You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The 0x88 is a CT (Continuation Tag) that specifies that the UID uses 7 bytes and not 4 bytes.
Unfortunately the anticoll() function here only supports 4 bytes UID.
I saw some examples online using a second function, amticoll2(), when the first byte is 0x88 but so far I'm not successful to get it work with this package.
What am i missing here.
I have a third party reader that read a card to a DB as
04 A3 C6 CA E2 61 80
I can use the RC512 with an adriuno UNO and read the card as
04 A3 C6 CA E2 61 80
(example and library here:https://randomnerdtutorials.com/security-access-using-mfrc522-rfid-reader-with-arduino/ )
I use your package and get the following read.
New card detected
Have i just been up too long? that hex isn't the same as the ones above?
Edit: Just noticing that it is a partial match
Overlap in 04 A3 C6 CA E2 61 80
but fails to collect the second half?
also the 88 at the beginning doesn't show up on other readers.
The text was updated successfully, but these errors were encountered: