Upload
kathryn-grills
View
247
Download
3
Tags:
Embed Size (px)
Citation preview
Felica Card
Outline
• Device• Communication Protocol• File System• Commands
Device
Reader / Writer Felica CardPasori (RC – S600) RC – S885
RC-S885
Communication distance(*1) 20mm(when using RC-S600)
Communication methodCompliant with ISO/IEC 18092(212kbps,424kbps Passive mode)
Operating frequency 13.56MHz
Modulation system ASK modulation
Communication speedSupports automatic 212kbps,424kbps switching (at 13.56MHz operating frequency)(*5)
Operating temperature/humidity(*2)
0C° ~ 40C°(32°F~104°F)/20%RH ~ 90%RH40C° ~ 50C°(104°F~122°F)/50%RH or less
Basic materialUses plastic material such as PET which exerts minimal effects on the environment even if incinerated.
Nonvolatilememory
Type 4K bytes FRAM
User memory 2,464 bytes (16 bytes ×154 blocks)
Data Retention Performance 10 years (at 70C°(158°F))
Rewrite endurance
10 billion times (at 55C°(131°F)) *Continuous read = 1 billion times (at 55C°(131°F))
Security
•Embedded IC chip (RC-S962)Hardware: ISO/IEC 15408 ("Common Criteria for Security Evaluation") EAL4+•Composite: ISO/IEC 15408 ("Common Criteria for Security Evaluation") EAL4
Storage temperature/humidity-10C° ~ +60C°(14°F~140°F)/60%RH or less
Communication Protocol
• Physical layer– This layer defines the physical and electrical
characteristics of data transfer• Data link layer– This layer defines the data transfer method and
the error detection scheme.• Application layer– This layer defines the specifications and functions
of data strings to be handled as commands.
Communication Protocol
• Application layer– Command Package
– Response Package
Communication Protocol
• Application layer
Require Authentication Not Require Authentication
Communication Protocol
• Anti-collision– Using IDm
• Time Out– Using PMm
File System
File System
• Block– Smallest unit of File
System– Data is divided into
blocks of 16 bytes.– RC-S885 (154 blocks
are available)
File System
• Service– All access to the Block is performed by using
service – Each service regulate a range of block – Service is called using Service code
File System
• Service– Types
• Random Service– This is the general-purpose Service. This Service provides access
to Block and can read and write data by specifying any Block.
• Cyclic Service– This is the Service that assumes the role of log management.
This Service provides access to Block and deletes the oldest data every time new data is written.
• Purse Service– This Service provides access to Block and automatically
performs numerical operations on specific data in the Block
File System
• Service– Service code• Example: Read / Write Access: Service Code of Random
Service that requires authentication (0001 0010 1100 1000)b = 12c8h
File System• Service– Service code
File System
• Area – It’s possible that a area contain some areas – Area 0 is the root area (area code = 0000h)– Each area is distinguished by area code (2bytes)
File System
• System– Reader/Writer only work for one system at a time– Each system is distinguished by system code (2
bytes)– Switching between Systems using Idm– Include several Area
Commands
• Polling command• Request Service• Request Response• Read Without Encryption• Write Without Encryption• Request System Code• Authentication1• Authentication2• Read• Write
Commands
• Polling command– Use this command to acquire and identify a card
Request
Response
Commands
• Request Service– Use this command to check for the existence of
Area / Service specified by Area Code / Service Code
• Request Response– Use this command to check whether a card exists
• Read Without Encryption– Use this command to read Block Data from a
Service that requires no authentication.
Commands
• Write Without Encryption– Use this command to write Block Data to a Service
that requires no authentication.• Request System Code– Use this command to acquire System Code of the
System located on a card.– If a card is divided into multiple System, this
command acquires System Code of all the System existing in the card.
• Authentication 1 – Use this command to authenticate cards
Commands
• Authentication 2– Use this command to allow a card to authenticate
a Reader/Writer. • Read– Use this command to read Block Data from a
Service that requires authentication. • Write– Use this command to write Block Data to a Service
that requires authentication.
Thanks for your attention