Forum › MIFARE SDK › Native commands sending to MiFARE DESFire EV1 › Reply To: Native commands sending to MiFARE DESFire EV1
Hi Neel,
The DESFire native datasheet is NDA classified. But you can do a lot with the public ISO commands:
– INS code ‘A4’ SELECT
– INS code ‘B0’ READ BINARY
– INS code ‘D6’ UPDATE BINARY
– INS code ‘B2’ READ RECORDS
– INS code ‘E2’ APPEND RECORD
– INS code ‘84’ GET CHALLENGE
– INS code ‘88’ INTERNAL AUTHENTICATE
– INS code ‘82’ EXTERNAL AUTHENTICATE
You will find the information here:
https://www.nxp.com/docs/en/data-sheet/MF3ICDX21_41_81_SDS.pdf
The TapLinx team
The DESFire native datasheet is NDA classified. But you can do a lot with the public ISO commands:
– INS code ‘A4’ SELECT
– INS code ‘B0’ READ BINARY
– INS code ‘D6’ UPDATE BINARY
– INS code ‘B2’ READ RECORDS
– INS code ‘E2’ APPEND RECORD
– INS code ‘84’ GET CHALLENGE
– INS code ‘88’ INTERNAL AUTHENTICATE
– INS code ‘82’ EXTERNAL AUTHENTICATE
You will find the information here:
https://www.nxp.com/docs/en/data-sheet/MF3ICDX21_41_81_SDS.pdf
The TapLinx team
+ 0
|
- 0