Enter an ATR (Answer To Reset) and I will parse it for you.
Parsing ATR:
TS = 0x3B | Direct Convention |
---|---|
T0 = 0x9C | Y(1): b1001, K: 12 (historical bytes) |
TA(1) = 0x97 | Fi=512, Di=64, 8 cycles/ETU (500000 bits/s at 4.00 MHz, 625000 bits/s for fMax=5 MHz) |
TD(1) = 0x80 | Y(i+1) = b1000, Protocol T=0 |
---- | |
TD(2) = 0x11 | Y(i+1) = b0001, Protocol T=1 |
---- | |
TA(3) = 0x40 | IFSC: 64 |
---- | |
Historical bytes | 52 75 74 6F 6B 65 6E 45 43 50 73 63 |
Category indicator byte: 0x52 | (proprietary format) "utokenECPsc" |
TCK = 0xC0 | correct checksum |
Possibly identified card:
3B 9C 97 80 11 40 52 75 74 6F 6B 65 6E 45 43 50 73 63 C0
Aktiv Rutoken ECP 3.0 NFC (PKI)
The parsing code is part of pyscard and is available at parseATR.py.
The list of known ATR is also available online at smartcard_list.txt.