10h … 2Fh authenticate with key type A using stored
key (00h … 1Fh)
30h … 4Fh authenticate with key type B using stored
key (00h … 1Fh)
Key (6 bytes) /  (1 byte), optional
By transmitting  instead of the keydata
authentication is done with manufacturer’s transport
keys (A0A1A2A3A4A5h, B0B1B2B3B4B5h,
FFFFFFFFFFFFh).
Answer
Answer
Description
data
Login status (1 byte)
'L'
Login success
'F'
Error: General failure
'N'
Error: No tag
'O'
Error: Operation mode failure
'R'
Error: Out of range
'X'
Error: Authentication failed
ASSA ABLOY Identification Technologies GmbH
87
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
Example
Command
Description
l02AA
Authenticate for sector 2, using the transport key A
(A0A1A2A3A4A5h, key type A)
l3FBB
Authenticate for sector 63, using the transport
key 2 (B0B1B2B3B4B5h, key type B)
l04FF
Authenticate for sector 4, using the transport key 3
(FFFFFFFFFFFFh, key type A)
l0FAAFFFFFFFFFFFF
Authenticate for sector 15, using key
FFFFFFFFFFFFh, key type A
l0E14
Authenticate for sector 14, using EEPROM key 4,
key type A
l0530
Authenticate for sector 5, using EEPROM key 0,
key type B
l0732
Authenticate for sector 7, using EEPROM key 2,
key type B
l0110
Authenticate for sector 1, using EEPROM key 0,
key type A
l0ABBFF12FFFFFF35
Authenticate for sector 10, using key
FF12FFFFFF35h, key type B
8.4.4.4.1
No tag error 'N'
The reader does not detect a response from the tag. There is either no tag present or
the tag does not respond to the request.
8.4.4.4.2
Operation mode failure 'O'
The tag is not ISO14443 type A compliant.
8.4.4.4.3
Out of range failure 'R'
The entered key type or the sector is out of range.
ASSA ABLOY Identification Technologies GmbH
88
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
8.4.4.4.4

Three transport keys are implemented to access cards quickly.
By transmitting  instead of the key, the reader module uses the transport keys
for the login procedure.
Command
Description
LxxAA
Authenticate for sector xx, using the transport key 1
(A0A1A2A3A4A5h, key type A)
LxxBB
Authenticate for sector xx, using the transport key 2
(B0B1B2B3B4B5h, key type B)
LxxFF
Authenticate for sector xx, using the transport key 3
(FFFFFFFFFFFFh, key type A)
8.4.4.4.5
Login with key data from EEPROM
Each key stored in the reader EEPROM can be used as type A or type B key. To use
a key as type A, the value 10h must be added to the key index. 30h must be added
to use a key as type B.
8.4.4.4.6
Usage of key A, key B
®
mifare cards support two different crypto keys for each sector. Each key is 32 bits
long and is stored in the sector trailer (last block of the sector) on the card. It is
possible to set different access rights for each key.
ASSA ABLOY Identification Technologies GmbH
89
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
8.4.4.5
Read value block
Reads a value block. The command checks if data is in value block format. The read
value block command needs a successful login.
Command
Command
Data
'rv'
Value block (1 byte)
Answer
Answer
Description
Data
Read value (4 bytes)
'F'
Error: General failure
'I'
Error: value block failure
'N'
Error: No tag in field
'O'
Error: Operation mode failure
Example
Command
Description
rv04
Reads value of block 4.
8.4.4.5.1
No value block 'I'
The value read back after the write value command is not a value block. Data was
written corruptly.
8.4.4.5.2
No tag error 'N'
This means that the tag does not respond, because either there is no tag present or
none of the tags in the field are authenticated ('l' instruction).
8.4.4.5.3
General failure 'F'
In addition to the case of a data read failure caused by bad transmission conditions,
this error is returned if a sector is addressed which is not located in the authenticated
area.
8.4.4.5.4
Operation mode failure 'O'
The tag is not ISO14443 type A compliant.
ASSA ABLOY Identification Technologies GmbH
90
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
8.4.4.6
Write value block
This command formats a block as a value block containing a 32-bit value. A read is
performed automatically after the write. Value blocks need a complete 16-byte block
due to redundant storage. A successful login is required to run the command.
Command
Command
Data
'wv'
Value block (1 byte)
Value (4 bytes)
Answer
Answer
Description
Data
Written value (4 bytes)
'I'
Error: value block failure
'F'
Error: increment failure
'N'
Error: No tag in field
'O'
Error: Operation mode failure
Example
Command
Description
wv05010055EF Writes value 010055EFh to block 5.
8.4.4.6.1
Invalid value 'I'
The value read back after the write value command is not a value block. Data was
written corruptly.
8.4.4.6.2
Write failure 'F'
In addition to the case of a data read failure caused by bad transmission conditions,
this error is returned if a sector is addressed which is not located in the authenticated
area.
8.4.4.6.3
No tag error 'N'
This error is returned if no tag is present or the card does not respond.
ASSA ABLOY Identification Technologies GmbH
91
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
8.4.4.6.4
Operation mode failure 'O'
The tag is not ISO14443 type A compliant.
8.4.4.6.5
Writing values
The write value block command is designed to create blocks in value format. This
command requires write access to the specified block. Using this instruction for
ticketing operations is not recommended. For ticketing applications, special
instructions (Increment/Decrement/Copy) are available.
ASSA ABLOY Identification Technologies GmbH
92
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
8.4.5 SR176 only commands
8.4.5.1
Lock block
This command locks a block permanently.
Command
Command
Data
'k'
Block address (1 byte)
Answer
Answer
Description
data
'K' + page address
'F'
Error: Lock failure
'N'
Error: No tag in field
'O'
Error: Operation mode failure (only SR176 tags supported)
'X'
Error: Block already locked
Example
Command
Description
k05
K05
Lock block 05.
8.4.5.1.1
Operation mode failure 'O'
The presented tag is not a SR176 tag.
8.4.5.1.2
Apply settings
After locking a block permanently, the tag needs to be selected for the settings to
apply.
ASSA ABLOY Identification Technologies GmbH
93
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
8.4.6 DESFire command set
This command set provides easy communication with DESFire tags. The reader
handles all encryption and decryption automatically. The length byte includes all data
and command bytes.
For more information about DESFire, refer to DESFire documentation [2].
The DESFire command set is only available for ISO 14443 Type A tags; with other
tags, the Error Code 'O' is returned.
A DESFire command has the following syntax:
Command
Data
'f'
Length byte (1 byte)
DESFire Command Code (1 byte)
Data (n bytes)
Example
Command
Description
f0107
Get Application IDs.
f020D00
Select File 00h.
All the following DESFire commands are listed without length byte.
ASSA ABLOY Identification Technologies GmbH
94
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
8.4.6.1
Authenticate
Authenticates to a DESFire card. Authentication depends on access conditions of an
application or file. ROM keys can be used to login. The reader can store up to 32
keys internally.
Command
Command
Data
00h
Key number on tag (1 byte)
Key number (1 byte) / Key on reader (16 bytes)
Answer
Answer
Description
Data
Authentication status (1 byte)
'L'
Login success
'F'
Error: General failure
'N'
Error: No tag in field
'X'
Error: Authentication failed
Xxh
DESFire status / error code, refer to DESFire documentation
Example
Command
Description
f03000000
Authenticate using key 00h of the tag and key 00h
stored in reader ROM.
f12020011223344556677
8899AABBCCDDEEFF
Authenticate using key 02h of the tag and key
00112233445566778899AABBCCDDEEFFh.
ASSA ABLOY Identification Technologies GmbH
95
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
8.4.6.2
Change Key Settings
This command changes the key settings of a selected application.
Command
Command
Data
01h
Settings (1 byte)
Answer
Answer
Description
data
Status code (1 byte)
00h
Success
'N'
Error: No tag in field
Xxh
DESFire status / error code, refer DESFire documentation
Example
Command
Description
f0201FF
Answer: 00
change key settings to FFh.
ASSA ABLOY Identification Technologies GmbH
96
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
8.4.6.3
Get Key Settings
This command gets the key settings of a selected application. Settings of the
currently selected application are returned. Additionally the maximum number of keys
that can be stored in the application is displayed.
Command
Command
Data
02h
none
Answer
Answer
Description
00h +
Key settings (1 byte) +
max. number of keys (1 byte)
Key settings
'N'
Error: No tag in field
Xxh
DESFire status / error code, refer DESFire
documentation
Example
Command
Description
f0102
Answer: 000F01
Key settings of the application are 0F and key
number 01 is used.
ASSA ABLOY Identification Technologies GmbH
97
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
8.4.6.4
Change Key
This command changes the key of a selected application.
Command
Command
Data
03h
Key number on tag (1 byte)
New key (16 bytes)
Old key (16 bytes)
Answer
Answer
Description
Data
Status code (1 byte)
00h
Success
'F'
Error: General failure
'N'
Error: No tag in field
Xxh
DESFire status / error code, refer to DESFire documentation
Example
Command
Description
f22030000112233445566 Answer: 00
778899AABBCCDDEEFF Key 00h is changed to
000000000000000000000 00112233445566778899AABBCCDDEEFFh.
00000000000
ASSA ABLOY Identification Technologies GmbH
98
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
8.4.6.5
Get Key Version
This command reads the key version of a key of a selected application.
Command
Command
Data
04h
Key number on tag (1 byte)
Answer
Answer
Description
00h +
Key version
(1 byte)
Key version
'N'
Error: No tag in field
Xxh
DESFire status / error code, refer to DESFire documentation
Example
Command
Description
f020400
Answer: 0000
Key version 00h.
ASSA ABLOY Identification Technologies GmbH
99
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
8.4.6.6
Create Application
This command creates an application on a tag. Applications can only be created in
the master application (000000h).
Command
Command
Data
05h
Application ID (3 bytes)
Key settings (1 byte)
Number of keys (1 byte)
Answer
Answer
Description
Data
Status code (1 byte)
00h
Success
'N'
Error: No tag in field
Xxh
DESFire status / error code, refer to DESFire documentation
Example
Command
Description
f06050000100F01
Answer: 00
Create application 000010h with one key.
ASSA ABLOY Identification Technologies GmbH
100
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
8.4.6.7
Delete Application
This command deletes an application on a tag.
