Presentation is loading. Please wait.

Presentation is loading. Please wait.

Felica Card.

Similar presentations


Presentation on theme: "Felica Card."— Presentation transcript:

1 Felica Card

2 Outline Device Communication Protocol File System Commands

3 Device Reader / Writer Felica Card Pasori (RC – S600) RC – S885

4 RC-S885 Communication distance(*1) 20mm(when using RC-S600) Communication method Compliant with ISO/IEC (212kbps,424kbps Passive mode) Operating frequency 13.56MHz Modulation system ASK modulation Communication speed Supports automatic 212kbps,424kbps switching (at 13.56MHz operating frequency)(*5) Operating temperature/humidity(*2) 0C° ~ 40C°(32°F~104°F)/20%RH ~ 90%RH 40C° ~ 50C°(104°F~122°F)/50%RH or less Basic material Uses plastic material such as PET which exerts minimal effects on the environment even if incinerated. Nonvolatile memory Type 4K bytes FRAM User memory 2,464 bytes (16 bytes ×154 blocks) Data Retention Performance 10 years (at 70C°(158°F)) Rewrite endurance 10 billion times (at 55C°(131°F)) *Continuous read = 1 billion times (at 55C°(131°F)) Security Embedded IC chip (RC-S962)Hardware: ISO/IEC ("Common Criteria for Security Evaluation") EAL4+ Composite: ISO/IEC ("Common Criteria for Security Evaluation") EAL4 Storage temperature/humidity -10C° ~ +60C°(14°F~140°F)/60%RH or less

5 Communication Protocol
Physical layer This layer defines the physical and electrical characteristics of data transfer Data link layer This layer defines the data transfer method and the error detection scheme. Application layer This layer defines the specifications and functions of data strings to be handled as commands.

6 Communication Protocol
Application layer Command Package Response Package Command package: 1 byte dau tien de xc dinh la command j, va cac byte tiep theo la noi dung command

7 Communication Protocol
Application layer 2 truong hop: 1 la can au thentication va 2 la ko can authentication Day la vi du ve giao tiep giua the va dau doc the thong qua command va respond Require Authentication Not Require Authentication

8 Communication Protocol
Anti-collision Using IDm Time Out Using PMm Co che chong xung dot giua cac the: cam 1 nam the va dua vao dau doc the -> no van nhan ra tung the Quan ly time out, set timeout cho tung lenh va dc ghi trong PMm Nha sxuat ghi vao the va ko the sua duoc,

9 File System Viec luu tru du lieu cua the, the quan ly theo file
- Moi area thuc hien 1 tac vu

10 File System Block Smallest unit of File System
Data is divided into blocks of 16 bytes. RC-S885 (154 blocks are available)

11 File System Service All access to the Block is performed by using service Each service regulate a range of block Service is called using Service code Service là cái quan trọng, service code có tác dụng định danh từng loại service

12 File System Service Types Random Service Cyclic Service Purse Service
This is the general-purpose Service. This Service provides access to Block and can read and write data by specifying any Block. Cyclic Service This is the Service that assumes the role of log management. This Service provides access to Block and deletes the oldest data every time new data is written. Purse Service This Service provides access to Block and automatically performs numerical operations on specific data in the Block - Dung de luu thong tin cu, tranh tinh trang thong tin cu bi ghi de len thong tin moi

13 File System Service Service code
Example: Read / Write Access: Service Code of Random Service that requires authentication ( )b = 12c8h - - 6 bit cuoi qui dinh loai service

14 File System Service Service code

15 File System Area It’s possible that a area contain some areas
Area 0 is the root area (area code = 0000h) Each area is distinguished by area code (2bytes)

16 File System System Reader/Writer only work for one system at a time
Each system is distinguished by system code (2 bytes) Switching between Systems using Idm Include several Area

17 Commands Polling command Request Service Request Response
Read Without Encryption Write Without Encryption Request System Code Authentication1 Authentication2 Read Write

18 Commands Polling command
Use this command to acquire and identify a card Response Request

19 Commands Request Service Request Response Read Without Encryption
Use this command to check for the existence of Area / Service specified by Area Code / Service Code Request Response Use this command to check whether a card exists Read Without Encryption Use this command to read Block Data from a Service that requires no authentication.

20 Commands Write Without Encryption Request System Code Authentication 1
Use this command to write Block Data to a Service that requires no authentication. Request System Code Use this command to acquire System Code of the System located on a card. If a card is divided into multiple System, this command acquires System Code of all the System existing in the card. Authentication 1 Use this command to authenticate cards

21 Commands Authentication 2 Read Write
Use this command to allow a card to authenticate a Reader/Writer. Read Use this command to read Block Data from a Service that requires authentication. Write Use this command to write Block Data to a Service that requires authentication.

22 Thanks for your attention


Download ppt "Felica Card."

Similar presentations


Ads by Google