![]()
专利摘要:
An NFC (near field communications) device comprising: an NFC router (202) including a memory (304) adapted to store data to be shared with an external device (301); and an NFC antenna circuit (204), the NFC router (202) being capable of operating in a card emulation mode in which the shared data stored by the memory (304) is accessible through the memory card circuit. NFC antenna (204). 公开号:FR3029324A1 申请号:FR1461631 申请日:2014-11-28 公开日:2016-06-03 发明作者:Nieuwenhuyze Olivier Van;Alexandre Charles 申请人:Proton World International NV;STMicroelectronics Rousset SAS; IPC主号:
专利说明:
[0001] The present description relates to the field of mobile communication devices, and in particular, a method and device for near-field communications (NFC). [0002] BACKGROUND Mobile phones and other types of mobile devices are increasingly equipped with Near Field Communications (NFC) interfaces, which enable them to perform transponder functions. electromagnetic energy over relatively short distances in addition to their other functions. In particular, such devices are capable of emulating the functions of an electromagnetic transponder, which could be of the contactless card type, or of the non-contact reader type. Such functionality improves for example the mobile device, allowing it to be used for various applications, for example as an electronic purse to make payments, and / or in transport applications to access services such as transport networks. [0003] To emulate the operation of a contactless card, the mobile device is generally equipped with a contactless front-end integrated circuit (CLF) also called NEC router. This B13767 - 14-ZV2-0517 router is equipped with a front-end radiofrequency (RF) transceiver coupled to a short-range antenna to match the colliding capabilities of an electromagnetic transponder. In some applications, a secure element (SE) can be used to provide authentication. In some cases, it would be desirable for some data contained in the mobile device to be available even when the mobile device is no longer powered. For example, the host processor of the mobile phone may be capable of card emulation, often referred to as "Host Card Emulation". However, if the mobile device is turned off, or if the battery is completely discharged, the host adapter emulation is not able to work. There is a technical problem to allow data contained in the mobile device to be accessible regardless of whether the mobile device is powered or not. SUMMARY An object of embodiments of the present disclosure is to at least partially solve one or more problems of the prior art. In one aspect, there is provided an NFC (Near Field Communication) device comprising: an NFC router including a memory adapted to store data to be shared with an external device; and an NFC antenna circuit, the NFC router 25 being capable of operating in a card emulation mode in which the shared data stored by the memory is accessible through the NFC antenna circuit. According to one embodiment, the NFC router is adapted to verify, in response to a request from an external device for accessing the shared data, one or more access conditions before transmitting the data to the external device by the intermediate of the NFC antenna circuit. According to one embodiment, the NFC router is adapted to verify a first access condition by verifying a digital signature associated with the request. [0004] B13767 - 14-ZV2-0517 3 NFC router is coupled to receive data According to one embodiment, the NEC processor for a shared device to be stored in the memory. NEC router is adapted data access According to one embodiment, the to detect whether a requesting device shared is the NEC device processor or an external device, and to selectively apply one or more access conditions on the basis of the determination. According to one embodiment, the NEC router is adapted to apply a first access condition for access requests detected as originating from the NEC processor, and a second access condition different from the first access condition. for access requests detected as coming from an external device. According to one embodiment, said one or more access conditions to be applied are further selected based on one or more of the following: the off / on state of the NEC device; the state of charge of a battery of the NEC device; the access request is a read or write request. According to one embodiment, the shared data stored by the memory comprises first data accessible by an external device without any access conditions and second data accessible by an external device only if one or more access conditions are satisfied. According to one embodiment, the NEC device further comprises one or more sensors for detecting one or more environment parameters, and the NEC router is adapted to store the data in the memory if a read value from at least one of the sensors exceeds a threshold. According to one embodiment, said one or more sensors comprise at least one of the following sensors: a humidity sensor; an accelerometer; a localization device; and a temperature sensor. [0005] According to another aspect, there is provided a method comprising: storing data to be shared with an external device in a memory of a near field communication router of an NEC device; and during a card emulation mode, providing by the NFC router to the external device access to the shared data via an NEC antenna circuit. According to one embodiment, the method further