Thank you for your patience. This book is expected to be available in middle March. From today on, I will include some of the content of this book in my blog. Note that the original article is serialized without being edited by the publisher, so it may look a little non-professional.
In the appendix, Mr. Wu Jinliang, one of the authors and reviewers, discusses the positioning and learning methods of this book. I believe that these discussions can resonate with readers.
The appendix contains seve
Read and Write NFC tagsTo read and write NFC tags, it involves getting tags from the intent object and opening the communication with the label. To read and write NFC tag data, you have to define your own protocol stack. However, keep in mind that you can still read and write ndef data when working directly with the NFC
Data formats supported by Android
Intent filter in Data Format
In the AndroidManifest. xml file
Specify the resource file you created in the element:
VcD4KPHByZSBjbGFzcz0 = "brush: java;">...
...
Nfc_tech_filter.xml file (a Tag is considered to be matched only when all Tags match the nfc chip specified by the tech element in the tech-list element ):
android.nfc.tech.IsoDep
android.nfc.tech.NfcA
For a long time, NFC tags can only communicate with a single electronic device (mainly mobile phones. Recently, the dual-interface NFC tag launched by inside secure provides low-cost, fast, and convenient Product Support for interaction between two electronic devices. It can be predicted that in the future, NFC applications will no longer be limited to communicat
Like other information technologies, the emergence of NFC technology provides many possibilities for us to develop new applications, but it also faces various security problems. This article will introduce and analyze the five common security problems of the NFC system.
1. Eavesdropping
Eavesdropping refersNFC link layer communication is not encryptedIn this case, if we do not perform some encryption pr
In May February this year, the NFC forum just released the first specification of NFC TechnologyNdef (NFC data exchange format)-That isNFC data exchange Specification. In less than two months, eclipse released the NFC development plug-in based on the ndef specification. This plug-in is namedAntares Software Development
According to foreign media reports, RIM's joint chief executive Jim Balsillie recently launched the BlackBerry Tag service at the GITEX conference in Dubai. With this service, users can share their contact information, files, and multimedia content by touching their mobile phones. RIM revealed that the BlackBerry Tag service will be integrated into BlackBerry 7 software updates based on NFC (Near-Field Communication) wireless technology. The first sma
NFC: Near Field Communication Technology
RFID (radio frequency identification) technology, also known as electronic tags and radio frequency identification, is used by bus cards.
Small NFC transmission range, secure and low power consumption
RFID is a recognition technology, while NFC is an interactive communication method. Some people say that
As we all know, Windows Phone 8 SDK simulators do not support NFC testing. If you have developed an NFC-based application, it means that you need two Windows Phone devices that support NFC during the test. Such configuration may discourage many independent developers.
The good news is that open-source projectsProximity tapperThis solution satisfies the requirem
Near-Field Communication (NFC) is a set of short-range wireless technologies. It usually requires a distance of 4 cm or shorter to initialize the connection. NFC allows users to share small data loads between NFC tags and Android devices or between two Android devices.
NFC tags have complex classifications. Simple
Purpose of Use: Current activity can respond directly to an NFC tag without requiring the user to choose all the activity that can be handled.Steps to use:First step: In the OnCreate () method// NFC Front-desk dispatch system Private null;.........// initializes the pendingintent, and when an NFC device is connected, it is given to the current activity process
Beam examples provided in Android 4.0 SDK are indeed a good template for NFC development. For the ndef message processing process that understands NFC, see the following code.
Public class beam extends activity implements createndefmessagecallback,Onndefpushcompletecallback {Nfcadapter mnfcadapter;Textview minfotext;Private Static final int message_sent = 1;
@ OverridePublic void oncreate (bundle savedinsta
Filter NFC intent
To start your application when you want to process the scanned NFC tag, you can filter out one, two, or all of the three NFC intents in your app's Android list. However, you usually want to control the most commonly used intent of the action_ndef_discovered type when the application starts. The intent of action_ndef_discovered type is rolled bac
Beam examples provided in Android 4.0 SDK are indeed a good template for NFC development. For the NDEF message processing process that understands NFC, see the following code.
Public class Beam extends Activity implements CreateNdefMessageCallback,
OnNdefPushCompleteCallback {
NfcAdapter mNfcAdapter;
TextView mInfoText;
Private static final int MESSAGE_SENT = 1;
@ Override
Public void onCreate (Bundle saved
The beam example provided in the Android 4.0 SDK is indeed a good template for NFC development. Consider the following code for NDEF message processing that understands NFC.
public class Beam extends activity implements Createndefmessagecallback,
Onndefpushcompletecallback {
Nfcadapter Mnfcadapter;
TextView Minfotext;
private static final int message_sent = 1;
@Override
public void OnCreate (Bundle s
Type 1 Tag,type 2 tag, Type 3 tag, type 4 Tag
Type 1 is based on ISO 14443 A and are currently available exclusively from Innovision Technology (topaz™). It has a 96-byte memory capacity, which makes it a very cost-efficient tag for a wide range of NFC applicationsType 2 are also based on ISO 14443 A and are currently exclusively available from Philips (MIFARE UltraLight). It has half the memory capacity of Type 1 tagsType 3 are based on FeliCa and
BlackBerry 9900 9360 The world's first Mastercardpaypass NFC payment authentication based on a SIM card
Http://press.rim.com/newsroom/press/2011/pressrelease-5263.html
Visapaywave NFC payment authentication based on SIM card for multiple phones, such as BlackBerry 9900
Http://press.rim.com/newsroom/partner/2012/pressrelease-5320.html
Turkish operator Turkcell releases
Bank of America is starting an ' by invitation only ' trial of its Mobile Wallet program. The trial is open to owners of certain BlackBerry devices with a Bank of America debit or credit card. The service allows shoppers to ' tap and pay ' while checking out of a participating retailer.To join the trial, must own a BlackBerry Curve 8520 or 8530, a BlackBerry Tour 9630 or a BlackBerry Bold 9000, 9650 or 9700 with the ability to download apps. Those testing the program would be able to make their
S beam is a file sharing port developed by Samsung Galaxy s iii and applied to close-range data transmission. It is a new function developed based on the beam platform of android4.0 system. It allows users to easily transmit files without Wi-Fi or telephone signals. Two Galaxy s iii instancesMobile phoneWith just one click, you can easily transfer files quickly. Theoretically, a 5 MB MP3 file can be transmitted in just one second.
First, let us recall the process and speed of two mobile
13.56 MHzSmall-sized Magnetic AntennaThe launch is catching up with the NFC heat wave.
I don't understand why there are two standards in China: 2.4g and 13.56mhz. the backend protocols are easy to unify. Isn't it because of the differences in antennas?
13.56mhz is indeed a headache, and the traditional design volume is unacceptable: ApproachingBusiness card sizeAnd also consider pastingMAGNETIC FILM. Prevents the reader from sendingSignal received
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.