mifare

Nexus 4 read Mifare Classic card UID

﹥>﹥吖頭↗ 提交于 2019-12-02 10:05:57
Currently we are developing NFC applications for Android.  Our experience Developed POS NFC control system using NXP PN5xx chips for control of Mifare Classic (1K) and CEPAS standard Developed Android NFC control system for MiFareClassic and Ultralight C in Galaxy Nexus (using NXP NFC chipset) Developed Android NFC control system for Ultralight C in Nexus 4 Our challenge: we want to control MiFareClassic 1K card in our POS machine (with NXP chip) and in new Android tablets (with Broadcom chip), we already have the installed card base and can not replace them.  - We know Nexus 4 has changed the

Distinguish NTAG213 from MF0ICU2

ぃ、小莉子 提交于 2019-12-02 04:25:19
Is there any way to distinguish a NTAG213 from a MF0ICU2 tag based on its UID, ATQA or SAK values? As I have to program the tags differently (PWD/PACK for NTAG213 or 3DES for MF0ICU2) there must be a way to call either one or another method. Unfortunately, the Android framework tells me that both tags are MifareUltralight with type TYPE_ULTRALIGHT_C . The ATQA ( 0x0044 ) and SAK ( 0x00 ) are identical, too. Other apps like NFC TagInfo by NXP can tell me the exact type of a tag, so I know that there must be some way. Once you know that the tag is an NXP tag (UID starts with 0x04), you would

Hide “NFC Tag type not supported” error on Samsung Galaxy devices

耗尽温柔 提交于 2019-12-01 19:16:58
I am working on an app that scans just the UID of MIFARE Classic cards to facilitate attendance registration. I have got it working. However, every time I scan a card on my Galaxy S4, I get a toast stating "NFC tag type not supported". I want to either block or hide that message while the app is open. I noticed there was one other question asking for the same thing on a Galaxy S6 but it was down-voted once and then ignored. I found this conversation on the Samsung Developers forum, however, I could not extract an answer from what is written there: if (NfcAdapter.ACTION_TECH_DISCOVERED.equals

Read NDEF message with external NFC reader ACR1252

岁酱吖の 提交于 2019-12-01 11:29:20
问题 I am using the following command to read a binary block from a Mifare Ultralight tag: FF B0 00 01 04 But now I want to exact the NDEF message stored in that Mifare Ultralight tag using an ACR1252 NFC reader. Which command do I have to use to get the full NDEF message? On which position in the tag is the NDEF message stored? 回答1: MIFARE Ultralight tags map to the NFC Forum Type 2 Tag Operation specification (broken link, here is an alternative. Consequently, in order to extract the NDEF

Mifare authentication

杀马特。学长 韩版系。学妹 提交于 2019-12-01 08:24:55
Say I want to authenticate to Mifare Classic. How do I know the exact kind of APDU to send to the card? Example. This code: bcla = 0xFF; bins = 0x86; bp1 = 0x0; bp2 = 0x0; // currentBlock len = 0x5; sendBuffer[0] = bcla; sendBuffer[1] = bins; sendBuffer[2] = bp1; sendBuffer[3] = bp2; sendBuffer[4] = len; sendBuffer[5] = 0x1; // Version sendBuffer[6] = 0x0; // Address MSB sendBuffer[7] = currentBlock; if(keyradioButton->Checked==true) // Address LSB sendBuffer[8] = 0x60; // Key Type A else if(keynumberradioButton->Checked ==true) sendBuffer[8] = 0x61; // Key Type B sendBuffer[9] = keynumber; //

Mifare authentication

南楼画角 提交于 2019-12-01 07:06:06
问题 Say I want to authenticate to Mifare Classic. How do I know the exact kind of APDU to send to the card? Example. This code: bcla = 0xFF; bins = 0x86; bp1 = 0x0; bp2 = 0x0; // currentBlock len = 0x5; sendBuffer[0] = bcla; sendBuffer[1] = bins; sendBuffer[2] = bp1; sendBuffer[3] = bp2; sendBuffer[4] = len; sendBuffer[5] = 0x1; // Version sendBuffer[6] = 0x0; // Address MSB sendBuffer[7] = currentBlock; if(keyradioButton->Checked==true) // Address LSB sendBuffer[8] = 0x60; // Key Type A else if

desfire command set detail [closed]

人走茶凉 提交于 2019-11-30 15:23:50
I have experience in java cards, but new in programming host application for Desfire, How or Where can I find command set description of Desfire? (I do not need general information like what NXP has mentioned in It's "Product short data sheet"s), I need the commands Instruction code and parameter details and responses (Like APDU or something). thanks. I am having exact same trouble as you. The closest thing to documentation of the commands is a blog post that shows a couple of examples of what the desfire communication looks like. http://ridrix.wordpress.com/2009/09/19/mifare-desfire

Recover sector in Mifare Classic 1k with overwritten permission bits

让人想犯罪 __ 提交于 2019-11-30 14:55:18
I have mistakenly overwritten sector 1 block 7 of one of my Mifare classic 1k tags. It was meant for testing and the 16 byte data that I wrote on block 7 is shown below: 0xaa 0xaa 0xaa 0xaa 0xbb 0xbb 0xbb 0xbb 0xcc 0xcc 0xcc 0xcc 0xdd 0xdd 0xdd 0xdd If not mistaken, by doing so, my access keys and permission bits have become as following: Key-A: 0xaa 0xaa 0xaa 0xaa 0xbb 0xbb Key-B: 0xcc 0xcc 0xdd 0xdd 0xdd 0xdd Permisssion Bits: --> 0xbb 0xbb 0xcc I have tried to use Key-A and Key-B as shown above to read/write block 7 in sector 1 . But I am no longer able to access (no read or write) any

Mifare 1K authentication keys

大城市里の小女人 提交于 2019-11-30 14:12:52
问题 I have a MIFARE 1K tag. Some blocks can be written/read using authentication key A, while other block can be written using authentication key B. Why? How can I change all blocks to be written/read, for example, with key A? For example, I can write the key block 07 using key A, and I can also change the key A for this key block, but I can't write on it using key B, and I can't change the key B for this key block. Why should I write/read using key A instead of key B? What's the difference? 回答1:

How mature is the Android NFC ISODep support?

半腔热情 提交于 2019-11-30 13:25:56
问题 I understand that this is a "discussion" topic that has no definite answer, but I would really like some feedback on what to expect when developing NFC APPs for Android, in particular using IsoDep to communicate with DESFire cards using APDU frames. Can I expect that the same APDU frames sent to a particular DESFire card responds identically across Android Devices and versions? What Android versions and devices should I test on as a minimum to be reasonably well covered? Is it common with