Felica Card
240 likes | 464 Vues
Felica Card. Outline. Device Communication Protocol File System Commands. Device. Communication Protocol. Physical layer This layer defines the physical and electrical characteristics of data transfer Data link layer
Felica Card
E N D
Presentation Transcript
Outline • Device • Communication Protocol • File System • Commands
Communication Protocol • Physical layer • This layer defines the physical and electrical characteristics of data transfer • Data link layer • This layer defines the data transfer method and the error detection scheme. • Application layer • This layer defines the specifications and functions of data strings to be handled as commands.
Communication Protocol • Application layer • Command Package • Response Package
Communication Protocol • Application layer Require Authentication Not Require Authentication
Communication Protocol • Anti-collision • Using IDm • Time Out • Using PMm
File System • Block • Smallest unit of File System • Data is divided into blocks of 16 bytes. • RC-S885 (154 blocks are available)
File System • Service • All access to the Block is performed by using service • Each service regulate a range of block • Service is called using Service code
File System • Service • Types • Random Service • This is the general-purpose Service. This Service provides access to Block and can read and write data by specifying any Block. • Cyclic Service • This is the Service that assumes the role of log management. This Service provides access to Block and deletes the oldest data every time new data is written. • Purse Service • This Service provides access to Block and automatically performs numerical operations on specific data in the Block
File System • Service • Service code • Example: Read / Write Access: Service Code of Random Service that requires authentication (0001 0010 1100 1000)b = 12c8h
File System • Service • Service code
File System • Area • It’s possible that a area contain some areas • Area 0 is the root area (area code = 0000h) • Each area is distinguished by area code (2bytes)
File System • System • Reader/Writer only work for one system at a time • Each system is distinguished by system code (2 bytes) • Switching between Systems using Idm • Include several Area
Commands • Polling command • Request Service • Request Response • Read Without Encryption • Write Without Encryption • Request System Code • Authentication1 • Authentication2 • Read • Write
Commands • Polling command • Use this command to acquire and identify a card Response Request
Commands • Request Service • Use this command to check for the existence of Area / Service specified by Area Code / Service Code • Request Response • Use this command to check whether a card exists • Read Without Encryption • Use this command to read Block Data from a Service that requires no authentication.
Commands • Write Without Encryption • Use this command to write Block Data to a Service that requires no authentication. • Request System Code • Use this command to acquire System Code of the System located on a card. • If a card is divided into multiple System, this command acquires System Code of all the System existing in the card. • Authentication 1 • Use this command to authenticate cards
Commands • Authentication 2 • Use this command to allow a card to authenticate a Reader/Writer. • Read • Use this command to read Block Data from a Service that requires authentication. • Write • Use this command to write Block Data to a Service that requires authentication.