- High Speed, Contactless (RFID/NFC) Interface ISO 14443
- Powered by CardLogix’ M.O.S.T. Operating System
- 16 Byte Global Unique Identifier (GUID)
- High Capacity User Memory – Up to 162k bytes EEPROM
- SHA-256 HMAC for Mutual Authentication
- Cyclical, Linear, and Purse File Types
- Secured E-Purse/ E-Payments with Session Keys
- Injectable AES Keys with Admin Password
- Special transport keys for lifecycle control
- Extended file sizes that breaks the 32k Bytes barrier set by ISO
C8 – M.O.S.T. Card® Contactless Microprocessor Smart Cards
- Operating voltage range: 1.62V to 5.5V (ISO 7816 Class A, B, and C)
- CRC16 and CRC32 engines are compliant with ISO/IEC 3309
- Global unique card identifier system (GUID) is compliant with ASN.1 Object Identifier components (ITU-T Rec. X.667 | ISO/IEC 9834-8, and with IETF RFC 4122)
- 4 byte, 7 byte and 10 byte Unique Identifiers (UIDs)
- Conforms to FIPS 197
- Authentication mechanisms are fully compliant to Secure Hash Standard (SHS) FIPS PUB 180-4
- Conforms to (HDLC) procedures ISO/IEC 13239:2002
- Programmable passwords for all access modes: read, write, update, invalidate and rehabilitate
- Data retention > 10 years
- Endurance: maximum of 16.5 million programming cycles at 25° C
- Electrostatic discharge protection > 6,000V
- Master File (MF)
- Directory File (DF)
- EF Transparent File
- EF Large File Size
- Linear, Cyclical, and Purse Files
- APP & CHV Password Files
- Master CHV File
- Admin Password with Injectable AES Keys
- Long File Name
- SHA-1, SHA-256
- DES, 3DES
- AES-128, AES-192, AES-256
- A wide variety of user memory sizes
- PC/SC compatible
- Negotiable communication speed (PTS)
- Rapid card development through M.O.S.T. Toolz™
- Multiple reader and terminal choices
- T= 0 or T= 1
- ISO 7816 1-4
Dedicated Semiconductor and Operating System Countermeasures Guard Against:
- Side channel attacks
- Advanced fault attacks
- Velocity checking
- Voltage attacks
- Frequency attacks
- Temperature glitch attacks
- Optical attacks
Custom Card Security Options
- Laser engraving/indenting
- Guilloche and rosettes
- Optically Variable Devices (OVDs) and holograms
- Hidden Card Validator™ graphics with lens viewer
- Ultraviolet (UV) ink
Learn more about CardLogix pre-printed 2400 DPI ReadyStart™ Secure Cards and pre-stamped Holofoil Cards.
M.O.S.T. Card C Series | Features Comparison (C5, C6, C7, C8, C9)
Contactless Interface for Speed and Convenience
The M.O.S.T. Card C8 smart card features a contactless (RFID/ NFC) ISO 14443-A/B interface secured by an intelligent operating system and microprocessor (CPU) chip. Compared to low security/ low user memory contactless memory cards, such as MIFARE®, Prox® Card, and iClass®, the M.O.S.T. C8 contactless microprocessor smart cards are more reliable, more unique, and more secureâ€” all while enabling the convenience and speed achieved by contactless communication.
Advanced Security Features — Including SHA-256, HMAC, and AES-256 Encryption
The M.O.S.T. Card C8 is powered by the CardLogix M.O.S.T Card Operating System which supports a variety of security measures, including SHA-1 bi-directional/ mutual authentication, SHA-256, HMAC, AES 128, AES 192, AES 256, and 3DES (triple DES). It also supports APP and CHV PIN/passwords with an internal random number generation for unique e-signatures and transaction sessions. The OS is built with an error detection code and security self-tests. The EAL certified silicon provides continuous encryption of all data and the virtualization of the data across the non-volatile memory.
