ASSALOY Identification Technologies RDHS-0404D1-0X RFID Reader User Manual
ASSA ABLOY Identification Technologies GmbH RFID Reader
User Manual
ACGPass e-ID Desktop Reader Document No.: 1510-USM-01-0-01 Firmware: Version Dual ISO 2.3 User Manual ASSA ABLOY Identification Technologies GmbH Am Klingenweg 6A 65396 Walluf Germany Phone +49 (0) 6123 791 0 Fax +49 (0) 6123 791 199 www.aaitg.com Document Nr.: QSI-040902-OM-1-a-UserManual Dual ISO Module, V2.0 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 Edition One - October 2006 ASSA ABLOY Identification Technologies GmbH (ASSA ABLOY ITG) reserves the right to make changes to its products or services or to discontinue any product or service at any time without notice. ASSA ABLOY ITG provides customer assistance in various technical areas, but does not have full access to data concerning the use and applications of customer's products. Therefore, ASSA ABLOY ITG assumes no liability and is not responsible for customer applications or product or software design or performance relating to systems or applications incorporating ASSA ABLOY ITG products. In addition, ASSA ABLOY ITG assumes no liability and is not responsible for infringement of patents and/or any other intellectual or industrial property rights of third parties, which may result from assistance provided by ASSA ABLOY ITG. ASSA ABLOY ITG products are not designed, intended, authorized or warranted to be suitable for life support applications or any other life critical applications that could involve potential risk of death, personal injury or severe property or environmental damage. With the edition of this document, all previous editions become void. Indications made in this manual may be changed without previous notice. Composition of the information in this manual has been done to the best of our knowledge. ASSA ABLOY ITG does not guarantee the correctness and completeness of the details given in this manual and may not be held liable for damages ensuing from incorrect or incomplete information. Since, despite all our efforts, errors may not be completely avoided, we are always grateful for your useful tips. The installation instructions given in this manual are based on advantageous boundary conditions. ASSA ABLOY ITG does not give any guarantee promise for perfect function in cross environments. The ACG logo is a registered trademark of ASSA ABLOY Identification Technologies GmbH. Copyright © 2006 ASSA ABLOY Identification Technologies GmbH (ASSA ABLOY ITG) Microsoft®, Microsoft Windows 98SE®, Microsoft Windows ME®, Microsoft Windows NT®, Microsoft Windows 2000® and Microsoft Windows XP® are registered trademarks of the Microsoft Corporation USA. Pentium® is a registered trademark of the Intel Corporation USA mifare® is a registered trademark of NXP Semiconductor N.V. ASSA ABLOY Identification Technologies GmbH ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 All other products mentioned in this document might be brands or brand names of the different suppliers. This document may be downloaded onto a computer, stored and duplicated as necessary to support the use of the related ASSA ABLOY ITG products. Any other type of duplication, circulation or storage on data carriers in any manner not authorized by ASSA ABLOY ITG represents a violation of the applicable copyright laws and shall be prosecuted. ASSA ABLOY Identification Technologies GmbH ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 Safety Instructions / Warning - Read before start-up! • The device may only be used for the intended purpose designed by for the manufacturer. The operation manual should be conveniently kept available at all times for each user. • Unauthorized changes and the use of spare parts and additional devices that have not been sold or recommended by the manufacturer may cause fire, electric shocks or injuries. Such unauthorized measures shall exclude any liability by the manufacturer. • The liability-prescriptions of the manufacturer in the issue valid at the time of purchase are valid for the device. The manufacturer shall not be held legally responsible for inaccuracies, errors, or omissions in the manual or automatically set parameters for a device or for an incorrect application of a device. • Repairs may be executed by the manufacturer only. • Only qualified personnel should carry out installation, operation, and maintenance procedures. • Use of the device and its installation must be in accordance with national legal requirements and local electrical codes. • When working on devices the valid safety regulations must be observed. ASSA ABLOY Identification Technologies GmbH ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 Preface Read This First About This Guide This manual describes the ACGPass e-ID Desktop Reader. Its goal is to describe the reader, how it works, how to integrate it and how to use it. If You Need Assistance Our application center is located in Europe to provide direct support. For more information, please contact your nearest ASSA ABLOY ITG Sales Center. The contact addresses can be found on our home page: http://www.aaitg.com/ ASSA ABLOY Identification Technologies GmbH ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 Table of contents Scope .............................................................................................. 12 Extended Documentation .............................................................. 12 Definitions and Abbreviations ...................................................... 13 3.1 Definitions .................................................................................................. 13 3.1.1 Anti-collision loop .................................................................................13 3.1.2 Hex notation .........................................................................................13 3.1.3 ASCII notation ......................................................................................13 3.2 Abbreviations.............................................................................................. 14 Supported tags............................................................................... 16 The mifare® Transponder Family .................................................. 17 5.1 mifare® Standard ........................................................................................ 17 5.1.1 Sector 0 / Block 0 .................................................................................17 5.1.2 Blocks 3, 7, 11, 15, … ..........................................................................18 5.2 State Diagram ............................................................................................ 19 5.3 mifare® Ultralight ........................................................................................ 20 5.4 mifare® 4k................................................................................................... 20 5.5 mifare® ProX............................................................................................... 20 5.6 mifare® DESFire ......................................................................................... 21 5.6.1 Memory organization............................................................................21 5.6.2 State diagram of mifare® DESFire........................................................22 5.6.2.1 Activate PICC............................................................................... 23 5.6.2.2 Select application......................................................................... 23 5.6.2.3 Login to application ...................................................................... 23 5.6.2.4 Select file ..................................................................................... 23 5.6.2.5 Change file................................................................................... 23 5.6.2.6 Commit / Abort transaction........................................................... 23 ISO 14443 Type B ........................................................................... 24 6.1 SR176 ........................................................................................................ 24 6.1.1 Memory organization............................................................................24 6.1.2 Serial number UID................................................................................24 6.1.3 Lock byte..............................................................................................25 6.1.4 Chip ID .................................................................................................25 6.2 SRIX4K ...................................................................................................... 25 6.2.1 Memory organization............................................................................25 6.2.2 Lock block ............................................................................................25 Hardware......................................................................................... 26 7.1 Mechanical dimensions .............................................................................. 27 7.1.1 Features ...............................................................................................28 ASSA ABLOY Identification Technologies GmbH ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 7.1.2 External Connections ...........................................................................29 7.1.2.1 USB Cable ................................................................................... 29 7.1.2.2 Power Supply............................................................................... 29 7.1.2.3 SAM Socket ................................................................................. 30 7.1.3 Function Control Indicator LEDs ..........................................................31 7.1.3.1 Power LED................................................................................... 32 7.1.3.2 RFID activity indicator LED .......................................................... 32 7.1.3.3 USB Online indicator LED............................................................ 32 7.1.3.4 Contact Interface activity indicator LED ....................................... 33 Software for contactless interface functions .............................. 34 8.1 ASCII Protocol............................................................................................ 34 8.2 Binary Protocol ........................................................................................... 34 8.2.1 STX ......................................................................................................35 8.2.2 Station ID .............................................................................................35 8.2.3 Length ..................................................................................................35 8.2.4 Flags ....................................................................................................35 8.2.5 Data .....................................................................................................35 8.2.6 Block Check Character (BCC)..............................................................36 8.2.7 ETX ......................................................................................................36 8.2.8 Remarks...............................................................................................36 8.2.9 Examples: ............................................................................................36 8.3 Register Set ............................................................................................... 37 8.3.1 EEPROM memory organization ...........................................................38 8.3.2 Unique device ID (00h – 04h)...............................................................39 8.3.3 Station ID (0Ah)....................................................................................39 8.3.4 Protocol configuration (0Bh).................................................................39 8.3.4.1 Auto start (default 1) .................................................................... 39 8.3.4.2 Protocol (default 0)....................................................................... 39 8.3.4.3 Multitag (default 0) ....................................................................... 39 8.3.4.4 New serial mode (default 0) ......................................................... 39 8.3.4.5 LED (default 0)............................................................................. 40 8.3.4.6 Single shot (default 0) .................................................................. 40 8.3.4.7 Extended Protocol (default 1)....................................................... 40 8.3.4.8 Extend ID (default 0) .................................................................... 41 8.3.5 BAUD, Baud rate control register (0Ch) ...............................................42 8.3.6 Command Guard Time (0Dh)...............................................................43 8.3.7 OPMODE, operating mode register (0Eh)............................................43 8.3.8 Single Shot Time-out (0Fh) ..................................................................44 8.3.9 Protocol configuration 2 (13h) ..............................................................44 8.3.9.1 Disable multi-tag reset (default 0) ................................................ 44 8.3.9.2 Disable start-up message (default 0) ........................................... 44 8.3.9.3 Enable binary frame v2 (default 0) ............................................... 44 ASSA ABLOY Identification Technologies GmbH ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 8.3.9.4 Noisy Environment (default 0)...................................................... 44 8.3.9.5 Reset Recovery Time Multiplier (default 0) .................................. 45 8.3.9.6 Enable ISO14443 B Anti-collision (default 0) ............................... 45 8.3.9.7 Disable ISO 14443-4 Error Handling (default 0)........................... 45 8.3.10 Reset Off Time (14h)............................................................................45 8.3.11 Reset Recovery Time (15h) .................................................................45 8.3.12 Application Family Identifier (16h) ........................................................45 8.3.13 Selection Time-out ISO 14443A (17h) .................................................46 8.3.14 Selection Time-out ISO 14443B (18h) .................................................46 8.3.15 Selection Time-out SR176 (19h) ..........................................................46 8.3.16 Protocol configuration 3 (1Bh)..............................................................46 8.3.16.1 Disable automatic ISO 14443-4 timeouts (default 0).................... 46 8.3.16.2 Page read (default 0) ................................................................... 47 8.3.16.3 ReqA Extended ID (default 0) ...................................................... 47 8.3.17 User data (80h - EFh) ..........................................................................47 8.4 Instruction Set ............................................................................................ 48 8.4.1 Overview ..............................................................................................48 8.4.2 Error Codes..........................................................................................51 8.4.3 Common commands ............................................................................52 8.4.3.1 Test Continuous Read ................................................................. 52 8.4.3.2 Continuous Read ......................................................................... 52 8.4.3.2.1 Multitag continuous read mode................................................. 53 8.4.3.2.2 Auto start .................................................................................. 53 8.4.3.2.3 Noisy Environment.................................................................... 53 8.4.3.2.4 Binary mode.............................................................................. 53 8.4.3.2.5 Simple access control applications ........................................... 53 8.4.3.3 Set LED........................................................................................ 54 8.4.3.4 DES encryption / decryption of data............................................. 55 8.4.3.5 Get ID........................................................................................... 56 8.4.3.5.1 Binary Protocol Version 2 ......................................................... 57 8.4.3.5.2 High speed select ..................................................................... 57 8.4.3.5.3 Answer from 0xh and 1xh ......................................................... 59 8.4.3.5.4 Answer from 2xh and 3xh ......................................................... 59 8.4.3.5.5 Select a single tag .................................................................... 59 8.4.3.5.6 Extended ID .............................................................................. 59 8.4.3.5.7 Multiple tags.............................................................................. 60 8.4.3.5.8 RATS Guard Time SFGT.......................................................... 60 8.4.3.6 Multi-Tag Selection / List.............................................................. 60 8.4.3.6.1 Multi-tag list............................................................................... 60 8.4.3.6.2 Reading distance ...................................................................... 61 8.4.3.6.3 Multi-tag select.......................................................................... 61 8.4.3.6.4 Multi-tag reset ........................................................................... 