M1 card is divided into 16 sectors, each sector from 4 blocks (block 0, block 1, block 2, block 3), with (we will also be 16 blocks of 64 sectors numbered according to the absolute address 0 63, storage structure, as shown below:
2.Block 0 sector 0 (the absolute address 0), is used to store vendor code, has been cured,and can not be changed.
3.Each sector of the block 0, block 1, block 2 for the data block can be used to store data.
Data block can be used for two applications:
- Used for general data storage, can read and write.
- Used as data values, you can initialize the value, value-added, impairment, reading operation.
4.Each sector of the control block 3 blocks, including a password A, access control, password B. Concrete structure is as followed:：
A0 A1 A2 A3 A4 A5 FF 07 80 69 B0 B1 B2 B3 B4 B5
Password A (6 bytes) Access Control (4 bytes) Password B (6 bytes)
5.Each sector of the password and access control are independent, it may actually need to set their own password and access control.Access control is 4 bytes, a total of 32-bit, sector for each block (including data blocks and control blocks) access condition is a common password and access control decisions, each in the access control The three blocks have a corresponding control bit, defined as followed:
Block0： C10 C20 C30
Block1： C11 C21 C31
Block2： C12 C22 C32
Block3： C13 C23 C33
Three control bits exists in the access control byte with positive and negative form , decide theaccess.
(Such as impairment operation must verify KEY A, for value-added operations to verify KEY B, etc.).Three controlLocated in the access control byte in the position to block 0 as an example:
Control of the block 0:
Access Control (4 bytes, including byte 9 to spare bytes) structure is as follows:
6. Data block (block 0, block 1, block 2), access control, such as
(KeyA | B is A password or password B, Never is under any conditions that can not be realized)
For example: When the block 0 of access control bits C10 C20 C30 = 1 0 0, the authentication code A or code B is correct readable;
Verify the password B is correct,the can write ; can not add value, impairment of operation.
7. Control block 3 of the access control and data blocks (blocks 0,1,2) are different , its access control are as followed:
For example: When the block 3, access control bits C13 C23 C33 = 1 0 0, it said:
Password A: unreadable, verify KEYA or KEYB correctly, can be written (changed).
Access control: authentication KEYA or KEYB correct, readable, writable.
Password B: Verify KEYA or KEYB correct, readable, writable.
The electrical part of the card is only composed by an antenna and ASIC.
Antenna: The antenna is only a few cards winding coil group, it is suitable for packaging to IS0 card.
ASIC: the ASIC of card is componented by a high-speed (106KB baud rate) of the RF interface, a control unit and an 8K-bit EEPROM.。
How it works: M1 card reader to send a fixed-frequency electromagnetic waves, the card contains a series resonant LC circuit, the frequency with the same frequency reader launched in the wave of excitation, LC resonant circuit resonance, which With the charge within the capacitor, the capacitor in the other end, then there is a single guide through the electronic pump, the capacitor charge storage capacitor to another, when the accumulated charge to 2V, the capacitor can be used as power supply voltage for the other circuits, will launch the data card reader or access the data.
四、The communication between M1 RF card and reader
Reset Response (Answer to request) M1 RF card communication protocol and communication baud rate is defined, when a card into the reader operating range, the reader to a specific protocol to c