TW201023662A - Power negotiation for small RFID card - Google Patents

Power negotiation for small RFID card Download PDF

Info

Publication number
TW201023662A
TW201023662A TW98126588A TW98126588A TW201023662A TW 201023662 A TW201023662 A TW 201023662A TW 98126588 A TW98126588 A TW 98126588A TW 98126588 A TW98126588 A TW 98126588A TW 201023662 A TW201023662 A TW 201023662A
Authority
TW
Taiwan
Prior art keywords
memory card
command
card
memory
controller
Prior art date
Application number
TW98126588A
Other languages
Chinese (zh)
Other versions
TWI433560B (en
Inventor
Siva G Narendra
Prabhakar Tadepalli
Saurav Chakraborty
Original Assignee
Tyfone Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tyfone Inc filed Critical Tyfone Inc
Publication of TW201023662A publication Critical patent/TW201023662A/en
Application granted granted Critical
Publication of TWI433560B publication Critical patent/TWI433560B/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • G06K19/0701Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips at least one of the integrated circuit chips comprising an arrangement for power management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • G06K19/077Constructional details, e.g. mounting of circuits in the carrier
    • G06K19/0772Physical layout of the record carrier
    • G06K19/07732Physical layout of the record carrier the record carrier having a housing or construction similar to well-known portable memory devices, such as SD cards, USB or memory sticks

Abstract

A memory card compatible RFID card includes a smartcard controller that receives power from a host device. The RFID card also includes a small inductive device capable of inductive coupling with an RFID reader. The small inductive device is small enough to fit in the form factor of a memory card. Commands may be sent to the RFID card to keep the RFID card powered.

Description

201023662 六、發明說明: 【發明所屬之技術領域】 本發明通常係有關於無接觸之通訊裝置,而更具體而 吕之,是指小型無線射頻識別(RFID)+。 【先前技術】 RFID「標籤」(tags)可被分成兩個寬廣的範疇:主動標 ❹ 籤《 及被動標籤。主動標籤之特徵為一區域電力來源, 像是電池。主動標籤通常藉由在尺1?載波頻率之選擇上進 行廣播之方式來傳輸資訊,其中RF載波頻率之選擇係使 用用一區域產生之RF載波。主動標籤一般是用來在長距 離上傳輸’通常被稱為「遠場通訊」(far fieid communications,FFC)。採用主動RFID標藏之天線有做 的較大的傾向,以允許在長距離上之通訊。 被動標籤則未被供電。被動標籤能從一訊問 (lnterrogating)RF場中取得供給該標籤所需之能源,並藉 由調變該阻抗(其為天線呈現給該訊問場之阻抗)之方式 使用那能源來傳輸回應碼,借此調變該反射回到讀取天 線之訊號。被動標籤一般用來在短距離上傳輸,通常被 稱為「近场通訊」(near field c〇niniunications,NFC)。例 如’運作在13.56MHz的被動標籤一般被設計成能在距 若干公分遠的距離與rFID讀取器通訊。 被動元件一般係連接到「迴路天線」(loop antennas) 〇 201023662 迴路天線之範例係如於2〇〇3年5月27曰授與匸虹以打以 及其他人之美國專利號:6 568 6〇〇中所示。在美國6 568 6〇〇 號專利中所描述之裝置可被認為是「信用卡尺寸」的被動式 RFID卡(更具體而言’一種能符合ISO 7816尺寸需求的卡)。 該迴路天線有必要是大的,因為被動標籤係使用由該天線所接 收的能源來供電,該能源係來自由RFID讀取器處所傳輸之訊 號。 ^ 第12圖顯示隨著時間所發展之電力供應電壓,其係藉由在一 訊問RF場之存在下而整流在迴路天線中所感應之電壓。一旦該 電力供應電壓達到一臨界值’則該標籤作業可不符合回應時間 之規格。低於此一天線尺寸,該電力供應電壓會永遠無法達到 該臨界值’而該標籤則永遠無法啟動。 針對RFID應用之天線设計係在Microchip Technology,Inc之 Youbok Lee博士在2003年所發表(月份未記載)之應用筆記中所 敘述,標題為 “Antenna Circuit Design for RFID Applications”。Lee 博 φ 士的應用筆記詳細描述了如何針對一運作在13.56MHz之被動 式RFID標籤天線來決定其尺寸需求。在該應用筆記之第5頁, Lee博士展示了迴路天線線圈(c〇il)之最佳半徑是等於所需讀取 距離的1.414倍。此分析確認了對於大約若干公分之讀取距離 而言,一信用卡尺寸的迴圈天線可幾乎達到最佳化。 在許多應用中’可看到被動標籤正被廣泛使用著。例如,行 動裝置製造商將被動式RFID標籤嵌入到用於NFC應用之行動 裝置中。示範性行動應用包括,但不限於,票卷販賣以及行動 式付款。於2008年2月19日授與Leizerovich及其他人的美 201023662 國專利號:7,333,062顯示一用於NFC裝置之具有整合式迴圈天 線之行動電話。如美國專利7,333,062號所示,行動電話提供了 實作一 13·56ΜΗζ之迴路天線所必要的真實狀況(real estate) » 在較小的行動裝置中實作被動標籤之方式已嘗試過多次。這 些嘗試未能達成有限的成功,部分是由於該迴路天線尺寸之 故。例如,第13圖顯示一在一安全數位(SD)記憶卡中之RFID 標藏實作,該安全數位(SD)記憶卡係由Wireless Dynamics, Inc. of Calgaiy,Alberta Canada所製造。卡1300包括一天線,但是因此SD 卡明顯地太大。同樣地舉例而言,美國公開號:2006/0124755Α1 顯示一具有被動標籤之記憶卡,但是該卡必須被插入到一插槽 中以存取在不同裝置上之迴路天線。按此實作方式,行動裝置 之真實狀況是仍依賴迴路天線之實作。因此,可預見的是,天 線的尺寸會被當作為要進一步微塑化被動式RFID標籤的障礙。 對於能不用依賴外部裝置來收納天線之小型足跡 (footprint)RFID標籤的需求是存在著。對於能相容於在行動裝 置上之標準記憶卡插槽的記憶卡相容RFID標籤的需求,亦是 存在著的。 【發明内容】 本發明之一態樣係揭示一種對一記憶卡相容之附加插 槽維持未受干擾之電力的方法,該方法包含週期性地對 該記憶卡相容附加插槽發送記憶卡寫入命令。 本發明之另一態樣係揭示一種修改對一雙介面智慧卡 201023662 控制器之電力傳遞的方法’該方法包含以下步驟:將一 隱藏命令喪入到一記憶卡寫入命令内,該隱藏命令係對 一在一記憶卡相容無線射頻識別(RFID)卡上之雙介面智 慧卡控制器’指定進行電力傳遞之修改;以及將該記憶 卡寫入命令發送到該記憶卡相容RFID卡。 本發明之又一態樣係揭示一種修改對一雙介面智慧卡 控制器之電力傳遞的方法,該方法包含以下步驟:在一 鲁 記憶卡控制器處接收一命令’其中該命令包括一指令, 以用來修改對一雙介面智慧卡控制器之電力傳遞,該雙 介面智慧卡控制器係與該記憶卡控制器共同放置在一記 憶卡上;以及修改對該雙介面智慧卡控制器之電力傳遞。 . 本發明之又另一態樣係揭示一種用指令所編碼而成之 • 電腦可讀取媒體’其中當由一記憶卡控制器存取時該等 指令會造成該記憶卡控制器能執行以下動作:在該記憶 卡控制器處接收一命令’其中該命令包括一指令,以用 Φ 來修改對一雙介面智慧卡控制器之電力傳遞,該雙介面 智慧卡控制器係與該記憶卡控制器共同放置在一記憶卡 上;以及修改對該雙介面智慧卡控制器之電力傳遞。 【實施方式】 在以下詳細敘述中可參考隨附圖式,該等圖式僅作為 說明用途而顯示本發明之各具體實施例。該等具體實施 例係充分描述以讓該領域中熟悉技術人士能實現本發 201023662201023662 VI. Description of the Invention: [Technical Field of the Invention] The present invention generally relates to a contactless communication device, and more specifically to a small radio frequency identification (RFID)+. [Prior Art] RFID "tags" can be divided into two broad categories: active labeling and passive labeling. Active tags are characterized by a source of electrical power, such as a battery. Active tags typically transmit information by broadcasting over the selection of the carrier frequency, where the RF carrier frequency is selected using an RF carrier generated by a region. Active tags are typically used to transmit over long distances, commonly referred to as "far fieid communications" (FFC). Antennas that use active RFID tags have a greater tendency to allow for communication over long distances. Passive tags are not powered. The passive tag can obtain the energy required to supply the tag from an lnterrogating RF field, and use the energy source to transmit the response code by modulating the impedance (which is the impedance that the antenna presents to the challenge field). Thereby the reflection is modulated back to the signal reading the antenna. Passive tags are typically used for transmission over short distances and are often referred to as "near field c〇niniunications" (NFC). For example, passive tags operating at 13.56 MHz are typically designed to communicate with rFID readers at distances of a few centimeters. Passive components are typically connected to "loop antennas" 〇201023662. Examples of loop antennas are as follows: May 27, 2002, awarded to Yuhong to play and others' US patent number: 6 568 6〇 Shown in 〇. The device described in U.S. Patent No. 6,568,600 can be considered a "credit card size" passive RFID card (more specifically, a card that meets ISO 7816 size requirements). The loop antenna is necessarily large because the passive tag is powered by the energy received by the antenna from the signal transmitted by the RFID reader. ^ Figure 12 shows the power supply voltage developed over time, which rectifies the voltage induced in the loop antenna by the presence of an interrogating RF field. Once the power supply voltage reaches a threshold value, the labeling operation may not meet the specifications of the response time. Below this antenna size, the power supply voltage will never reach this threshold' and the tag will never start. The antenna design for RFID applications is described in the application note published by Dr. Youbok Lee of Microchip Technology, Inc. in 2003 (not documented in the month) under the heading "Antenna Circuit Design for RFID Applications." Lee Bo's application note details how to determine the size requirements for a passive RFID tag antenna operating at 13.56 MHz. On page 5 of this application note, Dr. Lee showed that the optimal radius of the loop antenna coil (c〇il) is 1.414 times the required read distance. This analysis confirms that a credit card sized loop antenna can be nearly optimized for a read distance of approximately several centimeters. In many applications, it can be seen that passive tags are being widely used. For example, a mobile device manufacturer embeds a passive RFID tag into a mobile device for NFC applications. Exemplary operational applications include, but are not limited to, ticket sales and mobile payments. The benefit of Leizerovich and others was granted on February 19, 2008. 201023662 Patent No. 7,333,062 shows a mobile phone with an integrated loop antenna for NFC devices. As shown in U.S. Patent No. 7,333,062, the mobile phone provides the real estate necessary to implement a loop antenna of 13.56. » The manner in which passive tags are implemented in smaller mobile devices has been tried many times. These attempts failed to achieve limited success, in part due to the size of the loop antenna. For example, Figure 13 shows an RFID tag implementation in a secure digital (SD) memory card manufactured by Wireless Dynamics, Inc. of Calgaiy, Alberta Canada. Card 1300 includes an antenna, but the SD card is therefore significantly too large. Similarly, for example, US Publication No. 2006/0124755Α1 shows a memory card with a passive tag, but the card must be inserted into a slot to access loop antennas on different devices. According to this implementation, the actual condition of the mobile device is still dependent on the implementation of the loop antenna. Therefore, it is foreseeable that the size of the antenna will be used as an obstacle to further microplasticizing passive RFID tags. There is a need for a small footprint RFID tag that can accommodate an antenna without relying on external devices. There is also a need for a memory card compatible RFID tag that is compatible with the standard memory card slot on the mobile device. SUMMARY OF THE INVENTION One aspect of the present invention discloses a method of maintaining undisturbed power for an additional slot compatible with a memory card, the method comprising periodically transmitting a memory card to the memory card compatible additional slot Write command. Another aspect of the present invention discloses a method of modifying power transfer to a dual-interface smart card 201023662 controller. The method includes the steps of: dropping a hidden command into a memory card write command, the hidden command Modifying the power transfer by a dual interface smart card controller on a memory card compatible radio frequency identification (RFID) card; and transmitting the memory card write command to the memory card compatible RFID card. Yet another aspect of the present invention discloses a method of modifying power transfer to a dual interface smart card controller, the method comprising the steps of: receiving a command at a memory card controller, wherein the command includes an instruction, For modifying power transfer to a dual interface smart card controller, the dual interface smart card controller is co-located with the memory card controller on a memory card; and modifying the power of the dual interface smart card controller transfer. Yet another aspect of the present invention discloses a computer readable medium encoded by instructions which, when accessed by a memory card controller, causes the memory card controller to perform the following Action: receiving a command at the memory card controller, wherein the command includes an instruction to modify power transfer to a dual interface smart card controller with Φ, the dual interface smart card controller and the memory card control The devices are placed together on a memory card; and the power transfer to the dual interface smart card controller is modified. DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS In the following detailed description, reference should be made to the accompanying drawings These specific embodiments are fully described so that those skilled in the art can implement the present invention 201023662

明》應了解到本發明之各具體實施例雖然不同,但並非 互斥。例如,關連於一具體實施例之特定特徵、架構或 特性可被實作在其他具體實施例中,而無需悖離本發明 之精神及範園。此外’應了解到在所揭示具體實施例内 之個別元件之位置或配置,可在不悖離本發明之精神及 範圍下進打修改。因此’以下詳細敘述將不會被認為是 限制,而本發明之範圍則只由所附的申請專利範圍所定 義,並連同由申請專利範圍所主張的均等物之完整範圍 一併加以適當地解釋。在圖式中,相似的標號會遍佈於 各自的示圖中而涉及到相同或相似的功能。 第1圖顯示一行動計算裝置以及一相容於記憶卡插槽 之小型RFID卡。行動計算裝置11〇在第i圖中係顯示成 一行動電話,但是這並非當成本發明之限制。例如,行 動計算裝置110可為個人數位助理(PDA)、智慧型手機、 行動電話、手持式電腦、桌上型電腦、或任何其他能夠 如此處所述般運作的裝置。 行動計算裝置110包括記憶卡插槽112〇記憶卡插槽 112是能夠接受RFID卡120的插槽。例如,記憶卡插槽 112可具有相容於RFID卡120之實體維度,並可具有使 用相容於RFID卡120之協定來運作的通訊介面。如此 所使用般,該用語「記憶卡插槽」可為任何能夠接受一 具有記憶體之卡的外加(add-on)插槽,並可由一像是如第 1圓所示之行動計算裝置所存取。例如,一記憶卡插槽 可相容於一工業標準之通訊協定,或可相容於被廣泛接 201023662 受之通訊協定’此通訊協定不一定要被正式規範納入為 工業標準°範例包括了能相容於多媒體記憶卡(MMC)協 定之插槽、記憶棒DUO(Memory Stick DUO)協定、安全 數位(SD)協定、以及智慧型媒體(Sinart Media)協定。上 述清單僅作為範例性質,而非徹底詳述。除了以上明確 所列之協定外’記憶卡112還可相容於許多記憶卡插槽 協定而不會悖離本發明之範圍。 RFID卡120包括電子接觸122 ’其係能與記憶卡插槽 112通訊之主機端介面的一部分。例如,電子接觸122 可提供適用於記憶卡之通訊協定的連接性^ RFID卡12〇 包括RFID功能性,且亦可包括可由行動計算裝置11〇 所存取之記憶體。例如,在某些具體實施例中,rFid卡 120包括一智慧卡控制器以及一能與nfC讀取器(例如 ISO 14443適用介面)互動的感應元件。在其他具體實施 例中,RFID卡120不包括由行動計算裝置11〇所存取的 φ 記憶體°RFID卡120可包括記憶體及RFID之外的功能。 在本發明之各具艎實施例中,在RFID卡中的RFID功 能性係由行動計算裝置110使用記憶卡存取命令所存 取’該等記憶卡存取命令已被定義以用於記憶卡插槽 112。據此,本發明之各具體實施例能讓RFn)功能在無 需定義新命令的前提下實作出記憶體存取之外的功能。 在某些具體實施例甲,用於RFID之新命令被嵌入到資 料位元之内,該等新命令係接續在記憶卡讀取/寫入命令 之後。然後RFID卡120決定新進入之資料位元是否為 201023662 用於RFID功能的正規讀取/寫入功能。換言之,除了標 準記憶卡功能之外的功能可透過在資料串流中之「隱藏」 命令來存取,該「隱藏」命令可使用現存記憶卡存取命 令及功能來交換。根據本發明之各具體實施例,現存記 憶卡功能及RFID功能兩者可在無需對如何建立主機端 協定的方式進行改變的前提下實作。 行動計算裝置110及RFID卡120的結合可被用於任何 目的。例如,在某些具體實施例中,RFID卡120可與銷 ® 售時點情報系統(point-for-sale)付費裝置進行互動,以達 到行動付款的效果。同樣作為範例’在某些具體實施例 中’ RFID卡120可被用於大眾運輸環境中採感應即付款 (wave and pay)方式的票卷銷售上,像是MIFARE。 第2圖顯示一行動計算裝置之方塊圖。行動計算裝置 Π0包括天線240、射頻電路230、處理器210、記憶體 220以及記憶卡插槽丨12。在某些具體實施例,行動計算 β 裝置U0是行動電話,或包栝行動電話功能。例如,天 線240以及射頻電路23〇可運用於與一蜂巢式電話網路 進行通訊。更甚者,在某些具體實施例中,行動計算裝 置no是無線區域網路(WLAN)或無線廣域網路(wwan) 裝置。例如,天線24〇以及射頻電路23〇可運用於與一 無線存取點進行通訊。在某些具體實施例乍,天線2仙 及無線電路230被忽略,而行動計算裝i 110無法運用 無線連接。 、 處理器210代表一能夠與其他在行動計算裝置11〇中 201023662 所示方塊通訊的處理器。例如,處理器210可為微處理 器、數位訊號處理器(DSP)、微控制器等等。進一步而言, 可依據狀態機或其他序列邏輯來構成處理器210〇在運 作中,處理器210可讀取來自記憶體220的指令並因應 於該等指令而執行動作。例如,處理器210可執行能影 響在行動計算裝置110以及耦接到記憶卡插槽112之裝 置間之通訊的程式指令。 記憶卡插槽112係連同第1圖作為參考並如上所述。 記憶卡插槽112包括相容於RFID卡120的電路。行動計 算裝置110可藉由使用記憶卡存取命令之標準集合,而 與RFID卡120通訊。例如,處理器210可使用記憶卡 寫入命令’以寫入到在RFID卡120内之記憶體,並可 使用記憶卡讀取命令來從在RFID卡120内之記憶體處 讀取資料。 行動計算裝置110可使用嵌入於記憶卡存取命内之 「隱藏」命令,而存取在RFID卡120内之RFID功能》 例如,一記憶卡寫入命令可包括一唯一資料串,以將該 記憶卡寫入命令識別成一被轉移成除了記憶體寫入外之 目的之命令。此外,供給記憶卡寫入命令之該區段位址, 可被設定成一特定位址值,以進一步將記憶卡寫入命令 識別成一被轉換之命令。除了指定位址/資料值能將該記 憶卡存取命令識別成一被轉換除了記憶體存取外之目的 之命令,該記憶存取命令可包括資料位元,以進一步指 定隱藏命令的類型及功能。隱藏命令的範例格式係進一 201023662 步如下所述。在某些具體實施例中,一讀取命令在一寫 入命令後立即發佈,以啟動從非記憶卡功能到主機端之 間的資料流,其中該寫入命令的資料曾有隱藏命令。記 •憶卡寫入命令以及記憶卡讀取命令的結合可按此方式來 使用,以形成一隱藏讀取命令。 在某些具體實施例中’記憶卡插槽112係在非主動週 期之後關閉電源’以節省電力。例如,可於處理器21 〇 發佈一記憶卡寫入或讀取命令時而對記憶卡插槽112啟 動電源’但是可於之後關閉電源以節省電力。當記憶卡 插槽112被關閉電源時’任何輕接到記憶卡插槽之裝置 亦被關閉電源。例如’若RFID卡120(第1圖)被麵接 到記憶卡插槽,則當記憶卡插槽112被關閉電源時rfid 卡120亦會關閉電源。 在本發明之各具體實施例中’處理器210執行駐存在 記憶體220中之軟體,以維持對記憶卡插槽丨12 (以及 ❿ 對RFID卡120 )的電力。例如,週期性隱藏命令可為了 讓電力持續供應之目的而被發送到RFID卡12〇,同時 RFID卡120被期望能提供RFID的功能《同樣作為範例, 一隱藏命令可為了將電力循環到一駐存在卡上之智慧卡 控制器之目的’而被發送到RFID卡120。這些隱藏命令 會在以下連同後面的圖式而加以詳細描述。 第3A圖顯示一具有整合感應元件並相容於記憶卡之 RFID卡。RFID卡300代表RFID卡ι2〇 (第1圖)之可 能具體實施例。RFID卡300包括主機端介面31〇、記憶 201023662 制器340、記憶體360、智慧卡控制器340、程式記 ’、體3 32、以及小型感應元件35〇。rfid卡能夠與一在 &quot; 十算裝置内之記憶卡插槽進行通訊。進一步而言, RFID 士 ίλλ 〇〇不需要記憶卡插槽來實作出延伸的輸入/輸 出力能例如,且非為限制,在SD的具體實施例中’ 卡300能運作在任何SD記憶卡插槽中,且不需要 安全數位輸入輸出(SDIO)的記憶卡插槽。 ❿ 主機端介面310包括電子接觸,以與記憶卡插槽交互 聯繫。例如,主機端介面31〇包括了像是接觸122(第1 圖)般的接觸。同樣作為範例,在某些具體實施例中主 機端介面310包括了隱蔽的電子接觸。主機端介面 亦可包括像是驅動器、接收器、終端等等的電路。 在由第3凑圖所表示之具體實施例中,記憶卡控制器 340使用記憶卡存取命令來與行動裝置通訊。記憶卡控 制器亦可與記憶體360通訊《記憶卡控制器判斷是否各 • 命令應形成與記憶體360之記憶體運作、是否一隱藏命 令應被轉換成智慧卡控制器33〇、或是否記憶卡控制器 340應該因應⑨隱藏命令而採取行動。纟某些具體實施 例中,記憶卡控制器340執行除存在一内部記憶體内或 是儲存在記憶體360内之指令。在某些具體實施例中, 記憶卡控制器340包括特殊目的硬體,其在判斷一命令 是否應被轉換上很有用》在其他具體實施例中,記憶卡 控制器340可為-在各方面都等同於在記憶卡中所找到 之控制器的微控制器,除了其執行之程式之外。 12 201023662 可為任何類型的揮發性或非揮發性記It should be understood that the specific embodiments of the present invention are different but not mutually exclusive. For example, the specific features, structures, or characteristics of the embodiments may be practiced in other specific embodiments without departing from the spirit and scope of the invention. In addition, it is to be understood that the <RTIgt; </ RTI> <RTIgt; </ RTI> <RTIgt; </ RTI> <RTIgt; </ RTI> <RTIgt; Therefore, the following detailed description is not to be considered as limiting, and the scope of the invention is defined by the scope of the appended claims . In the drawings, like reference numerals will be used throughout the Figure 1 shows a mobile computing device and a small RFID card compatible with the memory card slot. The mobile computing device 11 is shown in Figure i as a mobile phone, but this is not a limitation of the invention. For example, the mobile computing device 110 can be a personal digital assistant (PDA), a smart phone, a mobile phone, a handheld computer, a desktop computer, or any other device capable of functioning as described herein. The mobile computing device 110 includes a memory card slot 112. The memory card slot 112 is a slot that accepts the RFID card 120. For example, the memory card slot 112 can have a physical dimension that is compatible with the RFID card 120 and can have a communication interface that operates using protocols that are compatible with the RFID card 120. As used herein, the term "memory card slot" can be any add-on slot that accepts a card with memory and can be acted upon by a mobile computing device such as the first circle. access. For example, a memory card slot can be compatible with an industry standard communication protocol, or can be compatible with the widely accepted 201023662 protocol. This communication protocol does not have to be officially incorporated into an industry standard. Compatible with the Multimedia Memory Card (MMC) protocol slot, Memory Stick DUO (Memory Stick DUO) protocol, Secure Digital (SD) protocol, and Smart Media (Sinart Media) protocol. The above list is for illustrative purposes only and is not intended to be exhaustive. In addition to the agreements explicitly set forth above, the memory card 112 may be compatible with many memory card slot agreements without departing from the scope of the present invention. The RFID card 120 includes an electronic contact 122' that is part of a host interface that can communicate with the memory card slot 112. For example, the electronic contacts 122 may provide connectivity to a memory card communication protocol. The RFID card 12 includes RFID functionality and may also include memory that is accessible by the mobile computing device 11A. For example, in some embodiments, rFid card 120 includes a smart card controller and an inductive component that can interact with an nfC reader (e.g., an ISO 14443 suitable interface). In other embodiments, the RFID card 120 does not include the φ memory. The RFID card 120 accessed by the mobile computing device 11 can include functions other than memory and RFID. In various embodiments of the present invention, the RFID functionality in the RFID card is accessed by the mobile computing device 110 using a memory card access command. The memory card access commands have been defined for the memory card. Slot 112. Accordingly, embodiments of the present invention enable the RFn) function to perform functions other than memory access without the need to define new commands. In some embodiments A, new commands for RFID are embedded in the data bits, and the new commands are followed by a memory card read/write command. The RFID card 120 then determines whether the newly entered data bit is 201023662 for the regular read/write function of the RFID function. In other words, functions other than the standard memory card function can be accessed through the "hidden" command in the data stream, which can be exchanged using existing memory card access commands and functions. In accordance with various embodiments of the present invention, both existing memory card functions and RFID functions can be implemented without requiring changes to the manner in which the host-side agreement is established. The combination of mobile computing device 110 and RFID card 120 can be used for any purpose. For example, in some embodiments, the RFID card 120 can interact with a point-for-sale payment device to achieve the effect of a mobile payment. Also as an example 'in some embodiments' the RFID card 120 can be used in a mass-transport environment for the sale of tickets in a wave and pay manner, such as MIFARE. Figure 2 shows a block diagram of a mobile computing device. The mobile computing device Π0 includes an antenna 240, a radio frequency circuit 230, a processor 210, a memory 220, and a memory card slot 丨12. In some embodiments, the action calculation β device U0 is a mobile phone, or a mobile phone function. For example, antenna 240 and RF circuitry 23 can be used to communicate with a cellular telephone network. Moreover, in some embodiments, the mobile computing device no is a wireless local area network (WLAN) or wireless wide area network (WWAN) device. For example, antenna 24A and RF circuitry 23 can be used to communicate with a wireless access point. In some embodiments, the antenna 2 and the wireless circuit 230 are ignored, and the mobile computing device i 110 is unable to utilize the wireless connection. The processor 210 represents a processor capable of communicating with other blocks shown in the mobile computing device 11A 201023662. For example, processor 210 can be a microprocessor, a digital signal processor (DSP), a microcontroller, or the like. Further, the processor 210 can be constructed in accordance with a state machine or other sequence logic. The processor 210 can read instructions from the memory 220 and perform actions in response to the instructions. For example, processor 210 can execute program instructions that affect communication between mobile computing device 110 and devices coupled to memory card slot 112. The memory card slot 112 is referenced in conjunction with Figure 1 and described above. Memory card slot 112 includes circuitry that is compatible with RFID card 120. The mobile computing device 110 can communicate with the RFID card 120 by using a standard set of memory card access commands. For example, the processor 210 can use the memory card write command 'to write to the memory within the RFID card 120 and can use the memory card read command to read data from the memory within the RFID card 120. The mobile computing device 110 can access the RFID function in the RFID card 120 using a "hidden" command embedded in the memory card access. For example, a memory card write command can include a unique data string to The memory card write command recognizes a command that is transferred to a purpose other than memory write. In addition, the sector address supplied to the memory card write command can be set to a specific address value to further identify the memory card write command as a converted command. In addition to specifying the address/data value to identify the memory card access command as a command to be converted for purposes other than memory access, the memory access command may include a data bit to further specify the type and function of the hidden command. . The sample format of the hidden command is entered into a 201023662 step as described below. In some embodiments, a read command is issued immediately after a write command to initiate a stream of data from a non-memory card function to a host side, wherein the data of the write command has a hidden command. The combination of the memory card write command and the memory card read command can be used in this manner to form a hidden read command. In some embodiments, the 'memory card slot 112 is powered off after an inactive period' to conserve power. For example, power can be initiated to memory card slot 112 when processor 21 〇 issues a memory card write or read command, but power can be turned off later to conserve power. When the memory card slot 112 is turned off, any device that is lightly connected to the memory card slot is also powered off. For example, if the RFID card 120 (Fig. 1) is face-to-face connected to the memory card slot, the rfid card 120 is also powered off when the memory card slot 112 is powered off. In various embodiments of the invention, processor 210 executes software resident in memory 220 to maintain power to memory card slot ( 12 (and ❿ to RFID card 120). For example, a periodic hidden command may be sent to the RFID card 12 for the purpose of continuing power supply, while the RFID card 120 is expected to provide the functionality of the RFID. Also as an example, a hidden command may be used to cycle power to a station. The purpose of the smart card controller on the card is transmitted to the RFID card 120. These hidden commands are described in detail below in conjunction with the following figures. Figure 3A shows an RFID card with integrated sensing elements and compatible with a memory card. The RFID card 300 represents a possible embodiment of the RFID card ι2 (Fig. 1). The RFID card 300 includes a host interface 31, a memory 201023662 controller 340, a memory 360, a smart card controller 340, a program recorder, a body 3 32, and a small inductive component 35A. The rfid card can communicate with a memory card slot in the &quot;10 computing device. Further, the RFID ίλλ 〇〇 does not require a memory card slot to achieve extended input/output force energy, for example, and is not limiting. In the specific embodiment of the SD, the card 300 can operate on any SD memory card. A memory card slot in the slot that does not require a secure digital input/output (SDIO).主机 The host interface 310 includes an electronic contact to interact with the memory card slot. For example, the host side interface 31 includes contacts such as contacts 122 (Fig. 1). Also by way of example, in some embodiments the host interface 310 includes concealed electronic contacts. The host interface can also include circuitry such as drivers, receivers, terminals, and the like. In the particular embodiment represented by the third map, the memory card controller 340 uses the memory card access command to communicate with the mobile device. The memory card controller can also communicate with the memory 360. The memory card controller determines whether each command should form a memory operation with the memory 360, whether a hidden command should be converted into a smart card controller 33, or whether it is memorized. The card controller 340 should take action in response to the 9 hidden command. In some embodiments, memory card controller 340 executes instructions in addition to being stored in internal memory or stored in memory 360. In some embodiments, memory card controller 340 includes special purpose hardware that is useful in determining whether a command should be converted. In other embodiments, memory card controller 340 can be - in various aspects It is equivalent to the microcontroller of the controller found in the memory card, except for the program it executes. 12 201023662 Can be any type of volatile or non-volatile

槽進行通訊時, 記憶體360 體。例如,, 300正與在一行動計算裝置内之記憶卡插 ,該行動計算裝置可發送一記憶卡存取命 令,以便存取記憶體36〇。同樣作為範例,該行動計算 裝置可發送一含有隱藏命令之記憶卡存取命令。記憶卡 控制器340 貞測該隱藏命令之存在,並使用通訊匯流排 342來轉移所有或部分的記憶體存取命令到智慧卡控制 器330。通訊匯流排342可具有任何數目的導線 • (C〇nduCt〇rs)並可採用任何形式。例如,通訊匯流排342 可為序列埠、並列埠、或可包括多個資料導線、多個位 指導線及/或能載送控制訊號之導線,像是時脈訊號。在 某些具體實施例中,記憶卡控制器34〇因應一隱藏命令 而採取一或更多動作。例如,記憶卡控制器34〇可因應 於一隱藏命令而修改時脈訊號。 記憶卡控制器340可用許多方式來偵測隱藏命令。例 如’在某些具體實施例中,該記憶卡存取命令可包括一 特定位址值或特定資料值。記憶卡控制器34〇偵測到包 13 201023662 括了特定位址值或特定資料值其中之一或兩者的命令, 並將該命令適當地繞送。用於此目的之該特定位址值及 特疋貝料值在此能被視為隱藏命令位址值及隱藏命令資 料值。 在某些具體實施例中’記憶卡控制器34〇能只基於隱 藏命令位址值而偵測到隱藏命令之存在^在此些具體實 施例中,記憶卡控制器340檢查含闊在一記憶卡存取命 令中的位址值,且若是該命令與該隱藏命令位址值相 符’則將其轉換(或採取某些動作)^在某些具體實施例 中’記憶卡控制器340只基於隱藏命令資料值而偵測到 隱藏命令的存在。在此些具體實施例中,記憶卡控制器 340檢查一含括在記憶卡存取命令中的資料值,且若是 該命令與該隱藏命令資料值相符,則將其轉換。在其他 進一步之具體實施例中’記憶卡控制器340能基於隱藏 命令位址值及隱藏命令資料值兩者而偵測到隱藏命令的 φ 存在。在這些具體實施例中,只在記憶卡存取位址及資 料兩者與隱藏命令位址值及隱藏命令資料值分別相符 時,記憶卡控制器340才會轉換命令。 隱藏命令位址值及隱藏命令資料值可按許多方式來指 定。例如,所有RFID卡可用固定值來發佈。在這些具 體實施例中,每次存取RFID功能時,相同的隱藏命令 位址及/或資料值被含括在記憶卡存取命令中。同樣作為 範例,不同的RFID卡可用獨一(unique)值來發佈。在此 些具體實施例中,當需要時,各RFID卡可提供這些值 201023662 行動十算裝置。同樣作為範例,隱藏命令位址及/或 資料值可由該行動計算裝置來指定。在其他進一步具體 實抱例t,隱藏命令位址及f料值可為動態。隱藏命令 位址及資料值可在每當施加電力時或是按一週期性基礎 而改變》 智慧卡控制器330接收由記憶卡控制器34〇所轉換之 隱藏命7智慧卡控制器330進一步轉譯該等隱藏命該 φ 等隱藏命令並因應於此而執行動作。智慧卡控制器330 執行儲存在程式記憶體332中之指令。在某些具體實施 例中’程式記憶體332被嵌入到智慧卡控制器33〇内, 而在其他具體實施例中’程式記憶體332是記憶體36〇 的一部分。 智慧卡控制器330是具有含括了 rFID功能之多個介 面中之一者的雙介面智慧卡控制器。在某些具體實施例 中,智慧卡是相容於在NFC應用内之被動rfid標籤讀 • 取器。例如,智慧卡控制器330可為一能夠實現所有或 部分用於無接觸NFC裝置之ISO 14443標準的裝置。同 樣作為範例,智慧卡控制器330可為能夠實現用於接觸/ 無接觸需求之ISO 7816及ISO 14443兩者的雙介面智慧 卡控制器。來自Netherlands之NXP的可用控制器的 “SmartMX”家族’為適合之雙介面智慧卡控制器的範 例。這些控制器提供了在13_56MHz上之RFID功能》本 發明之各種具韹實施例能運作在13.56MHz,但是並未限 制其只能在此頻率上運作。在某些具體實施例中,智慧 15 201023662 卡控制器與用於票卷應用之MIFARE系統交互運作。 智慧卡控制器330從該主機端介面接收電力。藉由不 從該訊問RF場接收電力的方式,能否定掉用於電力產生 之一迴路天線的必要性。智慧卡控制器33〇包括天線埠 334。天線埠334係耦接到小型感應元件35〇。 小型感應元件350包括—環繞著一磁核纏繞的線圈。 對於從該訊問RF場汲取電力而言該線圈太小了,但是由 _ 力智慧卡控制器330係由該主機端裝置通過主機端介面 310來供電,所以這方式並非很必要。小型感應元件35〇 係與在RFID讀取器内之天線互動,其互動方式近似於 主要及次要線圈在變壓器内之互動。該RFID讀取器具 有在13.56MHz共鳴的線圈,其扮演著如變壓器之主要 線般的功能。小型感應元件35〇扮演著如變壓器之次要 線般的功能。據此,該傳輸器能「看見」次要線圈(小型 感應元件350)的阻抗。智慧卡控制器334能夠使用電路 • 來調變經反射之訊號,以修改在天線埠334處之阻抗。 小型感應元件350可被做的非常小。例如,在某些具 體實施例中’ RFID卡120為一 miniSD卡,而小型感應 元件350小到足以被完整地含在該miniSD的外觀尺寸 内。在δ己憶卡外觀尺寸内之小型感應元件之指定具體實 施例係如下般參考第4圊所述。 在本發明之各具體實施例中,記憶卡控制器34〇以及 智慧卡控制器330係按許多不同的方式所實作。例如, 在某些具體實施例中,各種組件被實作成硬體。在這些 16 201023662 具體實施财,各種㈣可被實作成個別之積體電路, 或是實作成-組合式積體電路。同樣作為範例在某些 具體實施例中’各種組件可被實作成軟體,或是硬體與 軟體的組合。在某些具體實施例中,rfid卡则可包括 . —微處理器’而該等組件可被實作成運行於該微處理器 上之軟體模組。在其他具體實施例中,rfid+ 3〇〇可包 括多個處理器’而該等組件可被實作成跨越該等多個處 理器所散布的軟體模組。 第 圖顯示具有整合感應元件之記憶卡相容 卡的方塊圖。RFID卡302代表RFID卡12〇 (第1圖) 之可能具體實施例。RFID+ 3〇2包括主機端介面31〇、 «•己隐卡控制器340、記憶體360、智慧卡控制器34〇、程 式圮憶體332以及小型感應元件35〇,所有這些元件皆 如上參考第3A圖般所描述。RFID卡3〇2能夠與一在行 動叶算裝置内之3己憶卡插槽進行通訊。更進一步, φ 卡3 02不需要憶卡插槽來實作延伸的輸入/輸出功能。 例如,且非為限制,在SD具體實施例中,RFID卡3〇2 能夠運作在任何的SD記憶卡插槽中,且不需一安全數 位輸入輸出(SDIO)記憶卡插槽。 在由第3B圖所代表之具體實施例中,智慧卡控制器 33〇從記憶卡控制器340處接收電力。在這些具體實施 例中,記憶控制器340能通過對智慧卡控制器33〇提供 之電力而直接進行控制。記憶控制器34〇可因應於通過 主機端介面所接收之命令,而施加及/或移除來自智慧卡 17 201023662 控制器330之電力。例如,記憶控制器34〇可接收一隱 藏命令,以藉由透過電力循環來重新啟動之方式來重置 智慧卡控制器330。 第4圖顯不一具有整合感應元件之記憶卡相容RFID 卡的照片圖。RFID卡12〇係按一 SD卡之外觀尺寸顯示, 然此並非為本發明之限制。RFID卡12〇包括電子接觸 122、記憶卡控制器340、智慧卡控制器33〇、記憶體36〇、 磁核450、線圈452,以上全部皆被固定至電路板4〇2。 磁核450以及線圈452能實作小型感應元件35〇(第3 圖)。如照片中可見,該小型感應元件能整個裝配到記憶 卡外觀尺寸内。該小型感應元件不對智慧卡控制器33〇 提供電力之產生,故因此不須為了此目的而將尺寸做得 比較大。 第5圖,顯示一記憶卡寫入命令之資料部分。含括在 内的有隱藏命令資料值510、狀態攔52〇、密碼攔530、 • 裝置1D532、命令索引540以及隱藏命令相關資料55〇。 在第5圖之範例中,資料部分之長度為512位元組,然 此並非作為本發明之限制。任何數量之數目可被含括在 寫入命令中,而第5圖中之各攔位可為任何長度。 在第5圖之範例中,隱藏命令資料值為256位元的長 度,然此處可使用任何長度而不會悖離本發明之範圍。 在某些具體實施例中,隱藏命令資料值51〇被用來將一 s己憶體寫入命令識別成一隱藏命令。當一寫入命令接收 了 一在前256位元處擁有之資料(其與隱藏命令資料值 201023662 相符)時’該命令被識別為一正被待轉換到智慧卡控制 器之命令。如上所述,—隱藏命令位址值可被用來與一 隱藏命令值相關連或是相反地不相關連,以將該記憶體 寫入命令識別成一隱藏命令。 當記憶體寫入為一隱藏命令時,剩餘的攔位更顯其重 要性。例如,若前256個位元與隱藏命令資料值不相符 時(或若該寫入位址與該隱藏命令位址值不相符時,或 ❹ 是兩者皆是)’則在資料攔中之剩餘位元會被當成在一般 圮憶體寫入命令内之資料看待。相反地,當記憶體寫入 是一隱藏命令時,則剩餘欄位被用來進一步轉譯該隱藏 命令。 記憶卡控制器340 (第3、4圖)檢驗該隱藏命令資料 值510、狀態攔520’而可能的話還檢驗密碼攔530及裝 置ID532。在某些具體實施例中,若命令被識別成一隱 藏命令,記憶卡控制器340會將密碼530、命令索引54〇 Φ 及相關資料550前傳到智慧卡控制器330。在其他具體 實施例中,記憶卡控制器340可基於隱藏命令而直接地 採取動作。 狀態欄520可包括任何相關於隱藏命令狀態之資訊。 例如’狀態欄520可包括一或更多的位元以對記憶卡控 制器340表示該主機端(行動計算裝置)是否期望該智 慧卡能因應於該隱藏命令而回傳資料。例如,當狀態爛 520表示出一寫入之意思時,記憶卡控制器34〇會在未 期望回傳任何資料到主機端之情況下將密碼、裝置ID、 19 201023662 命令索引、及相關資料前傳。同樣作為範例,當狀態攔 表不6資取之意思時,記憶卡控制器剔會在期望 、智慧卡330將提供資料以因應於一記憶卡讀取命令而 將料發送到主機端之情況下,將密碼裝置①、命令 索引、及相關資料前傳。在其後有-記憶卡讀取命令短 暫尾隨著的S£憶卡寫人命令之結合,可被用來提供「讀 取」功能給智慧卡把备丨哭 Α Λ A ^ 卞控tl IS。來自智慧卡控制器之讀取作 業係進一步如下參考第8圖所述。 密碼欄530包括一密碼,以允許智慧卡控制器330用 該主機端對該符記⑽en)鑑別。在某些具體實施例中, 每個隱藏命令包括一密瑪。每次密碼裝置出、命令索 引、及相關資料被轉換到智慧卡控制器時,即檢查密碼 以用該主機端對該符記鑑別。 — 裝置10532獨—地識別該主機端(行動計算裝置)。該 裝置ID可由該智慧卡控制器來檢查以確保該符記被插 入到其所被㈣之主機端。本發明之某些具體實施例會 使用裝置m來加強獨一主機端/卡組對,而其他且體實 施例允許智慧卡控制器之功能能由任何主機端來存取。 命令索引540識別隱藏命令之類型。可能的隱藏命令 之數目是只有受限於配置於其上之位元數目。任何數目 的位元可被配置到命令索引54〇,而不會背離本發明之 範圍。隱藏命令相關資料550可針對隱藏命令之各類型 而不同地使用。任何數目的位元 資料550。 了被用於隱臧命令相關 20 201023662 :第5圖中所示之資料係當做一範例來提供而記憶 卡存取命令之資料攔位可包括相較在第5圖中所示資^ 欄位下更多或更少的資料棚 y、 .卡存取命令内之攔位:::::本發明未受限於在記憶 . 帛圖根據本發明之各種具體實施例而顯示一流程 圖。在某些具體實施例中’方法6〇〇可由一行動計算裝 置所使用,以與在記憶卡插槽内之rfid卡進行通訊。 ❿在某些具體實施例中,方法_,或是其部分,係由一 具有記憶卡插槽之行動計算裝置所執行,而在其他具體 實施例中’方法_,或是其部分,係由軟體所執行。 在方法600内之各式動作可按所呈現之順序按不同順 序、或是同時地執行。更進一步,在某些具體實施例中, 歹J於第6圓内之某些動作會從方法6〇〇中忽略。 方法600開始於61〇,其中一資料圖樣(邮叫以及一 位址值係從一在記憶卡插槽内之rfid卡處接收。資料 ❹㈣對應㈣藏命令f料值,而位址值對應到隱藏命令 位址值。在某些具體實施例中,行動裝置只接收資料值, 而在其他具體實施例中,行動裝置只接收位址值。在某 些具體實施例中,當RFID+首次插入到記憶卡插槽時, 610之動作會發生一次。每當行動裝置建立了一隱藏命 7時,該行動計算裝置則可使用位址及資料值。在其他 具趙實施例中,每次RFID卡被插入到記憶卡插槽時, 則會發生610之動作。在更進一步之具體實施例中,資 料圖樣可為相同或不同,而位址值可為相同或不同。 21 201023662 在620處,記憶卡存取命令之 貢枓攔位會被資料圖樣 所填滿(populated)’使得命令被轉換到在RFm卡上之智 慧卡,,資料圖樣可被當成隱藏命令資料值川而 寫入到資料攔位(第5圖)。 在630處,該記憶卡存取命令之一位址搁位會被位址 值填滿’以進-步使得命令被轉換到智慧卡控制器。在 某些具體實施例中,只有620或63〇其中之一被使用。 ㈣些具體實施例中,隱藏命令的存在係單獨由資料圖 ® 樣或是單獨由位址值所表示。 在640處,記憶卡存取命令之資料攔位係用一命令字 串所填滿,以指定除了記憶卡存取之外的目的。例如, 命令子串可被寫入到資料欄以當成用於該智慧卡控制器 之命令索引54〇。此命令可被用於任何目的上。例如, 一或更多之隱藏命令可有一維持對記憶卡插槽提供電力 之唯一目的,使得該RFID卡持續接收電力。 φ 在650處,記憶卡存取命令之資料攔位係用一密碼鎖 填滿’以鑑別輕接到記憶卡插槽之RFID卡之存取。在 某些具體實施例中,一密碼被含括在每個隱藏命令之資 料攔位中。在其他具體實施例中,一密碼只被含括在一 交換之開始處。 在660處,記憶卡存取命令被發送到耦接至記憶卡插 槽之RFID卡。例如,一行動計算裝置(11 〇,第1、2圖) 可發送記憶卡存取命令到一在記憶卡插槽(112,第1、2 圖)内之RFID卡(120,第1、3、4圖)。RFID卡包括記 22 201023662 憶卡控制器(340、第3圖)以基於在方法600内所填之資 料攔位來轉換命令。 第7圖根據本發明之各具體實施例來顯示一流程圖。 在某些具鱧實施例中’方法糊可由一在記憶卡插槽内 ID卡所使用。在某些具體實施例中’方法7⑽或 T其部分’係'由在記憶卡相容RFID +内之記憶卡控制 器所執行’而在其他具體實施例中,方&amp; 700,或是其 部分’係由軟體所執行。在方法7〇〇中之各種動作可按 所呈現之順序、按不同順序、或是同時地執行。更進一 步在某些具體實施例中,列於第7圖内之某些動作會 從方法700中忽略。 方法700開始於71〇處,其中一記憶卡存取命令係從 行動什算裝置經由-主機端介面所接收。71〇之動作 係對應到在行動計算裝置之記憶卡插槽内(RFm卡, 其接收一記憶卡存取命令。 • 在720處,記憶卡控制器檢查在記憶卡存取命令中之 準則’以判斷該記憶卡存取命令是否應該被轉換成駐存 在RFID卡上之智慧卡控制器。該準則可為—隱藏命令 資料值或-隱藏命令位址值其中之—或兩者。若在73〇 處有-準則相符’則呈現—隱藏命令且該記憶卡存取 命令之至少-部分會在74〇處被轉換。若沒有準則是相 符的,則沒有隱藏命令會被呈現,並在75()處執行記憶 體存取。 第8圖顯示根據本發明之各具體實施例來顯示一流程 23 201023662 =在某些具體實施例中,方法_可由—在記 灿卡所使用。在某些具體實施例中,方法_, ^其部分,係由在RFID卡内之記憶卡控制器所執行, 而在其他具體實施例中’方法刚,或是其部分,係由 :體所執行。在方法800中之各種動作可按所呈現之順 序、按不同順序、或是同時地執行。更進一步在某些 具體實施例中,列於第8圖 ❹ 中忽略。丨於第8圖内之某些動作會從方法卿 方法800開始於810處,其中一記憶卡存取命令係從 -仃動計算裝置經由一主機端介面所接收。若記憶卡寫 入命令被判斷為是—隱藏命令’則處理程序持績到8化 否則則在830處執行記憶體寫入。 在840處,隱藏命令被轉換到智慧卡控制器。若在㈣ 處隱藏命令被判斷成是「讀取」,則處理程序在86〇處持 續’否則’即視為完成隱藏命令處理程序。在處, 記憶卡控制器會從智慧卡_器_取非記憶體資料, 而在請4 ’會從行動計算裝置處接收記憶卡讀取命 令。在_處,非記憶體資料會被回傳到行動計算裝置。 方法800展示了一行動計算裝置如何可從一在記憶卡 相容RFID卡内之智慧卡控制器處執行讀取的方式。行 動计算裝置發佈了-具有隱藏命令之記憶卡寫入命令, 該隱藏命令具有一表示讀取之狀態攔位,而然後該行動 計算裝置會發佈一記憶卡讀取命令。在卡片中之處理程 ,序接收該隱藏命令’將其識別為讀取,而然後因應於隨 24 201023662 後之記憶卡讀取命令而將資料回傳到行動計算裝置。 第9圖顯示根據本發明之各具體實施例來顯示 圖。在某些具體實施例中,方法_可由-在記恃:插 槽:之咖卡所使用。在某些具體實施例中,方法则, 或疋其部分,係由在rfid卡内之智慧卡控制器所執行, 而在其他具體實施财,方法_,或是其部分,係由 軟體所執行。在方法900中之各種動作可按所呈現之順 e 序、按不同順序、或是同時地執行。更進一步,在某些 具趙實施例中’列於第9圖内之某些動作會從方法9;0 中忽略。 方法900開始於91〇處,其中一智慧卡存取命令從該 記憶卡控制器接收-命令^此命令對應到—由記憶卡控 制器所接收之隱藏命令。在95()處,該智慧卡控制器判 斷該命令是否為「虛擬」(dummy)命令,其主要用於維持 對該記憶卡插槽之電力的目的。若否,則在命令中所指 ❹ 定之智慧卡功能會在930處執行。若是,則在96〇處忽 視該命令。 方法900能在當在主機裝置内之記憶卡插槽將會移除 電力以節省能源時之週期期間,允許一在記憶卡插槽内 之記憶卡相容RFID卡能仍然保持著供電的狀態。此為 在記憶卡存取命令内之軟體建構隱藏命令、將隱藏命令 轉換到智慧卡控制器之記憶卡控制器、以及忽略該命令 之智慧卡控制器之間的合作努力。根據由第3A圖所代表 的具體實施例,提供電力給R]FID之方式亦提供電力給 25 201023662 智慧卡控制器,借此允許小型感應裝置的使用,像是螺 第3及4圖所示般。 第10圖根據本發明之各具體實施例來顯示一流程 圖°在某些具體實施例中,方法1 〇〇〇可由一在記憶卡插 槽内之RFID卡所使用。在某些具體實施例中,方法9〇〇, 或是其部分,係由在RFID卡内之記憶卡控制器所執行, 而在其他具體實施例中,方法900,或是其部分,係由 軟體所執行。在方法9〇〇中之各種動作可按所呈現之順 序、按不同順序、或是同時地執行。更進一步,在某此 具體實施例中,列於第10圖内之某些動作會從方法1〇〇〇 中忽略。 方法1000開始於1010處,其中一記憶卡控制器從一 打動計算裝置處接收一隱藏命令。若在1020處,該記憶 卡控制器判斷該隱藏命令正待被轉換到智慧卡控制器, 則該命令在1030處被轉換。若該命令未準備被轉換,則 • 該記憶卡控制器不會轉換該命令;然而,在1〇40處該記 憶卡控制器可基於該隱藏命令而採取其他動作。例如, 該記憶卡控制器可修改-提供給智慧卡控制器之時脈訊 號。同樣作為範例,記憶卡控制器可判定(assert)一重置 信號給該智慧卡控制器。仍㈣為範例,該記憶卡控制 器可修改對該智慧卡控制器之電力傳遞。在由第π圖所 表示之具體實施例中,該記憶卡控制器能夠修改對該智 慧卡控制器的電力傳遞。電力傳遞可藉由移除電力、施 用電力、循環電力等方式來修改。 26 201023662 修改對該智慧卡控制器的電力傳遞之步驟可為在主機 端計算裝置及RFID卡内之記憶卡控制器之間的合作努 力。例如,供應至該記憶卡插槽之電力可藉由將虛擬隱 藏命令供給至RFID卡之方式來維持,可參考第9圖如 上般所述。當電力被持續供應至記憶卡插槽時,可使用 隱藏命令,以使得記憶卡控制器能將電力修改、施用或 循環到智慧卡控制器。 ❿ 電力傳遞之修改可允許額外的安全特徵。例如,關閉 對該智慧卡控制器之電力,會顯示該智慧卡為非運作狀 態,而因此可讓劣質的讀取器避免掉會對卡片進行不必 要的讀取。由於天線以要對智慧卡控制器提供足夠電力 而言太小,為了能適當地運作卡片的讀取功能,則需要 從記憶卡控制器或是從主機端介面處得到電力。 第11圖顯示一種讓一行動計算裝置對在一記憶卡相 容RFID卡内之一或更多功能鑑別之方法。方法i 1〇〇開 ❹ 始於方塊U1〇,其中一啟動碼係在RFID卡處從行動計 算裝置所接收。在1120,已接收之啟動碼係與儲存在 RFID卡内之編碼相比較。若啟動碼相符,則在i 14〇處 RFID卡從行動計算裝置接收一密碼,並在115〇處將密 碼儲存在RFID卡内以於之後使用。若啟動碼不相符, 則在1160處RFID卡判斷可允許嘗試之數目是否已經超 過。若可允許嘗試之數目已經超過,則在117〇處接觸 RFID卡發佈者,而若可允許嘗試之數目尚未超過,則該 方法會重複嘗試直到不是該啟動碼相符就是可允許嘗試 27 201023662 之數目已經超過為止β 當一 RFID卡被發佈給一使用者時,可執行方法110〇β 例如,RFID卡可為一行動式支付卡(payment ,其 由一金融機構所發佈。可提供使用者一啟動碼,以「啟 動」該RFID卡。當使用者成功地輸入該啟動碼時,會 提供使用者一組密碼,而該密碼會被儲存以待在未來隱 藏命令上之使用。 φ 在某些具體實施例中,在RFID卡内之多個非記憶體 功能係使用方法1100來鑑別。例如,多個非記憶體功能 各者可具有已儲存之啟動碼,而各功能已分別被啟動。 而各個分別啟動之功能可具有不同的密碼,或者該等多 個功能可共享一密碼。 雖然本發明已經連同若干具體實施例加以描述’吾人 應了解到可在不背離本發明之精神與範圍的情形下,如 該領域中熟悉記憶人士所能輕易理解般地加以修改及變 • 化。此類修改及變化被認為是落在本發明及隨附申請專 利範圍之範疇内。 【圖式簡單說明】 第1圖顯示一行動計算裝置以及一與記憶卡差曹相容 之小型RFID卡; 第2圖顯示一行動計算裝置之方塊圖; 第3A-3B圖顯示具有整合感應元件之記憶卡相容 28 201023662 RFID卡的方塊圖; 第4圖顯示具有一整合感應元件之記憶卡相容RFID 卡的照片, 第5圖顯示一記憶體寫入命令之資料部分; 第6-11圖顯示根據本發明之各具體實施例之方法的流 程圖; 第12圖顯示在存在著一訊問RF場的情況下,藉由整 流在一迴路天線内所感應之電壓而隨著時間所發展的電 Φ 源供應電壓;以及 第13圖顯示在一安全數位(SD)記愧卡中之一先 術之RFID標籤實作。 