Enter an ATR (Answer To Reset) and I will parse it for you.
Parsing ATR:
TS = 0x3B | Direct Convention |
---|---|
T0 = 0xD6 | Y(1): b1101, K: 6 (historical bytes) |
TA(1) = 0x18 | Fi=372, Di=12, 31 cycles/ETU (129032 bits/s at 4.00 MHz, 161290 bits/s for fMax=5 MHz) |
TC(1) = 0x00 | Extra guard time: 0 |
TD(1) = 0x81 | Y(i+1) = b1000, Protocol T=1 |
---- | |
TD(2) = 0xB1 | Y(i+1) = b1011, Protocol T=1 |
---- | |
TA(3) = 0x80 | IFSC: 128 |
TB(3) = 0x7D | Block Waiting Integer: 7 - Character Waiting Integer: 13 |
TD(3) = 0x1F | Y(i+1) = b0001, Protocol T=15 |
---- | |
TA(4) = 0x03 | Clock stop: not supported - Class accepted by the card: (3G) A 5V B 3V |
---- | |
Historical bytes | 80 51 00 61 10 30 |
Category indicator byte: 0x80 | (compact TLV data object) Tag: 5, Len: 1 (card issuer's data) Card issuer data: 00 "." Tag: 6, Len: 1 (pre-issuing data) Data: 10 "." Tag: 3, Len: 0 (card service data byte) Error in the ATR: expecting 1 byte and got 0 |
TCK = 0x8F | correct checksum |
Error: Error in the ATR: expecting 1 byte and got 0
Possibly identified card:
3B D6 18 00 81 B1 80 7D 1F 03 80 51 00 61 10 30 8F
ASECard Crypto
The parsing code is part of pyscard and is available at parseATR.py.
The list of known ATR is also available online at smartcard_list.txt.