61 ASSA ABLOY Identification Technologies GmbH ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 8.4.3.6.5 Maximum number of tags ......................................................... 61 8.4.3.7 Include tag type............................................................................ 62 8.4.3.8 Exclude tag type .......................................................................... 63 8.4.3.9 Set tag type.................................................................................. 64 8.4.3.10 Set Configuration Flags................................................................ 65 8.4.3.10.1 Out of range failure 'R' ............................................................ 66 8.4.3.11 Set Configuration Register ........................................................... 67 8.4.3.11.1 Out of range failure 'R' ............................................................ 68 8.4.3.12 Antenna power on/off ................................................................... 69 8.4.3.12.1 Power off................................................................................. 69 8.4.3.12.2 Power on................................................................................. 69 8.4.3.13 Read/Write user port .................................................................... 70 8.4.3.13.1 Read port ................................................................................ 70 8.4.3.13.2 Write port ................................................................................ 71 8.4.3.14 Quiet ............................................................................................ 72 8.4.3.14.1 ISO 14443 Type A .................................................................. 72 8.4.3.14.2 ISO 14443 Type B .................................................................. 73 8.4.3.14.3 SR176..................................................................................... 73 8.4.3.15 Read block ................................................................................... 73 8.4.3.15.1 Read failure 'F' ........................................................................ 73 8.4.3.15.2 No tag in field 'N' ..................................................................... 74 8.4.3.15.3 Operation mode failure 'O' ...................................................... 74 8.4.3.15.4 Out of range failure 'R' ............................................................ 74 8.4.3.16 Read reader EEPROM ................................................................ 74 8.4.3.16.1 Out of range failure 'R' ............................................................ 74 8.4.3.17 Select ........................................................................................... 75 8.4.3.17.1 Select a single tag .................................................................. 75 8.4.3.17.2 Extended ID ............................................................................ 75 8.4.3.17.3 Multiple tags............................................................................ 75 8.4.3.18 Get Version .................................................................................. 76 8.4.3.19 Write DESFire key ....................................................................... 77 8.4.3.19.1 Out of range failure 'R' ............................................................ 77 8.4.3.19.2 Writing DESFire Keys ............................................................. 77 8.4.3.19.3 Using DESFire keys for authentication ................................... 77 8.4.3.20 Write master key .......................................................................... 78 8.4.3.20.1 Out of range failure 'R' ............................................................ 78 8.4.3.20.2 Writing master keys ................................................................ 78 8.4.3.20.3 Using master keys for authentication ...................................... 78 8.4.3.21 Write block ................................................................................... 79 8.4.3.21.1 Write failure 'F' ........................................................................ 79 8.4.3.21.2 No tag error 'N'........................................................................ 79 8.4.3.21.3 Operation mode failure 'O' ...................................................... 79 ASSA ABLOY Identification Technologies GmbH ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 8.4.3.21.4 Out of range failure 'R' ............................................................ 80 8.4.3.22 Write EEPROM ............................................................................ 80 8.4.3.22.1 Out of range failure 'R' ............................................................ 80 8.4.3.23 Reset............................................................................................ 81 8.4.3.23.1 Disable Start-up Message....................................................... 81 8.4.3.23.2 Reset Timing........................................................................... 81 8.4.3.24 Field Reset................................................................................... 82 8.4.4 ISO 14443 Type A only commands......................................................83 8.4.4.1 Increment value block (credit) ...................................................... 83 8.4.4.1.1 No value block 'I' ....................................................................... 83 8.4.4.1.2 Increment failure 'F'................................................................... 83 8.4.4.1.3 No tag error 'N'.......................................................................... 84 8.4.4.1.4 Operation mode failure 'O' ........................................................ 84 8.4.4.2 Decrement value block (debit) ..................................................... 84 8.4.4.2.1 No value block 'I' ....................................................................... 84 8.4.4.2.2 Decrement failure 'F' ................................................................. 85 8.4.4.2.3 No tag error 'N'.......................................................................... 85 8.4.4.2.4 Operation mode failure 'O' ........................................................ 85 8.4.4.3 Copy value block (backup)........................................................... 85 8.4.4.3.1 Target block .............................................................................. 86 8.4.4.3.2 No value block 'I' ....................................................................... 86 8.4.4.3.3 Copy failure 'F' .......................................................................... 86 8.4.4.3.4 No tag error 'N'.......................................................................... 86 8.4.4.3.5 Operation mode failure 'O' ........................................................ 86 8.4.4.4 Login (authenticate tag) ............................................................... 87 8.4.4.4.1 No tag error 'N'.......................................................................... 88 8.4.4.4.2 Operation mode failure 'O' ........................................................ 88 8.4.4.4.3 Out of range failure 'R' .............................................................. 88 8.4.4.4.4........................................................................................ 89 8.4.4.4.5 Login with key data from EEPROM .......................................... 89 8.4.4.4.6 Usage of key A, key B............................................................... 89 8.4.4.5 Read value block ......................................................................... 90 8.4.4.5.1 No value block 'I' ....................................................................... 90 8.4.4.5.2 No tag error 'N'.......................................................................... 90 8.4.4.5.3 General failure 'F'...................................................................... 90 8.4.4.5.4 Operation mode failure 'O' ........................................................ 90 8.4.4.6 Write value block.......................................................................... 91 8.4.4.6.1 Invalid value 'I' .......................................................................... 91 8.4.4.6.2 Write failure 'F' .......................................................................... 91 8.4.4.6.3 No tag error 'N'.......................................................................... 91 8.4.4.6.4 Operation mode failure 'O' ........................................................ 92 8.4.4.6.5 Writing values ........................................................................... 92 ASSA ABLOY Identification Technologies GmbH ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 8.4.5 SR176 only commands ........................................................................93 8.4.5.1 Lock block .................................................................................... 93 8.4.5.1.1 Operation mode failure 'O' ........................................................ 93 8.4.5.1.2 Apply settings ........................................................................... 93 8.4.6 DESFire command set .........................................................................94 8.4.6.1 Authenticate ................................................................................. 95 8.4.6.2 Change Key Settings ................................................................... 96 8.4.6.3 Get Key Settings .......................................................................... 97 8.4.6.4 Change Key ................................................................................. 98 8.4.6.5 Get Key Version........................................................................... 99 8.4.6.6 Create Application.......................................................................100 8.4.6.7 Delete Application .......................................................................101 8.4.6.8 Get Application IDs .....................................................................102 8.4.6.9 Select Application .......................................................................103 8.4.6.10 Format PICC ...............................................................................104 8.4.6.11 Get Version .................................................................................105 8.4.6.12 Get File IDs .................................................................................106 8.4.6.13 Get File Settings .........................................................................107 8.4.6.14 Select File ...................................................................................108 8.4.6.15 Change File Settings...................................................................109 8.4.6.16 Create Standard Data File ..........................................................110 8.4.6.17 Create Backup Data File .............................................................111 8.4.6.18 Create Value File ........................................................................112 8.4.6.19 Create Linear Record File ...........................................................113 8.4.6.20 Create Cyclic Record File ...........................................................114 8.4.6.21 Delete File...................................................................................115 8.4.6.22 Read Data / Records ..................................................................116 8.4.6.22.1 Our of range 'R'......................................................................116 8.4.6.23 Data files .....................................................................................117 8.4.6.24 Record file...................................................................................117 8.4.6.25 Write Data / Record ....................................................................118 8.4.6.25.1 Our of range 'R'......................................................................119 8.4.6.26 Get Value ....................................................................................119 8.4.6.27 Credit ..........................................................................................120 8.4.6.28 Debit ...........................................................................................121 8.4.6.29 Limited Credit..............................................................................122 8.4.6.30 Clear Record File ........................................................................123 8.4.6.31 Commit Transaction ....................................................................124 8.4.6.32 Abort Transaction........................................................................125 Software for contact interface functions ................................... 126 10 10.1 Frequently Asked Questions ................................................... 127 Getting Started ..........................................................................................127 ASSA ABLOY Identification Technologies GmbH 10 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 10.2 Personalized ACGPass e-ID Desktop Reader ..........................................127 10.3 What type of mifare® card should I use? ...................................................128 10.4 How safe is mifare® Standard for cashless payment?...............................128 10.5 Using a mifare® card .................................................................................130 10.6 Using a DESFire card................................................................................131 10.6.1 Create a plain standard data file ........................................................131 10.6.2 Use a plain standard data file.............................................................131 10.6.3 Create a value file ..............................................................................132 10.6.4 Use a DES secured value file.............................................................133 11 References................................................................................. 134 12 Appendix A: SAM ...................................................................... 135 13 Appendix C: Timings ................................................................ 136 14 Appendix D: Release Notes ..................................................... 138 14.1 Version History ..........................................................................................138 14.1.1 Dual 2.0..............................................................................................138 14.1.2 Dual 2.1..............................................................................................138 14.1.3 Dual 2.2..............................................................................................138 14.1.4 Dual 2.3..............................................................................................139 14.2 Revision history .........................................................................................139 15 15.1 15.2 15.3 Appendix F: Approvals / Certificates ...................................... 140 CE Declaration ..........................................................................................140 FCC Declaration........................................................................................141 RoHS Compliance.....................................................................................142 ASSA ABLOY Identification Technologies GmbH 11 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 Scope The ACGPass e-ID Desktop Reader supports a broad range of tags compliant with ISO 14443 type A and B standards, including SR176 tags and tags which belong to the Philips mifare® family. An open command structure allows the device to communicate with tags that use an operating system. The read/write unit supports automatic chaining, 256 byte buffer and frame length, extended time framing and up to 848kBaud transmission rates over the air interface. Additionally this unit implements a DES cipher which enables to use mifare® DESFire tags. These tags are designed for use in high security algorithms. An internal SAM socket is also available. Major applications are: • e-Passport • e-National ID Cards • e-Drivers Licenses • e-Government • e-Health Cards • e-Document Authentication • e-Document Issuing Extended Documentation Please note that all confidential material is excluded from this documentation in order to comply with NDA requirements of our suppliers as well as prevention from unauthorized copies of the reader modules for increasing the security in the applications. You can obtain the extended documentation containing the confidential information after signing a NDA. ASSA ABLOY Identification Technologies GmbH 12 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 Definitions and Abbreviations 3.1 Definitions 3.1.1 Anti-collision loop An algorithm used to identify and handle a dialogue between a reader and one or more tags in its antenna field. 3.1.2 Hex notation A hexadecimal value is marked with the suffix ‘h’, i.e. A1h has the value A1 hexadecimal. 3.1.3 ASCII notation ASCII characters are listed within apostrophes, i.e. ‘x’ means a single x. ASSA ABLOY Identification Technologies GmbH 13 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 3.2 Abbreviations Abbreviation Description AID Application ID ASCII American Standard Code for Information Interchange ATR Answer to Reset ATS Answer to Select Block For the mifare® Standard one block contains 16 bytes CID Card Identifier (logical card address, ISO 14443-4) CRC Cyclic Redundancy Check DES Data Encryption Standard, for more details about DES refer to [3]. EDC Error Detection Code EOF End of Frame Hex / xxh Value in Hexadecimal notation I-block Information block LSB Least Significant Bit or Byte MSB Most Significant Bit or Byte NAD Node Address (ISO 14443-4) OSI Open System Interconnection OTP One time programmable PCB Protocol Control Byte (ISO 14443-4) PCON Protocol Configuration byte of the reader PPS Protocol and Parameter Selection RATS Request for Answer to Select R-block Receive ready block REQA Request ISO Type A REQB Request ISO Type B RFU Reserved for Future Use S-block Supervisory block Sector For the mifare® Standard one sector contains 4 blocks SID Station ID SFGT Guard time after RATS SN Serial Number of a tag (a 32 bit number) SOF Start of frame ASSA ABLOY Identification Technologies GmbH 14 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 Abbreviation Description TDES Triple DES Value block 32 bit data block format. Used in ticketing application Carriage return (0Dh) Line feed (0Ah) Figure 3-1: Abbreviations ASSA ABLOY Identification Technologies GmbH 15 1 ASSA ABLOY Identification Technologies GmbH ISO 14443 A compliant (1) ISO 14443 B compliant() √ √ Toshiba TOSMART P032/064 √ √ Sharp Sharp B √ Various ASK ASK GTML √ √ ASK ASK GTML2 ISO √ √ √ STM SLIX 4K √ √ √ √ √ √ √ √ √ √ √ √ √ Various STM SR176 Dual Interface Infineon SLE6666CL160S ISO 14443 B Philips Philips Philips Philips Philips Infineon Infineon Philips Innovision Serial Read number block √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ Write Transfer block command Extended setup needed Works only with ‘t’ command Encryption included Encryption not included Encryption not included Comments mifare® Standard mifare® 4k mifare® Ultralight mifare® ProX mifare® DESFire SLE66CLX320P SLE 55R04/ 08 Smart MX Jewel Tag ISO 14443 A Manufacturer ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 Supported tags Figure 4-1: Supported labels Performance varies 16 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 The mifare® Transponder Family The mifare® transponder family consists of various 13.56 MHz transponder ICs, all compliant to the ISO 14443 standard. 5.1 mifare® Standard The mifare® Standard card consists of 16 sectors. A sector includes four blocks of 16 bytes each. mifare® Standard Sector 2 Sector 0 (Block: 0...3) Block 8: Data or value (16 bytes) Sector 1 (Block: 4...7) Block 9: Data or value (16 bytes) Sector 2 (Block 8...11) Block 10: Data or value (16 bytes) ... Block 11: bytes), Access Conditions (4 Key A, Key B (16 bytes) Sector 15 (Block 60...63) Figure 5-1: mifare® Standard: sector diagram 5.1.1 Sector 0 / Block 0 Block 0 is read only. Serial Number (4 bytes) Check byte (1 byte) Manufacturer data (11 bytes) Figure 5-2: mifare® Standard: sector 0 / block 0 ASSA ABLOY Identification Technologies GmbH 17 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 5.1.2 Blocks 3, 7, 11, 15, … Transport keys are set on delivery: Key A (6 bytes) Access Conditions (4 bytes) Key B (6 bytes) Figure 5-3: mifare® Standard: block 3, 7, 11, 15, … Key A A0 A1 A2 A3 A4 A5 (Infineon) or FF FF FF FF FF FF (new Philips cards) Key B B0 B1 B2 B3 B4 B5 (Infineon) or FF FF FF FF FF FF (new Philips cards) Access Conditions FF 07 80 xx (key A is used to read or write; key A itself is not readable; key B is data only). For further information refer to the mifare® card manual. Remarks Enabled keys are always read as 00 00 00 00 00 00 Using key B as a data area will cause a security gap, due to the fact that it is necessary to rewrite key A and the access conditions at each write process. It is not recommended to use key B as a data storage area. ASSA ABLOY Identification Technologies GmbH 18 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 5.2 State Diagram All mifare® cards use the following state diagram. Power Off Reset Reader Instruction Set Idle REQA Select ISO 14443 Commands Ready Halt Wake Up Select Active Anticollision Loop Authenticate Log In read/write/... Halt Authenticated Tag interfacing commands Figure 5-4: State diagram ASSA ABLOY Identification Technologies GmbH 19 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 5.3 mifare® Ultralight mifare® Ultralight cards have no encryption included. They only support plain text data transmission. mifare® Ultralight only supports 4 bytes per sector, but the command set uses 16 bytes per sector. Only the 4 least significant bytes are valid when using mifare® Ultralight. Ensure that the other bytes match with the tag content when using the write command; otherwise the read back will fail. 5.4 mifare® 4k mifare® 4k cards have an increased memory. Beginning from sector 32 (20h), sectors have 16 blocks. Due to compatibility reasons, the sector indices have changed according to the following table. The login sector has to be used to access the corresponding sector on the card. Sector Block Login sector 00h 00h – 03h 00h 01h 04h – 07h 01h … … … 1Fh 7Ch – 7Fh 1Fh 20h 80h – 8Fh 20h 21h 90h – 9Fh 24h 22h A0h – AFh 28h 23h B0h – BFh 2Ch 24h C0h – CFh 30h 25h D0h – DFh 34h 26h E0h – EFh 38h 27h F0h – FFh 3Ch Figure 5-5: mifare® 4k sector index table 5.5 mifare® ProX mifare® ProX tags have an operating system onboard. Data organization depends on the operating system installed on the card. These cards can include additional functionalities such as DES or a proprietary encipher algorithm. Before accessing the operating system, the card must be selected. Customized commands are issued using the transfer command. ASSA ABLOY Identification Technologies GmbH 20 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 5.6 mifare® DESFire This tag supports additional security algorithms (DES, Triple-DES, MAC) for security sensitive applications. DESFire tags are addressed using a specific command set (see DESFire command set). 5.6.1 Memory organization The memory of a DESFire card can be personalized to specific requirements. The card can be seen as data storage device like a hard disk in a PC. The memory is divided into a maximum of 28 different applications (directories) with 16 files each. An application has up to 14 keys. Depending on keys and access conditions a file can be accessed in four different ways. Plain data is never secured. Data is secured using a MAC, single DES or triple DES enciphers. The following figure describes the memory organization of a DESFire card. DESFire card (Application 0) Application 1 File ID 1 File ID 2 ... File ID n ... File ID n ... File ID n Application 2 File ID 1 File ID 2 ... Application n File ID 1 File ID 2 Figure 5-6: DESFire memory organization ASSA ABLOY Identification Technologies GmbH 21 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 5.6.2 State diagram of mifare® DESFire Activate DESFire card Select Application Login to Application Select File with ID Change File Commit / Abort Transaction Figure 5-7: mifare® DESFire state diagram ASSA ABLOY Identification Technologies GmbH 22 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 5.6.2.1 Activate PICC Before accessing a DESFire card, the card must be selected. A mifare® DESFire card has a 7 byte UID. After activation, the card is powered up and ready to accept a mifare® DESFire command. Application 0 is selected automatically. 5.6.2.2 Select application To jump into another application, the application has to be selected. An application can be seen as a directory, which contains up to 16 files. The size of the application depends on the stored files. 5.6.2.3 Login to application Specific access rights can be set for each application. Login to an application allows to change the organization of the application. Login to a file opens a secured file for access. A file can be accessed in four different ways: without any security or secured with MAC, single DES or triple DES. 5.6.2.4 Select file Before accessing a file, the file must be selected 5.6.2.5 Change file A selected file can be changed according its access rights. If a file is secured, a login is required before changes can be made. 5.6.2.6 Commit / Abort transaction Value files, backup files, linear record files and cyclic record files only adapt their values after the commit transaction command is given. Several files can be changed within an application at the same time. The abort transactions command annuls all changes within an application. Power loss will cancel all modifications too. For more details about application settings and access rights refer to [2]. ASSA ABLOY Identification Technologies GmbH 23 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 ISO 14443 Type B ISO 14443 type B cards are supported. 6.1 SR176 The SR176 label contains only 30 bytes of data organized in two bytes per page. 6.1.1 Memory organization block address Byte 1 0Fh Lock byte Byte 0 RFU 0Eh User data … … 04h User data 03h Serial number 02h Serial number 01h Serial number 00h Serial number Chip ID Figure 6-1: SR176 memory organization 6.1.2 Serial number UID The UID is stored in the first 4 pages. Page 00h contains the LSB of the UID. Page 03h Byte 1h Byte 0 Page 02h Byte 1 Byte 0 Page 01h Byte 1 Byte 0 Page 00h Byte 1 Byte 0 Figure 6-2: SR176 Serial number ASSA ABLOY Identification Technologies GmbH 24 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 6.1.3 Lock byte Bit 2 Bit 1 Bit 0 Page 00h Page 01h Page 0Ah Page 0Bh Bit 3 Page 02h Page 03h Page 0Ch Page 0Dh Bit 4 Page 04h Page 05h Bit 5 Page 06h Page 07h Bit 6 Page 08h Page 09h Bit 7 Page 0Eh Page 0Fh The lock byte defines the write access condition of a pair of pages. Each bit can only be set once. This procedure is irreversible. This byte is implemented as an OTP. Figure 6-3: Lock byte 6.1.4 Chip ID The Chip ID is defined in the low nibble of page 0Fh. It is manufacturer set and is used internally to select and separate single tags. 6.2 SRIX4K The SRIX4K label contains 512 bytes of data organized into four-byte pages. 6.2.1 Memory organization Block address Byte 3 Byte 2 Byte 1 Byte 0 FFh OTP Lock Reg ST Reserved ST Reserved Fixed Chip ID 7Fh User data … … 07h User data 06h 32 bits binary counter 05h 32 bits binary counter 04h 32 bits Boolean Area 03h 32 bits Boolean Area 02h 32 bits Boolean Area 01h 32 bits Boolean Area 00h 32 bits Boolean Area Figure 6-4: SRIX4K memory organization 6.2.2 Lock block Locking of blocks is not supported with this tag. ASSA ABLOY Identification Technologies GmbH 25 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 Hardware Figure 7-1: Picture of the complete reader ASSA ABLOY Identification Technologies GmbH 26 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 7.1 Mechanical dimensions All Dimensions are in mm Figure 7-2: Mechanical drawing with dimensions ASSA ABLOY Identification Technologies GmbH 27 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 7.1.1 Features • Interface type: USB 2.0 • Dimensions: 205x130x93 (LxWxH), all in mm • Reading Distance: up to 90mm, depending on tag type • SAM: supported 2 • Boot loader: supported 3 • Drivers: virtual COM port driver, DLL driver available • Antenna: on board • Signaling: RFID activity indicator LED Power LED Contact Interface activity indicator LED USB Online indicator LED • Power Supply: via USB The integrated SAM socket is accessible by opening the housing The boot loader makes it easy to download a firmware to the unit without replacing/dismantling the hardware. ASSA ABLOY Identification Technologies GmbH 28 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 7.1.2 External Connections 7.1.2.1 USB Cable The USB connector is located on the bottom side of the housing. Depending on the users preferences the cable can be put and easily fixed within one of three cable guides. Each cable guide leads the cable to one of three possible sides of the housing. Figure 7-3: mechanical drawing, bottom view 7.1.2.2 Power Supply The power supply is automatically provided via the USB connection. Therefore the unit can only be connected to a powered USB hub. Non-powered USB hubs like often used in USB splitter units are not able to supply the reader with enough power. Depending on the internal protection of these units, they even may be damaged. ASSA ABLOY Identification Technologies GmbH 29 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 7.1.2.3 SAM Socket The integrated SAM socket is accessible only by opening the housing. • Before opening the housing an ESD protection has to be used. • The reader has to be unpowered and unpluged from the host system. It’s recommended to remove the USB cable on the reader side. • Open the four screws on the bottom side with an appropriate screwdriver. • Carefully remove the bottom part of the housing. Install the SAM. • Close the bottom part of the housing and make sure both housing parts fit together. • Carefully tighten the four screws again. If the screws are tightened too much, then housing might break. Figure 7-4: position of internal SAM Socket ASSA ABLOY Identification Technologies GmbH SAM Socket 30 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 7.1.3 Function Control Indicator LEDs The reader comes with four integrated indicator LEDs. Figure 7-5: Reader with activated indicator LEDs ASSA ABLOY Identification Technologies GmbH 31 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 7.1.3.1 Power LED This LED shows the status of the power supply. If on, then enough power is provided by the USB hub to run the reader. Figure 7-6: position and design of Power LED 7.1.3.2 RFID activity indicator LED This LED shows any activities on the reader’s contactless RFID interface. LED On means data is being sent to or received from the card. Figure 7-7: position and design of RFID activity indicator LED 7.1.3.3 USB Online indicator LED This LED shows the status of the USB connection. If on, then the reader is connected with the host system. Figure 7-8: position and design of USB Online indicator LED ASSA ABLOY Identification Technologies GmbH 32 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 7.1.3.4 Contact Interface activity indicator LED This LED shows any activities on the reader’s contact interface. LED On means data is being sent to or received from the card. Figure 7-9: position and design of contact interface activity indicator LED ASSA ABLOY Identification Technologies GmbH 33 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 Software for contactless interface functions By default, data is transmitted at 9600, n, 8, 1, no handshaking. Two protocol modes are supported. The protocol mode is configured in the reader EEPROM. As factory default, the ASCII protocol is used. If the PC/SC driver has been installed on the host PC, then the commands of this chapter can’t be used as such. Only the PC/SC specification is valid in this case. The reader also can be installed with the standard USB driver. The driver can be downloaded from http://www.aaitg.com. This driver enables the usage of a virtual COM port on the host PC. Then all commands mentioned below can be used. 8.1 ASCII Protocol This protocol is designed for easy handling. The commands are issued using a terminal program. Data is transmitted as ASCII hexadecimal that can be displayed on any terminal program (i.e. HyperTerminal). Command Data Variable length Variable length Figure 8-1: ASCII protocol frame 8.2 Binary Protocol This protocol is designed for industrial applications with synchronization and frame checking. An addressing byte for party line (master/slave, multi-drop) is also included. The protocol usually requires a device driver. Data is transmitted in binary mode. The reader uses an internal binary watchdog timer to ensure correct framing. STX Station ID Length Data BCC ETX 1 byte 1 byte 1 byte Variable length 1 byte 1 byte Figure 8-2: Binary Frame Version 1 The binary frame version 2 is only sent to the host. It is implemented to give extended information to the host. Version 2 must be enabled in the Protocol configuration 2 register. STX 1 byte Station ID Length 1 byte 1 byte Flags Data 1 byte Variable length BCC ETX 1 byte 1 byte Figure 8-3: Binary Frame Version 2 ASSA ABLOY Identification Technologies GmbH 34 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 8.2.1 STX Start of transmission (02h) 8.2.2 Station ID Unique ID of the station 00h: FFh: reserved for the bus master. Readers send response to this device ID. Broadcast message. All devices will execute the command and send their response. 8.2.3 Length Length of the data block, including the flag byte, if binary protocol version 2 is activated. If length is set to zero, 256 data bytes are transmitted. The reader module only can send 256 data bytes, but can not receive commands with 256 bytes. 8.2.4 Flags The flag byte gives additional information to the host. Bit 3 – Bit 7 Bit 1 – Bit 2 Bit 0 RFU Leading Character Info Error State Error State If cleared, the command was processed successfully. If set, an error occurred. Leading Character Info Bit 1 & 2 defines how to interpret the data in the binary frame. Bit 2 Bit 1 Description No leading character available, all values are hexadecimal. The data contains one leading character. All data bytes are characters. RFU 8.2.5 Data This part contains the command and the data. The command values are the same as in ASCII protocol mode (‘x’, ‘s’, …) whereas data is transmitted in binary mode. The length of the command block depends on the instruction. ASSA ABLOY Identification Technologies GmbH 35 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 8.2.6 Block Check Character (BCC) The BCC is used to detect transmission errors. The BCC is calculated XOR-ing each byte of the transmission frame excluding the STX/BCC and ETX characters. The flags are part of the data. BCC = ( StatID) XOR ( Length) XOR (Command / Data 0 ) XOR ... XOR (Command / Data N ) 8.2.7 ETX End of transmission. (03h) 8.2.8 Remarks If the reader device receives an invalid instruction frame (i.e. wrong BCC) or the requested station ID does not match the internal ID of the reader, the command is not executed. The reader waits for the next valid frame. The automatic binary time-out (see protocol configuration register) is used to detect incomplete binary frames. 