This is the repository for the Keyple Android Validation Demo application.
This demo is an open source project provided by the Calypso Networks Association implementing the Eclipse Keyple SDK in a typical use case that can serve as a basis for building a ticketing ecosystem based on contactless cards and/or NFC smartphones.
The source code and APK are available at calypsonet/keyple-demo-ticketing-validation-app/releases
The code can be easily adapted to other cards, terminals and business logic.
It shows how to check if a card is authorized to enter a controlled area (entering the transport network with a Season Pass and/or Multi-trip ticket), a validation event is added in the event log to be checked by the Keyple Demo Control application. The contracts are loaded in the Calypso card with the Android application of the Keyple Reload Demo package.
The demo application was tested on the following terminals:
Famoco FX205
via the open source plugins Famoco (for SAM access) and Android NFC (for card access).Coppernic C-One 2
via the open source plugin Coppernic.
The following terminals have also been tested but as they require non-open source libraries, they are not active by default (see Using proprietary plugins)
Bluebird EF501
via the proprietary plugin Bluebird.Flowbird Axio 2
via the proprietary plugin Flowbird.
As all the exchanges made with the card are cryptographically secured by a security module (SAM), it is mandatory to install it in the terminal for the application to work properly.
This application supports two types of cards:
Standard Calypso cards that support secure sessions with SAM authentication. These cards can contain multiple contracts (up to 4 depending on the product type: Basic=1, Light=2, Prime/Regular=4) and use secure cryptographic operations.
Simple storage cards that don't require SAM authentication. These cards contain a single contract and use basic read/write operations without cryptographic security.
Important Note: The Storage Card implementation in this demo is intentionally basic and does not account for potential specific capabilities that different types of storage cards might offer, such as dedicated counters for specific components, advanced memory management, or card-specific security features. A production application would likely need to consider and implement these card-specific capabilities based on the actual storage card technology being used.
Security Consideration: No security mechanisms have been implemented for Storage Cards in this demonstration. In a production environment, developers should implement appropriate security measures to protect data exchanges, for example by using signatures generated by a SAM or other cryptographic security modules suitable for their specific use case and security requirements.
This demo is part of a set of three demos:
These demos are all based on a common library that defines elements such as constants and data structures implemented for the logic of the ticketing application: Keyple Demo Common Library.
Please refer to the README file of this library to discover these data structures. All enumerated types used across the three demo applications (Priority Codes, Version Numbers, etc.) are defined in this common library to ensure consistency and interoperability between the different components of the ticketing ecosystem.
This use case searches for the best candidate for validation from the existing contracts in the card.
The goal is to minimize the number of records read, and thus commands exchanged with the card, while being able to quickly ascertain if the application has or not any valid contracts for validation.
If a contract record needs to be analysed and is found to be expired, then its priority value must be updated to ensure that in a next operation (and until the contract is reloaded or replaced) time will not needlessly be wasted in reading this contract.
If the contract has an associated counter (depending on the ContractTariff field value) its value shall be decreased by the required amount for the operation and a new event will be added.
Steps:
- Detection and Selection
- Event Analysis
- Best Contract Search
- Update Counter
- Add new event
For this validation demo application, a simple example validation procedure has been implemented.
This procedure is implemented in the CalypsoCardRepository
class.
Opening a Calypso secure session is mandatory for this procedure since we need to write a new event in the event log. If no Calypso SAM is present, then the procedure will not execute and display an error.
This procedure's main steps are as follows:
- Detection and Selection
- Detection Analysis:
- If AID not found reject the card.
- Selection Analysis:
- If File Structure unknown reject the card.
- Detection Analysis:
- Environment Analysis:
- Open a Validation session (Calypso Secure Session) reading the environment record.
- Unpack environment structure from the binary present in the environment record:
- If
EnvVersionNumber
of theEnvironment
structure is not the expected one (==VersionNumber.CURRENT_VERSION
for the current version) reject the card. - If
EnvEndDate
points to a date in the past reject the card.
- If
- Event Analysis:
- Read and unpack the last event record:
- If
EventVersionNumber
is not the expected one (==VersionNumber.CURRENT_VERSION
for the current version) reject the card. - If
EventVersionNumber
==VersionNumber.UNDEFINED
, return empty card status.
- If
- Store the
ContractPriority
fields in a persistent object.
- Read and unpack the last event record:
- Best Contract Search:
- Create a list of
ContractPriority
fields that are different fromPriorityCode.FORBIDDEN
andPriorityCode.EXPIRED
. - If the list is empty go to END.
- Order the list by
ContractPriority
Value in ascending order (lowest priority number = highest priority). - For each element in the list:
- Read and unpack the contract record for the index being iterated.
- If
ContractVersionNumber
is not the expected one (==VersionNumber.CURRENT_VERSION
for the current version) reject the card. - If
ContractAuthenticator
is not 0 perform the verification of the value by using the PSO Verify Signature command of the SAM (TODO: implementation pending). - If
ContractValidityEndDate
points to a date in the past update the associatedContractPriority
field present in the persistent object toPriorityCode.EXPIRED
and move to the next element in the list - If the
ContractTariff
value for the contract read isPriorityCode.MULTI_TRIP
orPriorityCode.STORED_VALUE
:- Read and unpack the counter associated to the contract (1st counter for Contract #1 and so forth).
- If the counter value is 0 update the associated
ContractPriority
field present in the persistent object toPriorityCode.EXPIRED
and move to the next element in the list - If the counter value is > 0 &&
ContractTariff
==PriorityCode.STORED_VALUE
&&CounterValue
<ValidationAmount
move to the next element in the list
- If the
ContractTariff
value isPriorityCode.SEASON_PASS
, store the contract validity end date.
- Create a list of
- Update Counter:
- Decrement the counter value by the appropriate amount (1 if
ContractTariff
isPriorityCode.MULTI_TRIP
, and the configured validation amount ifContractTariff
isPriorityCode.STORED_VALUE
).
- Decrement the counter value by the appropriate amount (1 if
- Add new Event:
- Fill the event structure to update:
EventVersionNumber
=VersionNumber.CURRENT_VERSION
EventDateStamp
= Current Date converted toDateCompact
EventTimeStamp
= Current Time converted toTimeCompact
EventLocation
= value configured in the validatorEventContractUsed
= index of the contract found during Best Contract SearchContractPriority1
= Value of index 1 ofContractPriority
persistent objectContractPriority2
= Value of index 2 ofContractPriority
persistent objectContractPriority3
= Value of index 3 ofContractPriority
persistent objectContractPriority4
= Value of index 4 ofContractPriority
persistent object
- Pack the Event structure and update it in the event file
- END: Close the session
- Fill the event structure to update:
For Storage Cards, a simplified validation procedure is implemented in the StorageCardRepository
class.
Storage Cards do not require SAM authentication and use simple read/write operations. The procedure is similar but adapted for the simpler card structure:
Important Limitations: This implementation is a basic demonstration and does not leverage specific capabilities that various storage card types might offer. Production applications should be adapted to take advantage of card-specific features such as:
- Dedicated counter management for different card components
- Advanced memory organization and access patterns
- Card-specific security features or encryption capabilities
- Optimized read/write operations based on card technology
Security Notice: This demonstration does not implement any security mechanisms for Storage Cards. Production applications should implement appropriate security measures such as:
- Data encryption and authentication
- Signature verification using SAM or other security modules
- Secure key management and exchange protocols
- Protection against replay attacks and data tampering
The validation procedure steps are:
- Detection and Selection:
- Same as Calypso cards but without secure session requirements.
- Environment and Event Analysis:
- Read environment, event, and contract data in a single operation using block reads.
- Perform the same version and date validations as Calypso cards.
- Contract Validation:
- Storage Cards have only one contract, so no "best contract search" is needed.
- Validate the contract based on its
ContractTariff
value:PriorityCode.MULTI_TRIP
: Check counter value and decrement by 1.PriorityCode.STORED_VALUE
: Check sufficient value and decrement by validation amount.PriorityCode.SEASON_PASS
: Validate against contract end date.PriorityCode.FORBIDDEN
,PriorityCode.EXPIRED
,PriorityCode.UNKNOWN
: Reject the card.
- Update Operations:
- Update the contract data with new counter values.
- Create and write a new validation event.
- Close the transaction without secure session procedures.
- Device selection (
DeviceSelectionActivity
): Allows you to indicate the type of device used, in order to use the associated plugin.- Initially, devices using proprietary plugins are grayed out.
- Settings (
SettingsActivity
): Allows to set the settings of the validation procedure:- Location: Where the validation is taking place. The validation location will be written on the newly created event.
- Battery Powered: Check button to set if the battery powered feature is enable or not.
- Home (
HomeActivity
): Displayed only if the 'battered powered' feature is enabled. Allows to launch the card detection phase. - Reader (
ReaderActivity
): Initializes the Keyple plugin. At this point the user must present the card that he wishes to validate.- Initialize the Keyple plugin: start detection on NFC and SAM (if available) readers.
- Prepare and defines the default selection requests to be processed when a card is inserted.
- Listens to detected cards.
- Launches the Validation Procedure when a card is detected.
- Validation result screen (
CardSummaryActivity
):- If the validation is successful, display:
- Location of the validation.
- Date and hour of the validation.
- Depending on the contract type:
- Season Pass: End of validity.
- MultiTrip Ticket: number of tickets left.
- If the validation fails, display the reason.
- If the validation is successful, display:
Below are the classes useful for implementing the ticketing layer:
TicketingService
ReaderRepository
ReaderActivity.CardReaderObserver
CalypsoCardRepository
/StorageCardRepository
This service is the orchestrator of the ticketing process.
Mainly used to manage the lifecycle of the Keyple plugin. This service is used to initialize the plugin and manage the card detection phase. It is called on the different steps of the reader activity lifecycle:
- onResume:
- Initialize the plugin (Card and SAM readers...)
- Get the ticketing session
- Start NFC detection
- onPause:
- Stop NFC detection
- onDestroy:
- Clear the Keyple plugin (remove observers and unregister plugin)
It prepares and scheduled the selection scenario that will be sent to the card when a card is detected by setting the AID(s) and the reader protocol(s) of the cards we want to detect and read.
Once a card is detected, the service processes the selection scenario by retrieving the current CalypsoCard
or StorageCard
object.
This object contains information about the card (serial number, card revision...)
Finally, this class is responsible for launching the validation procedure and returning its result.
This service is the interface between the business layer and the reader.
This class is the reader observer and inherits from Keyple class CardReaderObserverSpi
It is invoked each time a new CardReaderEvent
(CARD_INSERTED
, CARD_MATCHED
...) is launched by the Keyple plugin.
This reader is registered when the reader is registered and removed when the reader is unregistered.
This class contains the implementation of the "Validation" procedure.
Two implementations are provided:
CalypsoCardRepository
: For Calypso cards with secure session supportStorageCardRepository
: For simple storage cards without secure session requirements
The application uses the following priority codes for contract management:
PriorityCode.SEASON_PASS
: Season pass contract (highest priority)PriorityCode.MULTI_TRIP
: Multi-trip ticket contractPriorityCode.STORED_VALUE
: Stored value contractPriorityCode.FORBIDDEN
: Contract is forbidden for usePriorityCode.EXPIRED
: Contract has expiredPriorityCode.UNKNOWN
: Unknown contract typePriorityCode.UNDEFINED
: Undefined/uninitialized contract
The validation procedure processes contracts in ascending order of their priority key values, with lower numbers indicating higher priority.
By default, proprietary plugins are deactivated. If you want to activate them, then here is the procedure to follow:
- make an explicit request to CNA to obtain the desired plugin,
- copy the plugin into the
/app/libs/
directory, - delete in the
/app/libs/
directory the plugin with the same name but suffixed with-mock
(e.g. xxx-mock.aar), - compile the project via the gradle
build
command, - deploy the new apk on the device.