Felica Card.

Slides:



Advertisements
Similar presentations
Chapter 6 I/O Systems.
Advertisements

Chapter 13: I/O Systems I/O Hardware Application I/O Interface
1 UNIT I (Contd..) High-Speed LANs. 2 Introduction Fast Ethernet and Gigabit Ethernet Fast Ethernet and Gigabit Ethernet Fibre Channel Fibre Channel High-speed.
Ozone Level ppb (parts per billion)
1 Copyright © 2013 Elsevier Inc. All rights reserved. Chapter 4 Computing Platforms.
Multiplication X 1 1 x 1 = 1 2 x 1 = 2 3 x 1 = 3 4 x 1 = 4 5 x 1 = 5 6 x 1 = 6 7 x 1 = 7 8 x 1 = 8 9 x 1 = 9 10 x 1 = x 1 = x 1 = 12 X 2 1.
Division ÷ 1 1 ÷ 1 = 1 2 ÷ 1 = 2 3 ÷ 1 = 3 4 ÷ 1 = 4 5 ÷ 1 = 5 6 ÷ 1 = 6 7 ÷ 1 = 7 8 ÷ 1 = 8 9 ÷ 1 = 9 10 ÷ 1 = ÷ 1 = ÷ 1 = 12 ÷ 2 2 ÷ 2 =
Confidential 1 Phoenix Security Architecture and DevID July 2005 Karen Zelenko Phoenix Technologies.
Fraction IX Least Common Multiple Least Common Denominator
Rue du Rhône 114- CH-1204 Geneva - T: F: Near field communication (NFC) Ecma/TC32-TG19/2005/013.
/4/2010 Box and Whisker Plots Objective: Learn how to read and draw box and whisker plots Starter: Order these numbers.
You will need some paper!
1 1  1 =.
1  1 =.
Year 6 mental test 15 second questions Numbers and number system Numbers and the number system, Measures and Shape.
Chapter 5 Input/Output 5.1 Principles of I/O hardware
1 Chapter 11 I/O Management and Disk Scheduling Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and.
Making the System Operational
Toward Practical Public Key Anti- Counterfeiting for Low-Cost EPC Tags Alex Arbit, Avishai Wool, Yossi Oren, IEEE RFID April
Block Cipher Modes of Operation and Stream Ciphers
Smart Card Department of Computer Science National Chiao Tung University.
Trusted Symbol of the Digital Economy 1 Bill Holmes – VP Marketing ID Platform - Smart Cards.
Nios Multi Processor Ethernet Embedded Platform Final Presentation
Bus arbitration Processor and DMA controllers both need to initiate data transfers on the bus and access main memory. The device that is allowed to initiate.
Chapter 8 Interfacing Processors and Peripherals.
What is RAID Redundant Array of Independent Disks.
Disk Storage, Basic File Structures, and Hashing
Storing Data Chapter 4.
C SINGH, JUNE 7-8, 2010IWW 2010, ISATANBUL, TURKEY Advanced Computers Architecture, UNIT 2 Advanced Computers Architecture UNIT 2 CACHE MEOMORY Lecture7.
Presenter : Cheng-Ta Wu Kenichiro Anjo, Member, IEEE, Atsushi Okamura, and Masato Motomura IEEE JOURNAL OF SOLID-STATE CIRCUITS, VOL. 39,NO. 5, MAY 2004.
I/O and Networking Fred Kuhns
Operating Systems Operating Systems - Winter 2010 Chapter 3 – Input/Output Vrije Universiteit Amsterdam.
© 2009 EMC Corporation. All rights reserved. Direct Attached Storage and Introduction to SCSI Module 2.1.
Data handling Thursday. Objectives for today Extending our knowledge of statistics – range, mode, median and the mean. mode rangeToday we are focusing.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 EN0129 PC AND NETWORK TECHNOLOGY I IP ADDRESSING AND SUBNETS Derived From CCNA Network Fundamentals.
Fraction IX Least Common Multiple Least Common Denominator
Thermodynamic Review Conversion Formula Example Celsius to Kelvin K = C o C = 294 K Kelvin to Celsius C = K – K = 40 o C Fahrenheit to.
Least Common Multiples and Greatest Common Factors
Sony Smart Cards and International Evaluation 2 nd Common Criteria Conference London, UK July 2001 i-Card System Solutions Division Broadband Network.
Number bonds to 10,
2 x0 0 12/13/2014 Know Your Facts!. 2 x1 2 12/13/2014 Know Your Facts!
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
International Data Encryption Algorithm
1  1998 Morgan Kaufmann Publishers Interfacing Processors and Peripherals.
Using Lowest Common Denominator to add and subtract fractions
Nokia 30 technical specification
One step equations Add Subtract Multiply Divide Addition X + 5 = -9 X = X = X = X = X = 2.
TCP/IP Protocol Suite 1 Chapter 18 Upon completion you will be able to: Remote Login: Telnet Understand how TELNET works Understand the role of NVT in.
Let’s Add! Click the cloud below for a secret question! Get Started!
Lecture Objectives: 1)Explain the limitations of flash memory. 2)Define wear leveling. 3)Define the term IO Transaction 4)Define the terms synchronous.
Understanding Networks. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
FeApResFeApRes Supervisor: Mr. Le Thanh Quang. OutlineOutline I. Group Introduction II. Capstone Project Introduction III. Software Project Plan IV. Software.
Fayoum University Faculty of Engineering Electrical Engineering Department E-voting system Using Smart Card Under the supervision Of: Dr. Magdy Amer.
Wireless Intelligent Sensor Modules for Home Monitoring and Control Presented by: BUI, Phuong Nhung, 裴芳绒 António M. Silva1, Alexandre Correia1, António.
Smart Card 李開振, 許家碩 Department of Computer Science National Chiao Tung University.
Composition and Evolution of Operating Systems Introduction to Operating Systems: Module 2.
© Janice Regan, CMPT 300, May CMPT 300 Introduction to Operating Systems Principles of I/0 hardware.
DEVICES AND COMMUNICATION BUSES FOR DEVICES NETWORK
Smart Card Technology & Features
Application Block Diagram III. SOFTWARE PLATFORM Figure above shows a network protocol stack for a computer that connects to an Ethernet network and.
I/O Computer Organization II 1 Interconnecting Components Need interconnections between – CPU, memory, I/O controllers Bus: shared communication channel.
Communication Techniques Design Team 2 Luke LaPointe Nick Timpf Mark VanCamp Brent Woodman Steve Zuraski Design Team 2 Luke LaPointe Nick Timpf Mark VanCamp.
IDENTITY NUMBERS BY A.M.VILLAVAN M.TECH(COS). RFID Acronymn: Radio Frequency Identification Device RFID is a technology, whose origins are found in the.
MSP430FR57xx Demo. System clock = 8MHz (DCO) Memory Block Size = 512 bytes, Long word writes FRAM enables 100x faster writes at 3x lower power Write Speed.
FeApResFeApRes Supervisor: Mr. Le Thanh Quang. OutlineOutline I. Group Introduction II. Capstone Project Introduction III. Software Project Plan IV. Software.
Sravanthi chalasani University of North Carolina at Charlotte ECGR-6185 ADVANCED EMBEDDED SYSTEMS Sravanthi Chalasani SMART CARDS.
3506-D WEST LAKE CENTER DRIVE,
The OSI Model Prof. Choong Seon HONG.
RAID RAID Mukesh N Tekwani
RAID RAID Mukesh N Tekwani April 23, 2019
Presentation transcript:

Felica Card

Outline Device Communication Protocol File System Commands

Device Reader / Writer Felica Card Pasori (RC – S600) RC – S885

RC-S885 Communication distance(*1) 20mm(when using RC-S600) Communication method Compliant with ISO/IEC 18092 (212kbps,424kbps Passive mode) Operating frequency 13.56MHz Modulation system ASK modulation Communication speed Supports automatic 212kbps,424kbps switching (at 13.56MHz operating frequency)(*5) Operating temperature/humidity(*2) 0C° ~ 40C°(32°F~104°F)/20%RH ~ 90%RH 40C° ~ 50C°(104°F~122°F)/50%RH or less Basic material Uses plastic material such as PET which exerts minimal effects on the environment even if incinerated. Nonvolatile memory Type 4K bytes FRAM User memory 2,464 bytes (16 bytes ×154 blocks) Data Retention Performance 10 years (at 70C°(158°F)) Rewrite endurance 10 billion times (at 55C°(131°F)) *Continuous read = 1 billion times (at 55C°(131°F)) Security Embedded IC chip (RC-S962)Hardware: ISO/IEC 15408 ("Common Criteria for Security Evaluation") EAL4+ Composite: ISO/IEC 15408 ("Common Criteria for Security Evaluation") EAL4 Storage temperature/humidity -10C° ~ +60C°(14°F~140°F)/60%RH or less

Communication Protocol Physical layer This layer defines the physical and electrical characteristics of data transfer Data link layer This layer defines the data transfer method and the error detection scheme. Application layer This layer defines the specifications and functions of data strings to be handled as commands.

Communication Protocol Application layer Command Package Response Package Command package: 1 byte dau tien de xc dinh la command j, va cac byte tiep theo la noi dung command

Communication Protocol Application layer 2 truong hop: 1 la can au thentication va 2 la ko can authentication Day la vi du ve giao tiep giua the va dau doc the thong qua command va respond Require Authentication Not Require Authentication

Communication Protocol Anti-collision Using IDm Time Out Using PMm Co che chong xung dot giua cac the: cam 1 nam the va dua vao dau doc the -> no van nhan ra tung the Quan ly time out, set timeout cho tung lenh va dc ghi trong PMm Nha sxuat ghi vao the va ko the sua duoc,

File System Viec luu tru du lieu cua the, the quan ly theo file - Moi area thuc hien 1 tac vu

File System Block Smallest unit of File System Data is divided into blocks of 16 bytes. RC-S885 (154 blocks are available)

File System Service All access to the Block is performed by using service Each service regulate a range of block Service is called using Service code Service là cái quan trọng, service code có tác dụng định danh từng loại service

File System Service Types Random Service Cyclic Service Purse Service This is the general-purpose Service. This Service provides access to Block and can read and write data by specifying any Block. Cyclic Service This is the Service that assumes the role of log management. This Service provides access to Block and deletes the oldest data every time new data is written. Purse Service This Service provides access to Block and automatically performs numerical operations on specific data in the Block - Dung de luu thong tin cu, tranh tinh trang thong tin cu bi ghi de len thong tin moi

File System Service Service code Example: Read / Write Access: Service Code of Random Service that requires authentication (0001 0010 1100 1000)b = 12c8h - - 6 bit cuoi qui dinh loai service

File System Service Service code

File System Area It’s possible that a area contain some areas Area 0 is the root area (area code = 0000h) Each area is distinguished by area code (2bytes)

File System System Reader/Writer only work for one system at a time Each system is distinguished by system code (2 bytes) Switching between Systems using Idm Include several Area

Commands Polling command Request Service Request Response Read Without Encryption Write Without Encryption Request System Code Authentication1 Authentication2 Read Write

Commands Polling command Use this command to acquire and identify a card Response Request

Commands Request Service Request Response Read Without Encryption Use this command to check for the existence of Area / Service specified by Area Code / Service Code Request Response Use this command to check whether a card exists Read Without Encryption Use this command to read Block Data from a Service that requires no authentication.

Commands Write Without Encryption Request System Code Authentication 1 Use this command to write Block Data to a Service that requires no authentication. Request System Code Use this command to acquire System Code of the System located on a card. If a card is divided into multiple System, this command acquires System Code of all the System existing in the card. Authentication 1 Use this command to authenticate cards

Commands Authentication 2 Read Write Use this command to allow a card to authenticate a Reader/Writer. Read Use this command to read Block Data from a Service that requires authentication. Write Use this command to write Block Data to a Service that requires authentication.

Thanks for your attention