example to abuse, hack or trick a system which the reader does not have specific authorizations to such as ticketing systems, public transport, University/ISIC cards, building Access systems or whatsoever systems using Mifare classic as core technology)
Notes:
This article contain no original research. All the research and implementation was made by other people and communities and is publicly available. We made this two cents just for fun and bec
The previous example describes the general steps for detecting and reading and writing NFC tags. This example describes the common Mifare tags.
The Mifare Tag can be 1 K, 2 K, and 4 K. The memory partition is similar, and the memory distribution of the 1 K-byte Tag is given:
Data is divided into 16 segments, each with 4 blocks. Each Block can store 16 bytes of data. The size is 16X4X16 = 1024 bytes.
The la
Original address:: https://blog.csdn.net/wwwtovvv/article/details/9240783
Related articles
1, Mifare Plus card reading and writing module user manual----http://www.docin.com/p-1252890695.html
2, Mifare plus card reading and writing module----http://tieba.baidu.com/p/3968383719?traceid=
3, Mifare PLUS CPU card reader software green free version----http://dl.pconli
Phillips's Mifare card is widely used in the market due to its high security. For example, we use bus cards, meal cards for schools and corporate canteens, etc. each slice has an independent key (six-byte password). During communication, the key must be verified before data can be read and written. its key technology i
Article to the text/Shing original Reprint please indicate the source http://blog.csdn.net/yxstars/article/details/38079827 Thanks to the original author's hard work, thank you again!With the development of society, smart card has been widely used in many fields. In particular, contactless cards, due to the use of convenient and powerful features, in the management, public transport, work permits, identification and other fields have been rapidly popularized and popularized.Contactless car
code tag size (the first "08", indicating the return value of the capacity, now changed to "88", no special significance ). RWD uses the select card command to select one card for confirmation and the memory-related operation card returns answer to select ATS code = 08 h. RWD uses ATS to determine the type of the selected card.
4. Three mutual confirmations (3 pass authentication)
Mifare series products not only require cards to authenticate the ide
Android MIFARE NFCA Source parsingTagtechnology defines a common interface class for all tagsBasictagtechnology implements some of the interfaces of the TagtechnologyThen there is the specific label protocol inheritance BasictagtechnologyNfc-a complies with the ISO 14443-3a protocol.Key wordsAtqa Answer to Request acc. to ISO/IEC 14443-4ATS Answer to Select acc. to ISO/IEC 14443-4DIF Dual Interface (cards)COS Card Operating SystemCL Cascade level Acc.
.
Let's talk about the common solutions for RF cards: Phillips's Mifare, Sony's felica, and PBOC of the Chinese name bank.
Mifare card has many versions (see http://en.wikipedia.org/wiki/MIFARE for details), common versions include Mifare classic and Mifare desfire, which a
0x00 Preface
I have always wanted to play wireless security, but wangcai said that the threshold is low (where is it low? =. = Web dog: I am stupid, Wang). I started ACR122u and wanted to get into trouble from NFC. Now I have read this article to popularize basic knowledge.
Mifare Classic card provides 1-4 k capacity. We often see the Mifare Classic 1 k (S50), the so-called M1 card. The M1 card has 16 secto
Label:The Mifare S50 standard IC card has a 1 K-byte EEPROM, which is used primarily to store data and control information. The 1-byte EEPROM is divided into 16 zones, each divided into 4 segments, with 16 bytes in each of the 1 segments. The last segment of each zone is called "tail" (trailer), which includes two keys and the access conditions (programmable) for each segment in the zone. Storage Organization (Memory Organization) Storage access (M
text/Shing original reprint please indicate the source http://blog.csdn.net/yxstars/article/details/38080175 In the Mifare card, the energy and data are transmitted through the antenna, the antenna in the card is a few turns of the coil, directly connected to the chip, no longer require additional components. The coil is embedded in the plastic and forms a passive contactless card.Card reader to the IC to send a set of fixed frequency of electromag
In the Mifare card, energy and data are transmitted through an antenna. The antenna in the card contains several turns of coils and is directly connected to the chip without additional components. The coil is embedded in plastic to form a passive non-contact card.
The card reader sends a set of Fixed-frequency electromagnetic waves to the IC. The card contains an IC series resonance circuit, which is the same as the frequency of the reader. In this w
The Mifare IC chip contains the EEPROM, rfinterface, and digital control unit.
1. rfrf Interface
Rfrf interface circuits mainly include waveform conversion modules. It can receive the 13.56mhz radio modulation frequency on the card reader. On the one hand, it sends the modulation/Demodulation module, and on the other hand it converts the waveform, converts the sine wave into a square wave, and then rectifies and filters it, the voltage control modul
speed up!4)The anti-conflict of typea requires a relatively high and accurate timing sequence on the card. Therefore, you need to add hardware to the card and reader separately, while the anti-conflict of typeB can be implemented by software.
From the comparison above, we can see that the two technologies are difficult to say that they are superior or inferior, which is one of the reasons why the international ISO organization has determined the two standards. However, for public transit syste
text/Shing original Reprint Please specify the source http://blog.csdn.net/yxstars/article/details/38081241The Mifare IC chip contains EEPROM, RF interface and digital control unit.1. RF RF InterfaceIn the RF RF interface circuit, mainly includes the waveform conversion module. It can receive the 13.56MHZ radio modulation frequency on the card reader, on the one hand the modulation/demodulation module, on the other hand, the waveform conversion, t
There's a thing that's been bothering me in my head, but it's not clear that it's going to hinder my progress. Do your own project demo can always use only one sheet ...
So today is still learning the next foreign key hope to understand some ...
Baidu on the role of the search foreign key "to maintain data integrity, consistency ", " referential integrity " ... What , I believe many small partners do not u
In a review by Anandtech, it was found that the Nexus 4 makes use of the Broadcom BCM20793 NFC controller. all previous NFC-enabled Nexus devices (Nexus S, Galaxy Nexus, Nexus Q and Nexus 7), as well as the vast majority of non-Nexus Android phones,
First look at the definitions of the various keys:
Super Key: An attribute set that uniquely identifies a tuple in a relationship is called a super key for a relational pattern
candidate Keys (Candidate key): A key that does not contain extra attributes is called a candidate key
Introduction-Recent database system principles of the textbook, there are some small knowledge point to see really let people silly, even if the psychology of me, do not know what it said, yesterday group meeting discussion, everyone's understanding also have different, the primary key, candidate key, super key, foreign key
This article transfers from the text/ Shing original reprint please indicate the source http://blog.csdn.net/yxstars/article/details/ 380799 Depending on the way the signal is sent and received, Iso/iec14443-3 defines the TypeA, typeb two
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.