没有合适的资源?快使用搜索试试~ 我知道了~
NFC Forum Type 1 Tag Operation Specification
5星 · 超过95%的资源 需积分: 11 9 下载量 66 浏览量
2015-05-29
21:40:13
上传
评论
收藏 1019KB PDF 举报
温馨提示
试读
46页
NFC Forum Type 1 Tag Operation Specification
资源推荐
资源详情
资源评论
Type 1 Tag Operation Specification
Technical Specification
NFC Forum
TM
NFCForum-TS-Type-1-Tag_1.0
2007-07-09
RESTRICTIONS ON USE
This specification is copyright © 2005-2007 by the NFC Forum, and was made available pursuant to a
license agreement entered into between the recipient (Licensee) and NFC Forum, Inc. (Licensor) and may
be used only by Licensee, and in compliance with the terms of that license agreement (License). If you are
not the Licensee, you are not authorized to make any use of this specification. However, you may obtain a
copy at the following page of Licensor's Website: http://www.nfc-forum.org/resources/spec_license after
entering into and agreeing to such license terms as Licensor is then requiring. On the date that this
specification was downloaded by Licensee, those terms were as follows:
1. LICENSE GRANT.
Licensor hereby grants Licensee the right, without charge, to copy (for internal purposes only) and share
the Specification with Licensee's members, employees and consultants (as appropriate). This license grant
does not include the right to sublicense, modify or create derivative works based upon the Specification.
2. NO WARRANTIES.
THE SPECIFICATION IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
OR IMPLIED, INCLUDING BUT NOT LIMITED TO WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE, ACCURACY, COMPLETENESS AND
NONINFRINGEMENT OF THIRD PARTY RIGHTS. IN NO EVENT SHALL LICENSOR, ITS
MEMBERS OR ITS CONTRIBUTORS BE LIABLE FOR ANY CLAIM, OR ANY DIRECT, SPECIAL,
INDIRECT OR CONSEQUENTIAL DAMAGES, OR ANY DAMAGES WHATSOEVER RESULTING
FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT,
NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH
THE USE OR PERFORMANCE OF THE SPECIFICATION.
3. THIRD PARTY RIGHTS.
Without limiting the generality of Section 2 above, LICENSOR ASSUMES NO RESPONSIBILITY TO
COMPILE, CONFIRM, UPDATE OR MAKE PUBLIC ANY THIRD PARTY ASSERTIONS OF
PATENT OR OTHER INTELLECTUAL PROPERTY RIGHTS THAT MIGHT NOW OR IN THE
FUTURE BE INFRINGED BY AN IMPLEMENTATION OF THE SPECIFICATION IN ITS CURRENT,
OR IN ANY FUTURE FORM. IF ANY SUCH RIGHTS ARE DESCRIBED ON THE SPECIFICATION,
LICENSOR TAKES NO POSITION AS TO THE VALIDITY OR INVALIDITY OF SUCH
ASSERTIONS, OR THAT ALL SUCH ASSERTIONS THAT HAVE OR MAY BE MADE ARE SO
LISTED.
4. TERMINATION OF LICENSE.
In the event of a breach of this Agreement by Licensee or any of its employees or members, Licensor shall
give Licensee written notice and an opportunity to cure. If the breach is not cured within thirty (30) days
after written notice, or if the breach is of a nature that cannot be cured, then Licensor may immediately or
thereafter terminate the licenses granted in this Agreement.
5. MISCELLANEOUS.
All notices required under this Agreement shall be in writing, and shall be deemed effective five days from
deposit in the mails. Notices and correspondence to the NFC Forum address as it appears below. This
Agreement shall be construed and interpreted under the internal laws of the United States and the
Commonwealth of Massachusetts, without giving effect to its principles of conflict of law.
NFC Forum, Inc.
401 Edgewater Place, Suite 600
Wakefield, MA, USA 01880
Contents
Type 1 Tag Operation Specification Page i
Contents
1 Introduction .................................................................................................... 1
1.1 Objectives ........................................................................................................................... 1
1.2 Purpose ............................................................................................................................... 1
1.3 Applicable Documents or References ................................................................................ 1
1.4 Administration .................................................................................................................... 2
1.5 Special Word Usage ........................................................................................................... 2
1.6 Name and Logo Usage ....................................................................................................... 2
1.7 Intellectual Property ........................................................................................................... 2
1.8 Glossary .............................................................................................................................. 3
1.9 Convention and notations ................................................................................................... 5
1.9.1 Representation of numbers .................................................................................... 5
2 Memory Structure and Management ............................................................ 6
2.1 General ............................................................................................................................... 6
2.2 Static Memory Structure .................................................................................................... 6
2.2.1 Memory Map ......................................................................................................... 6
2.2.2 Header ROM Format ............................................................................................. 7
2.2.3 UID Format ........................................................................................................... 7
2.2.4 Main Read/Write Memory Format ........................................................................ 7
2.2.5 Block Dh ............................................................................................................... 7
2.2.6 Lock Control/Status Bytes..................................................................................... 7
2.2.7 OTP Bytes ............................................................................................................. 8
2.3 Dynamic Memory Structure ............................................................................................... 8
2.3.1 Dynamic Memory Map ......................................................................................... 8
2.3.2 Dynamic Memory Reserved Bytes ...................................................................... 10
2.3.3 Dynamic Memory Lock Bytes ............................................................................ 10
2.3.4 Dynamic Memory Area ....................................................................................... 10
2.4 TLV Blocks ...................................................................................................................... 10
2.4.1 Format ................................................................................................................. 10
2.4.2 Location ............................................................................................................... 11
2.4.3 Lock Control TLV ............................................................................................... 12
2.4.4 Reserved Memory Control TLV ......................................................................... 13
2.4.5 NDEF Message TLV ........................................................................................... 13
2.4.6 Proprietary TLV .................................................................................................. 14
2.4.7 NULL TLV ......................................................................................................... 14
2.4.8 Terminator TLV .................................................................................................. 14
3 RF Interface .................................................................................................. 15
4 Framing and Transmission Handling ........................................................ 16
4.1 Frame Formats .................................................................................................................. 16
4.2 Transmission Handling ..................................................................................................... 16
5 Command Set .............................................................................................. 17
5.1 State Diagram ................................................................................................................... 17
5.2 Tag Command and Response Set ..................................................................................... 17
5.2.1 Static Memory Model .......................................................................................... 17
5.2.2 Dynamic Memory Model .................................................................................... 17
5.3 Command Format ............................................................................................................. 18
5.3.1 Command List ..................................................................................................... 18
Contents
Type 1 Tag Operation Specification Page ii
5.3.2 Command-Response Format ............................................................................... 19
5.3.3 Address Operand ................................................................................................. 19
5.3.4 CRC ..................................................................................................................... 20
5.3.5 UID Echo ............................................................................................................. 20
5.4 Command Details ............................................................................................................. 20
5.4.1 Detailed Timing ................................................................................................... 20
5.4.2 Timing Definitions .............................................................................................. 20
5.5 REQA and WUPA............................................................................................................ 21
5.6 Read Identification (RID) ................................................................................................. 21
5.7 Read All Blocks 0-Eh (RALL) ......................................................................................... 22
5.8 Read Byte (READ) ........................................................................................................... 22
5.9 Write-Erase Byte (WRITE-E) .......................................................................................... 24
5.10 Write-No-Erase Byte (WRITE-NE) .................................................................... 25
5.11 Locking................................................................................................................ 26
5.12 Read Segment (RSEG) ........................................................................................ 26
5.13 Read 8 Bytes (READ8) ....................................................................................... 26
5.14 Write-Erase 8 Bytes (WRITE-E8) ...................................................................... 27
5.15 Write-No-Erase 8 Bytes (WRITE-NE8) ............................................................. 27
6 NDEF Detection and NDEF Access ............................................................ 28
6.1 NDEF Management .......................................................................................................... 28
6.1.1 Identification as NFC Forum Type 1 Tag ........................................................... 28
6.1.2 Write Permission ................................................................................................. 28
6.1.3 Confirmation of Presence of NDEF Message in Type 1 Tag .............................. 28
6.1.4 Capability Container............................................................................................ 28
6.2 Version Treatment ............................................................................................................ 29
6.3 NDEF Storage .................................................................................................................. 31
6.4 Life Cycle ......................................................................................................................... 32
6.4.1 General ................................................................................................................ 32
6.4.2 Overview of Life-Cycle States ............................................................................ 32
6.4.3 INITIALISED State ............................................................................................ 32
6.4.4 READ/WRITE State ........................................................................................... 32
6.4.5 READ ONLY State ............................................................................................. 33
6.4.6 Determination of Life Cycle State ....................................................................... 33
6.5 Rules for Life Cycle Operation ........................................................................................ 34
6.5.1 Detect NDEF on tag ............................................................................................ 34
6.5.2 Read NDEF Message .......................................................................................... 34
Figures
Type 1 Tag Operation Specification Page iii
Figures
Figure 1: Static Memory Map of the base NFC Forum Type 1 Tag. .............................................. 7
Figure 2: Lock Control/Status Bytes ............................................................................................... 8
Figure 3: Example Dynamic Memory Map of NFC Forum Type 1 Tag......................................... 9
Figure 4: Length Field Formats ..................................................................................................... 11
Figure 5: RALL Command/Response Diagram ............................................................................ 22
Figure 6: READ Command/Response Diagram ............................................................................ 22
Figure 7: WRITE-E Command/Response Diagram ...................................................................... 24
Figure 8: WRITE-NE Command/Response Diagram ................................................................... 25
Figure 9: Location Of NDEF Message .......................................................................................... 31
Figure 10: Memory Map of Example Smartposter NDEF Message ............................................. 37
Figure 11: Example Dynamic Memory Map ................................................................................. 39
Tables
Table 1: Defined TLV blocks ........................................................................................................ 11
Table 2: Command-Response Byte Count (Static Memory Model) ............................................. 17
Table 3: Command-Response Summary (Static Memory Model) ................................................ 17
Table 4: Command-Response Byte Count (Dynamic Memory Model) ........................................ 18
Table 5: Command-Response Summary (Dynamic Memory Model) ........................................... 18
Table 6: List of Commands (Static Memory Model) .................................................................... 18
Table 7: List of Additional Commands (Dynamic Memory Model) ............................................. 19
Table 8: Format of Address Operand ADD (Static Memory Structure) ....................................... 19
Table 9: Format of Address Operand ADDS (Dynamic Memory Model) .................................... 19
Table 10: Format of Address Operand ADD8 (Dynamic Memory Model) .................................. 20
Table 11: Timing Definitions ........................................................................................................ 21
Table 12: FDT Timing Calculations .............................................................................................. 21
Table 13: Example Coding of the CC Bytes of Block 1 ............................................................... 29
Table 14: Rules for Handling of the Version Number .................................................................. 30
Table 15: Example Smartposter NDEF Message .......................................................................... 36
Table 16: Revision History ............................................................................................................ 41
剩余45页未读,继续阅读
资源评论
- stsw20062015-12-19终于找到了,很需要。谢谢楼主
baidu_25662857
- 粉丝: 0
- 资源: 2
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
最新资源
- 奥迪A8D4仪表开机报文
- apache-skywalking-java-agent 8.8.0-9.2.0,一共12个版本
- DTS7001-VB一款SOT23封装P-Channel场效应MOS管
- ZTE-C300 OLT常用命令
- 6666666666666666
- DTS6410-VB一款SOT23封装N-Channel场效应MOS管
- SpyGlass-PowerVerifyMethodology-GuideWare2.0-UserGuide
- DTS6401-VB一款P-Channel沟道SOT23的MOSFET晶体管参数介绍与应用说明
- 基于树莓派、OpenCV及Python语言的人脸识别-i
- 游戏开发 UE蓝图 分支(Branch)节点和源码.pdf
资源上传下载、课程学习等过程中有任何疑问或建议,欢迎提出宝贵意见哦~我们会及时处理!
点击此处反馈
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功