我是NFC Android的新手,并且试图获取带有身份验证的NTAG212 Mifare Ultralight的第4页至第7页已经很长时间了,我已经拥有PWD和PACK来基于NTAG212文档进行PWD_AUTH。
我这样做
//assume password as array of bytes
//assume pack as array of bytes
try{
nfc.connect();
byte[] cmd1 = nfc.transceive(new byte[]{ (byte) 0x30, (byte) 0x00 }); //read the page 0 to make the NFC active
nfc.transceive(new byte[]{
(byte) 0x1B, //command for PWD_AUTH
pass[0],
pass[1],
pass[2],
pass[3]
});
byte[] cmd4 = nfc.transceive(new byte[]{ (byte) 0x30, (byte) 0x04 }); //read the page 4
}catch(TagLostException e){
e.printStackTrace();
}catch(IOException e){
e.printStachTrace();
}finally{
try{
nfc.close();
}catch(Exception e){
//display failed to close
}
}
将PWD_AUTH命令发送到NFC后,我总是收到
android.nfc.TagLostException: Tag was lost.
错误。有人可以告诉我我在做什么错吗?我的方法正确吗?请帮忙。注意:我已经阅读了NTAG212的文档很多次,搜索过google,stackoverflow和所有可能的资源。
TIA,
肯斯特
最佳答案
您发送给标签的PWD_AUTH命令没有多大意义。
PWD_AUTH命令的想法是,您发送密码(一个4字节的值),并且如果您使用正确的密码进行了身份验证,则标签将以其密码确认(PACK)值(一个2字节的值)进行响应。然后,您可以对照预期的密码确认来验证PACK值,以“认证”标签。
因此正确的命令将是:
byte[] response = nfc.transceive(new byte[] {
(byte) 0x1B, // PWD_AUTH
pass[0], pass[1], pass[2], pass[3]
});
if ((response != null) && (response.length >= 2)) {
byte[] pack = Arrays.copyOf(response, 2);
// TODO: verify PACK to confirm that tag is authentic (not really,
// but that whole PWD_AUTH/PACK authentication mechanism was not
// really meant to bring much security, I hope; same with the
// NTAG signature btw.)
}
您需要什么才能启用密码保护(在NTAG212上):
将PWD(第39页)设置为所需的密码(默认值为
0xFFFFFFFF
)。byte[] response = nfc.transceive(new byte[] {
(byte) 0xA2, // WRITE
(byte) 39, // page address
pass[0], pass[1], pass[2], pass[3]
});
将PACK(第40页,字节0-1)设置为所需的密码确认(默认值为
0x0000
)。byte[] response = nfc.transceive(new byte[] {
(byte) 0xA2, // WRITE
(byte) 40, // page address
pack[0], pack[1], // bytes 0-1 are PACK value
(byte) 0, (byte) 0 // other bytes are RFU and must be written as 0
});
将AUTHLIM(第38页,字节0,位2-0)设置为失败的密码验证尝试的最大次数(将此值设置为0将允许无限制的PWD_AUTH尝试次数)。
将PROT(第38页,字节0,位7)设置为所需的值(0 =仅PWD_AUTH用于写访问,1 = PWD_AUTH对于读和写访问是必需的)。
byte[] response = nfc.transceive(new byte[] {
(byte) 0x30, // READ
(byte) 38 // page address
});
if ((response != null) && (response.length >= 16)) { // read always returns 4 pages
boolean prot = false; // false = PWD_AUTH for write only, true = PWD_AUTH for read and write
int authlim = 0; // value between 0 and 7
response = nfc.transceive(new byte[] {
(byte) 0xA2, // WRITE
(byte) 38, // page address
(byte) ((response[0] & 0x078) | (prot ? 0x080 : 0x000) | (authlim & 0x007)),
response[1], response[2], response[3] // keep old value for bytes 1-3, you could also simply set them to 0 as they are currently RFU and must always be written as 0 (response[1], response[2], response[3] will contain 0 too as they contain the read RFU value)
});
}
将AUTH0(第37页,字节3)设置为第一页,该第一页需要密码认证。
byte[] response = nfc.transceive(new byte[] {
(byte) 0x30, // READ
(byte) 37 // page address
});
if ((response != null) && (response.length >= 16)) { // read always returns 4 pages
boolean prot = false; // false = PWD_AUTH for write only, true = PWD_AUTH for read and write
int auth0 = 0; // first page to be protected, set to a value between 0 and 37 for NTAG212
response = nfc.transceive(new byte[] {
(byte) 0xA2, // WRITE
(byte) 37, // page address
response[0], // keep old value for byte 0
response[1], // keep old value for byte 1
response[2], // keep old value for byte 2
(byte) (auth0 & 0x0ff)
});
}
如果使用
MifareUltralight
标记技术,则可以直接使用transceive
和readPages
方法,而不是直接使用writePage
方法:READ命令
byte[] response = nfc.transceive(new byte[] {
(byte) 0x30, // READ
(byte) (pageAddress & 0x0ff) // page address
});
等价于
byte[] response = nfc.readPages(pageAddress);
WRITE命令
byte[] data = { (byte)..., (byte)..., (byte)..., (byte)... };
byte[] response = nfc.transceive(new byte[] {
(byte) 0xA2, // WRITE
(byte) (pageAddress & 0x0ff), // page address
data[0], data[1], data[2], data[3]
});
等价于
nfc.writePage(pageAddress, data);