?_lp'f   C (3n?>0>>0330>>0>>0>>0330>>0>>0330>0>0>063AT"bW0:R6* X+`6/&;)z4K|CONTEXTө|CTXOMAP|FONTO|SYSTEM:|TOPIC|TTLBTREE|bm0|bm1|bm10*|bm2#|bm3ۓ|bm4|bm5S |bm6D"|bm7;|bm8%|bm9lp!e {: ^f^   ) %ƥB֭45f^C )(H BF!D#"D"#"D"#"D"#"D"#"D"#"D"#"D"#"D"#"D"#"D"#"D"#"D"#"D"#"D"#"D"#"D"#".."."#"1,."."#"2,".","#"2,"."+"!"#"2,".""*!"#"2,"."*"/!"#"2,"."")"!"#"2,"."*"/!"#"2,"."")"!"#"2,"."*"/!"#"2,"."")"!"#"2 """//"/"/""/ "."""""""/!"#"2 "/""/""/"/""//""/ "."""/""""/"!"#"2 """//""/"/"""/"/ ".""""/"""/!"#"2 ""/""/"/"""// "."""""/"/"!"#"2 ""/"/"""/""/ ".""""/""/!"#"2 ""/""//""//""/ "."""""/""!"#"2 """//"/""/ ".""""/""/!"#"2 """/"/ "."""""/"/"!"#"2 "/"""/ ".""/"""""/!"#"2 ""/ ".""""""/"!"#"2,"."*"/!"#"2,"."")"!"#"2,"."*"/!"#"2,"."")"!"#"2,".""*/!"#"2,"."+"!"#"2,"."+"!"#"2,".",3"#"-3?."."#"D"#"D"#"D"#"D"#"D"#"D"#"D"#"D"#"D"#"D"#"D"#"D"#"D"#!B##"B"##"B"##"B"##"B"##"B"##"B"##"B"##"B"##"B"##"B"##"B"##"B"##"B"##"B"##"B"##"B"## "k3I"## "i"#I"## "a#I"## "a!#I"## "a#"#I"## "a#"#I"## "a#"#I"## ">#"#I"## "?#"#I"## "?#"#I"## "?#""/"#I"## "?#""""#I"## "?#"/""#I"## ">#""#I"## " ?#"#I"## " ?#"#I"## "M#"#I"## "a#"#I"## "a#"#I"## "a#"#I"## "a#3#I"## "a"/#I"## "i#I"## "jI"##"B"##"B"##"B"##"B"##"B"##"B"##"B"##"B"##"B"##"B"##"B"##"B"##"B"##"B"##"B"##"B"##""""##"""""##"/""""## """"/"/"//""/"/"""/""/""/""""/"""/"""/"/"l"## """"/"/""/""""""/""/""/""/""/"/""/""/"//""/"/""/""p"## "//"//"/"/""/""""""/""/""/""/"/"/""/""/"/"/""/""l"## "//"//"/"/""/"""/"/""/"""/""/""/"//""/""//"/""/"/"l"## "//"//"/"/"/"""/"/""/""/""/""/""/"/"""/""/""/"/""/""l"## """//""/""""""/""/""/""/""//""/""/"//""/""/""/"""/l"## """//"//"/"""/"""//"""""""//"""/"/"k"## "/""/""//""""/" "/ ""k"## "/""/""//""""/" "/ ""k"## "/""/""//""""/"/l"##"B"##"B"##"B"##"B"##"B"##"B"##"B"##"B"##"B"##"B"##"B"##"B"##"B"##"B"##"B"##"B"##"B"##"B"##"B"## "#l3I"## "!k"#I"## "!b#I"## "!b!#I"## "!b#"#I"## "!b#"#I"## "!b#"#I"## "!P#"#I"## "!P#"#I"## "!P#"#I"## "!P#""/"#I"## "!P#""""#I"## "!P#"/""#I"## "!P#""#I"## "!P#"#I"## "!P#"#I"## "!P#"#I"## "!b#"#I"## "!b#"#I"## "!b#"#I"## "!b#3#I"## "!b"/#I"## "!k#I"## "!kI"##"B"##"B"##"B"##"B"##"B"##"B"##"B"##"B"##""/<"##""/<"##""/<"## """"/"/"//""/"/"/""/"/"//""/"""//"/"/""/""""/"""/""""/""/"/"/"/"/"/"//"""""""//"/"/""/"/"/"/""""## """"/"/""/"""/"/"/""/"/""/""//"""""/"""/"/""/""/"/""/""/"//""/"/"/""/"""/""/"/""/""//"/"/"""""/""""/"/""/""/"/""/""/"## "//"//"/"/""/"""/"/"/"/"/""/"""/""/"""/"/""/"/"/""/""/"/"""/""/""/""/"/""""/"/"/""/""/"/""""/"/""/"/""/"/"""## "//"//"/"/""/"""/"/"//"/""/"""/"""/"""/"/"""/"//""/""//""""/""/""/"/""""/"/"/""/""/"/""""/"/"""/"/""/"/"/"""## "//"//"/"/"/"""/"/"/""/"/"/"""/"""""/"""/"/""/""/"/"""/""/""/"/"/""/""/"/""/"""/"/"/""/""/"/""""/"/""/""/"/""/"""/"""## """//""/"""//"/""//""/""//"""""/"""//""/""//""/""/"//""/""/"/""/"""/""//""/""//"//""""""/""""//""/""//""/""/""/"## """//"//""///""///"/""//"///"/""//"""""""//"""""/""//"/"///"//""""""///"/""//"/"/""""## "/""/""//"""/"""/"$"/"/""/"/ "/"""## "/""/""//"""/"""/"$"/"/""/"/ "/"""## "/""/""// " ""/"/"""""""/"/ "/"##"B"##"B"##"B"##"B"##"B"##"B"##"B"##"B"##"B"##"B"##"B"##"B"##"B"##"B"##"B"##"B"##"B"##"B"##3B3#"D"#!B#!B#!7 #!71 #!/2"!#!12"!#!12"!#!l2""""/"!#!l2""""!#!l2""//""!#!l2"""!#!l2"/"!#!l2"""!#!m2""//""!#!  w2""""!#!   w2""""/"!#!   u2"!#!72"!#!72"!#!72"!#!7 3#!B#!B#"D"#3D3"E"/-4',p#plp P ^  L$* ^.9 %!RRwƌƥB֥֭45^C !^.9(!8  !RRwBQ<O;G;G;G;G;G;G;G;G;G;G;G4G4G2G2G2G2G2G2G2G2G2G2GGGGGGGGGGG2G2G2G22222224;G;G;G;G;G;G;G4G3 2 2 2 2 2 2 2 2G2G2GGGGGG222 2G2G2G2G2G2G2  4  ;;;;;;; ;  ;G;G;G;G;G;O;P<     X,W2oB1p81p71q71q7r7r7s7s7t7t7u7u7v7v8v81vN1v@1vN1v@1vN*@*N+>)  666"666 "666"666 !666!66  66 6     !  N   @   N   @ 2  1   2   1   666666666 666666 666666  877 )  6662666 16662666 2666N6!@6!N6!> !      !         !666N666@666N666@666N666@666N877>+ !( (  ( (  (!(  ( !o ]!]N]@꺪꺪]N꺪]@꺪]N꺪]@hNh> ]  !o (  ( (  ( (  ( ( ( (N*@"N!@ N @ N > 꺪 ! 꺪  꺪   꺯     !  " "   ! N @ N @ N @ N >  !           !  " "   ! N @ N @ N I N G * * * * , * * @  @ > N I N I N I N G      DE.E .D.DNDICNCI N 4 4 4 * ) ) *D+E)E*D0D 0D0CNCI N I N I N G 3 3D3E3E3D3D3D 3C 3C 3 N I N I N I N ID 7E7E7D7D7D꺯8C꺪:C꺪7 꺪7 7 N N N N!W" W+/W/&z/&z/&z/&z&zzzzzzzz z z z &z &z/&z/&z/&{/&{.Z.[    &hh&h f e e e eefiiil l *@ +? wwGwwWww8!?]m8舎舎興?]m8>ffMf8>]m8>]m8>UUMeUU8舎=]m8舎舎=]m8 MUUMuUU8 M]݁8 J]݁8a Ĺ8a "a l -4'NNlpd "  "(! (. . %ƥB֭45C (. .(v BZ!Y#"X"!#!W!##"V"!!##"V"!!##"V"!!##"V"!!##"V"!!##"V"!!##"V"!!##"/4?"/4"!!##"#3?"/4"!!##"#3"?"/12"!!##"#3"?"/21"!"!!##"#3"?"/21"!"!!##"#3"?"/21"!"!!##"#3"?"/21"!"!!##"#3"?"/21"!"!!##"#3"?"/21"!"!!##"#3"?"/21"!"!!##"#3"?"/21"!"!!##"#3"?"/21"!"!!##"#"/"/"""/""?"/2"/"/""/"!"!!##"#""/""/""/"""/""?"/2""/"/"""!"!!##"#"/""/""/"""?"/2"/"/"/"!"!!##"#"/""/""/"""?"/2"/"/""!"!!##"#"/"/""/""/""?"/2"/"//"!"!!##"#"/""/""/"""/""?"/2"/"/"!"!!##"#"/"/""""/""?"/2"/"//"!"!!##"#"/"""?"/2"/"/""!"!!##"#""/""?"/2""/"/"/"!"!!##"#"/""?"/2"/"/"""!"!!##"#3"?"/21"!"!!##"#3"?"/21"!"!!##"#3"?"/21"!"!!##"#3"?"/21"!"!!##"#3"?"/21"!"!!##"#3"?"/21"!"!!##"#3"?"/21"!"!!##"#3"?"/21"!"!!##"#3"?"/21"!"!!##"#3"?"/33"!!##"#33??"/4"!!##"V"!!##"V"!!##"V"!!##"V"!!##"V"!!##"V"!!##"V"!!##"V"!!##"V"!!##"V"!!##"V"!!##"V"!!##"V"!!##3V31!#"3W3!#!V!#!2"U"!#!2"U"!#!2"U"!#!2"U"!#!2"U"!#!2"U"!#!2"U"!#!2"U"!#!2"U"!#!2"U"!#!2"U"!#!2"U"!#!2"U"!#!2"U"!#!2"U"!#!2"U"!#!2"U"!#!2"U"!#!2"U"!#!2"U"!#!2 "3A3 "!#!2 "!@ "!#!2 "!2"?" "!#!2 "!2"?" "!#!2 "!2"?" "!#!2 "!2"?" "!#!2 "!2"?" "!#!2 "!2"?" "!#!2 "!2"/8o" "!#!2 "!2"#7o" "!#!2 "!2"#7"o" "!#!2 "!2"#7"o" "!#!2 "!2"#7"o" "!#!2 "!2"#7"o" "!#!2 "!2"#7"o" "!#!2 "!2"# "#""#"#32"#"#"33""33""3#"2"2"2#32"2"o" "!#!2 "!2"# """"#"""!2!2!!2!2!"#!2"o" "!#!2 "!2"# "2"!2""22"""!#"!2!!2!2!2"!2"o" "!#!2 "!2"# "!12"!3!12"!2"""!2"!2!2!3!2"o" "!#!2 "!2"# "!!#"!!12"!2""!2"!2!2!!2"o" "!#!2 "!2"# """!2"!#"!2""!2"!3!2!2"!3"o" "!#!2 "!2"# ""2!#3"""!2"31""!1"1#3!2"o" "!#!2 "!2"#"!2"!2"""""!2""#!""!!!""!!"o" "!#!2 "!2"#"!""!# "!#"" ""o" "!#!2 "!2"#""# "31 ""o" "!#!2 "!2"#"" "!"o" "!#!2 "!2"#7"o" "!#!2 "!2"#7"o" "!#!2 "!2"#7"o" "!#!2 "!2"#7"o" "!#!2 "!2"#7"o" "!#!2 "!2"#7"o" "!#!2 "!2"#73?o" "!#!2 "!2"?" "!#!2 "!2"?" "!#!2 "!2"?" "!#!2 "!2"?" "!#!2 "!2"?" "!#!2 "!2"?" "!#!2 "!2"?" "!#!2 "!2,"#2#"3%"#F" "!#!2 "!2,"#""!2$"F" "!#!2 "!2-"2""!#"#3"F" "!#!2 "!2 "33"#""#""2"2"2#32"33"#32"2"!2"##"#"#32""#"#"#"#32"2"2"2"33"#"""!"#"#332"#322#32#""2#22#3"232"2"2""33"#"#"#3232"2"33""322 " "!#!2 "!2"3""3""""!2!2!"#""!2!!2!2"!#"""#"""""#!2!2!2!2""2"!"#"#"!"#"!"!22"!1#!2!""!2""!!1#!2!2!!2 " "!#!2 "!2"!"2"2"2!2!2!2""""!!2"!2!2"""!2"!2"""""!2"!2!2!2"!2"!12"!"""#"""!2"!2""!22"!2"!"!2"""!""!2"!"!2"!""2 " "!#!2 "!2"!"2"!12!12!2!2!3""""!2"!2!2"2"!2"!3""""!3!2!2!2"!2"!!#"!!""#"""!2"!2""1"!2!2"!2"!2"!2""332"!2"!2"!2332"!2 " "!#!2 "!2""#"!12!12!2!2!""""!#3!2!2!2!2"!2"!""""!!2!2!2"!2"""!"#"""!#3!2"""!2!2"!2"!2"!2""2"!#3!2"!22"!2 " "!#!2 "!2""#"!!#!!#!3!2!2"""""2!3!3!"!#"!22!2"""22!2"!3!3!2"!22"2"!!"#"33"!2"#2!2!22!2"!3"!2"""!22"!3"!2"!2"!2 " "!#!2 "!2""#"""!121#3""31!#3!1"""!3#!#3""##!#3!11"31"!2"!2"!"#"#!#3!#3!#!2!2#1""!3!22"31"#!#3!3!231"32 " "!#!2 "!2""#"""1!""!""!""""""""""!!!"!"""!"!""!#""""""""!"!"""!1"!!""!""""!1"!2!"!!2 " "!#!2 "!2"!"2""!2"!2"!2""!2&"!"#"""" "!2" "!2""!2"!2 " "!#!2 "!2"!""2""!2"!2"!2""2"!"&"!"#"33" "!2"2 "!2""!2"!2 " "!#!2 "!2""!""!""!""!"&"!#" " "!"!"!"!"!!" "!#!2 "!2 "O"!]" "!#!2 "!2"?" "!#!2 "!2"?" "!#!2 "!2"?" "!#!2 "!2"?" "!#!2 "!2"?" "!#!2 "!2"?" "!#!2 "!2"?" "!#!2 "!2"?" "!#!2 "!2"?" "!#!2 "!2"?" "!#!2 "!2!"4"g" "!#!2 "!2!"5"f" "!#!2 "!2 "33"5"/f" "!#!2 "!2"3""3""""/"/"/""""/"/""""/""//"/"/""/"/"/"/"""""/""/f" "!#!2 "!2"!""2""""/"/"/"""""/"""/"/""/""""/"/""/""/"/"/""/"""/""/""e" "!#!2 "!2"!2"//"//"/"/"/""/"""/"/"/"""/"/""/"/"/""""/""/""e" "!#!2 "!2"#"//"//"/"/"/"""/"""/"//"""/"/"""/"/"/""""/""/"/"/e" "!#!2 "!2"#"//"//"/"/"/"""""/"""/"/""/"""/"/""/""/"/"/""/"""/""/"/"/e" "!#!2 "!2"#"""//"/"""""/"""/"/""/""""//""/""///""/"""/""/""d" "!#!2 "!2"#"""/"""//"""/"///"/""///"/"""""//""d" "!#!2 "!2"!2""/""/""/"""""/"" "!#!2 "!2"!2""/""/""/"""""/"" "!#!2 "!2""/""/""/""/"/"" "!#!2 "!2 ""4" "!#!2 "!2"?" "!#!2 "!2"?" "!#!2 "!2"?" "!#!2 "!2"?" "!#!2 "!2"?" "!#!2 "!2"?" "!#!2 "!2"?" "!#!2 "!2"?" "!#!2 "!2"?" "!#!2 "!29"2H"#$3" "!#!2 "!28"!2H"!#"#" "!#!2 "!28"!2H"!"#" "!#!2 "!2 "33"#""#""2"2"2#32"22"2"33"#32"33"#"#"#!232"2"33""2#32"33"#32"#3#"33"#32"2"2"2#32"2"2"2""2"2"2"22"2""2"!"#" "!#!2 "!2"3""3""""!2!2!"#""!!2!2!2""#!2""!1#!2!2!"#""!2!!2"""!2#!2!2!"#!2!2!""!2!2!2!!2!2"!"!"#" "!#!2 "!2"!"2"2"2!2!2!2"""!2!2"!""!2""!2""!"!2"!"!2""""!!2"!2!2!"""!!2"!2!2!2"!2!2""!#!#!2!2!2"!"#" "!#!2 "!2"!"2"!12!12!2!2!3""!2!2332"!2"""!2""!2"!2332!3""""!2"!2!2"""""!2"!2!2!3!2!2""!2!2!2"!"#" "!#!2 "!2""#"!12!12!2!2!""!2!22"!2"""!2""!2"!22!""""!#3!2!2"""""!2"!2!2!!2!2""!2!2!2"!"#" "!#!2 "!2""#"!!#!!#!3!2!2"""!3!2"!2"!2"#"!222!3"!2"!2!2"""""2!3!2"""""12"!3!2!2"!3!2""12!3!2"!"#" "!#!2 "!2""#"""!121#3""11"31""!#331"##!3!231"1#3""31!#3!1#1""31!#3!1"1#3!1"2!2!2!1211"2"!"#" "!#!2 "!2""#"""1!"""!!1"!""!"""!!"!2!!""!""!!"""!""!!!""!!!"!"!"!!1""!"!#" "!#!2 "!2"!"2""!2"!2"!2""!2"!2"" """!2 "!#" "!#!2 "!2"!""2""!2"!2"!2""2"!2"!2"" """2!2 "!#" "!#!2 "!2""!""!""!""! "!"!""!""! "!#" "!#!2 "!2 "w"!#" "!#!2 "!2""!#" "!#!2 "!2""!#" "!#!2 "!2""!#" "!#!2 "!2""!"#" "!#!2 "!2""!"#" "!#!2 "!2""!"#" "!#!2 "!2""!"#" "!#!2 "!2""!"#" "!#!2 "!2""!##" "!#!2 "!2;"#F"!#" "!#!2 "!2;""" "!#!2 "!2;""" "!#!2 "!2 "33"#3"2"#322#3""33"##"#"#32"33"#32"2"2"2#3"#"#32"#"33"#32"33##""322""#32"33"#"#"#"33"#"#"#""#"#"#"##"#""#"#;" "!