Command
Command
Data
06h
Application ID (3 bytes)
Answer
Answer
Description
Data
Status code (1 byte)
00h
Success
'N'
Error: No tag in field
Xxh
DESFire status / error code, refer to DESFire documentation
Example
Command
Description
f0406000010
Answer: 00
Delete application 000010h.
ASSA ABLOY Identification Technologies GmbH
101
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
8.4.6.8
Get Application IDs
This command returns all application IDs on a tag.
Command
Command
Data
07h
None
Answer
Answer
Description
00h +
Application
IDs (3 bytes
each)
Application IDs
'N'
Error: No tag in field
Xxh
DESFire status / error code, refer to DESFire documentation
Example
Command
Description
f0107
Answer: 00000010
Application 000010h is available on the tag
ASSA ABLOY Identification Technologies GmbH
102
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
8.4.6.9
Select Application
This command selects a specific application. An application must be selected to
access all files stored in it.
Command
Command
Data
08h
Application ID (3 bytes)
Answer
Answer
Description
Data
Status code (1 byte)
00h
Success
'N'
Error: No tag in field
Xxh
DESFire status / error code, refer to DESFire documentation
Example
Command
Description
f0408000010
Answer: 00
Application 000010h is selected.
ASSA ABLOY Identification Technologies GmbH
103
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
8.4.6.10
Format PICC
This command formats the tag. All applications are deleted. The format command
requires successful authentication.
Command
Command
Data
09h
None
Answer
Answer
Description
Data
Status code (1 byte)
00h
Success
'N'
Error: No tag in field
Xxh
DESFire status / error code, refer to DESFire documentation
Example
Command
Description
f0109
Answer: 00
The tag is formatted successfully. All applications
and files have been deleted.
ASSA ABLOY Identification Technologies GmbH
104
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
8.4.6.11
Get Version
This command returns the production data of a tag.
Command
Command
Data
0Ah
none
Answer
Answer
Description
Data
Version (28 bytes)
For more detailed information refer to DESFire documentation.
'F'
Error: General failure
'N'
Error: No tag in field
Xxh
DESFire status / error code, refer to DESFire documentation.
Example
Command
Description
f010A
Answer:
040101000218050401010004180504453101366E
108E26515D502003
Version string of DESFire tag.
ASSA ABLOY Identification Technologies GmbH
105
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
8.4.6.12
Get File IDs
This command returns all file IDs found for a selected application.
Command
Command
Data
0Bh
none
Answer
Answer
Description
00h +
File IDs (1 byte each)
File IDs
'N'
Error: No tag in field
Xxh
DESFire status / error code, refer to DESFire
documentation
Example
Command
Description
f010B
Answer: 000005
File with ID 00h and 05h exists.
ASSA ABLOY Identification Technologies GmbH
106
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
8.4.6.13
Get File Settings
This command returns additional information of a file.
Command
Command
Data
0Ch
File number (1 byte)
Answer
Answer
Description
00h +
File settings (n bytes)
File settings
Length depends on file type.
For more detailed information refer to DESFire
documentation.
'F'
Error: General failure
'N'
Error: No tag in field
xxh
DESFire status / error code, refer to DESFire
documentation
Example
Command
Description
f020C00
Answer: 000000EEEE100000
File 00h is a standard data file with access
conditions EEEEh and data length 100000h.
ASSA ABLOY Identification Technologies GmbH
107
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
8.4.6.14
Select File
This command selects a specific file.
Command
Command
Data
0Dh
File number (1 byte)
Answer
Answer
Description
Data
Status code (1 byte)
00h
Standard Data File selected
01h
Backup Data File selected
02h
Value File selected
03h
Linear Record File selected
04h
Cyclic Record File selected
'N'
Error: No tag in field
Xxh
DESFire status / error code, refer DESFire documentation
Example
Command
Description
f020D00
Answer: 00
File 00h has been successfully selected.
ASSA ABLOY Identification Technologies GmbH
108
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
8.4.6.15
Change File Settings
This command changes the access rights of a selected file.
Command
Command
Data
0Eh
Communication settings (1 byte)
Access rights (2 bytes)
Answer
Answer
Description
Data
Status code (1 byte)
00h
Standard Data File selected
'N'
Error: No tag in field
'O'
Error: No file selected
Xxh
DESFire status / error code, refer to DESFire documentation
Example
Command
Description
f040E010000
Answer: 00
Sets file to MAC secured with key 0000h.
Note
For further information on communication settings and access rights, refer to the
DESFire documentation. [2]
ASSA ABLOY Identification Technologies GmbH
109
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
8.4.6.16
Create Standard Data File
This command creates a Standard Data File in a selected application.
Command
Command
Data
0Fh
File number (1 byte)
Communication settings (1 byte)
Access rights (2 bytes)
File size (3 bytes)
Answer
Answer
Description
Data
Status code (1 byte)
00h
Standard Data File created
'N'
Error: No tag in field
Xxh
DESFire status / error code, refer to DESFire documentation
Example
Command
Description
f080F0000EEEE100000
Answer: 00
Create standard data file with ID 00h.
Note
For further information on communication settings and access rights, refer to the
DESFire documentation.
