First, the main indicators
- Divided into 16 sectors, each sector is 4 blocks, 16 bytes per block, block as the access unit;
- Each sector has a separate set of password and access control;
- Each card has a unique serial number, which is 32 bits;
- With anti-collision mechanism, support multi-card operation;
- No power supply, self-contained antenna, including encryption control logic and communication logic circuit;
- Data retention is 10, can be rewritten 100,000 times, Read unlimited times;
- Operating temperature: -20℃~50℃ (humidity is 90%);
- Operating frequency: 13.56MHZ;
- Communication rate: 106 KBPS;
- Read/write Distance: within ten cm (related to reader).
Second, the storage structure
1, M1 card is divided into 16 sectors, each sector consists of 4 blocks (block 0, Block 1, Block 2, Block 3), (we will 16 sectors 64 blocks by absolute address number of 0~63, storage structure as shown:
2, the No. 0 sector block 0 (that is, the absolute address 0 blocks), it is used to store the manufacturer code, has been cured, can not be changed.
3, Block 0, Block 1, Block 2 of each sector is a data block, can be used to store data.
data blocks can be used for two applications:
- Used as a general data save, can be read, write operations.
- As a data value, you can initialize values, add values, subtract values, read value operations.
4, block 3 for each sector is the control block, including the password A, access control, password B. The concrete structure is as follows:
5, each sector of the password and access control are independent, according to the actual need to set their own password and access control . Access control is 4 bytes, a total of 32 bits, each block in the sector (including data blocks and control blocks) access conditions are determined by the password and access control together, in the access control each block has a corresponding three control bits , defined as follows:
The three control bits are present in the access control byte in both positive and inverse form, which determines the access rights of the block (for example, the decrement operation must verify key A, the add value operation must verify key B, and so on). The position of the three control bits in the access control byte, take block 0 as an example:
Control of block 0:
Access control (4 bytes, where byte 9 is an alternate byte) is structured as follows:
6, the data block (block 0, Block 1, Block 2) access control as follows:
For example: When the access control bit of block 0 C10 C20 c30=1 0 0 o'clock, verify that password A or password B is correct and readable; Verify that password B is correct and writable; No add value or decrement operation.
7, the control block block 3 access control and data block (block 0, 1, 2), its access control is as follows:
For example: When the access control bit of block 3 C13 C23 c33=1 0 0 o'clock, it says:
- Password A: Unreadable, verify Keya or keyb is correct, can write (change);
- Access control: Verify that Keya or keyb is correct, readable and writable;
- Password B: Verify that Keya or keyb is correct, readable, writable.
S50 Non-contact IC card Performance Brief (M1)