图书介绍
rfidmifare and contactless smartcards in application=射频识别:应用中的mifare和非接触式智能卡 影印版2025|PDF|Epub|mobi|kindle电子书版本百度云盘下载

- 著
- 出版社:
- ISBN:
- 出版时间:未知
- 标注页数:0页
- 文件大小:60MB
- 文件页数:499页
- 主题词:
PDF下载
下载说明
rfidmifare and contactless smartcards in application=射频识别:应用中的mifare和非接触式智能卡 影印版PDF格式电子书版下载
下载的文件为RAR压缩包。需要使用解压软件进行解压得到PDF格式图书。建议使用BT下载工具Free Download Manager进行下载,简称FDM(免费,没有广告,支持多平台)。本站资源全部打包为BT种子。所以需要使用专业的BT下载软件进行下载。如BitComet qBittorrent uTorrent等BT下载工具。迅雷目前由于本站不是热门资源。不推荐使用!后期资源热门了。安装了迅雷也可以迅雷进行下载!
(文件页数 要大于 标注页数,上中下等多册电子书除外)
注意:本站所有压缩包均有解压码: 点击下载压缩包解压工具
图书目录
Preface13
1 RFID Fundamentals17
1.1 Introduction to RFID17
1.1.1 RF17
1.1.2 ID18
1.1.3 RFID system classification19
1.1.3.1 Frequencies and transmission principles19
1.1.3.2 Applications20
1.2 RFID system components22
1.2.1 Card(PICC)22
1.2.2 Reader(PCD)23
1.3 ISO/IEC 14443 application example24
1.3.1 Public transport ticketing24
1.3.2 Employee identification cards25
1.3.3 Electronic passports and identity cards26
1.3.4 Other applications27
1.4 Physical fundamentals27
1.4.1 Energy transmission27
1.4.2 Data transmission from PCD to PICC29
1.4.2.1 Amplitude modulation29
1.4.2.2 Standard data rate(106 Kb/s)29
1.4.2.3 Higher data rates(up to 848 Kb/s)31
1.4.3 Data transmission from PICC to PCD32
1.4.3.1 Load modulation33
1.4.3.2 Subcarrier modulation:Manchester encoding using ASK33
1.4.3.3 Subcarrier modulation:NRZ encoding with BPSK34
2 Overview of the Relevant Standards35
2.1 ISO/IEC1444335
2.1.1 Part 1:physical properties36
2.1.2 Part 2:RF properties and signals37
2.1.3 Part 3:Card selection and activation38
2.1.3.1 Type A:UIDs38
2.1.3.2 Type A:card activation40
2.1.3.3 Type A:SAK encoding42
2.1.3.4 Type A:collision-detection and conflict resolution44
2.1.3.5 Type B card activation46
2.1.3.6 Type B:Card activation parameters48
2.1.4 Part 4:communication protocol49
2.1.4.1 Protocol activation49
2.1.4.2 T=CL protocol block structure56
2.1.5 Information Block (I Block)56
2.1.5.1 Receive-ready Blocks (R Blocks)58
2.1.5.2 Supervisory Blocks (S Blocks)59
2.1.6 Electromagnetic disturbance (EMD)61
2.1.6.1 Rest period62
2.1.6.2 Rest level63
2.1.6.3 Distinction between invalid card response and EMD63
2.1.6.4 The MFRC522 reader IC and EMD63
2.2 ISO/IEC 10373-6 test methods64
2.2.1 Test equipment65
2.2.1.1 Calibration coil65
2.2.1.2 Test PCD assembly65
2.2.1.3 ReferencePICC66
2.2.2 Tuning and calibration68
2.2.2.1 Tuning68
2.2.2.2 Calibration68
2.2.3 Measurements at the reader69
2.2.3.1 Range measurement69
2.2.3.2 Measurement effort69
2.2.4 Tests for Layer 3 and 470
2.3 Near Field Communication (NFC)70
2.3.1 Introduction70
2.3.2 NFC air interface71
2.3.2.1 NFC device as card71
2.3.2.2 NFC device as a reader71
2.3.2.3 NFC device inactive’mode72
3 RFID Antenna Design73
3.1 Theoretical Fundamentals73
3.1.1 Antenna as Resonant Circuit73
3.1.2 Transformer Model77
3.1.3 The Biot-Savart Law79
3.1.4 Optimal Antenna Size80
