NFC. Technical Overview. Release r05
|
|
|
- Aubrie Davidson
- 9 years ago
- Views:
Transcription
1 Release r05
2 Trademarks The Bluetooth word mark and logos are owned by the Bluetooth SIG, Inc. and any use of such marks by Stollmann E+V GmbH is under license. Other trademarks and trade names are those of their respective owners. Copyright Stollmann E+V GmbH Release r05 Page 2 of 15
3 Table of contents 1 Abstract NFC Definitions Tag ContactlessCard Reader/Writer RFID ContactlessCard transmission Secure element Applications Identification / Authorization Transmission of information SmartPoster MobilePayment MobileTicketing Transportation SimplePairing Access Control Technology RF transmission Energy transmission CardEmulation Reader/Writer Peer-to-peer ModeSwitch NDEF Integration Chips Release r05 Page 3 of 15
4 6.2 Modules JSR PC-SC Proprietary APIs Command Interface Toolkits Application development Mobile phone PC Embedded systems History Release r05 Page 4 of 15
5 1 Abstract Short-range radio technology Near Field Communication (NFC) is based on RFID and promises to support new usage models for mobile applications. By taking a touch and approach it simplifies the selection, configuration and adaptation of wireless devices and connections in many applications. Currently integrated into mobile phones NFC will also be found in embedded devices for the communication with phones, PCs, contactless cards and RFID tags and readers. The presentation outlines the technical features of NFC and the main usage models and gives hints for the integration of NFC in embedded devices. 2 NFC Near Field Technology (NFC) is a wireless transmission technology that can transmit data at high speeds of up to 424 kbps over very short distances of up to 10 cm. NFC is based on ContactlessCard and RFID technology and is to a large extent compatible with them. However, while ContactlessCards and RFID practically always require an asymmetrical transmission with an active reader/writer and a passive tag or a passive card, NFC expands it by a symmetrical, bi-directional transmission between devices with balanced links the peer-to-peer mode. For this reason, sharp distinctions between NFC, RFID and ContactlessCard technology are frequently not made. In particular, the integration of mobile phones and PDAs always refers to NFC, even if the peer-to-peer mode is not (yet) being used in many applications, but the RFID or ContactlessCard basic technologies. This is important when it comes to evaluating the specification and implementation status of certain standards and to what extent they can currently be used in massmanufactured products. 3 Definitions First, we will define a few terms that are important in the discussions surrounding NFC applications and devices. 3.1 Tag A tag is a non-volatile data carrier that can be read and possibly written using radio technology. Most tags are passive, i.e. they do not have their own power supply but, instead, are powered by the electromagnetic field of the reader/writer. During the reading, the tag modulates the field and transmits the data. The amount of information that can be stored in tags varies greatly and typically measures in the range of some ten bytes and several tenkilobytes. The larger the memory, the longer the reading takes, which is problematic in many applications and, therefore, Release r05 Page 5 of 15
6 reduces the practical usable memory size. Some tags feature a fixed content that cannot be changed. Others can also be written with new information. 3.2 ContactlessCard A ContactlessCard is a contact-free chip card that can be read via NFC. It features the same properties as a tag. In addition, it frequently features a secure element that contains sensitive information in encrypted form. 3.3 Reader/Writer A reader/writer is a device that can read tags and ContactlessCards and write to them. To be able to communicate with passive tags and ContactlessCards, it establishes an electromagnetic field from which the tag or ContactlessCard draws its operating energy and which is modulated for data transmission. Reader/writer can be designed in such a way that they can read from and write to RFID tags as well as ContactlessCards of different types. 3.4 RFID RF identification (RFID) refers to a series of specifications that describes the identification via radio technology. RFID is used particularly as a replacement of barcodes and operates in different frequency ranges (several khz to GHz) with different transmission ranges (cm to several meters) and with passive (without own power supply) and active (with own power supply) tags. Of these RFID specifications, NFC uses only the frequency of MHz with passive tags. 3.5 ContactlessCard transmission There are several standards for contactless transmission. The best known is ISO 14443, which differentiates between Type A and Type B. The ISO Type A contactless card was originally intended to be a memory card only. However, microprocessor and cryptographic cards have been developed for Type A. The most common Type A cards are the Mifare cards which is a contactless Smart Card technology owned by NXP. Mifare is an open architecture platform and has more than 300 million cards in the field worldwide. The ISO Type B contactless card was originally intended to be microprocessor version of Type A. Again, the memory and cryptographic options have been added for Type B. The Type B cards are not as commonly deployed as Type A cards. Calypso, an international standard for electronic ticketing is ISO Type B compliant as well as contactless payment standards MasterCard PayPass and VISA Wave. Release r05 Page 6 of 15
7 Another well known Standard is Felica. FeliCa is a contactless RFID IC chip smart card system by Sony, primarily used in electronic money cards. Which is widely spread in the far east. Especially in Japan. 3.6 Secure element A secure element (SE) contains an embedded processing element which ensures that the outside communication is processed in encrypted form and stores protected information that should only be made accessible only under certain conditions. The protected data is transmitted in encrypted form using an NFC interface. From the point of view of NFC, it represents application data for the NFC interface that are transmitted without being changed. From that point of view, NFC and secure element are independent of each other. However, since many NFC systems (mobile phones, ContactlessCards, etc.) also feature a secure element, the communication between NFC interface and secure element plays an important role in system integration. 4 Applications NFC follows two important objectives. On the one hand, a standard is being introduced to the mass market; on the other hand, this standard is backward compatible with existing solutions. NFC enables a series of applications, whereby the compatibility with RFID or ContactlessCards is an important condition for some of them. The paradigm of all NFC applications is that the user holds a device typically a mobile phone or PDA to a certain point a tag, ContactlessCard, reader or another NFC device and triggers an action. This touch-and-... is a very simple way of triggering an action, much simpler than having to search in a menu for compatible devices, entering web links, or something similar. In addition, storing event tickets in a mobile phone, for example, facilitates applications by doing away with issuing paper tickets and providing a stronger integration of process flows. 4.1 Identification / Authorization The user holds the NFC device against a reader and is then being identified and authorized. This can be used for mobile payments, access control, entrance to events, etc. To secure certain authorizations (such as payments), the entry of a PIN may also be required. Release r05 Page 7 of 15