8.2.9 Examples: 02h 64h 01h 78h 1Dh 03h STX Station ID Length ‘x’ BCC ETX This instruction frame will reset the reader module with the station ID 64h. ASSA ABLOY Identification Technologies GmbH 36 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 8.3 Register Set The reader has several system flags used for customization purposes. The flags are stored in its non-volatile EEPROM. The reader accepts changes to these settings only during the start-up phase. Clearing all RFU bits is recommended in order to guarantee compatibility with future releases. The reader can store up to 32 authentication keys internally to login standard mifare® cards. An additional 32 keys can be stored for DESFire authentication. All keys are read only and cannot be accessed via the interface lines. ASSA ABLOY Identification Technologies GmbH 37 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 8.3.1 EEPROM memory organization Register Description 00h … 04h Unique device ID; read only 05h … 09h Administrative data; read only 0Ah Station ID 0Bh Protocol configuration 0Ch Baud rate 0Dh Command Guard Time 0Eh Operation Mode 0Fh Single shot time-out value 10h Internal use / Do not change 11h Internal use / Do not change 12h Internal use / Do not change 13h Protocol configuration 2 14h Reset Off Time 15h Reset Recovery Time 16h Application Family Identifier 17h ISO 14443A Selection Time-out 18h ISO 14443B Selection Time-out 19h SR176 Selection Time-out 1Ah RFU 1Bh Protocol configuration 3 1Ch Page Start 1Dh Internal use / Do not change 1Eh Internal use / Do not change 1Fh Page number 20h - 7Fh 80h … EFh RFU User data Figure 8-4: EEPROM memory ASSA ABLOY Identification Technologies GmbH 38 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 8.3.2 Unique device ID (00h – 04h) The unique device ID identifies a reader module. It is factory programmed and cannot be changed. 8.3.3 Station ID (0Ah) The station ID is used in binary mode to address a device in party line set up. The station ID can range from 01h to FEh and can be set freely. The value 00h is reserved for the bus master. All readers send their response to this device. The broadcast message (FFh) forces all readers to response to the command. Default value is 01h. 8.3.4 Protocol configuration (0Bh) The protocol configuration register (PCON) specifies general behavior of the reader device. Default value is 41h. Protocol configuration register Bit 7 Bit 6 Bit 5 Bit 4 Bit 3 Extended ID Extended Protocol Singleshot LED New serial mode Bit 2 Bit 1 Multitag Protocol Bit 0 Autostart Figure 8-5: Protocol configuration register 8.3.4.1 Auto start (default 1) If set, the reader device will start up in continuous read mode automatically. 8.3.4.2 Protocol (default 0) If set, the reader uses binary protocol mode. Refer to binary protocol for further information on the binary protocol format. Default setting = ASCII protocol (0). 8.3.4.3 Multitag (default 0) The Multitag flag will enable multi-tag recognition in continuous read mode. All tags are detected and displayed. Due to the more complex search algorithm, the continuous read command decreases its detection speed. 8.3.4.4 New serial mode (default 0) If set, new serial mode is enabled. The leading character ‘M’ is added to the serial number of ISO 14443 type A tags, a leading 'Z' character is added to ISO 14443 type B tags and a leading 'S' character for SR176 tags. ASSA ABLOY Identification Technologies GmbH 39 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 8.3.4.5 LED (default 0) If set the reader suppresses any LED activity. The user manages the state of the LEDs. 8.3.4.6 Single shot (default 0) If set, the reader displays the serial number of a tag in continuous read mode once within a specified time-out. The time-out is defined at EEPROM register 0Fh. The delay time can be adjusted stepwise in 100ms steps. 00h indicates no delay and FFh indicates infinite delay. 8.3.4.7 Extended Protocol (default 1) If set, the transfer data telegram command supports ISO14443-4. The transfer data telegram command is only supported in normal mode, not in transmit / receive mode. ASSA ABLOY Identification Technologies GmbH 40 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 8.3.4.8 Extend ID (default 0) If set, the reader extends the serial number of tags with additional bytes. ISO 14443 A tags (5/8/11 bytes transmitted) Tag type Serial number 1 byte 4 / 7 / 10 bytes Figure 8-6: ISO 14443 A Extended Serial number The tag type byte indicates the type of cascade level. Tag type Description 01h Cascade level 1 transponder 02h Cascade level 2 transponder 03h Cascade level 3 transponder Figure 8-7: ISO 14443 A tag type ISO 14443 B tags (12 bytes transmitted) Serial number Application data Protocol info CID 4 bytes 4 bytes 3 bytes 1 byte Figure 8-8: ISO 14443 B Extended Serial number For detailed description of Application Data, Protocol Info and CID, refer to the ISO 14443 documentation [1]. ASSA ABLOY Identification Technologies GmbH 41 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 8.3.5 BAUD, Baud rate control register (0Ch) The baud rate register defines the communication speed of the reader device. Default value is 00h. Baud rate register Bit 7 Bit 6 Bit 5 Bit 4 Bit 3 Bit 2 Bit 1 Bit 0 RFU RFU RFU RFU RFU BS2 BS1 BS0 Figure 8-9: Baud rate register This register defines the baud rate of the device. BS2 BS1 BS0 Baud rate 9600 baud (default) 19200 baud 38400 baud 57600 baud 115200 baud 230400 baud (depends on the used interface chip) 460800 baud (depends on the used interface chip) Figure 8-10: Baud rate settings With the high baud rates (230400 and 460800 baud), proper operation depends on the interface chip used. Please note that some of the interface chips available do not support these high baud rates. ASSA ABLOY Identification Technologies GmbH 42 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 The following table describes the exact baud rates used by the reader. Baud rate Exact baud rate Difference 9600 baud 9576 baud -0.25 % 19200 baud 19261 baud 0.32 % 38400 baud 38523 baud 0.32 % 57600 baud 58448 baud 1.47 % 115200 baud 113000 baud -1.91 % 230400 baud 241545 baud 4.84 % 460800 baud 483091 baud 4.84 % Figure 8-11: Exact baud rates The following table describes the communication settings Description 8 data bits No parity bit 1 stop bit No flow control Figure 8-12: Communication settings 8.3.6 Command Guard Time (0Dh) The Command Guard Time is used to ensure that commands are not sent to fast consecutively. Following commands are sent after the guard time is elapsed. One time slice is around 37,8us. The longest timeout value is 9,6ms (FFh). The default value is 20h (1,2ms). 8.3.7 OPMODE, operating mode register (0Eh) The operation mode register defines which tag types the reader supports. This register enables fast tag recognition because only defined tag types are requested. Bit 4 Bit 3 Bit 2 Bit 1 Bit 0 (LSB) RFU SR176 ISO 14443B ISO 14443A RFU Bit 5 RFU Bit 6 RFU Bit 7 (MSB) RFU Operation mode register Figure 8-13: Operation mode register ASSA ABLOY Identification Technologies GmbH 43 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 8.3.8 Single Shot Time-out (0Fh) The time-out value defines the delay time between two responses of the reader. It only has effect in continuous read mode. To enable the time-out, the single shot flag has to be set. See the protocol configuration register above. One time-out slice is around 100ms. Exact timing depends on the protocol used. Value 00h indicates no delay time. Default value is 0Ah (1 second). 8.3.9 Protocol configuration 2 (13h) The protocol configuration register 2 (PCON2) further specifies the general behavior of the reader device. Default value is 00h. Protocol configuration 2 register Bit 7 Bit 6 Bit 5 Bit 4 Disable Enable Reset ISO ISO Recovery Time 14443B 14443 -4 Multiplier AntiError collision Handling Bit 3 Bit 2 Bit 1 Bit 0 Noisy Environment Enable binary frame v2 Disable start-up message Disable multitag reset Figure 8-14: Protocol configuration register 8.3.9.1 Disable multi-tag reset (default 0) If set, the reader does not reset before the multi-tag list and multi-select command have been performed. 8.3.9.2 Disable start-up message (default 0) If set, the reader suppresses the start-up message in ASCII mode. This flag is ignored in binary protocol mode. 8.3.9.3 Enable binary frame v2 (default 0) If set, the reader sends version 2 binary frames. The get station ID command always sends version 1 binary frames! 8.3.9.4 Noisy Environment (default 0) If set, the continuous read mode can only be aborted with the '.' character. When working in a noisy environment, the probability for a reception of an arbitrary/stochastic sign/command is quite high. This implies a high probability of an unintentional command execution. To reduce this probability, only one character (out of 255) is chosen (‘.’) to be interpreted as the continuous read stop command. ASSA ABLOY Identification Technologies GmbH 44 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 8.3.9.5 Reset Recovery Time Multiplier (default 0) Multiplies the Reset Recovery Time, including the recovery time of the field reset command. Reset Recovery Time Multiplier Reset Recovery Time 1x 2x 3x 4x Figure 8-15: Reset Recovery Time Multiplier 8.3.9.6 Enable ISO14443 B Anti-collision (default 0) If set, the anti-collision algorithm for ISO 14443 B tags is enabled. 8.3.9.7 Disable ISO 14443-4 Error Handling (default 0) If set, ISO14443-4 Error Handling is disabled. The error handling always uses the TMR time-out. 8.3.10 Reset Off Time (14h) The Reset Off Time register represents the field off time in ms. This register is used for the select, continuous read and multi-tag commands. Default value is 0Ah. 8.3.11 Reset Recovery Time (15h) The Reset Recovery Time register represents the recovery time in ms after the field is turned on. This register is used for the select, continuous read and multi-tag commands. Default value is 25h. 8.3.12 Application Family Identifier (16h) The AFI (Application Family Identifier) is only supported for ISO14443B tags. If the set value is different from 00h, the AFI is implemented in the ReqB command of ISO14443B. Only transponders with an identical AFI will answer to the reader. Default value is 00h. ASSA ABLOY Identification Technologies GmbH 45 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 8.3.13 Selection Time-out ISO 14443A (17h) The Selection Time-out represents the reader card communication time-out for the select, high speed select, continuous read, multilist, multiselect and mifare® login command with ISO 14443A tags. For a better reaction time use low values. One time slice is around 300us. The default value is 10h. 8.3.14 Selection Time-out ISO 14443B (18h) The Selection Time-out represents the reader card communication time-out for the select, high speed select, continuous read, multilist and multiselect commands with ISO 14443B tags. For a better reaction time, use low values. One time slice is around 300µs. The default value is 50h. 8.3.15 Selection Time-out SR176 (19h) The Selection Time-out represents the reader card communication time-out for the select, continuous read, multilist and multiselect command with SR176 tags. For a better reaction time, use low values. One time slice is around 300µs. The default value is 10h. 8.3.16 Protocol configuration 3 (1Bh) The protocol configuration register 3 (PCON3) further specifies the general behavior of the reader device. Default value is 00h. Protocol configuration 3 register Bit 7 Bit 6 Bit 5 RFU ReqA Extended ID Bit 4 Bit 3 Internal use / do not change Bit 2 Page Read Bit 1 Bit 0 RFU Disable automatic ISO 14443-4 timeouts Figure 8-16: Protocol configuration register 8.3.16.1 Disable automatic ISO 14443-4 timeouts (default 0) If set the automatic ISO 14443-4 timeouts are disabled. The timeouts specified with TMR registers are used. ASSA ABLOY Identification Technologies GmbH 46 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 8.3.16.2 Page read (default 0) If set the continuous read mode retrieves the content of the tag instead of the serial number. The register Page Start (1Ch) defines the start block and the Page Number (1Fh) defines the number of blocks to be read. 8.3.16.3 ReqA Extended ID (default 0) If set the Extended ID information for ISO14443 A tags replaces the cascade level information (1 byte) with Request A answer (2 bytes). 8.3.17 User data (80h - EFh) These registers are for free use. ASSA ABLOY Identification Technologies GmbH 47 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 8.4 Instruction Set Following table describes all the commands of the reader device. Each command returns an answer to the host. Exceptions are mentioned explicitly. The RFID activity indicator LED acknowledges a successfully executed command. The RFID activity indicator LED indicates an error by changing its color to red. 8.4.1 Overview Common commands '!' Test continuous read 'c' Continuous read '.' Abort continuous read, refer to continuous read 'dg' / 'dn' / 'dr' Set LED 'ds' DES encryption / decryption of data 'f' DESFire command set 'g' Get ID 'h' High speed select 'm' MultiTag select / tag list 'o+a' / 'o+b' / 'o+s' Include tag type 'o-a' / 'o-b' / 'o-s' Exclude tag type 'oa' / 'ob' / 'ot' / 'os' Set tag type 'of' Set configuration flags 'og' Set configuration register 'poff' / 'pon' Antenna power off/on 'pr' / 'pw' Read / write user port 'q' Quiet 'rp' Read EEPROM register 'r' / 'rb' Read block 's' Select 'v' Get version 'w' / 'wb' Write block 'wf' Write DESFire key 'wm' Write master key 'wp' Write EEPROM register 'x' Reset Figure 8-17: Command overview (Part 1) ASSA ABLOY Identification Technologies GmbH 48 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 Common commands (Part2) 'y' Field reset ISO 14443 Type A only commands '+' Increment value block (credit) '-' Decrement value block (debit) '=' Copy value block (backup) 'l' Login (authenticate tag) 'rv' Read value block 'wv' Write value block SR176 only commands 'k' Lock block Figure 8-18: Command overview (Part 2) ASSA ABLOY Identification Technologies GmbH 49 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 DESFire command set 00h Authenticate 01h Change Key Settings 02h Get Key Settings 03h Change Key 04h Get Key Version 05h Create Application 06h Delete Application 07h Get Application IDs 08h Select Application 09h Format PICC 0Ah Get Version 0Bh Get File IDs 0Ch Get File Settings 0Dh Select File 0Eh Change File Settings 0Fh Create Standard Data File 10h Create Backup Data File 11h Create Value File 12h Create Linear Record File 13h Create Cyclic Record File 14h Delete File 15h Read Data / Records 16h Write Data / Record 17h Get Value 18h Credit 19h Debit 1Ah Limited Credit 1Bh Clear Record File 1Ch Commit Transaction 1Dh Abort Transaction Figure 8-19: Command overview (Part 3) ASSA ABLOY Identification Technologies GmbH 50 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 8.4.2 Error Codes Following figure shows an overview of all error messages of the reader device. Error Code Description ‘?’ Unknown command 'C' Collision or CRC/MAC Error ‘F’ General failure ‘I’ Invalid value format, specified block does not match the value format ‘N’ No tag in the field 'O' Operation mode failure or file not selected ‘R’ Command parameter out of range 'X' Authentication failed Xxh DESFire error code Figure 8-20: Error codes ASSA ABLOY Identification Technologies GmbH 51 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 8.4.3 Common commands 8.4.3.1 Test Continuous Read This command tests the state of the continuous read command. This command only works in ASCII mode. Command Command Data '!' None Answer Answer Description 'F' Continuous read mode is not active. '!' Continuous read mode is active. 8.4.3.2 Continuous Read The reader device reads and displays serial numbers continuously while one or more tags remain in the field. This command stops if any character is sent to the reader module. The reader module returns the character ‘S’ (53h). The reader supports different tag types at the same time. To increase the reading performance switch to a single tag mode. If more than one tag of the same type should be detected at the same time, the Multitag flag must be activated. The response data length depends on the tag type. Command Command Data 'c' none Answer Answer Description data Serial number (n bytes) 'N' Error: No Tag in the field (only binary protocol) ASSA ABLOY Identification Technologies GmbH 52 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 8.4.3.2.1 Multitag continuous read mode If the Multitag flag is set in the Protocol Configuration (PCON) register the reader reads multiple tags continuously. 8.4.3.2.2 Auto start The continuous read mode is started automatically. The auto start flag must be set in the PCON register. 8.4.3.2.3 Noisy Environment If the Noisy Environment flag is set, the continuous read mode can only be aborted with the '.' character. 8.4.3.2.4 Binary mode This command is not fully supported in binary protocol mode. Continuous Read in binary mode does not start-up automatically at boot time, even if the corresponding EEPROM flag is set. Within the single shot time-out, only one response is sent. 8.4.3.2.5 Simple access control applications Serial numbers are always sent plain. Data encryption is activated after a successful login. For simple access control applications the use read-only blocks for the identification of the tag is recommended. Reading any block (even the manufacturer block) of the transponder will increase your security. ASSA ABLOY Identification Technologies GmbH 53 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 8.4.3.3 Set LED This command controls the LED activity. If the LED flag is set, the automatic LED function is switched off. The user can set the state of the LED manually. Command Command Data 'dg' None 'dr' None 'dn' None Answer Answer Description 'DG' 'DR' 'DN' String of LED state Example Command Answer Description 'dg' DG Switch on LED green, LED red off 'dr' DR Switch on LED red, LED green off 'dn' DN Switch off both LEDs ASSA ABLOY Identification Technologies GmbH 54 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 8.4.3.4 DES encryption / decryption of data This command returns 8 bytes of encrypted / decrypted data. Command Command Data 'ds' Options (1 byte) Key (8/16 bytes) / Key Number (1 byte) Data (8 byte) Answer Answer Description Data Encrypted / Decrypted data (8 bytes) Option byte Option byte Bit 7 Bit 6 Bit 5 Bit 4 Bit 3 Bit 2 Bit 1 Bit 0 RFU RFU RFU RFU RFU Encode Key Length Key Index Key Index If set, the command only needs the key number (1 byte) instead of the key (8/16 bytes). The key number corresponds to the key number used in the "wf" command Key Length If set, the command uses the TDES algorithm with 16-byte key. If cleared, the command uses the DES algorithm with 8-byte key. Encode Setting this flag encodes the data. Clearing this flag decodes the data. ASSA ABLOY Identification Technologies GmbH 55 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 8.4.3.5 Get ID This command returns the station ID of the reader device. The answer is time slotted to enable the detection of all devices in party line mode. The station ID has only effect in binary mode. Command Command Data 'g' None Answer Answer Description Data Station ID of the reader device (1 byte) ASSA ABLOY Identification Technologies GmbH 56 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 8.4.3.5.1 Binary Protocol Version 2 This command never sends version 2 binary frames. 8.4.3.5.2 High speed select This command selects a card in the antenna field (according to the selection criteria) or prepares a multiselect command, switches to high baud rates and enables 256byte frames. If execution is successful, the command returns the UID of the selected card and the used baud rate. The reader automatically detects the maximum frame size of the card. The reader also tries to communicate to the transponder with the specified baud rate. If no communication is possible, the reader will automatically decrease the speed to the next lower value. This command can also force the reader to the communication speed and frame size of the tag to the specified values. This is only needed if the high speed select is done manually with the transfer command. Command Command Data ‘h’ option byte (1 byte) 00h … select a single card with 106kBaud 02h … select a single card with 212kBaud 04h … select a single card with 424kBaud 08h … select a single card with 848kBaud 10h … prepare next multiselect for 106kbaud 12h … prepare next multiselect for 212kbaud 14h … prepare next multiselect for 424kbaud 18h … prepare next multiselect for 848kbaud 20h … forces reader to 106kBaud 22h … forces reader to 212kBaud 24h … forces reader to 424kBaud 28h … forces reader to 848kBaud 30h – 38h … force tag frame size ASSA ABLOY Identification Technologies GmbH 57 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 Answer Answer Description Data (n bytes) serial number + frame size used and baud rate + frame size and baud rate (1byte) 'F' Error: General failure ‘N’ Error: No Tag in the field Example Command Description h08 1234567890ABCD84 Select the card with UID 1234567890SABCD. The card supports a 256-byte frame size and 424kBaud on the air interface. ASSA ABLOY Identification Technologies GmbH 58 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 8.4.3.5.3 Answer from 0xh and 1xh The lower nibble contains the baud rate used for the air interface. Baud Rate Description x0 106kBaud x2 212kBaud x4 424kBaud x8 848kBaud Figure 8-21: Baud Rate values The higher nibble contains the frame size used for the air interface. Frame Size Description 0x 16 Bytes 1x 24 Bytes 2x 32 Bytes 3x 40 Bytes 4x 48 Bytes 5x 64 Bytes 6x 96 Bytes 7x 128 Bytes 8x 256 Bytes Figure 8-22: Frame Size 8.4.3.5.4 Answer from 2xh and 3xh The option byte is returned as the answer. 8.4.3.5.5 Select a single tag No previous continuous read is required. The command executes an automatic field reset. 8.4.3.5.6 Extended ID See above for more information on Extended ID. The RATS answer is inserted between the serial number and baud rate / frame size byte for ISO14443 A tags. ASSA ABLOY Identification Technologies GmbH 59 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 8.4.3.5.7 Multiple tags This command with parameter 1xh prepares the next multiselect command as a highspeed select. Any other command will disable the preparation. 8.4.3.5.8 RATS Guard Time SFGT A high-speed select with parameters 0xh and 1xh automatically waits the SFGT guard time gotten from the tag before sending the PPS command. 8.4.3.6 Multi-Tag Selection / List This command detects several tags at the same time. It replaces the fast select command ('s') in multiple tag surroundings. The Multi-Tag List command lists all tags with their serial numbers. Use the Multi-Tag Select command to select a single tag. Each tag has to be selected separately. Command Command Data 'm' Serial number (n bytes) (1 byte) Answer Answer Description Data serial number 'N' Error: No Tag in the field Example Command Description m 04E9E700000000 34030F07 02 m04E9E700000000 Select card with its serial number 8.4.3.6.1 first card second card number of detected tags Multi-tag list Sending a as the first parameter, the reader returns a list of all tags present in the antenna field. In the end the total number of tags detected is returned. ASSA ABLOY Identification Technologies GmbH 60 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 8.4.3.6.2 Reading distance Each card needs a specific amount of power. The reader always provides the same amount of power. Therefore, the reading distance will decrease if more tags are present. Basically, the reading distance depends on the tag, the antenna and the tuning of the antenna. 8.4.3.6.3 Multi-tag select Using the serial number with as parameter, the corresponding tag will be selected. High-level interactions can be performed addressing only this card. All other tags remain silent. 8.4.3.6.4 Multi-tag reset The antenna field reset can be deactivated with the Protocol configuration 2 register. By suppressing the antenna field reset, it is possible to detect only new tags in the antenna field. 8.4.3.6.5 Maximum number of tags The maximum number of tags in the antenna field is limited to 30 and by the physical characteristics of the antenna. ASSA ABLOY Identification Technologies GmbH 61 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 8.4.3.7 Include tag type This command includes a specific tag type to those addressed by the reader device. Command Command Data ‘o+’ tag type (1 byte) Answer Answer Description 'O+' + tag type (1 byte) Command code + String of tag type Tag type character Refer to Set tag type. Example Command Description o+a Include ISO14443-A to the tag types addressed by the reader device. ASSA ABLOY Identification Technologies GmbH 62 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 8.4.3.8 Exclude tag type This command excludes a specific tag type from being addressed by the reader device. Command Command Data ‘o-’ Tag type (1 byte) Answer Answer Description 'O-' + tag type (1 byte) Command code + String of tag type Tag type character Refer to Set tag type. Example Command Description o-a Exclude ISO14443-A from the tag types addressed by the reader device. ASSA ABLOY Identification Technologies GmbH 63 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 8.4.3.9 Set tag type This command sets up the reader for a specific tag type. The continuous read function will speed up because only this type of tag is addressed. After a reset, the reader starts as defined in its start-up configuration. Command Command Data 'o' ISO type (1 byte) 'a' … ISO 14443 Type A 'b' … ISO 14443 Type B 's' … SR176 't' … activate all tags Answer Answer Description 'OA' 'OB' 'OS' 'OT' String of tag type Example Command Description oa Sets the reader device to address ISO14443-A type tags. ASSA ABLOY Identification Technologies GmbH 64 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 8.4.3.10 Set Configuration Flags This command allows setting some configuration flags just in time; no reset is needed. The values are not stored in the EEPROM, therefore the changed values are not available after a reset. Command Command Data of flag type (1 byte) data (1 byte) Answer Answer Description Data (1 byte) Current state of changed flag. 'R' Error: Out of range Example Command Description of0101 Answer: 01 Enables the New Serial Mode flag. ASSA ABLOY Identification Technologies GmbH 65 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 Flag Types The following table shows the Flag Type with its corresponding flag from the specified Protocol Configuration Register. Flag Type Corresponding Flag Protocol Configuration Register Valid values 00h Multitag 00 / 01 01h New Serial Mode 00 / 01 02h LED 00 / 01 03h Single Shot 00 / 01 04h Extended Protocol 00 / 01 05h Extended ID 00 / 01 06h Disable Multitag Reset 00 / 01 07h Noisy Environment 00 / 01 08h Reset Recovery Time Multiplier 00 … 03 09h Enable ISO14443 B Anticollision 00 / 01 0Ah Disable ISO14443-4 Error Handling 00 / 01 0Bh Disable automatic ISO14443-4 timeouts 00 / 01 0Dh Page Read 00 / 01 11h ReqA Extended ID 00 / 01 Figure 8-23: Flag Type with corresponding flag 8.4.3.10.1 Out of range failure 'R' The entered flag type is out of range. ASSA ABLOY Identification Technologies GmbH 66 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 8.4.3.11 Set Configuration Register This command allows setting some configuration registers just in time; no reset is needed. The values are not stored in the EEPROM; therefore the changed values are not available after a reset. Command Command Data og Register type (1 byte) data (1 byte) Answer Answer Description Data (1 byte) Current state of changed register. 'R' Error: Out of range Example Command Description og0450 Answer: 50 Sets the Reset Recovery Time to 50h. ASSA ABLOY Identification Technologies GmbH 67 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 Register Types The following table shows the Register Type with its corresponding register. Register Type Corresponding Register 00h Single shot time-out value 01h Internal use / Do not change 02h Internal use / Do not change 03h Reset Off Time 04h Reset Recovery Time 05h ISO 14443A Selection Time-out 06h ISO 14443B Selection Time-out 07h SR176 Selection Time-out 08h AFI 0Ch Page Read Start 0Dh Page Read Number 0Eh Command Guard Time Figure 8-24: Register Type with corresponding register 8.4.3.11.1 Out of range failure 'R' The entered register type is out of range. ASSA ABLOY Identification Technologies GmbH 68 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 8.4.3.12 Antenna power on/off This command controls the antenna power. It can be used to decrease the power consumption of the reader. Command Command Data 'pon' Switch reader on 'poff' Put reader in standby mode Answer Answer Description 'P' Positive acknowledge Example Command Description poff Put reader in standby mode 8.4.3.12.1 Power off The reader enters standby mode. Power consumption is decreased. All tags in the antenna field are powered off and reset. Standby mode is only entered manually. To switch off the whole unit, pin 16 (Enable) has to be set to logic low. 8.4.3.12.2 Power on The reader leaves standby mode and is ready for the next command. Sending a tag command (i.e. select, continuous read) the reader is powered up. ASSA ABLOY Identification Technologies GmbH 69 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 8.4.3.13 Read/Write user port This command sets or reads the state of the user port (pin 14) of the OEM reader device. The port is set either as output or as input. Command Command Data 'pr' none 'pw' State of user port (1 Byte) Answer Answer Description Data State of user port (1 Byte) 'C' Error: Error correction fails 'F' Error: Transmission Error / No answer received Example Command Description pr Reads user port pw01 Sets user port state to high 8.4.3.13.1 Read port The port read command returns the current state of the USER port. Port state Description 00h USER port is low 01h USER port is high Figure 8-25: Read USER port return values ASSA ABLOY Identification Technologies GmbH 70 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 8.4.3.13.2 Write port If user port is used as an output, a 1kΩ resistor has to be integrated into the wire. Otherwise the reader device can be damaged. Port state Description 00h Sets USER port to low 01h Sets USER port to high 02h – 7Fh RFU 80h - FFh Sends a serial data frame and checks the received frame Figure 8-26: Write User port settings Sending a Data Frame If the highest bit (MSB) is set in the State of the User Port, the command sends a serial data frame out the USER port. The frame includes a start bit, 8 data bits, parity bit and a stop bit. Transmit Frame Description Low Start bit Low RFU Data Bit 6 State of the User Port Bit 6 Data Bit 5 State of the User Port Bit 5 Data Bit 4 State of the User Port Bit 4 Data Bit 3 State of the User Port Bit 3 Data Bit 2 State of the User Port Bit 2 Data Bit 1 State of the User Port Bit 1 Data Bit 0 State of the User Port Bit 0 Parity Bit Even Parity Bit High Stop Bit Figure 8-27: Sending Serial Data Frame After 2ms Guard Time the answer should be received on the User Port otherwise an error is returned. ASSA ABLOY Identification Technologies GmbH 71 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 Receive Frame Low Description Start bit Error Bit If set, an error was detected. Data Bit 6 State of the User Port Bit 6 Data Bit 5 State of the User Port Bit 5 Data Bit 4 State of the User Port Bit 4 Data Bit 3 State of the User Port Bit 3 Data Bit 2 State of the User Port Bit 2 Data Bit 1 State of the User Port Bit 1 Data Bit 0 State of the User Port Bit 0 Parity Bit Even Parity Bit High Stop Bit Figure 8-28: Receiving Serial Data Frame If the Error bit is set or the Parity Bit is not correct, the Write User Port command returns an error code. 8.4.3.14 Quiet This command sets a selected tag into halt state. Command Command Data 'q' none Answer Answer Description 'Q' Halt state successfully set. 'N' Error: No Tag in the field 8.4.3.14.1 ISO 14443 Type A With ISO14443 Type A tags, the Quiet command always answers with 'Q' because the halt command does not send any acknowledge. ASSA ABLOY Identification Technologies GmbH 72 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 8.4.3.14.2 ISO 14443 Type B Some ISO14443 Type B tags do not support this command or do not respond. ‘Quiet’ is an ISO 14443-4 command, so it will work only if the ‘Deselect’ command is supported by the corresponding transponder. 8.4.3.14.3 SR176 With SR176 tags the Quiet command always answer with 'Q' because the completion command does not send any acknowledge. 8.4.3.15 Read block This command reads a data block on a card. The size of the returned data depends on the tag used. The block address range depends on the tag as well. Command Command Data 'r' Block address (1 byte), valid range 00h – 40h 'rb' Block address (1 byte) Answer Answer Description Data data block (depends on tag type) 'F' Error: read failure 'N' Error: No tag in field 'O' Error: Operation mode failure 'R' Error: Out of range Example Command Description rb05 Reads block 05. 8.4.3.15.1 Read failure 'F' This error is returned if either the reader receives bad data or the block address exceeds the block address range of the sector. ASSA ABLOY Identification Technologies GmbH 73 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 8.4.3.15.2 No tag in field 'N' The tag does not respond. There is either no tag present or addressed. 8.4.3.15.3 Operation mode failure 'O' The presented tag is not ISO14443 type A compliant. 8.4.3.15.4 Out of range failure 'R' The block address of the 'r' command is higher than 40h. The block address of the 'r' command conflicts with other commands, therefore the block address has to be limited to 40h. Use the 'rb' command instead. 8.4.3.16 Read reader EEPROM This command reads the internal reader EEPROM. It contains all start-up parameters and the device ID. Changes in the start-up settings will only go into effect after a reset of the device. Command Command Data 'rp' EEPROM address (1 byte) 00h … EFh Answer Answer Description Data EEPROM data (1 byte) 'R' Error: Out of range failure Example Command Description rp0B Reads protocol configuration register. 8.4.3.16.1 Out of range failure 'R' The entered EEPROM address is not valid. ASSA ABLOY Identification Technologies GmbH 74 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 8.4.3.17 Select This command selects a single card in the antenna field. It can only be used in single tag mode. If successfully executed, the command returns the UID of the selected card. The reader detects the length of the UID automatically. Command Command Data 's' None Answer Answer Description Data serial number 'N' Error: No Tag in the field Example Command Description 1234567890ABCD Select the card with UID 1234567890SABCD. 8.4.3.17.1 Select a single tag No previous continuous read is required. The command executes an automatic field reset. 8.4.3.17.2 Extended ID See above for more information on Extended ID. 8.4.3.17.3 Multiple tags This command is designed for fast access of a single tag in the field. If multiple cards are used the 'm' instruction has to be used instead. ASSA ABLOY Identification Technologies GmbH 75 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 8.4.3.18 Get Version This command returns the current version of the reader module. Command Command Data 'v' None Answer Answer Description 'Dual 2.2' + + ASCII Mode 02 00 08 44 75 61 6C 20 32 2E 32 32 03 Binary Mode Example Command Description ‘Dual 2.2’ Version of the reader module ASSA ABLOY Identification Technologies GmbH 76 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 8.4.3.19 Write DESFire key This command is used to store a key into the DESFire key memory of the reader. The reader can store up to 32 keys. DESFire keys can be used for fast access to applications on a card. Command Command Data 'wf' Key number (1 byte) Key (16 bytes) 00h … 1Fh Answer Answer Description data Written key (16 bytes) 'F' Error: Write failure 'R' Error: Out of range Example Command Description wf000011223344556677889 9AABBCCDDEEFF Store key 00112233445566778899AABBCCDDEEFFh in EEPROM (key number 0). 