<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: NFC NTAG213 READ_SIG Originality Signature Verification Using ACS ACR1552U NFC USB Reader in NFC</title>
    <link>https://community.nxp.com/t5/NFC/NFC-NTAG213-READ-SIG-Originality-Signature-Verification-Using/m-p/1888958#M11808</link>
    <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.nxp.com/t5/user/viewprofilepage/user-id/235103"&gt;@ChiChi&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;Hope you are doing well.&lt;/P&gt;
&lt;P&gt;Please, consider that our support scope is limited to the usage of our &lt;A href="https://www.nxp.com/products/wireless-connectivity/nfc-hf/nfc-readers:NFC-READER" target="_blank"&gt;NFC Readers&lt;/A&gt;, our recommended &lt;A href="https://www.nxp.com/design/design-center/development-boards-and-designs/nfc-reader-library-software-support-for-nfc-frontend-solutions:NFC-READER-LIBRARY" target="_blank"&gt;NFC Reader Library&lt;/A&gt; and Software Tools such as &lt;A href="https://www.nxp.com/products/rfid-nfc/mifare-hf/mifare-desfire/rfiddiscover:RFID-DISCOVER" target="_blank"&gt;RFIDDiscover&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;Since this implementation is running on a third-party reader device, I will recommend you please contact the manufacturer for more information on its commands and responses, perhaps you may need to take care, for example, of the endianness of the data.&lt;/P&gt;
&lt;P&gt;Regards,&lt;BR /&gt;Eduardo.&lt;/P&gt;</description>
    <pubDate>Mon, 17 Jun 2024 22:10:33 GMT</pubDate>
    <dc:creator>EduardoZamora</dc:creator>
    <dc:date>2024-06-17T22:10:33Z</dc:date>
    <item>
      <title>NFC NTAG213 READ_SIG Originality Signature Verification Using ACS ACR1552U NFC USB Reader</title>
      <link>https://community.nxp.com/t5/NFC/NFC-NTAG213-READ-SIG-Originality-Signature-Verification-Using/m-p/1888739#M11805</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I am using the ACS ACR1552U NFC USB reader to read the originality signature from NTAG213 tags. The reading of the data is successful but the actual signature data does not appear to be correct. I'll try to explain in more detail.&lt;BR /&gt;&lt;BR /&gt;Firstly, please note that I have confirmed my signature verification &lt;EM&gt;should&lt;/EM&gt; be correct as per the following post:&amp;nbsp;&lt;A href="https://community.nxp.com/t5/NFC-Knowledge-Base/Demo-for-Originality-Signature-Verification/ta-p/1278669" target="_blank" rel="noopener"&gt;Demo for Originality Signature Verification - NXP Community&lt;/A&gt;. This was checked by executing the example ECDSA verification algorithm against other known NTAG213 UIDs and signatures, e.g.:&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ChiChi_0-1718627312134.png" style="width: 400px;"&gt;&lt;img src="https://community.nxp.com/t5/image/serverpage/image-id/284453i326D9E356F8C38F4/image-size/medium?v=v2&amp;amp;px=400" role="button" title="ChiChi_0-1718627312134.png" alt="ChiChi_0-1718627312134.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;For my specific setup, I'm using an ACS ACR1552U NFC USB reader which works nicely for reading/writing from/to the manufacturing data, user memory data, and the dynamic lock bytes. I used the following ACR1552U commands for general read/write, respectively:&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ChiChi_1-1718627788141.png" style="width: 400px;"&gt;&lt;img src="https://community.nxp.com/t5/image/serverpage/image-id/284455i8C6D06609338D63F/image-size/medium?v=v2&amp;amp;px=400" role="button" title="ChiChi_1-1718627788141.png" alt="ChiChi_1-1718627788141.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ChiChi_2-1718627828289.png" style="width: 400px;"&gt;&lt;img src="https://community.nxp.com/t5/image/serverpage/image-id/284456iAA07E86624D8940A/image-size/medium?v=v2&amp;amp;px=400" role="button" title="ChiChi_2-1718627828289.png" alt="ChiChi_2-1718627828289.