Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Idesco DESCoder Tutorial Presentation

647 views

Published on

DESCoder Software description, tutorial presentation

Published in: Technology
  • Be the first to comment

  • Be the first to like this

Idesco DESCoder Tutorial Presentation

  1. 1. Idesco DEScoder SW
  2. 2. DEScoder SW: For Idesco DESfire reader configuration and key management For DESfire Access Card creation
  3. 3. DEScoder SW properties <ul><li>DEScoder package </li></ul><ul><ul><li>DEScoder SW </li></ul></ul><ul><ul><li>Access 9 CD USB reader </li></ul></ul><ul><li>Create configuration card </li></ul><ul><ul><li>Create command file </li></ul></ul><ul><ul><li>Create interface file </li></ul></ul><ul><ul><li>Create key file </li></ul></ul><ul><li>Create access card </li></ul><ul><ul><li>Create applications </li></ul></ul><ul><ul><li>Create files </li></ul></ul><ul><ul><li>Value writer </li></ul></ul><ul><li>Read card </li></ul><ul><ul><li>Read DESfire card structure </li></ul></ul><ul><ul><li>Read files </li></ul></ul><ul><ul><li>Delete files </li></ul></ul><ul><ul><li>Format card </li></ul></ul>
  4. 4. Configuration card, Interface file <ul><li>Define general reader interface parameters </li></ul><ul><li>Wiegand timings </li></ul><ul><li>Parity settings </li></ul><ul><li>Output control and output control trigger </li></ul><ul><li>Mifare Classic polling </li></ul><ul><li>Tamper message </li></ul><ul><li>Alive message </li></ul><ul><li>Pin code length </li></ul><ul><li>Backlight control </li></ul><ul><li>RS232 format </li></ul><ul><li>Clock and data for Mifare Classic </li></ul><ul><li>Indivisible data length </li></ul><ul><li>UID on / off </li></ul><ul><li>RS 232 baudrate </li></ul><ul><li>LED / Buzzer settings </li></ul>
  5. 5. Configuration card, Interface file <ul><li>Define general reader interface parameters </li></ul><ul><li>Wiegand timings </li></ul><ul><li>Parity settings </li></ul><ul><li>Output control and output control trigger </li></ul><ul><li>Mifare Classic polling </li></ul><ul><li>Tamper message </li></ul><ul><li>Alive message </li></ul><ul><li>Pin code length </li></ul><ul><li>Backlight control </li></ul><ul><li>RS232 format </li></ul><ul><li>Clock and data for Mifare Classic </li></ul><ul><li>Indivisible data length </li></ul><ul><li>UID on / off </li></ul><ul><li>RS 232 baudrate </li></ul><ul><li>LED / Buzzer settings </li></ul>
  6. 6. Configuration card, Interface file <ul><li>Define general reader interface parameters </li></ul><ul><li>Wiegand timings </li></ul><ul><li>Parity settings </li></ul><ul><li>Output control and output control trigger </li></ul><ul><li>Mifare Classic polling </li></ul><ul><li>Tamper message </li></ul><ul><li>Alive message </li></ul><ul><li>Pin code length </li></ul><ul><li>Backlight control </li></ul><ul><li>RS232 format </li></ul><ul><li>Clock and data for Mifare Classic </li></ul><ul><li>Indivisible data length </li></ul><ul><li>UID on / off </li></ul><ul><li>RS 232 baudrate </li></ul><ul><li>LED / Buzzer settings </li></ul>NOTE! WHEN MIFARE CLASSIC POLLING IS DISABLED MIFARE CLASSIC SUPPORT IS COMPLETELY BLOCKED
  7. 7. Configuration card, Interface file <ul><li>Define general reader interface parameters </li></ul><ul><li>Wiegand timings </li></ul><ul><li>Parity settings </li></ul><ul><li>Output control and output control trigger </li></ul><ul><li>Mifare Classic polling </li></ul><ul><li>Tamper message </li></ul><ul><li>Alive message </li></ul><ul><li>Pin code length </li></ul><ul><li>Backlight control </li></ul><ul><li>RS232 format </li></ul><ul><li>Clock and data for Mifare Classic </li></ul><ul><li>Indivisible data length </li></ul><ul><li>UID on / off </li></ul><ul><li>RS 232 baudrate </li></ul><ul><li>LED / Buzzer settings </li></ul>NOTE! IT IS NOT RECOMMENDED TO USE UID READING WHEN DESFIRE APPLICATIONS ARE USED!
  8. 8. Configuration card, Command file <ul><li>Define reader application and </li></ul><ul><li>file polling structure(s) </li></ul>
  9. 9. Configuration card, Command file <ul><li>Define reader application and </li></ul><ul><li>file polling structure(s) </li></ul><ul><li>Define application and crypto mode </li></ul>
  10. 10. Configuration card, Command file <ul><li>Define reader application and </li></ul><ul><li>file polling structure(s) </li></ul><ul><li>Define application and crypto mode </li></ul><ul><li>Define file to be read </li></ul>
  11. 11. Configuration card, Command file <ul><li>Define reader application and </li></ul><ul><li>file polling structure(s) </li></ul><ul><li>Define application and crypto mode </li></ul><ul><li>Define file to be read </li></ul><ul><li>Define data offset </li></ul>
  12. 12. Configuration card, Command file <ul><li>Define reader application and </li></ul><ul><li>file polling structure(s) </li></ul><ul><li>Define application and crypto mode </li></ul><ul><li>Define file to be read </li></ul><ul><li>Define data offset </li></ul><ul><li>Define data length </li></ul>
  13. 13. Configuration card, Command file <ul><li>Define reader application and </li></ul><ul><li>file polling structure(s) </li></ul><ul><li>Define application and crypto mode </li></ul><ul><li>Define file to be read </li></ul><ul><li>Define data offset </li></ul><ul><li>Define data length </li></ul><ul><li>Define Card key index and key(s) </li></ul>
  14. 14. Configuration card, Command file <ul><li>Define reader application and </li></ul><ul><li>file polling structure(s) </li></ul><ul><li>Define application and crypto mode </li></ul><ul><li>Define file to be read </li></ul><ul><li>Define data offset </li></ul><ul><li>Define data length </li></ul><ul><li>Define Card key index and key(s) </li></ul><ul><li>Use real random numbers! </li></ul>
  15. 15. Configuration card, Command file <ul><li>Define reader application and </li></ul><ul><li>file polling structure(s) </li></ul><ul><li>Define application and crypto mode </li></ul><ul><li>Define file to be read </li></ul><ul><li>Define data offset </li></ul><ul><li>Define data length </li></ul><ul><li>Define Card key index and key(s) </li></ul><ul><li>Use real random numbers! </li></ul>
  16. 16. Configuration card, Command file <ul><li>Define reader application and </li></ul><ul><li>file polling structure(s) </li></ul><ul><li>Define application and crypto mode </li></ul><ul><li>Define file to be read </li></ul><ul><li>Define data offset </li></ul><ul><li>Define data length </li></ul><ul><li>Define Card key index and key(s) </li></ul><ul><li>Use real random numbers! </li></ul>
  17. 17. Configuration card, Key file <ul><li>Key file include summarize information </li></ul><ul><li>about the created read keys </li></ul>
  18. 18. Configuration card, Key file <ul><li>Key file include summarize information </li></ul><ul><li>about the created read keys </li></ul><ul><li>Configuration card polling key must be defined </li></ul><ul><li>separately. Note that reader use separate key </li></ul><ul><li>for access card reading and for configuration </li></ul><ul><li>card reading </li></ul>
  19. 19. Configuration card, Key file <ul><li>Key file include summarize information </li></ul><ul><li>about the created read keys </li></ul><ul><li>Configuration card polling key must be defined </li></ul><ul><li>separately. Note that reader use separate key </li></ul><ul><li>for access card reading and for configuration </li></ul><ul><li>card reading </li></ul><ul><li>Configuration card write key must also be </li></ul><ul><li>defined separately </li></ul>
  20. 20. Configuration card, Key file <ul><li>Key file include summarize information </li></ul><ul><li>about the created read keys </li></ul><ul><li>Configuration card polling key must be defined </li></ul><ul><li>separately. Note that reader use separate key </li></ul><ul><li>for access card reading and for configuration </li></ul><ul><li>card reading </li></ul><ul><li>Configuration card write key must also be </li></ul><ul><li>defined separately </li></ul>NOTE! WHEN CONFIGURATION CARD POLLING IS CHANGED THIS KEY MUST BE USED NEXT TIME READER IS CONFIGURED!
  21. 21. Configuration card, Key file <ul><li>Key file include summarize information </li></ul><ul><li>about the created read keys </li></ul><ul><li>Configuration card polling key must be defined </li></ul><ul><li>separately. Note that reader use separate key </li></ul><ul><li>for access card reading and for configuration </li></ul><ul><li>card reading </li></ul><ul><li>Configuration card write key must also be </li></ul><ul><li>defined separately </li></ul><ul><li>Save the configuration card file to the </li></ul><ul><li>secured location! </li></ul>
  22. 22. Configuration card, Key file <ul><li>Key file include summarize information </li></ul><ul><li>about the created read keys </li></ul><ul><li>Configuration card polling key must be defined </li></ul><ul><li>separately. Note that reader use separate key </li></ul><ul><li>for access card reading and for configuration </li></ul><ul><li>card reading </li></ul><ul><li>Configuration card write key must also be </li></ul><ul><li>defined separately </li></ul><ul><li>Save the configuration card file to the </li></ul><ul><li>secured location! </li></ul>
  23. 23. Create Access cards <ul><li>Access card structure can be created </li></ul><ul><li>separately or by using pre- defined </li></ul><ul><li>configuration card polling structure </li></ul><ul><li>If configuration card structure is used </li></ul><ul><li>save the access card file with new name </li></ul>
  24. 24. Create Access cards <ul><li>Access card structure can be created </li></ul><ul><li>separately or by using pre- defined </li></ul><ul><li>configuration card polling structure </li></ul><ul><li>If configuration card structure is used </li></ul><ul><li>save the access card file with new name </li></ul><ul><li>First define card master key </li></ul>
  25. 25. Create Access cards <ul><li>Access card structure can be created </li></ul><ul><li>separately or by using pre- defined </li></ul><ul><li>configuration card polling structure </li></ul><ul><li>If configuration card structure is used </li></ul><ul><li>save the access card file with new name </li></ul><ul><li>First define card master key </li></ul><ul><li>Use real random numbers! </li></ul>
  26. 26. Create Access cards <ul><li>Access card structure can be created </li></ul><ul><li>separately or by using pre- defined </li></ul><ul><li>configuration card polling structure </li></ul><ul><li>If configuration card structure is used </li></ul><ul><li>save the access card file with new name </li></ul><ul><li>First define card master key </li></ul><ul><li>Use real random numbers! </li></ul>
  27. 27. Create Access cards <ul><li>Access card structure can be created </li></ul><ul><li>separately or by using pre- defined </li></ul><ul><li>configuration card polling structure </li></ul><ul><li>If configuration card structure is used </li></ul><ul><li>save the access card file with new name </li></ul><ul><li>First define card master key </li></ul><ul><li>Use real random numbers! </li></ul>
  28. 28. Create Access cards, continued.. <ul><li>Define application name, application </li></ul><ul><li>master key, read key(s) and crypto type </li></ul><ul><li>IF pre- defined structure is used </li></ul><ul><li>application names and files are </li></ul><ul><li>automatically shown </li></ul>
  29. 29. Create Access cards, continued.. <ul><li>Define application name, application </li></ul><ul><li>master key, read key(s) and crypto type </li></ul><ul><li>IF pre- defined structure is used </li></ul><ul><li>application names and files are </li></ul><ul><li>automatically shown </li></ul><ul><li>Note that application master key must be </li></ul><ul><li>always be defined separately! </li></ul>
  30. 30. Create Access cards, continued.. <ul><li>Define application name, application </li></ul><ul><li>master key, read key(s) and crypto type </li></ul><ul><li>IF pre- defined structure is used </li></ul><ul><li>application names and files are </li></ul><ul><li>automatically shown </li></ul><ul><li>Note that application master key must be </li></ul><ul><li>always be defined separately! </li></ul>
  31. 31. Create Access cards, continued... <ul><li>Define file size </li></ul><ul><li>Define data transmission security level </li></ul><ul><li>Define data format </li></ul><ul><li>Select keys for different operations </li></ul><ul><li>Choose the data offset and enter </li></ul><ul><li>the number to be coded </li></ul>
  32. 32. Create Access cards, continued... <ul><li>Define file size </li></ul><ul><li>Define data transmission security level </li></ul><ul><li>Define data format </li></ul><ul><li>Select keys for different operations </li></ul><ul><li>Choose the data offset and enter </li></ul><ul><li>the number to be coded </li></ul><ul><li>Save the access card file to the </li></ul><ul><li>secured location! </li></ul>
  33. 33. Create Access cards, continued... <ul><li>Define file size </li></ul><ul><li>Define data transmission security level </li></ul><ul><li>Define data format </li></ul><ul><li>Select keys for different operations </li></ul><ul><li>Choose the data offset and enter </li></ul><ul><li>the number to be coded </li></ul><ul><li>Save the access card file to the </li></ul><ul><li>secured location! </li></ul>
  34. 34. Create Access cards, value writer <ul><li>Value writer can be used to write </li></ul><ul><li>continuous data to the selected file </li></ul><ul><li>Choose the file to be written </li></ul><ul><li>Select value writer </li></ul>
  35. 35. Create Access cards, value writer <ul><li>Value writer can be used to write </li></ul><ul><li>continuous data to the selected file </li></ul><ul><li>Choose the file to be written </li></ul><ul><li>Select value writer </li></ul><ul><li>Define data offset </li></ul>
  36. 36. Create Access cards, value writer <ul><li>Value writer can be used to write </li></ul><ul><li>continuous data to the selected file </li></ul><ul><li>Choose the file to be written </li></ul><ul><li>Select value writer </li></ul><ul><li>Define data offset </li></ul><ul><li>Define start value (decimal numbers) </li></ul><ul><li>Define end value (decimal numbers) </li></ul>
  37. 37. Create Access cards, value writer <ul><li>Value writer can be used to write </li></ul><ul><li>continuous data to the selected file </li></ul><ul><li>Choose the file to be written </li></ul><ul><li>Select value writer </li></ul><ul><li>Define data offset </li></ul><ul><li>Define start value (decimal numbers) </li></ul><ul><li>Define end value (decimal numbers) </li></ul><ul><li>Define value field length and save the file </li></ul>
  38. 38. Create Access cards, value writer <ul><li>Value writer can be used to write </li></ul><ul><li>continuous data to the selected file </li></ul><ul><li>Choose the file to be written </li></ul><ul><li>Select value writer </li></ul><ul><li>Define data offset </li></ul><ul><li>Define start value (decimal numbers) </li></ul><ul><li>Define end value (decimal numbers) </li></ul><ul><li>Define value field length and save the file </li></ul><ul><li>Choose writing settings and choose </li></ul>
  39. 39. Create Access cards, value writer <ul><li>Value writer can be used to write </li></ul><ul><li>continuous data to the selected file </li></ul><ul><li>Choose the file to be written </li></ul><ul><li>Select value writer </li></ul><ul><li>Define data offset </li></ul><ul><li>Define start value (decimal numbers) </li></ul><ul><li>Define end value (decimal numbers) </li></ul><ul><li>Define value field length and save the file </li></ul><ul><li>Choose writing settings and choose </li></ul><ul><li>” START” to write the data. </li></ul>
  40. 40. Create Access cards, value writer <ul><li>Value writer can be used to write </li></ul><ul><li>continuous data to the selected file </li></ul><ul><li>Choose the file to be written </li></ul><ul><li>Select value writer </li></ul><ul><li>Define data offset </li></ul><ul><li>Define start value (decimal numbers) </li></ul><ul><li>Define end value (decimal numbers) </li></ul><ul><li>Define value field length and save the file </li></ul><ul><li>Choose writing settings and choose </li></ul><ul><li>” START” to write the data. </li></ul><ul><li>SW will inform when the data is coded. </li></ul>