8.4.3.19.1 Out of range failure 'R' The entered key number exceeds the permitted range. 8.4.3.19.2 Writing DESFire Keys Keys are write only. It is not possible to read the keys. Nevertheless the reader returns correct error messages if the writing process fails. A verification of the DESFire key can only be done using an appropriate card and following successful login. 8.4.3.19.3 Using DESFire keys for authentication DESFire keys may be used for DESFire tag authentication or DES/TDES encryption/decryption. Each key is 16 bytes long and stored redundantly for data security. ASSA ABLOY Identification Technologies GmbH 77 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 8.4.3.20 Write master key This command stores a mifare® Standard key into the master key memory of the reader. The reader can store up to 32 keys. Command Command Data 'wm' Key number (1 byte) Key (6 bytes) 00h … 1Fh Answer Answer Description data Written key (6 bytes) 'F' Error: Write failure 'R' Error: Out of range Example Command Description wm00112233445566 Store key 112233445566h in EEPROM (key number 0). wm02A0A1A2A3A4A5 Store transport key 1 in EEPROM key 2. 8.4.3.20.1 Out of range failure 'R' The entered key index exceeds the address range. 8.4.3.20.2 Writing master keys Keys are Write-Only. It is not possible to read the keys. Nevertheless the reader returns correct error messages if the writing process fails. A verification of the master key can only be done using an appropriate card and following successful login. 8.4.3.20.3 Using master keys for authentication Master keys may be used for ISO-14443 A tag authentication. It is possible to use every stored key for key A as well as key B authentication. Each key is 6 bytes long and stored redundantly for data security. ASSA ABLOY Identification Technologies GmbH 78 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 8.4.3.21 Write block This command writes data to a block. A read is done automatically after every write to ensure correct writing. Command Command Data 'w' Block address (1 byte), valid range 00h – 40h Data (n bytes) 'wb' Block address (1 byte) Data (n bytes) Answer Answer Description Data Data block (depends on tag type) 'F' Error: Write failure 'N' Error: No tag in field 'O' Error: Operation mode failure 'R' Error: Out of range Example Command Description wb0511223344 Writes data 11223344 on block 05. 8.4.3.21.1 Write failure 'F' This error is displayed if bad transmission conditions are given. If the block address exceeds the physical number of blocks of a tag, this error is shown. 8.4.3.21.2 No tag error 'N' This error is returned if no tag is present or the card does not respond. 8.4.3.21.3 Operation mode failure 'O' The tag is not ISO14443 type A compliant. ASSA ABLOY Identification Technologies GmbH 79 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 8.4.3.21.4 Out of range failure 'R' The block address of the 'w' command is higher than 40h. The block address of the 'w' command conflicts with other commands, therefore the block address has to be limited to 40h. Use the 'wb' command instead. 8.4.3.22 Write EEPROM Writes to the internal reader EEPROM. It contains all start-up parameters and the device ID. Changes to the start-up settings will only go into effect after a reset of the device. Command Command Data 'wp' Address (1 byte), valid range 0Ah - EFh Data (1 byte) Answer Answer Description Data EEPROM data (1 byte) 'F' Error: Read after write failure 'R' Error: Out of range failure Example Command Description wp0A01 Set EEPROM address 0A (Station ID) to 01h 8.4.3.22.1 Out of range failure 'R' The entered address exceeds the address range. ASSA ABLOY Identification Technologies GmbH 80 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 8.4.3.23 Reset This command executes a power on (software) reset. New configuration settings will be loaded. It resets all tags in the antenna field. Command Command Data 'x' None Answer Answer Description 'Dual 2.2' + + ASCII Mode None 8.4.3.23.1 Binary Mode Disable Start-up Message If the start-up message is disabled in the protocol configuration register 2, the ASCII mode does not respond with the version of the reader. 8.4.3.23.2 Reset Timing The power up timing depends on environmental conditions such as voltage ramp up. For handheld devices the timing can vary based on the charge state of the battery. ASSA ABLOY Identification Technologies GmbH 81 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 8.4.3.24 Field Reset The field reset switches off the antenna field for the specified duration. All tags need a certain amount of time to initialize before a command can be processed. The second byte specifies the field recovery time. Command Command Data 'y' Off time in milliseconds (1 byte) Field recovery time in milliseconds (1 byte) Answer Answer Description 'Y' After the field reset the reader sends back a ‘Y’ to acknowledge the command. ASSA ABLOY Identification Technologies GmbH 82 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 8.4.4 ISO 14443 Type A only commands 8.4.4.1 Increment value block (credit) Increments a value block with a defined value. A read is done automatically after a write to verify data integrity. The command fails if the source block is not in value block format. A previous login is needed to access a block. Command Command Data '+' Block (1 byte) Value (4 bytes) Answer Answer Description Data Value (4 bytes) 'I' Error: value block failure 'F' Error: increment failure 'N' Error: No tag in field 'O' Error: Operation mode failure Example Command Description +0400000001 Adds 1 to value block 4 +0500000100 Adds 256 to value block 5 8.4.4.1.1 No value block 'I' Specified block does not match the value format. The value block is corrupted. A backup block can be used to restore the correct value. 8.4.4.1.2 Increment failure 'F' The Increment failure indicates a general failure during the increment procedure or inability to read after the write process. ASSA ABLOY Identification Technologies GmbH 83 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 8.4.4.1.3 No tag error 'N' The reader does not detect a response from the tag. There is either no tag present or the tag does not respond to the request. 8.4.4.1.4 Operation mode failure 'O' The tag is not ISO14443 type A compliant. 8.4.4.2 Decrement value block (debit) Decrements a value block with a defined value. A read is done automatically after the write to verify data integrity. The command fails if the source block is not in value block format. A previous login is needed to access a block. Command Command Data '-' Block (1 byte) Value (4 bytes) Answer Answer Description Data Value (4 bytes) 'I' Error: value block failure 'F' Error: increment failure 'N' Error: No tag in field 'O' Error: Operation mode failure Example Command Description -0400000001 Subtract 1 to value block 4 -0500000100 Subtract 256 to value block 5 8.4.4.2.1 No value block 'I' Specified block does not match the value format. The value block is corrupted. A backup block can be used to restore the correct value. ASSA ABLOY Identification Technologies GmbH 84 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 8.4.4.2.2 Decrement failure 'F' The Decrement failure indicates a general failure during the decrement procedure or inability to read after the write process. 8.4.4.2.3 No tag error 'N' The reader does not detect a response from the tag. There is either no tag present or the tag does not respond to the request. 8.4.4.2.4 Operation mode failure 'O' The tag is not ISO14443 type A compliant. 8.4.4.3 Copy value block (backup) Copies a value block to another block of the same sector. A read is done automatically after the write to ensure data integrity. Used for backup and error recovery. A previous login is needed to access a block. Command Command Data '=' Source block (1 byte) Target block (1 byte) Answer Answer Description Data New value of target block (4 bytes). 'I' Error: value block failure 'F' Error: increment failure 'N' Error: No tag in field 'O' Error: Operation mode failure Example Command Description =0405 Copy value block 4 to block 5 =0506 Copy value block 5 to block 6 ASSA ABLOY Identification Technologies GmbH 85 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 8.4.4.3.1 Target block The target block does not need to be a valid value block. If the source block is not in value format, the command fails. 8.4.4.3.2 No value block 'I' Source value block is not in a valid value block. The value block is corrupted. A backup block can be used to restore the correct value. 8.4.4.3.3 Copy failure 'F' The Copy failure indicates a general failure during the copy procedure or inability to read after the write process. 8.4.4.3.4 No tag error 'N' The reader does not detect a response of the tag. There is either no tag present or the tag does not respond to the request. 8.4.4.3.5 Operation mode failure 'O' The tag is not ISO14443 type A compliant. ASSA ABLOY Identification Technologies GmbH 86 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 8.4.4.4 Login (authenticate tag) Performs an authentication in order to access one sector of a mifare® card. Only one sector can be accessed at a time. Optionally, the command can be used to transmit the key data to the reader-stored keys, in the reader EEPROM. To store keys in the EEPROM, the write master key command is used. It is possible to store up to 32 master keys in the reader EEPROM. The login requires a successful select. Command Command Data 'l' Sector (1 byte), valid range 00h - 3Fh Key type (1 byte) AAh authenticate with key type A FFh authenticate with key type A, transport key FFFFFFFFFFFFh BBh authenticate with key type B 10h … 2Fh authenticate with key type A using stored key (00h … 1Fh) 30h … 4Fh authenticate with key type B using stored key (00h … 1Fh) Key (6 bytes) / (1 byte), optional By transmitting instead of the keydata authentication is done with manufacturer’s transport keys (A0A1A2A3A4A5h, B0B1B2B3B4B5h, FFFFFFFFFFFFh). Answer Answer Description data Login status (1 byte) 'L' Login success 'F' Error: General failure 'N' Error: No tag 'O' Error: Operation mode failure 'R' Error: Out of range 'X' Error: Authentication failed ASSA ABLOY Identification Technologies GmbH 87 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 Example Command Description l02AA Authenticate for sector 2, using the transport key A (A0A1A2A3A4A5h, key type A) l3FBB Authenticate for sector 63, using the transport key 2 (B0B1B2B3B4B5h, key type B) l04FF Authenticate for sector 4, using the transport key 3 (FFFFFFFFFFFFh, key type A) l0FAAFFFFFFFFFFFF Authenticate for sector 15, using key FFFFFFFFFFFFh, key type A l0E14 Authenticate for sector 14, using EEPROM key 4, key type A l0530 Authenticate for sector 5, using EEPROM key 0, key type B l0732 Authenticate for sector 7, using EEPROM key 2, key type B l0110 Authenticate for sector 1, using EEPROM key 0, key type A l0ABBFF12FFFFFF35 Authenticate for sector 10, using key FF12FFFFFF35h, key type B 8.4.4.4.1 No tag error 'N' The reader does not detect a response from the tag. There is either no tag present or the tag does not respond to the request. 8.4.4.4.2 Operation mode failure 'O' The tag is not ISO14443 type A compliant. 8.4.4.4.3 Out of range failure 'R' The entered key type or the sector is out of range. ASSA ABLOY Identification Technologies GmbH 88 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 8.4.4.4.4 Three transport keys are implemented to access cards quickly. By transmitting instead of the key, the reader module uses the transport keys for the login procedure. Command Description LxxAA Authenticate for sector xx, using the transport key 1 (A0A1A2A3A4A5h, key type A) LxxBB Authenticate for sector xx, using the transport key 2 (B0B1B2B3B4B5h, key type B) LxxFF Authenticate for sector xx, using the transport key 3 (FFFFFFFFFFFFh, key type A) 8.4.4.4.5 Login with key data from EEPROM Each key stored in the reader EEPROM can be used as type A or type B key. To use a key as type A, the value 10h must be added to the key index. 30h must be added to use a key as type B. 8.4.4.4.6 Usage of key A, key B ® mifare cards support two different crypto keys for each sector. Each key is 32 bits long and is stored in the sector trailer (last block of the sector) on the card. It is possible to set different access rights for each key. ASSA ABLOY Identification Technologies GmbH 89 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 8.4.4.5 Read value block Reads a value block. The command checks if data is in value block format. The read value block command needs a successful login. Command Command Data 'rv' Value block (1 byte) Answer Answer Description Data Read value (4 bytes) 'F' Error: General failure 'I' Error: value block failure 'N' Error: No tag in field 'O' Error: Operation mode failure Example Command Description rv04 Reads value of block 4. 8.4.4.5.1 No value block 'I' The value read back after the write value command is not a value block. Data was written corruptly. 8.4.4.5.2 No tag error 'N' This means that the tag does not respond, because either there is no tag present or none of the tags in the field are authenticated ('l' instruction). 8.4.4.5.3 General failure 'F' In addition to the case of a data read failure caused by bad transmission conditions, this error is returned if a sector is addressed which is not located in the authenticated area. 8.4.4.5.4 Operation mode failure 'O' The tag is not ISO14443 type A compliant. ASSA ABLOY Identification Technologies GmbH 90 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 8.4.4.6 Write value block This command formats a block as a value block containing a 32-bit value. A read is performed automatically after the write. Value blocks need a complete 16-byte block due to redundant storage. A successful login is required to run the command. Command Command Data 'wv' Value block (1 byte) Value (4 bytes) Answer Answer Description Data Written value (4 bytes) 'I' Error: value block failure 'F' Error: increment failure 'N' Error: No tag in field 'O' Error: Operation mode failure Example Command Description wv05010055EF Writes value 010055EFh to block 5. 8.4.4.6.1 Invalid value 'I' The value read back after the write value command is not a value block. Data was written corruptly. 8.4.4.6.2 Write failure 'F' In addition to the case of a data read failure caused by bad transmission conditions, this error is returned if a sector is addressed which is not located in the authenticated area. 8.4.4.6.3 No tag error 'N' This error is returned if no tag is present or the card does not respond. ASSA ABLOY Identification Technologies GmbH 91 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 8.4.4.6.4 Operation mode failure 'O' The tag is not ISO14443 type A compliant. 8.4.4.6.5 Writing values The write value block command is designed to create blocks in value format. This command requires write access to the specified block. Using this instruction for ticketing operations is not recommended. For ticketing applications, special instructions (Increment/Decrement/Copy) are available. ASSA ABLOY Identification Technologies GmbH 92 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 8.4.5 SR176 only commands 8.4.5.1 Lock block This command locks a block permanently. Command Command Data 'k' Block address (1 byte) Answer Answer Description data 'K' + page address 'F' Error: Lock failure 'N' Error: No tag in field 'O' Error: Operation mode failure (only SR176 tags supported) 'X' Error: Block already locked Example Command Description k05 K05 Lock block 05. 8.4.5.1.1 Operation mode failure 'O' The presented tag is not a SR176 tag. 8.4.5.1.2 Apply settings After locking a block permanently, the tag needs to be selected for the settings to apply. ASSA ABLOY Identification Technologies GmbH 93 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 8.4.6 DESFire command set This command set provides easy communication with DESFire tags. The reader handles all encryption and decryption automatically. The length byte includes all data and command bytes. For more information about DESFire, refer to DESFire documentation [2]. The DESFire command set is only available for ISO 14443 Type A tags; with other tags, the Error Code 'O' is returned. A DESFire command has the following syntax: Command Data 'f' Length byte (1 byte) DESFire Command Code (1 byte) Data (n bytes) Example Command Description f0107 Get Application IDs. f020D00 Select File 00h. All the following DESFire commands are listed without length byte. ASSA ABLOY Identification Technologies GmbH 94 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 8.4.6.1 Authenticate Authenticates to a DESFire card. Authentication depends on access conditions of an application or file. ROM keys can be used to login. The reader can store up to 32 keys internally. Command Command Data 00h Key number on tag (1 byte) Key number (1 byte) / Key on reader (16 bytes) Answer Answer Description Data Authentication status (1 byte) 'L' Login success 'F' Error: General failure 'N' Error: No tag in field 'X' Error: Authentication failed Xxh DESFire status / error code, refer to DESFire documentation Example Command Description f03000000 Authenticate using key 00h of the tag and key 00h stored in reader ROM. f12020011223344556677 8899AABBCCDDEEFF Authenticate using key 02h of the tag and key 00112233445566778899AABBCCDDEEFFh. ASSA ABLOY Identification Technologies GmbH 95 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 8.4.6.2 Change Key Settings This command changes the key settings of a selected application. Command Command Data 01h Settings (1 byte) Answer Answer Description data Status code (1 byte) 00h Success 'N' Error: No tag in field Xxh DESFire status / error code, refer DESFire documentation Example Command Description f0201FF Answer: 00 change key settings to FFh. ASSA ABLOY Identification Technologies GmbH 96 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 8.4.6.3 Get Key Settings This command gets the key settings of a selected application. Settings of the currently selected application are returned. Additionally the maximum number of keys that can be stored in the application is displayed. Command Command Data 02h none Answer Answer Description 00h + Key settings (1 byte) + max. number of keys (1 byte) Key settings 'N' Error: No tag in field Xxh DESFire status / error code, refer DESFire documentation Example Command Description f0102 Answer: 000F01 Key settings of the application are 0F and key number 01 is used. ASSA ABLOY Identification Technologies GmbH 97 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 8.4.6.4 Change Key This command changes the key of a selected application. Command Command Data 03h Key number on tag (1 byte) New key (16 bytes) Old key (16 bytes) Answer Answer Description Data Status code (1 byte) 00h Success 'F' Error: General failure 'N' Error: No tag in field Xxh DESFire status / error code, refer to DESFire documentation Example Command Description f22030000112233445566 Answer: 00 778899AABBCCDDEEFF Key 00h is changed to 000000000000000000000 00112233445566778899AABBCCDDEEFFh. 