Documente Academic
Documente Profesional
Documente Cultură
COMMUNICATIO
N
INTRODUCTION
NFC,
ADVANTAGES OF 13.56.
CODING
MANCHESTER
CODING
1, H to L for
MODIFIED
MILLERCODE
Character by pauses
occuring in the carrier at
different positions
Coding char. As 0 after 0,0
after 1 and 0 after o or 1
POSSIBLE COMBINATIONS OF
ACTIVE/PASSIVE DEVICES AS
INITIATOR AND TARGET
INITIATOR
TARGET
ACTIVE
POSSIBLE
POSSIBLE
PASSIVE
NOT POSSIBLE
POSSIBLE
READ
/WRITE
MODE
COMMUNICATION
MODES OF NFC
PEER TO
PEER MODE
CARD
EMULATION
MODE
READER/WRITER MODE
Define How To Read And Write NDEF Data From/To a
Tag
Types 1 And 2: Proprietary Tags Based On ISO 14443
Type A
TYPE 3:PROPRIETARY TAG BASED ON FeliCa
TYPE 4: OPEN TAG BASED ON ISO 14443 TYPE A Or
B
AND ISO 7816-4
NDEF
Third Party
REFERENCE
NDEF
APPLICATION
Applications
STYPE 1-4 TAG
OPERATION
Non-NDEF
Applicatio
ns
DIGITAL PROTOCOL
ANALOGUE
CARD EMULATION
MODE
Proprietary Contactless Card Applications
Eg. Payments, Ticketing,access Control Based
on
ISO 1443A/B or FeliCa
Applications
Digital Protocol
Analogue
APPLICATIONS
NFC FORUM
REGISTERED
PROTOCOLS
PROTOCOL
BINDINGS
OTHER
PROTOCOLS
NFC Vs OTHER
TECHNOLOGIES
SPECIFICATIONS RELEASED TO
DATE
APPLICATIONS
SECURITY ASPECTS:
EAVESDROPPING:
MODIFICATION:
ATTACK:
The Adversary Has To Forward The
Request Of The Reader To The Victim And Relay Back
Its Answer To The Reader In Real Time.
The
Japan
ADVANTAGES
CONCLUSION
QUERIES