X-Git-Url: https://git.rohieb.name/hackover2013-badge-firmware.git/blobdiff_plain/9d18e10afb2439a6a9ba6978a799259746a837b7..6b0c700242b29c4e6eed4ca4443b113d21bb5c61:/tools/examples/sensors/pn532/ISO14443A_ID/readme.txt?ds=sidebyside diff --git a/tools/examples/sensors/pn532/ISO14443A_ID/readme.txt b/tools/examples/sensors/pn532/ISO14443A_ID/readme.txt index 020a1fd..ece0dda 100644 --- a/tools/examples/sensors/pn532/ISO14443A_ID/readme.txt +++ b/tools/examples/sensors/pn532/ISO14443A_ID/readme.txt @@ -5,7 +5,8 @@ the RF field, and then try to determine the specific card model (SENS_RES and SEL_RES) as well as the card's NFCID. All information will be sent to USBCDC by default, with the -PN532 breakout board connected via UART. +PN532 breakout board connected via either UART or I2C (the +bus can be selected in PN532_bus.h). HOW TO USE THIS EXAMPLE ============================================================ @@ -19,6 +20,20 @@ HOW TO USE THIS EXAMPLE RXD TXD 3.3V 3.3V + Set SEL0 to Off and SEL1 to Off (= UART) + + or via I2C as follows: + + PN532 LPC1343 + ----- ------- + GND GND + SDA SDA + SCL SCL + IRQ 3.2 + 3.3V 3.3V + + Set SEL0 to On and SEL1 to Off (= I2C) + 2.) Configure your terminal software to open the USB COM port at 115K. @@ -28,3 +43,47 @@ HOW TO USE THIS EXAMPLE (Mifare Classic, etc.) and try to read it's ID. Once a card is found, the reader will start looking again for a card after a 1 second delay. + +SAMPLE OUTPUT +============================================================ + +When a card is placed in the field you should see results +similar to the following (results shown for several +different card types): + + Waiting for an ISO14443A card (Mifare Classic, etc.) + + Received : 00 00 ff 0c f4 d5 4b 01 01 00 04 08 04 9e b3 6e 66 a9 00 + Tags Found : 1 + SENS_RES : 00 04 + SEL_RES : 08 + NFCID : 9e b3 6e 66 + Seems to be a Mifare Classic 1K Card + + Waiting for an ISO14443A card (Mifare Classic, etc.) + + Received : 00 00 ff 0c f4 d5 4b 01 01 00 02 18 04 8a 4c b5 12 23 00 + Tags Found : 1 + SENS_RES : 00 02 + SEL_RES : 18 + NFCID : 8a 4c b5 12 + + Waiting for an ISO14443A card (Mifare Classic, etc.) + + Received : 00 00 ff 0f f1 d5 4b 01 01 00 44 00 07 04 7b cb 51 96 22 80 c0 00 + Tags Found : 1 + SENS_RES : 00 44 + SEL_RES : 00 + NFCID : 04 7b cb 51 96 22 80 + + Waiting for an ISO14443A card (Mifare Classic, etc.) + + Received : 00 00 ff 0c f4 d5 4b 01 01 00 04 08 04 6e 8a e2 b0 44 00 + Tags Found : 1 + SENS_RES : 00 04 + SEL_RES : 08 + NFCID : 6e 8a e2 b0 + Seems to be a Mifare Classic 1K Card + + Waiting for an ISO14443A card (Mifare Classic, etc.) +