00000000000 ASSA ABLOY Identification Technologies GmbH 98 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 8.4.6.5 Get Key Version This command reads the key version of a key of a selected application. Command Command Data 04h Key number on tag (1 byte) Answer Answer Description 00h + Key version (1 byte) Key version 'N' Error: No tag in field Xxh DESFire status / error code, refer to DESFire documentation Example Command Description f020400 Answer: 0000 Key version 00h. ASSA ABLOY Identification Technologies GmbH 99 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 8.4.6.6 Create Application This command creates an application on a tag. Applications can only be created in the master application (000000h). Command Command Data 05h Application ID (3 bytes) Key settings (1 byte) Number of keys (1 byte) Answer Answer Description Data Status code (1 byte) 00h Success 'N' Error: No tag in field Xxh DESFire status / error code, refer to DESFire documentation Example Command Description f06050000100F01 Answer: 00 Create application 000010h with one key. ASSA ABLOY Identification Technologies GmbH 100 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 8.4.6.7 Delete Application This command deletes an application on a tag. Command Command Data 06h Application ID (3 bytes) Answer Answer Description Data Status code (1 byte) 00h Success 'N' Error: No tag in field Xxh DESFire status / error code, refer to DESFire documentation Example Command Description f0406000010 Answer: 00 Delete application 000010h. ASSA ABLOY Identification Technologies GmbH 101 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 8.4.6.8 Get Application IDs This command returns all application IDs on a tag. Command Command Data 07h None Answer Answer Description 00h + Application IDs (3 bytes each) Application IDs 'N' Error: No tag in field Xxh DESFire status / error code, refer to DESFire documentation Example Command Description f0107 Answer: 00000010 Application 000010h is available on the tag ASSA ABLOY Identification Technologies GmbH 102 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 8.4.6.9 Select Application This command selects a specific application. An application must be selected to access all files stored in it. Command Command Data 08h Application ID (3 bytes) Answer Answer Description Data Status code (1 byte) 00h Success 'N' Error: No tag in field Xxh DESFire status / error code, refer to DESFire documentation Example Command Description f0408000010 Answer: 00 Application 000010h is selected. ASSA ABLOY Identification Technologies GmbH 103 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 8.4.6.10 Format PICC This command formats the tag. All applications are deleted. The format command requires successful authentication. Command Command Data 09h None Answer Answer Description Data Status code (1 byte) 00h Success 'N' Error: No tag in field Xxh DESFire status / error code, refer to DESFire documentation Example Command Description f0109 Answer: 00 The tag is formatted successfully. All applications and files have been deleted. ASSA ABLOY Identification Technologies GmbH 104 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 8.4.6.11 Get Version This command returns the production data of a tag. Command Command Data 0Ah none Answer Answer Description Data Version (28 bytes) For more detailed information refer to DESFire documentation. 'F' Error: General failure 'N' Error: No tag in field Xxh DESFire status / error code, refer to DESFire documentation. Example Command Description f010A Answer: 040101000218050401010004180504453101366E 108E26515D502003 Version string of DESFire tag. ASSA ABLOY Identification Technologies GmbH 105 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 8.4.6.12 Get File IDs This command returns all file IDs found for a selected application. Command Command Data 0Bh none Answer Answer Description 00h + File IDs (1 byte each) File IDs 'N' Error: No tag in field Xxh DESFire status / error code, refer to DESFire documentation Example Command Description f010B Answer: 000005 File with ID 00h and 05h exists. ASSA ABLOY Identification Technologies GmbH 106 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 8.4.6.13 Get File Settings This command returns additional information of a file. Command Command Data 0Ch File number (1 byte) Answer Answer Description 00h + File settings (n bytes) File settings Length depends on file type. For more detailed information refer to DESFire documentation. 'F' Error: General failure 'N' Error: No tag in field xxh DESFire status / error code, refer to DESFire documentation Example Command Description f020C00 Answer: 000000EEEE100000 File 00h is a standard data file with access conditions EEEEh and data length 100000h. ASSA ABLOY Identification Technologies GmbH 107 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 8.4.6.14 Select File This command selects a specific file. Command Command Data 0Dh File number (1 byte) Answer Answer Description Data Status code (1 byte) 00h Standard Data File selected 01h Backup Data File selected 02h Value File selected 03h Linear Record File selected 04h Cyclic Record File selected 'N' Error: No tag in field Xxh DESFire status / error code, refer DESFire documentation Example Command Description f020D00 Answer: 00 File 00h has been successfully selected. ASSA ABLOY Identification Technologies GmbH 108 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 8.4.6.15 Change File Settings This command changes the access rights of a selected file. Command Command Data 0Eh Communication settings (1 byte) Access rights (2 bytes) Answer Answer Description Data Status code (1 byte) 00h Standard Data File selected 'N' Error: No tag in field 'O' Error: No file selected Xxh DESFire status / error code, refer to DESFire documentation Example Command Description f040E010000 Answer: 00 Sets file to MAC secured with key 0000h. Note For further information on communication settings and access rights, refer to the DESFire documentation. [2] ASSA ABLOY Identification Technologies GmbH 109 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 8.4.6.16 Create Standard Data File This command creates a Standard Data File in a selected application. Command Command Data 0Fh File number (1 byte) Communication settings (1 byte) Access rights (2 bytes) File size (3 bytes) Answer Answer Description Data Status code (1 byte) 00h Standard Data File created 'N' Error: No tag in field Xxh DESFire status / error code, refer to DESFire documentation Example Command Description f080F0000EEEE100000 Answer: 00 Create standard data file with ID 00h. Note For further information on communication settings and access rights, refer to the DESFire documentation. ASSA ABLOY Identification Technologies GmbH 110 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 8.4.6.17 Create Backup Data File This command creates a Backup Data File in a selected application. Backup data files use a shadow register for data manipulation operations. The file number must be in the range from 00h to 07h. Command Command Data 10h File number (1 byte) Communication settings (1 byte) Access rights (2 bytes) File Size (3 bytes) Answer Answer Description Data Status code (1 byte) 00h Backup Data File created 'N' Error: No tag in field Xxh DESFire status / error code, refer to DESFire documentation Example Command Description f081001000000100000 Answer: 00 Create backup data file with ID 01h. File is only accessible after login with key 00h Note For further information on communication settings and access rights, refer to the DESFire documentation. ASSA ABLOY Identification Technologies GmbH 111 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 8.4.6.18 Create Value File This command creates a Value File in a selected application. Value blocks are signed long numbers, which are stored in Intel format (LSB first). Value files use a shadow register for data manipulation operations. The file number must be in the range from 00h to 07h. Command Command Data 11h File number (1 byte) Communication settings (1 byte) Access rights (2 bytes) Low Limit (4 bytes) High Limit (4 bytes) Value (4 bytes) Enable Limited Credit (1 byte) Answer Answer Description Data Status code (1 byte) 00h Value File created 'N' Error: No tag in field Xxh DESFire status / error code, refer to DESFire documentation Example Command Description f12110503000000000000 666666663333333300 Answer: 00 Value file with ID 05h created. Transmission is secured using DES encryption with key 00h. Lower limit is 00000000h and high limit 66666666h. Default value is 33333333h. Note For further information on communication settings and access rights, refer to the DESFire documentation. ASSA ABLOY Identification Technologies GmbH 112 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 8.4.6.19 Create Linear Record File This command creates a Linear Record File in a selected application. Linear record files use a shadow register for data manipulation operations. The file number must be in the range from 00h to 07h. Command Command Data 12h File number (1 byte) Communication settings (1 byte) Access rights (2 bytes) Record Size (3 bytes) Number of Records (3 bytes) Answer Answer Description Data Status code (1 byte) 00h Linear Record File created. 'N' Error: No tag in field Xxh DESFire status / error code, refer to DESFire documentation Example Command Description f0B1202010000010000 100000 Answer: 00 Linear record file with ID 02 and MAC security is created. Record size is 000001h and number of records is 000010h. Note For further information on communication settings and access rights, refer to the DESFire documentation. ASSA ABLOY Identification Technologies GmbH 113 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 8.4.6.20 Create Cyclic Record File This command creates a Cyclic Record File in a selected application. Cyclic record files use a shadow register for data manipulation operations. The file number must be in the range from 00h to 07h. Command Command Data 13h File number (1 byte) Communication settings (1 byte) Access rights (2 bytes) Record Size (3 bytes) Number of Records (3 bytes) Answer Answer Description Data Status code (1 byte) 00h Cyclic Record File created 'N' Error: No tag in field Xxh DESFire status / error code, refer to DESFire documentation Example Command Description f0B1303010000020000 100000 Answer: 00 Cyclic record file with ID 03 and MAC security is created. Record size is 000001h and number of records is 000010h. Note For further information on communication settings and access rights, refer to the DESFire documentation. ASSA ABLOY Identification Technologies GmbH 114 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 8.4.6.21 Delete File This command deletes a file on tag in a selected application. Command Command Data 14h File number (1 byte) Answer Answer Description Data Status code (1 byte) 00h File is successfully deleted 'N' Error: No tag in field Xxh DESFire status / error code, refer to DESFire documentation Example Command Description f021403 Answer: 00 File with ID 03h is deleted. ASSA ABLOY Identification Technologies GmbH 115 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 8.4.6.22 Read Data / Records This command reads data of a selected Data or Record file. Command Command Data 15h Offset (3 bytes) Length (1 byte) Answer Answer Description 00h + Data Data (n bytes) 'C' Error: CRC or MAC does not match 'N' Error: No tag in field 'O' Error: No file selected 'R' Error: Out of range Xxh DESFire status / error code, refer to DESFire documentation Example Command Description f051500000005 Answer: 000011223344 Read 5 bytes from offset 000000h. f051500000000 Answer: 0011112222 Read all records of the record file. 8.4.6.22.1 Our of range 'R' If the data received exceeds the maximum of 232 bytes, the error R ('Out of range') is returned. Note If performance is important, 232 bytes should be used for plain data and 224 should be used for enciphered and MACed data, because in this case, the smaller frames from the DESFire tag are filled up completely. ASSA ABLOY Identification Technologies GmbH 116 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 8.4.6.23 Data files The offset defines the start address of the reading. The length specifies the number of bytes, which are read. The offset and length must not exceed the limits of the file. 8.4.6.24 Record file Records are always read one at a time. The offset points to the record within the record file from which the reading starts. The length defines the number of records that have to be read. The response always starts with the oldest record. Offset 000000h points to the latest record. Length 00h reads all records of the record file. ASSA ABLOY Identification Technologies GmbH 117 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 8.4.6.25 Write Data / Record This command writes data to a selected Data or Record file. A write record command will append a new record to a linear record file until all records are filled up. Using cyclic record files, the oldest record is updated when all records are used up. The write record command must be validated with the commit/abort transaction command. Command Command Data 16h Offset (3 bytes) Data (n bytes) Answer Answer Description Data Status code (1 byte) 00h Success 'C' Error: CRC or MAC does not match 'N' Error: No tag in field 'O' Error: No file selected 'R' Error: Out of range Xxh DESFire status / error code, refer to DESFire documentation Example Command Description f09160100001122334455 Answer: 00 Writes data 1122334455 starting at position 000001h to a data file or a new record. ASSA ABLOY Identification Technologies GmbH 118 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 8.4.6.25.1 Our of range 'R' If sent data exceeds the maximum of 232 bytes, the error R ('Out of range') is returned. Note If performance is important 232 bytes should be used for plain data and 224 should be used for enciphered and MACed data, because in this case the smaller frames from the DESFire tag are filled up completely. 8.4.6.26 Get Value This command reads a value block of a selected value file. Command Command Data 17h None Answer Answer Description 00h + Value (4 bytes) Value 'C' Error: CRC or MAC does not match 'N' Error: No tag in field 'O' Error: No file selected Xxh DESFire status / error code, refer to DESFire documentation Example Command Description f0117 Answer: 0022222222 value 22222222h is currently stored in the value file. ASSA ABLOY Identification Technologies GmbH 119 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 8.4.6.27 Credit This command increases a value in a selected value file. All value manipulation commands are accumulated in a shadow register. This shadow register is only written after a successful commit transaction command. Command Command Data 18h Data (4 bytes) Answer Answer Description Data Status code (1 byte) 00h Success 'N' Error: No tag in field Xxh DESFire status / error code, to refer DESFire documentation Example Command Description f051878563412 Answer: 00 The value 12345678h is added to the selected value file. ASSA ABLOY Identification Technologies GmbH 120 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 8.4.6.28 Debit This command decreases a value in a selected value file. All value manipulation commands are accumulated in a shadow register. This shadow register is only written after a successful commit transaction command. Command Command Data 19h Data (4 bytes) Answer Answer Description Data Status code (1 byte) 00h Success 'N' Error: No tag in field xxh DESFire status / error code, refer to DESFire documentation Example Command Description f051944332211 Answer: 00 The value 11223344h is charged from the selected value file. ASSA ABLOY Identification Technologies GmbH 121 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 8.4.6.29 Limited Credit This command limits the credit to a selected value file. The value depends on all previous debit values. It enables to cancel misattributed debits. All value manipulation commands are accumulated in a shadow register. This shadow register is only written after a successful commit transaction command. Command Command Data 1Ah Data (4 bytes) Answer Answer Description Data Status code (1 byte) 00h Success 'N' Error: No tag in field Xxh DESFire status / error code, refer to DESFire documentation Example Command Description f051A11111111 Answer: 00 The value 11111111h is added to the selected value file. A previous debit sum of at least 11111111h is needed. ASSA ABLOY Identification Technologies GmbH 122 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 8.4.6.30 Clear Record File This command clears the whole content of a selected record file. After a commit / abort transaction command the changes are written. Command Command Data 1Bh None Answer Answer Description Data Status code (1 byte) 00h Success 'N' Error: No tag in field Xxh DESFire status / error code, refer to DESFire documentation Example Command Description f011B Answer: 00 All records of the record file are erased. ASSA ABLOY Identification Technologies GmbH 123 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 8.4.6.31 Commit Transaction This command validates all previous write operations to backup data or record files and data manipulations on value files in a selected application. All changes are done at the same time. Command Command Data 1Ch None Answer Answer Description Data Status code (1 byte) 00h Success 'N' Error: No tag in field Xxh DESFire status / error code, refer to DESFire documentation Example Command Description f011C Answer: 00 All changes successfully executed. ASSA ABLOY Identification Technologies GmbH 124 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 8.4.6.32 Abort Transaction This command aborts all previous write operations to backup data or record files and data manipulations on value files of a selected application. No data is changed. Power loss will be interpreted as an abort transaction command. Command Command Data 1Dh None Answer Answer Description Data Status code (1 byte) 00h Success 'N' Error: No tag in field xxh DESFire status / error code, refer to DESFire documentation Example Command Description f011D Answer: 00 All modifications are cancelled. ASSA ABLOY Identification Technologies GmbH 125 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 Software for contact interface functions The contact interface is fully CCID and PC/SC compliant. Therefore there are no own commands available. The PC/SC documentation can be downloaded from PC/SC workgroup web site http://www.pcscworkgroup.com/. In order to develop own application S/W it’s recommended to use the Microsoft SDK, as the reader supports ScardControl commands. ASSA ABLOY Identification Technologies GmbH 126 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 10 Frequently Asked Questions 10.1 Getting Started To test and interface the ACGPass e-ID Desktop Reader, you just need to connect the reader via the USB cable with a Microsoft Windows 2000® or Microsoft Windows XP® based PC. You do not need a power supply for the reader. Once the reader is connected then please just follow the instruction on the PC screen. The PC/SC driver for the reader should come together with the reader. It is also available via the next ASSA ABLOY ITG sales office, the web site http://www.aaitg.com/ 10.2 Personalized ACGPass e-ID Desktop Reader In applications that are using the binary protocol mode, personalization maybe required. Use the Utility program to set up your reader correctly. Ask the reseller or the ASSA ABLOY ITG sales representative for the Utility software or download it from http://www.aaitg.com/. Minimum requirements are Microsoft Windows 2000®, Microsoft Windows XP® and the reader connected to the PC. ASSA ABLOY Identification Technologies GmbH 127 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 10.3 What type of mifare® card should I use? The mifare® standard is designed for multi-application environments. It contains 16 sectors each with 2 individual keys, access conditions, and 3 data or value blocks. Some applications use the 1 Kbytes of the mifare® Standard Card Memory only as storage area. mifare® Ultralight has no crypto unit on chip. It only supports 16 blocks. mifare® Standard 4k cards have the same features as mifare® Standard cards but increased memory capacity. 10.4 How safe is mifare® Standard for cashless payment? Security is always a feature of the overall system, not of the components. It requires careful design. A properly designed system will require ALL barriers to be hacked in order to be broken. For good design start identifying possible attacks and then create barriers to block them. mifare® was specifically designed for cashless payment applications. The mifare® concept provides the following security barriers: • Anti-collision/-selection • Atomic value transaction • Ciphered communication • Storage of values and data protected by mutual authentication • Weak field keys that allow decrement only • Stored keys in the reader that are not readable • Keys in the card that are not readable • A brute force attack based on trying many different keys is limited by the transaction time (several ms) of the card and would last virtually forever. ASSA ABLOY Identification Technologies GmbH 128 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 The Application can and should provide more barriers: • Sector access conditions. It is possible to assign access conditions in a way that only decrementing of values is allowed with the keys used in the field. So even a manipulated field station cannot be used to increment the value on the cards. As a general rule, key A is used as a field key, allowing only to read and decrement values, and key B is used to format the card or increment values. • Diversified keys. To make life even harder for attackers, keys can be modified using the serial number and memory content of the card. So each card uses different keys and a listening attack on the reader interface would be hopeless. • Limiting cash volume stored on a card • Do not use the transport keys (keys programmed at the time of delivery) for ticketing applications! • Ciphered and scrambled data storage • Sabotage alarm • Even higher security with contact less controller cards like mifare® DESFire, mifare® ProX, mifare® Smart MX etc. ASSA ABLOY Identification Technologies GmbH 129 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 10.5 Using a mifare® card This example demonstrates the detection of a card in the antenna field with continuous read and the reading of a page. Command Answer Activate continuous read mode B2197B58 a card responds with its serial number abort continuous read mode B2197B58 select card l01AAFFFFFFFFFFFF login into sector 1 with key FFFFFFFFFFFFh key type A rb04 00112233445566778899AABBCCDDEEFF read block 04 Activate continuous read mode to detect a new card Figure 10-1: Using a mifare® card ASSA ABLOY Identification Technologies GmbH 130 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 10.6 Using a DESFire card 10.6.1 Create a plain standard data file After activation, application 0 is selected automatically. Default access rights of application 0 require a login to create an application. The following example illustrates the successful creation of a plain standard data file. Command Answer 04E10E00000000 activate card f1200000000000000000000000000 0000000000 login to application 0 f06050000100F01 00 create application with ID 000010 f0408000010 00 select application with ID 000010 f080F0000eeee10000000 00 create plain standard data file with ID 00 Figure 10-2: Create plain standard data file of a DESFire card 10.6.2 Use a plain standard data file The next example demonstrates the use of a plain standard data file, such as that created in the previous example. No login needed since the file is plain. Command Answer 04E10E00000000 activate card f0408000010 00 select application with ID 000010 f020D00 00 select file with ID 00 f09160000001122334455 00 write data to standard data file f051500000010 0011223344550000000000000000000000 read data from standard data file Figure 10-3: Change data of a plain standard data file ASSA ABLOY Identification Technologies GmbH 131 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 10.6.3 Create a value file Basically, each application is created in the same way. The access rights of an application can be adjusted to freeze the application organization. In this case, a login to the application is needed to make any changes to the application. Regardless of the application access rights, a file can be selected using its ID. Before accessing a secured file, a login to the application is needed. A successful login allows changing all the files in the application that use the same key. A value file has a special structure. If a value file is changed the changes are only accepted after a commit transaction command. This feature allows modifying several files of an application and changing all the contents at the same time. The following example illustrates the creation of a value file using DES encipher. Command Answer 04E10E00000000 activate card f1200000000000000000000000000 0000000000 login to application 0 f06050000110F01 00 create application with ID 000011 f0408000011 00 select application with ID 000011 f12110003000000000000FFFFFF 7Ff5555555500 00 create value file with initial value 55555555 with ID 00. File is secured with DES encipher Figure 10-4: Create a plain standard data file on a DESFire card ASSA ABLOY Identification Technologies GmbH 132 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 10.6.4 Use a DES secured value file The next example demonstrates the use of a DES secured value file, such as the one created in the previous example. After the selection of the application, a login with the key of the value file is needed to access the file. Modification of the value file is accepted after the commit transaction command is given. Command Answer 04E10E00000000 activate card f0408000011 00 select application with ID 000010 f03000000 login to application f020D00 02 select file with ID 00 (value file) f0117 0055555555 read value file data f051911111111 00 debit value file with 11111111 f0117 0055555555 read value file, no modification done f011c 00 commit transaction, modification is done f0117 0044444444 read value file, verify modification Figure 10-5: Change data of a plain standard data file ASSA ABLOY Identification Technologies GmbH 133 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 11 References [1] ISO/IEC 14443 Part 1-4, Identification Cards – Contact less integrated circuit(s) cards – Proximity cards [2] DESFire Documentation, Philips, http://www.semiconductors.philips.com [3] Data Encryption Standard (DES), FIPS PUB 46-3, Reaffirmed 1995 October 25 [4] ASSA ABLOY ITG Antenna Design Guide [5] Philips; Application Note, mifare® & I-Code, Micore Reader IC family Directly Matched Antenna Design ASSA ABLOY Identification Technologies GmbH 134 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 12 Appendix A: SAM Please note that the power supply of the SAM adapter must be turned off during the entire card insertion period, otherwise SAM card damage might occur. For proper usage of the SAM, a 100nF capacitor between Vcc and GND is necessary. ASSA ABLOY Identification Technologies GmbH 135 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 13 Appendix C: Timings tCMD PC: tEXEC Request → ← Response Reader: Command tRES tEXEC [ms] Comments Common commands Cont. read (locked tag) Cont. read (worst case) DES en/decryption 2.8 – 22.6 + Reset Off and Recovery Time 54 + 3x Reset Off and Recovery Time 9.6 – 9.7 TDES en/decryption 28.7 – 28.8 High-speed select 'h08' (locked tag) 8.9 – 14.4 + Reset Off and Recovery Time + SFGT High-speed select 'h08' (no tag) 15 High-speed select 'h08' (worst case) 14.7 Multiselect (locked tag) + 3x Reset Off and Recovery Time + 3x Reset Off and Recovery Time + SFGT 5.8 – 11.4 + Reset Off and Recovery Time Multiselect (no tag) 67 + Reset Off and Recovery Time Multiselect (worst case) 67 + Reset Off and Recovery Time Antenna on 0.2 + Reset Recovery Time Antenna off 0.2 Port read 0.1 Port write 0.1 Read block 1.8 – 2.2 Write block 8.2 – 11 Reset Select (locked tag) 13.2 5.4 – 22.8 + Reset Off and Recovery Time Select (no tag) 38 + 3x Reset Off and Recovery Time Select (worst case) 55 + 3x Reset Off and Recovery Time ASSA ABLOY Identification Technologies GmbH 136 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 Command tEXEC [ms] Comments ISO 14443 Type A only commands Increment value block 18.4 Decrement value block 18.4 Copy value block 18.5 Read value block 2.3 Write value block 7.9 - 10.5 Mifare Login 4.9 Power conditions Power on 79 Enable on 85 Does not include rise time of power supply Figure 13-1: Timings Default Command Guard Time (20h = 1.2ms) was used. All timing data is advisory application information and does not form part of the specifications. It may change in future firmware releases. Please also note that all values specified in the above table depend on the tag used and Command Guard Time. ASSA ABLOY Identification Technologies GmbH 137 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 14 Appendix D: Release Notes 14.1 Version History 14.1.1 Dual 2.0 Initial Release. 14.1.2 Dual 2.1 • High-speed select supports anti-collision and the forcing of the air interface transmission rate and the frame size • Automatic ISO 14443-4 error handling (can be switched on/off) • RATS answer is returned with high-speed select command for ISO14443 A tags and with Extended ID flag set • Support for the ISO14443 B anti-collision algorithm • Extended Protocol flag now switches on/off, complete ISO14443-4 handling • ISO14443-4 chaining and WTX improved • 'of' and 'og' commands get new parameters • Selection time-out for ISO14443-4 A tags is set to 10h 14.1.3 Dual 2.2 • Sending serial data frames over User Port • Automatic ISO 14443-4 timeouts can be switched on/off • Request A information within ISO 14443 A Extended ID answer can be switched on / off • Command Guard Time added • 'of' and 'og' commands get new parameters • Chaining of 256 byte frame support • Support of ASK GTML tag • Page read functionality added • Additional protocol register PCON3 • Some bug fixes ASSA ABLOY Identification Technologies GmbH 138 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 14.1.4 Dual 2.3 • Reset To Default via MCLR Pin possible • Added 'ra' command: Resend last answer • SAM Command: Option byte modified, Improvements • Default value of ISO 14443B Selection timout register changed to 10h • Asynchronous Baudrates possible with Highspeed select • Added command that returns the version of the bootloader • Added command "rd"/"wd": read/write multiple blocks • "DisableReadAfterWrite" Flag added • Bug fixes 14.2 Revision history Date Revision number 02/18/2005 Version 2.1, Rev. 1.0 05/17/2005 Version 2.2, Rev. 1.0 ??/??/2006 Version 2.3, Rev. 1.0 ASSA ABLOY Identification Technologies GmbH 139 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 15 Appendix F: Approvals / Certificates 15.1 CE Declaration ASSA ABLOY Identification Technologies GmbH declares that, in conformity with the European CE requirements specified in the EMC Directive 89/336/EEC, ACGPass e-ID Desktop Reader, described in this manual is CE compliant The relevant documents are available. If any of the ACGPass e-ID Desktop Reader is operated from a mains power supply, all power connections and additional components of the final device must also comply with the EMC Directive 89/336/EEC directive. Customers selling into Europe must themselves make sure that the final device conforms to the EMC Directive 89/336/EEC directive. For ASSA ABLOY Identification Technologies GmbH, the compliance of important international regulations into business practices are a priority and the implementation of the EMC Directive 89/336/EEC is fully in line with the company’s commitment to continuously improve its Quality Management System. Walluf, January 2006 ASSA ABLOY Identification Technologies GmbH ASSA ABLOY Identification Technologies GmbH 140 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 15.2 FCC Declaration ASSA ABLOY Identification Technologies GmbH declares that, in conformity with the U.S. Directive FCC part 15, the ACGPass e-ID Desktop Reader described in this manual, is FCC part15 compliant The relevant documents are available. If any of the ACGPass e-ID Desktop Reader is operated from a mains power supply, all power connections and additional components of the final device must also comply with the US FCC Part 15 directive. Customers selling into the USA must themselves make sure that the final device conforms to the US FCC Part 15 directive. Caution: Any changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate the equipment. For ASSA ABLOY Identification Technologies GmbH, the compliance of important international regulations into business practices are a priority and the implementation of the FCC part 15 is fully in line with the company’s commitment to continuously improve its Quality Management System. Walluf, January 2006 ASSA ABLOY Identification Technologies GmbH ASSA ABLOY Identification Technologies GmbH 141 ACGPass e-ID Desktop Reader, Ver. Dual ISO 2.3 15.3 RoHS Compliance ASSA ABLOY Identification Technologies GmbH declares that, in conformity with the Directive 2002/95/EC about the Restriction of Hazardous Substances (RoHS), its ACGPass e-ID Desktop Reader products, listed in this manual, are RoHS compliant The following substances Cadmium and cadmium compounds Lead and lead compounds Mercury and mercury compounds Hexavalent chromium compounds Polybrominated biphenyls (PBB) Polybrominated Diphenylethers (BPDE) are contained in accordance with the limits required by the Directive. For ASSA ABLOY Identification Technologies GmbH, the integration of environmental considerations into business practices are a priority and the implementation of RoHS Directive is fully in line with the company’s commitment to continuously improve its Quality Management System. Walluf, January 2006 ASSA ABLOY Identification Technologies GmbH ASSA ABLOY Identification Technologies GmbH 142
Source Exif Data:
File Type : PDF File Type Extension : pdf MIME Type : application/pdf PDF Version : 1.4 Linearized : No Tagged PDF : Yes XMP Toolkit : 3.1-701 Producer : Acrobat Distiller 7.0.5 (Windows) Creator Tool : Acrobat PDFMaker 7.0.7 für Word Modify Date : 2007:02:09 12:04:38+01:00 Create Date : 2007:02:09 11:49:49+01:00 Metadata Date : 2007:02:09 12:04:38+01:00 Format : application/pdf Title : User Manual Creator : Stefan Trautner Document ID : uuid:930705c6-838a-4717-9f11-7ce89492f09c Instance ID : uuid:6c416f88-e725-4cc8-a5b8-730b4253f853 Company : Wise media Source Modified : D:20070125151527 Page Count : 143 Page Layout : OneColumn Author : Stefan TrautnerEXIF Metadata provided by EXIF.tools