Digital Signal Processing Reference
In-Depth Information
4 pages 16 words of 16 bit
0
1
2
3
Memory map of a
1 Kbit (128 byte)
RFID memory
4
5
6
7
8
9
A
B
C
D
E
F
OTP write protection bit
for each 16-bit word
16-bit write password for the chip
32-bit read/write password available
for any page
0
1
Security register
32 bit chip identification number
Figure 10.16 Example of a transponder with fixed segmentation of the memory (IDESCO
MICROLOG ) The four 'pages' can be protected against unauthorised reading or writing using
different passwords (IDESCO, n.d.)
10.1.3.5 MIFARE applicationdirectory
The memory of a MIFARE transponder is divided into 16 independent segments,
known as sectors. Each sector is protected against unauthorised access by two different
keys (hierarchical structure). Different access rights can be allocated to each of the
two keys in its own access register (config.). Thus, 16 independent applications that
are protected from each other by secret keys can be loaded onto the transponder
(Figure 10.17). None of the applications can be read without the secret key, not even
for checking or identification. So it is not even possible to determine what applications
are stored on the transponder.
Let us now assume that the city of Munich has decided to issue a contactless City-
Card, which citizens can use to avail themselves of city services, and which occupies
Search WWH ::




Custom Search