![]() NFC near field communication device and system.
专利摘要:
The present invention relates to an NFC communication system, a method of establishing communication between a wireless communication device and an NFC device and a respective NFC device. The NFC device comprises: an NFC control unit (12), an NFC transceiver (14) coupled to the NFC control unit (12), a first flag (20) coupled to the NFC control unit (12 ), the first flag (20) being able to be switched between an activated state and a deactivated state, a second flag (22) coupled to the NFC control unit (12), the second flag (22) being able to be switched between a state activated and a deactivated state, in which the NFC control unit (12) is configured to perform a logic operation which can be divided into a sequence of at least a first subtask and a second subtask and in which the the NFC control unit (12) is configured to determine the status of the first flag (20) and the second flag (22) and wherein the NFC control unit (12) is further configured to selectively perform at least the one of the first subtask and the second subtask based on u status of at least one of the first flag (20) and the second flag (22). 公开号:CH715284A2 申请号:CH01317/18 申请日:2018-10-29 公开日:2020-02-28 发明作者:J Springer James;Fabrice Walter;Muller Pierre;Bourquin Fabien 申请人:Em Microelectronic Marin Sa; IPC主号:
专利说明:
Description Technical Field This disclosure relates to the field of near field communication (NFC) devices and systems as well as a method of establishing communication between a wireless communication device and an N FC device. Background [0002] Mobile communication systems continue to gain popularity and are now an integral part of both personal and professional communications. Various mobile devices now incorporate multifunctional mobiles, tablets, connected watches, personal digital assistant (PDA) features such as calendars, address books, task lists, calculators, memo programs and writing, media players, games, etc. These multifunction devices usually send and receive wireless electronic mail (e-mail) messages, as well as access the Internet via a cellular network and / or a wireless local area network (WLAN), for example. Some mobile devices incorporate contactless card technology and / or near field communication (NFC) chips. NFC technology is commonly used for short-range, contactless communications based on radio frequency identification (RFID) standards, using magnetic field induction to enable communication between electronic devices, including mobile wireless communication devices . This short-range high-frequency wireless communication technology exchanges data between devices over a short distance, such as just a few inches. The use of mobile devices to interact with an NFC device, in particular with passive power NFC tags is now ubiquitous in society. There are different ways for a mobile communication device to interact with tags, but the preferred way is to avoid using a dedicated app to interact with the NFC tag. The primary purpose of the tag is to provide an NFC data exchange format (NDEF) message that directs the wireless communications device to use its web browser and go to a uniform resource locator (URL). specified by the NDEF message. The use of the above concept is now being developed to carry out web authentication of the label or of an object attached to the label. This type of authentication requires the use of a dynamic NDEF message using a value that is known to change predictably. For example, this could be the use of a counter which is known to increase each time the NDEF message is sent to the wireless communication device, which could be a mobile device. Consequently, there is a need to independently update the value of the counter in a persistent memory (called non-volatile memory). The counter value should be updated after the label is turned on and before the initial label communication with the wireless communication device. Currently, NFC Forum Type 5 tags use the protocol of ISO / IEC 15693 standard and cannot support web authentication while NFC Forum type 2 tags use the protocol of ISO / IEC 14443 standard and can support web authentication. The difference is that the two protocols have different timing requirements for the minimum field in the time before the mobile device can initiate communication with a tag. This is the only time period during which a label can independently update its value in non-volatile memory and prepare the dynamic NDEF message. The power-on time allowed for the ISO / IEC 15693 protocol is too short to update a value in the most commonly used type of non-volatile memory. It is therefore desirable to propose an improved near-field communication device, an improved NFC communication system and a method of establishing communication between a wireless communication device and an NFC device which overcomes the shortcomings of the prior art. It is particularly interesting to propose an NFC device operating on the basis of the NFC forum type 5 label, which is configured to communicate with a wireless communication device on the basis of this communication protocol and which at the same time is authorized. to support web authentication. Summary In one aspect, a near field communication device (NFC) is proposed. The NFC device includes an NFC control unit and an NFC transceiver coupled to the NFC control unit. The NFC device further includes a first flag coupled to the NFC control unit. The first flag can be switched between an activated state and a deactivated state. The NFC device further includes a second flag coupled to the NFC control unit. The second flag can also be switched between an activated state and a deactivated state. The NFC control unit is further configured to perform a logical operation. The logic operation can be divided into a sequence of at least a first subtask and a second subtask. The second subtask must be completed after the completion of the first subtask. Until then, the logic operation can be divided into a time sequence of many subtasks that must be performed in a time sequence, that is, one after the other. CH 715 284 A2 [0008] The NFC control unit is further configured to determine the status of the first flag and to determine the status of the second flag. In addition, the NFC control unit is configured to selectively perform at least one of the first subtask and the second subtask based on the status of at least one of the first flag and the second. flag. The status of the at least first and second flags fixes which of the first and second sub-tasks must be performed at a given time. In this way, the NFC device, which can be implemented as a passive NFC device, becomes authorized to divide a logical operation into numerous sub-tasks, each of which requires less time to complete than the operation. global logic. After at least one of the sub-tasks has been carried out, a respective flag which is indicative of the completion of this particular sub-task is activated, defined or affirmed. In the event that the NFC device has its power supply cut off before the overall logical operation has been carried out, the numerous labels will be indicative, when the NFC device is subsequently powered up, of that of the subtasks which has been performed and at what stage, from which subsequent subtasks the NFC control unit should resume carrying out the logical operation when the NFC device is again powered up. In this way, the NFC control unit becomes less prone to unpredictable interruptions in power supply. In addition, if the execution of a