  41. 41. Create Access cards, value writer <ul><li>Value writer can be used to write </li></ul><ul><li>continuous data to the selected file </li></ul><ul><li>Choose the file to be written </li></ul><ul><li>Select value writer </li></ul><ul><li>Define data offset </li></ul><ul><li>Define start value (decimal numbers) </li></ul><ul><li>Define end value (decimal numbers) </li></ul><ul><li>Define value field length and save the file </li></ul><ul><li>Choose writing settings and choose </li></ul><ul><li>” START” to write the data. </li></ul><ul><li>SW will inform when the data is coded. </li></ul>NOTE! Writing settings are not saved and must be defined each time separately
  42. 42. Read card <ul><li>Read card can be used to check card </li></ul><ul><li>application and file structure </li></ul>
  43. 43. Read card <ul><li>Read card can be used to check card </li></ul><ul><li>application and file structure </li></ul><ul><li>Read file to check data contents </li></ul>
  44. 44. Read card <ul><li>Read card can be used to check card </li></ul><ul><li>application and file structure </li></ul><ul><li>Read file to check data contents </li></ul><ul><li>Read file settings to check file settings </li></ul>
  45. 45. Read card <ul><li>Read card can be used to check card </li></ul><ul><li>application and file structure </li></ul><ul><li>Read file to check data contents </li></ul><ul><li>Read file settings to check file settings </li></ul><ul><li>Delete file can be used to remove </li></ul><ul><li>separate file </li></ul>
  46. 46. Read card <ul><li>Read card can be used to check card </li></ul><ul><li>application and file structure </li></ul><ul><li>Read file to check data contents </li></ul><ul><li>Read file settings to check file settings </li></ul><ul><li>Delete file can be used to remove </li></ul><ul><li>separate file </li></ul><ul><li>Format card can be used to format the </li></ul><ul><li>whole application structure </li></ul>
  47. 47. Example 1 <ul><li>Customer has own access cards. Reader </li></ul><ul><li>must be configured to use these cards. </li></ul><ul><li>Check the customer card application and file </li></ul><ul><li>structure. Check the card read file and crypto </li></ul><ul><li>mechanism. </li></ul><ul><li>Create the configuration card based on the customer </li></ul><ul><li>information. ONLY configuration card needs to be </li></ul><ul><li>made. </li></ul>
  48. 48. Example 1 <ul><li>Customer has own access cards. Reader </li></ul><ul><li>must be configured to use these cards. </li></ul><ul><li>Check the customer card application and file </li></ul><ul><li>structure. Check the card read file and crypto </li></ul><ul><li>mechanism. </li></ul><ul><li>Create the configuration card based on the customer </li></ul><ul><li>information. ONLY configuration card needs to be </li></ul><ul><li>made. </li></ul>
  49. 49. Example 1 <ul><li>Customer has own access cards. Reader </li></ul><ul><li>must be configured to use these cards. </li></ul><ul><li>Check the customer card application and file </li></ul><ul><li>structure. Check the card read file and crypto </li></ul><ul><li>mechanism. </li></ul><ul><li>Create the configuration card based on the customer </li></ul><ul><li>information. ONLY configuration card needs to be </li></ul><ul><li>made. </li></ul>
  50. 50. Example 2 <ul><li>Completely new system, where also access </li></ul><ul><li>cards needs to be created </li></ul><ul><li>Create configuration card </li></ul><ul><li>Open the created configuration file </li></ul><ul><li>with Create/Edit Access cards </li></ul><ul><li>Create Access cards master key and save </li></ul><ul><li>the file with new name </li></ul><ul><li>Define the application write key </li></ul><ul><li>Define the file parameters and save the file to the </li></ul><ul><li>secured location </li></ul><ul><li>Use value writer for card data coding </li></ul>
  51. 51. Example 2 <ul><li>Completely new system, where also access </li></ul><ul><li>cards needs to be created </li></ul><ul><li>Create configuration card </li></ul><ul><li>Open the created configuration file </li></ul><ul><li>with Create/Edit Access cards </li></ul><ul><li>Create Access cards master key and save </li></ul><ul><li>the file with new name </li></ul><ul><li>Define the application write key </li></ul><ul><li>Define the file parameters and save the file to the </li></ul><ul><li>secured location </li></ul><ul><li>Use value writer for card data coding </li></ul>
  52. 52. Example 2 <ul><li>Completely new system, where also access </li></ul><ul><li>cards needs to be created </li></ul><ul><li>Create configuration card </li></ul><ul><li>Open the created configuration file </li></ul><ul><li>with Create/Edit Access cards </li></ul><ul><li>Create Access cards master key and save </li></ul><ul><li>the file with new name </li></ul><ul><li>Define the application write key </li></ul><ul><li>Define the file parameters and save the file to the </li></ul><ul><li>secured location </li></ul><ul><li>Use value writer for card data coding </li></ul>
  53. 53. Example 2 <ul><li>Completely new system, where also access </li></ul><ul><li>cards needs to be created </li></ul><ul><li>Create configuration card </li></ul><ul><li>Open the created configuration file </li></ul><ul><li>with Create/Edit Access cards </li></ul><ul><li>Create Access cards master key and save </li></ul><ul><li>the file with new name </li></ul><ul><li>Define the application write key </li></ul><ul><li>Define the file parameters and save the file to the </li></ul><ul><li>secured location </li></ul><ul><li>Use value writer for card data coding </li></ul>
  54. 54. Example 2 <ul><li>Completely new system, where also access </li></ul><ul><li>cards needs to be created </li></ul><ul><li>Create configuration card </li></ul><ul><li>Open the created configuration file </li></ul><ul><li>with Create/Edit Access cards </li></ul><ul><li>Create Access cards master key and save </li></ul><ul><li>the file with new name </li></ul><ul><li>Define the application write key </li></ul><ul><li>Define the file parameters and save the file to the </li></ul><ul><li>secured location </li></ul><ul><li>Use value writer for card data coding </li></ul>
  55. 55. Example 2 <ul><li>Completely new system, where also access </li></ul><ul><li>cards needs to be created </li></ul><ul><li>Create configuration card </li></ul><ul><li>Open the created configuration file </li></ul><ul><li>with Create/Edit Access cards </li></ul><ul><li>Create Access cards master key and save </li></ul><ul><li>the file with new name </li></ul><ul><li>Define the application write key </li></ul><ul><li>Define the file parameters and save the file to the </li></ul><ul><li>secured location </li></ul><ul><li>Use value writer for card data coding </li></ul>
  56. 56. Example 2 <ul><li>Completely new system, where also access </li></ul><ul><li>cards needs to be created </li></ul><ul><li>Create configuration card </li></ul><ul><li>Open the created configuration file </li></ul><ul><li>with Create/Edit Access cards </li></ul><ul><li>Create Access cards master key and save </li></ul><ul><li>the file with new name </li></ul><ul><li>Define the application write key </li></ul><ul><li>Define the file parameters and save the file to the </li></ul><ul><li>secured location </li></ul><ul><li>Use value writer for card data coding </li></ul>
  57. 57. Example 2 <ul><li>Completely new system, where also access </li></ul><ul><li>cards needs to be created </li></ul><ul><li>Create configuration card </li></ul><ul><li>Open the created configuration file </li></ul><ul><li>with Create/Edit Access cards </li></ul><ul><li>Create Access cards master key and save </li></ul><ul><li>the file with new name </li></ul><ul><li>Define the application write key </li></ul><ul><li>Define the file parameters and save the file to the </li></ul><ul><li>secured location </li></ul><ul><li>Use value writer for card data coding </li></ul>
  58. 58. Example 3 <ul><li>Use the reader as simple door control unit. Pinpad </li></ul><ul><li>use for door open trigger. Access cards are not used. </li></ul><ul><li>Create new configuration card </li></ul><ul><li>Disable Mifare classic polling and define </li></ul><ul><li>the pincode </li></ul><ul><li>Define the door control time. </li></ul>
  59. 59. Example 3 <ul><li>Use the reader as simple door control unit. Pinpad </li></ul><ul><li>use for door open trigger. Access cards are not used. </li></ul><ul><li>Create new configuration card </li></ul><ul><li>Disable Mifare classic polling and define </li></ul><ul><li>the pincode </li></ul><ul><li>Define the door control time. </li></ul>
  60. 60. Example 3 <ul><li>Use the reader as simple door control unit. Pinpad </li></ul><ul><li>use for door open trigger. Access cards are not used. </li></ul><ul><li>Create new configuration card </li></ul><ul><li>Disable Mifare classic polling and define </li></ul><ul><li>the pincode </li></ul><ul><li>Define the door control time. </li></ul><ul><li>Change the configuration card polling </li></ul><ul><li>key </li></ul>
  61. 61. Example 3 <ul><li>Use the reader as simple door control unit. Pinpad </li></ul><ul><li>use for door open trigger. Access cards are not used. </li></ul><ul><li>Create new configuration card </li></ul><ul><li>Disable Mifare classic polling and define </li></ul><ul><li>the pincode </li></ul><ul><li>Define the door control time. </li></ul><ul><li>Change the configuration card polling </li></ul><ul><li>key </li></ul>
  62. 62. Example 3 <ul><li>Use the reader as simple door control unit. Pinpad </li></ul><ul><li>use for door open trigger. Access cards are not used. </li></ul><ul><li>Create new configuration card </li></ul><ul><li>Disable Mifare classic polling and define </li></ul><ul><li>the pincode </li></ul><ul><li>Define the door control time. </li></ul><ul><li>Change the configration card polling </li></ul><ul><li>key </li></ul>
  63. 63. Example 4 <ul><li>Customer has existing 8 CD installation where both Mifare </li></ul><ul><li>Classic and Mifare DESfire are supported. Readers needs </li></ul><ul><li>to be updated to support new DESfire card population. Mifare </li></ul><ul><li>Classic support needs to be removed. </li></ul><ul><li>Open existing configuration card file what </li></ul><ul><li>was used to configure the readers in </li></ul><ul><li>the first phase </li></ul><ul><li>Disable Mifare Classic polling </li></ul><ul><li>Add second polling structure for new </li></ul><ul><li>DESfire cards </li></ul><ul><li>Save the file with new name </li></ul>
  64. 64. Example 5 <ul><li>Card data is stored in two applications and two files. Data must be collected from these files. First application use TDES crypto. Second application use AES crypto. Tamper alarm must be set to trigger the output control </li></ul><ul><li>Set the output control on and set the trigger </li></ul><ul><li>to Tamper </li></ul><ul><li>Define the backlight time to 8 seconds to </li></ul><ul><li>keep tamper alarm on as long as reader is </li></ul><ul><li>removed from the wall </li></ul><ul><li>Define polling structure for TDES and AES </li></ul><ul><li>applications </li></ul>
  65. 65. Example 5 <ul><li>Card data is stored in two applications and two files. Data must be collected from these files. First application use TDES crypto. Second application use AES crypto. Tamper alarm must be set to trigger the output control </li></ul><ul><li>Set the output control on and set the trigger </li></ul><ul><li>to Tamper </li></ul><ul><li>Define the backlight time to 8 seconds to </li></ul><ul><li>keep tamper alarm on as long as reader is </li></ul><ul><li>removed from the wall </li></ul><ul><li>Define polling structure for TDES and AES </li></ul><ul><li>applications </li></ul>
  66. 66. Example 5 <ul><li>Card data is stored in two applications and two files. Data must be collected from these files. First application use TDES crypto. Second application use AES crypto. Tamper alarm must be set to trigger the output control </li></ul><ul><li>Set the output control on and set the trigger </li></ul><ul><li>to Tamper </li></ul><ul><li>Define the backlight time to 8 seconds to </li></ul><ul><li>keep tamper alarm on as long as reader is </li></ul><ul><li>removed from the wall </li></ul><ul><li>Define polling structure for TDES and AES </li></ul><ul><li>applications </li></ul>
  67. 67. Example 5 <ul><li>Card data is stored in two applications and two files. Data must be collected from these files. First application use TDES crypto. Second application use AES crypto. Tamper alarm must be set to trigger the output control </li></ul><ul><li>Set the output control on and set the trigger </li></ul><ul><li>to Tamper </li></ul><ul><li>Define the backlight time to 8 seconds to </li></ul><ul><li>keep tamper alarm on as long as reader is </li></ul><ul><li>removed from the wall </li></ul><ul><li>Define polling structure for TDES and AES </li></ul><ul><li>applications </li></ul>

×