#!2 "!2"3""3"!2"!"2!2""""#""!2#!2!2!22"#"!2""#!"!!2""#!2""!2""""""""""";" "!#!2 "!2"!"2""!2!2"!"!2"!""!2"!2""""!!2"!2!2!2"!2!2"!2"!""!2""!2""2"!2""!2"!2"!""!2""22!2"""";" "!#!2 "!2"!"2""!2!2""#1"332"!2"!3""""!2"!2!2!2"!2!3!2332"!2"""!2""!2"!2"""!2"!2332"!2"!12!2"""";" "!#!2 "!2""#""!2!#3""2"!2"!""""!2"!2!2!2"!2!!22"!2""312""!2"!2"""!2"!22"!2"!12!2"""";" "!#!2 "!2""#"332!3"!2"2"!2"!22!2"""""12"!3!3!22!2!2"!2"!2"!2"#!22"!2"!2"#"!22!2"!22!2"!#!22""3323328" "!#!2 "!2""#""!1#3!#1"31""!3#!#3""31!#3!11"#1"!#3!331""!#331"#32"!#331"#!331"#!3"""!3#"""9" "!#!2 "!2""#""!!""""!"""""!""!!!""""!""!"!!2"""!""!""""""";" "!#!2 "!2"!"2""!2""!2"!2 "!2"!2"!2"";" "!#!2 "!2"!""2"3"!"""!"!2 "!"!"#!""338" "!#!2 "!2"""""!""""8" "!#!2 "!2 ""4" "!#!2 "!2"?" "!#!2 "!2"?" "!#!2 "!2"?" "!#!2 "!2"?" "!#!2 "!2"?" "!#!2 "!2"?" "!#!2 "!2"?" "!#!2 "!2"?" "!#!2 "!2"?" "!#!2 "!2"?" "!#!2 "!2"?" "!#!2 "!2"?" "!#!2 "!2 "33"#3"2"#322#3""33"##"#"#32"32"#32"2"33""33"#"33""322""#32"33"#"#"#"33""33"#""#"#"#"##"#""#"#L" "!#!2 "!2"3""3"!2"!"2!2""""#""!#"#!2!2!2!2!!2""#!2""!2!2"""""""""L" "!#!2 "!2"!"2""!2!2"!"!2"!""!2"!2""""!2"!2"!""!!2"!""2"!2""!2"!2"!""!!2""22!2""""L" "!#!2 "!2"!"2""!2!2""#1"332"!2"!3"3!3!2332""!2332"!2"!2"""!2"!2332""!2"!12!2""""L" "!#!2 "!2""#""!2!#3""2"!2"!""!"!!22""!22"!2"!2"""!2"!22""!2"!12!2""""L" "!#!2 "!2""#"332!3"!2"2"!2"!22!2""""#!2"!2"!2""12"!2"!2"!2"#"!22!2"!2""12"!#!22""332332I" "!#!2 "!2""#""!1#3!#1"31""!3#!#3""3!#3!231"31!331"32"!#331"#!331"31!3"""!3#"""J" "!#!2 "!2""#""!!""""!"""""!"""!2!"!!"!!2"""!""!"!"""""L" "!#!2 "!2"!"2""!2"!2"!2"!2 "!2"!2"!2""L" "!#!2 "!2"!""2"3"!""!2"!"!2 "!"!"#!""33I" "!#!2 "!2""""!"!""""I" "!#!2 "!2 ""4" "!#!2 "!2"?" "!#!2 "!2"?" "!#!2 "!2"?" "!#!2 "!2"?" "!#!2 "!2"?" "!#!2 "!2"?" "!#!2 "!2"?" "!#!2 "!2"?" "!#!2 "!2"?" "!#!2 "!2"?" "!#!2 "!2"?" "!#!2 "!2"?" "!#!2 "!2 "33"4" "!#!2 "!2"3""3"""/"/"""""//"" "!#!2 "!2"!""2"""""/""""/""/"" "!#!2 "!2"!2""//""/""""/""/"" "!#!2 "!2"#""//""/""""/""/"" "!#!2 "!2"#""/""/"""""/"" "!#!2 "!2"#"/"/""/""""/""/"" "!#!2 "!2"#""/"/"""""/"" "!#!2 "!2"!2""/"/"" "!#!2 "!2"!2"""/"/"" "!#!2 "!2""""/"/"" "!#!2 "!2 ""4" "!#!2 "!2"?" "!#!2 "!2"?" "!#!2 "!2"?" "!#!2 "!2"?" "!#!2 "!2"?" "!#!2 "!2"?" "!#!2 "!2"?" "!#!2 "!2"?" "!#!2 "!2"?" "!#!2 "!2"?" "!#!2 "!2""&" "!#!2 "!2""&" "!#!2 "!2""&" "!#!2 "!2""""/"/"/""/""//"/""""" "!#!2 "!2""""/"/"/"""""/""/"/""/""/"/"" "!#!2 "!2"//"//"/"/"/""/""/"/""/""""/"" "!#!2 "!2"//"//"/"/"/"""/""/"/""/""""" "!#!2 "!32//"//"/"/"/"""""/""/"/""/""/""#33 "!#!2 "!""//"/"""""/""/"/""/""/"/! "!#!2"""/""/"//"/"""" "!#!2"/""/""/""","!#!2"/""/""/""","!#!2"/""/""/""/"/"+"!#!2"U"!#!2"U"!#!2"U"!#!2"U"!#!2"U"!#!2"U"!#!2"U"!#!2"U"!#!2"U"!#!2"U"!#!2 "#3A3 "!#!2 "!"@"# "!#!2 "!?# "!#!2 "!?# "!#!2 "!?# "!#!2 "!?# "!#!2 "!?# "!#!2 "!?# "!#!2 "!?# "!#!2 "!?# "!#!2 "!?# "!#!2 "!?# "!#!2 "!?# "!#!2 "!?# "!#!2 "!?# "!#!2 "!?# "!#!2 "!?# "!#!2 "!?# "!#!2 "!d# "!#!2 "!d# "!#!2 "!d# "!#!2 "!c# "!#!2 "!c# "!#!2 "!c# "!#!2 "!b# "!#!2 "!b# "!#!2 "!?# "!#!2 "!?# "!#!2 "!?# "!#!2 "!?# "!#!2 "!?# "!#!2 "!?# "!#!2 "!?# "!#!2 "!?# "!#!2 "!d# "!#!2 "!d# "!#!2 "!d# "!#!2 "!c# "!#!2 "!c# "!#!2 "!c# "!#!2 "!b# "!#!2 "!b# "!#!2 "!?# "!#!2 "!?# "!#!2 "!?# "!#!2 "!?# "!#!2 "!?# "!#!2 "!?# "!#!2 "!?# "!#!2 "!?# "!#!2 "!d# "!#!2 "!d# "!#!2 "!d# "!#!2 "!c# "!#!2 "!c# "!#!2 "!c# "!#!2 "!b# "!#!2 "!b# "!#!2 "!?# "!#!2 "!?# "!#!2 "!?# "!#!2 "!?# "!#!2 "!?# "!#!2 "!@# "!#!2 "!@ "!#!2"U"!#!2"U"!#!2"U"!#!2"U"!#!2"U"!#!2"U"!#!2"U"!#!2""#3+"#3 "/8 "!#!2""!"#"/ "!"# "#7 "!#!2""!#"/ "!# "#7" "!#!2""!#"/ "!# "#7" "!#!2"/""/"//"!#"""/"/"//"//"/""!# "#7" "!#!2"""/""/"""!#"""/""/"/"""/"/"!# "#!"/" "!#!2"""/""/"""!#"""/"/"/""/"/"/"!# "##"/" "!#!2"/""/"""!#"""//"/""/"/"/"!# "##"/" "!#!2""/"/"""!#"""/""/"/""/"/"/"!# "# ""/"///"""//"//"/ " "!#!2"/""/""/"""!#"""/""//"""//"!# "# """/""/""/""""""""/"/"/ " "!#!2""/"/"!#"""//"/////""!# "# """/"""/""/""/""/""/""/"/"/ " "!#!2"""/""!#""/ "!# "# """/"""/""/""/""/""/"/"/ " "!#!2"""/""!#""/ "!# "# """/"/""/""""/"/"/"/ " "!#!2"/"!#""/ "!# "# """""/""/""""""""/"// " "!#!2""!#+"!# "# """/"/"/"//"//""//"/"// " "!#!2""!#+"!# "# """/ "/"//" "!#!2""!#+"!# "# """ "/"" "!#!2""!#+"!# "# " "/" " " "!#!2""!#+"!# "#7" "!#!2""!#+"!# "#7" "!#!2""!#+"!# "#7" "!#!2""!#+"!# "#7" "!#!2""!#+"!# "#7" "!#!2""!#+"!# "#7" "!#!2""!+"! "#73? "!#!2"U"!#!2"U"!#!2"U"!#!2"U"!#!2"U"!#!2"U"!#!2"U"!#!2"U"!#!2"/'"/""!#!2"/'"/""!#!2"&"/""!#!2"""""/"/"/"/""""/"/"/""/""//"""///"""/"/"//"!#!2"""/""/"/"/""/""//""/"""/""/""/""/""/"/""""//"/"//""/""/"""!#!2"//"/"/"/"/""/""//""/""""/""/""/""/""/""/""/""/""/"""/"!#!2"//"//"/"/""/""""""/""""/""/""/""/""/"""/""/""/""/"""/"!#!32"/""/"/"/""/"""""/"""/"/""/""/""/""/"""""/""/"""/""/""/#~3!#!"/""///""/"/""/"""/"""/""/""/""/""/"/"""""/"/"//""/""/""!~!#"""/""///"/"""/""/"/"/""/""//""""//""""/"//""!#"""/$"/"/""/"/""!#""$"/"/""/"/""!#""+"/" "/""!#"X"!#"X"!#"X"!#"X"!#!W!#!W!#!K !#!K !#!C "!#!C "!#!C "!#!2""/""""!#!1""/"/""!#!4"""!#!1"/"!#!1""!#!1"/"!#!2"""!#!6""/"/""!#!6""/""""!#!< "!#!K "!#!K "!#!K "!#!K 3?!#!W!#!W!#"X"!#3X31"Z"-4'̞&&lpPL ~xw   "' %ƥB֭45wC Fw"'(wFh B "!#!> "!#!> "!#! ""/""""!#! ""/"/""!#! """!#! "/"!#! ""!#! "/"!#! """!#! ""/"/""!#! ""/""""!#! "!#!E "!#!E "!#!E "!#!E 3?!#!Q!#!Q!#"R"!#3R31"T"-4'O[F[lp""N ^  $, ^.9 %!RRwƌƥB֥֭45^C !^.9(!8  !RRwBQ<O;G;G;G;G;G;G;G;G;G;G;G4G4G2G2G2G2G2G2G2G2G2G2GGGGGGGGGGG2G2G2G2b2b2b2b2b2b2b4 b;G;G;G;G;G;G;  4  3222222 2  2G2G2GGGGGGzzzzz2z2z2 z2G2G2G2G2G2G2G4G;b;b;b;b;b;b;b; b;G;G;G;G;G;O;P<     JI02JI03JI04JI04; I05= I05= I06%$ ' $$ɫ$% ( ( (JI09JI09JI09JI09JI09JI09>C>A>A>A>A>888>877>677>577>577>57 >57 >57 >>>>>>>> > >  >577>577>577>577>577>777>877>A>A>A>A>A>A>A>A>A>A>" >u>u>u>u>u>u>u>>> u>" >A>A>A>A>A>A>A>A>A>B>C>A>(>(>(>(>(>(>(>(>(>(>(>(>(>(>(>(>8>8>8>8>8>8>8>8>8>8>8>8>8>8>8>8>8>8>8>8>8>8>8>8>8>8>8>88888888888>8/8>8/8>8/8>8/88888888888>8/8>8/8>8/8>8/88888888888>8/8>8/8>8/8>8/88888888888>8/8>8/8888888\[[[[[[\8888>8>8>878\[[[[[[\ 8 8>8>8>8>A>A?C.;-&z-&z&z&z&zzzzzzzz  z  z z-&z-&z-&z-&z,&{,&{0>1?    &hh&h f e e e eefiiil l *@ +? wwGwwWww8!?]m8舎舎興?]m8>ffMf8>]m8>]m8>UUMeUU8舎=]m8舎舎=]m8 MUUMuUU8 M]݁8 J]݁8a Ĺ8a "a l -4'\\lpl ^  ) ^.9 %!R{BƥB֥֭45^C !^.9(!8  !R{BBwwwQwwywsff]f7wwww~w~~ww~~w~www~w>wwywsmm7wwww~~ww~~w~ww~www>wwywsmm7www~~ww~~wwwww>wwywsff]f7wwww~~ww~w~www~w~w=wwywsmm7www~w~~~ww~~w~w=wwywsmm7wwww~ w~~wMwwywsff]vff7ww~w w~~wMwwywsm݁7w w~~wJwwywsm݁7waw wywsk7waw wywq"waw wywlw w ywwwywwwy-4''lp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lp 0      S C SS(SX  G""3"."!" "!"! "  "!"  "!  "! " "! "! "" "!"""!""!""""""!"!"!"""""""""!""""!"""""!"""""!"" "" ! "!"""!"!!"!"""!"!"!!"!"""!""""" "! """" """"" """"! """"!"! """"! """"! """"! """"! "!"""! "!"""! """!"! """!"! "! """! "! """! """""!""""!""!"!"""""!""""!""!" ""!"  " ""!  " "" """!""#" "!#"! "!"" "!"" "!""! "!""! "!""! """! """"!  " """!  " """ "!  """"" "! "!""" """"!"!""""!"!"""""""!" """""!" " """!"!""!"""""""""!"!""!"""""!"""!""!"" "!"""  "  " ""!  "  "! " "  "!  " " "!"" "!"!" "G"G"G"G" """95\SYSTEM\mapi.dll? "?7l!R6CardEasy Help CardEasy 2.2 CardEasy 2.2BrowseButtons()ZmainmainCardEasy Helpm  1( 6B14BCoverB / .(" CardEasy 2.2BB% 3This help provides information on installing, configuring and using CardEasy for Windows, and on how you can obtain technical support and assistance.y1H `bPـ:DMڀb-€OverviewCard TypesACI_CommandsCB+ &0Q(Installing CardEasyLJ0 08Pـ:㬈LReader Configuration?+ &(`Operation Guide?J"Z ~Pـ:B2Ѐ`]ЀMemory CardACOS1 CardCommandsAboutH9 BԀrRtiӉTerms of conditions of useTroubleshootingOrdering information"% To see the contents of any of the topics shown above, click on the topic. To finish using Help, hold down the key and press , or if you are using Windows 95, simply press .91C  Overview/ $ OverviewTo, &@b퉂CardEasy is a software to allow you to examine and manipulate the contents inside a smart card easily. In order to use CardEasy, you must have the ACR10/ACR15/ACR20 smart card reader from Advanced Card Systems Ltd. CardEasy version 2.2 now can support up to 22 different types of memory cards from various manufacturers including Siemens, SGS-Thomson, Gemplus, Atmel and Xicor. Beside these memory cards, CardEasy can read / write microprocessor cards running the T=0 and T=1 protocol. If the inserted card is an ACOS1 MCU card, there is a dedicated page for the easy operation of this card.l? - (@-‰CardEasy is making use of the ACSR20 interface library to access the smart card reader. Basically, if you are using the MCU card, you need to have the command set description before you can perform any meaningful operation on the cards. While for the memory card type, you can use the ACI commands set provided by the ACSR20 interface library to operate the cards. Please refer to the card specification for the detail operation of the card. CardEasy is just providing a convenient user interface for the user to issue commands to the ACR reader and the inserted card. &o # 1 2 1l2 z ; H z * $<Whats new in version 2.22 R ' c@CardEasy version 2.2 is a major upgrade of the previous release version 1.0. Beside the original functions provided in version 1.0, it contains the following added features:hz  [ P:qSupport ACOS1 MCU smart cardqSupport Xicors X76F041/X76F640/X76F128/X76F100 memory cardqEnable the reading/updating of the counter value in the token counter cardqEnhanced User InterfaceqMemory card functions are reorganized to provide a consistent and easy to use interfaceqData can be inputted in both Hexadecimal or Ascii format&R ; # 1 l 1W3l @;; $ .Supporting Card TyperNl $ Following is a list of all supporting card types by the CardEasy software.q @@ "wЀ}Љ Љi OMމNމeЉhЉЉЉË /gC~ЉぐЉF,`lq݉3LAM104 / AT88SC06 / GPM103 / ST1305 / SLE4406AM221 / GAM226 / SLE4436AM416 / GPM416 / SLE4404GPM896AT88SC101AT88SC102AM8KP / SLE4418AM8KS / SLE4428AM2KP / SLE4432AM2KS / SLE4442AMXKF series / AT24CXX series / GFMXK series / ST14C0XC seriesAM64KPAT88SC1604AM256AM4KPST1333@@; 3 / ST1335X76F041X24645X76F128 / X76F640s:@9 BtjIl2Љ㷧X76F100ACOS1 MCU CardMCU Smart Card (T=0 / T=1)&@@@# 1@ A1 & A=AD3@=A$ ACI CommandsgC AA$ Following are the commands for the manipulation of memory card.&=AtC "MdE,QՉ,rx(& Y(㾫U﯉Gޔ;yq+NX;C81Ỏ9[FX8dr"ACI_ReadACI_WriteACI_SetFuseACI_VerifyACI_WritePrACI_ChangePINACI_EraseACI_WriteCarryACI_AuthenticateACI_SetProtectACI_ReadProtectACI_SetHEACI_LockProtectACI_ClearProtectACI_WriteAllACI_EraseAllACI_ReactivateACI_CardOptionsACI_BlowFuse~AD% While the ACSR20 library are keep on evolving, please refer for the latest ACSR20 reference manual for the final details.1tCHD18G ӄHDDKS/DD$ ^AM104 / AT88SC06 / GPM103 / ST1305 / SLE4406xTHDE$ This type of memory card has the following structure during Personalization Mode,DE^#XR   <>Starting byteEnding byte Description"E)Fj#DR  0x000x02Manufacturer AreaEFj#8R  0x030x07Issuer Area.)FGGj#\R  0x080x08Logical Fuse (located in MSB)(FGj#PR  0x090x09TC Presentation CounterGGbHj#>R  0x0A0x0CTransport Code~YGH% After fuse blew, the card will be in count down mode and has the following structure,bHjI^#XR   <>Starting byteEnding byte Description"HIj#DR  0x000x02Manufacturer AreajI|Jj#8R  0x030x07Issuer Area-IKj#ZR  0x080x0C5-Stage Octal Abacus CounterN|JKA RdE,㾫U,rApplicable functionsACI_ReadACI_WriteACI_WriteCarryACI_Verify1KK19 3KL&?KL$ 6AM221 / GAM226 / SLE4436xTKL$ This type of memory card has the following structure during Personalization Mode,LM^#XR   <>Starting byteEnding byte Description"LMj#DR  0x000x02Manufacturer AreaM&Nj#8R  0x030x07Issuer Area%MNj#JR  0x080x08Logical Fuse (bit 7)(&NGOj#PR  0x090x09TC Presentation CounterNOj#>R  0x0A0x0CTransport Code_GOk#R  OK0x0D0x0DBackup bits (bit 3, bit 2, bit 1, bit 0)Authentication control (bit 7, bit 6)$O4j#HR  0x0E0x0FAuxiliary data area%Áj#JR  0x100x16Authentication key 14Ej#0R  0x170x27Reserve%ÁԂj#JR  0x280x30Authentication key 2~YER% After fuse blew, the card will be in count down mode and has the following structure,Ԃ܃^#XR   <>Starting byteEnding byte Description"Rhj#DR  0x000x02Manufacturer Area܃j#8R  0x030x07Issuer Area-hj#ZR  0x080x0C5-Stage Octal Abacus Counter_Ok#R  0x0D0x0DBackup bits (bit 3, bit 2, bit 1, bit 0)Authentication control (bit 7, bit 6)$݆j#HR  0x0E0x0FAuxiliary data area%Olj#JR  0x100x16Authentication key 1݆j#0R  0x170x27Reserve%l}j#JR  0x280x30Authentication key 2a&H `dE,㾫U,r﯉Applicable functionsACI_ReadACI_WriteACI_WriteCarryACI_VerifyACI_Authenticate1}W1ӄW?&$ 6AM416 / GPM416 / SLE4404\8W$ pThis type of memory card has the following structure,|^#XR   <>Starting byteEnding byte Description"j#DR  0x000x01Manufacturer Area|j#8R  0x020x07Issuer Area!j#BR  0x080x09Card Secret Codej#<R  0x0A0x0BError Counter*j#>R  0x0C0x0DProtected Area!j#BR  0x0E0x27Application Area*:j#6R  0x280x2BErase CodeŽj#<R  0x2C0x33Erase Counter%:Qj#JR  0x3C0x3CPersonalization Fuse.ŽV zi Oi OdE,Y(,rQՉThis card type has a similar security mechanism as the GPM896. Please see the GPM896Q& card type section for more information.Applicable functionsACI_ReadACI_WriteACI_EraseACI_VerifyACI_SetFuse1Q1mA - $ GPM896\8E$ pThis type of memory card has the following structure,^#XR   <>Starting byteEnding byte Description"E[j#DR  0x000x01Manufacturer Areaj#8R  0x020x09Issuer Area'[rj#NR  0x0A0x0BCard Secret Code (CSC)j#<R  0x0C0x0DError Counterrj#>R  0x0E0x15Protected Area>+j#|R  0x160x35Application Area 1 (bit7 =PREN1, bit6 =RDEN1)#j#FR  0x360x3BErase Code 1 (EC1)>+`j#|R  0x3C0x5BApplication Area 2 (bit7 =PREN2, bit6 =RDEN2)#j#FR  0x5C0x5FErase Code 2 (EC2)%`|j#JR  0x600x6FArea 2 Erase Counter% j#JR  0x7C0x7CPersonalization Fuse}|& Depending on the status of the fuse, the memory area have different security attributes.Case when the fuse is not blown# 4c#FR *8Memory AreaRead EraseWrite1c#bR (:NManufacturer AreaEnabledDisabledDisabled<4gc#xR 0TIssuer AreaEnabled Enabled if CSC=1Enabled if CSC=1Ic#R &JnCard Secret CodeEnabled if CSC=1Enabled if CSC=1Enabled if CSC=14gc#hR  2VError CounterEnabledEnabled if CSC=1EnabledAr#ހR $&8:^Protected AreaEnabledEnabled if CSC=1Enabled if CSC=1ZG{#ƀR *,jlApplication Area 1Enabled if RDEN1 = 1 or CSC=1Enabled if CSC=1Enabled if CSC=1Gr {#ƀR  DFjErase Code 1Enabled if CSC=1Enabled if CSC=1Enabled if CSC=1ZG{#ƀR *,jlApplication Area 2Enabled if RDEN2 = 1 or CSC=1Enabled if CSC=1Enabled if CSC=1G {#ƀR  DFjErase Code 2Enabled if CSC=1Enabled if CSC=1Enabled if CSC=1=d{#ƀzR .0BdDhArea 2 Erase CounterEnabledEnabled if CSC=1EnabledC$ >Case when the fuse is blown#d-c#FR *8Memory AreaRead EraseWrite1c#bR (:NManufacturer AreaEnabledDisabledDisabled,-Pc#XR 0DIssuer AreaEnabled DisabledDisabledAc#R &:^Card Secret CodeDisabledEnabled if CSC=1Enabled if CSC=14Pc#hR  2VError CounterEnabledEnabled if CSC=1EnabledAS#ހR $&8:^Protected AreaEnabledEnabled if CSC=1Enabled if CSC=1wE{#ƀR *,jlApplication Area 1Enabled if RDEN1 = 1 or CSC=1Enabled if CSC=1 and EC1 = 1Enabled if CSC = 1 and PREN1 = 1.So#\R  4HErase Code 1DisabledDisabledDisabledE#ހR ,.lnApplication Area 2Enabled if RDEN2 = 1 or CSC=1Enabled if CSC=1 and EC2=1 and EC1=1Enabled if CSC = 1 and PREN2 = 1.o#\R  4HErase Code 2DisabledDisabledDisabled6D#ހlR 02DXZArea 2 Erase CounterEnabledDisabledEnabledc b dE,Y(,rQՉWhen the fuse is not blown physically, the cases of fuse blown / fuse not blown can be emulated by using the AC_SetFuse command. Setting fuse pin to high will emulate the case of fuse not blown. Setting fuse pin to low will emulate the case of fuse blown.Applicable functionsACI_ReadACI_WriteACI_EraseACI_VerifyACI_SetFuse1D: 1 : j A0 j $ AT88SC101\8:  $ pThis type of memory card has the following structure,j P ^#XR   <>Starting byteEnding byte Description&  j#LR  0x000x01Fabrication Zone (FZ)!P k j#BR  0x020x09Issuer Zone (IZ)#  j#FR  0x0A0x0BSecurity Code (SC)6k  j#lR  0x0C0x0DSecurity Code Attempts Counter (SCAC)* ,j#TR  0x0E0x15Code Protected Zone (CPZ)) j#RR  0x160x95Application Zone 1 (AZ1)3,\j#fR  0x960x99Application Zone 1 Erase Key (EZ1)# @j#FR  0x9A0xA9Erase Counter (EC)\ @ '\@j#NR  0xAA0xABMemory Test Zone (MTZ)D @A] i Oi OdE,Y(,rQՉ"This card type has a similar security mechanism as the GPM896. Please see the GPM896 card type section for more information.Applicable functionsACI_ReadACI_WriteACI_EraseACI_VerifyACI_SetFuseACI_BlowFuse1@B1A2 BBBJ0 ABB$ AT88SC102\8BB$ pThis type of memory card has the following structure,BB(C^#XR   <>Starting byteEnding byte Description&BCj#LR  0x000x01Fabrication Zone (FZ)!(CCDj#BR  0x020x09Issuer Zone (IZ)#CDj#FR  0x0A0x0BSecurity Code (SC)6CDpEj#lR  0x0C0x0DSecurity Code Attempts Counter (SCAC)*DFj#TR  0x0E0x15Code Protected Zone (CPZ))pEFj#RR  0x160x55Application Zone 1 (AZ1)3F4Gj#fR  0x560x5BApplication Zone 1 Erase Key (EZ1))FGj#RR  0x5C0x9BApplication Zone 2 (AZ2)34GdHj#fR  0x9C0x9FApplication Zone 2 Erase Key (EZ2)#GHj#FR  0xA00xB8Erase Counter (EC)'dHIj#NR  0xB90xBAMemory Test Zone (MTZ)FHJ^ i Oi OdE,Y(,rQՉ"This card type has a similar security mechanism as the GPM896. Please see the GPM896 card type section for more information.Applicable functionsACI_ReadACI_WriteACI_EraseACI_VerifyACI_SetFuseACI_BlowFuse1IJ1< J/K:N6J/K$ $AM8KP / SLE4418oJM$ The chip contains an EEPROM organized 1024 x 8 bit offering the possibility of programmable write protection for each byte. Reading of the whole memory is always possible. The memory can be written and erased byte by byte. Input data and the contents of the addressed byte are compared so that only bits are written which were not written before. Erasing is only possible byte-wise, even if only one bit is to be erased, but bits may be written individually. Each byte can be write/erase-protected individually by setting a protect bit (EEPROM -> ROM). The protect bit is only one time programmable and cannot be erased.x>/K:N: D|dE,x(Applicable functionsACI_ReadACI_WriteACI_WritePr1MkN12 kNN6:NN$ $AM8KS / SLE4428kNA PhЉdE,x(In addition to the function of AM8KP, this version has a PSC verification logic. All the memory, except for the PSC, can always be read. The memory can be written or erased only after PSC verification. The error counter can always be written. After eight successive incorrect entriesN:N the error counter will block any subsequent attempt at PSC verification and hence any possibility to write and erase.Applicable functionsACI_ReadACI_WriteACI_WritePr:N* $ ,rACI_Verify1*1) *`Ń6`$ $AM2KP / SLE4432*e& The chip consists of 256 x8 bit EEPROM main memory and a 32-bit protection memory with PROM functionality. The first 32 bytes can be irreversibly protected against data change by writing the corresponding bit in the protection memory. Each data byte in the address range is assigned to one bit of the protection memory and has the same address as the data byte in the main memory which it is assigned to. Once written the protection bit cannot be erased.Applicable functions`(`Ń8 @PdE,x(ACI_ReadACI_WriteACI_WritePr1e1O,6Ń,$ $AM2KS / SLE4442* "OЉIn addition to the functions of AM2KP, this chip provides a security code logic which controls the write/erase access to the memory. For this purpose the AM2KS contains a 4-byte security memory with an error counter EC (bit0 to bit2) and 3 bytes reference data. These 3 bytes as a whole are called programmable security code (PSC). After power on the whole memory, except the reference data, can only be read. Writing and erasing is only possible after a successful comparison of verification data with the internal reference data. After three successive unsuccessful comparisons the error counter blocks any subsequent attempt, and hence any possibility to write and erase.m,O ndE,x(& ,rޔ;Applicable functionsACI_ReadACI_WriteACI_WritePrACI_ChangePINACI_VerifyACI_ReadProtect11!)>O?eAO$ AMXKF series / AT24CXX series / GFMXK series / ST14C0XC series?B R]dE,drThis type of card is usually known as IIC card. It doesnt have any security protection. It is a piece of pure EEPROM memory that allow free reading and free writing. There are different card models for all of the series according to their different memory size. For example AM1KF is of size 128 bytes, AM2KF is of size 256 bytes and AM4KF is of size 512 bytes.Applicable functionsACI_ReadACI_WriteACI_CardOptions1Op1"Op- ?$ AM64KPpQ pAdE,drޔ;Gyq+Please contact ACS for the detail informationApplication functionsACI_ReadACI_WriteACI_CardOptionsACI_ReadProtectACI_SetProtectACI_SetHE11i>b 1 $ AT88SC1604 + $i OThe AT88SC1604 provides 15704 bits of serial EEPROM in four application zones. Additional EEPROM memory and logic provide security for smart card applications. The memory structure is similar to GPM896 and its structure is as follow.,^#XR   <>Starting byteEnding byte Description& $j#LR  0x000x01Fabrication Zone (FZ)!j#BR  0x020x09Issuer Zone (IZ)#$<j#FR  0x0A0x0BSecurity Code (SC)6܏j#lR  0x0C0x0CSecurity Code Attempts Counter (SCAC)*<|j#TR ܏| 0x0D0x14Code Protected Zone (CPZ)+܏j#VR  0x150x16Zone 1 Security Code (SC1)3|j#fR  0x170x17Zone 1 SC1 Attempts Counter (S1AC)'?j#NR  0x180x19Zone 1 Erase Key (EZ1)3j#fR  0x1A0x1AZone 1 EZ1 Attempts Counter (E1AC)?^j#0R   0x1B0x4C5Zone 1-j#ZR   "0x4C60x4C7Zone 2 Security Code (SC2))^j#RR   "0x4C80x4C9Zone 2 Erase Key (EZ2)5'j#jR   "0x4CA0x4CAZone 2 EZ2 Attempts Counter (E2AC)j#2R   "0x4CB0x5CAZone 2-'Aj#ZR   "0x5CB0x5CCZone 3 Security Code (SC3))j#RR   "0x5CD0x5CEZone 3 Erase Key (EZ3)5Asj#jR   "0x5CF0x5CFZone 3 EZ3 Attempts Counter (E3AC)j#2R   "0x5D00x6CFZone 3-sj#ZR   "0x6D00x6D1Zone 4 Security Code (SC4)) j#RR   "0x6D20x6D3Zone 4 Erase Key (EZ4)5j#jR   "0x6D40x6D4Zone 4 EZ4 Attempts Counter (E4AC) Bj#2R   "0x6D50x7D4Zone 4)j#RR   "0x7D50x7D6Memory Test Zone (MTZ)BVj#.R   "0x7F40x7F4Fusef O ndE,Y(,rQՉ"Applicable functionsACI_ReadACI_WriteACI_EraseACI_VerifyACI_SetFuseACI_BlowFuse1V<1G<h, h$ AM256 <qP nsdE,Y(ޔ;GX;CThe AM256 card is a 256 bit securable EEPROM organized into 16 registers of 16 bits. All read / write on the card is performed using the unit of word (2 bytes). Selected words can be protected against data changes by programming a Protect Register or permanently locked making all future attempts to change the data impossible.Applicable functionsACI_ReadACI_WriteACI_EraseACI_ReadProtectACI_SetProtectACI_ClearProtectU$h1 2HN81ỎACI_LockProtectACI_WriteAll1q1b #,#$ AM4KPAP ndE,ޔ;GX;CNThe AM256 card is a 4096 bit securable EEPROM organized into 256 registers of 16 bits. All read / write on the card is performed using the u#Anit of word (2 bytes). Selected words can be protected against data changes by programming a Protect Register or permanently locked making all future attempts to change the data impossible.Application functionsACI_ReadACI_WriteACI_ReadProtectACI_SetProtectACI_ClearProtectACI_LockProtectP #0 0@81Ò9[FXACI_WriteAllACI_EraseAll1A1 Gv\ 4$  ST1333/ST1335xTn$ This type of memory card has the following structure during Personalization Mode,^#XR   <>Starting byteEnding byte Description nj#@R  0x000x01Circuit ID Area j#:R  0x020x07Card ID Area(j#PR  0x090x09TC Presentation Counter $j#>R  0x0A0x0CTransport Code*j#TR  0x100x18Authentication secret key#$Ej#FR  0x360x39Anti-tearing flags"j#DR  0x3A0x40User defined Area~YEO% After fuse blew, the card will be in count down mode and has the following structure,^#XR   <>Starting byteEnding byte Description Ocj#@R  0x000x01Circuit ID Areaj#:R  0x020x07Card ID Areacm j#2R  0x080x0CCounters j#8R  0x0E0x0FCertificate*m  j#TR  0x100x18Authentication secret key#  j#FR  0x360x39Anti-tearing flags"  j#DR  0x3A0x40User defined Aream \ O ndE,㾫UY(,r﯉Applicable functionsACI_ReadACI_WriteACI_WriteCarryACI_EraseACI_VerifyACI_Authenticate1  1 W  0C. \  $ X76F041 ' [The X76F041 is a password access security supervisor device, containing four 128 x 8 bit SecureFlash arrays. Access can be controlled by three 64-bit programmable passwords, one for read operations, one for write operations and one for device configuration.Five 8-bit configuration registers are used to configure the X76F041. They can be read out using the ACI_ReadProtect command. They are appeared in the following orderz  ^#8R  $&PositionName Meaning&j#LR   1ACR1Array Control Register 1& 5@j#LR   5@\ 2ACR2Array Control Register 2"@j#DR   3CRConfiguration Register5@EAj#4R   4RRRetry Register@Aj#2R   5RCRetry CounterhEA0Cf dE,& ,rޔ;G81Ỏ9[FXFor the detail operation of the X76F041, please see the X76F041 detail specification from the Xicors data book.Applicable functionsACI_ReadACI_WriteACI_ChangePINACI_VerifyACI_ReadProtectACI_SetProtectACI_WriteAllACI_EraseAll1AaC1 vلaCCjG- 0CC$ X24645yIaCG0 .ËThe X24645 is organized as a 8192 x 8 bit memory array having a protocol very similar to the IIC type. There are two device select inputs (S1, S2) inside the smart card chip that having a value (0,1) fixed inside. For the sake of generalization, S1 and S2 are part of the address field (the third MSB and the second MSB respectively) and the MSB of the address field is always fixed at 1 ( For IIC card, MSB is fixed with 0) As a result, the 8K bytes of memory of a typical X24645 smart card can be found at address ranging from 0xC000 to 0xDFFF. Care must be taken because X24645 has the write protect register in the last byte of the address space (0xDFFF). Failure to enable the write latch will not be able to read / write data from the card. For the detail, please see the X24645 detail specification from the Xicors data book.c0CjG3 6`dE,Applicable functionsACI_ReadACI_Write1GG1DWGG 6jGG$ $X76F128/X76F640'GJ ̀QThe X76F128 contains one 16K bytes secure EEPROM array (Array0) and one 64 bytes secure EEPROM array (Array1). The X76F640 contains one 8K bytes secure EEPROM array (Array0) and one 32 bytes secure EEPROM array (Array1). A read password and a write password (both are 8 bytes long) are required for the access into each of this memory array. Together with the RESET password which authorize the ACI_WriteAll and the ACI_Reactivate commands, there are totally five passwords for use by this particular card type namely, Read Array 0 Password, Read Array 1 Password, Write Array 0 Password, Write Array 1 Password and Reset Password.GNm WIn order to read (ACI_Read) the memory content of Array0, the application must have the Read Array 0 Password verify (ACI_Verify) OK. Similarly, for the writing (ACI_Write) of data into the memory content of Array0, the application must have the Write Array 0 Password verify OK. The same restriction is applied also in the case of Array1. For the Reset Password, once it is verified OK, the command ACI_WriteAll can be used to write the complete card content with zero and the command ACI_CardReset can be used to reset the retry counter and reactive the card. When a password is verified OK, it can be changed using the ACI_ChangePIN command.J P n dE,,r& 81Ỏ8For the X76F128, array 0 can be accessed in the address range $0000 - $3FFF and array 1 can be accessed in the address range $8000 - $803F. For the X76F640, array 0 can be accessed in the address range $0000 - $1FFF and array 1 can be accessed in the address range $8000 - $801F.Applicable functionsACI_ReadACI_WriteACI_VerifyACI_ChangePINACI_WriteAllACI_ReactivateN jG1N=1لB=k. k$ X76F100=z$ The X76F100 memory array consists of fourteen 8-byte sectors (total 112 bytes) in which the reading is protected by a 8-byte read password and the writing is protected by a 8-byte write password. Write access to the array always begins at the first address of the sector (i.e. address is a multiple of 8) and the length must be a multiple of 8. The retry counter allows 8 accesses with an invalid password. If the retry counter overflows, the memory area and both of the passwords are cleared to zero. If a correct password is received prior to retry counter overflow, the retry counter is reset and access is granted. For the changing of either one of the password (ACI_ChangePIN), it is required to have the write password to be verified OK.MkA RdE,,r& Applicable functionsACI_ReadACI_WriteACI_VerifyACI_ChangePIN1z919zfAz$ :MCU Smart Card (T=0 / T=1)9f% All microprocessor based smart card using the T=0 or T=1 protocol can be communicated using the standard APDU structure. Please refer to the card specification for the detail coding of the APDU. 1z12=WƅNJ/ fƅ$ ACI_Readq[$ The ACI_Read command is available for all types of memory card. The parameter structure is defined as follows:nƅɆR#t8Og  FieldValueDescriptionq[:R#t>Og   CLA0x00Instruction class7ɆÇR#tnOg    INSACI_ReadInstruction code for the read command7:LR#tnOg   P1variableMSB of the starting address to be read7ÇՈR#tnOg   P2variableLSB of the starting address to be read7L^R#tnOg   Lc0x00No input data is required for this commandjՈȉR#t0Og  DataIn-Don't care^U#xOg   *Levariable<= 32The number of bytes to be read from the cardFor AM256 card, this value will rounded to the next even number'ȉNJ$ 11g&(g0 NJ($ ACI_Writes$ The ACI_Write command is available for all types of memory cards. The parameter structure is defined as follows:o(.R#t:Og   Field ValueDescriptionqR#t>Og   CLA0x00Instruction class9.*R#trOg   "INSACI_WriteInstruction code for the write command:R#ttOg   P1variableMSB of the starting address to be written:*BR#ttOg   P2variableLSB of the starting address to be writtenG܎S#vOg   ,Lcvariable <= 32The number of bytes to be written into the cardABoR#tOg  &DataInvariableLc bytes of data to be written into the cardu܎CS#vOg   Le0x00No response data expected from the card.For AM256 oCNJcard, this value will rounded to the next even number$og" 1C12W72g$ ACI_SetFusex% The ACI_SetFuse command is available for some memory cards with the set fuse capability. The parameter structure is defined as follow:oR#t:A t  Field ValueDescriptionqxXR#t>A t  CLA0x00Instruction class>R#t|A t  &INSACI_SetFuseInstruction code for the set fuse commandXU#x+A t  6P10x00 or 0x01 or 0xFF0x00 = Set Fuse PIN to "not connected" (high impedance)0x01 = Set Fuse PIN to high (5V)0xFF = Set Fuse PIN to low (0V)f8R#t(A t  P2-Don't care}+R#tVA t  Lc0x00No input data for this commandj8R#t0A t DataIn-Don't care6R#tlA t  Le0x00No output data expected from this command$" 11e-lB1 -$ ACI_Verify% IThe ACI_Verify command is available for some memory cards with the secret code capability. It is not enough to check alone the code returned from the function AC_ExchangeAPDU to determine that the verification is successful or not. Application program must check the data returning back from the card for the interpretation of whether the verification is successful or not. Please see the programmer notes for detail.o-eR#t:O X  Field ValueDescriptionqR#t>O X  CLA0x00Instruction class;ecR#tvO X  $INSACI_VerifyInstruction code for the verify commandCR#tO X  P1variableKey Index, see the table below for the descriptionfc^R#t(O X  P2-Don't Care}+R#tVO X  LcvariableNumber of bytes of the keyE^rR#tO X &DataInvariableLc bytes of key value to be verified by the cardUU#zO X  LevariableCase when : -AC_AM2KS : Le = 4AC_AM8KS : Le = 3otherwise : Le = 0or% Depending on the card type of the current session, Key Index (P1) can contain any of the following values.6b|#Ȁlz< J I .0PRCard TypeKey IndexLength(bytes)Description&{#ƀLz< J I "$*,AC_AM1040x003Transport code&b{#ƀLz< J I "$*,AC_AM2210x003Transport codeMl{#ƀz< J I &(.0AC_SLE44040x002Card secure code (GPM416) / security code (SLE4404);.{#ƀvz< J I 0x014Erase code l.(GPM416) / system code (SLE4404))l{#ƀRz< J I $&,.AC_GPM8960x002Card secure code.i{#ƀ8z< J I 0x016Erase code 1{#ƀ8z< J I 0x024Erase code 2%i{#ƀJz< J I "$*,AC_AT1010x002Security code ;{#ƀ@z< J I 0x014Zone 1 erase key%{#ƀJz< J I "$*,AC_AT1020x002Security code ;v{#ƀ@z< J I 0x016Zone 1 erase key {#ƀ@z< J I 0x024Zone 2 erase key&v{#ƀLz< J I $&,.AC_AT16040x002Security code M{#ƀ@z< J I 0x012Zone 1 erase key {#ƀ@z< J I 0x022Zone 2 erase key M{#ƀ@z< J I 0x032Zone 3 erase key {#ƀ@z< J I 0x042Zone 4 erase key${#ƀHz< J I 0x052Zone 1 security code$\ {#ƀHz< J I 0x062Zone 2 security code$ {#ƀHz< J I 0x072Zone 3 security code$\  {#ƀHz< J I 0x082Zone 4 security code% : {#ƀJz< J I "$*,AC_AM2KS0x003Security code%  {#ƀJz< J I "$*,AC_AM8KS0x002Security code(: } {#ƀPz< J I &(.0AC_X76F0410x008Write password  {#ƀ:z< J I 0x018Read password&}  {#ƀLz< J I 0x028Configuration password/ `{#ƀ^z< J I &(.0AC_X76F1280x018Read array 0 password) #Rz< J I  "$Or0x028Read array 1 password0`{#ƀ`z< J I &(.0AC_X76F6400x038Write array 0 password&t@{#ƀLz< J I t@0x048Write array 1 password A{#ƀ<z< J I 0x058Reset password(t@A{#ƀPz< J I &(.0AC_X76F1000x008Write password AHB{#ƀ:z< J I 0x018Read password$AlB" 1HBB1A7BBG2lBB$ ACI_WritePrB}C% The ACI_WritePr command is available for some memory cards with protected memory logic. The parameter structure is defined as follows:mBCR#t6A  NameValueDescriptionq}C[DR#t>A   CLA0x00Instruction classCCDR#tA   &INSACI_WritePrInstruction code for the write protect command:[D|ER#ttA   P1variableMSB of the starting address to be written:DFR#ttA   P2variableLSB of the starting address to be writtenG|EFS#vA   ,Lcvariable <= 32The number of bytes to be written into the cardAF5GR#tA  &DataInvariableLc bytes of data to be written into the card4FGR#thA   Le0x00No response data expected from the card$5GG" 1GH1e†HDH&O4GDH$  ACI_ChangePINH_I% The ACI_ChangePIN command is available for the AM2KS / X76F041 / X76F128 / X76F640 card. For the AM8KS, it is required to use the ACI_Write command to do the change PIN operation. The parameter structure of ACI_ChangePIN is defined as follows:s!DHIR#tBS X (Field NameValueDescriptionq_ICJR#t>S X  CLA0x00Instruction classBIJR#tS X  *INSACI_ChangePINInstruction code for the change PIN commandaCJKR#tS X  P1variablePlease refer to the table in command ACI_Verify for the definition of this fieldfJKR#t(S X  P2-Don't Carex&KhLR#tLS X  LcvariableThe length of the PINx&KLR#tLS X &DataInvariableThe new PIN value4hLfMR#thS X  Le0x00No response data expected from the cardL&O& 5In order for the password (PIN) of X76F041 card can be changed, the application must verify the old password correctly before the ACI_ChangePIN command can be executed. If the read password is verified, only the read password can be changed. If the write password is verified, only the write password can be changed. However, when the configuration password is verified, all three passwords can be changed.1fMWO1z WOOn0 &OO$ ACI_EraseWO?% The ACI_Erase command is available for some memory cards with the erasing capabilitO?&Oy. The parameter structure is defined as follows:mOR#t6O X NameValueDescriptionq?R#t>O X  CLA0x00Instruction class9R#trO X  "INSACI_EraseInstruction code for the erase command93R#trO X  P1variableMSB of the starting address to be erased9R#trO X  P2variableLSB of the starting address to be erasedF3WS#vO X  ,Lcvariable <= 32The number of bytes to be erased from the cardjR#t0O X DataIn-Don't care4WGR#thO X  Le0x00No response data expected from the card'n$ 1G1l†!Ԅ5nԄ$ "ACI_WriteCarry% The ACI_WriteCarry command is available for EEPROM non-reloadable token counter cards. The parameter structure is defined as follows:mԄR#t6Og  NameValueDescriptionq_R#t>Og   CLA0x00Instruction classDR#tOg   ,INSACI_WriteCarryInstruction code for the write carry commandV_S#vOg   &P10x01 or 0x030x01 = write carry without backup0x03 = write carry with backup:*R#ttOg   P2variableLSB of the starting address to be written@R#tOg   Lc0x01Only one byte at a time is allowed for this commandT*bR#tOg  &DataInvariableDataIn[0] contains the byte that is to be written into the card4R#thOg   Le0x00No response data expected from the card'b$ 1@1zz"@w7w$ &ACI_Authenticate@C% OThe ACI_Authenticate command is available for some memory cards which can generate a card authentication certificate. The parameter structure is defined as follows:owR#t:A f  Field ValueDescriptionqC#R#t>A f  CLA0x00Instruction classGR#tA f  0INSACI_AuthenticateInstruction code for the authenticate commandh#zV#|A f  P1variableCase SLE4436 : 0x00 = Use Key 1 0x01 = Use Key 2Case ST1333, ST1335: 0x00 alwaysT#vcA f  P2variableCase SLE4436: Number of CLK pulses to be supplied to the card for the computation of each bit of the authentication certificateCase ST1333,ST1335 : 0x00 alwaysJzS#vA f  LcvariableCase SLE4436 : Lc = 0x06Case ST1333, ST1335 : Lc = 0x04?R#t~A f &DataInvariableChallenge data to be presented to the carderT#xA f  rLevariableAuthentication certificateCase SLE4436 : Le = 0x02Case ST1333, ST1335 : Le = 0x01$" 1r1r#5$ "ACI_SetProtect % The ACI_SetProtect command is available for the XIIC card, the AM256 card, the AM4KP card and the X76F041 card. For the XIIC, AM256 and the AM4KP card, it can be used to set the starting block of the write-protection memory area and for the case of XIIC card, it can be used to set the number of protection block also. Finally for the X76F041, it can be used to set the configuration register value as described in the ACI_ChangePIN paragraph. The parameter structure is defined as follow:n{R#t8A f FieldValueDescriptionq R#t>A f  CLA0x00Instruction class{){gR#tRA f  ,INSACI_SetProtectInstruction code q#UA f  <P P1variableCase when : -XIIC : P1 = start protecting block (0 P1 0x0F)AM256 : P1 = start protecting blockAM4KP : P1 = start protecting blockX76F041 : P1 = 0xghn#A f  <P P2variableCase when : -XIIC : P2 = no of blocks to be protected (0 P2 0x0F)AM256, AM4KP, X76F041 : P2 = 0M#n#A f  <P vLcvariableCase when : -XIIC, AM256, AM4KP : Lc = 0X76F041 : Lc = 5hhn#A f &DP DataInvariableCase when : -XIIC, AM256, AM4KP : No input dataX76F041 : Configuration Register6#R#tlA f  Le0x00No output data expected from this command$" 11]$ D 6 $ $ACI_ReadProtect7C% %The ACI_ReadProtect command is available for the XIIC card, the AM256 card, the AM2KS, the AM4KP card and the X76F041 card. It can be used to read the block security status and the block number of the high endurance memory block from the XIIC card or it can be used to read the write protection register for the AM256 card and the AM4KP card or it can be used to read the configuration register for the X76F041 card or it can be used to read the security memory for the AM2KS card. The parameter structure is defined as follow:o R#t:A f  Field ValueDescriptionqC#R#t>A f  CLA0x00Instruction class|*R#tTA f  .INSACI_ReadProtectInstruction code n# X#,A f  P1-Dont carefsR#t(A f  P2-Don't care}+ R#tVA f  Lc0x00No input data for this commandms]R#t6A f DataIn-No input datahW#~A f  LevariableCase when : -XIIC : Le = 3AM256 : Le = 1AM4KP : Le = 1X76F041 : Le = 5AM2KS : Le=4m]% For XIIC card, this command will response with a three bytes message containing the following information.~ 8^#@z   "8.Byte positionNameMeaning.j#\z    1STARTNumber of first protected block>8xj#|z    2BLK_CNTNumber of blocks protected from block # start@.v#z    3HE_BLKBlock number of the High Endurance memory blockx& For AM2KS card, this command will response with a four bytes message containing security memory of the following information.~ .R^#@z   ".Byte positionNameMeaning2j#dz    1ERR_CNTError Counter for SC presentationbRj#z  2-4SCThree bytes security code (Visible only after successful security code verification)& For X76F041 card, this command will response with a five bytes message containing the configuration register information. For the details meaning of each byte, please refer back to the technical specification of the X76F041 chip.~ F^#@zf f  ".Byte positionNameMeaning&j#Lzf f   1ACR1Array Control Register 1&Ffj#Lzf f   2ACR2Array Control Register 2#v#Fzf f   3CRConfiguration Registerfv#6zf f   4RRRetry Register v#4zf f   5RCRetry Counter$D " 1 u 1r%u  0 D  $ ACI_SetHEu  % The ACI_SetHE command is available for the XIIC card only. It can be used to relocate the High Endurance memory block to the specified block address. The parameter structure is defined as follow:o  R#t:A f  Field ValueDescriptionq p R#t>A f  CLA0x00Instruction classv$  R#tHA f  "INSACI_SetHEInstruction code Gp  R#tA f  $P10 P1 0x0FNew block number of the High Endurance memory blockn  X#,A f  P2-Dont care}+ j R#tVA f  Lc0x00No input data for this commandm  R#t6A f DataIn-No input data6j _R#tlA f  Le0x00No output data expected from this command$ " 1_1&@D6$ $ACI_LockProtect^y@% The ACI_LockProtect command is available for the AM256 card and the AM4KP card only. It can be used to disable access to the write-protection register irreversibly. The contents of the write-protection register is not changed and the curreny@tly write-protection memory area cannot be modified any more. The parameter structure is defined as follow:n@R#t8A J FieldValueDescriptionqy@XAR#t>A J  CLA0x00Instruction class|*@AR#tTA J  .INSACI_LockProtectInstruction code kXA?BR#t2A J  P10x00must be zerokABR#t2A J  P20x00must be zero}+?B'CR#tVA J  Lc0x00No input data for this commandmBCR#t6A J DataIn-No input data6'CDR#tlA J  Le0x00No output data expected from this command$C@D" 1DqD1 'qDDnI7@DD$ &ACI_ClearProtectqDE1 0The ACI_ClearProtect command is available for the AM256 card and the AM4KP card only. It can be used to set all memory address to not write-protected. The parameter structure is defined as follow:nDFR#t8A J FieldValueDescriptionqEFR#t>A J  CLA0x00Instruction class}+FGR#tVA J  0INSACI_ClearProtectInstruction code kFmGR#t2A J  P10x00must be zerokGGR#t2A J  P20x00must be zero}+mGUHR#tVA J  Lc0x00No input data for this commandmGHR#t6A J DataIn-No input data6UHJIR#tlA J  Le0x00No output data expected from this command$HnI" 1JII1 (IIH3nII$ ACI_WriteAllIK1 0The ACI_WriteAll command is available for the AM256 / AM4KP / X76F041 / X76F128 / X76F640. For the case of AM256 card and the AM4KP card, it can be used to fill the complete card memory with the specific value. For the X76F041 card, it can be used to fill the complete card with the value 0x00. For the case of X76F128 and X76F640 card, prior to using this command it must have the Reset Password being verified OK. The parameter structure is defined as follow:nIGLR#t8A f FieldValueDescriptionqKLR#t>A f  CLA0x00Instruction classy'GL1MR#tNA f  (INSACI_WriteAllInstruction code kLMR#t2A f  P10x00must be zerok1MNR#t2A f  P20x00must be zeroGMNn#A f  <P jLcvariableCase when : -AM256, AM4KP : Lc = 2X76FXXX : Lc = 8fNOn#A f &DP DataInvariableCase when : -AM256, AM4KP : data to be filledX76F041 : configuration password6N$R#tlA f  Le0x00No output data expeO$nIcted from this command$OH" 1$y1  )yR3H$ ACI_EraseAlly% The ACI_EraseAll command is available for the AM4KP card and the X76F041 card only. It can be used to erase the whole card memory with the value 0xFF. The parameter structure is defined as follow:nR#t8A f FieldValueDescriptionqwR#t>A f  CLA0x00Instruction classy'R#tNA f  (INSACI_WriteAllInstruction code kw[R#t2A f  P10x00must be zerokƃR#t2A f  P20x00must be zerol[2R#t4A f  Lc0x00no input datat"ƃR#tDA f &DataInvariableno input data62.R#tlA f  Le0x00No output data expected from this command$R" 1.13  *5R$ "ACI_ReactivateF1 0+The ACI_Reactivate command is available for the X76F128 card and the X76F640 card only. It can be used to erase the retry counter and reactivate the card. This command is valid only after the Reset Password is verified OK. The parameter structure is defined as follow:nlR#t8A f FieldValueDescriptionq݇R#t>A f  CLA0x00Instruction class{)lXR#tRA f  ,INSACI_ReactivateInstruction code k݇ÈR#t2A f  P10x00must be zerokX.R#t2A f  P20x00must be zerolÈR#t4A f  Lc0x00no input datat".R#tDA f &DataInvariableno input data6R#tlA f  Le0x00No output data expected from this command$" 11 8 +!6!$ $ACI_CardOptions% The ACI_CardOptions command is available for the IIC card and the XIIC card only. It can be used to change the page size and the chip select address bits. The parameter structure is defined as follow:o!R#t:A t  Field ValueDescriptionqR#t>A t  CLA0x00Instruction class{)lR#tRA t  .INSACI_CardOptionsInstruction code4^#A t  "RP1Bitmap for this byte is:xAAAxPPPAAA = Chip select address bits.PPP = Page size where000 = 4 bytes001 = 8 bytes010 = 16 bytes011 = 32 bytes100 = 64 bytes101 = 64 bytes110 = 64 bytes111 = 64 bytesflR#t(A t  P2-Don't care}+R#tVA t  Lc0x00No input data for this commandm R#t6A t DataIn-No input data 6R#tlA t  Le0x00No output data expected from this command$ " 11 ,3$ ACI_BlowFuse% [The ACI_BlowFuse command is available for the AT101, AT102 and AT1604 cards only. It can be used to blow the fuse of a card. The parameter structure is defined as follow:n\R#t8A f FieldValueDescriptionqR#t>A f  CLA0x00Instruction classy'\FR#tNA f  (INSACI_BlowFuseInstruction code 8R#tpA f  P1variableMSB of the starting address of the fuse8FZR#tpA f  P2variableLSB of the starting address of the fuse}+R#tVA f  Lc0x00No input data for this commandmZDR#t6A f DataIn-No input data6R#tlA f  Le0x00No output data expected from this command$D" A11-1jInstall CardEasy9j# ,Installing CardEasy1% Before installing CardEasy into your system, you need to know what hardware and software are required for the running of this software.b0j|2 4`KBQSoftware RequirementHardware Requirement[% Please follow the following instructions for the installation and running of CardEasy.p|I `P:㬈LЀ1. Close all unrelated applications2. Connect the ACR reader properly according to the installation guide3. Run SETUP.EXE from the CardEasy installation diskette4. After installation, double click the CardEasy to start5. Select the correct reader configuration when prompted6. If everything is OK, check the reader capabilites in the About page? 4 6 Note : The read/write capabilities of CardEasy on specific card type is determined by the card reader. For example, if you are using ACR10, CardEasy will be limited to the operations on the memory card type only. If you are using ACR15, CardEasy will be limited to the MCU card type and some selective memory card types. Please refer to the ACRXX reference manual for the list of supporting card type. Althernatively, you can examine the list of supporting card types of the connecting reader via the About page.1%1.%|W4|# hMicrosoft Windows 95 or Microsoft Windows NT 4.01%1/-T|-, (iӉACR10 readerACR15 readerACR20 reader (To get the reader, please contact ACS)1^10^d;-$ .Reader Configuration0^> J"Whenever CardEasy cannot detect there is an ACR reader connected in the speicified communication port, the following screen will appear and the user is responsible for the entering of the correct configuration.The first selection box specified the communication port that connected with the reader.The second selection box specified the type of reader that you are using. If you are not sure which type of reader you are using, select Auto detect will have all it done automatically.hd'  Note: This did-alog box will not be appeared when CardEasy is successfully connected with the reader.@1 1DOperation Guide5d# $Operation GuidezVS$ The user interface of CardEasy is mainly divided into four tabbed pages. They are:4H#^3 "B Memory CardThis page assumed the inserted card is a memory card. It allow the user to play with the memory card with a set of memory card commandsS!H#^K "2ЀACOS1This page assumed the inserted card is an ACOS1 MCU card. It allow the user to explore the capabilities of the ACOS1 card with a user friendly interface.4H#^m "`]CommandsThis page play the reader/card commands directly using the programming interface. It is designed for the programmer to test out the reader/card commands interactively.c!G#^ "ЀAboutThis page tells the user the capabilities and status of the currently connected reader.{OD, &5Beside this four tabbed pages, there is a communication window in the bottom part of the main window showing all the communication parameters between CardEasy and the underlying ACSR20 library . By inspecting the command and response pair in this window, user can help to understand the internal working of CardEasy more easily.1u1 2uW 1D# Memory Card1u8 >" By selecting correctly the card type of the currently inserted card and then the area zone within that particular card type, the data content inside this area will be read out automatically and displaying in the panel on the right.Note : In some cases when a password is required to read out the data content from the card, CardEasy will prompt you the verify password screen. User is required to present the correct password in order for the inspection of that particular area of card content.Z1 R rKr'㈛SvP[ ReadThis button allow you to change the starting read address.WriteThis button allow you to perform the write-related functionsKeysThis button allow you to perform the keys-related functionsPropertiesThis button allow you to read/set various properties of the inserted cardSpecialThis button allow you to perform the card-specific special commandsNote : When the selected card area is larger than 32 bytes, you can use the scroll bar to select the particualr addresses that you want to read.&W # 11  1< 3  &9W  # ,Memory Card (Write)e &a "In this dialog box you are allowed to perform a write/update operation on the inserted card. You can use the start and length edit box to change the address and size of the update. The content shown in the windows is read directly from the card and you can change them to any other value at your will. The operation will be carried out on the card when you press OKDepending on which card type you are working on, the available selections within the Write options are different accordingly. For example, if the inserted card type is SLE4442, you can use Write protect the memory to protect the card memory from writing again. If the inserted card type is SLE4436, you can use the View counter button to modify the counter value of the card.1 W1! 4WAE"&# DMemory Card (Keys Verification) WA= H"In this dialog box you are allowed to A&perform the key verification and/or the key modification operation on the inserted card. Depending on the card types, different keys are selectable in the drop-down box. If the ACI_ChangePIN operation is allowed on this card type, the New value portion will be enabled and user are allowed to change the selected keys to another value.Press OK will carry out the operation and Cancel will abort the verification1A1<  5A#BzD>A#B# 6Memory Card (Properties)1ATDI `"This dialog box will help to show the properties associate with the selected card type. It is card type specific and different from card type to card type. For example, when the selected card type is AM256, the properties dialog box allow you to change the protected register. Please refer to the reference manual of that particular card type for the correct operation on this settingPress Update will carry out the operation on the card and Exit will leave the dialog&#BzD# 1TDD1 6DDF;zDD# 0Memory Card (Special)DF0 .!"This dialog box will help to show the special functions associate with the selected card type. It is card type specific and different from card type to card type. For example, when the selected card type is GPM896, the special dialog box allow you to voltage level on the fuse pin. Please refer to the reference manual of that particular card type for the correct operation of these functions1DF1 M 7FGH1 FG$ ACOS1 CardFH6 :#"7ljWhen you selected the ACOS1 tab and press the reset button, you will see a list of user files under the ACOS1 root. Selecting a file will make the content displaying on the right. When keys are required to perform the read operation, user will prompted for the keys input.For the detail architecture of ACOS1, please refer for the ACOS1 reference manual or contact Advanced Card Systems Ltd.1GH1^  8H-IZK/ H-I$ CommandsHI% 5If you are familiar with the ACSR20 API, you can use this tabbed page to do whatever commands you want. A typical sequence of operation is as follow, -IJ+ $7P:1. Start session (need to specify the card type)2. ExchangeAPDU (need to specify CLA, INS, P1, P2, Lc, Le, and DataIn when necessary)3. End sessionIZK& If Lc is not equal to zero, you need to input the DataIn field. You can see the execution result in the communication windows1JK1M S 9KK5M,ZKK$ About~;K5MC Ty"The about page is invoked by selecting the About tag. It can help to determine the capabilities and status of the currently connected reader.The meaning of the fields are self-explaintory except that the numbers meaning in the list of supporting card type can be found in the ACRXX reference manual1KfM1 :fMM;5MM$ .Communication WindowfM< FUThe communication window located in the lower part of the main window show the execution result of the reader command. A < character in the first column indicating that there is data go into the reader and a > character in the first column indicating that there is data go out from the reader. Normally when you perform an ExchangeAPDU command, it will consist of six bytes (CLA, INS, P1, P2, Lc, Le) of data going into the reader first and then followed by Lc bytes of DataIn when Lc is greater than zero. After the reader executed tM5Mhat command successfully, it will return two bytes of SW1, SW2 and then followed by Le bytes of DataOut when Le is greater than zero.&M# N1+;HTerms of use and distributionAH$ :Terms of conditions of use$l] END USER LICENSE AGREEMENT FOR ACS SOFTWAREIMPORTANTREAD CAREFULLY: This ACS End User License Agreement (EULA) is a legal agreement between you (either an individual or a single entity) and Advanced Card Systems Ltd. for the ACS Software product identified above, which includes computer software and associated media and printed materials, and may include online or electronic documentation (SOFTWARE PRODUCT or SOFTWARE)H{( . By installing, copying, or otherwise using the SOFTWARE PRODUCT, you agree to be bound by the terms of this EULA. If you do not agree to the terms of this EULA, promptly return the unused SOFTWARE PRODUCT to the place from which you obtained it for a full refund.SOFTWARE PRODUCT LICENSEThe SOFTWARE PRODUCT is protected by copyright laws and international copyright treaties, as well as other intellectual property laws and treaties. The SOFTWARE PRODUCT is licensed, not sold.gl + $1GRANT OF LICENSE. This EULA grants you the following rights:Software. You may install and use one copy of the SOFTWARE PRODUCT, or in its place, any prior version for the same operating system, on a single computer. The primary user of the computer on which the SOFTWARE PRODUCT is installed may make a second copy for his or her exclusive use on either a home or portable computer.Storage/Network Use. You may also store or install a copy of the SOFTWARE PRODUCT on a storage device, such as a network server, used only to install or run the SOFTWARE PRODUCT on your other computers over an internal network; however, you must acquire and dedicate a license for each separate computer on which the SOFTWARE PRODUCT is installed or run from the storage device. A license for the SOFTWARE PRODUCT may not be shared or used concurrently on different computers.{, &License Pak. If you have acquired this EULA in a Microsoft License Pak, you may make the number of additional copies of the computer software portion of the SOFTWARE PRODUCT authorized on the printed copy of this EULA, and you may use each copy in the manner specified above. You are also entitled to make a corresponding number of secondary copies for home or portable computer use as specified above.2DESCRIPTION OF OTHER RIGHTS AND LIMITATIONS. Limitations on Reverse Engineering, Decompilation, and Disassembly. You may not reverse engineer, decompile, or disassemble the SOFTWARE PRODUCT, except and only to the extent that such activity is expressly permitted by applicable law notwithstanding this limitation. * "WSeparation of Components. The SOFTWARE PRODUCT is licensed as a single product. Its component parts may not be separated for use on more than one computer.Rental. You may not rent or lease the SOFTWARE PRODUCT. Software Transfer. You may permanently transfer all of your rights under this EULA, provided you retain no copies, you transfer all of the SOFTWARE PRODUCT (including all component parts, the media and printed materials, any upgrades, this EULA, and, if applicable, the Certificate of Authenticity), and the recipient agrees to the terms of this EULA. If the SOFTWARE PRODUCT is an upgrade, any transfer must include all prior versions of the SOFTWARE PRODUCT.) 3Termination. Without prejudice to any other rights, Microsoft may terminate this EULA if you fail to comply with the terms and conditions of this EULA. In such event, you must destroy all copies of the SOFTWARE PRODUCT and all of its component parts.3UPGRADES. If the SOFTWARE PRODUCT is an upgrade from another product, whether from Microsoft or another supplier, you may use or transfer the SOFTWARE PRODUCT only in conjunction with that upgraded product, unless you destroy the upgraded product. If the SOFTWARE PRODUCT is an upgrade of a Microsoft product, you now may use that upgraded product only in accordance with this EULA. If the SOFTWARE PRODUCT is an upgrade of a component of a package of software programs that you licensed as a single product, the SOFTWARE PRODUCT may be used and transferred only as part of that single product package and may not be separated for use on more than one computer.i72 2o4COPYRIGHT. All title and copyrights in and to the SOFTWARE PRODUCT (including but not limited to any images, photographs, animations, video, audio, music, text, and applets incorporated into the SOFTWARE PRODUCT), the accompanying printed materials, and any copies of the SOFTWARE PRODUCT are owned by Microsoft or its suppliers. The SOFTWARE PRODUCT is protected by copyright laws and international treaty provisions. Therefore, you must treat the SOFTWARE PRODUCT like any other copyrighted material except that you may either (a) make one copy of the SOFTWARE PRODUCT solely for backup or archival purposes or (b) install the SOFTWARE PRODUCT on a single computer provided you keep the original solely for backup or archival purposes. You may not copy the printed materials accompanying the SOFTWARE PRODUCT. ) 5DUAL-MEDIA SOFTWARE. You may receive the SOFTWARE PRODUCT in more than one medium. Regardless of the type or size of medium you receive, you may use only one medium that is appropriate for your single computer. You may not use or install the other medium on another computer. You may not loan, rent, lease, or otherwise transfer the other medium to another user, except as part of the permanent transfer (as provided above) of the SOFTWARE PRODUCT.LIMITED WARRANTY$ yLIMITED WARRANTY. ACS warrants that (a)the SOFTWARE PRODUCT will perform substantially in accordance with the accompanying written materials for a period of ninety (90) days from the date of receipt, and (b)any hardware accompanying the SOFTWARE PRODUCT will be free from defects in materials and workmanship under normal use and service for a period of one (1) year from the date of receipt. Some states and jurisdictions do not allow limitations on duration of an implied warranty, so the above limitation may not apply to you. To the extent allowed by applicable law, implied warranties on the SOFTWARE PRODUCT and hardware, if any, are limited to ninety (90) days and one year, respectively.U U= H1CUSTOMER REMEDIES. ACSs and its suppliers entire liability and your exclusive remedy shall be, at ACSs option, either (a)return of the price paid, or (b)repair or replacement of the SOFTWARE PRODUCT or hardware that does not meet ACSs Limited Warranty and which is returned to ACS with a copy of your receipt. This Limited Warranty is void if failure of the SOFTWARE PRODUCT or hardware has resulted from accident, abuse, or misapplication. Any replacement SOFTWARE PRODUCT or hardware will be warranted for the remainder of the original warranty period or thirty (30) days, whichever is longer. Outside the United States, neither these remedies nor any product support services offered by ACS are available without proof of purchase from an authorized international source.u' NO OTHER WARRANTIES. TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, ACS AND ITS SUPPLIERS DISCLAIM ALL OTHER WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE, WITH REGARD TO THE SOFTWARE PRODUCT, AND ANY ACCOMPANYING HARDWARE. THIS LIMITED WARRANTY GIVES YOU SPECIFIC LEGAL RIGHTS. YOU UMAY HAVE OTHERS, WHICH VARY FROM STATE/JURISDICTION TO STATE/JURISDICTION.NO LIABILITY FOR CONSEQUENTIAL DAMAGES. TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, IN NO EVENT SHALL ACS OR ITS SUPPLIERS BE LIABLE FOR ANY SPECIAL, INCIDENTAL, INDIRECT, OR CONSEQUENTIAL DAMAGES WHATSOEVER (INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF BUSINESS PROFITS, BUSINESS INTERRUPTION, LOSS OF BUSINESS INFORMATION, OR ANY OTHER PECUNIARY LOSS) ARISING OUT OF THE USE OF OR INABILITY TO USE THE SOFTWARE PRODUCT, EVEN IF ACS HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. BECAUSE SOME STATES AND JURISDICTIONS DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES, THE ABOVE LIMITATION MAY NOT APPLY TO YOU.hU& Copyright 1996-1997 Advanced Card Systems Ltd. All rights reserved. ACS, ACR10, and ACR20 are trademarks of Advanced Card Systems Ltd. Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise noted. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, without express written permission of Advanced Card Systems Ltd. The software described in this document are furnished under a license agreement or nondisclosure agreement. The software may be used or copied only in accordance with the terms of the agreement. It is against the law to copy the software except as specifically allowed in the license or nondisclosure agreement. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or information storage and retrieval systems, for any purpose other than the purchaser's personal use, without the express written permission of Advanced Card Systems Ltd.Y/* $^GdщClick here to return to the contents page@$1a <$YETroubleshooting5Y# $Troubleshooting;$ % -Occasionally, you will see some unexpected error codes return from CardEasy. The error return codes are always negative and usually appear in the communication windows. Try look up your error code with the following table and see whether you know what is going wrong or not.QY A#R b` CodeMeaningd# I A#RFb` -603Error in the reader handlec"  A#RDb` -600Session parameter is nulll+I  A#RVb` -108No free handle left for allocationb! z A#RBb` -100Selected port is invalidd#  A#RFb` -101Selected reader is invalidc"z A A#RDb` -102Selected port is occupied`  A#R>b` -1001No card type selected^A  A#R:b` -1002No card is insertedZ Y A#R2b` -1003Wrong card type^  A#R:b` -1004Card not powered upYY A#R0b` -1005INS is invalidW gA#R,b` -1006Card failureYA#R0b` -1007Protocol errorb!g"A#RBb` -1008Card type not supported_A#R<b` -1009Incompatible command["A#R4b` -1010Error in address\D@A#R6b` D@-1011Data length errorc"@A#RDb` -1012Error in response length]D@AA#R8b` -1013Secret code lockedc"@gAA#RDb` -1014Invalid SC module number]AAA#R8b` -1015Incorrect passwordWgABA#R,b` -1050Error in CLAc"A~BA#RDb` -1051Error in APDU parametersg&BBA#RLb` -1052Communication buffer is fullo.~BTCA#R\b` -1053Address not align with word boundary_BCA#R<b` -1080Protocol frame errorb!TCDA#RBb` -1081No response from reader<CDG#^xb` -1082Error found in the calling functions parametershDEM#j6b` -1099Unknown responsebDE+ &7ljIf you still cannot solve your problem, please contact our people for the technical support1EE1: =EEH8EE$ (Technical SupportD E:H; D" Our software is improving continuously. If you notice any bugs or irregular behavior of the software, please feel free to contact us at the following address. Advanced Card Systems Ltd.Rm 1520, Chevalier Commercial Centre,8 Wang Hoi Road, Kowloon Bay,Kowloon, Hong Kong.Tel : (852) 2796 7873Fax : (852) 2796 1286Email : waihung@acs.com.hkContact person : Mr. Lin Wai HungTo report a problem, please specify the detail of your running environment and the condition at which your problem will be happened.EH) 9You can download the latest copy of our software from our web site :http://www.acs.com.hkAll comments are welcome and we are sincerely to serve you.D:HCI1>CI~IKOrdering ACR reader;H~I# 0Ordering infrormationCIK= H" For the ordering of the ACR10 / ACR15 / ACR20 smart card reader, please contact Advanced Card Systems Ltd. at the following address:Advanced Card Systems Ltd.Rm 1520, Chevalier Commercial Centre,8 Wang Hoi Road, Kowloon Bay,Kowloon, Hong Kong.Tel : (852) 2796 7873Fax : (852) 2796 1286Email : simonliu@acs.com.hkContact person : Mr. Simon Liu (Marketing Manager)You can download the latest copy of our software from our web site :http://www.acs.com.hke@~IK% All comments are welcome and we are sincerely to serve you.1K1?JA Tms RmnSymbolHelvCourierTimes New RomanArialMS SerifMS Sans SerifTimesHelveticaSystemCourier NewMarlettWingdings  /&;)Lz@M@CoverlOverview G =3ӄA2)O>bG vWلB&W7e†zr    8 D Install CardEasy  s Operation Guide ! <  M  S  Terms of use and distribution Troubleshooting Ordering ACR reader /&;)L4??SvP |}d NQ Kr'! UzB [ G-=7 81O  2Я w3}ӄC~b) мGe2hGdiӺ  QDMlqWMAN` bG < d&3Lل&  >dr 5S "8 x(eQ(D Y(†yq+F, E,W8 ޔ;rKB X;CLs i O9[FX `]M /gjIl`lv,r7rRt ËOB