用 【主要元件符號說明】 110行動計算裝置 112記憶卡播槽 , 120 RFID 卡 122電子接觸 210處理器 220記憶體 230無線射頻電路 240天線 310主機端介面 330智慧卡控器 29 201023662 332程式記憶體 3 3 4天線埠 340記憶卡控制器 342通訊匯流排 350小型感應元件 360記憶體 402電路板 450磁核 452核線圈When the slot is communicating, the memory body is 360. For example, 300 is being inserted into a memory card within a mobile computing device that can transmit a memory card access command to access memory 36. Also as an example, the mobile computing device can send a memory card access command with a hidden command. The memory card controller 340 detects the presence of the hidden command and uses the communication bus 342 to transfer all or part of the memory access command to the smart card controller 330. The communication bus 342 can have any number of wires • (C〇nduCt〇rs) and can take any form. For example, the communication bus 342 can be a serial port, a parallel port, or can include a plurality of data wires, a plurality of bit guide lines, and/or a wire capable of carrying a control signal, such as a clock signal. In some embodiments, the memory card controller 34 takes one or more actions in response to a hidden command. For example, the memory card controller 34 can modify the clock signal in response to a hidden command. The memory card controller 340 can detect hidden commands in a number of ways. For example, in some embodiments, the memory card access command can include a particular address value or a particular data value. The memory card controller 34 detects the packet 13 201023662 A command that includes one or both of a specific address value or a specific data value, and appropriately routes the command. The particular address value and special shell value used for this purpose can be considered here as a hidden command address value and a hidden command data value. In some embodiments, the 'memory card controller 34' can detect the presence of a hidden command based solely on the hidden command address value. In these embodiments, the memory card controller 340 checks for a wide memory in a memory. The address value in the card access command, and if the command matches the hidden command address value, then it is converted (or taken some action). ^ In some embodiments, the memory card controller 340 is based only on The command data value is hidden and the presence of a hidden command is detected. In such embodiments, the memory card controller 340 checks a data value included in the memory card access command and converts the command if it matches the hidden command data value. In still other embodiments, the memory card controller 340 can detect the presence of a φ of the hidden command based on both the hidden command address value and the hidden command data value. In these embodiments, the memory card controller 340 will only switch commands if both the memory card access address and the data match the hidden command address value and the hidden command data value, respectively. Hiding command address values and hiding command data values can be specified in a number of ways. For example, all RFID cards can be released with a fixed value. In these specific embodiments, the same hidden command address and/or data value is included in the memory card access command each time the RFID function is accessed. Also as an example, different RFID cards can be released with unique values. In these specific embodiments, each RFID card can provide these values when needed. Also as an example, the hidden command address and/or data value may be specified by the mobile computing device. In other further examples, the hidden command address and the f-value can be dynamic. The hidden command address and the data value may be changed each time power is applied or on a periodic basis. The smart card controller 330 receives the hidden memory 7 smart card controller 330 converted by the memory card controller 34 to further translate. These hidden commands include hidden commands such as φ and perform actions in response to this. The smart card controller 330 executes the instructions stored in the program memory 332. In some embodiments, the program memory 332 is embedded in the smart card controller 33, while in other embodiments the program memory 332 is part of the memory 36'. The smart card controller 330 is a dual interface smart card controller having one of a plurality of interfaces including the rFID function. In some embodiments, the smart card is a passive rfid tag reader that is compatible with the NFC application. For example, smart card controller 330 can be a device that implements all or part of the ISO 14443 standard for contactless NFC devices. Also as an example, the smart card controller 330 can be a dual interface smart card controller capable of implementing both ISO 7816 and ISO 14443 for contact/contactless requirements. The "SmartMX" family of controllers available from NXP in Netherlands is an example of a suitable dual interface smart card controller. These controllers provide RFID functionality at 13-56 MHz. Various embodiments of the present invention operate at 13.56 MHz, but are not limited to operating at this frequency. In some embodiments, the Smart 15 201023662 card controller interacts with the MIFARE system for ticketing applications. The smart card controller 330 receives power from the host interface. By not receiving power from the interrogating RF field, the necessity of a loop antenna for power generation can be negated. The smart card controller 33 includes an antenna 334 334. The antenna 埠 334 is coupled to the small inductive element 35A. The small inductive element 350 includes a coil wound around a magnetic core. The coil is too small for drawing power from the interrogating RF field, but the power card controller 330 is powered by the host device through the host interface 310, so this method is not necessary. The small inductive component 35 interacts with the antenna within the RFID reader and interacts in a manner similar to the interaction of the primary and secondary coils within the transformer. The RFID reader has a coil that resonates at 13.56 MHz, which functions as a main line of a transformer. The small inductive component 35〇 functions as a secondary line of the transformer. Accordingly, the transmitter can "see" the impedance of the secondary coil (small sensing element 350). The smart card controller 334 can use the circuitry to modulate the reflected signal to modify the impedance at the antenna 埠 334. The small sensing element 350 can be made very small. For example, in some embodiments the RFID card 120 is a miniSD card and the small inductive component 350 is small enough to be completely contained within the apparent size of the miniSD. The specific embodiment of the small inductive element within the apparent size of the delta memory card is as described below with reference to Section 4. In various embodiments of the invention, the memory card controller 34A and the smart card controller 330 are implemented in a number of different manners. For example, in some embodiments, the various components are implemented as hardware. In these 16 201023662 implementations, various (4) can be implemented as individual integrated circuits, or as a combined-composite integrated circuit. Also by way of example, in some specific embodiments, the various components can be implemented as a software, or a combination of hardware and software. In some embodiments, the RFID card can include a - microprocessor ' and the components can be implemented as a software module running on the microprocessor. In other embodiments, rfid+3〇〇 can include multiple processors&apos; and the components can be implemented as software modules interspersed across the plurality of processors. The figure shows a block diagram of a memory card compatible card with integrated sensing elements. The RFID card 302 represents a possible embodiment of the RFID card 12 (Fig. 1). The RFID+3〇2 includes a host interface 31〇, a “• hidden card controller 340, a memory 360, a smart card controller 34”, a program memory 332, and a small sensing element 35〇, all of which are referred to above. 3A is as described. The RFID card 3.1 can communicate with a three-memory card slot in the mobile computer device. Further, the φ card 322 does not require a memory card slot to implement an extended input/output function. For example, and not by way of limitation, in an SD embodiment, the RFID card 3〇2 can operate in any SD memory card slot without the need for a secure digital input/output (SDIO) memory card slot. In the particular embodiment represented by Figure 3B, the smart card controller 33 receives power from the memory card controller 340. In these embodiments, the memory controller 340 can be directly controlled by the power provided by the smart card controller 33A. The memory controller 34 can apply and/or remove power from the smart card 17 201023662 controller 330 in response to commands received through the host interface. For example, the memory controller 34 can receive a hidden command to reset the smart card controller 330 by re-starting through power cycling. Figure 4 shows a photo of a memory card compatible RFID card with integrated sensing components. The RFID card 12 is displayed in an apparent size of an SD card, which is not a limitation of the present invention. The RFID card 12 includes an electronic contact 122, a memory card controller 340, a smart card controller 33A, a memory 36A, a magnetic core 450, and a coil 452, all of which are fixed to the circuit board 4〇2. The magnetic core 450 and the coil 452 can be implemented as a small inductive element 35 (Fig. 3). As can be seen in the photo, the small sensing element can be assembled into the overall size of the memory card. The small inductive component does not provide power to the smart card controller 33, so it is not necessary to make the size larger for this purpose. Figure 5 shows the data portion of a memory card write command. Included are hidden command data values 510, status bar 52 密码, password block 530, device 1D 532, command index 540, and hidden command related information 55 〇. In the example of Fig. 5, the length of the data portion is 512 bytes, which is not a limitation of the present invention. Any number of numbers can be included in the write command, and each of the blocks in Figure 5 can be of any length. In the example of Figure 5, the hidden command data value is 256 bits long, although any length can be used herein without departing from the scope of the invention. In some embodiments, the hidden command data value 51 is used to identify a s replied write command as a hidden command. When a write command receives a data owned by the first 256 bits (which matches the hidden command data value 201023662), the command is recognized as a command to be converted to the smart card controller. As noted above, the hidden command address value can be used to correlate or otherwise be unrelated to a hidden command value to identify the memory write command as a hidden command. When the memory is written as a hidden command, the remaining blocks are more important. For example, if the first 256 bits do not match the hidden command data value (or if the write address does not match the hidden command address value, or ❹ is both), then in the data block The remaining bits are treated as if they were in the general memory write command. Conversely, when the memory write is a hidden command, the remaining fields are used to further translate the hidden command. Memory card controller 340 (Figs. 3 and 4) verifies the hidden command data value 510, status bar 520' and, if possible, the password bar 530 and device ID 532. In some embodiments, if the command is recognized as a hidden command, the memory card controller 340 forwards the password 530, the command index 54 〇 Φ, and the associated material 550 to the smart card controller 330. In other embodiments, memory card controller 340 can take action directly based on hidden commands. Status bar 520 can include any information related to the status of the hidden command. For example, the status bar 520 can include one or more bits to indicate to the memory card controller 340 whether the host side (mobile computing device) desires the smart card to return data in response to the hidden command. For example, when the status rotten 520 indicates a write meaning, the memory card controller 34 will forward the password, device ID, 19 201023662 command index, and related data without expecting to return any data to the host. . Similarly, as an example, when the status bar is not the same, the memory card controller will be in the expectation that the smart card 330 will provide the data in response to a memory card read command to send the material to the host. , forward the cryptographic device 1, command index, and related materials. The combination of the S memory card writer command followed by the memory card read command can be used to provide the "read" function to the smart card to cry Α ^ A ^ tl control tl IS. The reading operation from the smart card controller is further described below with reference to Fig. 8. The password field 530 includes a password to allow the smart card controller 330 to authenticate the token (10) en with the host. In some embodiments, each hidden command includes a milma. Each time the cryptographic device is out, the command index, and the related data are converted to the smart card controller, the password is checked to authenticate the token with the host. - Device 10532 uniquely identifies the host (mobile computing device). The device ID can be checked by the smart card controller to ensure that the token is inserted into the host side of (4) it is being inserted. Some embodiments of the present invention use device m to enhance a unique host/card pair, while other embodiments allow the smart card controller functionality to be accessed by any host. The command index 540 identifies the type of hidden command. The number of possible hidden commands is limited only by the number of bits configured on them. Any number of bits can be configured to the command index 54 without departing from the scope of the present invention. The hidden command related material 550 can be used differently for each type of hidden command. Any number of bit data 550. Used to conceal command related 20 201023662: The data shown in Figure 5 is provided as an example and the data block of the memory card access command may include the field shown in Figure 5 More or less of the data store y, the bar within the card access command::::: The invention is not limited by the memory. A flowchart is shown in accordance with various embodiments of the present invention. In some embodiments, the method 6 can be used by a mobile computing device to communicate with an rfid card within the memory card slot. In some embodiments, the method_, or a portion thereof, is performed by a mobile computing device having a memory card slot, while in other embodiments the 'method_, or portion thereof, is The software is executed. The various actions within method 600 can be performed in a different order, or concurrently, in the order presented. Still further, in some embodiments, some of the actions of 歹J in the sixth circle are ignored from method 6〇〇. The method 600 begins at 61 〇, where a data pattern (mailing and address value is received from an rfid card in the memory card slot. The data ❹ (4) corresponds to (4) the storage command f material value, and the address value corresponds to The command address value is hidden. In some embodiments, the mobile device only receives the data value, while in other embodiments, the mobile device only receives the address value. In some embodiments, when the RFID+ is first inserted In the memory card slot, the action of 610 occurs once. Whenever the mobile device establishes a hidden life 7, the mobile computing device can use the address and the data value. In other embodiments, each RFID card When inserted into the memory card slot, action 610 occurs. In still further embodiments, the data patterns may be the same or different, and the address values may be the same or different. 21 201023662 At 620, memory The card access command's tribute block will be populated by the data pattern so that the command is converted to the smart card on the RFm card. The data pattern can be written as a hidden command data value and written to the data block. Bit (Fig. 5). At 630, one of the memory card access commands will be filled with the address value's step-by-step so that the command is converted to the smart card controller. In some implementations In the example, only one of 620 or 63 is used. (4) In some embodiments, the existence of the hidden command is represented by the data sheet alone or by the address value alone. At 640, the memory card is accessed. The data block of the command is filled with a command string to specify a purpose other than memory card access. For example, the command substring can be written to the data field as a command for the smart card controller. Index 54. This command can be used for any purpose. For example, one or more hidden commands can have the sole purpose of maintaining power to the memory card slot so that the RFID card continues to receive power. φ At 650, The data barrier of the memory card access command is filled with a PIN lock to authenticate the access of the RFID card that is lightly coupled to the memory card slot. In some embodiments, a password is included in each of the hidden Command data in the block. In other concrete In the example, a password is only included at the beginning of the exchange. At 660, the memory card access command is sent to the RFID card coupled to the memory card slot. For example, a mobile computing device (11 〇, 1, 2)) The memory card access command can be sent to an RFID card (120, pictures 1, 3, 4) in the memory card slot (112, pictures 1, 2). The RFID card includes record 22 201023662 The memory card controller (340, Fig. 3) converts commands based on data intercepts filled in method 600. Figure 7 shows a flow chart in accordance with various embodiments of the present invention. In the example, the method paste can be used by an ID card in a memory card slot. In some embodiments, 'method 7 (10) or T portion is 'received' by a memory card controller within the memory card compatible RFID + Execution 'and in other embodiments, the square &amp; 700, or part thereof' is performed by the software. The various actions in method 7 can be performed in the order presented, in a different order, or concurrently. Further, in some embodiments, some of the actions listed in Figure 7 are ignored from method 700. The method 700 begins at 71 ,, where a memory card access command is received from the mobile device via the host interface. The action of the 71〇 corresponds to the memory card slot in the mobile computing device (RFm card, which receives a memory card access command. • At 720, the memory card controller checks the criteria in the memory card access command' To determine whether the memory card access command should be converted into a smart card controller resident on the RFID card. The criterion can be either - hidden command data value or - hidden command address value - or both. If there is a - criterion match, then the - hide command and at least part of the memory card access command will be converted at 74. If no criteria are met, no hidden command will be presented, and at 75 ( Performing a memory access. Figure 8 shows a flow 23 in accordance with various embodiments of the present invention. 201023662 = In some embodiments, the method _ can be used in a card. In the embodiment, the method_, ^ part is performed by the memory card controller in the RFID card, and in other specific embodiments, the method is just, or part of it, is performed by the body. Various actions in 800 Executed in the order presented, in a different order, or simultaneously. Further in some embodiments, it is omitted in Figure 8. Some of the actions in Figure 8 will be from the method method. 800 begins at 810, wherein a memory card access command is received from the sway computing device via a host interface. If the memory card write command is determined to be a _hidden command, then the handler is rated to 8 Otherwise, the memory write is performed at 830. At 840, the hidden command is converted to the smart card controller. If the hidden command at (4) is judged to be "read", the handler continues at 86 ' 'otherwise 'It is considered to complete the hidden command handler. In the meantime, the memory card controller will take the non-memory data from the smart card_me, and the memory card read command will be received from the mobile computing device. The non-memory data is then passed back to the mobile computing device. Method 800 illustrates how a mobile computing device can perform reading from a smart card controller within a memory card compatible RFID card. hair Layout - a memory card write command with a hidden command, the hidden command has a status check indicating the read, and then the mobile computing device issues a memory card read command. The process in the card, the sequential receive The hidden command 'recognizes it as a read and then passes the data back to the mobile computing device in response to the memory card read command following 24 201023662. Figure 9 shows a display according to various embodiments of the present invention. In some embodiments, the method _ can be used in the note: slot: the card. In some embodiments, the method, or part of it, is the wisdom in the rfid card. The card controller executes, and in other specific implementations, methods, or portions thereof, is executed by the software. The various actions in the method 900 can be in the order of the presented, in a different order, or simultaneously. Execution. Further, some of the actions listed in Figure 9 in some of the Zhao embodiments are ignored from Method 9; The method 900 begins at 91 ,, where a smart card access command receives a command from the memory card controller - the command corresponds to a hidden command received by the memory card controller. At 95 (), the smart card controller determines if the command is a "dummy" command that is primarily used to maintain power to the memory card slot. If not, the smart card function specified in the command will be executed at 930. If so, ignore the command at 96 。. The method 900 can allow a memory card compatible RFID card within the memory card slot to remain powered while the memory card slot within the host device is being removed to save power. This is a cooperative effort between constructing a hidden command in the software within the memory card access command, a memory card controller that converts the hidden command to the smart card controller, and a smart card controller that ignores the command. According to the specific embodiment represented by FIG. 3A, the manner of providing power to the R]FID also provides power to the 25 201023662 smart card controller, thereby allowing the use of a small inductive device, as shown in Figures 3 and 4. Like. Figure 10 shows a flow diagram in accordance with various embodiments of the present invention. In some embodiments, method 1 can be used by an RFID card in a memory card slot. In some embodiments, the method 9〇〇, or a portion thereof, is performed by a memory card controller within the RFID card, while in other embodiments, the method 900, or portions thereof, is performed by The software is executed. The various actions in method 9 can be performed in the order presented, in a different order, or concurrently. Further, in some embodiments, some of the actions listed in Figure 10 are ignored from Method 1〇〇〇. Method 1000 begins at 1010 with a memory card controller receiving a hidden command from a touch computing device. If at 1020, the memory card controller determines that the hidden command is about to be converted to the smart card controller, the command is converted at 1030. If the command is not ready to be converted, then • the memory card controller does not convert the command; however, at 1 to 40 the memory card controller can take other actions based on the hidden command. For example, the memory card controller can modify the clock signal provided to the smart card controller. Also as an example, the memory card controller can assert a reset signal to the smart card controller. Still (4) as an example, the memory card controller can modify the power transfer to the smart card controller. In a particular embodiment represented by the πth diagram, the memory card controller can modify the power transfer to the smart card controller. Power transfer can be modified by removing power, applying power, circulating power, and the like. 26 201023662 The step of modifying the power transfer to the smart card controller can be a collaborative effort between the host computing device and the memory card controller within the RFID card. For example, the power supplied to the memory card slot can be maintained by supplying a virtual hidden command to the RFID card, as described above with reference to Figure 9. When power is continuously supplied to the memory card slot, a hidden command can be used to enable the memory card controller to modify, apply, or recycle power to the smart card controller.修改 Modification of power delivery may allow for additional security features. For example, turning off the power to the smart card controller will show that the smart card is inactive, and therefore allows the inferior reader to avoid unnecessary reading of the card. Since the antenna is too small to provide sufficient power to the smart card controller, in order to properly operate the card reading function, it is necessary to obtain power from the memory card controller or from the host interface. Figure 11 shows a method for authenticating a mobile computing device to one or more functions within a memory card compatible RFID card. The method i 1 starts 方块 starting at block U1〇, where an activation code is received at the RFID card from the mobile computing device. At 1120, the received activation code is compared to the code stored in the RFID card. If the activation code matches, the RFID card receives a password from the mobile computing device at i 14 , and stores the password in the RFID card at 115 以 for later use. If the activation codes do not match, then at 1160 the RFID card determines if the number of allowed trials has been exceeded. If the number of allowable attempts has been exceeded, then the RFID card issuer is contacted at 117, and if the number of allowable attempts has not been exceeded, then the method will repeat the attempt until the start code is not matched to allow the number of attempts 27 201023662 Exceeding β When an RFID card is issued to a user, the executable method 110〇β, for example, the RFID card can be a mobile payment card (payment, which is issued by a financial institution. The user can be provided to start The code is to "activate" the RFID card. When the user successfully enters the activation code, the user is provided with a set of passwords that will be stored for use in future hidden commands. In an embodiment, multiple non-memory functions within the RFID card are authenticated using method 1100. For example, each of the plurality of non-memory functions may have a stored boot code, and each function has been activated separately. The separately activated functions may have different passwords, or the multiple functions may share a password. Although the invention has been described in connection with several specific embodiments' It is to be understood that modifications and variations can be readily made without departing from the spirit and scope of the invention, as those skilled in the art can readily understand. And the scope of the patent application. [Simplified description of the drawings] Figure 1 shows a mobile computing device and a small RFID card compatible with the memory card; Figure 2 shows a block diagram of a mobile computing device; -3B shows a block diagram of a memory card compatible 28 201023662 RFID card with integrated sensing elements; Figure 4 shows a photo of a memory card compatible RFID card with an integrated sensing element, Figure 5 shows a memory write command The data portion; Figures 6-11 show a flow chart of a method in accordance with various embodiments of the present invention; Figure 12 shows the induction in a loop antenna in the presence of an interrogating RF field The voltage and the electrical Φ source supply voltage developed over time; and Figure 13 shows the implementation of one of the first RFID tags in a secure digital (SD) memory card. Description] 110 mobile computing device 112 memory card slot, 120 RFID card 122 electronic contact 210 processor 220 memory 230 wireless RF circuit 240 antenna 310 host interface 330 smart card controller 29 201023662 332 program memory 3 3 4 antenna 埠340 memory card controller 342 communication bus 350 small inductive component 360 memory 402 circuit board 450 magnetic core 452 core coil

Claims (1)

201023662 七、申請專利範圍: 一種對一記憶卡相容之附加插槽維持未受干擾之電 力的方法,該方法包含週期性地對該記憶卡相容附加插 槽發送記憶卡寫入命令。 2. 如申請專利範園第1項所述之方法,其中該等記憶卡 寫入命令包括在一資料欄之一隱藏命令。 3. 如申請專利範圍第丨項所述之方法,其中該等記憶卡 寫入命令包括-獨一性資料字串,以江該記憶卡寫入命 令識別成具有一隱藏命令。 4.如申請專利範圍第1項所述之方法,其中週期性地發 送記憶卡寫人命令之步驟包括將在該記憶卡 槽内被一裝置所忽略的障葳合入^ 附加插 參 入命令。 略的隱藏命令,集結成該等記憶卡寫 πW返之方法,其中 如甲請專利範 蠟瑚性地發 :記:卡寫入命令到—記憶卡相容附 步驟: 括,發送該等記憶卡寫人命令到下列其中—者步驟包 一 SD插槽、一迷你SD 槽、或一微SD插槽。 6. —種修改對一雙介 9慧卡控制器之電力傳遞的方 31 201023662 法,該方法包含以下步驟: 入將一隱藏命令嵌入到一記憶卡寫入命令内,該隱藏命 7係對在—記憶卡相容無線射頻識別(RFID)卡上之雙 介面智慧卡控制器’指定進行電力傳遞之修改;以及 將該5己憶卡寫入命令發送到該記憶卡相容rfid卡。 7. 如申請專利範圍第6項所述之方法,其中發送該記憶 ❿ ^寫入命令到該記憶卡相容RFm卡之步驟包括,將該 記憶卡命令發送到一記憶卡插槽。 8. 如申請專利範圍第7項所述之方法,其中發送該記憶 卡寫入命令到該記憶卡插槽之步驟包括,發送該記憶卡 命令到下列其中一者: - SD插槽、一迷你SD插槽、或一微SD插槽。 ❹9’如中請專利範圍第6項所述之方法,其中將—隱藏命 V敌入到1憶卡寫人命令内之步驟包括,將—資料字 串含括到該記憶卡寫人命令内,以將該記憶卡寫入命令 識別成一隱藏命令。 1〇. 一種修改對一雙介面智慧卡控制器之電力傳遞的方 法’該方法包含以下步驟: 在一記憶卡控制器處接收—命令 ’其中該命令包括一 指令’以用來修改對一售介而知&amp; t 對$介面智慧卡控制器之電力傳 32 201023662 遞,該雙介面智慧卡控 置在一記憶卡上;以及 制器係與该s己憶卡控制器丘 同放 修改舞該雙介面智慧卡控制器之電力傳遞 =介請專利範園第1G項所述之方法,其中修改對該 a慧卡㈣力傳遞的步驟包括將電力從 該雙介面智慧卡控制器移除。 12.如申請專利範圍第1〇 •介®知鳇上 万法’其中修改對該 =面智慧卡控制器之電力傳遞的㈣包括,將電力施 用到該雙介面智慧卡控制器。 項所述之方法,其中在-記憶 步驟包括’從一主機端裝置處 其中該記憶卡係與該主機端裝201023662 VII. Patent Application Range: A method of maintaining undisturbed power to an additional slot compatible with a memory card, the method comprising periodically transmitting a memory card write command to the memory card compatible additional slot. 2. The method of claim 1, wherein the memory card write command comprises a hidden command in one of the data fields. 3. The method of claim 2, wherein the memory card write command comprises a unique data string, and the memory card write command is recognized as having a hidden command. 4. The method of claim 1, wherein the step of periodically transmitting the memory card writer command comprises inserting an obstacle that is ignored by a device in the memory card slot into an additional insertion command. . Slightly hidden commands, assembled into the method of writing πW back to these memory cards, such as a patent, please send a patent to the wax: remember: card write command to - memory card compatibility with the steps: include, send the memory The card writer commands the following - the step package is an SD slot, a mini SD slot, or a micro SD slot. 6. A method for modifying the power transfer of a dual-media 9-flash card controller 31 201023662 method, the method comprising the steps of: embedding a hidden command into a memory card write command, the hidden life 7 pairs The dual interface smart card controller on the memory card compatible radio frequency identification (RFID) card specifies the modification of the power transfer; and the 5 memory card write command is sent to the memory card compatible rfid card. 7. The method of claim 6, wherein the step of transmitting the memory to the memory card compatible RFm card comprises transmitting the memory card command to a memory card slot. 8. The method of claim 7, wherein the step of transmitting the memory card write command to the memory card slot comprises: transmitting the memory card command to one of: - an SD slot, a mini SD slot, or a micro SD slot. ❹9', as in the method of claim 6, wherein the step of hiding the enemy V into the memory card write command includes including the data string into the memory card writer command To identify the memory card write command as a hidden command. 1〇. A method of modifying power transfer to a dual interface smart card controller. The method comprises the steps of: receiving at a memory card controller - the command 'where the command includes an instruction' for modifying a sale Introducing &amp; t to the $ interface smart card controller power transmission 32 201023662 hand, the dual interface smart card control is placed on a memory card; and the system is the same as the s memory card controller The power transfer of the dual interface smart card controller is in accordance with the method described in the patent specification, in the first aspect of the invention, wherein the step of modifying the force transfer of the flash card (4) includes removing power from the dual interface smart card controller. 12. For example, the scope of the patent application is as follows: 1. The method of modifying the power transfer to the smart card controller (4) includes applying power to the dual interface smart card controller. The method of the present invention, wherein the in-memory step comprises 'from a host device, wherein the memory card is attached to the host 13.如申請專利範圍第1〇 卡控制器處接收一命令之 接收一記憶卡寫入命令, 置連接。 方法,其中在一記憶 ,接收在一記憶卡寫 14.如申請專利範圍第1〇項所述之 卡控制器處接收一命令之步驟包括 入命令内之一隱藏命令。 15.如申請專利範圍第1〇項所述之方法,更包含接收在 該記憶卡控制器處接收-第二命令,其中該第二 括一指令’以重置該雙介面智慧卡控制器。 33 201023662 16. —種用指令所編碼而成之電腦可讀取媒體,其中當 由°己隐卡控制器存取時該等指令會造成該記憶卡控制 器能執行以下動作: 纟該記憶卡控制ϋ處接收-命令,其中該命令包括一 指令,以用來修改對-雙介面智慧卡控制器之電力傳 遞’該雙介面智慧卡控制器係與該記憶卡控制器共同放 ©置在一記憶卡上;以及 修改對該雙介面智慧卡控制器之電力傳遞。 17·如申請專利範圍第16項所述之電腦可讀取媒體,其 中修改對該雙介面智慧卡控制器之電力傳遞的步驟包括 將電力循環到該雙介面智慧卡控制器。 1如申請專利範圍帛16項所述之電腦可讀取媒體其 參 中在該記億卡控制器處接收一命令之步驟包括,從〆主 機端裝置處接收一記憶卡寫入命令,其中該記憶卡係與 該主機端裝置連接。 i9·如申請專利範圍第16項所述之電腦可讀取媒體,其 中在該記憶卡控制器處接收—命令之步驟包括,接收在 一記憶卡寫入命令内之一隱藏命令。 3413. If the patent application scope is received, the card controller receives a command to receive a memory card write command and sets the connection. The method wherein, in a memory, receiving a memory card write 14. The step of receiving a command at a card controller as described in claim 1 includes a hidden command within the command. 15. The method of claim 1, further comprising receiving a second command at the memory card controller, wherein the second command is to reset the dual interface smart card controller. 33 201023662 16. A computer readable medium encoded with instructions, wherein when accessed by a hidden card controller, the instructions cause the memory card controller to perform the following actions: 纟 the memory card Controlling the receiving-command, wherein the command includes an instruction for modifying the power transfer of the dual-interface smart card controller. The dual-interface smart card controller is placed in conjunction with the memory card controller. On the memory card; and modify the power transfer to the dual interface smart card controller. 17. The computer readable medium of claim 16, wherein the step of modifying power transfer to the dual interface smart card controller comprises cycling power to the dual interface smart card controller. 1 The computer readable medium according to claim 16, wherein the step of receiving a command at the card controller comprises receiving a memory card write command from the host device, wherein the The memory card is connected to the host device. The computer readable medium of claim 16, wherein the step of receiving the command at the memory card controller comprises receiving a hidden command within a memory card write command. 34
TW98126588A 2008-08-08 2009-08-06 Power negotiation for small rfid card TWI433560B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US18838208P 2008-08-08 2008-08-08

Publications (2)

Publication Number Publication Date
TW201023662A true TW201023662A (en) 2010-06-16
TWI433560B TWI433560B (en) 2014-04-01

Family

ID=44833495

Family Applications (1)

Application Number Title Priority Date Filing Date
TW98126588A TWI433560B (en) 2008-08-08 2009-08-06 Power negotiation for small rfid card

Country Status (2)

Country Link
CN (1) CN101651953B (en)
TW (1) TWI433560B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7954717B2 (en) 2005-02-22 2011-06-07 Tyfone, Inc. Provisioning electronic transaction card in mobile device
US7961101B2 (en) 2008-08-08 2011-06-14 Tyfone, Inc. Small RFID card with integrated inductive element
US8231061B2 (en) 2009-02-24 2012-07-31 Tyfone, Inc Contactless device with miniaturized antenna
US8451122B2 (en) 2008-08-08 2013-05-28 Tyfone, Inc. Smartcard performance enhancement circuits and systems
TWI501575B (en) * 2011-03-14 2015-09-21 Nationz Technologies Inc Mobile rf apparatus, rf ic card and rf storage card
US9741027B2 (en) 2007-12-14 2017-08-22 Tyfone, Inc. Memory card based contactless devices

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104113501B (en) * 2014-06-19 2017-04-26 北京科技大学 Modulator, demodulator, modulation method and demodulation method for low-frequency magnetic induction communication

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102004038834B4 (en) * 2004-08-10 2006-11-02 Siemens Ag A method of generating preamble and signaling structures in a MIMO-OFDM transmission system

Cited By (41)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8408463B2 (en) 2005-02-22 2013-04-02 Tyfone, Inc. Mobile device add-on apparatus for financial transactions
US11436461B2 (en) 2005-02-22 2022-09-06 Kepler Computing Inc. Mobile phone with magnetic card emulation
US9202156B2 (en) 2005-02-22 2015-12-01 Tyfone, Inc. Mobile device with time-varying magnetic field
US8474718B2 (en) 2005-02-22 2013-07-02 Tyfone, Inc. Method for provisioning an apparatus connected contactless to a mobile device
US10185909B2 (en) 2005-02-22 2019-01-22 Tyfone, Inc. Wearable device with current carrying conductor to produce time-varying magnetic field
US8083145B2 (en) 2005-02-22 2011-12-27 Tyfone, Inc. Provisioning an add-on apparatus with smartcard circuity for enabling transactions
US8091786B2 (en) 2005-02-22 2012-01-10 Tyfone, Inc. Add-on card with smartcard circuitry powered by a mobile device
US8136732B2 (en) 2005-02-22 2012-03-20 Tyfone, Inc. Electronic transaction card with contactless interface
US11270174B2 (en) 2005-02-22 2022-03-08 Icashe, Inc. Mobile phone with magnetic card emulation
US10803370B2 (en) 2005-02-22 2020-10-13 Tyfone, Inc. Provisioning wearable device with current carrying conductor to produce time-varying magnetic field
US7954716B2 (en) 2005-02-22 2011-06-07 Tyfone, Inc. Electronic transaction card powered by mobile device
US7954715B2 (en) 2005-02-22 2011-06-07 Tyfone, Inc. Mobile device with transaction card in add-on slot
US11720777B2 (en) 2005-02-22 2023-08-08 Icashe, Inc. Mobile phone with magnetic card emulation
US8573494B2 (en) 2005-02-22 2013-11-05 Tyfone, Inc. Apparatus for secure financial transactions
US7954717B2 (en) 2005-02-22 2011-06-07 Tyfone, Inc. Provisioning electronic transaction card in mobile device
US9715649B2 (en) 2005-02-22 2017-07-25 Tyfone, Inc. Device with current carrying conductor to produce time-varying magnetic field
US9626611B2 (en) 2005-02-22 2017-04-18 Tyfone, Inc. Provisioning mobile device with time-varying magnetic field
US9004361B2 (en) 2005-02-22 2015-04-14 Tyfone, Inc. Wearable device transaction system
US9092708B1 (en) 2005-02-22 2015-07-28 Tyfone, Inc. Wearable device with time-varying magnetic field
US9251453B1 (en) 2005-02-22 2016-02-02 Tyfone, Inc. Wearable device with time-varying magnetic field and single transaction account numbers
US9208423B1 (en) 2005-02-22 2015-12-08 Tyfone, Inc. Mobile device with time-varying magnetic field and single transaction account numbers
US9741027B2 (en) 2007-12-14 2017-08-22 Tyfone, Inc. Memory card based contactless devices
US8814053B2 (en) 2008-08-08 2014-08-26 Tyfone, Inc. Mobile payment device with small inductive device powered by a host device
US7961101B2 (en) 2008-08-08 2011-06-14 Tyfone, Inc. Small RFID card with integrated inductive element
US9904887B2 (en) 2008-08-08 2018-02-27 Tyfone, Inc. Computing device with NFC and active load modulation
US9390359B2 (en) 2008-08-08 2016-07-12 Tyfone, Inc. Mobile device with a contactless smartcard device and active load modulation
US9483722B2 (en) 2008-08-08 2016-11-01 Tyfone, Inc. Amplifier and transmission solution for 13.56MHz radio coupled to smartcard controller
US9489608B2 (en) 2008-08-08 2016-11-08 Tyfone, Inc. Amplifier and transmission solution for 13.56MHz radio coupled to smartmx smartcard controller
US8937549B2 (en) 2008-08-08 2015-01-20 Tyfone, Inc. Enhanced integrated circuit with smartcard controller
US8866614B2 (en) 2008-08-08 2014-10-21 Tyfone, Inc. Active circuit for RFID
US9117152B2 (en) 2008-08-08 2015-08-25 Tyfone, Inc. 13.56 MHz enhancement circuit for smartmx smartcard controller
US9122965B2 (en) 2008-08-08 2015-09-01 Tyfone, Inc. 13.56 MHz enhancement circuit for smartcard controller
US10318855B2 (en) 2008-08-08 2019-06-11 Tyfone, Inc. Computing device with NFC and active load modulation for mass transit ticketing
US8451122B2 (en) 2008-08-08 2013-05-28 Tyfone, Inc. Smartcard performance enhancement circuits and systems
US10607129B2 (en) 2008-08-08 2020-03-31 Tyfone, Inc. Sideband generating NFC apparatus to mimic load modulation
US8410936B2 (en) 2008-08-08 2013-04-02 Tyfone, Inc. Contactless card that receives power from host device
US10949726B2 (en) 2008-08-08 2021-03-16 Icashe, Inc. Mobile phone with NFC apparatus that does not rely on power derived from an interrogating RF field
US11694053B2 (en) 2008-08-08 2023-07-04 Icashe, Inc. Method and apparatus for transmitting data via NFC for mobile applications including mobile payments and ticketing
US8072331B2 (en) 2008-08-08 2011-12-06 Tyfone, Inc. Mobile payment device
US8231061B2 (en) 2009-02-24 2012-07-31 Tyfone, Inc Contactless device with miniaturized antenna
TWI501575B (en) * 2011-03-14 2015-09-21 Nationz Technologies Inc Mobile rf apparatus, rf ic card and rf storage card

Also Published As

Publication number Publication date
CN101651953B (en) 2013-06-19
CN101651953A (en) 2010-02-17
TWI433560B (en) 2014-04-01

Similar Documents

Publication Publication Date Title
TWI421774B (en) Small rfid card with integrated inductive element
US10949726B2 (en) Mobile phone with NFC apparatus that does not rely on power derived from an interrogating RF field
US20100033310A1 (en) Power negotation for small rfid card
TWI433560B (en) Power negotiation for small rfid card