8 4.2 Transmission of information The user holds the NFC device against a tag or another NFC device and receives data. This can be product information, business cards, or information for access to LANs or Bluetooth devices. 4.3 SmartPoster In this application case, an RFID tag is positioned on a poster. It contains data that are coded according to the NDEF specification. This allows them to be read by any NFC device (e.g. a mobile phone). The tag may contain additional product information or a link to a website that contains additional information. 4.4 MobilePayment In this application case, the NFC device (e.g. the mobile phone) replaces the credit card. The credit card information is stored on the mobile phone in a secure element. The user holds the mobile phone against the credit card reader, which reads the credit card information from the secure element of the mobile phone. For larger amounts, the entry of a PIN is required. To read the secure element, most concepts rely on a JAVA application on the mobile phone which is issued by the credit card company. 4.5 MobileTicketing A ticket is stored on the NFC device (e.g. a mobile phone) after, for example, an NFC-based payment transaction. At the place of the event, the user holds the mobile phone against the ticket reader and obtains access to the event. For this purpose, the mobile phone behaves like a tag. In addition, information about the event can be transferred to the mobile phone. 4.6 Transportation Different concept are used here. In one concept, the NFC device (e.g. a mobile phone) is held against a tag at a transit stop. It reads the information and uses it to generate a ticket. Upon departing at the destination, the passenger holds it against a tag again at the transit stop. Based on this information, the mobile phone calculates the overall distance. In another scenario, the reader in the means of transportation (e.g. bus, railroad) transfers the identification of the mobile phone to a server that generates and bills the ticket. In addition to the transit stop information, other data can be exchanged that require the peer-to-peer mode. Release r05 Page 8 of 15
9 4.7 SimplePairing Until now, it is complicated to establish the connection between two Bluetooth devices (pairing). This requires searching for other devices, analyzing the profiles and subsequently pairing them. This process can be greatly facilitated by using NFC. By holding the NFC devices against each other, they exchange the pairing information for Bluetooth and afterwards, they can immediately establish the connection. It can be used for different Bluetooth profiles (data exchange, voice transmission). Furthermore, the pairing information can also be used in other contexts. For example, the mobile phone can briefly be held against the handsfree communication device when entering the car to indicate who the driver is who wants to use the hand-free communication device to avoid assignment conflicts with mobile phones of passengers. 4.8 Access Control Access control data to a building are stored on the NFC device (e.g. a mobile phone). Upon entering the building, the mobile phone is read by the reader. Furthermore, additional information, such as dates, can be transferred to the mobile phone via the peer-to-peer mode. 5 Technology 5.1 RF transmission The RF transmission of NFC uses the MHz frequency that is also used for certain RFID types and ContactlessCards. Hence, NFC is compatible with these transmission procedures. The sender that builds up the field is the reader/writer. It constantly transmits using the frequency of MHz. The tag modulates the field by means of load modulation. The reader/writer measures the load of the field and extracts the data from the modulation. The modulation of the field for all compatible technologies combined under NFC is identical. 5.2 Energy transmission Passive tags without their own power supply can draw the energy required for reading the memory, operating the own processor and memory systems, and modulating the field from the field itself. This requires a sufficiently large magnetic flux that must be built up by the reader/writer. In turn, this requires antennas with a sufficient dimension. The decisive factor is the area enclosed by the antenna. For Release r05 Page 9 of 15
10 this reason, it is often advantageous to integrate the antenna in the housing and route it in windings at the edge of the housing. The power that tags can draw from the field measures in the order of magnitude of a few mw. Furthermore, it is often available only for some milliseconds as long as the tag is held in front of the reader/writer. Hence, it is sufficient only for very simple operations, such as reading a moderately sized memory of several kilobytes. More complex tasks that require a higher CPU power cannot be handled with it. The program of a tag must also be robust so that it is not damaged by accidental loss of the power supply. Active devices with their own power supply do not draw energy from the field of the reader/writer. For this reason, NFC devices that are intended to communicate exclusively with active devices can be equipped with smaller antennas. 5.3 CardEmulation ContactlessCards based on the specifications of Mifare, Felica and ISO 14443B, can be read by NFC devices. If NFC devices need to be read by card readers, they must themselves behave like a ContactlessCard. This application is specified by the CardEmulation. The CardEmulation encompasses the RF behavior and the way how a ContactlessCard is read. The formats in which the data are stored on ContactlessCards are partially application-specific. The NFC forum standardized several formats, but NFC devices must also support other formats in the near future if they want to be compatible with the existing ContactlessCards. The CardEmulation also includes the emulation of tags. In principle, it works exactly like the CardEmulation, only that the RFID tags, in turn, have their own transmission and data formats with which NFC devices must be compatible so that they can be read. 5.4 Reader/Writer NFC devices can be read and possibly written as reader/writer tags or ContactlessCards. In this mode, they must also meet the existing specifications for ContactlessCards and tags. Similar to the CardEmulation, this also includes the formats in which the data are stored. 5.5 Peer-to-peer The peer-to-peer mode is not supported by ContactlessCards and tags and is exclusively specified between true NFC devices. Both devices are active in this Release r05 Page 10 of 15
