background image

The “GUI-L” keystroke sequence (the windows key + ‘L’), cause the PC to go into a locked state. 
This sequence is done first to prevent someone from trying to send your username and password 
sequence of keystrokes into another application, such as MS Word (for viewing and stealing). If the 
user is already in a logged off or locked stated, these keystrokes are simply discarded. If your PC is 
logged-on, the first thing that happens is to lock the machine – eliminating viewing possibilities.

The keystroke sequence, “Alt-U”, places the cursor into the username field at logon. The “Alt-U” is a 
‘Special Keystroke’ that is inserted using unique key codes as defined by the USB keyboard
specification. 

Note

: To insert the correct key codes for special keystrokes, use the ‘Add Special Keystrokes’ section. It is 

possible to put keystrokes and user data into any of the Credential and keystrokes fields.

Commands 

Description

Pre-Keystrokes

This field holds the keystrokes that are to be sent prior to the 
user’s ‘Credential 1’. In the context of a typical log-on application, 
‘Credential 1’ is commonly known as the Username. The 
‘Pre-Keystrokes’ would be the sequence of keystrokes required 
to bring up the log-on dialog box. This sequence of keystrokes 
can be different for each application and operating system. 
For example Windows 2000 is Ctrl-Alt-Del, while the home 
edition of Windows XP uses the keystroke sequence Alt-U (to 
position the cursor into the Username field).

Credential 1

For a log-on application, this field is commonly known as the 
Username.

Post Keystrokes

This field holds the keystrokes that are to be sent after the user’s 
‘Credential 1’ is delivered. In the context of a typical log-on 
application, the cursor must be positioned into the password 
field by using a TAB keystroke.

Credential 2

For a log-on application, this field is commonly known as the 
Password.

Advanced Location

Location for Data on iCLASS Card: Page - Appl Area - Block
Depending on the contactless part number, your card will have a different number of pages and size 
(see Memory Map section). This area is automatically entered for you, however if you need to modify 
and place the data into different locations, you may modify these values. Be cautious not to overwrite 
blocks of data when modifying these values. As you add or remove keystrokes the starting block 
location for each Credential may change if a boundary is reached.

Location for Data on MIFARE Card: Sector
For MIFARE cards, each of the Credentials is allocated a complete Sector. A Sector consists of 3 
blocks of 16 bytes – for a total of 48 bytes. We do not allow for writing in Sector ‘0’ or the to the last 
Sector located on the card. Each keystroke requires 2 bytes, and each block holds up to 8 bytes – 4 
keystrokes. Each Credential or Card Gone field requires a 2 byte termination character.

To test a card, simply reconfigure the Playback reader and test the card.

17 

Chapter 3 

 Software

Summary of Contents for pcProx Playback

Page 1: ...pcProx Playback pcProx Writer Configuration Utility User Manual For use with the pcProx Contactless Read Writer Playback Readers iCLASS Models RDR 7080AKx RDR 7085AKx MIFARE Models RDR 7580AKx RDR 75...

Page 2: ...questions or are interested in our OEM and Independent Developer s programs We look forward to your comments and suggestions for our product line Please go to www RFIDeas com and follow the Support a...

Page 3: ...1 Reader Set Up Basics 11 LED Beeper 12 Chapter 3 Software 12 pcProx Card Manager Overview 13 pcProx Card Manager Utility 14 Connect Tab 16 pcProx Writer for Log On Tab 29 pcProx Writer for Swipe Card...

Page 4: ...or computer identification and access Contactless smart cards offer the user endless solutions One of the struggles users have with smart cards is they often have to create specialized software applic...

Page 5: ...ID Card Reader System Output Formats 5 Chapter 1 The Basics...

Page 6: ...uration and length Frequencies RF IDeas access control readers and credentials utilize the low frequency 125 kHz proximity band and or the high frequency 13 56 MHz contactless band Credential Form Fac...

Page 7: ...fields pre keystrokes credential x or post keystrokes as all are saved the same way on the card You cannot overwrite the boundaries of memory as dictated by the card choice The below table illustrate...

Page 8: ...mbers associated to card types Housing This option provides the user to select the form factor housing for the desired reader The housings include desktop wall mount USB dongle PCMCIA bare board Expre...

Page 9: ...9 Chapter 2 Hardware Interface Connectors OUTPUT CONNECTORS T...

Page 10: ...imal number in ASCII characters 2 API defined in the pcProx SDK The device attaches to a computer serial port When it reads card data the active application receives the entire card data Once the conf...

Page 11: ...ctions using Device Manager When the software is installed it should recognize these connections in order to configure the appropriate device Once the device is configured and written to its flash mem...

Page 12: ...configured at the factory pcProx Playback USB The pcProx Playback USB reader installs as a plug n play device and requires no drivers or software to be deployed This is beneficial since there is no n...

Page 13: ...ox Playback reader to retrieve another application credential or identification set from the contactless smart card To do this you can use the Auto Run mode as command line options and shortcuts such...

Page 14: ...the top of the reader If using the RDR 7580AKU MIFARE compatible Writer place either a 1k or 4k MIFARE contactless card on the top of the reader Note It is important to lay the card completely across...

Page 15: ...trouble writing to cards pcProx Playback Device USB or RS 232 Here is where you will describe what type of data is written to the cards USB keystrokes or RS 232 characters If you plan to use the Play...

Page 16: ...select the appropriate RS 232 required characters Create and Write Credentials Access to all user data you write using pcProx Card Manager is secured by writing unique security keys to the card If a...

Page 17: ...Windows XP uses the keystroke sequence Alt U to position the cursor into the Username field Credential 1 For a log on application this field is commonly known as the Username Post Keystrokes This fiel...

Page 18: ...to leave their card on the reader Since the contactless card often carries security information it is dangerous to ask employees to leave a card on the reader since they are likely to forget the card...

Page 19: ...entials that would normally be typed to perform the log on to the operating system or application Note This section makes the assumption that you already have an established username password credenti...

Page 20: ...dentials necessary you are ready to perform a Write Credential operation The default setup for the log on credential allocates room on the card for 16 character usernames passwords as well as a couple...

Page 21: ...the current Credential or Card Gone sequence Stop Delay Discontinues the Continuous Delay prior to the end of the Credential or Card Gone field being reached Other Features Speeding the Playback Outp...

Page 22: ...ey from a standard keyboard and choose the letter L from the pull own box These two selections will together perform the GUI L keystroke i e holding down the GUI key while pressing the L key on the ke...

Page 23: ...Admin To complete the Credential 1 field add the TAB keystroke The TAB keystroke is added to the Post keystrokes field by placing the cursor into this field and pressing the Add Tab button located in...

Page 24: ...tual password This may be useful if the Credential field is not a password but some other non secure information Now add the ENTER keystroke by placing the cursor into the Post Keystroke field and usi...

Page 25: ...s key from a standard keyboard and choose the letter L from the pull own box These two selections will together perform the GUI L keystroke i e holding down the GUI key while pressing the L key on the...

Page 26: ...complete the Credential 1 field add the TAB keystroke The TAB keystroke is added to the Post keystrokes field by placing the cursor into this field and pressing the Add Tab button located in the Add...

Page 27: ...ntial button Card Gone Keystrokes The Card Gone field holds keystrokes to be delivered when the card is removed from the pcProx Playback reader Note This feature should be used with caution since it i...

Page 28: ...tion located on the right hand side of the screen Check the GUI checkbox Next use the pull down box and type L to locate the L keystroke in the pull down box Once you highlight L use the Add Special b...

Page 29: ...tents from a mag stripe or bar code card in another area and other user data in additional areas If you select the Initialize Keys the Card manager will write the secure the location of the card speci...

Page 30: ...er pcProx Playback reader attached USB or RS 232 Most USB ports and adaptors will support the pcProx Writer and pcProx Playback reader attached at the same time For Playback 232 this application autom...

Page 31: ...cProx Writer for Log on Users The three sets of Card Context are used to tell the Playback reader where to find the Credentials 1 and 2 and the Card Gone keystrokes Note The Book field is a future opt...

Page 32: ...with these settings Advanced This button will allow the user to configure more advanced features within the Playback reader Most users will not need to modify these parameters Open Playback This reads...

Page 33: ...system allows the user to have the card of the Playback reader provide the pre and post credential keystrokes and CardGone keystrokes A primary reason to have the Playback reader provide the keystrok...

Page 34: ...the same way as in the Writing Credential section described above Pre Credential 1 This field holds the keystrokes you need to have sent prior to the user s Credential 1 In the context of a typically...

Page 35: ...typical Card Gone keystroke sequence would be to lock a workstation Under Windows XP this is done by holding down Ctrl Alt and pressing Del then pressing K Example B below will show how using the Spe...