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;As for reading the originality signature, this was slightly more complicated. I had to use the Transparent Exchange command to passthrough the READ_SIG command to the NTAG213, as shown below.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;Transparent Exchange command (ACR1552U):&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ChiChi_0-1718623088322.png" style="width: 400px;"&gt;&lt;img src="https://community.nxp.com/t5/image/serverpage/image-id/284445i870875299874531B/image-size/medium?v=v2&amp;amp;px=400" role="button" title="ChiChi_0-1718623088322.png" alt="ChiChi_0-1718623088322.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ChiChi_1-1718623161717.png" style="width: 400px;"&gt;&lt;img src="https://community.nxp.com/t5/image/serverpage/image-id/284446i1DA98E9F5DB62DD3/image-size/medium?v=v2&amp;amp;px=400" role="button" title="ChiChi_1-1718623161717.png" alt="ChiChi_1-1718623161717.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ChiChi_2-1718623194456.png" style="width: 400px;"&gt;&lt;img src="https://community.nxp.com/t5/image/serverpage/image-id/284447iC26BFE685CD1016A/image-size/medium?v=v2&amp;amp;px=400" role="button" title="ChiChi_2-1718623194456.png" alt="ChiChi_2-1718623194456.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;READ_SIG command (NTAG213):&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ChiChi_3-1718623270431.png" style="width: 400px;"&gt;&lt;img src="https://community.nxp.com/t5/image/serverpage/image-id/284448i920FB298D3C79F4D/image-size/medium?v=v2&amp;amp;px=400" role="button" title="ChiChi_3-1718623270431.png" alt="ChiChi_3-1718623270431.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;The combined PDU is as follows (for a C# implementation):&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ChiChi_3-1718628203564.png" style="width: 400px;"&gt;&lt;img src="https://community.nxp.com/t5/image/serverpage/image-id/284460i1F37E4CE5E22404C/image-size/medium?v=v2&amp;amp;px=400" role="button" title="ChiChi_3-1718628203564.png" alt="ChiChi_3-1718628203564.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;When the above method is called, the following 36 signature bytes (for a tag with UID 04-90-EB-42-97-12-90) was returned (in hexadecimal format):&lt;BR /&gt;&lt;BR /&gt;C0-03-00-90-00-14-82-90-33-A7-18-1A-B2-CF-59-4D-03-BC-D1-22-81-A9-BA-D5-73-14-33-90-46-88-BE-7B-41-5D-90-00&lt;/P&gt;&lt;P&gt;I was expecting 32 bytes, possibly with a couple of response codes at the end but the ACR1552U datasheet does not make this clear.&lt;/P&gt;&lt;P&gt;Anyhow, I tried to verify the above signature using the first 32 bytes and the result was a fail. I tried again by dropping the first byte (e.g. 0xC0) and verifying the next 32 bytes but the result was also a fail. I repeated this until the last 32 bytes remained. In all cases, the verification result was a fail.&lt;BR /&gt;&lt;BR /&gt;Hoping someone here can spot my mistake and point me in the right direction. All feedback appreciated.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;Thank you in advance,&lt;BR /&gt;Chi&lt;/P&gt;</description>
      <pubDate>Mon, 17 Jun 2024 13:32:23 GMT</pubDate>
      <guid>https://community.nxp.com/t5/NFC/NFC-NTAG213-READ-SIG-Originality-Signature-Verification-Using/m-p/1888739#M11805</guid>
      <dc:creator>ChiChi</dc:creator>
      <dc:date>2024-06-17T13:32:23Z</dc:date>
    </item>
    <item>
      <title>Re: NFC NTAG213 READ_SIG Originality Signature Verification Using ACS ACR1552U NFC USB Reader</title>
      <link>https://community.nxp.com/t5/NFC/NFC-NTAG213-READ-SIG-Originality-Signature-Verification-Using/m-p/1888958#M11808</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.nxp.com/t5/user/viewprofilepage/user-id/235103"&gt;@ChiChi&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;Hope you are doing well.&lt;/P&gt;
