Free Standards Online
BS EN 17366-2020 Waste management – Access control to collection containers – Id entification and authorization. For use, this document restricts these options by defining that the length of the unique number of the access chip shall be minimum 7 bytes. Readers and systems shall be able to read and process access chips in accordance. 4.6 Information on access chip 4.6.1 Generalities ISO/IEC 14443-L ISO/IEC 14443-2 and ISO/IEC 14443-3 not only define that each access chip shall have a unique number, they also define other sectors on the access chip memory that can be used to contain information. This document does not define or restrict the use of the other sectors on the access chip memory. It is therefore possible to use the access chip for instance to get access to buildings or pools, without the access chip being not conformant to this document. 4.6.2 Requirement on access chip In the case extra information is stored in the available sectors on the access chip memory, the MAD writing method shall be used to prevent two applications using the same sector and therefore causing problems. The MAD method uses an index to define to which sector of the access chip memory the information for a specific application can be found, thereby optimizing the use of the access chip. 4.7 Information required to open the collection container The unique number on the access chip shall be the only element of information that is necessary to determine whether the collection container should be opened. So the UID shall be used in the data chain. The opening of the insertion mechanism (i.e. drum, trap door, compartment…) shall always be based on the UID. If any other information that is stored on the access chip is necessary to determine whether the container shall be opened, the reading device does not conform to this document. 4.8 Reading the unique number ISOJIEC 14443-1, lSO/IEC 14443-2 and [SO/IEC 1444I3 define that each access chip that conforms to the standard shall have a unique identifier (the so-called “UID) stored on the access chip. To ensure that every reader reads the same number, the byte order that shall be used to represent the number when supplying this to the other systems, shall be the big-endian order. 4.9 Writing to the access chip The (JID is the only and sole way to get access to the collection container. Other applications can...

Download Address

  • Download