-2-
v7.0
Index
Document version: v7.0 - 02/2017
© Libelium Comunicaciones Distribuidas S.L.
INDEX
1. Introduction ......................................................................................................................................... 4
1.1. The standard ..................................................................................................................................................................................4
2. Hardware .............................................................................................................................................. 6
3. Dual radio with the Expansion Board ................................................................................................ 7
3.1. Expansion Radio Board ..............................................................................................................................................................7
3.2. Setting on .......................................................................................................................................................................................8
3.3. Setting off .......................................................................................................................................................................................8
4. RFID Tags .............................................................................................................................................. 9
5. Usage .................................................................................................................................................. 10
6. Security with RFID/NFC at 13.56 MHz .............................................................................................. 11
7. RFID 13.56 MHz and NFC ................................................................................................................... 13
8. Libelium’s library ............................................................................................................................... 14
8.1. Library constructor ...................................................................................................................................................................15
8.2. Switching the module on .......................................................................................................................................................16
8.3. Switching the module off ......................................................................................................................................................16
8.4. Initiating the module ...............................................................................................................................................................16
8.5. Authenticating a sector ..........................................................................................................................................................17
8.6. Reading a block .........................................................................................................................................................................17
8.7. Reading a block with authentication .................................................................................................................................18
8.8. Writing in a block ......................................................................................................................................................................18
8.9. Writing in a block with authentication ..............................................................................................................................18
8.10. Writing in a block and checking it ....................................................................................................................................19
8.11. Writing in a block with authentication and checking it ...........................................................................................19
8.12. Setting keys in a sector .........................................................................................................................................................19
8.13. Powering down ......................................................................................................................................................................20
8.14. Waking up .................................................................................................................................................................................20
8.15. Printing data .............................................................................................................................................................................21
8.16. Comparing UIDs ......................................................................................................................................................................21
8.17. Searching a UID among a group of UIDs .......................................................................................................................21
8.18. Converting from a string to a uint8_t pointer ..............................................................................................................22
8.19. Converting from a uint8_t pointer to an integer ........................................................................................................22
9. Time of execution of the functions ................................................................................................... 23