ASSA ABLOY Identification Technologies GmbH
110
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
8.4.6.17
Create Backup Data File
This command creates a Backup Data File in a selected application. Backup data
files use a shadow register for data manipulation operations. The file number must be
in the range from 00h to 07h.
Command
Command
Data
10h
File number (1 byte)
Communication settings (1 byte)
Access rights (2 bytes)
File Size (3 bytes)
Answer
Answer
Description
Data
Status code (1 byte)
00h
Backup Data File created
'N'
Error: No tag in field
Xxh
DESFire status / error code, refer to DESFire documentation
Example
Command
Description
f081001000000100000
Answer: 00
Create backup data file with ID 01h. File is only
accessible after login with key 00h
Note
For further information on communication settings and access rights, refer to the
DESFire documentation.
ASSA ABLOY Identification Technologies GmbH
111
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
8.4.6.18
Create Value File
This command creates a Value File in a selected application. Value blocks are
signed long numbers, which are stored in Intel format (LSB first). Value files use a
shadow register for data manipulation operations. The file number must be in the
range from 00h to 07h.
Command
Command
Data
11h
File number (1 byte)
Communication settings (1 byte)
Access rights (2 bytes)
Low Limit (4 bytes)
High Limit (4 bytes)
Value (4 bytes)
Enable Limited Credit (1 byte)
Answer
Answer
Description
Data
Status code (1 byte)
00h
Value File created
'N'
Error: No tag in field
Xxh
DESFire status / error code, refer to DESFire documentation
Example
Command
Description
f12110503000000000000
666666663333333300
Answer: 00
Value file with ID 05h created. Transmission is
secured using DES encryption with key 00h.
Lower limit is 00000000h and high limit
66666666h. Default value is 33333333h.
Note
For further information on communication settings and access rights, refer to the
DESFire documentation.
ASSA ABLOY Identification Technologies GmbH
112
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
8.4.6.19
Create Linear Record File
This command creates a Linear Record File in a selected application. Linear record
files use a shadow register for data manipulation operations. The file number must be
in the range from 00h to 07h.
Command
Command
Data
12h
File number (1 byte)
Communication settings (1 byte)
Access rights (2 bytes)
Record Size (3 bytes)
Number of Records (3 bytes)
Answer
Answer
Description
Data
Status code (1 byte)
00h
Linear Record File created.
'N'
Error: No tag in field
Xxh
DESFire status / error code, refer to DESFire documentation
Example
Command
Description
f0B1202010000010000
100000
Answer: 00
Linear record file with ID 02 and MAC security is
created. Record size is 000001h and number of
records is 000010h.
Note
For further information on communication settings and access rights, refer to the
DESFire documentation.
ASSA ABLOY Identification Technologies GmbH
113
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
8.4.6.20
Create Cyclic Record File
This command creates a Cyclic Record File in a selected application. Cyclic record
files use a shadow register for data manipulation operations. The file number must be
in the range from 00h to 07h.
Command
Command
Data
13h
File number (1 byte)
Communication settings (1 byte)
Access rights (2 bytes)
Record Size (3 bytes)
Number of Records (3 bytes)
Answer
Answer
Description
Data
Status code (1 byte)
00h
Cyclic Record File created
'N'
Error: No tag in field
Xxh
DESFire status / error code, refer to DESFire documentation
Example
Command
Description
f0B1303010000020000
100000
Answer: 00
Cyclic record file with ID 03 and MAC security is
created. Record size is 000001h and number of
records is 000010h.
Note
For further information on communication settings and access rights, refer to the
DESFire documentation.
ASSA ABLOY Identification Technologies GmbH
114
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
8.4.6.21
Delete File
This command deletes a file on tag in a selected application.
Command
Command
Data
14h
File number (1 byte)
Answer
Answer
Description
Data
Status code (1 byte)
00h
File is successfully deleted
'N'
Error: No tag in field
Xxh
DESFire status / error code, refer to DESFire documentation
Example
Command
Description
f021403
Answer: 00
File with ID 03h is deleted.
ASSA ABLOY Identification Technologies GmbH
115
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
8.4.6.22
Read Data / Records
This command reads data of a selected Data or Record file.
Command
Command
Data
15h
Offset (3 bytes)
Length (1 byte)
Answer
Answer
Description
00h +
Data
Data (n bytes)
'C'
Error: CRC or MAC does not match
'N'
Error: No tag in field
'O'
Error: No file selected
'R'
Error: Out of range
Xxh
DESFire status / error code, refer to DESFire documentation
Example
Command
Description
f051500000005
Answer: 000011223344
Read 5 bytes from offset 000000h.
f051500000000
Answer: 0011112222
Read all records of the record file.
8.4.6.22.1
Our of range 'R'
If the data received exceeds the maximum of 232 bytes, the error R ('Out of range') is
returned.
Note
If performance is important, 232 bytes should be used for plain data and 224 should
be used for enciphered and MACed data, because in this case, the smaller frames
from the DESFire tag are filled up completely.
ASSA ABLOY Identification Technologies GmbH
116
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
8.4.6.23
Data files
The offset defines the start address of the reading. The length specifies the number
of bytes, which are read. The offset and length must not exceed the limits of the file.
8.4.6.24
Record file
Records are always read one at a time. The offset points to the record within the
record file from which the reading starts. The length defines the number of records
that have to be read. The response always starts with the oldest record. Offset
000000h points to the latest record. Length 00h reads all records of the record file.
ASSA ABLOY Identification Technologies GmbH
117
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
8.4.6.25
Write Data / Record
This command writes data to a selected Data or Record file. A write record command
will append a new record to a linear record file until all records are filled up. Using
cyclic record files, the oldest record is updated when all records are used up. The
write record command must be validated with the commit/abort transaction
command.
Command
Command
Data
16h
Offset (3 bytes)
Data (n bytes)
Answer
Answer
Description
Data
Status code (1 byte)
00h
Success
'C'
Error: CRC or MAC does not match
'N'
Error: No tag in field
'O'
Error: No file selected
'R'
Error: Out of range
Xxh
DESFire status / error code, refer to DESFire documentation
Example
Command
Description
f09160100001122334455
Answer: 00
Writes data 1122334455 starting at position
000001h to a data file or a new record.
ASSA ABLOY Identification Technologies GmbH
118
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
8.4.6.25.1
Our of range 'R'
If sent data exceeds the maximum of 232 bytes, the error R ('Out of range') is
returned.
Note
If performance is important 232 bytes should be used for plain data and 224 should
be used for enciphered and MACed data, because in this case the smaller frames
from the DESFire tag are filled up completely.
8.4.6.26
Get Value
This command reads a value block of a selected value file.
Command
Command
Data
17h
None
Answer
Answer
Description
00h +
Value (4 bytes)
Value
'C'
Error: CRC or MAC does not match
'N'
Error: No tag in field
'O'
Error: No file selected
Xxh
DESFire status / error code, refer to DESFire
documentation
Example
Command
Description
f0117
Answer: 0022222222
value 22222222h is currently stored in the value
file.
ASSA ABLOY Identification Technologies GmbH
119
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
8.4.6.27
Credit
This command increases a value in a selected value file. All value manipulation
commands are accumulated in a shadow register. This shadow register is only
written after a successful commit transaction command.
Command
Command
Data
18h
Data (4 bytes)
Answer
Answer
Description
Data
Status code (1 byte)
00h
Success
'N'
Error: No tag in field
Xxh
DESFire status / error code, to refer DESFire documentation
Example
Command
Description
f051878563412
Answer: 00
The value 12345678h is added to the selected
value file.
ASSA ABLOY Identification Technologies GmbH
120
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
8.4.6.28
Debit
This command decreases a value in a selected value file. All value manipulation
commands are accumulated in a shadow register. This shadow register is only
written after a successful commit transaction command.
Command
Command
Data
19h
Data (4 bytes)
Answer
Answer
Description
Data
Status code (1 byte)
00h
Success
'N'
Error: No tag in field
xxh
DESFire status / error code, refer to DESFire documentation
Example
Command
Description
f051944332211
Answer: 00
The value 11223344h is charged from the
selected value file.
ASSA ABLOY Identification Technologies GmbH
121
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
8.4.6.29
Limited Credit
This command limits the credit to a selected value file. The value depends on all
previous debit values. It enables to cancel misattributed debits. All value
manipulation commands are accumulated in a shadow register. This shadow register
is only written after a successful commit transaction command.
Command
Command
Data
1Ah
Data (4 bytes)
Answer
Answer
Description
Data
Status code (1 byte)
00h
Success
'N'
Error: No tag in field
Xxh
DESFire status / error code, refer to DESFire documentation
Example
Command
Description
f051A11111111
Answer: 00
The value 11111111h is added to the selected
value file. A previous debit sum of at least
11111111h is needed.
ASSA ABLOY Identification Technologies GmbH
122
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
8.4.6.30
Clear Record File
This command clears the whole content of a selected record file. After a commit /
abort transaction command the changes are written.
Command
Command
Data
1Bh
None
Answer
Answer
Description
Data
Status code (1 byte)
00h
Success
'N'
Error: No tag in field
Xxh
DESFire status / error code, refer to DESFire documentation
Example
Command
Description
f011B
Answer: 00
All records of the record file are erased.
ASSA ABLOY Identification Technologies GmbH
123
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
8.4.6.31
Commit Transaction
This command validates all previous write operations to backup data or record files
and data manipulations on value files in a selected application. All changes are done
at the same time.
Command
Command
Data
1Ch
None
Answer
Answer
Description
Data
Status code (1 byte)
00h
Success
'N'
Error: No tag in field
Xxh
DESFire status / error code, refer to DESFire documentation
Example
Command
Description
f011C
Answer: 00
All changes successfully executed.
ASSA ABLOY Identification Technologies GmbH
124
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
8.4.6.32
Abort Transaction
This command aborts all previous write operations to backup data or record files and
data manipulations on value files of a selected application. No data is changed.
Power loss will be interpreted as an abort transaction command.
Command
Command
Data
1Dh
None
Answer
Answer
Description
Data
Status code (1 byte)
00h
Success
'N'
Error: No tag in field
xxh
DESFire status / error code, refer to DESFire documentation
Example
Command
Description
f011D
Answer: 00
All modifications are cancelled.
ASSA ABLOY Identification Technologies GmbH
125
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
Software for contact interface functions
The contact interface is fully CCID and PC/SC compliant. Therefore there are no own commands
available. The PC/SC documentation can be downloaded from PC/SC workgroup web site
http://www.pcscworkgroup.com/.
In order to develop own application S/W it’s recommended to use the Microsoft SDK, as the reader
supports ScardControl commands.
ASSA ABLOY Identification Technologies GmbH
126
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
10 Frequently Asked Questions
10.1 Getting Started
To test and interface the ACGPass e-ID Desktop Reader, you just need to connect
the reader via the USB cable with a Microsoft Windows 2000® or Microsoft Windows
XP® based PC. You do not need a power supply for the reader. Once the reader is
connected then please just follow the instruction on the PC screen.
The PC/SC driver for the reader should come together with the reader. It is also
available via the next ASSA ABLOY ITG sales office, the web site
http://www.aaitg.com/
10.2 Personalized ACGPass e-ID Desktop Reader
In applications that are using the binary protocol mode, personalization maybe
required. Use the Utility program to set up your reader correctly. Ask the reseller or
the ASSA ABLOY ITG sales representative for the Utility software or download it
from http://www.aaitg.com/. Minimum requirements are Microsoft Windows 2000®,
Microsoft Windows XP® and the reader connected to the PC.
ASSA ABLOY Identification Technologies GmbH
127
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
10.3 What type of mifare® card should I use?
The mifare® standard is designed for multi-application environments. It contains 16
sectors each with 2 individual keys, access conditions, and 3 data or value blocks.
Some applications use the 1 Kbytes of the mifare® Standard Card Memory only as
storage area.
mifare® Ultralight has no crypto unit on chip. It only supports 16 blocks.
mifare® Standard 4k cards have the same features as mifare® Standard cards but
increased memory capacity.
10.4 How safe is mifare® Standard for cashless payment?
Security is always a feature of the overall system, not of the components. It requires
careful design.
A properly designed system will require ALL barriers to be hacked in order to be
broken.
For good design start identifying possible attacks and then create barriers to block
them.
mifare® was specifically designed for cashless payment applications. The mifare®
concept provides the following security barriers:
•
Anti-collision/-selection
•
Atomic value transaction
•
Ciphered communication
•
Storage of values and data protected by mutual authentication
•
Weak field keys that allow decrement only
•
Stored keys in the reader that are not readable
•
Keys in the card that are not readable
•
A brute force attack based on trying many different keys is limited by the
transaction time (several ms) of the card and would last virtually forever.
ASSA ABLOY Identification Technologies GmbH
128
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
The Application can and should provide more barriers:
•
Sector access conditions. It is possible to assign access conditions in a way
that only decrementing of values is allowed with the keys used in the field. So
even a manipulated field station cannot be used to increment the value on the
cards. As a general rule, key A is used as a field key, allowing only to read
and decrement values, and key B is used to format the card or increment
values.
•
Diversified keys. To make life even harder for attackers, keys can be modified
using the serial number and memory content of the card. So each card uses
different keys and a listening attack on the reader interface would be
hopeless.
•
Limiting cash volume stored on a card
•
Do not use the transport keys (keys programmed at the time of delivery) for
ticketing applications!
•
Ciphered and scrambled data storage
•
Sabotage alarm
•
Even higher security with contact less controller cards like mifare® DESFire,
mifare® ProX, mifare® Smart MX etc.
ASSA ABLOY Identification Technologies GmbH
129
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
10.5 Using a mifare® card
This example demonstrates the detection of a card in the antenna field with
continuous read and the reading of a page.
Command
Answer
Activate continuous read mode
B2197B58
a card responds with its serial number
abort continuous read mode
B2197B58
select card
l01AAFFFFFFFFFFFF
login into sector 1 with key
FFFFFFFFFFFFh key type A
rb04
00112233445566778899AABBCCDDEEFF
read block 04
Activate continuous read mode to detect a
new card
Figure 10-1: Using a mifare® card
ASSA ABLOY Identification Technologies GmbH
130
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
10.6 Using a DESFire card
10.6.1 Create a plain standard data file
After activation, application 0 is selected automatically. Default access rights of
application 0 require a login to create an application. The following example
illustrates the successful creation of a plain standard data file.
Command
Answer
04E10E00000000
activate card
f1200000000000000000000000000
0000000000
login to application 0
f06050000100F01
00
create application with ID 000010
f0408000010
00
select application with ID 000010
f080F0000eeee10000000
00
create plain standard data file
with ID 00
Figure 10-2: Create plain standard data file of a DESFire card
10.6.2 Use a plain standard data file
The next example demonstrates the use of a plain standard data file, such as that
created in the previous example. No login needed since the file is plain.
Command
Answer
04E10E00000000
activate card
f0408000010
00
select application with ID 000010
f020D00
00
select file with ID 00
f09160000001122334455
00
write data to standard data file
f051500000010
0011223344550000000000000000000000
read data from standard data file
Figure 10-3: Change data of a plain standard data file
ASSA ABLOY Identification Technologies GmbH
131
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
10.6.3 Create a value file
Basically, each application is created in the same way. The access rights of an
application can be adjusted to freeze the application organization. In this case, a
login to the application is needed to make any changes to the application.
Regardless of the application access rights, a file can be selected using its ID. Before
accessing a secured file, a login to the application is needed. A successful login
allows changing all the files in the application that use the same key.
A value file has a special structure. If a value file is changed the changes are only
accepted after a commit transaction command. This feature allows modifying several
files of an application and changing all the contents at the same time.
The following example illustrates the creation of a value file using DES encipher.
Command
Answer
04E10E00000000
activate card
f1200000000000000000000000000
0000000000
login to application 0
f06050000110F01
00
create application with ID 000011
f0408000011
00
select application with ID 000011
f12110003000000000000FFFFFF
7Ff5555555500
00
create value file with initial value
55555555 with ID 00. File is secured
with DES encipher
Figure 10-4: Create a plain standard data file on a DESFire card
ASSA ABLOY Identification Technologies GmbH
132
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
10.6.4 Use a DES secured value file
The next example demonstrates the use of a DES secured value file, such as the
one created in the previous example. After the selection of the application, a login
with the key of the value file is needed to access the file. Modification of the value file
is accepted after the commit transaction command is given.
Command
Answer
04E10E00000000
activate card
f0408000011
00
select application with ID 000010
f03000000
login to application
f020D00
02
select file with ID 00 (value file)
f0117
0055555555
read value file data
f051911111111
00
debit value file with 11111111
f0117
0055555555
read value file, no modification done
f011c
00
commit transaction, modification is done
f0117
0044444444
read value file, verify modification
Figure 10-5: Change data of a plain standard data file
ASSA ABLOY Identification Technologies GmbH
133
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
11 References
[1]
ISO/IEC 14443 Part 1-4, Identification Cards – Contact less integrated
circuit(s) cards – Proximity cards
[2]
DESFire Documentation, Philips, http://www.semiconductors.philips.com
[3]
Data Encryption Standard (DES), FIPS PUB 46-3,
Reaffirmed 1995 October 25
[4]
ASSA ABLOY ITG Antenna Design Guide
[5]
Philips; Application Note, mifare® & I-Code, Micore Reader IC family Directly
Matched Antenna Design
ASSA ABLOY Identification Technologies GmbH
134
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
12 Appendix A: SAM
Please note that the power supply of the SAM adapter must be turned off during the
entire card insertion period, otherwise SAM card damage might occur.
For proper usage of the SAM, a 100nF capacitor between Vcc and GND is necessary.
ASSA ABLOY Identification Technologies GmbH
135
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
13 Appendix C: Timings
tCMD
PC:
tEXEC
Request →
← Response
Reader:
Command
tRES
tEXEC [ms] Comments
Common commands
Cont. read (locked tag)
Cont. read (worst case)
DES en/decryption
2.8 – 22.6 + Reset Off and Recovery Time
54
+ 3x Reset Off and Recovery Time
9.6 – 9.7
TDES en/decryption
28.7 – 28.8
High-speed select 'h08'
(locked tag)
8.9 – 14.4 + Reset Off and Recovery Time + SFGT
High-speed select 'h08'
(no tag)
15
High-speed select 'h08'
(worst case)
14.7
Multiselect (locked tag)
+ 3x Reset Off and Recovery Time
+ 3x Reset Off and Recovery Time + SFGT
5.8 – 11.4 + Reset Off and Recovery Time
Multiselect (no tag)
67
+ Reset Off and Recovery Time
Multiselect (worst case)
67
+ Reset Off and Recovery Time
Antenna on
0.2
+ Reset Recovery Time
Antenna off
0.2
Port read
0.1
Port write
0.1
Read block
1.8 – 2.2
Write block
8.2 – 11
Reset
Select (locked tag)
13.2
5.4 – 22.8 + Reset Off and Recovery Time
Select (no tag)
38
+ 3x Reset Off and Recovery Time
Select (worst case)
55
+ 3x Reset Off and Recovery Time
ASSA ABLOY Identification Technologies GmbH
136
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
Command
tEXEC [ms] Comments
ISO 14443 Type A only commands
Increment value block
18.4
Decrement value block
18.4
Copy value block
18.5
Read value block
2.3
Write value block
7.9 - 10.5
Mifare Login
4.9
Power conditions
Power on
79
Enable on
85
Does not include rise time of power supply
Figure 13-1: Timings
Default Command Guard Time (20h = 1.2ms) was used.
All timing data is advisory application information and does not form part of the
specifications. It may change in future firmware releases. Please also note that all
values specified in the above table depend on the tag used and Command Guard
Time.
ASSA ABLOY Identification Technologies GmbH
137
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
14 Appendix D: Release Notes
14.1 Version History
14.1.1 Dual 2.0
Initial Release.
