Smart card ATR parsing

Enter an ATR (Answer To Reset) and I will parse it for you.

Results

Parsing ATR:

3B FE 91 00 FF 91 81 71 FE 40 00 41 20 00 81 80 71 90 67 46 4A 00 68 08 04 C1
TS = 0x3BDirect Convention
T0 = 0xFEY(1): b1111, K: 14 (historical bytes)
TA(1) = 0x91Fi=512, Di=1, 512 cycles/ETU (7812 bits/s at 4.00 MHz, 9765 bits/s for fMax=5 MHz)
TB(1) = 0x00VPP is not electrically connected
TC(1) = 0xFFExtra guard time: 255 (special value)
TD(1) = 0x91Y(i+1) = b1001, Protocol T=1
----
TA(2) = 0x81Protocol to be used in spec mode: T=1 - Unable to change - defined by interface bytes
TD(2) = 0x71Y(i+1) = b0111, Protocol T=1
----
TA(3) = 0xFEIFSC: 254
TB(3) = 0x40Block Waiting Integer: 4 - Character Waiting Integer: 0
TC(3) = 0x00Error detection code: LRC
----
Historical bytes41 20 00 81 80 71 90 67 46 4A 00 68 08 04
Category indicator byte: 0x41 (proprietary format) " ...q.gFJ.h.."
TCK = 0xC1correct checksum

Possibly identified card: UNKNOWN

Click here to enter the card description

Canonical URL JSON output

Again

Submit another ATR


See also

The parsing code is part of pyscard and is available at parseATR.py.

The list of known ATR is also available online at smartcard_list.txt.

My blog contains a serie of artickes about ATR bytes.

More documentation: