The “GUI-L” keystroke sequence (the windows key + ‘L’), cause the PC to go into a locked state.
This sequence is done first to prevent someone from trying to send your username and password
sequence of keystrokes into another application, such as MS Word (for viewing and stealing). If the
user is already in a logged off or locked stated, these keystrokes are simply discarded. If your PC is
logged-on, the first thing that happens is to lock the machine – eliminating viewing possibilities.
The keystroke sequence, “Alt-U”, places the cursor into the username field at logon. The “Alt-U” is a
‘Special Keystroke’ that is inserted using unique key codes as defined by the USB keyboard
specification.
Note
: To insert the correct key codes for special keystrokes, use the ‘Add Special Keystrokes’ section. It is
possible to put keystrokes and user data into any of the Credential and keystrokes fields.
Commands
Description
Pre-Keystrokes
This field holds the keystrokes that are to be sent prior to the
user’s ‘Credential 1’. In the context of a typical log-on application,
‘Credential 1’ is commonly known as the Username. The
‘Pre-Keystrokes’ would be the sequence of keystrokes required
to bring up the log-on dialog box. This sequence of keystrokes
can be different for each application and operating system.
For example Windows 2000 is Ctrl-Alt-Del, while the home
edition of Windows XP uses the keystroke sequence Alt-U (to
position the cursor into the Username field).
Credential 1
For a log-on application, this field is commonly known as the
Username.
Post Keystrokes
This field holds the keystrokes that are to be sent after the user’s
‘Credential 1’ is delivered. In the context of a typical log-on
application, the cursor must be positioned into the password
field by using a TAB keystroke.
Credential 2
For a log-on application, this field is commonly known as the
Password.
Advanced Location
Location for Data on iCLASS Card: Page - Appl Area - Block
Depending on the contactless part number, your card will have a different number of pages and size
(see Memory Map section). This area is automatically entered for you, however if you need to modify
and place the data into different locations, you may modify these values. Be cautious not to overwrite
blocks of data when modifying these values. As you add or remove keystrokes the starting block
location for each Credential may change if a boundary is reached.
Location for Data on MIFARE Card: Sector
For MIFARE cards, each of the Credentials is allocated a complete Sector. A Sector consists of 3
blocks of 16 bytes – for a total of 48 bytes. We do not allow for writing in Sector ‘0’ or the to the last
Sector located on the card. Each keystroke requires 2 bytes, and each block holds up to 8 bytes – 4
keystrokes. Each Credential or Card Gone field requires a 2 byte termination character.
To test a card, simply reconfigure the Playback reader and test the card.
17
Chapter 3
Software