Basic Program Flow For Felica Applications; Table 8: Mifare Ultralight C Memory Map - ACS ACR122L User Manual

Serial nfc reader with lcd
Table of Contents

Advertisement

Byte Number
Authentication
configuration
Authentication
configuration
Authentication
key
Authentication
key
Authentication
key
Authentication
key
Total Page Size: 792 bits of 198 Bytes.

6.19. Basic program flow for FeliCa applications

Step 0. Start the application. The first thing is to activate the "SAM Interface". The ATR of the SAM (if
a SAM is inserted) or a Pseudo-ATR "3B 00" (if no SAM is inserted) will be returned. In other
words, the SAM always exists from the view of the application.
Step 1. The second thing to do is to change the operating parameters of the PN531. Set the Retry
Time to one.
Step 2. Poll a FeliCa Tag by sending "Direct Transmit" and "Get Response" APDUs (Tag Polling).
Step 3. If no tag is found, go back to Step 2 until a FeliCa Tag is found.
Step 4. Access the FeliCa Tag by sending APDUs (Tag Read or Write)
Step 5. If there is no any operation with the FeliCa Tag, then go back to Step 2 to poll the other
FeliCa Tag.
..
Step N. Deactivate the "SAM Interface". Shut down the application.
Notes:
1. The default Retry Time of the Tag command "InListPassiveTarget" is infinity. Send the APDU "FF
00 00 00 06 D4 32 05 00 00 00" to change the Retry Time to one.
2. It is recommended to turn off the Antenna if there is no contactless access.
APDU for turning on the Antenna Power = APDU "FF 00 00 00 04 D4 32 01 03"
APDU for turning off the Antenna Power = APDU "FF 00 00 00 04 D4 32 01 02"
ACR122L – Communication Protocol
Version 1.03
0
1
Authentication
Authentication
configuration
configuration
Authentication
Authentication
configuration
configuration
Authentication
Authentication
key
key
Authentication
Authentication
key
key
Authentication
Authentication
key
key
Authentication
Authentication
key
key

Table 8: Mifare Ultralight C Memory Map

2
3
Authentication
Authentication
configuration
configuration
Authentication
Authentication
configuration
configuration
Authentication
Authentication
key
key
Authentication
Authentication
key
key
Authentication
Authentication
key
key
Authentication
Authentication
key
key
Page
42
43
44
45
46
47
Page 53 of 57
info@acs.com.hk
www.acs.com.hk

Advertisement

Table of Contents
loading

Table of Contents