HID Global Corporation 5553 사용자 설명서

다운로드
페이지 144
 
HF Multi ISO RFID Reader User Manual, Firmware V1.4 
 
1508-USM-00-0-04 
 
The Application can and should provide more barriers: 
 
Sector access conditions. It is possible to assign access conditions in a way that only 
decrementing of values is allowed with the keys used in the field. So even a 
manipulated field station cannot be used to increment the value on the cards. As a 
general rule, key A is used as a field key, allowing only to read and decrement values, 
and key B is used to format the card or increment values. 
 
Diversified keys. To make life even harder for attackers, keys can be modified using 
the serial number and memory content of the card. So each card uses different keys 
and a listening attack on the reader interface would be hopeless.  
 
Limiting cash volume stored on a card 
 
Do not use the transport keys (keys programmed at the time of delivery) for ticketing 
applications! 
 
Ciphered and scrambled data storage 
 Sabotage 
alarm 
 
Even higher security with contact less controller cards like DESFire, MIFARE ProX, 
MIFARE Smart MX etc. 
Q. 
How do I use a MIFARE card? 
This example demonstrates the detection of a card in the antenna field with continuous 
read and the reading of a page. 
Command 
Answer 
Activate continuous read mode 
 
B2197B58 
a card responds with its serial number 
. S 
abort continuous read mode 
S B2197B58 
select card 
l01AAFFFFFFFFFFFF L 
login into sector 1 with key FFFFFFFFFFFFh key type A 
rb04 00112233445566778899AABBCCDDEEFF 
read block 04 
Activate continuous read mode to detect a new card 
 
August 2010 
 
Page 107 of 144 
© 2005-2010 HID Global Corporation.  All rights reserved.