global logical operation requires too long a completion time for a given communication protocol of a wireless communication device, the logical operation can be split into the sequence of at least a first and a second or even more subtasks which must be carried out one after the other. [0011] Consequently, the NFC device is configured to establish wireless communication with a wireless communication device on the basis of a first communication protocol, which first communication protocol defines a first waiting time and which first wait time is shorter than the overall time required by the NFC device to perform the overall logic operation. The NFC device can now be configured to split the logical operation into numerous subtasks, in which at least one or more subtasks are performed during the waiting time for an invitation to send request. The NFC device may not be able to respond adequately to a request to send request, but the NFC device may be configured to respond adequately to a subsequent request to send request from the wireless communication device. In one example, the NFC is configured to communicate with the wireless communication device on the basis of a first communication protocol and is further configured to perform the logical operation in response to a second invitation request. to be transmitted from the wireless communication device, in which the second request to send an invitation to transmit is based on a second communication protocol which is different from the first communication protocol and in which the second communication protocol comprises or defines a second delay d which is longer than the first waiting time. In addition and according to another example, the second waiting time is longer than the time required for the NFC control unit to perform the logical operation. According to an example, the NFC control unit is configured to perform the first subtask when the first flag is deactivated or when the first flag is deactivated. In particular, the NFC control unit is configured to perform the first subtask only when the first flag is disabled. If the first flag is activated or affirmed, then the NFC control unit sees the completion of the first subtask prevented. In this case, the NFC control unit can be configured to skip the first subtask and continue directly with a subsequent subtask, for example with the second subtask. In this way and when the first flag is activated, the NFC control unit does not perform the first subtask. We can save computing time and therefore the total time to perform the overall logical operation. This is particularly useful when the execution of the logic operation is prematurely interrupted, for example due to a loss of power. In another example, the NFC control unit is configured to perform the second subtask when the first flag is activated. In particular, the NFC control unit is configured to perform the second subtask only when the first flag is activated. In this way and as long as the first flag is deactivated, the NFC control unit is configured to perform the first subtask. As long as the first flag is activated, the NFC control unit sees the completion of the first sub-task hampered but is however configured to carry out the second sub-task. Depending on the status of the first flag, the control unit performs either the first subtask or the second subtask. In this way and during a first phase of temporary powering up of the NFC device, the NFC control unit can be configured to perform and complete the first subtask and set the first flag in the activated state. During a second power-up, therefore subsequent, the execution of the logic operation is resumed with the second subtask while the first subtask is skipped. In a further example, the NFC control unit is configured to switch the first flag from the deactivated state to the activated state after or upon completion of the first subtask. In this way, the flag identifies the intermediate status of carrying out the overall logical operation. If, for example, power should be lost after the first subtask has been completed and the NFC device is powered up again within a predefined time interval, the NFC control unit is configured to determine the status at least prime CH 715 284 A2 and second flags and to start or continue with a subtask which is identified or defined by the status of the at least first and second flags. In a further example, the NFC control unit is configured to switch the second flag from the deactivated state to the activated state after completion of the second subtask. Here, the second subtask can be a final subtask of the overall logical operation. If the second flag is activated, the NFC control unit can continue with an additional operation, such as exchanging data with the wireless communication device. Naturally, the NFC control unit and the logic operation are not limited to splitting into only a first and a second subtask and to respectively activating only a first and a second flag. Generally, the NFC device and the respective method of performing the logic operation can be divided into a number of subtasks, for example 1,2, 3 ..., n subtasks, n being a whole number. Depending on the number of subtasks into which the overall logical operation can be divided, the NFC device comprises a respective number of 1,2, 3 ..... n flags. In another example, the NFC control unit is configured to switch the first flag from the activated state to the deactivated state after completion of the second subtask. After completion of the second subtask, the overall logic operation can be completed and the NFC control unit can perform an additional task, for example communication with the wireless communication device. The switching of the first flag from the activated state to the deactivated state after completion of the second subtask represents a return of the NFC control unit to an initial configuration, for example a standby configuration, and prepares the unit NFC control module for a subsequent send-to-send scheme with a wireless communication device. Typically, the second flag is switched or set from the activated state to the deactivated state after communication between the NFC device and the wireless communication device has ended and when the NFC control unit is therefore defined in a state, in which it is ready to react or to respond to a request for an invitation to transmit from another or from the same wireless communication device to establish another wireless communication between this communication device without wire and the NFC device. In a further example, the NFC control unit is configured to switch the second flag from the deactivated state to the activated state in response to a switching of the first flag from the activated state to the deactivated state. Therefore, while the logic operation is being performed and while the NFC control unit is performing many subtasks one after the other, the respective flags assigned to these subtasks are switched simultaneously. Indeed, the configuration of activated and deactivated flags always represents a particular sub-task of the number of sub-tasks of the logical operation which is in progress or which should be carried out when the NFC device is powered up. In another example, at least one of the first and second flags is implemented as a so-called persistent flag configured to maintain the activated state for at least a predetermined persistent flag time. The flags can be implemented as rather persistent memory units which are of the volatile type but ensure maintenance of the activated state for at least a predetermined persistent flag time. For example, a flag may include at least one capacitor or may be physically implemented as a capacitor configured to keep the state activated for at least a few hundred milliseconds or seconds. Typically, the persistent flag time is longer than a polling interval from the wireless communication device configured to communicate with the NFC device. Typically, the persistent flag time is longer than twice, longer than five times or even longer than ten times the call-to-send interval of the wireless communication device. In a further example, the NFC device also includes a non-volatile memory comprising at least one memory block. Typically, the first subtask comprises at least one erasure of the at least one memory block. The second subtask includes at least one write of the at least one memory block. Erasing and writing at least one memory block is done one after the other. The writing of at least one memory block can only be carried out after the respective memory block has been erased during the execution of the first subtask. In a further example, the NFC control unit is configured to communicate with a wireless communication device based on a first communication protocol. Typically, the first communication protocol defines a first waiting time. The wait time specifies how long the wireless communication device accepts responses after a request to send request sent to the NFC device and therefore to the control unit. The wireless communication device is further configured to communicate with near field communication devices based on the first communication protocol and on the basis of a second communication protocol defining a second timeout. The first and second waiting times are different. Typically, the second waiting time is longer than the first waiting time. Until then, the second timeout for the second communication protocol used by the wireless communication device is longer than the first timeout for the first communication protocol. Typically, the wireless communication device is configured to alternately route request-to-send requests to NFC devices, wherein request-to-send requests based on the first communication protocol and request-to-send requests CH 715 284 A2 transmit based on the second communication protocol alternate. In a typical example, the wireless communication device is configured to conduct a request to send request based on the first communication protocol followed by a request to send request based on the second communication protocol. After that, the wireless communication device is configured to conduct an invitation to send request which is again based on the first communication protocol and so on. In a further example, the NFC control unit of the NFC device is configured to establish data communication with the wireless communication device which is based on the first communication protocol. However, the logical operation, which may for example be required to establish and / or initialize a communication link between the NFC device and the wireless communication device, can be triggered by a request to send the transmission device wireless communication based on the second communication protocol. For example, the second timeout for the second communication protocol may be long enough to give the NFC control unit enough time to perform the logic operation and / or to perform the at least first and second sub- tasks. If the logic operation should be interrupted after completion of the first subtask, for example during a power loss, the first flag has been activated. When resuming the logic operation, for example during a subsequent request to send request, the logic operation is resumed directly by conducting the at least one second subtask. In a further example, the first waiting time is shorter than the total operating time required by the NFC control unit to perform the logic operation. Therefore, during a first request to send request based on the first communication protocol and based on the first timeout, the time provided by the first communication protocol is too short for the NFC control unit. performs and completes the logical operation. The NFC control unit can begin to perform the logic operation and is at least able to perform and complete the first subtask and activate the first flag. With a subsequent request to send request which is based on one of the first and second communication protocols, the NFC control unit directly resumes the logic operation by skipping the first sub-task and directly performing the second sub -task. During this subsequent request to send request, the overall logical operation may be completed or, if the time allocated by the second request to send request is still too small to complete the overall logical operation, the logical operation may be completed during a third or fourth subsequent invitation to issue request. The division of the logical operation into numerous sub-tasks ensures a rather flexible and practical approach for conducting and carrying out the logical operation during a series of sequential sub-tasks, each of which can be triggered by a request for invitation to send based on at least one of the first and second communication protocols of the wireless communication device. In a further example, the NFC control unit is configured to determine whether the wireless communication device invites near-field communication devices to transmit, which devices are configured to communicate on the basis of the first communication protocol or on the basis of the second communication protocol. Here, the NFC control unit is further configured to perform the logic operation only when the NFC control unit has determined that the wireless communication device invites near-field communication devices to transmit, which devices are configured to communicate on the basis of the second communication protocol. Although the NFC device is configured to communicate with the wireless communication device on the basis of the first communication protocol, only the execution of the logical operation can be exclusively triggered by a request to send request based on the second protocol. communication, wherein the second timeout of the second communication protocol is longer than the first timeout of the first communication protocol. In this way, we ensure that the time allocated by the second waiting time is long enough to perform the logical operation and complete the logical operation. In other examples, the time provided or defined by the second wait time may be shorter than the total time required for the NFC control unit to perform the overall logical operation. In this case, the logical operation, in particular its numerous subtasks, are performed and executed by or during subsequent request to send requests from the wireless communication device, in which subsequent request to send requests are based on one of the first communication protocol and the second communication protocol. In this way, the CCP control unit can also execute rather complicated and time-consuming logic operations even if the time allocated by one of the first or second communication protocols had to be shorter than the time required to drive the global logical operation. In a further aspect, the disclosure also relates to a near field communication system. The system includes at least one NFC device as described above. The NFC system further includes a wireless communication device which is configured to communicate with the at least one near field communication device based on a first communication protocol. Typically, the wireless communication device is or includes a mobile electronic device. The wireless communication device may include one of a multifunction mobile, a connected watch, a tablet, or some other kind of portable electronic device. CH 715 284 A2 Typically, the wireless communication device is further configured to communicate with the Internet and establish a communication link between the NFC device and the Internet. In a further example, the wireless communication device is not only configured to communicate with the NFC device on the basis of a first communication protocol. The wireless communication device is also configured to communicate with NFC devices based on at least a second communication protocol. The first or second communication protocols are characterized by first and second invitation to send requests, each of which is characterized by a first and a second waiting time, respectively. Typically, the second timeout for the second request to send request based on the second communication protocol is longer than a first timeout for a first request to send request for a first protocol Communication. The near field communication device is configured to communicate and interact with the NFC device as described above. All functionality, benefits and effects as described above in connection with the NFC device apply equally to the wireless communication device and the NFC system; and vice versa. In another aspect, the disclosure further relates to a method of establishing communication between a wireless communication device and a near field communication device. Typically, the method relates to the establishment of a communication link between a wireless communication device as described above and a near-field communication device as described above. Typically, the NFC device comprises an NFC control unit, an NFC transceiver coupled to the NFC control unit and a first flag coupled to the NFC control unit. The first flag can be switched between an activated state and a deactivated state. The NFC device further includes a second flag coupled to the NFC control unit. The second flag can be switched between an activated state and a deactivated state. Optionally, the NFC device comprises at least one or many other flags, for example a third, a fourth or even up to n flags, each of which is coupled to the NFC control unit and each can be switched between an activated state and a disabled state. The method includes the step of transmitting a request to send an invitation from the wireless communication device to the NFC device. The method further comprises the step of performing a logical operation by the NFC control unit by and through the division of the logical operation into a sequence of at least a first sub-task and a second sub- task. Optionally, the logical operation is carried out and carried out by the NFC control unit by dividing the logical operation into numerous sub-tasks, for example a first, a second, a third ..... n ' th sub- task. The method further comprises the step of determining the status of the first flag and the status of the second flag. Optionally, and if there are many additional flags available, the method also determines the status of such additional flags. After that and having determined the status of the flags, the method continues to selectively carry out at least one of the first subtask and of the second subtask on the basis of the status of at least one of the first flag and second flag. In cases where many additional flags, for example a third, a fourth or even up to n flags are present, at least one of the associated sub-tasks is selected for execution and is selectively performed according to the status of the numerous flags. Typically, there is only one subtask performed at a time. The state of the numerous flags is indicative of only one of the subtasks of the many subtasks to be carried out selectively by the method. Typically, each of the many flags is mapped or associated with only one of the many subtasks. The state of the flags is therefore indicative of a sub-task to be carried out during the execution or the execution of the logical operation. In another example, the method comprises the step of switching the first flag from the deactivated state to the activated state after completion of the first subtask and / or after switching the second flag from the deactivated state in the activated state after completion of the second subtask. In a typical application scenario, the second subtask is recommenced from the activated state to the deactivated state after a communication link between the wireless communication device and the near field communication device has been established. and / or after the communication between the wireless communication device and the NFC device has ended. Here, the second subtask represents the last subtask in the sequence of subtasks of the logical operation. If the logical operation is split into a number of n sub-tasks, the nth flag is configured to be switched from the deactivated state to the activated state after completion of the nth sub-task. After that and as a final step, the communication link between the wireless communication device and the NFC device is established. After termination of the communication between the wireless communication device and the NFC device, the last and therefore nth flag can be switched to the deactivated state. It should also be noted that the method of establishing communication between the wireless communication device and the near-field communication device is in particular dedicated to establishing a communication link. CH 715 284 A2 cation between the NFC device as described above and the wireless communication device as described above. Until then, all of the functionalities, effects and benefits described above in relation to the NFC device and the wireless communication device apply equally to the method of establishing communication between the wireless communication device and the NFC device; and vice versa. Brief Description of the Drawings In the following, examples of the NFC device, the NFC system and methods of establishing communication between the NFC device and the wireless communication device are described in more detail with reference to the drawings. wherein: fig. 1 schematically shows an NFC system comprising at least one NFC device and a wireless communication device, FIG. 2 illustrates a time sequence of orders and requests as well as states of flags during subsequent invitation to send requests transmitted by the wireless communication device, FIG. 3 is representative of a flowchart showing the division and the splitting of a logical operation into a sequence of numerous subtasks, FIG. 4 is illustrative of an additional flow diagram, in which a rather complex logical operation is broken down into a certain number of subtasks, and FIG. 5 illustrates an additional flow diagram of the method of establishing communication between the wireless communication device and the NFC device, in which the logic operation is divided into a first and a second subtask and in which a first and a second flag are used. Detailed description In FIG. 1, a near field communication system 110 is illustrated diagrammatically. The NFC system 110 comprises at least one NFC device 10 and at least one wireless communication device 100. The wireless communication device 100 can comprise a mobile electronic device, such as a multifunction mobile, a connected watch, a tablet, or