Page 36: ...About Tab Here you can review the version and Memory Map of the contactless cards to see how the card layout is done View Memory Map 36 Chapter 3 Software...

Page 37: ...The following shows the memory map for the NXP MIFARE 1k and 4k card 37 Chapter 3 Software...

Page 38: ...ystrokes i e pre and post keystrokes Choices Open Template Save Template uses Default crd Save Template As Credential files These cdd files are created if the Save Credential checkbox is selected The...

Page 39: ...ab Second once the settings are defined the user creates a PLB by using the Save Playback As selection under the File menu system or the Save Playback button located in the pcProx Playback tab Third t...

Page 40: ...perform the writing For example C Program Files RF IDeas Inc RFID1356i pcProxCardman exe JohnSmit CDD would write the JohnSmit CDD file to the card placed on the pcProx Writer Below is a complete desc...

Page 41: ...is an example of the file writing test as credential 1 and 12345678 as credential 2 This is written to Page 1 Application Area 1 blocks 19 and 21 test 12345678 1 1 1 1 1 1 19 21 23 41 Chapter 3 Softw...

Page 42: ...mething you know a PIN The card may be encoded to allow operation under either a one or two factor authentication system One Factor In a one factor system the user simply waves the contactless token T...

Page 43: ...on of the password More difficult passwords can be constructed using password characters created using keypad created keystrokes such as ALT 002 To perform this you must use the numbers from the keypa...

Page 44: ...ard Management Since you can put many applications onto a single card planning and organization will prove to be helpful Below is a more complete view of the actual memory map for of the three offered...

Page 45: ...gle MIFARE card there can be multiple AIDs programmed Sector 0x0 and 0x1 to identify all registered card applications The AID is a unique 16 bit number that is assigned by Philips to the participating...

Page 46: ...Card Organization Forms For BDG 2000 or BDG 2002 page 0 Page Blocks Application Playback File 0 19 0 20 0 21 0 22 0 23 0 24 0 25 0 26 0 27 0 28 0 29 0 30 0 31 46 Chapter 5 Card Management...

Page 47: ...For BDG 2002 page 1 to 7 Page Blocks Application Playback File 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 47 Chapter 5 Card Management...

Page 48: ...lication Playback File 0 6 0 7 0 8 0 9 0 10 0 11 0 12 0 13 0 14 0 15 0 16 0 17 0 18 0 19 0 20 0 21 0 22 0 23 0 24 0 25 0 26 0 27 0 28 0 29 0 30 0 31 0 32 0 33 0 34 0 35 0 36 0 37 0 38 0 39 0 40 0 41 4...

Page 49: ...49 Chapter 5 Card Management Page Blocks Application Playback File 0 42 0 43 0 44 0 45 0 46 0 47 0 48 0 49 0 50 0 0 255...

Page 50: ...50 Chapter 5 Card Management For MIFARE 1k Sector Application Playback File 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15...

Page 51: ...issuing keystrokes to lock or log off the session to the computer Now when you walk away from your system you will benefit from a hands free means of locking your computer 1 7 x 1 7 inches How Does t...

Page 52: ...eir computer Windows 2000 users must hit the CTL ALT DEL key sequence to prepare the computer for the password entry Again with the pcProx Sonar attached it will now send those keystrokes for you Who...

Page 53: ...em is started re attach the reader and the OS should re install the Windows driver automatically Before You Call Technical Support Please make sure you ve identified your reader model and credential t...

Page 54: ...an unlimited number of copies of any documentation provided that such copies shall be used only for personal purposes and are not to be republished or distributed either in hard copy or electronic fo...

Page 55: ...n addition to any rights that you have under the laws of the state in which your business resides or operates Returns RF IDeas products which require Limited Warranty service during the warranty perio...

Page 56: ...ro Key Pad 20 F FAC 7 Find Free Page 18 I iCLASS 7 14 15 17 18 20 22 30 36 44 L LED 11 14 21 30 Lock Locations 21 Log On 16 17 19 29 M Memory Map 16 19 29 36 MIFARE 7 14 15 17 18 20 22 29 30 36 37 45...

Page 57: ...cturers proximity cards labels and key fobs Marked with data code and ID number available in several Wiegand formats pcProx Read Write Contactless Reads and writes directly to the smart cards pcProx W...

Page 58: ...assumes no responsibility with regard to the performance or use of these products All understandings agreements or warranties if any take place directly between the vendors and the prospective users P...

Reviews: