Hallo Saurabh, > I am getting This ATR now : *3B 8A 80 01 00 31 C1 73 C8 40 00 00 90 00 > 90* , which I have read in this group that it is for SmartMX.
Correct, that's the PC/SC ATR for the SmartMX. > I am looking into writing onto it but so far I am getting 63 00 > response(which means error) > I am trying to load., authenticate the keys and then read -write and > then read back from the SmartMX (Secure Element). > > *_Here is my list of commands : _* > > FF82006006FFFFFFFFFFFF// load keys > FF860000050100026000// authenticate > FFB0000210//read sector 2 > FFD600021022222222222222222222222222222222// write sector 2 > FFB0000210 // read sector 2 again > > I followed this -- > http://www.nfc-reader.com/ > NFC-smart-card-reader/ACR122-API-Manual/API_ACR122.pdf I would guess, that the reader automatically performed protocol selection up to ISO 14443-4 / APDU layer. In that state it is not possible to access the MIFARE part of the chip with reader-side MIFARE emulation. You could try the example on page 12ff of this document. br, Michael -- You received this message because you are subscribed to the Google Groups "Android Developers" group. To post to this group, send email to android-developers@googlegroups.com To unsubscribe from this group, send email to android-developers+unsubscr...@googlegroups.com For more options, visit this group at http://groups.google.com/group/android-developers?hl=en