some other type of portable electronic device. The wireless communication device 100 may further comprise a personal computer or a stationary computer device providing a connection to the Internet, in particular a web server 102. The NFC device 10 can include a passive NFC label. The NFC device comprises at least one NFC control unit 12, an NFC transceiver 14 connected to the NFC control unit 12. By means of the NFC transceiver 14, the NFC device is authorized to establish a communication link. communication with the wireless communication device 100. By means of the NFC transceiver 14, the NFC device 10 is authorized to communicate with the wireless communication device 100. The NFC device 10 further comprises a non-volatile memory 16 with at least one memory block 18. The NFC device 10 further comprises at least a first flag 20 and at least a second flag 22. The NFC control unit 12 is configured to enable and disable any of the at least two flags 20,22. Heretofore, the NFC control unit 12 is configured to set or reset any of the flags 20, 22. The NFC control unit 12 is further configured to read a value at least temporarily stored in each of the first and second flags 20, 22, respectively. The NFC control unit 12 is further configured to read at least one memory block 18 from the non-volatile memory 16. The NFC control unit 12 is further configured to write and / or erase the block memory 18 and therefore at least a portion or of the entire non-volatile memory 16. In FIG. 2, the states of many components of the wireless communication device 100 and the NFC device 10 are illustrated. In a first line 300, the state of the wireless communication device is illustrated over time. In a second line 302, the electrical power received by the NFC device from the wireless communication device 100 is illustrated. In additional line 304, the internal states of the NFC device are illustrated. In the additional line 306, the state of the first flag 20 is illustrated over time and in line 308, the state of the second flag 22 is illustrated over time. At a time t0, the NFC device 10 is arranged in close proximity to the wireless communication device 100 and the wireless communication device 100 transmits an invitation to send request. As a result, the wireless communication device acting as an NFC reader supplies electromagnetic energy. The electromagnetic energy is transmitted to the NFC device 10 and leads to powering up and to carrying out a start-up procedure 314 of the NFC device 10. After that and at a time t1, the NFC control unit 12 starts to complete a first subtask 201. CH 715 284 A2 The sub-task 201 includes or includes, for example, the erasure of a memory block 18 of the non-volatile memory 16. After that and at a time t2, the first flag 20 is activated. Simultaneously and at time t2, a second subtask 202 is started. At a later time t2, this second subtask 202, for example including the incrementation of a counter and the writing of the memory block 18 of the non-volatile memory 16, has been completed. Consequently, the first flag 20 is deactivated and is set to zero. Simultaneously, the second flag is activated and is therefore set to a logical 1. After that, and at a time t3, a third subtask 203 is initiated and started. But before this third subtask has been completed, the wireless communication device 100 transmits an additional order 310, for example an inventory order according to which the NFC control unit 12 is temporarily set in a reset state. It is therefore deactivated until time t4. In the time interval between t3 and t4, the NFC 12 remote control unit is simply switched off. As illustrated, the first and second flags 20, 22 are of the persistent type and maintain their condition. At a time t5, the NFC device 10 and therefore the NFC control unit 12 are restarted and at a time t6, the logic operation which started before a time T1 is resumed directly with a repetition of the third sub task 203. At time t7, the third subtask 203 is completed. The NFC control unit 12 and therefore the entire NFC device 10 are now ready to receive an additional inventory order 320 from the wireless communication device 300. The reception of the inventory order 320 is illustrated. as item 324 in fig. 2. In response to receipt of the inventory order 324, the NFC control unit 12 is configured to send and return a message 334, for example an NDEF message to the wireless communication device 100. The communication device wireless can request such a message in step 340. Upon receiving the message 334, the wireless communication device 100 transmits the respective message to the web server 102 in a step 350. After that and after having transmitted the message 334 at the wireless communication device 100, the second flag 22 is deactivated at time t8 and the NFC device 10 as well as its NFC control unit 12 return to and remain in a standby state 344. In this way, the diagram as illustrated in FIGS. 1 and 2 provides the use of one or more power-up time periods to autonomously update one or more mirror values in a non-volatile memory 16 before the NFC device 10 is authorized to communicate with the device wireless communication 100, for example for the purpose of web authentication. Here, the wireless communication device 100 can use an invitation to send scheme to search for NFC devices 10 of various types of NFC technology. The NFC device 10 supports NFC technology, in particular a communication protocol of a first type for sending a message in dynamic near field data exchange format (NDEF) which directs the wireless communication device 100 for that he uses his web browser and goes to a URL specified by the NDEF message. The concept described is extended to perform web authentication of the NFC device or of an object attached to the NFC device. This type of authentication requires the use of a dynamic NDEF message using a value that is known to change in any predictable way. For example, this could be the use of a number of sequences which is known to increase each time the NDEF message is sent to the wireless communication device. Here, the sequence value should be updated after powering up the NFC device and before establishing a communication link between the NFC device 10 and the wireless communication device 100. Dividing a rather complex logical operation into numerous sub-tasks allows the use of one or more power-up sequences to carry out each of the different sub-tasks autonomously. During these one or more power-up sequences and until the overall logic operation has been completed, the NFC device 10 is typically prevented from communicating with the wireless communication device 100. The completion of each sub- task is validated by the use of one or more flags 20, 22. Typically, the flags 20, 22 are configured as persistent flags to maintain the operating state during a time during which the NFC device is not powered. The many power-up sequences required to perform the many subtasks can be of the same type of NFC technology or of different types of NFC technology, such as different communication protocols. In the case of web authentication, the steps and sub-tasks to be carried out include updating one or more mirror values in the non-volatile memory 16, then carrying out a cryptographic operation before the NFC device 10 is authorized to communicate with the wireless communication device 100. Each memory update can also be broken down into operations for erasing non-volatile memory and writing non-volatile memory. The status of the standalone update is checked by the use of the non-volatile memory read margin test and one or more of the flags 20, 22. The wireless communication device 100 can use an invitation to send scheme to search for NFC devices 10 of different types of NFC technology. It is assumed that an NFC device supports a first NFC communication protocol, for example the type 5 protocol of ISO / IEC 15693 to send a dynamic NDEF message to the wireless communication device 100 and the protocol used by this technology. Particular NFC does not provide enough time for the stand-alone non-volatile memory write operation. It is further assumed that the wireless communication device 100 uses a transmission invitation scheme which searches for NFC devices 10 of the first NFC technology in addition to NFC devices supporting the NFC technology of a second type, for example supporting the NFC forum type 2 communication protocol using the communication protocol CH 715 284 A2 of ISO / IEC 1443 standard. This second type or this second protocol actually provides enough time for an independent non-volatile memory write operation. Now, the NFC device 10, in particular its NFC control unit 12, is configured to operate the field when the wireless communication device 100 invites NFC devices to transmit, which NFC devices are configured to communicate on the basis of the second type of NFC protocol for carrying out the autonomous update of a value in nonvolatile memory for an NFC device 10 configured to operate on the basis of the first NFC protocol. The NFC device 10 based on the first NFC communication protocol will not communicate with the wireless communication device 100 until the standalone update has been completed. As further illustrated in FIG. 3, the complex logical operation 200 for carrying out the autonomous update is broken down into numerous sub-tasks 201, 202, 203. Here, the sub-task 203 represents a n th sub-task of a sequence of 1 ... .. n subtasks, n being an integer, the global logical operation 200 having been divided. Typically, each of the subtasks 201, 202, 203 has a long-lasting effect on the non-volatile memory 16. After each subtask 201, 202, 203, a flag status of a flag is mapped to or assigned to each of the tasks to code and / or indicate the current operating status. Here, in step 211 and after completion of step 201, a first flag 20 is activated. Activation of the first flag 20 in step 211 indicates that the first subtask 201 has been completed. In the event that this power is lost before the next step 220 has been executed, the diagram would start again from step 206. After that, the NFC device 10 and the NFC control unit 12 are initialized in step 208. In the subsequent step 210, the status of the first flag 20 is determined. If flag 20 has been previously set, the process continues directly to step 220. As a result, the first subtask 201 is skipped. The process and the NFC control unit 12 continue directly with the second subtask 202. After that and in step 212, the second flag 22 is activated and the process will continue with step 230. It is checked there if a nth flag has been activated. If the respective flag has not yet been activated, this is an indication that the n th respective sub-task 203 has yet to be carried out. In the subsequent step 203, the nth sub-task is executed and the nth respective flag 230 is activated. In a final step 240, the logic operation 200 is finalized and completed and after that, in step 250, the normal operation of the NFC devices 10, for example communication and transmission of an NDEF message to the wireless communication device 100 is driven. After that, although not shown, all flags 20, 22 can be reset. If for example, the power supply had to be lost between steps 213 and 240, the nth flag was defined adequately. Upon repeated power-up in step 206, the process continues with initialization in step 208. After that, in step 210, the first flag activated is determined. The method then continues with step 220 verifying the state of the second flag. Since the second flag is still active, the method will continue with step 230. By determining that the nth flag is also activated or affirmed, the method will continue directly with step 240. Therefore , the operations and steps 203 , 213 will be skipped. [0067] FIG. 4 describes a particular implementation of the principle described before in connection with FIG. 3 using only one flag implementation for web authentication. In a first step 400, the NFC device 10 is powered up. In the subsequent step 402, the NFC device 10 and the NFC control unit 12 are initialized. After that, it is checked in step 404 if the first flag 20 has been activated before. If the flag has been activated, the method proceeds directly to step 410 in which a cryptographic calculation is carried out. After completion of step 410 and when the complex logic operation 200 has been completed, the method can continue with normal operation of the NFC device 10 in step 412. If in step 404, the first flag 20 has not yet been activated, the method continues with step 406 as the first subtask. In step 406 and as the first subtask, a non-volatile memory, for example a memory block 18 of the non-volatile memory 16 is erased and a sequence counter is updated in the memory. After that and in order to indicate that this first step or this first sub-task has been effectively carried out and completed, the first flag is activated in step 408. Finally, in FIG. 5, a particular implementation of the principle described above is described by the use of two flags 20, 22 for web authentication and the use of two different types of NFC technologies or NFC communication protocols. When the NFC device becomes supplied with power due to the field from the wireless communication device 100, it must detect during a power-up whether the wireless communication device 100 invites NFC devices to transmit, which NFC devices operate on the based on a first communication protocol or operate on the basis of a second communication protocol. If the wireless communication device 100 invites NFC devices to transmit, which NFC devices operate on the basis of the second NFC communication protocol, then the NFC device 10 will start the autonomous updating of the value in its non-volatile memory 16. After powering up 500 in a procedural step 502, it is checked whether the second flag 22 has been activated before. If the second flag 22 has not been activated before, the process continues with step 504. In step 504, it is checked whether the first flag 20 has been activated before. If the first flag 20 is in the deactivated state, the CH 715 284 A2 process continues with step 506. At this step, the non-volatile memory is read with a margin to be filled if it has been completely erased. If it is determined in subsequent step 508 that the non-volatile memory has not been completely erased, then the first flag 20 is activated in step 512. In the other case and if step 508 reveals that the non-volatile memory has not been completely erased, then in the intermediate step 510, the non-volatile memory is erased. After completion of the erasing operation, the process continues with step 512. After that and in step 514, the next value is written to non-volatile memory. In step 516, the first flag 20 is deactivated and the second flag 22 is activated. Finally and in step 518, the NFC device 10 and therefore the NFC control unit 12 continue with normal operation. For example, the NDEF message is transmitted to the wireless communication device 100. In an additional step 520, the second flag 22 is deactivated. Assuming that the supply of power to the NFC device 10 is interrupted during the subsequent completion of steps 500 to 520, the procedure starts again and always with the power on in step 500. If in step 502, it is determined that the second flag 22 is activated, the method continues directly with the normal operation of the NFC device in step 518. In the other case and if the write operation in the memory has not been completed and therefore if the second flag has not yet been activated in step 516, the method continues from step 502 with step 504. If in step 504, it is determined that the first flag 20 has been activated in an earlier step 512, the method continues with step 524. The non-volatile memory is read there. with a margin to see if it was completely written with the new value. In the next step 526, it is checked whether the non-volatile memory has been completely written. If so, the method continues with step 528. The first flag 20 is deactivated there and the second flag 22 is simultaneously activated there before the method continues with step 518 with normal operation. If it is determined in step 526 that the non-volatile memory has not been completely written, then the process continues with step 514. List of numerical references NFC device NFC control unit NFC interface NFC non-volatile memory memory block flag flag 100 wireless communication device 102 web server 110 near field communication system
权利要求:
Claims (15) [1] Claims 1. Near field communication device (NFC) comprising: - an NFC control unit (12), - an NFC transceiver (14) coupled to the NFC control unit (12), - a first flag (20) coupled to the NFC control unit (12), the first flag (20) being able to be switched between an activated state and a deactivated state, - a second flag (22) coupled to the NFC control unit (12), the second flag (22) being able to be switched between an activated state and a deactivated state, - wherein the NFC control unit (12) is configured to perform a logic operation (200) which can be divided into a sequence of at least a first sub-task (201) and a second sub-task (202) and wherein the NFC control unit (12) is configured to determine the status of the first flag (20) and the second flag (22) and wherein the NFC control unit (12) is further configured to selectively perform at least one of the first subtask (201) and the second subtask (202) based on the status of at least one of the first flag (20) and the second flag (22). [2] 2. NFC device according to claim 1, in which the NFC control unit (12) is configured to perform the first subtask (201) when the first flag (20) is deactivated. CH 715 284 A2 [3] 3. NFC device according to claim 1 or 2, wherein the NFC control unit (12) is configured to perform the second subtask (202) when the first flag (20) is activated. [4] 4. NFC device according to any one of the preceding claims, in which the NFC control unit (12) is configured to switch the first flag (20) from the deactivated state to the activated state after completion of the first sub - task (201). [5] 5. NFC device according to any one of the preceding claims, in which the NFC control unit (12) is configured to switch the second flag (22) from the deactivated state to the activated state after completion of the second sub - task (202). [6] 6. NFC device according to any one of the preceding claims, in which the NFC control unit (12) is configured to switch the first flag (20) from the activated state to the deactivated state after completion of the second sub - task (202). [7] 7. NFC device according to any one of the preceding claims, in which the NFC control unit (12) is configured to switch the second flag (22) from the deactivated state to the activated state in response to a switching of the first flag (20) of the activated state to the deactivated state. [8] 8. NFC device according to any one of the preceding claims, in which at least one of the first and second flags (20, 22) is implemented as a persistent flag configured to maintain the activated state for at least one predetermined flag persistent time. [9] 9. NFC device according to any one of the preceding claims, further comprising a non-volatile memory (16) comprising at least one memory block (18) and in which the first subtask (201) comprises erasing Tau at least a memory block (18) and in which the second subtask (202) comprises the writing of the at least one memory block (18). [10] 10. NFC device according to any one of the preceding claims, in which the N FC control unit (12) is configured to communicate with a wireless communication device (100) on the basis of a first communication protocol defining a first timeout, wherein the wireless communication device (100) is configured to communicate with NFC devices based on the first communication protocol and on the basis of a second communication protocol defining a second timeout d wait, in which the second wait time is longer than the first wait time. [11] 11. NFC device according to claim 10, in which the first waiting time is shorter than a total operating time required by the NFC control unit (12) to carry out the logical operation (200). [12] The NFC device according to claim 10 or 11, wherein the NFC control unit (12) is configured to determine whether the wireless communication device (100) prompts NFC devices to transmit, which NFC devices are configured to communicate on the basis of the first communication protocol or on the basis of the second communication protocol and in which the NFC control unit (12) is configured to perform the logic operation (200) only when the NFC control unit (12 ) has determined that the wireless communication device (100) invites near-field communication devices to transmit, which devices are configured to communicate based on the second communication protocol. [13] 13. Near Field Communication (NFC) system including: at least one NFC device (10) according to any one of the preceding claims, and - a wireless communication device (100) configured to communicate with the at least one NFC device on the basis of a first communication protocol. [14] 14. A method of establishing communication between a wireless communication device (100) and an NFC device (10), wherein the NFC device comprises an NFC control unit (12), an NFC transceiver (14 ) coupled to the NFC control unit (12), a first flag (20) coupled to the NFC control unit (12), the first flag (20) being able to be switched between an activated state and a deactivated state, a second flag (22) coupled to the NFC control unit (12), the second flag (22) being able to be switched between an activated state and a deactivated state, comprising the steps of: - transmission of an invitation to send request from the wireless communication device (100) to the NFC device (10), - execution of a logical operation by the NFC control unit (12) by dividing the logical operation (200) into a sequence of at least a first sub-task (201) and a second sub-task (202) , - determination of the status of the first flag (20) and the status of the second flag (22), - selective realization of at least one of the first sub-task (201) and of the second sub-task (202) on the basis of the status of at least one of the first flag (20) and of the second flag (22). [15] 15. The method of claim 14, further comprising the step of switching the first flag (20) from the deactivated state to the activated state after completion of the first subtask (201) and / or switching the second flag (22) from the deactivated state to the activated state after completion of the second subtask (202).
类似技术:
公开号 | 公开日 | 专利标题 EP2003556A1|2008-12-17|Method of processing by a portable electronical device of applicative commands originating from physical channels, corresponding device and system FR2892212A1|2007-04-20|NFC READER HAVING PASSIVE OPERATING MODE WITH LOW POWER CONSUMPTION FR2864297A1|2005-06-24|Portable intelligent object e.g. chip card, operating process for e.g. personal digital assistant, involves storing status variations of portable intelligent terminal with logical phase FR2864292A1|2005-06-24|Intelligent object e.g. chip card, operating method, involves operating contact and contact-less interfaces at same time, and delaying and/or simulating zero setting of contact interface during zero setting transition to reinitialize chip WO2007077119A1|2007-07-12|Generic electronic key which is provided with a personalised chip card EP2483784A1|2012-08-08|Method, system and adapting device enabling a data exchange between a communicating object and a processing unit FR3035252A1|2016-10-21|METHOD FOR MANAGING INFORMATION COMMUNICATION BETWEEN AN NFC CONTROLLER AND A SECURE ELEMENT IN AN APPARATUS, AND CORRESPONDING NFC APPARATUS AND CONTROLLER EP2065859A2|2009-06-03|Microprocessor card, telephone comprising such a card and processing method on such a card EP2065858A2|2009-06-03|Microprocessor card, telephone comprising such a card and method of executing a command on such a card EP2234041B1|2013-08-14|Method and device for automatically selecting an application that can be used by said device CH715284A2|2020-02-28|NFC near field communication device and system. EP1356656B1|2010-04-07|A system for tracking and monitoring execution of applets with the help of a plurality of multiple exchange logic flow of command/response pairs EP1163625B1|2003-04-09|Maintenance of an anticollision channel in an electronic identification system CA2733304C|2018-05-08|Process for conducting a transaction using an nfc device EP2335159A2|2011-06-22|Wireless device having a transparent mode of operation EP1208519B1|2003-12-10|System and method for loading commands into an integrated circuit card EP3945467A1|2022-02-02|Contactless tranponder FR3113748A1|2022-03-04|A method of storing instructions in program and associated system memory. US20210357929A1|2021-11-18|Payment method and system FR2964486A1|2012-03-09|Mobile terminal i.e. cellular radio terminal, has radio frequency identification tag configuration application launched when detected radio frequency identification tag is determined to be blank by determination unit FR3062497A1|2018-08-03|INTERACTIVE TERMINAL HAVING A MEANS FOR TRANSFERRING INFORMATION BY FIELD CLOSE EP3106987A2|2016-12-21|Device for multi-protocol testing of a secure chip, and corresponding method FR3101221A1|2021-03-26|A method of managing the power consumption of a mobile terminal during the transmission of location data. WO2021105245A1|2021-06-03|Method of communication between two sub-systems constituting a modular payment terminal FR3105662A1|2021-06-25|Setting up a transaction in a contactless electronic device
同族专利:
公开号 | 公开日 US20210342557A1|2021-11-04| EP3841677A1|2021-06-30| EP3614570A1|2020-02-26| WO2020039048A1|2020-02-27|
引用文献:
公开号 | 申请日 | 公开日 | 申请人 | 专利标题 JPH1174929A|1997-08-29|1999-03-16|Sharp Corp|Electronic mail processing method and computer readable recording medium recorded with electronic mail processing program| GB2371705B|2001-01-30|2003-04-23|3Com Corp|Network switch with mutually coupled look-up engine and network processor| KR20080084548A|2007-03-14|2008-09-19|한국전자통신연구원|Apparatus and method for transmitting sensor status of rfid tag| KR20090055890A|2007-11-29|2009-06-03|한국전자통신연구원|Method and system for rfid application interface| JP5467888B2|2010-02-12|2014-04-09|株式会社日立製作所|Web application usability evaluation method, analysis server, and program thereof| EP2701414B1|2012-08-22|2015-10-07|BlackBerry Limited|Near field communications-based soft subscriber identity module|
法律状态:
优先权:
[返回顶部]
申请号 | 申请日 | 专利标题 US201862721318P| true| 2018-08-22|2018-08-22| 相关专利
Sulfonates, polymers, resist compositions and patterning process
Washing machine
Washing machine
Device for fixture finishing and tension adjusting of membrane
Structure for Equipping Band in a Plane Cathode Ray Tube
Process for preparation of 7 alpha-carboxyl 9, 11-epoxy steroids and intermediates useful therein an
国家/地区
|