comprises: receiving by the NEC router a request from an external device to access the shared data; check, by the NEC router in response to the request, one or more access conditions; and transmitting the data to the external device if said one or more access conditions are satisfied. According to one embodiment, the verification of said one or more access conditions includes the verification, by the NEC router, of a digital signature associated with the request. According to one embodiment, the method further comprises detecting, using one or more sensors, one or more environment parameters, the storage of the data in the memory being triggered by the fact that a value of reading from at least one of the sensors exceeds a threshold. According to one embodiment, said one or more environmental parameters comprise at least one of the following elements: a humidity level; a read playback value; a geographical position of the NEC device; and a temperature level. BRIEF DESCRIPTION OF THE DRAWINGS The above-mentioned and other features and advantages will be apparent from the following detailed description of embodiments, given by way of illustration and not limitation, with reference to the drawings in which: B13767 - 14 FIG. 1 schematically illustrates an NFC device capable of near-field communications according to an exemplary embodiment of the present description; FIG. 2 diagrammatically illustrates the NFC device of FIG. 1 in more detail according to an exemplary embodiment of the present description; FIG. 3 schematically illustrates a system for communications between the device of FIG. 2 and an RF reader according to an exemplary embodiment of the present description; FIG. 4 is a flowchart illustrating operations in a method of accessing shared data, using an NFC interface according to an exemplary embodiment of the present disclosure; and Fig. 5 is a flowchart illustrating steps in a method of generating shared data. DETAILED DESCRIPTION FIG. 1 schematically illustrates an NFC device 102 capable of NFC communication. For example, the device 102 is a mobile communication device, such as a mobile phone, a smartphone, a tablet computer, a digital media player or the like, equipped with NFC circuits. The NFC device 102 of FIG. 1 is shown in communication with a reader 104, including an NFC transponder 106. For example, the reader 104 is disposed at an entrance barrier of a restricted access area such as the entry of a transport network or the like. When used with such a reader, the NFC circuit of the NFC device 102 operates for example in a tag emulation mode. Figure 2 schematically illustrates the NFC device 102 in more detail according to an exemplary embodiment. As illustrated, the device 102 includes, for example, an NFC router (NFC ROUTER) 202, also known in the art as a contactless front end (CLF). The NFC router 202 is coupled to an NFC antenna circuit 204, and together the router 202 and the antenna circuit 204 provide an NFC circuit for emulating the behavior of an NFC transponder. The NFC router 202 is also for example coupled to a host processing device (P) 206 of the NFC device 102. The processing device 206, for example, takes one or more processors under the control of instructions stored in an instruction memory. (MEM MEM) 208. The memory 208 is for example a flash memory, and stores one or more applications that have been loaded into the device. The NFC router 202 is also for example coupled to other devices, comprising one or more secure elements. Each secure element may have one of several formats, and in particular may be for example a universal integrated circuit card (UICC), an integrated UICC (eUICC), an integrated secure element (eSE) integrated in the mobile device or content in a microcircuit of the subscriber identification module (SIM), a universal SIM (USIM) or a micro secure digital element (pSD). In the example of Fig. 2, a secure element (SE) 210 and a USIM circuit (universal subscriber identification module) 212 are illustrated. The USIM circuit 212 is for example coupled to the NFC router 202 via a SWP (single-wire protocol) link, and is additionally coupled to the host processing device 206. The host processing device 206 is also, for example coupled to one or more antenna circuits 214, which allow for example telecommunications in a cellular network, and / or wireless communications in accordance with other standards such as Wi-Fi, Bluetooth etc. FIG. 3 schematically illustrates a system for communications between the NFC device 102 of FIG. 2 and an RF reader (READER) 301. As illustrated, the NFC router 202 comprises, for example, a processing device (P) 302 coupled to a memory (MEM) 304 storing shared data (SHARED DATA) 306. The memory 304 is for example a flash memory or EEPROM B13767 - 14-ZV2-0517 7 (read-only memory programmable and electrically erasable), or another type of memory. 1, & processing device 202 comprises for example one or more processors under the control of instructions which are also for example stored in the memory 304. The processing device 302 is for example coupled via an interface In one embodiment, the link between the processor 206 and the NEC router 202 is a serial link, and the interface 308 provides serial to parallel conversion. The processing device 302 is also coupled through a communication interface 310 to the NEC antenna circuit 204. The NFC antenna circuit 204 comprises, for example, nodes 312 and 314 coupled to an oscillating circuit consisting of the parallel connection of an inductive element 316 which constitutes the antenna of the antenna circuit NEC 204, and a capacitive element 318. In alternative embodiments, the inductive element 316 could be coupled in series with the capacitive element 318, which could be integrated in the NEC router 202. The nodes 312 and 314 of the NEC antenna circuit 204 are coupled to respective inputs of a rectifier bridge 320 having output lines 322 and 324 coupled to the power supply. The communication interface 310 provides, for example, radio frequency coding and decoding. Additionally, the interface 310 generates, for example, a supply voltage VR from the received signal when the NEC router 202 operates in the card emulation mode to supply the processing device 302 and the memory 304. In some embodiments, the processing device 206 is coupled to one or more sensors (SENSOR (S)) 326, which, for example, monitor one or more environment parameters. For example, the sensors 326 comprise a humidity detector, an accelerometer, a temperature sensor, and / or a locating device such as a GPS (global positioning system). In operation, when the NFC device 102 is powered, the memory 304 of the NFC router 202 is for example accessible by the processing device 206. For example, the processing device 206 can write the shared data in the memory 304 and optionally be able to In addition, the memory 304 of the NFC router 202 is also for example accessible by an external device, such as the RF reader 301, while the NFC device 102 is powered. When the NFC device 102 is turned off or otherwise in an unpowered state, for example when its battery is discharged, the NFC router 202 operates for example in the card emulation mode in which a signal can be received. of a card reader 301. In this mode, the processor 302 and the memory 304 are for example powered by the supply voltage VR extracted from the received wireless signal. However, in some embodiments, for example, if there is still power in the battery, the processor 302 and the memory 304 may be powered by the battery (not shown in Fig. 3). The memory 304 is for example accessible in this mode by the external device, although one or more access conditions can be applied, as will be described in more detail below. In addition, in some embodiments, the memory 304 is accessible by the external device only for read operations, and not for write operations. Thus, by transferring, via the host processing device 206, to the NFC router 202 the data to be shared, the card emulation can be used to access this data even if the NFC device 102 is turned off or the battery is unloaded. Fig. 4 is a flowchart illustrating operations in an exemplary embodiment access method. Initially, it is assumed that the NEC device 102 is powered, so that the host processing device 206 is operational. In an operation 401, the host processing device 206 stores shared data 306 in the memory 304 of the NEC router 202. For example, in some embodiments, the shared data includes a code giving access to a service, such as a banknote. plane, a train ticket, a theater admission ticket, a hotel reservation, or the like. Alternatively, the shared data may comprise data which must remain saved, for example in the case where the NEC device 102 is about to be damaged. For example, the data provided by one or more of the sensors 326 may indicate that the NEC device may be damaged, and the shared data includes, for example, one or more readings from the sensors 326, and / or other data such as passwords, encryption keys, etc. The data stored by the NEC router 202 is generally more likely to be successfully retrieved later than data stored elsewhere in the NEC device 102, since the NEC router 202 is generally a chip having a relatively high level of protection. With respect to impacts and / or exposure to liquids, compared to other elements of the NEC device 102. In a subsequent operation 402, the NEC device 102 is de-energized. For example, the NEC device 102 is powered off by a user, or turns off automatically due to a discharged battery. Alternatively, the NEC device 102 may lose power due to a mechanical stress applied thereto, for example causing damage to the battery and / or its wiring, or due to a short circuit caused. by immersing the NEC device 102 in a liquid. In a subsequent operation 403, a wireless inter-roaming message is received from an external device, such as the RF reader 301 of FIG. 3. The interrogation message comprises, for example a request for access to memory 304 of the NFC router 202. It will be clear to those skilled in the art that there is a wide range of protocols that could be used for communications to access the memory 304. For example, in some embodiments, the protocol defined by International Standard IS07816, based on binary read and binary update commands, could be used. In a subsequent operation 404, the processing device 302 determines, for example, whether the shared data stored in the memory (304) is protected by access conditions or not. The shared data 306 may be restricted access sensitive data. For example, in some embodiments, the sensitive data includes one or more reads made by the sensors 326, and / or other data such as passwords, encryption keys, etc. In some embodiments, the shared data may be freely accessible by the NFC processor 206, but access is restricted when an external device attempts to access the data. In other embodiments, the access conditions to be applied may depend, in addition to or instead, on the on / off state of the mobile device and / or the state of charge of the battery of the mobile device. . If it is determined in the operation 404 that the shared data is protected, the next operation is the operation 405, in which one or more access conditions are verified. For example, the protection mechanism may include a symmetrical or asymmetric signature, or the like. In the case where a symmetrical signature is used, the verification of the access condition involves for example the verification of a digital signature associated with the access request. For example, the digital signature is an associated DES-MAC (Data Encryption Standard Message Encryption Code) code 3767 - 14-ZV2-0517 11 to the access request. The verification involves, for example, the calculation by the NFC router 202 of the signature on the basis of the data provided in the access request or in another message received from the external device. The signature generated by the NFC router 202 is then compared to a signature provided by the external device, and if the signatures match, the access condition is considered satisfied. For example, the signature is the last 8 bytes of the access request. In one embodiment, the signature is a MAC conforming to the ISO / IEC 9797-1 Algorithm 3. The generation of such a MAC is for example described in more detail in chapter A1.2.1 of Book 2, Security and Key Management, from the EMV version 4.3 specification. The fact that the access request contains a signature is for example mentioned in the CLA byte of the command according to the EMV specification. In alternative embodiments, the NFC router 202 may respond to the polling request from the RF reader 301 by checking an encryption / decryption key held by the RF reader 301 with respect to a key held by it. This may involve the transmission by the NFC router 202 of a data value to the RF reader 301 for encryption or decryption using the key held by the reader 301. The NFC router 202 may also encrypt or decrypt the value. based on the key held by it, and can verify that the response from the RF reader 301 matches its own calculated value. Of course, there are many other protection mechanisms based on signatures, keys, passwords or access codes that could be used. If one or more of the access conditions are not satisfied, the following operation is for example the operation 406, in which access to the shared data is denied. For example, a message is transmitted to the RF reader 301 including a failure message. [0006] Otherwise, if all the access conditions of the operation 405 have been satisfied, the following operation is for example the operation 407, in which the shared data is transmitted to the external device. The operation 407 is also performed for example if, in the operation 404, it has been determined that the shared data are not protected. For example, the shared data may comprise data that must be accessible wirelessly by an external device at any time, regardless of whether the NFC 102 device is powered or not. For example, data representing a ticket for a service such as a boarding pass, a train ticket, etc., can be freely accessible by any RF reader, but can be coded in such a way that only certain authorized readers are able to decode and interpret the data. Fig. 5 is a flowchart illustrating a method of generating and storing shared data 306 in the memory 304 of the NFC router 202 of Fig. 3, according to an exemplary embodiment. In a first operation 501, one or more reads are made using said one or more sensors 326 of the NFC device of Fig. 3. In a subsequent operation 502, it is determined whether any of the readings from the sensors 326 exceed a 25 given threshold. The thresholds are for example chosen to correspond to levels of the environmental parameters captured by the sensors which are not expected to occur during the normal operating conditions of the NFC device 102, and which indicate that damage is likely to occur in In the operation 502, none of the thresholds is exceeded, the process returns for example to the operation 501, in which, after a certain delay such as a few seconds or minutes, one or more new sensor readings are 35 made. [0007] Otherwise, if in operation 502 one or more thresholds are exceeded, the next operation is operation 503, in which the shared data is stored in the memory 304 of the NEC router 202. For example, the shared data may include one or more readings that result in the threshold being exceeded in the operation 502. In addition to or instead, the shared data may consist of data that must be kept, such as encryption keys, passwords or the like. [0008] An advantage of the embodiments described herein is that data in an NEC device can be accessed even when the NEC device is no longer powered. In addition, the data may be accessible by both an NEC device processing device and an external device, and different access conditions may be applied depending on the device wishing to access the data. With the description thus made of illustrative embodiments, various alterations, modifications and improvements will readily occur to those skilled in the art. [0009] For example, although a particular example of an NEC antenna circuit has been described in FIG. 3, it will be apparent to one skilled in the art that various circuit variants would be possible.
权利要求:
Claims (15) [0001] REVENDICATIONS1. A near-field communications (NFC) apparatus comprising: an NEC router (202) including a memory (304) adapted to store data to be shared with an external device (301); and an NEC antenna circuit (204), wherein the NFC router (202) is capable of operating in a card emulation mode in which the shared data stored by the memory (304) is accessible through the NEC antenna circuit (204). [0002] An NEC apparatus according to claim 1, wherein the NFC router (202) is adapted to verify, in response to a request from an external device (301) for accessing the shared data, one or more access conditions prior to transmitting the data to the external device via the NEC antenna circuit (204). [0003] An NEC apparatus according to claim 2, wherein the NFC router (202) is adapted to verify a first access condition by verifying a digital signature associated with the request. [0004] The NEC device according to any one of claims 1 to 3, wherein the NEC router (202) is coupled to a processor (206) of the NEC device for receiving the shared data to be stored in the memory (304). 25 [0005] An NEC device according to claim 4, wherein the NEC router (202) is adapted to detect whether a device requesting access to the shared data is the NEC processor (206) or an external device (301), and selectively applying one or more access conditions based on the determination. [0006] The NEC device according to claim 5, wherein the NEC router is adapted to apply a first access condition for access requests detected as coming from the processor (206) of the NEC device, and a second condition B13767 - 14-ZV2. The access condition is different from the first access condition, for access requests detected as coming from an external device (301). [0007] An NEC device according to claim 5 or 6, wherein said one or more access conditions to be applied are further selected based on one or more of the following: the off / on state of the NFC device; the state of charge of a battery of the NFC device; The access request is a read or write request. [0008] An NFC device according to any of claims 1 to 7, wherein the shared data stored by the memory (304) comprises first data accessible by an external device (301) without any access conditions and second data. accessible by an external device (301) only if one or more access conditions are satisfied. [0009] The NEC device according to any one of claims 1 to 8, further comprising one or more sensors (326) for detecting one or more environment parameters, the NFC router (202) being adapted to store data in the memory (304) if a read value from at least one of the sensors (326) exceeds a threshold. [0010] An NFC device according to claim 9, wherein said one or more sensors (326) comprise at least one of the following sensors: a humidity sensor; an accelerometer; a locator device; and a temperature sensor. [0011] A method comprising: storing, in a memory (304) of a near-field communication (NEC) router (202) of an NEC device, data to be shared with an external device (301); andB13767 - 14-ZV2-0517 16 during a card emulation mode, providing by the NFC router (202) to the external device (301) access to the shared data via an NFC antenna circuit (204); ). [0012] The method of claim 11, further comprising: receiving by the NFC router (202) a request from an external device (301) for accessing the shared data; verifying, by the NFC router (202) in response to the request, one or more access conditions; and transmitting the data to the external device if said one or more access conditions are satisfied. [0013] The method of claim 12, wherein verifying said one or more access conditions includes verifying, by the NFC router, a digital signature associated with the request. [0014] The method of any one of claims 11 to 13, further comprising detecting, using one or more sensors (326), one or more environment parameters, storing the data in the memory being triggered. in that a read value from at least one of the sensors (326) exceeds a threshold. [0015] The method of claim 14 wherein said one or more environmental parameters comprise at least one of: a moisture level; an acceleration reading value; a geographical position of the NFC device; and a temperature level.
类似技术:
公开号 | 公开日 | 专利标题 FR3029324A1|2016-06-03| EP2922269B1|2016-07-06|Secure NFC routing EP2463833B1|2013-07-24|Method and device for operational control of internal functions and protected applications embedded in chip cards for mobile terminals US9817972B2|2017-11-14|Electronic assembly comprising a disabling module EP2003556A1|2008-12-17|Method of processing by a portable electronical device of applicative commands originating from physical channels, corresponding device and system EP2306324A1|2011-04-06|Method, system and adapting device enabling a data exchange between a communicating object and a processing unit WO2012038187A1|2012-03-29|Protection of a communication channel of a telecommunication device coupled to an nfc circuit against misrouting CN108282453B|2021-05-25|Internet of things reading device, safe access method and control center equipment FR3012236A1|2015-04-24| EP2469904A1|2012-06-27|Electronic device and communication method EP2553633B1|2020-07-22|Double-range radio frequency communication object and method for implementing same FR3047583A1|2017-08-11|METHOD OF SECURELY TRANSMITTING AUTHENTICATION INFORMATION BETWEEN SOFTWARE APPLICATIONS IN A COMPUTER TERMINAL CN104796532A|2015-07-22|Method and device for destroying mobile terminal FR2966620A1|2012-04-27|METHOD AND SYSTEM FOR MONITORING THE EXECUTION OF A FUNCTION PROTECTED BY AUTHENTICATION OF A USER, IN PARTICULAR FOR ACCESSING A RESOURCE ES2834938T3|2021-06-21|Systems and methods for a cloud-connected transponder EP3214582B1|2020-02-12|Application selection in a mobile terminal EP3054393B1|2020-05-06|Method for authenticating an object by a device capable of a mutual wireless communication, and corresponding system and object EP2574025A1|2013-03-27|Portable terminal acting as a proxy between a computer and an NFC card and corresponding system EP3038396A1|2016-06-29|Beacon with multiple communication interfaces with secure deactivation/reactivation EP3742371A1|2020-11-25|Monitoring of applications in a mobile terminal EP2925035A1|2015-09-30|Method for activating and deactivating an application in a telecommunications terminal including a secure element and a biometric reader and corresponding server FR2964486A1|2012-03-09|Mobile terminal i.e. cellular radio terminal, has radio frequency identification tag configuration application launched when detected radio frequency identification tag is determined to be blank by determination unit
同族专利:
公开号 | 公开日 US9628146B2|2017-04-18| CN105657637A|2016-06-08| CN105657637B|2019-04-23| FR3029324B1|2017-12-15| CN205029877U|2016-02-10| US20160156386A1|2016-06-02|
引用文献:
公开号 | 申请日 | 公开日 | 申请人 | 专利标题 US20080144650A1|2006-12-19|2008-06-19|Infineon Technologies Ag|Apparatus for contactless transmission of data from a memory| EP2219353A1|2009-02-13|2010-08-18|STMicroelectronics SAS|Mobile telephone comprising a battery and a near field communication module| US20140327523A1|2013-05-01|2014-11-06|Cellco Partnership D/B/A Verizon Wireless|Storing and retrieving electronic device information| US20070156436A1|2005-12-31|2007-07-05|Michelle Fisher|Method And Apparatus For Completing A Transaction Using A Wireless Mobile Communication Channel And Another Communication Channel| EP2010988B1|2006-04-24|2018-05-30|Nokia Technologies Oy|System and method for manage and control near field communication for a mobile multifunctional device when the device is uncharged or only partially charged| US10454693B2|2009-09-30|2019-10-22|Visa International Service Association|Mobile payment application architecture| FR2957437B1|2010-03-09|2012-03-30|Proton World Int Nv|PROTECTION AGAINST A DEROUTEMENT OF A COMMUNICATION CHANNEL OF AN NFC CIRCUIT| EP2434826A1|2010-08-30|2012-03-28|NTT DoCoMo, Inc.|Method and apparatus for allocating network rates| US20120143707A1|2010-12-07|2012-06-07|Deepak Jain|Executing Reader Application| WO2013033388A1|2011-08-30|2013-03-07|Yeager C Douglas|Systems and methods for authorizing a transaction with an unexpected cryptogram| EP2663106B1|2012-05-08|2017-02-15|Nxp B.V.|Secure near field communication solutions and circuits| US9122966B2|2012-09-07|2015-09-01|Lawrence F. Glaser|Communication device| US9603090B2|2013-08-08|2017-03-21|Apple Inc.|Management of near field communications using low power modes of an electronic device|CN107846238B|2016-09-18|2020-06-09|中兴通讯股份有限公司|Method and device for controlling NFCroute| US9900055B1|2017-02-01|2018-02-20|Conduent Business Services, Llc|Magnetic presence detection of a smartphone| FR3062937A1|2017-02-14|2018-08-17|StmicroelectronicsSas|ACTIVATION OF AN NFC DEVICE| US9936466B1|2017-02-17|2018-04-03|Conduent Business Services, Llc|Bluetooth low energy collision management| US10652236B2|2017-03-17|2020-05-12|Conduent Business Services, Llc|Electronic crowd-based authentication| US10601592B2|2017-09-08|2020-03-24|Kenneth Hugh Rose|System and method trusted workspace in commercial mobile devices| US10387689B2|2017-09-22|2019-08-20|Tocreo Labs, L.L.C.|NFC cryptographic security module| US10108827B1|2017-11-14|2018-10-23|Capital One Services, Llc|Activating an output component to indicate an orientation of a near-field communication -capable transaction card| CN112395894A|2019-08-16|2021-02-23|华为技术有限公司|Communication method and device based on NFC| EP3809358A1|2019-10-18|2021-04-21|Thales Dis France Sa|Security mechanism for namespaces used in electronic identification on mobile devices|
法律状态:
2015-10-23| PLFP| Fee payment|Year of fee payment: 2 | 2016-06-03| PLSC| Publication of the preliminary search report|Effective date: 20160603 | 2016-09-09| CA| Change of address|Effective date: 20160805 | 2016-10-24| PLFP| Fee payment|Year of fee payment: 3 | 2017-10-20| PLFP| Fee payment|Year of fee payment: 4 | 2018-10-24| PLFP| Fee payment|Year of fee payment: 5 | 2019-10-22| PLFP| Fee payment|Year of fee payment: 6 | 2020-10-21| PLFP| Fee payment|Year of fee payment: 7 |
优先权:
[返回顶部]
申请号 | 申请日 | 专利标题 FR1461631A|FR3029324B1|2014-11-28|2014-11-28|ACCESSING DATA IN AN NFC MOBILE DEVICE|FR1461631A| FR3029324B1|2014-11-28|2014-11-28|ACCESSING DATA IN AN NFC MOBILE DEVICE| CN201510623721.2A| CN105657637B|2014-11-28|2015-09-25|Data access in mobile device with NFC| CN201520755639.0U| CN205029877U|2014-11-28|2015-09-25|Nfc near field communication equipment| US14/871,851| US9628146B2|2014-11-28|2015-09-30|Data access in a mobile device with NFC| 相关专利
Sulfonates, polymers, resist compositions and patterning process
Washing machine
Washing machine
Device for fixture finishing and tension adjusting of membrane
Structure for Equipping Band in a Plane Cathode Ray Tube
Process for preparation of 7 alpha-carboxyl 9, 11-epoxy steroids and intermediates useful therein an
国家/地区
|