240 likes | 448 Views
Felica Card. Outline. Device Communication Protocol File System Commands. Device. Communication Protocol. Physical layer This layer defines the physical and electrical characteristics of data transfer Data link layer
E N D
Outline • Device • Communication Protocol • File System • Commands
Communication Protocol • Physical layer • This layer defines the physical and electrical characteristics of data transfer • Data link layer • This layer defines the data transfer method and the error detection scheme. • Application layer • This layer defines the specifications and functions of data strings to be handled as commands.
Communication Protocol • Application layer • Command Package • Response Package
Communication Protocol • Application layer Require Authentication Not Require Authentication
Communication Protocol • Anti-collision • Using IDm • Time Out • Using PMm
File System • Block • Smallest unit of File System • Data is divided into blocks of 16 bytes. • RC-S885 (154 blocks are available)
File System • Service • All access to the Block is performed by using service • Each service regulate a range of block • Service is called using Service code
File System • Service • Types • Random Service • This is the general-purpose Service. This Service provides access to Block and can read and write data by specifying any Block. • Cyclic Service • This is the Service that assumes the role of log management. This Service provides access to Block and deletes the oldest data every time new data is written. • Purse Service • This Service provides access to Block and automatically performs numerical operations on specific data in the Block
File System • Service • Service code • Example: Read / Write Access: Service Code of Random Service that requires authentication (0001 0010 1100 1000)b = 12c8h
File System • Service • Service code
File System • Area • It’s possible that a area contain some areas • Area 0 is the root area (area code = 0000h) • Each area is distinguished by area code (2bytes)
File System • System • Reader/Writer only work for one system at a time • Each system is distinguished by system code (2 bytes) • Switching between Systems using Idm • Include several Area
Commands • Polling command • Request Service • Request Response • Read Without Encryption • Write Without Encryption • Request System Code • Authentication1 • Authentication2 • Read • Write
Commands • Polling command • Use this command to acquire and identify a card Response Request
Commands • Request Service • Use this command to check for the existence of Area / Service specified by Area Code / Service Code • Request Response • Use this command to check whether a card exists • Read Without Encryption • Use this command to read Block Data from a Service that requires no authentication.
Commands • Write Without Encryption • Use this command to write Block Data to a Service that requires no authentication. • Request System Code • Use this command to acquire System Code of the System located on a card. • If a card is divided into multiple System, this command acquires System Code of all the System existing in the card. • Authentication 1 • Use this command to authenticate cards
Commands • Authentication 2 • Use this command to allow a card to authenticate a Reader/Writer. • Read • Use this command to read Block Data from a Service that requires authentication. • Write • Use this command to write Block Data to a Service that requires authentication.