IC technical indicators

Source: Internet
Author: User
I. Main Indicators

 

; Size: 8 K-bit EEPROM

; Divided into 16 sectors, each sector is 4, each 16 bytes, block as the access unit

Each slice has an independent set of passwords and access control.

Each card has a unique serial number, which is a 32-bit

; Conflict prevention mechanism, supporting multi-Card Operations

; No power supply, built-in antenna, including encryption control logic and communication logic circuit

The data retention period is 10 years, which can be changed to 0.1 million times and read unlimited times.

; Operating temperature:-20 ℃ ~ 50 ℃ (temperature: 90%)

; Operating frequency: 13.56 MHZ

; Communication Rate: 106 KBPS

; Read/write distance: less than 10mm (related to the reader)

 

Ii. Storage Structure

1. the M1 card consists of 16 sectors, each of which is composed of four (Block 0, Block 1, Block 2, and block 3, (We also numbered 64 blocks in 16 sectors by absolute address as 0 ~ 63. Shows the storage structure:

 

Block 0 Data Block 0

Sector 0 Block 1 data block 1

Block 2 data block 2

Block 3 Password A access control password B control block 3

Block 0 data block 4

Sector 1 block 1 data block 5

Block 2 data block 6

Block 3 Password A access control password B control block 7

 

:

:

:

 

0 data blocks 60

Sector 15 1 data block 61

2 Data blocks 62

3 Password A access control password B control block 63

 

2. The Block 0 in The 0th sector (that is, the absolute address 0 block) is used to store the vendor code, which has been fixed and cannot be changed.

3. Block 0, Block 1, and block 2 in each sector are data blocks and can be used to store data.

Data blocks can be used in two types of applications:

★It is used for data storage and can be read or written.

★It can be used as a data value for initialization value, value-added value, impairment, and read value operations.

4. Block 3 of each slice is the control block, including password A, access control, and password B. The specific structure is as follows:

 

Password A (6 bytes) Access Control (4 bytes) password B (6 bytes)

 

5. The password and access control for each sector are independent. You can set your own password and access control as needed. The access control is 4 bytes, with a total of 32 bits. The access conditions for each block (including the data block and the control block) in the slice are jointly determined by the password and access control, in access control, each block has three corresponding control bits, which are defined as follows:

Block 0: C10 C20 C30

Block 1: C11 C21 C31

Block 2: C12 C22 C32

Block 3: C13 C23 C33

 

The three control BITs exist in the access control byte in the form of positive and inverse, which determines the access permission of the block (such

Key a must be verified for impairment operations, key B must be verified for value-added operations, and so on ). Three Controls

The position of the bit in the access control byte. Take Block 0 as an example:

 

Block 0 control:

Bit 7 6 5 4 3 2 1 0

Byte 6C20_bC10_ B

Byte 7C10C30_ B

8C30C20

Byte 9

(Note: C10_ B indicates that C10 is reversed)

 

The structure of access control (4 bytes, of which 9 is a slave byte) is as follows:

Bit 7 6 5 4 3 2 1 0

Byte 6C23_bC22_bC21_bC20_bC13_bC12_bC11_bC10_ B

Byte 7C13C12C11C10C33_bC32_bC31_bC30_ B

Byte 8C33C32C31C30C23C22C21C20

Byte 9

(Note: _ B Indicates inverse)

 

6. Access Control for data blocks (Block 0, Block 1, and block 2) is as follows:

 

Control bit (X = 0 .. 2)

Access items (0, 1, and 2 for data blocks)

C1XC2XC3X Read Write IncrementDecrement, transfer,

Restore

000KeyA | BKeyA | B

010KeyA | BNeverNeverNever

100KeyA | BKeyBNeverNever

110KeyA | BKeyBKeyBKeyA | B

001KeyA | BNeverNeverKeyA | B

011 KeyBKeyBNeverNever

101 KeyBNeverNeverNever

111 NeverNeverNeverNever

(KeyA | B Indicates Password A or password B, and Never indicates that it cannot be implemented under any conditions)

 

For example, when the Block 0 access control bit C10 C20 C30 = 1 0 0, verify that password A or password B is correct and then read;

After verifying that password B is correct, it can be written. You cannot perform value-added or impairment operations.

 

7. The access control of Block 3 is different from that of data blocks (blocks 0, 1, and 2). Its access control is as follows:

 

Password A access control password B

C13C23C33ReadWrite ReadWriteReadWrite

000NeverKeyA | BKeyA | BNeverKeyA | BKeyA | B

010NeverNeverKeyA | BNeverKeyA | BNever

100NeverKeyBKeyA | BNeverNeverKeyB

110NeverNeverKeyA | BNeverNeverNever

001NeverKeyA | BKeyA | B

011NeverKeyBKeyA | BKeyBNeverKeyB

101NeverNeverKeyA | BKeyBNeverNever

111NeverNeverKeyA | BNeverNeverNever

For example, when block 3's access control bit C13 C23 C33 = 1 0 0, it indicates:

Password A: it cannot be read. After verifying that KEYA or KEYB is correct, it can be written (changed ).

Access Control: after verifying that KEYA or KEYB is correct, it is readable and writable.

Password B: after verifying that KEYA or KEYB is correct, it is readable and writable.

 

Iii. Working Principle

The electrical part of the card consists of only one antenna and ASIC.

Antenna: The card antenna is a set of winding coils that are suitable for encapsulation into IS0 cards.

ASIC: The card ASIC consists of a high-speed (106KB baud rate) rfinterface, a control unit and

8 K-bit EEPROM.

Working principle: the reader sends a set of Fixed-frequency electromagnetic waves to the M1 card. The card has an LC series resonance circuit, and its frequency is the same as that of the writer, under the excitation of electromagnetic waves, the LC resonance circuit generates resonance, so that there is a charge in the capacitor. At the other end of the capacitor, there is a one-way conduction electronic pump, the charge in the capacitor is sent to another capacitor for storage. When the accumulated charge reaches 2 V, the capacitor can be used as a power supply to provide the working voltage for other circuits, transmits the data in the card or receives the data from the reader.

 

Iv. Communication between M1 RF Card and Reader

Change slice

 

Do not change the slice

 

 

 

 

 

 

Answer to request)

The communication protocol and the baud rate of the M1 RF Card are defined. When a card enters the operation range of the reader, the reader communicates with the card through a specific protocol to determine whether the card is an M1 RF Card, that is, the card type of the verification card.

 

Anticollision Loop)

When multiple cards enter the reader operation range, the anti-conflict mechanism selects one of them for the operation. If not selected, the system is in idle mode and waits for the next card selection, this process returns the serial number of the selected card.

 

Select Tag)

Select the serial number of the selected card and return the capacity code of the card.

 

3 Pass Authentication)

After selecting the card to be processed, the reader determines the sector number to be accessed and verifies the password of the sector. After three mutual authentication, the reader can communicate through the encrypted stream. (When selecting another partition, you must verify the password of another sector .)

 

Operations on data blocks

Read: Read a block;

Write: Write a block;

Increment: adds a value to a value block;

Decrement: impairment of the Value block;

Storage (Restore): stores the content in the block to the data register;

Transfer: Write the content in the Data Register into a block;

Stop (Halt): place the card in the paused state;

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.