Topic: how to read in jcop the mode mifare emulation

change mfoc.c add SAK 028

mfoc  -O 123
Found Mifare Classic 1k tag
ISO/IEC 14443A (106 kbps) target:
    ATQA (SENS_RES): 00  04 
* UID size: single
* bit frame anticollision supported
       UID (NFCID1): xx xx xx xx
      SAK (SEL_RES): 28 
* Compliant with ISO/IEC 14443-4
* Not compliant with ISO/IEC 18092
                ATS: 78  80  70  02  00  31  c0  64  08  04  61  00  00  90  00 
* Max Frame Size accepted by PICC: 256 bytes
* Bit Rate Capability:
  * Same bitrate in both directions mandatory
* Frame Waiting Time: 38.66 ms
* No Start-up Frame Guard Time required
* Node Address not supported
* Card IDentifier supported
* Historical bytes Tk: 00  31  c0  64  08  04  61  00  00  90  00 
  * Tk after 0x00 consist of optional consecutive COMPACT-TLV data objects
    followed by a mandatory status indicator (the last three bytes, not in TLV)
    See ISO/IEC 7816-4 8.1.1.3 for more info

Fingerprinting based on MIFARE type Identification Procedure:
* SmartMX with MIFARE 1K emulation
Other possible matches based on ATQA & SAK values:
* JCOP31 v2.3.1

Try to authenticate to all sectors with default keys...
Symbols: '.' no key found, '/' A key found, '\' B key found, 'x' both keys found
nfc_initiator_mifare_cmd: Success
[Key: ffffffffffff] ->

breaks scan
how to read jcop ?  keys know.