HID Global Corporation 5553 Manual De Usuario
1508-USM-00-0-04
HF Multi ISO RFID Reader User Manual, Firmware V1.4
Two-Pass Authentication Flow Diagram
Host
Reader
1. Start Authentication Step 1
StartAuth
2. Generate Random number RndRdr
RndRdr
3. Reply Random number
4. Generate Random number RndH
5. Calculate the MAC of the key management
MacH = Enc(RndRdr)
MacH = Enc(RndRdr)
6. Transmit Random number and MAC:
RndKm,MacH
RndKm,MacH
RndKm,MacH
7. Check the received MacH
RndRdr = Dec(MacH)
RndRdr = Dec(MacH)
8. Calculate the MAC of the reader
MacRdr = Enc(RndH)
MacRdr = Enc(RndH)
MacRdr
9. Reply MAC
10. Check the received MacRdr
RndH = Dec(MacRdr)?
RndH = Dec(MacRdr)?
2.3.3.2
Get Key Access Rights
Command
Command
Data
'ia'
Key type (1 byte); Key index (1 byte)
Answer
Answer
Description
Data
Access rights (2 bytes). Higher Byte is send first
Page 78 of 144
August 2010
© 2005-2010 HID Global Corporation. All rights reserved.