The previous example describes the general steps for detecting and reading and writing NFC tags. This example describes the common Mifare tags.
The Mifare Tag can be 1 K, 2 K, and 4 K. The memory partition is similar, and the memory distribution of the 1 K-byte Tag is given:
Data is divided into 16 segments, each with
Read data with USB reader acr122u, read from 4th page to 15th page, read 4 bytes at a time
Example 1:
The content of my card is a tag:title is my Title, the URL is http://app.searb.cn > 2C D1 (ASCII Mode):, n don't know what it means> The Sp™sp:means Smart Poster, which is a smart tag> 0E mode:t >> ASCII 54:type length 1, Type T (Text)> 6E >> ASCII mode:1en 31:id ("1") = record identifier; 65:locale string Lengh 5, local string is en-us> 2D 4D >> A
.
Let's talk about the common solutions for RF cards: Phillips's Mifare, Sony's felica, and PBOC of the Chinese name bank.
Mifare card has many versions (see http://en.wikipedia.org/wiki/MIFARE for details), common versions include Mifare classic and Mifare desfire, which a
followed, b4-b0 must have and only 1 bit is 1. Generally, the atqa of Mifare S50 is 0004 H, and that of Mifare s70 is 0002 H.
2. anticollision Loop)
When multiple cards enter the reader operation range, the anti-conflict mechanism selects one of them for the operation. If not selected, the system is in idle mode and waits for the next card selection, this process returns the serial number of the selected
Article to the text/Shing original Reprint please indicate the source http://blog.csdn.net/yxstars/article/details/38079827 Thanks to the original author's hard work, thank you again!With the development of society, smart card has been widely used in many fields. In particular, contactless cards, due to the use of convenient and powerful features, in the management, public transport, work permits, identification and other fields have been rapidly popularized and popularized.Contactless car
Android MIFARE NFCA Source parsingTagtechnology defines a common interface class for all tagsBasictagtechnology implements some of the interfaces of the TagtechnologyThen there is the specific label protocol inheritance BasictagtechnologyNfc-a complies with the ISO 14443-3a protocol.Key wordsAtqa Answer to Request acc. to ISO/IEC 14443-4ATS Answer to Select acc. to ISO/IEC 14443-4DIF Dual Interface (cards)COS Card Operating SystemCL Cascade level Acc.
Phillips's Mifare card is widely used in the market due to its high security. For example, we use bus cards, meal cards for schools and corporate canteens, etc. each slice has an independent key (six-byte password). During communication, the key must be verified before data can be read and written. its key technology is to use the triple-encryption DES algorithm for key verification (that is, the keys transmitted between the reader and the card are en
Original address:: https://blog.csdn.net/wwwtovvv/article/details/9240783
Related articles
1, Mifare Plus card reading and writing module user manual----http://www.docin.com/p-1252890695.html
2, Mifare plus card reading and writing module----http://tieba.baidu.com/p/3968383719?traceid=
3, Mifare PLUS CPU card reader software green free version----http://dl.pconli
text/Shing original reprint please indicate the source http://blog.csdn.net/yxstars/article/details/38080175 In the Mifare card, the energy and data are transmitted through the antenna, the antenna in the card is a few turns of the coil, directly connected to the chip, no longer require additional components. The coil is embedded in the plastic and forms a passive contactless card.Card reader to the IC to send a set of fixed frequency of electromag
In the Mifare card, energy and data are transmitted through an antenna. The antenna in the card contains several turns of coils and is directly connected to the chip without additional components. The coil is embedded in plastic to form a passive non-contact card.
The card reader sends a set of Fixed-frequency electromagnetic waves to the IC. The card contains an IC series resonance circuit, which is the same as the frequency of the reader. In this w
0x00 Preface
I have always wanted to play wireless security, but wangcai said that the threshold is low (where is it low? =. = Web dog: I am stupid, Wang). I started ACR122u and wanted to get into trouble from NFC. Now I have read this article to popularize basic knowledge.
Mifare Classic card provides 1-4 k capacity. We often see the Mifare Classic 1 k (S50), the so-called M1 card. The M1 card has 16 secto
The Mifare IC chip contains the EEPROM, rfinterface, and digital control unit.
1. rfrf Interface
Rfrf interface circuits mainly include waveform conversion modules. It can receive the 13.56mhz radio modulation frequency on the card reader. On the one hand, it sends the modulation/Demodulation module, and on the other hand it converts the waveform, converts the sine wave into a square wave, and then rectifies and filters it, the voltage control modul
speed up!4)The anti-conflict of typea requires a relatively high and accurate timing sequence on the card. Therefore, you need to add hardware to the card and reader separately, while the anti-conflict of typeB can be implemented by software.
From the comparison above, we can see that the two technologies are difficult to say that they are superior or inferior, which is one of the reasons why the international ISO organization has determined the two standards. However, for public transit syste
text/Shing original Reprint Please specify the source http://blog.csdn.net/yxstars/article/details/38081241The Mifare IC chip contains EEPROM, RF interface and digital control unit.1. RF RF InterfaceIn the RF RF interface circuit, mainly includes the waveform conversion module. It can receive the 13.56MHZ radio modulation frequency on the card reader, on the one hand the modulation/demodulation module, on the other hand, the waveform conversion, t
Label:The Mifare S50 standard IC card has a 1 K-byte EEPROM, which is used primarily to store data and control information. The 1-byte EEPROM is divided into 16 zones, each divided into 4 segments, with 16 bytes in each of the 1 segments. The last segment of each zone is called "tail" (trailer), which includes two keys and the access conditions (programmable) for each segment in the zone. Storage Organization (Memory Organization) Storage access (M
Type 1 Tag,type 2 tag, Type 3 tag, type 4 Tag
Type 1 is based on ISO 14443 A and are currently available exclusively from Innovision Technology (topaz™). It has a 96-byte memory capacity, which makes it a very cost-efficient tag for a wide range of NFC applicationsType 2
From the b tag in a tag a, that is, the B tag ($ ("#B") from the A tag is the B tag in the entire page, that is, the child label B of the A tag is obtained.
From the parent tag
Xml, tag: modify the content of a tag specified by XML: modifying the content of a tag specified by Xml (I want to remove the space of the content of the tag) is actually a very simple method. you need to take it directly. Test.xmlrecord blog is a good example of using www.cnblogs.comkeerdip5465549.html to remove XM to
JSTL tag library, custom tag, jstl tag library customJSTLcore-> c tag!
Out and setremoveurlifchooseforeach
Used to output arrays and collections!
$ {Str}
Equivalent
For (String str: strs ){...}
Attribute:* Items: Specifies the person to loop. It can be an array or a collection.* Var: Assign each element in an array o
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.