Admin Password & Injectable AES Keys — Ideal for PACS Management
With the Admin Password File, an authorized security systems manager can inject new AES Keys if door locks are changed or if any password modifications are needed. This capability gives the manager the convenience to safely update his or her physical access control system without having to reissue the cards. The Admin Password File is created in the M.O.S.T. Card Configuration Utility™, and it is protected by a password that cannot be accessed or changed after setup.
True Credential ID Uniqueness
M.O.S.T. Card leverages the GUID (Globally Unique Identifier) serial number, proving a truly unique credential ID. The GUID is ISO/IEC 9834-8 compliant. With a length of 16 Bytes, ID number combinations have no chance of being duplicated or cloned. The UID, used in MIFARE and iClass cards, consists of only 6 bytes, and several duplicate ID numbers and cloned cards exist in the market today. The M.O.S.T. Card GUID enhances security while removing the need for identifier conflict resolutions.
Up to 144k of EEPROM User Memory
The M.O.S.T. C8 smart card family offers up to 144k bytes of user memory. The large EEPROM increases available user memory and card functionality, enabling the creation of advanced security files and multiple applications on one card. The C8 family enables users to safely store a large amount of personal and sensitive data, including ICAO-certified biometrics, in the smart card chip rather than over a vulnerable central network. The cards manage data securely, so that physical access controls systems, payment transactions, national ID, border crossing, and military identification systems benefit from a secure, closed system that does not depend on being connected to a network at all times.
Advanced E-Purse Security with Session Keys Every Command
M.O.S.T. Card C8 is built for reliable payment and ATM transactions. Unlike DESFire EV1, which generates a single session key when a card is inserted into a payment terminal, the M.O.S.T. Card C8 generates a new session key every time a new command is presented. Security attacks occur at any point from the time a card is inserted into the payment terminal to the time it is removed from the terminal. The M.O.S.T. Card C8 prevents these types of security attacks by generating session keys before every command while the card is still inserted into the terminal. Session keys performed this way conform to EMV (Europay, MasterCard and Visa) card payment security standards.
PKI Security Features at Affordable Symmetric Key Card Prices
The M.O.S.T. Card C8 leverages security features typically found in a Public Key Infrastructure (PKI), such as transport keys, AES encryption, HMAC, SHA 256 and e-signatures (SKI digital signatures) for trusted authentication and data integrity. PKI cards are priced, on average, 300% more than Symmetric Key cards. With the M.O.S.T. Card C8 series, the security of PKI is achieved at the price of a Symmetric Key card, saving your organization money without sacrificing reliability and security.
True Interoperability — idblox™ Certified
The M.O.S.T. Card C8 family is future-proofed, working on multiple silicon vendors’ devices so that projects are always supported. The card family is part of the idblox™ ecosystem which has attracted multiple vendors for compatible smart card readers, smart card terminals, smart card applications and all other smart card infrastructure components. The idblox ecosystem leverages a unique methodology that enables true card system interoperability without requiring programming for creating complete end-to-end ID card solutions.
Learn more about the idblox™ ID Credential Ecosystem, the only smart card ecosystem with true interoperability that enables the fastest, easiest and most affordable creation of high-security smart card programs for any card application.
Rapid M.O.S.T. Card Development
CardLogix provides a complete suite of user-friendly development tools to create both custom and pre-configured smart card applications for both programmers and users with average computer skills. Project development is supported by the powerful Winplex® API, demonstration programs, and the M.O.S.T. Card Configuration Utility™. The utility features an intuitive user-interface to design a M.O.S.T. Card file structure (CFS) and set passwords. It also includes pre-programmed, pre-configured idblox™ CFS templates that a user can select for a wide variety of identity applications. The kit includes a full set demo source code for C# (.NET framework), and for Java programmers we provide a set of introductory classes.
No-Programming Smart Card Personalization and Encoding
The M.O.S.T. Card family is supported by the newest innovation in smart card personalization, Card Encoding Engine™(CEE) ID Card Personalization Software. In addition to baseline design and printing capabilities, Card Encoding Engine is the only ID printer software capable of encoding smart cards without requiring programming, scripts, or custom APIs on desktop card printers. It also supports 1D/2D barcodes (including PDF417 and QR codes), MRTDs, and magnetic stripes. This revolutionary software solution is the cornerstone of the idblox ID Credential Ecosystem. It enables the inline creation and deployment of a smart card ID Credential program without relying on programmers, developers or systems integrators.
Streamlined Biometric Enrollment and Issuance
CardLogix is partnered with Corvus Integration, Inc., experts in biometric enrollment and biometric verification technologies, to bring the simplest and quickest way to enroll personnel’s biometric and biographic data and load it onto a smart card. The subject can be enrolled via a Corvus device or biometric enrollment station via Corvus RavenID™ software. The enrolled data is then seamlessly exported to Card Encoding Engine and then encoded and printed to the smart card. Biometric data stored within the smart card chip provides the highest security and protection of personal data and valuable assets.
Learn how RavenID™ software connects with Card Encoding Engine™ today to enable instant enrollment and issuance of a biometrics enhanced M.O.S.T. Card® ID Credential. Any company can interface to Card Encoding Engine by using our standardized idblox™ data dictionary with xml tags to build a rapid interface for ID production.
M.O.S.T. Toolz™ now supports on-card biometrics capability. For more information, see M.O.S.T. Toolz Biometric Series – Fingerprint Edition.
M.O.S.T. Toolz™ SDK
Rated “Most comprehensive and professional SDK for smart card system developments”, MOST Toolz is designed for multi-function and high security smart card systems. M.O.S.T. Toolz™ is an affordable SDK and Card Configuration Utility for developing the M.O.S.T. Card® and other microprocessor smart cards. High level commands are sent through the Winplex® API to the card reader, which is included in the M.O.S.T. Toolz kit. M.O.S.T. Toolz enables programmers to create a smart card-based transaction system that updates and secures files while setting a variety of defensive measures to protect user ID, card access, and file information. CardLogix gives you the power to deliver multiple products and services on a single card, allowing for fast system design and easy updating without the need for card re-issuance.
M.O.S.T. Card® C8 Contactless Microprocessor Smart Cards feature AES encryption, SHA-256 authentication with e-signatures, injectable AES keys, an Administration Password, and up to 144k Bytes of user memory. M.O.ST. Cards contain a microprocessor (CPU) chip providing multifunctionality. Combination and Hybrid card options further extend application capabilities. The cards can be configured for a wide variety of applications, including ID-1 ICAO Border Crossing Cards, Access Control (PACS), Single Sign-On (SSO), Healthcare IDs, Voter IDs, transportation payments, contactless badging with on-card storage of biometrics, and applications that require a contactless session key purse function. The card works with all standard Android NFC devices. for applications that give users immediate access to information stored on the card. For more infomation, view this short demo video.
- Physical access control systems (PACS)
- Transportation passes
- Border crossing cards (ID-1 ICAO cards)
- E-Payment with E-Purse functionality
- Logical access control and single sign-on (SSO)
- Identity verification and mutual card authentication
- On-card biometric storage for identity verification
- Loyalty and rewards programs
- Player tracking
- TITO replacement
- Time and attendance tracking
- Multiple applications on one card
Physical Access and Logical Access ID Cards
- Room keys
- Building entrance
- High security vault access
- Password replacement for network and/or computer access
- Secure transfer of data
- eDriver licenses
- Mass transit fare collection systems
- Electronic toll collection systems
- Bus fares
- Parking fees
ID Cards for Government and Enterprises—Identification and Physical and Logical Access Control Systems
- Driver license
- Voter ID
- Civil ID
- Military ID
- National ID
- Visitor ID / Alien ID
- Worker ID
- Employee ID
- Physical access control systems (PACS)
- Logical access and single sign-on (SSO)
- Electronic benefits for food stamps and WIC food benefits to replace paper coupons and vouchers
- Agricultural producer smart marketing card to track quotas
- eSocial Card
- eVehicle Registration Card / eCar registration
- Multi-functional ID cards for staff and patients
- Patient records (EHR or EMR) – Electronic Health Records Management
- Equipment and room access control
- Patient ID, doctor ID, staff ID
- Prescription card with drug dosage information
- Hospital admission card
- Consumer health card with insurance eligibility and emergency medical data
- Embedded solutions for medical equipment
- Frequent use card for hemodialysis, chemotherapy, or other treatment medical devices
Player’s Card: Player Tracking, TITO Replacement, Physical Access, and Secure Online Gaming — All on One Card!
- Hotel room keys
- Loyalty and rewards programs
- E-payment for restaurants and shopping
- TITO replacement
- Player tracking and rewards
- Multi-factor authentication for online gaming
- Biometric authentication for offline and online use providing a card present transaction
Multi-Application ID Cards for Room Access, Meal Plans, Time & Attendance, Test Taking, and More
- Student identification
- Teacher identification
- Staff identification
- Visitor identification
- Time and attendance
- Test taking
- Library cards
- Meal plans and school merchandise purchase
- Electronic purse to replace coins for small purchases in vending machines and over-the-counter transactions
- Stored value for pre-paid payment cards
- Credit and/or debit accounts, replicating what is currently on the magnetic stripe bank card, but in a more secure environment
- Authentication of EDI transactions that combats fraud
- Internet commerce authentication device for securing payment across the Internet
- Billing management and the secure initiation of calls and identification of caller on any GSM (Global System for Mobile Communications) or CDMA (Code Division Multiple Access) phone
- Pre-paid telephone cards
- Subscriber activation of programming on Pay-TV
- Consumer reward and redemption tracking (frequent shopper or frequent flyer) on a smart loyalty card, marketed to specific consumer profiles and linked to one or more specific retailers serving that profile set
- Loyalty and E-purse applications
CardLogix is an ISO 9001:2008 certified smart card manufacturer, software developer, and the premier provider of smart card and biometric technology with a comprehensive line of software development platforms and applications that enable easy and rapid development of high quality smart cards and ID systems. Since 1998, CardLogix has supplied millions of cards and card components to over 42 countries around the world. As an expert in smart card and chip technology, card operating systems, card software, development tools, and middleware, and biometrics, CardLogix has continuously been at the forefront of smart card technology. Strong partnerships with key suppliers in software, biometric capture, readers, and printers enables CardLogix to deliver complete, leading-edge solutions for multiple applications to markets globally, such as national, civil, voter and enterprise identity; physical and logical access cards; stored value; loyalty and rewards programs; e-purse; gaming, healthcare and other solutions that use a combination of multiple applications onto one card.
Trust is the primary commodity that CardLogix trades in every day. CardLogix builds and maintains customers’ confidence in our products and processes, so that they can trust our cards and software to reliably protect personnel, sensitive data, and their most valuable assets. From development software that’s flexible and easy to use to uncompromising customer support, CardLogix delivers on the promise of trust that our services inspire and our cards guarantee. Our company culture breeds initiative, commitment, and follow-through. As a global supplier and active industry participant, CardLogix understands the importance of being a responsible global business. With recycling, energy conservation, and full RoHS compliance, the company meets its goals with the environment in mind.
CardLogix’ mission is to make high security and multifunctional ID Credential systems more widely available for organizations in need. CardLogix strives to make data transactions more secure, personnel and assets more protected, sensitive data more private, and to turn otherwise complex and expensive smart card system projects into streamlined, easier-to-develop, and more cost-effective solutions for both integrators and end-users.
- Experts in smart card technology with a deep understanding of what is involved to get a smart card project from A to Z
- Commitment to ISO, ICAO, and industry conformance to ensure performance and interoperability
- Extensive partnerships with companies that offer complementary smart card infrastructure components
- Innovative products and solutions that simplify smart card development
- Cutting edge technology, sophistication and differentiated quality at a fraction of competitors’ costs
- Continuous customer support and involvement with evolving card projects
CardLogix manufactures high security and multi-functional ISO compliant smart cards, powered by CardLogix’ own operating systems. CardLogix offers easy-to-use software development platforms for programmers, powerful middleware and APIs, a variety of applications software, and innovative solutions that empower both integrators and end-users to develop and personalize smart cards with less dependency on programming.
- AES (Advanced Encryption Standard)
- A symmetric 128-bit block data encryption technique developed by Belgian cryptographers Joan Daemen and Vincent Rijmen. The U.S government adopted the algorithm as its encryption technique in October 2000, replacing the DES encryption it used. AES works at multiple network layers simultaneously. The National Institute of Standards and Technology (NIST) of the U.S. Department of Commerce selected the algorithm, called Rijndael (pronounced Rhine Dahl or Rain Doll), out of a group of five algorithms under consideration, including one called MARS from a large research team at IBM.
- A card feature which protects the contents of memory if the card is removed before the end of the transaction.
- API (Application programming interface)
- A source code interface that a computer system or program library provides to support requests for services to be made of it by a computer program. An API differs from an application binary interface in that it is specified in terms of a programming language that can be compiled when an application is built, rather than an explicit low level description of how data is laid out in memory.
- CHV (Cardholder Verification)
- is a method used to evaluate whether the person presenting the card is the legitimate cardholder.
- Contactless Card
- A proximity card (prox card or RFID card) is a generic name for contactless integrated circuit devices used for security access or payment systems. The card contains electronic information that can be read from a distance with special card readers that use radio wave. The card It can refer to the older 125 kHz devices or the newer 13.56 MHz contactless RFID cards, most commonly known as contactless smartcards.
- DES (Data Encryption Standard)
- A widely-used method of data encryption using a private (secret) key that was judged so difficult to break by the U.S. government that it was restricted for exportation to other countries. There are 72,000,000,000,000,000 (72 quadrillion) or more possible encryption keys that can be used. For each given message, the key is chosen at random from among this enormous number of keys. Like other private key cryptographic methods, both the sender and the receiver must know and use the same private key.
- A memory chip that can be reprogrammed any number of times, as to correct bugs, by first clearing its contents with ultraviolet light.
- EHR (Electronic Health Record)
- An electronic health record is a digital collection of patient health information compiled at one or more meetings in any care delivery setting. A patient’s record typically includes patient demographics, progress notes, problems, medications, vital signs, past medical history, immunizations, laboratory data and radiology reports. The term EHR is often used to refer to the software platform that manages patient records maintained by a hospital or medical practice.
- Electronic Health Record (EHR or EMR)
- An electronic health record is a collection of patient health information generated by one or more meetings in any care delivery setting. An EHR typically includes patient demographics, progress notes, problems, medications, vital signs, past medical history, immunizations, laboratory data and radiology reports. It’s said to streamline clinicians’ workflow, and it has the ability to generate a complete record of a clinical patient encounter.
- E-purse (electronic purse)
- A smart card can be used to store a monetary value for small purchases. Card readers retrieve the amount currently stored, and subtract the amount for the goods or services being purchased. Groceries, transportation tickets, parking, laundromats, cafeterias, taxis and all types of vending machines are only some of the purchases that often do not reach amounts to justify the hassle of using a credit card (a cash card reader does not require a permanent phone connection with a host computer). Radio-read smart cards will allow the free flow of people through transportation systems, avoiding the need of ticketing machines or validation gates.
- is an electronic indication of intent to agree to or approve the contents of a document.
- FIPS (Federal Information Processing Standards)
- A set of standards that describe document processing, encryption algorithms and other information technology standards for use within non-military government agencies and by government contractors and vendors who work with the agencies.
- GUID (Global Unique Identifier)
- A 128-bit unique reference number used as an identifier in computer software. The term GUID typically refers to various implementations of the universally unique identifier (UUID) standard. A smart card can register support for an interface through association with the interface’s (GUID). This binding between a card and an interface is done at the time the card is first introduced to the system&emdash;typically when the SCSP is installed. Once the card is introduced to the system, applications can search for smart cards, based on a specific interface or GUID. For example, a cash card could make itself available to Windows-based applications by registering interfaces to access its purse scheme.
- HMAC (Hash-based Message Authentication Code)
- is a small set of data that helps authenticate the nature of message; it protects the integrity and the authenticity of the message. The secret key is a unique piece of information that is used to compute the HMAC and is known both by the sender and the receiver of the message.
- ICAO (International Civil Aviation Organization) Passport
- is a biometric passport, also known as an e-passport, ePassport or a digital passport, is a combined paper and electronic passport that contains biometric information that can be used to authenticate the identity of travelers. It uses contactless smart card technology, including a microprocessor chip (computer chip) and antenna (for both power to the chip and communication) embedded in the front or back cover, or center page, of the passport.
- Founded in 1946, ISO is an international organization composed of national standards bodies from over 75 countries. For example, ANSI (American National Standards Institute) is a member of ISO. ISO has defined a number of important computer standards, the most significant of which is perhaps OSI (Open Systems Interconnection), a standardized architecture for designing networks.
- ISO/IEC 14443
- ISO/IEC 14443 is a four-part international standard for Contactless Smart Cards operating at 13.56 MHz in close proximity with a reader antenna. Proximity Integrated Circuit Cards (PICC) are intended to operate within approximately 10cm of the reader antenna.
- Part 1: Physical characteristics
- Part 2: Radio frequency power and signal interface
- Part 3: Initialization and anticollision
- Part 4: Transmission protocol
- ISO/IEC 7810
- The standard specifies the physical characteristics of identification cards including card material, construction, characteristics and nominal dimensions for three sizes of cards (ID-1, ID-2 and ID-3). It is the ID-1 card that forms the basis of ISO 7816-1.
- ISO/IEC 7816
- The standardization of physical characteristics, dimensions and location of contacts, electrical interface and transmission protocols, organization, security and commands for interchange of a smart card. It was created in 1987, updated in 1998, amended in 2003.
- Contents of command-response pairs exchanged at the interface
- Means of retrieval of data elements and data objects in the card
- Structures and contents of historical bytes to describe operating characteristics of the card
- Structures for applications and data in the card, as seen at the interface when processing commands
- Access methods to files and data in the card
- A security architecture defining access rights to files and data in the card
- Means and mechanisms for identifying and addressing applications in the card
- Methods for secure messaging
- Access methods to the algorithms processed by the card. It does not describe these algorithms
The characteristics specified include:
- Physical dimensions
- Resistance to bending, flame, chemicals, temperature and humidity
- The standard includes test methods for resistance to heat
- A chip that serves as the Central Processing Unit controlling a computer. It provides programmable intelligence.
- Microprocessor Smart Cards
- A smart card that has a microprocessor that includes components of this type of architecture including a CPU, RAM, ROM, and EEPROM. The operating system is typically stored in ROM, the CPU uses RAM as its working memory, and most of the data is stored in EEPROM. A rule of thumb for smartcard silicon is that RAM requires four times as much space as EEPROM, which in turn requires four times as much space as ROM.
- NFC (Near-Field Communication)
- is a set of close-range wireless communication standards. NFC-equipped smartphones and other devices can exchange information with each other with a simple tap or wave.
- OS (Operating System or COS)
- The OS is the hardware-specific firmware that provides basic functionality as secure access to on-card storage, authentication and encryption. Only a few cards allow writing programs that are loaded onto the smart card – just like programs on a computer. This is a great way to extend the basic functionality of the smart card OS.
- PC/SC (Personal Computer/Smart Card)
- A specification for smart-card integration into computing environments. Microsoft has implemented PC/SC in Microsoft Windows 200x/XP and makes it available under Microsoft Windows NT/9x. A free implementation of PC/SC, PC/SC Lite, is available for Linux and other Unixes; a forked version comes bundled with Mac OS X.
- PKI (Public key infrastructure)
- Enables users of a basically unsecure public network such as the Internet to securely and privately exchange data and money through the use of a public and a private cryptographic key pair that is obtained and shared through a trusted authority. The public key infrastructure provides for a digital certificate that can identify an individual or an organization and directory services that can store and, when necessary, revoke the certificates. Although the components of a PKI are generally understood, a number of different vendor approaches and services are emerging.
- RFID (Radio-frequency Identification)
- The wireless non-contact use of radio-frequency electromagnetic fields to transfer data, for the purposes of automatically identifying and tracking tags attached to objects. The tags contain electronically stored information. Some tags are powered by and read at short ranges via magnetic fields (electromagnetic induction).
- (SHA-1) Secure Hash Algorithm
- is one of a number of cryptographic hash functions. A cryptographic hash is like a signature for a text or a data file. SHA-160 algorithm generates an almost-unique, fixed size 160-bit (20-byte) hash. Hash is a one way function â€“ it cannot be decrypted back.
- (SHA-2) Secure Hash Algorithm
- is one of a number of cryptographic hash functions. A cryptographic hash is like a signature for a text or a data file. SHA-256 algorithm generates an almost-unique, fixed size 256-bit (32-byte) hash. Hash is a one way function â€“ it cannot be decrypted back.
- SDK (Software Development Kit)
- A package of pre-written code that developers can re-use in order to minimize the amount of unique code that they need to develop themselves. SDKs can help to prevent unnecessary duplication of effort in a development community.
- SSO (single sign-on)
- is a session/user authentication process that permits a user to enter one name and password in order to access multiple applications. The process authenticates the user for all the applications they have been given rights to and eliminates further prompts when they switch applications during a particular session.
- A transmission protocol that is defined in the ISO/IEC 14443-4 standard. This standard describes an optional transport layer protocol. This protocol is often also referred-to as “T=CL”. This is a name derived from the commonly-used contact based smart card protocols T=0 and T=1. “CL” means “contact less”. T=CL is not a protocol in the same sense as T=0 or 1, because you can’t simply send raw bytes on the radio link the same way as on the contact (please don’t say “contactfull” ROFL) I/O line. It’s not the same protocol level.
- is a asynchronous half duplex character transmission protocal for smart cards that requires 2 request/response pairs per command (send command and get response saying got command, then a command to get the response and then the actual response). T=0 requires a GET RESPONSE additional exchange only for case 4 commands or when the command provides more bytes than requested for an outgoing command. It can also require more than two exchanges if the terminal requests the outgoing data per-block.
- is an asynchronous half-duplex block transmission protocol for smart cards that is defined in the ISO/IEC 7816-3 standard. T=1 supports a form of integrity check with a LRC (XOR checksum) or a CRC.
- 3DES (Triple DES)
- Triple DES is a minor variation of this standard. It is three times slower than regular DES but can be billions of times more secure if used properly. Triple DES enjoys much wider use than DES because DES is so easy to break with today’s rapidly advancing technology. This just serves to illustrate that any organization with moderate resources can break through DES with very little effort these days.
- UHF (Ultra high frequency)
- is the ITU designation for radio frequencies in the range between 300 MHz and 3 GHz, also known as the decimetre band as the wavelengths range from one meter to one decimetre. UHF cards that complying with the UHF Gen2 standard for RFID use the 860 to 960 MHz band. While there is some variance in frequency from region to region, UHF Gen2 RFID systems in most countries operate between 900 and 915 MHz.
The read range of passive UHF systems can be as long as 12 m, and UHF RFID has a faster data transfer rate than LF or HF.
- UID (Unique Identifier)
- is a numeric or alphanumeric string that is associated with a single entity within a given system. UIDs make it possible to address that entity, so that it can be accessed and interacted with. UID is defined in the ISO/IEC 14443-3.