14.1.2 Dual 2.1
•
High-speed select supports anti-collision and the forcing of the air interface
transmission rate and the frame size
•
Automatic ISO 14443-4 error handling (can be switched on/off)
•
RATS answer is returned with high-speed select command for ISO14443 A
tags and with Extended ID flag set
•
Support for the ISO14443 B anti-collision algorithm
•
Extended Protocol flag now switches on/off, complete ISO14443-4 handling
•
ISO14443-4 chaining and WTX improved
•
'of' and 'og' commands get new parameters
•
Selection time-out for ISO14443-4 A tags is set to 10h
14.1.3 Dual 2.2
•
Sending serial data frames over User Port
•
Automatic ISO 14443-4 timeouts can be switched on/off
•
Request A information within ISO 14443 A Extended ID answer can be
switched on / off
•
Command Guard Time added
•
'of' and 'og' commands get new parameters
•
Chaining of 256 byte frame support
•
Support of ASK GTML tag
•
Page read functionality added
•
Additional protocol register PCON3
•
Some bug fixes
ASSA ABLOY Identification Technologies GmbH
138
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
14.1.4 Dual 2.3
•
Reset To Default via MCLR Pin possible
•
Added 'ra' command: Resend last answer
•
SAM Command: Option byte modified, Improvements
•
Default value of ISO 14443B Selection timout register changed to 10h
•
Asynchronous Baudrates possible with Highspeed select
•
Added command that returns the version of the bootloader
•
Added command "rd"/"wd": read/write multiple blocks
•
"DisableReadAfterWrite" Flag added
•
Bug fixes
14.2 Revision history
Date
Revision number
02/18/2005
Version 2.1, Rev. 1.0
05/17/2005
Version 2.2, Rev. 1.0
??/??/2006
Version 2.3, Rev. 1.0
ASSA ABLOY Identification Technologies GmbH
139
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
15 Appendix F: Approvals / Certificates
15.1 CE Declaration
ASSA ABLOY Identification Technologies GmbH declares that, in
conformity with the European CE requirements specified in the EMC
Directive 89/336/EEC, ACGPass e-ID Desktop Reader, described in
this manual is
CE compliant
The relevant documents are available.
If any of the ACGPass e-ID Desktop Reader is operated from a mains
power supply, all power connections and additional components of
the final device must also comply with the EMC Directive 89/336/EEC
directive.
Customers selling into Europe must themselves make sure that the
final device conforms to the EMC Directive 89/336/EEC directive.
For ASSA ABLOY Identification Technologies GmbH, the compliance
of important international regulations into business practices are a
priority and the implementation of the EMC Directive 89/336/EEC is
fully in line with the company’s commitment to continuously improve
its Quality Management System.
Walluf, January 2006
ASSA ABLOY Identification Technologies GmbH
ASSA ABLOY Identification Technologies GmbH
140
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
15.2 FCC Declaration
ASSA ABLOY Identification Technologies GmbH declares that, in
conformity with the U.S. Directive FCC part 15, the ACGPass e-ID
Desktop Reader described in this manual, is
FCC part15 compliant
The relevant documents are available.
If any of the ACGPass e-ID Desktop Reader is operated from a mains
power supply, all power connections and additional components of
the final device must also comply with the US FCC Part 15 directive.
Customers selling into the USA must themselves make sure that the
final device conforms to the US FCC Part 15 directive.
Caution: Any changes or modifications not expressly approved by
the party responsible for compliance could void the user's authority
to operate the equipment.
For ASSA ABLOY Identification Technologies GmbH, the compliance
of important international regulations into business practices are a
priority and the implementation of the FCC part 15 is fully in line
with the company’s commitment to continuously improve its Quality
Management System.
Walluf, January 2006
ASSA ABLOY Identification Technologies GmbH
ASSA ABLOY Identification Technologies GmbH
141
ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3
15.3 RoHS Compliance
ASSA ABLOY Identification Technologies GmbH declares that, in
conformity with the Directive 2002/95/EC about the Restriction of
Hazardous Substances (RoHS), its ACGPass e-ID Desktop Reader
products, listed in this manual, are
RoHS compliant
The following substances
Cadmium and cadmium compounds
Lead and lead compounds
Mercury and mercury compounds
Hexavalent chromium compounds
Polybrominated biphenyls (PBB)
Polybrominated Diphenylethers (BPDE)
are contained in accordance with the limits required by the
Directive.
For ASSA ABLOY Identification Technologies GmbH, the integration
of environmental considerations into business practices are a
priority and the implementation of RoHS Directive is fully in line with
the company’s commitment to continuously improve its Quality
Management System.
Walluf, January 2006
ASSA ABLOY Identification Technologies GmbH
ASSA ABLOY Identification Technologies GmbH
142

Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.4
Linearized                      : No
Tagged PDF                      : Yes
XMP Toolkit                     : 3.1-701
Producer                        : Acrobat Distiller 7.0.5 (Windows)
Creator Tool                    : Acrobat PDFMaker 7.0.7 für Word
Modify Date                     : 2007:02:09 12:04:38+01:00
Create Date                     : 2007:02:09 11:49:49+01:00
Metadata Date                   : 2007:02:09 12:04:38+01:00
Format                          : application/pdf
Title                           : User Manual
Creator                         : Stefan Trautner
Document ID                     : uuid:930705c6-838a-4717-9f11-7ce89492f09c
Instance ID                     : uuid:6c416f88-e725-4cc8-a5b8-730b4253f853
Company                         : Wise media
Source Modified                 : D:20070125151527
Page Count                      : 143
Page Layout                     : OneColumn
Author                          : Stefan Trautner
EXIF Metadata provided by EXIF.tools
FCC ID Filing: RJPRDHS-0404D1-0X

Navigation menu