&lt;P&gt;Please, consider that our support scope is limited to the usage of our &lt;A href="https://www.nxp.com/products/wireless-connectivity/nfc-hf/nfc-readers:NFC-READER" target="_blank"&gt;NFC Readers&lt;/A&gt;, our recommended &lt;A href="https://www.nxp.com/design/design-center/development-boards-and-designs/nfc-reader-library-software-support-for-nfc-frontend-solutions:NFC-READER-LIBRARY" target="_blank"&gt;NFC Reader Library&lt;/A&gt; and Software Tools such as &lt;A href="https://www.nxp.com/products/rfid-nfc/mifare-hf/mifare-desfire/rfiddiscover:RFID-DISCOVER" target="_blank"&gt;RFIDDiscover&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;Since this implementation is running on a third-party reader device, I will recommend you please contact the manufacturer for more information on its commands and responses, perhaps you may need to take care, for example, of the endianness of the data.&lt;/P&gt;
&lt;P&gt;Regards,&lt;BR /&gt;Eduardo.&lt;/P&gt;</description>
      <pubDate>Mon, 17 Jun 2024 22:10:33 GMT</pubDate>
      <guid>https://community.nxp.com/t5/NFC/NFC-NTAG213-READ-SIG-Originality-Signature-Verification-Using/m-p/1888958#M11808</guid>
      <dc:creator>EduardoZamora</dc:creator>
      <dc:date>2024-06-17T22:10:33Z</dc:date>
    </item>
    <item>
      <title>Re: NFC NTAG213 READ_SIG Originality Signature Verification Using ACS ACR1552U NFC USB Reader</title>
      <link>https://community.nxp.com/t5/NFC/NFC-NTAG213-READ-SIG-Originality-Signature-Verification-Using/m-p/1890732#M11816</link>
      <description>&lt;P&gt;Hi Eduardo,&lt;/P&gt;&lt;P&gt;Thank you for your response and after some digging, I think I have tracked down the root cause of my issue. In case anybody else come across the same problem, I shall document my findings here.&lt;/P&gt;&lt;P&gt;First thing I tried was to remove my software from the equation and I did so by using the NFC reader manufacturer's own tool which supports command scripting. The specific tool I used was the "&lt;A href="https://www.acs.com.hk/download-utility-tools/11123/11123-utility-tools-acs-script-tool-5.zip" target="_blank" rel="noopener"&gt;ACS Script Tool 5&lt;/A&gt;" running in a Windows 11 environment.&lt;/P&gt;&lt;P&gt;The specific command I used was:&amp;nbsp;FF C2 00 01 04 95 02 3C 00 00. This corresponds to the Transparent Exchange command in transceive mode. And the NXP NTAG213 command being transceived is 3C 00, which corresponds to the READ_SIG custom command.&lt;/P&gt;&lt;P&gt;Below is a screenshot of the observed result after running the command:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ChiChi_0-1718825141527.png" style="width: 400px;"&gt;&lt;img src="https://community.nxp.com/t5/image/serverpage/image-id/284939i889E77FDEFB2BB09/image-size/medium?v=v2&amp;amp;px=400" role="button" title="ChiChi_0-1718825141527.png" alt="ChiChi_0-1718825141527.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;To highlight the issue, I have underlined the signature payload bytes. The other bytes in the response indicates that the command was executed successfully (according to the following&amp;nbsp;&lt;A href="https://www.eftlab.com/knowledge-base/complete-list-of-apdu-responses" target="_blank" rel="noopener"&gt;List of APDU Responses&lt;/A&gt;), e.g.:&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ChiChi_1-1718825381749.png" style="width: 400px;"&gt;&lt;img src="https://community.nxp.com/t5/image/serverpage/image-id/284940i51ECF0744F468DD9/image-size/medium?v=v2&amp;amp;px=400" role="button" title="ChiChi_1-1718825381749.png" alt="ChiChi_1-1718825381749.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;The second thing I did was to remove the ACR1552U USB NFC reader from the equation. Unfortunately, I did not have access to any other NFC readers other than a smart phone. Nevertheless, it was really just to confirm that the NTAG213 NFC tag itself is behaving correctly. Indeed it does as shown in the next screenshot:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ChiChi_2-1718825876000.png" style="width: 400px;"&gt;&lt;img src="https://community.nxp.com/t5/image/serverpage/image-id/284941iC0A0087B127D650E/image-size/medium?v=v2&amp;amp;px=400" role="button" title="ChiChi_2-1718825876000.png" alt="ChiChi_2-1718825876000.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;The above findings have been reported to ACS but I have not yet received any responses to confirm or deny whether there is an issue.&lt;/P&gt;&lt;P&gt;Lastly, the AR1552U NFC reader that I am using has the following configuration:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ChiChi_3-1718826093803.png" style="width: 400px;"&gt;&lt;img src="https://community.nxp.com/t5/image/serverpage/image-id/284942i3752C08C709233DD/image-size/medium?v=v2&amp;amp;px=400" role="button" title="ChiChi_3-1718826093803.png" alt="ChiChi_3-1718826093803.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Hopefully this is useful to someone who is also going down a rabbit hole.&lt;/P&gt;&lt;P&gt;Cheers,&lt;BR /&gt;Chi&lt;/P&gt;&lt;P&gt;P.S. For completeness, here is the signature verification result (C# implementation):&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ChiChi_0-1718827311075.png" style="width: 400px;"&gt;&lt;img src="https://community.nxp.com/t5/image/serverpage/image-id/284946iDAC775CAA9F82B5C/image-size/medium?v=v2&amp;amp;px=400" role="button" title="ChiChi_0-1718827311075.png" alt="ChiChi_0-1718827311075.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 19 Jun 2024 20:02:44 GMT</pubDate>
      <guid>https://community.nxp.com/t5/NFC/NFC-NTAG213-READ-SIG-Originality-Signature-Verification-Using/m-p/1890732#M11816</guid>
      <dc:creator>ChiChi</dc:creator>
      <dc:date>2024-06-19T20:02:44Z</dc:date>
    </item>
    <item>
      <title>Re: NFC NTAG213 READ_SIG Originality Signature Verification Using ACS ACR1552U NFC USB Reader</title>
      <link>https://community.nxp.com/t5/NFC/NFC-NTAG213-READ-SIG-Originality-Signature-Verification-Using/m-p/1978389#M12227</link>
      <description>&lt;P&gt;Hello Chi,&lt;/P&gt;&lt;P&gt;we have stumbled over the "3 missing Bytes at the end of the response" topic as well with our ACS1552U reader for literally any command that we are sending to NFC Forum Type 2 Tags (like the NTAG213) and have found the following fix:&lt;BR /&gt;For NFC Type 2 Tags (like NTAG213), when sending a "Transparent Exchange" command, you need to&lt;BR /&gt;1) Start a Transparent Session,&lt;BR /&gt;2) Change/set the protocol to ISO/IEC 14443-A, Layer 3,&amp;nbsp;&lt;BR /&gt;and only after that:&lt;BR /&gt;3) Send the "Transparent Exchange" command,&lt;BR /&gt;4)&amp;nbsp;Close the Transparent session.&lt;BR /&gt;Then the last 3 Bytes of the response from the tag will no longer get swallowed by the ACS1552U reader.&lt;BR /&gt;&lt;BR /&gt;I.e.:&lt;BR /&gt;1) FF C2 00 00 81 00 (Start Transparent Session)&lt;BR /&gt;2) FF C2 00 02 04 8F 02 00 03 (Set protocol to "ISO/IEC 14443-A, Layer 3)&lt;BR /&gt;3) FF C2 00 01&amp;nbsp;&lt;SPAN&gt;04 95 02 3C 00 00 (Send "Read Signature" command - then in the answer, the last three bytes are no longer missing)&lt;BR /&gt;4) FF C2 00 00 82 00 (End/Close Transparent Session)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Hope this helps with the ACS1552U reader.&lt;BR /&gt;On the signature part of the question, I didn't look into it in detail.&lt;BR /&gt;&lt;BR /&gt;Best regards&lt;BR /&gt;Thomas&lt;/P&gt;</description>
      <pubDate>Mon, 21 Oct 2024 15:51:38 GMT</pubDate>
      <guid>https://community.nxp.com/t5/NFC/NFC-NTAG213-READ-SIG-Originality-Signature-Verification-Using/m-p/1978389#M12227</guid>
      <dc:creator>ThGTgs</dc:creator>
      <dc:date>2024-10-21T15:51:38Z</dc:date>
    </item>
  </channel>
</rss>

