WO2013133058A1 - 通信装置、制御方法、及びプログラム - Google Patents
通信装置、制御方法、及びプログラム Download PDFInfo
- Publication number
- WO2013133058A1 WO2013133058A1 PCT/JP2013/054671 JP2013054671W WO2013133058A1 WO 2013133058 A1 WO2013133058 A1 WO 2013133058A1 JP 2013054671 W JP2013054671 W JP 2013054671W WO 2013133058 A1 WO2013133058 A1 WO 2013133058A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- target
- application
- command
- priority
- targets
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 111
- 238000004891 communication Methods 0.000 title claims abstract description 89
- 230000004044 response Effects 0.000 claims description 96
- 230000008569 process Effects 0.000 claims description 81
- 238000012545 processing Methods 0.000 description 90
- 230000007935 neutral effect Effects 0.000 description 45
- 238000005516 engineering process Methods 0.000 description 26
- 230000007704 transition Effects 0.000 description 25
- 230000008859 change Effects 0.000 description 17
- 238000010586 diagram Methods 0.000 description 15
- 239000000284 extract Substances 0.000 description 5
- 230000006870 function Effects 0.000 description 5
- 230000005540 biological transmission Effects 0.000 description 4
- 238000011156 evaluation Methods 0.000 description 4
- 238000000605 extraction Methods 0.000 description 3
- 230000008034 disappearance Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000005316 response function Methods 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B5/00—Near-field transmission systems, e.g. inductive or capacitive transmission systems
- H04B5/70—Near-field transmission systems, e.g. inductive or capacitive transmission systems specially adapted for specific purposes
- H04B5/72—Near-field transmission systems, e.g. inductive or capacitive transmission systems specially adapted for specific purposes for local intradevice communication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/327—Short range or proximity payments by means of M-devices
- G06Q20/3278—RFID or NFC payments by means of M-devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B5/00—Near-field transmission systems, e.g. inductive or capacitive transmission systems
- H04B5/20—Near-field transmission systems, e.g. inductive or capacitive transmission systems characterised by the transmission technique; characterised by the transmission medium
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/104—Peer-to-peer [P2P] networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/80—Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W72/00—Local resource management
- H04W72/50—Allocation or scheduling criteria for wireless resources
- H04W72/56—Allocation or scheduling criteria for wireless resources based on priority criteria
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
- H04W76/14—Direct-mode setup
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2250/00—Details of telephonic subscriber devices
- H04M2250/04—Details of telephonic subscriber devices including near field communication means, e.g. RFID
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/60—Subscription-based services using application servers or record carriers, e.g. SIM application toolkits
Definitions
- the present technology relates to a communication device, a control method, and a program, and more particularly, to a communication device, a control method, and a program that can reliably select a desired target.
- NFC Near Field Communication
- targets a plurality of communication objects
- NFC device As an NFC device, it has multiple secure elements as targets and a front end that is used in common with those secure elements and communicates with external devices such as readers in close proximity. On the other hand, one that assigns different time slots for communication has already been proposed (see, for example, Patent Document 1).
- CRF Contactless Front End
- the front end returns one polling response in response to polling from the reader side, so the reader performs processing for the target corresponding to the polling response. Therefore, the single response method has the merit that it can be installed without providing a special circuit, but compared with the multi-response method, the target correct answer rate (the probability that the reader can respond to the response from the target desired by the reader) "Means") will be low.
- the front end returns multiple polling responses in response to polling from the reader side. Therefore, if the reader supports multiple response reception, the reader is selected from multiple polling responses. Processing for the target corresponding to the desired polling response is performed. For this reason, the multi-response method requires a special circuit to send back multiple responses at the same time, which complicates the mounting surface, but increases the target correct answer rate compared to the single-response method. be able to.
- the present technology has been made in view of such a situation, and the reader can reliably select a desired target corresponding to the above-mentioned operation specifications of the reader and without mounting a special circuit on the front end. It is something that can be done.
- a communication device selects a target to be communicated with an external device from the plurality of targets, each of which executes a predetermined process, and the external device.
- a front end for performing near field communication wherein the plurality of targets include a P2P (Peer ⁇ ⁇ ⁇ ⁇ to Peer) application, and the front end receives a first target for receiving the confirmed target candidate received from the external device. 1 command is transmitted to the plurality of targets, and the P2P application is selected as the highest priority target in selecting the confirmed target candidate, and the confirmed target candidate is selected and received from the external device.
- P2P Peer ⁇ ⁇ ⁇ ⁇ to Peer
- the determined target candidates are When the P2P application is selected as the fixed target candidate when the P2P application is not selected as the fixed target when the P2P application is selected as the fixed target candidate, the P2P application in the selection of the fixed target candidate is selected. Reduce the priority of.
- the front end When the front end receives the first command from the external device, the front end broadcasts the first command to the plurality of targets.
- the other targets excluding the P2P application include at least one or both of a secure element and a UICC (Universal Integrated Circuit Card), and the front end includes the P2P application.
- the priority is changed to the next priority of one or both of the secure element and the UICC.
- the front end changes the priority so that the secure element, the UICC, and the P2P application are in this order.
- the front end changes the priority so that the secure element, the P2P application, and the UICC are in this order.
- the other target further includes a predetermined application conforming to a predetermined standard, and the front end is in the order of the secure element, the UICC, the predetermined application, and the P2P application. Change the priority.
- the front end changes the priority of the P2P application to the lowest priority.
- the front end changes the priority according to the operation sequence of the external device.
- the front end When the priority of the P2P application is changed, the front end returns the priority of the P2P application to the highest priority when a predetermined period has elapsed.
- the front end releases the confirmed target from the communication target of the external device based on a predetermined target release condition.
- the front end releases the confirmed target from the communication target of the external device when there is a response from one of the targets when the first command is broadcasted to the plurality of targets.
- the front end selects the confirmed target candidate as the confirmed target when the identification information included in the second command matches the identification information of the confirmed target candidate.
- control method and program according to one aspect of the present technology are a control method and program corresponding to the communication device according to one aspect of the present technology described above.
- a fixed target that is a communication target of the external device is selected from a plurality of targets that each execute predetermined processing, and the proximity to the external device is selected. Communication takes place.
- a first command for selecting a confirmed target candidate received from an external device is transmitted to a plurality of targets, and a P2P application is selected as a target with the highest priority in selecting a confirmed target candidate.
- the confirmed target candidate is selected as the confirmed target, and the P2P application is selected as the confirmed target candidate.
- the P2P application is not selected as the final target when selected, the priority of the P2P application in selecting the final target is lowered.
- FIG. 3 is a diagram illustrating a configuration example of an NFC device.
- the NFC device 11 is configured as a device such as a mobile phone, an IC card, a portable information terminal, or a personal computer, for example.
- the NFC device 11 communicates with an external device such as the NFC reader 12 using a carrier wave having a frequency of 13.56 MHz in, for example, an ISM (Industry Science Medical) band within a distance of several tens of centimeters (including the case of contact). I do.
- a carrier wave having a frequency of 13.56 MHz in, for example, an ISM (Industry Science Medical) band within a distance of several tens of centimeters (including the case of contact). I do.
- the NFC device 11 includes a CLF 31, an ESE 32, a DH 33, and a UICC 34.
- Each of the CLF 31 and the target ESE 32, DH 33, and UICC 34 are connected by wire and can communicate with each other.
- a CLF (Contactless Front End) 31 is connected to an antenna provided in the NFC device 11 and performs near field communication with the NFC reader 12.
- the CLF 31 selects a target desired by the NFC reader 12 in accordance with a command transmitted from the NFC reader 12, and controls the communication with the NFC reader 12.
- the CLF 31 has a built-in memory 31A, and stores various data in the memory 31A as necessary.
- the ESE (Embedded Secure Element) 32 is a secure element that is a core part including IC chip security, and implements a security function in, for example, electronic payments, electronic tickets, and NFC applications for entrance / exit management.
- the DH 33 controls the operation of each part of the NFC device 11.
- the DH 33 executes the P2P application 41 or the T3T application 42.
- the P2P application 41 is a P2P (Peer to Peer) application program.
- the T3T application 42 is an application program for emulation of T3T (Type 3 Tag) defined by the NFC standard.
- One or a plurality of P2P applications 41 and T3T applications 42 can be executed.
- the UICC (Universal Integrated Circuit Card) 34 is composed of, for example, a SIM (Subscriber Identity Module) card.
- the UICC 34 realizes, for example, an electronic payment function by executing an NFC application program.
- the ESE 32, UICC 34, P2P application 41, and T3T application 42 are targets to be communicated with the NFC reader 12, and each performs predetermined processing.
- the target includes devices such as ESE 32 and UICC 34 and application programs such as P2P application 41 and T3T application 42.
- the target may include an application program executed by the ESE 32 or the UICC 34.
- the NFC device 11 is configured as described above.
- FIG. 4 is a diagram showing a detailed configuration example of the CLF 31 of FIG.
- the CLF 31 includes a packet reception processing unit 101, a routing state management unit 102, a priority management unit 103, and a wireless communication control unit 104.
- the packet reception processing unit 101 performs processing related to the received packet transmitted from the NFC reader 12.
- the routing state management unit 102 manages the state transition of routing performed in the CLF 31.
- the routing state includes a neutral state and a select state, which will be described later.
- the priority management unit 103 manages the priority of the response from the target to the polling command. Note that the information on the priority is held in the memory 31A and is read out as needed.
- the wireless communication control unit 104 performs processing for controlling near field communication performed with the NFC reader 12.
- the CLF 31 is configured as described above.
- Routing performed in the CLF 31 is realized by a routing state machine and a process of processing received packets in each state.
- the state machine includes two states, a neutral state (NEUTRAL) and a selected state (SELECTED).
- the neutral state means a state where the target is not fixed
- the selected state means a state where the target is fixed.
- the received packet from the NFC reader 12 is analyzed, and processing for determining the target is performed according to the analysis result.
- the routing state transitions from the neutral state to the selected state.
- the selected state includes a P2P selected state (P2P SELECTED) and a T3T selected state (T3T SELECTED) depending on the protocol.
- P2P selected state means a state where the P2P application 41 is selected.
- T3T selected state means a state in which ESE 32, UICC 34, T3T application 42, or the like other than the P2P application 41 is selected. Further, when a predetermined release condition occurs and the confirmed target is released, the routing state transitions from the selected state to the neutral state.
- the confirmed target is selected from the targets existing in the NFC device 11 based on a predetermined check condition for input information such as a command code stored in the received packet from the NFC reader 12 and a protocol of the received packet. Is determined by the CLF 31 as a single communication target. The CLF 31 distributes the received packet to the selected final target until the final target is canceled or the final target is changed.
- FIG. 6 is a diagram showing the state transition of the routing state machine.
- the routing state transitions from the neutral state to the P2P selected state.
- the T3T application 42 or the like is selected as a final target in the neutral state, the routing state transitions from the neutral state to the T3T selected state.
- a SENSF_REQ command is received or when an RF (Radio-Frequency) signal is turned off, the routing state remains in the neutral state.
- the routing state is P2P Transition from the selected state to the neutral state. If a command other than the above is received in the P2P selected state, the routing state remains in the P2P selected state.
- the RLS_REQ command and the DSL_REQ command are commands for instructing the end of the P2P communication transaction.
- the PSL_REQ command is a command for instructing a change in the communication state of P2P communication.
- the RF_DEACTIVATE_CMD command is a command for instructing termination in conformity with a predetermined standard.
- the routing state transitions from the T3T selected state to the neutral state.
- the routing state remains in the T3T selected state.
- the routing state transitions from the T3T selected state to the P2P selected state.
- the CLF 31 transits to the routing state of any one of the neutral state, the P2P selected state, and the T3T selected state, and performs a received packet processing process according to the state.
- the packet reception processing process is classified into a processing process when a polling command is received and a processing process when a command other than the polling command is received.
- FIG. 7 is a diagram illustrating a processing process when a polling command is received.
- the CLF 31 When the CLF 31 receives a SENSF_REQ command from the NFC reader 12, the CLF 31 broadcasts the command to a plurality of targets.
- the CLF 31 broadcasts a SENSF_REQ command as a polling command for searching for candidates that can be targets.
- the SENSF_REQ command is a command for searching for a candidate for a definite target and acquiring information about the target.
- NFCID2 that can uniquely identify the target is used.
- the SENSF_REQ command for the P2P application 41 and the T3T application 42 is processed in the CLF 31 without being transmitted to the DH 33.
- a target to which the SENSF_REQ command is not actually transmitted is referred to as a logical target.
- a target to which the SENSF_REQ command is actually transmitted such as ESE 32 and UICC 34, is distinguished as a physical target.
- the SENSF_REQ command will be described as being broadcasted not only to the physical target but also to the logical target.
- the CENS 31 when the CLF 31 receives a SENSF_REQ command from the NFC reader 12, the CENS 31 sends the SENSF_REQ command to the P2P application 41L and the T3T application 42L that are logical targets and the ESE 32 that is a physical target. And broadcast to the UICC 34.
- each target When a SENSF_REQ command is transmitted from the CLF 31, each target responds with a SENSF_RES command according to the SENSF_REQ command, as shown in FIG. Then, the CLF 31 selects a confirmed target candidate to which a response is returned from the targets that have responded according to the priority for the response. The CLF 31 returns SENSF_RES from the selected confirmed target candidate to the NFC reader 12 according to the single response method.
- the CLF 31 prioritizes the P2P application 41 (P2P application 41L), the ESE 32, the UICC 34, and the T3T application 42 (T3T application 42L). Accordingly, the response of the P2P application 41 having the highest priority among those responses is selected and returned to the NFC reader 12.
- the CLF 31 may be multiple responses to the SENSF_REQ command from the CLF 31 or no response at all. For example, when only one target has responded to the SENSF_RES command, the CLF 31 returns a SENSF_RES command from the target to the NFC reader 12. If there is no target that has responded to the SENSF_RES command, the CLF 31 does not send a reply to the NFC reader 12. In this case, the CLF 31 maintains the current routing state.
- the SENSF_REQ command is basically broadcasted to all targets, but may not be sent depending on the target status.
- FIG. 10 is a diagram illustrating a processing process when a command other than the polling command is received.
- the CLF 31 When the CLF 31 receives a command other than SENSF_REQ from the NFC reader 12, the CLF 31 transmits the command to a specific target. That is, since commands other than SENSF_REQ are transmitted to a specific target after the NFC reader 12 specifies a desired target, the packet storing the command includes identification information of the specific target. It is. Accordingly, the CLF 31 selects any of the P2P application 41, the T3T application 42, the ESE 32, or the UICC 34 according to the target identification information, and transmits a command.
- the processing process differs between when a polling command is received and when a command other than the polling command is received.
- FIG. 11 is a diagram showing an outline of the process of the received packet in the neutral state.
- command code routing There are three types of routing methods performed in the received packet processing process in the neutral state: command code routing, protocol routing, and technology routing.
- Command code routing is a routing method in which a command from the NFC reader 12 is constantly monitored, and when a specific command is received, a received packet is sent to a target associated with the command. is there.
- Protocol routing is a routing method in which a received packet is determined on a protocol basis, and the received packet is sent to a target corresponding to the determination result.
- protocol routing for example, it is determined whether the protocol of the received packet is a P2P protocol or a T3T protocol.
- P2P protocol discrimination result routing according to the P2P protocol discrimination result
- T3T protocol discrimination result routing according to the T3T protocol discrimination result.
- Technology routing is a routing method in which a received packet is sent to a target specified in advance when the received packet does not belong to any protocol.
- technology routing for example, when the P2P or T3T protocol is disabled in an implementation, NFC-F packets are sent to the first target, NFC-B packets are sent to the second target, etc. By determining in advance, the received packet can be sent to the corresponding target.
- ⁇ P2P protocol routing and T3T protocol routing are performed when the final target is not selected in command code routing.
- a definite target is selected by these protocol routings, a received packet is sent to the definite target.
- technology routing is performed. In technology routing, since the transmission destination of the received packet is determined, the received packet is sent to the target as the transmission destination.
- command code routing is performed to realize a specific function in a specific operation, and therefore may not be implemented depending on the operation.
- the CLF 31 when receiving a command other than SENSF_REQ, the CLF 31 starts from protocol routing without performing command code routing.
- the CLF 31 performs technology routing.
- FIG. 12 shows the details of the processing of each routing shown in FIG.
- command code routing first, the command code of the received packet is checked (S11). If the check condition of S11 is satisfied, NFCID2 of the received packet is compared with NFCID2 of all targets (S12). If NFCID2 matches in S12, it is checked whether a predetermined target is registered in a predetermined routing table (S13). Then, when the check condition of S13 is satisfied, the target is selected as the final target. For example, if the DH 33 is registered as a T3T protocol routing target in the routing table, communication with the DH 33 is possible, so the T3T application 42 is selected as the final target.
