Products
Buy options
€22.00Please check product and platform compatibility before placing an order
All pictures shown are for illustration purpose only. Actual product may slightly vary due to product enhancement or other reasons.
StickID NFC Writer for Python/nfcpy
€22.00
StickID is a device allowing to use Python-based token2_config.py solution developed by Token2 to program its TOTP programmable hardware tokens via NFC. The software can be downloaded from your customer account (Fair Source License).
With StickID NFC Writer and Token2_Config.py you can burn and configure Token2 programmable TOTP tokens (second generation, single profile) under Windows, Linux and macOS (Python3 and a number of Python modules are required)
About the device
The device is based on the PN533 chip from ST-Ericsson (Geneva, Switzerland) and assembled in Molise, Italy
Specifications
Size: 2.91” x 0.83” x 0.4” / 74 x 21 x 10 mm
Host Interface: USB
Power: USB Bus
Reading Distance: up to 3cm
Certification: CE /ETSI EN 302 291, ETSI EN 302 292
Supported Standards
ISO/IEC 14443: compliant with contactless proximity smart cards type A and type B
ISO 18092, ECMA 340 P2P: compliant with all NFC standards
ISO 7816 and ISO7816-4: as a guarantee of compliance with contact smart cards
FeliCa: in compliance with Sony Standard
MIFARE: in compliance with NXP Standard Calypso
Included in the box:
- StickID device with USB-A Port
- 2-in-1 Extension and Adapter Cable USB-A Female to USB-A Male + USB Type-C Male
Related products
Token2 OTPC-P2-i programmable card with restricted time sync, TOTP hardware token
Token2 OTPC-P2-i programmable card with...
OrderToken2 miniOTP-3-i programmable card with restricted time sync, TOTP hardware token
Token2 miniOTP-3-i programmable card wit...
OrderBlog
10-09-2024
Independent Public Security Review of Token2 PIN+ FIDO2 Security Keys
Compass Security Schweiz AG (Compass), a leading Swiss IT security firm, has conducted a comprehensive and independent public security review of the Token2 PIN+ FIDO2 Security Keys firmware.
04-09-2024
Update on EUCLEAK Vulnerability and Chip Security
We want to assure you that we do not use Infineon chips, which are affected by the EUCLEAK side-channel attack recently identified by NinjaLabs. This attack exploits a vulnerability related to the extended Euclidean algorithm (EEA) used in modular inversion.
24-05-2024
Reminder: Our management tools for FIDO2.1 Security Keys are Open Source!
Just a quick reminder: our FIDO2.1 Manager tool, your go-to solution for managing FIDO2 credentials securely, is fully open source! Both the Windows version, created with PowerShell, and a Linux (C++ and Python) version are available.