11 mode, i.e. they have their own power supply and do not draw their operating energy from the RF field. Protocols are specified for the peer-to-peer mode that are used for the data exchange between the devices. They allow a secure, bi-directional transmission of data packets so that even larger data volumes, such as photos, files, etc., can be exchanged between NFC devices. 5.6 ModeSwitch If an NFC device discovers another device in the radio field, it must first determine whether this is a ContactlessCard, an RFID tag, a reader/writer or another NFC device. This is accomplished by the ModeSwitch specification. It ensures that the NFC device goes to a status in which it can communicate with the other device in the radio field. It also defines the responses if several cards are found in the field at the same time and other potential error cases. 5.7 NDEF NDEF stands for NFC Data Exchange Format and is a data format defined by the NFC forum for the exchange of information between two NFC forum devices or an NFC forum device and an NFC forum tag. The NDEF specification provides clear rules for the structure of a corresponding message, without restricting the type of information it contains. This allows encapsulating the most diverse data, such as URLs, images or XML documents. However, the specification does not encompass any NDEF transmission protocol. Hence, the type of medium for the transmission of messages is also freely selectable, just like the type of information it contains. An NDEF message consists of a series of NDEF records. As a result, the actual encapsulation of the data takes place in the individual NDEF records. Some widely used specific data formats, e.g. URI, Text, SmartPoster, are standardized by the NFC-Forum as Record Type Definitions (RTD) to allow interoperability of products of different vendors. To allow an efficient analysis of the information contained in the records, the type and size of the data can be identified via the header. To enable a simpler identification, a number of different types of information have already been defined through the NFC forum. Beyond that, it is, however, possible to define any number of additional types. Release r05 Page 11 of 15
12 6 Integration 6.1 Chips The bases for integrating NFC in devices are NFC chips. They contain at least the radio technology with the RF modulation and the basic radio protocols. They often also contain an additional CPU that can process additional protocol layers. The control of the hardware requires software that is specifically tailored to the chip. It is generally supplied by the chip manufacturer. It can subsequently be used by protocol stacks via an API. With higher integrated chips, the hardware-dependent software is integrated directly on the chip. Even more processing power is provided by chips that can also carry the higher layers of the protocol stacks and the application software. NFC can also be integrated in other chips. This is particularly interesting where larger systems, such as chips for mobile phones or Bluetooth chips, must be expanded by the NFC functionality. 6.2 Modules Since the integration of NFC chips in a layout is not very simple, modules are frequently used that carry the NFC chip and additional components on a small circuit board. In particular, they contain the RF components. Furthermore, modules can contain additional functions, such as the higher layers of the protocol software, to free the device in which the module is integrated from these tasks. This also facilitates the software integration since the entire NFC technology can be encapsulated in the module and can then be controlled, for example, via a serial interface with AT commands. 6.3 JSR-257 To control an NFC interface in a device requires an API. If a JAVA environment is available, NFC can be used via the JSR-257 API. JSR-257 provides a series of functions that can be called by the application software to execute or initiate actions on the NFC interface. However, JSR-257 supports only functions for the CardEmulation and reader/writer mode. The functions of the peer-to-peer mode cannot be controlled via JSR-257 yet. An expanded specification is expected for this purpose. The JSR-177 API can be used in a JAVA environment for access to the secure element. Release r05 Page 12 of 15
13 A JSR-257 can be integrated into the mobile phone by the developers of the mobile phone. It may also come with the JAVA VM if it has been integrated by the JAVA VM vendor. 6.4 PC-SC If a secure element is connected with a PC, it is generally addressed via a PC-SC driver. It provides the PC-SC-API which is used by the application software as access interface to the secure element. The PC-SC communication may be routed transparently via NFC not affecting the content. 6.5 Proprietary APIs Since no API has been standardized for the complete NFC protocol stack until now, the manufacturers defined their own APIs. For this reason, application programmers must adjust their programs to the corresponding APIs if they want to use a specific NFC protocol stack for the data transmission. 6.6 Command Interface Serial modules, in which the complete NFC protocol stack is already integrated, have their own command interface. Card Emulation and reader/writer communication runs largely transaction-oriented and generally requires no additional intervention. The parameterization of the module typically differs from module manufacturer to module manufacturer. 6.7 Toolkits To simplify the integration of NFC protocol stacks and modules, manufacturers developed toolkits that contain sample applications, source codes and evaluation platforms. These toolkits are the easiest way of gaining an overview of the NFC technology and selecting a manufacturer as partner for the NFC integration. 7 Application development The development of NFC applications is heavily dependent on the platform used. Three essential platforms can be differentiated. 7.1 Mobile phone An NFC interface generally uses a driver in a mobile phone that provides a JSR-257 API under JAVA. A JAVA application software on the mobile phone can use this Release r05 Page 13 of 15
14 interface to access the NFC functions. The following is required to program the application software: Development kit for the JAVA virtual machine. It can generally be downloaded from the website of the VM manufacturer, e.g. from Sun. Development kit of the mobile phone manufacturer. It contains the specific parts of the JAVA environment for the corresponding mobile phone. It also contains the parts required for programming the JSR-257. In the future, there may be additional interfaces on mobile phones that provide the NFC functions. The exact architectures, which will then be possible, are currently still under development. 7.2 PC To be able to use NFC with a PC, an NFC-USB adapter is generally used. It contains the NFC chip and the antenna. A driver, which must be tailored specifically for the adapter, is installed on the PC. It can provide a manufacturer-specific API that can be used by the application software. For this purpose, it must be adapted to the API. The driver for the NFC-USB adapter can also provide a virtual serial interface (VCOMM port) with which the data can be sent to the NFC-USB adapter. A specific command language can be used to control the adapter. 7.3 Embedded systems Embedded systems generally feature special processors and operating systems. For this reason, NFC modules are frequently used that contain the entire NFC functionality and, therefore, are easy to integrate. The application development then encompasses the control of the interface of the NFC module and the integration of the functionality in the overall system. An alternative consists of porting the NFC protocol stack to the embedded system. In that case, an NFC chip or NFC module with lesser functionality can be used, which reduces the unit costs, but generates a higher development effort. In this case, the application software must be adapted to the NFC protocol stack used since no standardized API is available at present. 8 History Version Release Date By Change description r01d Fh Draft r01d Cl Modifications Release r05 Page 14 of 15
15 r01d Fh First version r01d Bg New template r fh First release version R Fh Removed disclaimer Chapter 6.6 Command Interface updated r03d Cl Typos, RTD r03d Km Typos, language R03d NK Typo r fh Revised Chapter 3.5 r Bg Typo in chapter 6.3: JSR-177 instead of JSR-166 Stollmann Entwicklungs- und Vertriebs-GmbH Mendelssohnstraße 15 D Hamburg Germany Phone: +49 (0) Fax: +49 (0) [email protected] Release r05 Page 15 of 15
Frequently Asked Questions
Frequently Asked Questions NFC for Consumers What is NFC? Near Field Communication (NFC) is a short-range wireless connectivity technology standard designed for intuitive, simple, and safe communication
NFC Test Challenges for Mobile Device Developers Presented by: Miguel Angel Guijarro [email protected]
NFC Test Challenges for Mobile Device Developers Presented by: Miguel Angel Guijarro [email protected] 1 Outlook About NFC Developing a NFC Device Test Challenges Test Solutions Q&A 2 What
Using RFID Techniques for a Universal Identification Device
Using RFID Techniques for a Universal Identification Device Roman Zharinov, Ulia Trifonova, Alexey Gorin Saint-Petersburg State University of Aerospace Instrumentation Saint-Petersburg, Russia {roman,
Technical Article. NFiC: a new, economical way to make a device NFC-compliant. Prashant Dekate
Technical NFiC: a new, economical way to make a device NFC-compliant Prashant Dekate NFiC: a new, economical way to make a device NFC-compliant Prashant Dekate The installed base of devices with Near Field
Loyalty Systems over Near Field Communication (NFC)
Loyalty Systems over Near Field Communication (NFC) Diogo Simões IST - Technical University of Lisbon Av. Prof. Cavaco Silva Tagus Park 2780-990 Porto Salvo, Portugal [email protected] Abstract.
AN1305. MIFARE Classic as NFC Type MIFARE Classic Tag. Application note COMPANY PUBLIC. Rev. 1.3 2 October 2012 130513. Document information
MIFARE Classic as NFC Type MIFARE Classic Tag Document information Info Content Keywords NFC Forum, NFC data mapping, MIFARE Classic 1K/4K, MIFARE Classic 1K, MIFARE Classic 4K, MIFARE Plus X/S, NFC Type
Gemalto Mifare 1K Datasheet
Gemalto Mifare 1K Datasheet Contents 1. Overview...3 1.1 User convenience and speed...3 1.2 Security...3 1.3 Anticollision...3 2. Gemalto Mifare Features...4 2.1 Compatibility with norms...4 2.2 Electrical...4
NFC Testing. Near Field Communication Research Lab Hagenberg. Gerald Madlmayr. NFC Research Lab, Hagenberg. E-Smart 2008, Sophia Antipolis
NFC Testing Gerald Madlmayr NFC, E-Smart 2008, Sophia Antipolis 1 NFC Research Topics Software: Contactless Applications and Infrastructure Hardware: Testing & Interoperability Security Usability Founded
Security & Chip Card ICs SLE 44R35S / Mifare
Security & Chip Card ICs SLE 44R35S / Mifare Intelligent 1 Kbyte EEPROM with Interface for Contactless Transmission, Security Logic and Anticollision according to the MIFARE -System Short Product Info
Your Mobile Phone as a Ticket (NFC)
Your Mobile Phone as a Ticket (NFC) Francisco Maria van Uden Chaves IST - Technical University of Lisbon Av. Prof. Cavaco Silva Tagus Park 2780-990 Porto Salvo, Portugal [email protected] Abstract.
NFC: Enabler for Innovative Mobility and Payment NFC: MOBILIDADE E MEIOS DE PAGAMENTO
NFC: Enabler for Innovative Mobility and Payment Cards Brazil Sao Paulo, April 3rd to 5th 2007 Rodolfo Gomes - 1st Level Customer Application Support NFC&RFID Europe A new Company has reborn Few months
Timo Müller NFC AND THE VEHICLE. TESTING THE LINUX NFC STACK. BMW Car IT GmbH
Timo Müller NFC AND THE VEHICLE. TESTING THE LINUX NFC STACK. BMW Car IT GmbH NEARD FIELD COMMUNICATION. WHAT IS IT? Easy connections, quick transactions, and simple data sharing. NFC-Forum.org Fast connection
advant advanced contactless smart card system
LA-11-001l-en [08.2012] advant advanced contactless smart card system power Fully scalable fully flexible Key applications & standards 2 1 5 The LEGIC advant product line ideally supports the design and
APPFORUM2014. Helping the developer community build next-generation, multi-platform apps. SCHAUMBURG, ILLINOIS SEPTEMBER 8-10
APPFORUM2014 Helping the developer community build next-generation, multi-platform apps. SCHAUMBURG, ILLINOIS SEPTEMBER 8-10 NFC OVERVIEW Chuck Bolen Chief Architect Enterprise Mobile Computing APPFORUM2014
Application of Near Field Communication Technology for Mobile Airline Ticketing
Journal of Computer Science 8 (8): 1235-1243, 2012 ISSN 1549-3636 2012 Science Publications Application of Near Field Communication Technology for Mobile Airline Ticketing Wayan Suparta Institute of Space
AN1304. NFC Type MIFARE Classic Tag Operation. Application note PUBLIC. Rev. 1.3 2 October 2012 130413. Document information
NFC Type MIFARE Classic Tag Operation Document information Info Content Keywords NDEF, NDEF data mapping, NDEF Data Exchange Format MIFARE Classic 1K, MIFARE Classic 4K, MIFARE Classic 1K/4K, MIFARE Plus
Mobile MasterCard PayPass Testing and Approval Guide. December 2009 - Version 2.0
Mobile MasterCard PayPass Testing and Approval Guide December 2009 - Version 2.0 Proprietary Rights Trademarks The information contained in this document is proprietary and confidential to MasterCard International
Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, 2006. Developed by: Smart Card Alliance Identity Council
Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions July, 2006 Developed by: Smart Card Alliance Identity Council Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked
Mobile Financial Services Business Ecosystem Scenarios & Consequences. Summary Document. Edited By. Juha Risikko & Bishwajit Choudhary
Mobile Financial Services Business Ecosystem Scenarios & Consequences Summary Document Edited By Juha Risikko & Bishwajit Choudhary Mobey Forum Mobile Financial Services Ltd. Disclaimer: This document
MIFARE CONTACTLESS CARD TECHNOLOLGY AN HID WHITE PAPER
MIFARE CONTACTLESS CARD TECHNOLOLGY AN HID WHITE PAPER GENERAL The MIFARE contactless smart card and MIFARE card reader/writer were developed to handle payment transactions for public transportation systems.
NFC Near Field Communication
NFC Near Field Communication Gregor Hohpe 2010 Google, Inc. All rights reserved, Core Technology Passive card powered by radio field 212kbps, 100ms read/write cycle Authentication, data integrity protection
SmartCITIES. Smart InterOperable. Solutions for Transport Authorities
SmartCITIES Smart InterOperable Solutions for Transport Authorities Main Modules Customer Support Services Customer Management Card Management Card Issuing & Personalization Business Support Services Revenue
NFC Tag Type 5 Specification
Document Type: Software Technical Specification Reference: STS_NFC_0707-001 Version 1.8 (14516) Release Date: Nov. 18, 2011 File Name: STS_NFC_0707-001 NFC Tag Type 5 Specification.pdf Security Level:
ACR120 Technical Specifications version 2.9 November 2005
Version 2.9 11-2005, Email: [email protected] Website: www.acs.com.hk ACR120 Contactless Reader/Writer 1.0 Introduction The ACR120 is a compact and cost-effective contactless reader and writer. It is developed
a leap ahead in analog
EMV Contactless Payment Systems based on AS3911 Overview and System Simulations Giuliano Manzi, PhD Mannheim, May 23 25, 2012 CST EUROPEAN USER CONFERENCE 2012 a leap ahead in analog OUTLINE AS3911 OVERVIEW
Training MIFARE SDK. Public. MobileKnowledge June 2015
MIFARE SDK Public MobileKnowledge June 2015 Agenda Overview of MIFARE SDK related technologies NFC Technology (Read/Write mode) MIFARE, NTAG and ICODE products NFC in Android MIFARE SDK Introduction to
Near Field Communication in Cell Phones
Near Field Communication in Cell Phones Annika Paus 24.07.2007 Seminararbeit Ruhr-Universität Bochum Chair for Communication Security Prof. Dr.-Ing. Christof Paar Contents 1 Introduction 1 2 Standards
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards January 2007 Developed by: Smart Card Alliance Identity Council RF-Enabled Applications and Technology:
Software Card Emulation in NFC-enabled Mobile Phones: Great Advantage or Security Nightmare?
Software Card Emulation in NFC-enabled Mobile Phones: Great Advantage or Security Nightmare? Michael Roland University of Applied Sciences Upper Austria,, Austria IWSSISPMU2012 International Workshop on
OBID RFID by FEIG ELECTRONIC. OBID classic / OBID classic-pro. RFID Reader Technology for Security Applications
OBID RFID by FEIG ELECTRONIC OBID classic / OBID classic-pro RFID Reader Technology for Security Applications OBID RFID Reader Technologies RFID Readers from the number 1 manufacturer FEIG ELECTRONIC specialized
An NFC Ticketing System with a new approach of an Inverse Reader Mode
An NFC Ticketing System with a new approach of an Inverse Reader Mode Dresden, 22/11/2013 Felipe de Sousa Silva Outline NFC Overview NFC Public Ticket System. Intention of the Inverse Reader Mode The Inverse
Mobile NFC 101. Presenter: Nick von Dadelszen Date: 31st August 2012 Company: Lateral Security (IT) Services Limited
Mobile NFC 101 Presenter: Nick von Dadelszen Date: 31st August 2012 Company: Lateral Security (IT) Services Limited Company Lateral Security (IT) Services Limited Company Overview Founded in April 2008
BLUETOOTH SERIAL PORT PROFILE. iwrap APPLICATION NOTE
BLUETOOTH SERIAL PORT PROFILE iwrap APPLICATION NOTE Thursday, 19 April 2012 Version 1.2 Copyright 2000-2012 Bluegiga Technologies All rights reserved. Bluegiga Technologies assumes no responsibility for
Towards an Internet of Things: Android meets NFC. Dipartimento di Scienze dell Informazione Università di Bologna
Towards an Internet of Things: Android meets NFC Luca Bedogni Marco Di Felice Dipartimento di Scienze dell Informazione Università di Bologna Outline Internet of Things: History Internet of Things: Definition
NACCU 2013. Migrating to Contactless: 2013 1
NACCU 2013 Migrating to Contactless: 2013 1 AGENDA The demise of cards has been predicted for many years. When will this really happen? This presentation by two card industry experts will cover the rise
Training. NFC in Android. Public. MobileKnowledge October 2015
NFC in Android Public MobileKnowledge October 2015 Index Android mobile Operating System Market share Brief history Programing in Android NFC in Android Communicating my Android phone with NFC Readers
Abracon PTM Introduction to ANFCA Series Flexible Peel & Stick NFC Antennas
Abracon PTM Introduction to ANFCA Series Flexible Peel & Stick NFC Antennas WWW.ABRACON.COM ANFCA Series Flexible Peel & Stick NFC Antennas Purpose To introduce ANFCA Series, Flexible Peel & Stick NFC
Chip Card & Security ICs Mifare NRG SLE 66R35
Chip Card & Security ICs Mifare NRG Intelligent 1 Kbyte Memory Chip with Interface for Contactless Transmission according to the Mifare -System Short Product Information April 2007 Short Product Information
Workshop: NEAR FIELD COMMUNICATION TECHNOLOGY
Workshop: NEAR FIELD COMMUNICATION TECHNOLOGY RODOLFO VELTRI GOMES Customer Application Support NFC/RFID Europe NXP Semiconductors Italia SpA RF Wireless Forum Milano - 14 Febbraio, 2008 NXP Automotive
THE APPEAL FOR CONTACTLESS PAYMENT 3 AVAILABLE CONTACTLESS TECHNOLOGIES 3 USING ISO 14443 BASED TECHNOLOGY FOR PAYMENT 4
CONTACTLESS THE APPEAL FOR CONTACTLESS 3 AVAILABLE CONTACTLESS TECHNOLOGIES 3 USING ISO 14443 BASED TECHNOLOGY FOR 4 DESIGNING AN EMV LIKE CONTACTLESS SYSTEM 5 INGENICO, LEADER IN CONTACTLESS TECHNOLOGY
NFC Based Equipment Management Inventory System
Journal of Information Hiding and Multimedia Signal Processing c 2015 ISSN 2073-4212 Ubiquitous International Volume 6, Number 6, November 2015 NFC Based Equipment Management Inventory System Rung-Shiang
Significance of Tokenization in Promoting Cloud Based Secure Elements
Significance of Tokenization in Promoting Cloud Based Secure Elements Busra O zdenizci 1, Vedat Coskun 1*, Kerem Ok 1 and Turgay Karlidere 2 1 NFC Lab - Istanbul, Department of Information Technologies,
Ways to Use USB in Embedded Systems
Ways to Use USB in Embedded Systems by Yingbo Hu, R&D Embedded Engineer and Ralph Moore, President of Micro Digital Universal Serial Bus (USB) is a connectivity specification that provides ease of use,
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public
NFC Hacking: The Easy Way
DEFCON 20 NFC Hacking: The Easy Way Eddie Lee eddie{at}blackwinghq.com About Me! Security Researcher for Blackwing Intelligence (formerly Praetorian Global)! We re always looking for cool security projects!
Near Field Communication in the real world part III
WHITE PAPER March 2007 Near Field Communication in the real world part III Moving to System on Chip (SoC) integration Contents 1 Introduction... 3 2 Integration it s only natural... 4 3 How and when should
CRESCENDO SERIES Smart Cards. Smart Card Solutions
CRESCENDO SERIES Smart Cards Smart Card Solutions Crescendo offers the lowest total cost of ownership (TCO) for a combined logical and physical access control solution. Crescendo smart cards allow me to
NFC Tags & Solutions. Understanding Near Field Communication (NFC) Technology. Executive Summary
NFC Tags & Solutions Understanding Near Field Communication (NFC) Technology Executive Summary Payment systems and marketing loyalty programs are just the beginning for NFC technology. In addition to the
AN11480. Quick Start Up Guide for EXPLORE NFC working with Raspberry Pi. Application note COMPANY PUBLIC. Rev. 1.0 17 December 2013 279710
Quick Start Up Guide for EXPLORE NFC working with Raspberry Pi Document information Info Content Keywords PN512; Raspberry Pi, NFC, P2P, Card Emulation, MIFARE, ISO/IEC 14443, EXPLORE-NFC Abstract This
Standard of the Camera & Imaging Products Association. White Paper. of CIPA DC-005-2005. Picture Transfer Protocol over TCP/IP networks
Standard of the Camera & Imaging Products Association White Paper of CA DC-005-2005 Picture Transfer Protocol over / networks 8. November. 2005 Published by Camera & Imaging Products Association (portions
Security Challenges for User-Oriented RFID Applications within the Internet of Things
Security Challenges for User-Oriented RFID Applications within the Internet of Things G.P. HANCKE, K. MARKANTONAKIS and K.E. MAYES ISG Smart Card Centre Royal Holloway, University of London UNITED KINGDOM
920MHz Band Multi-hop Wireless Network System
920MHz Band Multi-hop Wireless Network System Hiroshi Hashizume Motohiro Inokuma Masayuki Suto Shigeru Fukunaga Motoharu Kawanishi One policy aimed at the growth of OKI Group is the development of a smart
Ingenious Systems. Evolute System's. Mobile Payment. Initiative
Ingenious Systems Evolute System's Mobile Payment Initiative The Mobile Payment Concept A mobile payment is any payment where a mobile device is used to initiate, authorize and confirm an exchange of financial
Mobile Near-Field Communications (NFC) Payments
Mobile Near-Field Communications (NFC) Payments OCTOBER 2013 GENERAL INFORMATION American Express continues to develop its infrastructure and capabilities to support growing market interest in mobile payments
Industrial Networks & Databases
Industrial Networks & Databases LONWORKS KNX 1 HVAC and BEMS HVAC - Heating, Ventilation & Air Conditioning BEMS - Building & Energy Management Systems 2 3 4 LONWORKS (Local Operating Networks) Open solution
Mapping of Services on Bluetooth Radio Networks
Mapping of s on Bluetooth Radio Networks J. Dunlop and N. Amanquah University of Strathclyde -Department of Electronic and Electrical Engineering, Glasgow G1 1XW, Scotland Ph.: +44 141 5482081, Fax:+44
School Management System
School Management System Company name and address RFIC Technologies 401, green castle, ASM Road Ulsoor,Bangalore, India Contact person : suchitav khadanga [email protected], phone: 91-80-25300747
Vulnerability Analysis and Attacks on NFC enabled Mobile Phones
Vulnerability Analysis and Attacks on NFC enabled Mobile Phones Collin Mulliner Fraunhofer SIT (Darmstadt, Germany) 1st International Workshop on Sensor Security March 2009 Fukuoka, Japan 1 Near Field
Training. MIFARE4Mobile. Public. MobileKnowledge April 2015
MIFARE4Mobile Public MobileKnowledge April 2015 Agenda Why MIFARE4Mobile? MIFARE in Mobile related technologies MIFARE technology NFC technology MIFARE4Mobile technology High level system architecture
E-Blocks Easy RFID Bundle
Page 1 Cover Page Page 2 Flowcode Installing Flowcode Instruction for installing Flowcode can be found inside the installation booklet located inside the Flowcode DVD case. Before starting with the course
IEEE 802.15.4/ZigBee USB Dongle
IEEE 802.15.4/ZigBee USB Dongle ZigBee Dongle for 2.4GHz Band DESCRIPTION The IEEE 802.15.4 USB Dongle from Integration provides a compliant 802.15.4 interface that can be quickly and easily connected
Cellular Data Communications Made Easy
Cellular Data Communications Made Easy by Peter Rysavy Published July 1, 1997, Network Computing Copyright Peter Rysavy and Network Computing All rights reserved Huge numbers of people are hitting the
SINGLE DEVICE FOR MULTIPLE TASKS
ViZRO s BioMate M043 SINGLE DEVICE FOR MULTIPLE TASKS Datasheet ViZRO S BioPad Vizro Technologies www.vizro.net INDEX 1. Introduction 2. Main Application Area 3.Technical Specifications 4.Product Picture
THE PRODUCT AUTHENTICATION APPLICATION DESIGN BASED ON NFC
Bing Dai THE PRODUCT AUTHENTICATION APPLICATION DESIGN BASED ON NFC Technology and Communication 2015 PREFACE This is my graduation thesis in the school of Technology in VAMK, Vaasa University of Applied
Figure 1.Block diagram of inventory management system using Proximity sensors.
Volume 1, Special Issue, March 2015 Impact Factor: 1036, Science Central Value: 2654 Inventory Management System Using Proximity ensors 1)Jyoti KMuluk 2)Pallavi H Shinde3) Shashank VShinde 4)Prof VRYadav
WI-FI VS. BLUETOOTH TWO OUTSTANDING RADIO TECHNOLOGIES FOR DEDICATED PAYMENT APPLICATION
WI-FI VS. BLUETOOTH TWO OUTSTANDING RADIO TECHNOLOGIES FOR DEDICATED PAYMENT APPLICATION Ingenico is often asked: what are the differences between Bluetooth and Wi-Fi technologies, which is the best one,
Using an NFC-equipped mobile phone as a token in physical access control
University of Twente Faculty of electrical engineering, mathematics and computer science Nedap Securiy Management Using an NFC-equipped mobile phone as a token in physical access control Author: Martijn
SPECIFICATIONS SUBJECT TO CHANGE WITHOUT NOTICE
SPECIFICATIONS SUBJECT TO CHANGE WITHOUT NOTICE Notice While reasonable efforts have been made to assure the accuracy of this document, Telit assumes no liability resulting from any inaccuracies or omissions
Converged Smart Card for Identity Assurance Solutions. Crescendo Series Smart Cards
Converged Smart Card for Identity Assurance Solutions Crescendo Series Smart Cards Crescendo is the proven smart card solution for a combined logical and physical access control solution. Crescendo smart
Security in Near Field Communication (NFC)
Security in Near Field Communication (NFC) Strengths and Weaknesses Ernst Haselsteiner and Klemens Breitfuß Philips Semiconductors Mikronweg 1, 8101 Gratkorn, Austria [email protected] [email protected]
ENABLING WIRELESS DATA COMMUNICATION IN CONSTRUCTION MANAGEMENT SYSTEM
ENABLING WIRELESS DATA COMMUNICATION IN CONSTRUCTION MANAGEMENT SYSTEM Liu Yanxiang & Yow Kin Choong School of Computer Engineering Nanyang Technological University Nanyang Avenue, Singapore 639798 Keywords:
Location-Aware and Safer Cards: Enhancing RFID Security and Privacy
Location-Aware and Safer Cards: Enhancing RFID Security and Privacy 1 K.Anudeep, 2 Mrs. T.V.Anantha Lakshmi 1 Student, 2 Assistant Professor ECE Department, SRM University, Kattankulathur-603203 1 [email protected],
PN532 NFC RFID Module User Guide
PN532 NFC RFID Module User Guide Version 3 Introduction NFC is a popular technology in recent years. We often heard this word while smart phone company such as Samsung or HTC introduces their latest high-end
How To Understand The Power Of An Freddi Tag (Rfid) System
Radio Frequency Identification Done by: Haitham Habli. Table of contents Definition of RFID. Do they need license? RFID vs other identification systems. Classification of RFID systems. Emerge of passive
Bluetooth Health Device Profile and the IEEE 11073 Medical Device Frame Work
Bluetooth Health Device Profile and the IEEE 11073 Medical Device Frame Work Rudi Latuske, ARS Software GmbH 1. Bluetooth in Medical Applications Bluetooth, as a short range wireless technology, is very
Relay Attacks in EMV Contactless Cards with Android OTS Devices
Relay Attacks in EMV Contactless Cards with Android OTS Devices José Vila, Ricardo J. Rodríguez [email protected], [email protected] All wrongs reversed Computer Science and Research Institute
Enhancing the Contactless Cards UAT. Enabling faster and efficient transactions.
sqs.com Case Study - Banking & Financial Services Enhancing the Contactless UAT. Enabling faster and efficient transactions. A leading European Bank established successfully across various Credit/Debit
Secure My-d TM and Mifare TM RFID reader system by using a security access module Erich Englbrecht ([email protected]) V0.1draft
Application Report Secure My-d TM and Mifare TM RFID reader system by using a security access module Erich Englbrecht ([email protected]) V0.1draft Embedded RF ABSTRACT This application report describes
An NFC Ticketing System with a new approach of an Inverse Reader Mode
An NFC Ticketing System with a new approach of an Inverse Reader Mode Christian Saminger, Stefan Grünberger and Josef Langer NFC University of Applied Sciences Upper Austria 5 th International Workshop
Smart Ride: European transit systems move to contactless mobile payments Trends and Developments, May 05, 2015
Industry trends suggest that transit system operators are moving away from traditional methods of payment such as cash, tokens and paper tickets to a variety of electronic payment methods, including near
Self-Check-In Hotels Using RFID. Technology
Self-Check-In Hotels Using RFID Technology David H. Miller December 5, 2007 MAE 295C, Professor R. Gadh Contents I. The Need. 2 II. The Solution 2 III. The RFID Tag. 3 IV. The RFID Reader.... 5 V. Middleware.
Maximizing Range and Battery Life in Low-Cost Wireless Networks
Maximizing Range and Battery Life in Low-Cost Wireless Networks The proliferation of cost-effective wireless technology has led to the rise of entirely new types of networks across a wide range of applications
ZigBee Technology Overview
ZigBee Technology Overview Presented by Silicon Laboratories Shaoxian Luo 1 EM351 & EM357 introduction EM358x Family introduction 2 EM351 & EM357 3 Ember ZigBee Platform Complete, ready for certification
Interfacing Intel 8255x Fast Ethernet Controllers without Magnetics. Application Note (AP-438)
Interfacing Intel 8255x Fast Ethernet Controllers without Magnetics Application Note (AP-438) Revision 1.0 November 2005 Revision History Revision Revision Date Description 1.1 Nov 2005 Initial Release
RFID BASED VEHICLE TRACKING SYSTEM
RFID BASED VEHICLE TRACKING SYSTEM Operating a managed, busy parking lot can pose significant challenges, especially to a government organization that also owns some of the vehicles in the lot. The parking
Information about this New Guide
Information about this New Guide New Guide This PayPass POS Host/Payment Software Implementation Guide, dated September 2007, is an entirely new guide. Contents This guide helps point-of-sale (POS) host/payment
Wireless LANs vs. Wireless WANs
White Paper Wireless LANs vs. Wireless WANs White Paper 2130273 Revision 1.0 Date 2002 November 18 Subject Supported Products Comparing Wireless LANs and Wireless WANs Wireless data cards and modules,
Mobile Devices: Server and Management Lesson 05 Service Discovery
Mobile Devices: Server and Management Lesson 05 Service Discovery Oxford University Press 2007. All rights reserved. 1 Service discovery An adaptable middleware in a device (or a mobile computing system)
USB Plus+ RFID Reader Setup Guide
875-0042-03 RevA USB Plus+ RFID Reader Setup Guide 1 Government Limited Rights Notice: All documentation and manuals were developed at private expense and no part of it was developed using Government funds.
Applying the NFC Secure Element in Mobile Identity Apps. RANDY VANDERHOOF Executive Director Smart Card Alliance
Applying the NFC Secure Element in Mobile Identity Apps RANDY VANDERHOOF Executive Director Smart Card Alliance Session ID: MBS - 403 Session Classification: Mobile Security Agenda Agenda topics NFC basics:
MF1 IC S50. 1. General description. Functional specification. 1.1 Contactless Energy and Data Transfer. 1.2 Anticollision. Energy
Rev. 5.2 15 January 2007 Product data sheet 001052 PUBLIC 1. General description NXP has developed the Mifare to be used in contactess smart cards according to ISO/IEC 14443A. The communication layer (
REAL TIME MONITORING AND TRACKING SYSTEM FOR AN ITEM USING THE RFID TECHNOLOGY
Review of the Air Force Academy No 3 (30) 2015 REAL TIME MONITORING AND TRACKING SYSTEM FOR AN ITEM USING THE RFID TECHNOLOGY For the past few years, location systems have become a major studying field,
S4 USER GUIDE. Read Me to Get the Most Out of Your Device...
S4 USER GUIDE Read Me to Get the Most Out of Your Device... Contents Introduction 4 Remove the Protective Cover 5 Charge Your S4 5 Pair the S4 with your Phone 6 Install the S4 in your Car 8 Using the Handsfree
IP SAN Fundamentals: An Introduction to IP SANs and iscsi
IP SAN Fundamentals: An Introduction to IP SANs and iscsi Updated April 2007 Sun Microsystems, Inc. 2007 Sun Microsystems, Inc., 4150 Network Circle, Santa Clara, CA 95054 USA All rights reserved. This
Threat Modeling for offline NFC Payments
Threat Modeling for offline NFC Payments 1 Fan Jia, 2 Yong Liu, 3 Li Zhang *1,Corresponding Author,2 Key Laboratory of Communication and Information Systems, Beijing Jiaotong University, Beijing, China,
