background image

© 1996-2005 RF IDeas, Inc. All rights reserved

 

The ‘Get ID’ button may be pressed when the ‘Software Developer Kit Mode is checked (Advanced tab).  
It is independent of configuration activity, except that it should not be called directly (within 1 second) 
after performing a ‘Write’ to memory function. 
 
When the user application is finished, the ‘Disconnect’ function should be pressed.   
 
The ‘GetLibVersion’ function does not require that a ‘Connect’ be performed first.  It only requires that 
the Library DLL was successfully loaded into memory. 
 

iCLASS Contactless Credentials 

This section provides the developer with details about the HID iCLASS credentials.  You will find more 
details at HID’s web site located at 

www.HIDCorp.com

 

 

Introduction to Application Areas

 

iCLASS

 credentials: 

 

iCLASS

, the most powerful read/write 

contactless smart card available today, 
features multiple memory sizes, form factor 
options, and configurations.  

 

All other application areas are open to 
developer read/write data applications.  

2kbits (256Bytes) 

iCLASS

 credentials: 

 

The 2K is a highly secure credential optimized 
for standard access control applications.  

 

Application Area 2 is limited to 104 bytes of 
read/write data. The key that secures the data 
cannot be updated.  

16kbits (2kBytes) 

iCLASS

 credentials: 

 

The 16K is a highly modifiable, multi-
application credential with enough memory 
area to store most common biometric 
templates.  

 

Application Area 2 of the 16K/2 credential 
allows for 1896 bytes of read/write data, all of 
which can be accessed with a single 
authentication key.  

 

The 16K credential can be configured for 
either 2 or 16 application areas. Note: Once 
configured, the credential cannot be 
reconfigured.  

 

The configuration block (block 1) of pages 1 
through 7 on a 16K/16 credential is 
modifiable. This allows for the additional 
configuration of the Application Limit on these 
pages.  

Will my application fit on an 

iCLASS

 card?  Use this table to find out. 

Data Type 

Size

(in bits)

Size 

(in Bytes)

How many fit on 

2kbits (256Bytes) 

iCLASS

 credential?***

How many fit on 

16kbits (2kBytes) 

iCLASS

 credential?***

Yes/No (True/False) 

1/8 

832 

15168 

A single ASCII character 

104 

1896 

A value less than 65535 

16 

52 

948 

RSI® 
(Hand Geometry template)**

72 9 

11 

210 

Bioscrypt® 
(Fingerprint template)** 

2784 348 

LG/Iridian® 
(Iris template)** 

4096 512 

Voice template* 

10000 

1250 

Low-resolution photo* 

12000 

1500 

Summary of Contents for RFID1356i-232

Page 1: ......

Page 2: ...ou may install and use one copy of the SOFTWARE PORTION OF THE PRODUCT on the COMPUTER Network Services If the SOFTWARE PORTION OF THE PRODUCT includes functionality that enables the COMPUTER to act a...

Page 3: ...PRODUCT only in conjunction with that upgraded product unless you destroy the upgraded product If the SOFTWARE PORTION OF THE PRODUCT is an upgrade of a RF IDeas product you now may use that upgraded...

Page 4: ...RF IDeas Inc 1997 2003 All rights reserved Reproduction or distribution of this document in whole or in part or in any form is prohibited without express written permission from RF IDeas Inc Trademar...

Page 5: ...arty application for any serious purposes RF IDeas offers a SDK software developer s kit for third party software developers to develop more serious applications around the AIR ID platform We at RF ID...

Page 6: ...or RS 232 FCC ID iCLASS version M9MRFID1356I100 This device complies with Part 15 of the FCC rules Operation is subject to the following two conditions 1 This device may not cause harmful interface an...

Page 7: ...ound 18 Reset To Defaults 18 Timing 19 Get Set Internal Timing 19 Data is valid for 19 Inter key Press time 19 Inter key Release time 19 Sets USB inter key Release time delay in msecs This is the dela...

Page 8: ...onfiguration 27 Get Card CFG 27 Card SN 28 Card Context 28 Key Management 28 New Key ASCII 28 Key in Hex 28 Write to Card 28 Write to Reader 28 Write Default to Reader 28 Read Write 28 Start Block 28...

Page 9: ...Tracker to Configuration Application Version 2 0 0 May 1 2003 Further pre release refinement Version 1 2 0 April 30 2003 Further pre release refinement Consolidation of some confusing function order...

Page 10: ...a and read it back and 3 To change master keys in the reader and cards The reader s configuration items are grouped according to their general function and are handled through structures defined in th...

Page 11: ...or standard access control applications Application Area 2 is limited to 104 bytes of read write data The key that secures the data cannot be updated 16kbits 2kBytes iCLASS credentials The 16K is a hi...

Page 12: ...ll rights reserved template sizes are estimated and vary between manufacturers template sizes provided by manufacturers and are subject to change these are approximate numbers actual usage depends on...

Page 13: ...special area of memory for the programmed iCLASS cards As can be seen above Application Area 1 is essentially reserved for HID Access Control Application i e proximity card Wiegand data such as parity...

Page 14: ...0 is open for users to read and write To access this area using the supplied demo applications for C and Visual Basic you would set the Card Context to Page 0 Appl Area 2 iCLASS 16 K 16 Appl Memory M...

Page 15: ...y in the reader Here are a few macro type operations you will use in working with the iCLASS cards Each operation is shown to indicate the proper sequence of events for executing the given task Read O...

Page 16: ...the card using the Procedure Find Free Page 3 Place the correct Key value into the New Key field unless you are using the Default Key 4 Write this Key to the Card Write to Card or if using the defaul...

Page 17: ...df Page 0 Application Area 1 of the iCLASS contactless smart card is holding information typically associated with the Access Control Industry s proximity card This file documents the read only identi...

Page 18: ...auto detects the AIR ID first on the USB and then if no reader is found it searches on communications ports 1 through 8 Device Found When the connection is successful the Device Found checkbox will i...

Page 19: ...y in msecs This is how long the key is held down Inter key Release time Sets USB inter key Release time delay in msecs This is the delay between keystrokes Lock out time for repetitive reads The lock...

Page 20: ...information Proximity Cards To better understand this reserved area of read only card memory we are including this discussion of proximity cards and formats There are several bits constructed together...

Page 21: ...nown before the read in order to verify its validity How to determine your format and masking Rule1 1st Convert to Binary Rule 2 Card data format in binary is typically something like parity facility...

Page 22: ...ally associated with the Access Control Industry s proximity card Specifically the iCLASS identification number is also known as the proximity card number see Proximity Card Formats above This screen...

Page 23: ...ading and Trailing parity bits Enable FAC ID character This checkbox indicates that a separator character will be used between the FAC and ID codes This char sent between FAC ID This field holds the c...

Page 24: ...at is used for building access control Wiegand cards usually have a parity bit s at each end of the data stream Often users want to strip these bits and simply retrieve the site code or ID code from t...

Page 25: ...you have written the unique address you can selectively communicate with each device to learn which reader sent the card data stream SDK users will use this address field to enter the address for the...

Page 26: ...ent of the bits defined by an F in the Filter Mask ID Code The ID Code will represent the decimal equivalent of the bits defined by an I in the Filter Mask Enable Output as Hexadecimal This checkbox a...

Page 27: ...ng the Get Card Cfg button will read the entire card s configuration and memory The application will read and determine the free pages those pages that are using the default keys as well as the memory...

Page 28: ...not to leave an access key for someone else to use New Key ASCII Enter a new Key in this field that you will send to either the card reader or both Pressing either the Write Key to Card or Write Key...

Page 29: ...This section contains useful higher level procedures Find Free Page This routine is valid for 16k cards only It searches each page 1 7 for memory pages that are protected with the default key When a p...

Page 30: ...mation the station PC can insert before top section or after bottom section the data read from a specific area middle section of the screen below of the card s memory The concept is to have a series o...

Page 31: ...card Delimiter The user can choose delimiters None Comma or Tab The delimiter is inserted after each field or date time stamp Station Label The user may type in any identifier The first information k...

Page 32: ...1996 2005 RF IDeas Inc All rights reserved ICLASS Memory Map Please refer to the iCLASS Memory Map discussion above...

Page 33: ...1996 2005 RF IDeas Inc All rights reserved About...

Page 34: ...1996 2005 RF IDeas Inc All rights reserved OK Leave the AIR ID Dialog Screen...

Page 35: ...1996 2005 RF IDeas Inc All rights reserved...

Page 36: ...an out of devices 8 SetupDiGetDeviceInterfaceDetail ERROR_INSUFFICIENT_BUFFER GetLastError 9 Failed pDevIFDetail LocalAlloc 10 VendorID and or ProductID not found 11 CreateFile failed 12 SetupDiGetDev...

Reviews: