No specials at this time
500 quantities | 200 quantities | 100 quantities | 50 quantities | 10 quantities |
---|---|---|---|---|
-2,49 € | -2,07 € | -1,23 € | -0,51 € | -0,15 € |
MIFARE 1K is a contactless card according to ISO / IEC 14443 Type A
The MIFARE 1K MIFARE 1KByte IC S50 is used in applications such as public transport ticketing and can also be used for other applications. An intelligent system of anti- collision function allows to operate more than one card in the field simultaneously. The algorithm collision selects each card individually and ensures that the execution of a transaction with a selected card is performed correctly without interference from another card in the field. 1KByte IC MIFARE S50 is designed for easy integration and ease of use that allows complete ticketing transactions to be processed in less than 100 ms.
security:
• programmed one byte non -Unique IDentifier ( NUID ) for each device
• Mutual authentication pass three (ISO / IEC DIS 9798-2 )
• Individual set of two keys per sector to support multi-application with key hierarchy
Features and benefits:
contactless - transmission of data and power supply
- Working distance 100 mm depending on the geometry of the antenna configuration and the drive
- Operating Frequency 13.56 MHz data transfer of 106 kbit / s
- The integrity of data in 16-bit CRC , parity , bit coding , bit counting
-anti- collision
typical time of ticketing transactions of less than 100 ms ( including backup management )
EEPROM :
-1 Kb, organized in 32 sectors with 4 blocks and 8 sectors of 16 blocks (one block consists of 16 bytes)
customizable user - access conditions for each memory block
time data retention of 10 years and write endurance of 100,000 cycles
applications:
- Public transportation management access
Badge electronic tolling , parking
school and campus card cards employees
cafes , Internet, loyalty cards
Description :
MIFARE chip 1KByte S50 consists of a 1K EEPROM , RF interface and the digital control unit . The energy and data are transferred through an antenna composed of a coil with a few turns , which is directly connected to the IC MIFARE 1KByte S50 . No additional external components are necessary. Refer to the latest announcement document. 1 for more details on antenna design.
• RF interface :
- Modulator / demodulator
- Rectifier
- Clock regenerator
- Power -On Reset ( POR)
Voltage regulator :
• Anti- collision : several cards on the field can be selected and managed in order
• Authentication: Preceding any memory operation the authentication procedure ensures that access to a block is only possible via the two buttons shown for each block
• Control and arithmetic logic unit : The values are stored in a special redundant format and can be incremented and decremented.
• EEPROM Interface
• Crypto unit : The number CRYPTO1 flows 1KByte IC MIFARE S50 is used for authentication and encryption of data exchange.
• EEPROM : 1 KB is organized in 32 sectors with 4 blocks and 8 sectors with 16 blocks each. A block contains 16 bytes. The last block of each sector is called "trailer" , which contains two secret keys and programmable access conditions for each block in this sector. The commands are initiated by the reader and controlled by the digital control unit of the IC MIFARE 1KByte S50 . The command response is a function of the state of the integrated circuit and memory operations also valid on conditions for access to the corresponding sector. After Power- On Reset (POR ) card responds to a request or REQA Wake WUPA command with the response code to the application (see section 9.4 ATQA according to ISO / IEC 14443A ) . In the collision of the loop identifier of a card is read . If there are several cards in the field of the reader , they can be distinguished by their ID and can be selected ( select card) for further transactions. Unselected return to the idle state and wait for a new order request cards.
Note: The identifier extracted from the map is not defined as unique.
With the selection control card reader chooses an individual card for authentication operations and memory related . The card returns Recognize Select ( SAK ) code that determines the type of the selected card . After selecting a card reader indicates the memory location of the memory access and uses the following key corresponding to the authentication procedure to three passages . After a successful authentication all memory operations are encrypted.
Memory operations
After authenticating one of the following operations can be performed:
• Block Play
• Write the block
• Decrement : Decrements the contents of a block and stores the result in an internal data register
• Increment : Increments the contents of a block and stores the result in an internal data register
• Restore : Moves the contents of a block in a register internal data
• Forward: to write the contents of the temporary internal data register value to a block of data integrity
Following mechanisms are implemented in the contactless communication link between card reader and ensure very reliable data transmission :
• 16-bit CRC block
• Parity bits for each byte Number of Bits • check
• binary coding to distinguish between " 1", " 0" and " no information "
• Monitoring Channel ( protocol sequence and bit stream analysis ) Three pass authentication sequence
1 . The reader specifies the sector to access and chooses key A or B.
2 . The card reads the secret code and the conditions of access sector trailer. Then, the card sends a random challenge to the reader (first pass ) number .
3 . The reader calculates the response using the secret key and the additional input . The response , with random ID from the reader , then transmitted to the card ( two ) .
4 . The card reader verifies the response by comparing it with its own challenge and then calculates the response to the challenge and transmits ( package of three) .
5 . The reader checks the response from the card by comparing it to its own challenge . After transmitting the first random challenge the communication between the card and reader is encrypted .
The RF interface :
The RF- interface conforms to the standard for contactless cards ISO / IEC 14443 A. For operation, the field of the reader holder must always be present ( with short breaks in transmission ) , as used for feeding the card. For two-way data transmission there is only one start bit at the beginning of each frame . Each byte is transmitted with a parity bit ( odd parity ) at the end . The LSB of the byte the lowest address of the selected block is transmitted first. The maximum frame length is 163 bits ( 16 bytes + 2 bytes of data CRC = 16 9 + 2 9 + 1 start bit ) .
Memory Organization :
8-bit EEPROM 4096 is organized in 32 sectors of 4 blocks of 8 and 16 blocks sectors. A block contains 16 bytes.
Manufacturer block :
This is the first data block ( block 0 ) of the first sector ( sector 0) . It contains data from the manufacturer of integrated circuits. This block is programmed and write protected in the production test .
Data blocks :
The first 32 sectors contain 3 blocks of 16 bytes for storing data ( sector 0 contains only two data blocks and the read-only manufacturer block ) . The last 8 sectors contain 15 blocks of 16 bytes to store data . Data blocks can be configured by the access bits as: • read / write blocks • value blocks
Value blocks can be used for eg electronic purse applications, where additional commands like increment and decrement for direct control of the stored value are provided. Successful authentication must be performed to allow a memory operation . Note: The default content data blocks during childbirth is not defined.
Blocks values
The value blocks allow to perform electronic purse functions ( valid commands : read, write, increment, decrement , restore, transfer). Value blocks have a fixed data format which allows the detection and the error and correction of a backup management.
Block value can be generated by a write in block format operation values :
• Value: Signifies a signed 4-byte value . The low byte of the lowest value is stored in the lowest byte address. Negative values are stored in a standard 2 's complement format . For reasons of data integrity and security , a value is stored three times, twice non -inverted and inverted once .
• Adr: Specifies a 1- byte address , which can be used to record the address of a storage unit , the implementation of a powerful backup management . The address byte is stored four times , two times and non-inverted inverted . In increment , decrement , restore and transfer operations the address remains unchanged. It can not be changed via a write command .
Follow us