3.2 Reader Antennas83
3.2.1 Antenna Quality83
3.2.1.1 Data Transmission Bandwidth83
3.2.1.2 Stability Against Detuning86
3.2.2 Electrically Conductive Surfaces in the Vicinity of the Antenna89
3.2.2.1 Ferrites90
3.2.3 Balanced and Unbalanced Antennas92
3.2.3.1 Balanced Antenna93
3.2.3.2 Unbalanced Antenna96
3.3 Card Antennas98
3.3.1 Standard Cards(ID-1)98
3.3.2 Tokens with Smaller Inlays(Smaller than ID-1)100
3.4 Impedance Measurements with the miniVNA101
3.4.1 miniVNA User Software102
3.4.2 Disadvantages and Limitations of the miniVNA102
3.4.2.1 Lack of Sign for Imaginary Numbers102
3.4.2.2 Lack of Calibration and Compensation102
3.4.3 How Do I Find the Correct Compensation?103
3.4.4 Coil Inductance Measurement105
4 Security and Cryptography109
4.1 Protection Objectives109
4.1.1 Keeping Data Secure109
4.1.2 Data Integrity111
4.1.3 Privacy Protection112
4.2 Attacks on Smartcards112
4.2.1 Logical Attacks112
4.2.1.1 Unauthorized Reading of Data112
4.2.1.2 Unauthorized Manipulation of Data113
4.2.1.3 Replay’Attack114
4.2.1.4 ‘Relay’Attack114
4.2.1.5 ‘Man-in-the-Middle’Attack116
4.2.1.6 Denial-of-Service Attack116
4.2.2 Physical Attacks116
4.2.2.1 Side Channel Attacks and Power Analysis116
4.2.2.2 Reverse Engineering118
4.2.2.3 Light and Laser Attacks119
4.2.2.4 Temperature and Frequency120
4.2.3 Combined Attacks120
4.3 Cryptography120
4.3.1 Asymmetric Cryptography120
4.3.2 Symmetric Cryptography122
4.3.3 Block and Stream Cipher123
4.3.4 Encryption Standards:DES and AES124
4.3.5 DES Cascading125
4.3.6 Operation mode127
4.3.6.1 Electronic Code Book(ECB)127
4.3.6.2 Cipher Block Chaining(CBC)127
4.4 Application of Cryptography129
4.4.1 Mutual Authentication129
4.4.2 Data Encryption131
4.4.3 Message Authentication Code(MAC)131
4.4.4 Key Management132
4.4.4.1 Dynamic Keys132
4.4.4.2 Key Diversification132
4.4.5 Secure Application Module(SAM)135
4.4.6 Security Assessment135
5 Introduction to Cards and Tags137
5.1 Overview137
5.1.1 Memory Cards and Microcontroller Cards137
5.1.2 Advantages and Disadvantages of Contactless Cards138
5.1.2.1 Robustness138
5.1.2.2 Longevity138
5.1.2.3 Usability138
5.1.2.4 Infrastructure138
5.1.2.5 Contact Between Card and Reader139
5.1.3 Dual-Interface Cards139
5.2 MIFARE139
5.2.1 MIFARE Overview139
5.2.1.1 Success Story140
5.2.1.2 MIFARE Clone140
5.2.1.3 MIFARE Hack140
5.2.1.4 MIFARE Product Overview140
5.2.2 MIFARE Ultralight141
5.2.2.1 Instruction Set142
5.2.2.2 Memory Organization144
5.2.2.3 Security Functions144
5.2.3 MIFARE Ultralight C145
5.2.3.1 Instruction Set146
5.2.3.2 Memory Organization147
5.2.3.3 Security Functions147
5.2.4 MIFARE Classic148
5.2.4.1 Instruction Set150
5.2.4.2 Memory Organization151
5.2.4.3 Security Functions152
5.2.5 MIFARE Plus152
5.2.5.1 Memory Organization152
5.2.5.2 MIFARE Plus S and MIFARE Plus X152
5.2.5.3 Security Levels153
5.2.6 MIFARE DESFire (EV1)156
5.2.6.1 Memory Organization156
5.2.6.2 File Types157
5.2.6.3 Data File157
6 Reader Antenna Design159
6.1 MF RC522 Reader Module159
6.1.1 Digital Interfaces160
6.1.1.1 UART160
6.1.1.2 SPI160
6.1.1.3 I2C160
6.1.2 Oscillator161
6.1.3 Analog Interfaces161
6.1.3.1 Transmitter Outputs161
6.1.3.2 Receive Input165
6.1.4 Test Signals169
6.1.4.1 MFOUT170
6.1.4.2 AUX1 and AUX2171
6.1.5 Miscellaneous173
6.1.5.1 Power Supply and GND173
6.1.5.2 Tolerances173
6.2 Antenna Design173
6.2.1 Coil Design174
6.2.1.1 Measuring the Coil Parameters175
6.2.1.2 Determine the Q Factor and the Series Resistance176
6.2.2 Matching:Calculating the Initial Values176
6.2.2.1 Parallel Equivalent Circuit176
6.2.2.2 Partitioning and Simplifying the Circuit Diagram177
6.2.2.3 Low-Pass Filter177
6.2.2.4 Matching Network178
6.2.3 Matching:Simulation and Measurement179
6.2.4 Measurements on the Transmitted Pulse181
6.2.5 Measurement and Adjustment of the Receive Path183
6.2.6 Eliminating Interference183
6.2.7 Range Checking185
7 The ElektorRFID Reader187
7.1 Introduction187
7.2 Reader Hardware190
7.2.1 Power Supply192
7.2.2 The P89LPC936 Microcontroller193
7.2.3 The MF RC522 Reader IC194
7.2.4 The FT232R USB/RS-232 Converter197
7.2.4.1 Configuring the FT232R199
7.2.4.2 USB Driver Modification201
7.3 Construction and Operation202
7.3.1 Installing the USB Driver202
7.3.2 Reader Firmware Update203
7.3.3 Firmware Version Control205
7.4 Reader Modes205
7.4.1 Terminal Mode205
7.4.2 PC Reader Mode207
7.4.2.1 Activating the PC Reader Mode207
7.5 The Firmware208
7.5.1 The Software Architecture208
7.5.2 The Main Program208
7.5.3 The PC_ReaderMode() Function210
7.5.3.1 The RS-232 Communication Protocol210
7.6 The PC Development Tools212
7.6.1 Elektor RFID Reader Programming in.NET212
7.6.2 Smart Card Magic.NET214
7.6.2.1 It’s Usable without Programming214
7.6.2.2 A Scripting Tool or a C# Compiler?215
7.6.2.3 Our First Program:“Hello World ”216
7.6.2.4 Compiling and Running219
7.6.2.5 User Input from the Console Window220
7.6.2.6 Are There Really No Breakpoints?222
7.6.3 Visual C# 2012 Express Edition223
7.6.3.1 Creating a Simple Console Application223
7.6.3.2 Integrating the Elektor RFID Reader Library225
8 Cards and Tags in Application227
8.1 ISO/IEC 14443 Type A Card Activation228
8.1.1 Card Types from the Perspective of Card Activation228
8.1.2 The Activation Sequence230
8.1.2.1 The Request and Wake-Up Commands230
8.1.2.2 The Anti-collision and Select Commands233
8.1.2.3 The HALT Command234
8.1.3 Elektor RFID Reader Library:Card Activation236
8.1.4 Program Examples241
8.1.4.1 Card Activation241
8.1.4.2 Reader Selection243
8.1.4.3 Polling for Cards244
8.1.4.4 Simplified Card Activation247
8.1.4.5 Testing the Reading Range249
8.1.4.6 Listing All Cards in the Reader’s Field250
8.2 MIFARE Card-Type Detection254
8.2.1 Program Example255
8.3 The MIFARE Ultralight Card258
8.3.1 Memory Organization258
8.3.3 Function of the One-Time-Programmable (OTP) Bytes261
