1 / 22

Felica Card

Felica Card. Outline. Device Communication Protocol File System Commands. Device. Communication Protocol. Physical layer This layer defines the physical and electrical characteristics of data transfer Data link layer

junior
Télécharger la présentation

Felica Card

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Felica Card

  2. Outline • Device • Communication Protocol • File System • Commands

  3. Device

  4. Communication Protocol • Physical layer • This layer defines the physical and electrical characteristics of data transfer • Data link layer • This layer defines the data transfer method and the error detection scheme. • Application layer • This layer defines the specifications and functions of data strings to be handled as commands.

  5. Communication Protocol • Application layer • Command Package • Response Package

  6. Communication Protocol • Application layer Require Authentication Not Require Authentication

  7. Communication Protocol • Anti-collision • Using IDm • Time Out • Using PMm

  8. File System

  9. File System • Block • Smallest unit of File System • Data is divided into blocks of 16 bytes. • RC-S885 (154 blocks are available)

  10. File System • Service • All access to the Block is performed by using service • Each service regulate a range of block • Service is called using Service code

  11. File System • Service • Types • Random Service • This is the general-purpose Service. This Service provides access to Block and can read and write data by specifying any Block. • Cyclic Service • This is the Service that assumes the role of log management. This Service provides access to Block and deletes the oldest data every time new data is written. • Purse Service • This Service provides access to Block and automatically performs numerical operations on specific data in the Block

  12. File System • Service • Service code • Example: Read / Write Access: Service Code of Random Service that requires authentication (0001 0010 1100 1000)b = 12c8h

  13. File System • Service • Service code

  14. File System • Area • It’s possible that a area contain some areas • Area 0 is the root area (area code = 0000h) • Each area is distinguished by area code (2bytes)

  15. File System • System • Reader/Writer only work for one system at a time • Each system is distinguished by system code (2 bytes) • Switching between Systems using Idm • Include several Area

  16. Commands • Polling command • Request Service • Request Response • Read Without Encryption • Write Without Encryption • Request System Code • Authentication1 • Authentication2 • Read • Write

  17. Commands • Polling command • Use this command to acquire and identify a card Response Request

  18. Commands • Request Service • Use this command to check for the existence of Area / Service specified by Area Code / Service Code • Request Response • Use this command to check whether a card exists • Read Without Encryption • Use this command to read Block Data from a Service that requires no authentication.

  19. Commands • Write Without Encryption • Use this command to write Block Data to a Service that requires no authentication. • Request System Code • Use this command to acquire System Code of the System located on a card. • If a card is divided into multiple System, this command acquires System Code of all the System existing in the card. • Authentication 1 • Use this command to authenticate cards

  20. Commands • Authentication 2 • Use this command to allow a card to authenticate a Reader/Writer. • Read • Use this command to read Block Data from a Service that requires authentication. • Write • Use this command to write Block Data to a Service that requires authentication.

  21. Thanks for your attention

More Related