BS EN 17366-2020 Waste management – Access control to collection containers – Id entification and authorization.
For use, this document restricts these options by defining that the length of the unique number of the access chip shall be minimum 7 bytes. Readers and systems shall be able to read and process access chips in accordance.
4.6 Information on access chip
4.6.1 Generalities
ISO/IEC 14443-L ISO/IEC 14443-2 and ISO/IEC 14443-3 not only define that each access chip shall have a unique number, they also define other sectors on the access chip memory that can be used to contain information. This document does not define or restrict the use of the other sectors on the access chip memory. It is therefore possible to use the access chip for instance to get access to buildings or pools, without the access chip being not conformant to this document.
4.6.2 Requirement on access chip
In the case extra information is stored in the available sectors on the access chip memory, the MAD writing method shall be used to prevent two applications using the same sector and therefore causing problems. The MAD method uses an index to define to which sector of the access chip memory the information for a specific application can be found, thereby optimizing the use of the access chip.
4.7 Information required to open the collection container
The unique number on the access chip shall be the only element of information that is necessary to determine whether the collection container should be opened. So the UID shall be used in the data chain. The opening of the insertion mechanism (i.e. drum, trap door, compartment…) shall always be based on the UID. If any other information that is stored on the access chip is necessary to determine whether the container shall be opened, the reading device does not conform to this document.
4.8 Reading the unique number
ISOJIEC 14443-1, lSO/IEC 14443-2 and [SO/IEC 1444I3 define that each access chip that conforms to the standard shall have a unique identifier (the so-called “UID) stored on the access chip.
To ensure that every reader reads the same number, the byte order that shall be used to represent the number when supplying this to the other systems, shall be the big-endian order.
4.9 Writing to the access chip
The (JID is the only and sole way to get access to the collection container. Other applications can of course write information to the access chip; this Is out of the scope of this document.
4.10 Security
The unique number on the access chip shall be non changeable and readable without encryption or password and shall be read by every reader.
For the other parts of the access chips, that contain information that is not used for the collection of waste (but for instance for access control), this document does not define whether or not security measures are allowed.BS EN 17366 pdf download.