[Okta Webinar] Learn how to a build a cloud-first strategyRegister Now

x
?
Solved

Delphi with SmartCards, RFID, PC/SC

Posted on 2009-02-19
4
Medium Priority
?
3,753 Views
Last Modified: 2012-06-21
hello!

I am looking for a preferably working example on how to program smartcards, I am not familiar with how they work, and so far I have only been able to extract serial numbers...

I wish to implement support for smartcards with winscard.dll, and I will set 500 points to this question if anyone is able to provide me a working example...

I also need a way to access the Masterfile, read and write.
0
Comment
Question by:joepezt
  • 2
  • 2
4 Comments
 
LVL 31

Accepted Solution

by:
Paranormastic earned 600 total points
ID: 23686636
Smartcard programming is rough - don't expect to crank out a product in a short period of time in most cases.

Here's a good starter tutorial for using winscard:
http://www.devarticles.com/c/a/Cplusplus/Writing-a-Smart-Card-Library/

Here are a few more good starting articles - there is some code examples and code usage information in there, not sure how much of it you will find useful or not.  Note many of these have multiple tiered links to other pages that you may find useful.

http://msdn.microsoft.com/en-us/library/aa374731(VS.85).aspx#smart_card_functions

http://social.msdn.microsoft.com/Forums/en-US/netfxbcl/thread/d4f962b4-5bc0-4eeb-973d-cd073ae22089/

http://msdn.microsoft.com/en-us/library/aa913931.aspx
0
 
LVL 2

Author Comment

by:joepezt
ID: 23710371
thank you, not a fully solutions, but it sohuld be ok for now, just hope it will give me some more starting pooints
0
 
LVL 31

Expert Comment

by:Paranormastic
ID: 23711778
Like I said, smartcard programming is pretty rough.  You're not likely to find much for code examples out there because most of it will be proprietary.  It starts off looking pretty simple until you realize that it is one of the more complex things to work on, depending how far into it you get for your product.  Really the best way to go about this is to just take the time and really learn it by reading it and doing what you can to piece things together into your own code for learning.  

The company I used to work for had worked on their code for over 25 years with half a dozen very talented developers - and pretty much all it did at the end of the day was handle certificates and single sign-on.  They were one of the leaders because they were more heavily integrated into various products and were able to try to work through stability and compatibility issues.
0
 
LVL 2

Author Comment

by:joepezt
ID: 23711835
basically, I know nothing at all about these, either they are smartcards or RFID cards, they both run pC/SC, rfid can run in legacy mode, however.. we got some cards here I would likee to study to see what the applications are doing to the cards in order to store data I know some of these cards can ecen execute code
0

Featured Post

Concerto's Cloud Advisory Services

Want to avoid the missteps to gaining all the benefits of the cloud? Learn more about the different assessment options from our Cloud Advisory team.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Introduction Raise your hands if you were as upset with FireMonkey as I was when I discovered that there was no TListview.  I use TListView in almost all of my applications I've written, and I was not going to compromise by resorting to TStringGrid…
In my programming career I have only very rarely run into situations where operator overloading would be of any use in my work.  Normally those situations involved math with either overly large numbers (hundreds of thousands of digits or accuracy re…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…
Is your data getting by on basic protection measures? In today’s climate of debilitating malware and ransomware—like WannaCry—that may not be enough. You need to establish more than basics, like a recovery plan that protects both data and endpoints.…
Suggested Courses
Course of the Month18 days, 19 hours left to enroll

834 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question