8.3.3.1 Lock Bits Functionality262
8.3.4 Elektor RFID Reader Library:MIFARE Ultralight263
8.3.5 Program Examples264
8.3.5.1 Writing and Erasing Data264
8.3.5.2 Reading the Entire Memory Contents265
8.3.5.3 Reading and Writing Strings267
8.3.5.4 A Simple Ticket Application268
8.3.5.5 Cloning the Memory Content271
8.3.5.6 Secure Data Storage273
8.4 The MIFARE Classic Card281
8.4.1 MIFARE Classic 1K Card Memory Organization281
8.4.2 MIFARE Classic 4K Card Memory Organization281
8.4.3 MIFARE Mini Card Memory Organization282
8.4.4 Instruction Set282
8.4.5 The MIFARE Value Format286
8.4.6 Decrement,Increment,Restore and Transfer289
8.4.7 Changing the Keys and Access Condition290
8.4.8 Elektor RFID Reader Library:MIFARE Classic294
8.4.8.1 The MifareClassicUtil Class294
8.4.8.2 The IMifareClassic Interface297
8.4.9 Program and Case Studies300
8.4.9.1 Writing and Erasing Data300
8.4.9.2 Reading the Entire Memory Contents301
8.4.9.3 Optimizing the Read and Write Speeds303
8.4.9.4 Optimized Reading of the Entire Memory Contents307
8.4.9.5 The Problem of Data Corruption310
8.4.9.6 The MIFARE Value Format Methods314
8.4.9.7 Electronic Purse with Backup Management316
8.5 The MIFARE Ultralight C Card322
8.5.1 Memory Organization322
8.5.2 Instruction Set324
8.5.3 Triple-DES Authentication324
8.5.4 Elektor RFID Reader Library:MIFARE Ultralight C327
8.5.5 Programming Examples327
8.5.5.1 The MIFARE Ultralight C Authentication Sequence327
8.5.5.2 MIFARE Ultralight C Card Personalization333
8.6 The T=CL Transmission Protocol337
8.6.1 T=CL Protocol Activation and Deactivation338
8.6.1.1 Multi-Card Activation341
8.6.2 Data Exchange341
8.6.2.1 Smart Card Magic.NET-Exchange Mode342
8.6.2.2 Block Chaining343
8.6.2.3 Waiting Time Extension344
8.6.2.4 Error Detection and Correction344
8.6.3 Elektor RFID Reader Library:T=CL345
8.6.4 Example Programs350
8.6.4.1 T=CL Protocol Activation and Deactivation350
8.6.4.2 Multi-Card Activation352
8.7 The MIFARE DESFire EV1 Card355
8.7.1 MIFARE DESFire EV1 Commands356
8.7.2 DESFire Native Command Structure357
8.7.2.1 Card Command Structure357
8.7.2.2 Card Response Structure357
8.7.2.3 DESFire Block Chaining358
8.7.3 The DESFire File System359
8.7.3.1 File Types359
8.7.3.2 Data File Structure360
8.7.3.3 Directory Names361
8.7.3.4 File Names362
8.7.4 Data Structure362
8.7.5 Elektor RFID Reader Library:MIFARE DESFire EV1362
8.7.6 Example Programs363
8.7.6.1 Creating a DESFire Application363
8.7.6.2 Standard Data File:Reading and Writing Data366
8.8 Application Protocol Data Units (APDUs)368
8.8.1 Command APDU Data Structure368
8.8.1.1 Class Byte(CLA)369
8.8.1.2 Instruction Byte(INS)369
8.8.1.3 Parameter Bytes P1 and P2369
8.8.1.4 Coding of Length Fields Lc and Le369
8.8.2 Response APDU Data Structure371
8.8.3 Examples of ISO/IEC 7816-Compatible APDUs372
8.8.3.1 The SELECT Command372
8.8.3.2 The READ BINARY Command373
8.8.3.3 The Update Binary Command375
8.8.4 Elektor RFID Reader Library:APDU376
8.8.5 Accessing an ISO/IEC 7816 File System378
8.8.5.1 Example Program380
9 Elektor RFID Projects385
9.1 Programming the MF RC522 Reader IC385
9.1.1 Elektor RFID Reader Library:MF RC522386
9.1.2 Program Examples386
9.1.2.1 Changing the RF Parameter Configuration386
9.1.2.2 MF RC522 SFR Programming — Card Activation387
9.2 RFID Access Control Systems396
9.2.1 Online Systems396
9.2.2 Offline Systems396
9.2.3 Elektor RFID Reader as Access Control System396
9.2.3.1 Functional Description397
9.2.3.2 Access Control Manager398
9.2.3.3 Microcontroller Firmware399
9.2.3.4 Reading and Deleting from the P89LPC936 EEPROM404
9.3 An Electronic ID Card406
9.3.1 Personalization406
9.3.2 Reading the ID Card Data407
9.4 Launching a Windows Application408
10 Smart Card Reader API Standards411
10.1 Introduction411
10.2 Card Terminal API(CT-API)412
10.3 Open Card Framework(OCF)412
10.4 Personal Computer/Smartcard(PC/SC)413
10.4.1 The PC/SC Architecture413
10.4.1.1 Integrated Circuit Card(ICC)414
10.4.1.2 Interface Device(IFD)414
10.4.1.3 Interface Device Handler(IFD Handler)414
10.4.1.4 ICC Resource Manager(RM)415
10.4.1.5 Service Provider416
10.4.1.6 ICC-Aware Applications417
11 PC/SC Readers419
11.1 Contactless Cards419
11.1.1 Contactless Microcontroller Smartcards419
11.1.2 Contactless Memory Cards419
11.1.2.1 PC/SC-Compliant APDUs420
11.1.3 Answer To Reset (ATR)422
11.1.3.1 Contact-type Card Activation Sequence422
11.1.3.2 ATR Structure of a Contact-Type Smartcard424
11.1.3.3 Contactless Smartcard Pseudo-ATR Structure425
11.2 The Microsoft WinSCard API427
11.2.1 WinSCard API Programming428
11.2.1.1 Programming the WinSCard API in C430
11.3 Java and PC/SC438
11.3.1 JPC/SC Java API438
11.3.2 Java Smartcard I/O API440
11.4 The CSharpPCSC Wrapper for.NET441
11.4.1 How Does One Create an API Wrapper?441
11.4.2 The WinsCard Class442
11.4.3 The PCSCReader Class445
11.4.4 Program Examples447
11.4.4.1 “Hello Contactless Card”447
11.4.4.2 Determine All Installed PC/SC Drivers449
11.4.4.3 Getting the Reader and Card Properties451
11.4.4.4 Testing the Reading Range452
11.4.4.5 Determining the Type of Contactless Memory Card455
11.4.4.6 MIFARE Classic 1K/4K and MIFARE Ultralight456
11.4.4.7 MIFARE DESFire EV1459
12 List of Abbreviations465
13 Bibliography469
14 Index471
热门推荐
- 753636.html
- 2703140.html
- 3351031.html
- 751522.html
- 2548113.html
- 3135914.html
- 153792.html
- 1774455.html
- 3473524.html
- 297587.html
- http://www.ickdjs.cc/book_3764423.html
- http://www.ickdjs.cc/book_1755348.html
- http://www.ickdjs.cc/book_52421.html
- http://www.ickdjs.cc/book_207817.html
- http://www.ickdjs.cc/book_2705320.html
- http://www.ickdjs.cc/book_1003273.html
- http://www.ickdjs.cc/book_3699619.html
- http://www.ickdjs.cc/book_987245.html
- http://www.ickdjs.cc/book_2178522.html
- http://www.ickdjs.cc/book_1077012.html