This module presents the MIFARE SAM AV2 product and positioning.
City
Warsaw
Starting
17.10.2019
Ending
17.10.2019
Schedule
9 am - 5 pm
Language
English
$833
Session Contents
MIFARE® SAM portfolio and product overview
MIFARE SAM family evolution and feature comparison. Marketing introduction and positioning. What is MIFARE SAM AV3 and when to use it. MIFARE SAM AV3 operating modes. Supported contactless products.
MIFARE® SAM AV3 interfaces.
S-mode and X-mode architecture. ISO/IEC 7816 host interface. I2C target host interface. I2C X-mode for direct pass-through connection with selected NXP reader IC. APDU-based communication T=1 protocol.
MIFARE® SAM AV3 architecture
Supported cryptographic algorithms. Symmetric key store table and symmetric key store properties. Key usages counter storage table and settings. PKI key storage table and settings. Host, PICC, OfflineCrypo, OfflineUpload, OfflineChange and OfflinePerso key class types. Key versioning and diversification. Usage hints and recommendations.
MIFARE® SAM AV3 personalization and host communication
MIFARE SAM AV3 lifecycle, activation, and lock/unlock command. Host authentication command. Plain, MACed and full protected secure messaging options. Concept of logical channels and secure host / backend communication.
MIFARE® SAM AV3 commands overview
Overview of MIFARE SAM AV3 group of commands, including: security and configuration commands, key management commands, data processing commands, PICC-specific commands, PKI-commands and X-interface commands.
Session audience
Technical managers
Sales engineers
Business development managers
MIFARE solution developers
Prerequisites
Basic technical knowledge
Basic concepts of security and symmetric cryptography.
Basic knowledge of MIFARE DESFire or MIFARE Plus or previous participation to MO2 and MO3 (recommended).
Materials required
Laptop, webcam and stable internet connectivity
Documentation and material delivered
PDF booklet with all training slides
Venue details
To be advised
Other information
MobileKnowledge reserves the right to cancel a course one week before the start of the training. MobileKnowledge reserves the right to alter or cancel any of the arrangements relating directly or indirectly to an event, for any circumstances beyond the reasonable control of MobileKnowledge. This includes the cancellation of an event itself. MobileKnowledge maximum liability is limited to a full refund of the workshop registration fee.
Attendance is personal and non-transferable.
Cancellation & refunds:
Cancellation more than 15 days before the event: 100% refund
Cancellation less than 15 days, but more than 7 days: 50% refund
Cancellation less than 7 days: no refund.
The training fees do not include taxes, duties or any other deduction regulated by each country.
Requirements
NXP Non-Disclosure Agreement. If not available, we will organize it after registration is completed
Laptop with Windows 7 with administration rights is required, and for Module 5 an Android or iOS device with BLE.
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.