Created
February 8, 2016 20:35
-
-
Save RuBiCK/90a46507d63a86451c49 to your computer and use it in GitHub Desktop.
nfclib hardware details
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
pi@raspberrypi:~ $ nfc-scan-device -v | |
nfc-scan-device uses libnfc 1.7.1 | |
1 NFC device(s) found: | |
- pn532_spi:/dev/spidev0.0: | |
pn532_spi:/dev/spidev0.0:500000 | |
chip: PN532 v1.6 | |
initator mode modulations: ISO/IEC 14443A (106 kbps), FeliCa (424 kbps, 212 kbps), ISO/IEC 14443-4B (106 kbps), Innovision Jewel (106 kbps), D.E.P. (424 kbps, 212 kbps, 106 kbps) | |
target mode modulations: ISO/IEC 14443A (106 kbps), FeliCa (424 kbps, 212 kbps), D.E.P. (424 kbps, 212 kbps, 106 kbps) | |
pi@raspberrypi:~ $ nfc-list -v | |
nfc-list uses libnfc 1.7.1 | |
NFC device: pn532_spi:/dev/spidev0.0 opened | |
1 ISO14443A passive target(s) found: | |
ISO/IEC 14443A (106 kbps) target: | |
ATQA (SENS_RES): 00 02 | |
* UID size: single | |
* bit frame anticollision supported | |
UID (NFCID1): 5b 0f 3b ae | |
SAK (SEL_RES): 18 | |
* Not compliant with ISO/IEC 14443-4 | |
* Not compliant with ISO/IEC 18092 | |
Fingerprinting based on MIFARE type Identification Procedure: | |
* MIFARE Classic 4K | |
* MIFARE Plus (4 Byte UID or 4 Byte RID) 4K, Security level 1 | |
* SmartMX with MIFARE 4K emulation | |
Other possible matches based on ATQA & SAK values: | |
0 Felica (212 kbps) passive target(s) found. | |
0 Felica (424 kbps) passive target(s) found. | |
0 ISO14443B passive target(s) found. | |
0 ISO14443B' passive target(s) found. | |
0 ISO14443B-2 ST SRx passive target(s) found. | |
0 ISO14443B-2 ASK CTx passive target(s) found. | |
0 Jewel passive target(s) found. |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment