S50Non-contactICCard Performance Overview (M1)
I,Main indicators
L size: 8 K-bit EEPROM (1 K bytes)
L divided into 16 sectors, each of which is 4 blocks, each with 16 bytes, block as the unit of access
L each slice has an independent set of
* Some of the information comes from our PhD's PPT, partly from the Web and others ' papers.* The textbook we use is the Smart Card Technology (fourth edition)--ic card, RFID tag and Internet of Things (Tsinghua University computer series textbook) published by Tsinghua University Press (Wang Aiying)* I just sorted out the contents belowRadio Frequency Identification Technology
Radio Frequency Identification (Radio Frequency identification, RFID) technology is a
, which specifies the contents of messages, instructions and responses sent by the interface device to the card (or in the opposite direction); The structure and contents of the historical characters sent by the card during the reset answer In the process of exchanging inter-industry directives, the volumes and data structures that are read at the interface, and the methods of accessing the contents of the cards: the security architecture that defines the rights to access the volumes and data in
Tested, perfectly supported my reader acr122u NFC contactless IC card reader USB, my Mifare ultralight card.
The release 1.20 of Springcard pc/sc SDK is now available in the Download sections of the website (direct link to Latest VERSION:HTTP://WWW.SPRINGCARD.COM/DOWNLOAD/FIND.PHP?FILE=PCSC-SDK).
People working in the ' emerging ' NFC field would be is glad to discover the updated versions ofNfctool, a. N ET based application (written in C #) that ma
In the mobile platform development class, the teacher gave us a source (in fact, let us write it out, she is to give us a reference to haha), let us add her requirements of the function, in accordance with the blogger urine sex This blog will certainly not introduce the development of this application, I will be the knot course of the paper sent up.Development of NFC application in Android systemSun LinanAbsrtact: Near Field Communication (English: Near Field COMMUNICATION,NFC), also known as pr
) Confidentiality of information. During the transaction, the user ensures that the information is not illegally stolen by an unauthorized person or entity and that only legitimate users can see the user data.(3) Completeness of the data. To prevent the transfer of confidential information and data between the buyer and seller in the transmission process by malicious tampering, insertion and other forms of destruction.(4) Non-repudiation of information. It is mainly used to prevent the sender or
point of view, the PBOC1.0 specification defines the E-wallet/E-passbook application, which specifies the interface of the card and terminal, the technical specifications of the card itself, the application-related transaction process and the technical requirements of the terminal.To meet the needs of the development of financial IC applications, the People's Bank of China launched the PBOC1.0 revision in 2003 to complement the E-wallet/passbook application, adding a debit/Credit application co
Android MIFARE NFCA Source parsingTagtechnology defines a common interface class for all tagsBasictagtechnology implements some of the interfaces of the TagtechnologyThen there is the specific label protocol inheritance BasictagtechnologyNfc-a complies with the ISO 14443-3a protocol.Key wordsAtqa Answer to Request acc. to ISO/IEC 14443-4ATS Answer to Select acc. to ISO/IEC 14443-4DIF Dual Interface (cards)COS Card Operating SystemCL Cascade level Acc. to ISO/IEC 14443-3CT Cascade Tag, Type AN.a.
increase the energy to the contactless card.TypeB, a representative of Motorola, STMicroelectronics. It sends 10%ask modulation digital encoding NRZ (non-zeroing), transmission rate 106kb/s, receive-subcarrier modulation 847.5kHz Digital encoding BPSK (binary phase keying) transfer rate 106kb/s. That is, information ' 1 ' and information ' 0 ' is the difference between information ' 1 ' signal amplitude, that is, the signal is strong, information ' 0
develop all user applications that require high accuracy and speed, such as games. Through the company's software development kit (SDK), OEMs can easily integrate the contactless gesture technology that is easy for consumers into their devices in a cost-effective manner.
With the popularization of voice control and Non-touch gesture control, they are rapidly becoming one of the next-generation human-machine interfaces for mobile devices and wearable
to carry out contactless bidirectional data transmission between the reader and the RF card in order to achieve the purpose of target identification and data exchange. The most basic RFID system consists of three parts:1. label (tag, i.e. RF card): consists of a coupling element and a chip, and the label contains a built-in antenna for communication between the RF antennas.2. Reader: The device that reads the label information (which can also be writ
PBOCPart Eighth and 11th on TypeA Summary (i)--Initialization and conflict prevention (ISO14443-3)The part of the application-independent non-contact specification ISO14443 (1~4)Part 11th contactless IC card Communication specificationOn the basis of the eighth part, the requirements of the wireless communication protocol between contactless devices and contactless
Java Cards and smart cardsWhat is a JAVA card? A Java card is a contactless microprocessor smart card that can run Java programs. In November 1996, the JAVA Card version 1.0 specification was officially released. Now the latest JAVA card specification has reached the 2.1 version.I believe that the reader of the smart card will certainly ask: the emergence and use of smart cards has been nearly 20 years, why the recent emergence of JAVA card? Why is th
text/Shing original reprint please indicate the source http://blog.csdn.net/yxstars/article/details/38080175 In the Mifare card, the energy and data are transmitted through the antenna, the antenna in the card is a few turns of the coil, directly connected to the chip, no longer require additional components. The coil is embedded in the plastic and forms a passive contactless card.Card reader to the IC to send a set of fixed frequency of electromag
There are 9 main types of IC cards:1, contact type IC card;2, non-contact type IC card;3, Serial transmission type IC card;4, Parallel transmission type IC card;5, Storage-type IC card;6, intelligent IC card;7, super-intelligent IC card;8, Radio Wave (microwave) type IC card;9, electromagnetic induction IC card.Induction type IC card is a contactless IC card, is also a passive IC card. There is a special set of induction coils embedded in the card bas
Knowledge Point Analysis:
NFC (Near Field communication) is close-range wireless communication technology. Developed by Philips and Sony, NFC is a non-contact identification and interconnection technology that enables close wireless communication between mobile devices, consumer electronics, PCs, and intelligent control tools. NFC provides a simple, touch-only solution that allows consumers to easily and intuitively exchange information, access content and services.
Operation Steps:
NFC techn
This article describes in detail how to migrate the NFC Reader library to the Kinetis k64f microcontroller. This article uses a real-world porting case to demonstrate the steps required to migrate the NFC Reader library to the sample target MCU. The purpose of this article is to serve as a guide for software developers to transplant the NFC Reader library into the MCU chosen by their design.
NFC Reader Library Overview
The NFC Reader Library is a series of software combinations for creating an
two byte-9700, it seems that desfire do not recognize the two directives.==============================================================================Mifare Ultralight empty card/card with smart tag:BlackBerry API Target.geturi (T arget. Ndef_tag) Returns the result:nfc:ndef:33554502
Unable to establish connection (null connection)
==============================================================================
Reference:
Description of the target class:
Represents a card or tag that the NFC co
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.