- P2P protocol routing it is checked whether the received command is a P2P command (S21). If the check condition of S21 is satisfied, a predetermined routing table is checked (S22). If the check condition of S22 is satisfied, it is further checked whether the command can respond as a P2P protocol (S23). If the check condition in S23 is satisfied, the P2P application 41 is selected as the final target. As a result, the routing state transitions from the neutral state to the P2P select state.
- the priority of the response to the SENSF_REQ command (SENSF_RES command) is higher in the order of the P2P application 41, the ESE32, the UICC 34, and the T3T application 42 in the initial state. Therefore, in response to the SENSF_REQ command, after selecting the P2P application 41 as a final target candidate and responding to the SENSF_RES command of the P2P application 41, a transaction is not established unless a predetermined command is sent to the P2P application 41. End up. Therefore, in protocol routing, when a predetermined command for the P2P application 41 cannot be received (“No” in S21), the priority of the response is changed (S31), and the priority of the P2P application 41 is lowered.
- the CLF 31 changes the priority in the order of ESE 32, UICC 34, T3T application 42, and P2P application 41.
- the CLF 31 selects the ESE 32 having the highest priority as a final target candidate according to the changed priority, and sends a SENSF_RES command from each target.
- the response of the ESE 32 is returned to the NFC reader 12.
- priority change may be performed as a subsequent process when the check condition of S32 described later is not satisfied.
- the NFCID2 stored in the received packet is compared with the NFCID2 of the target other than the P2P application 41, that is, the T3T application 42, the ESE32, and the UICC 34 (S32). If NFCID2 matches in S32, it is checked whether a predetermined target is registered in a predetermined routing table (S33). Then, when the check condition of S33 is satisfied, the target is selected as the final target. As a result, the routing state transitions from the neutral state to the T3T selected state.
- a predetermined routing table is checked (S41).
- the target is selected as the final target.
- a transition is made from the neutral state to the T3T selected state.
- the received packet is evaluated, and the final target is selected according to the evaluation result.
- the routing state transitions from the neutral state to the P2P selected state or the T3T selected state.
- the priority of the response is given. The degree is changed, and the priority of the P2P application 41 is lowered.
- FIG. 13 is a diagram showing an outline of a process for processing a received packet in the T3T selected state.
- the routing method performed in the received packet processing process in the T3T selected state is command code routing and P2P protocol routing.
- P2P protocol routing is performed when the final target is not selected by command code routing. That is, as shown in the state transition diagram (FIG. 6) described above, since the routing state may transition from the T3T selected state to the P2P selected state, the P2P protocol routing is performed even in the T3T selected state.
- the routing state transitions from the T3T selected state to the P2P selected state.
- the P2P application 41 is not selected as the final target, the final target does not change from the current target, and the routing state does not change from the T3T selected state.
- FIG. 14 shows the details of the processing of each routing shown in FIG.
- command code routing and P2P protocol routing are performed in the same manner as in FIG. However, if the check conditions of S21, S22, and S23 in FIG. 14 are not satisfied, the protocol routing ends and the confirmed target and the routing state do not change, so the received packet is sent to the current target. In the processing process of FIG. 14, the priority of the response described above is not changed.
- FIG. 15 is a diagram showing a received packet processing process in the P2P selected state.
- the CLF 31 transmits all the received packets from the NFC reader 12 to the P2P application 41.
- the received packet is not evaluated, and the received packet is always transmitted to the P2P application 41 that is the final target.
- 16 and 17 show the operations of the CLF 31, the ESE 32, and the UICC 34 in response to the command from the NFC reader 12. Further, the P2P application 41L and the T3T application 42L, which are logical targets, are processed in the CLF 31. Here, it is assumed that an application program desired by the NFC reader 12 exists in the ESE 32.
- SENSF_RES Priority order shown on the right side of the figure indicates the state of the target order in response priority.
- Normal order means the arrangement order of the P2P application 41 having the highest priority.
- P2P deprioritised means the arrangement order of the states in which the priority of the P2P application 41 is lowered.
- P2P_RSP_FLG is a flag that is set when the P2P application 41 responds to the SENSF_RES command.
- P2P_RSP_FLG is cleared when a SENSF_RES command other than the P2P application 41 responds or when the routing state returns to the neutral state.
- RoutingRoState indicates the routing state described above, and is in a neutral state, a P2P selected state, or a T3T selected state.
- the CLF 31 receives the SENSF_REQ command and broadcasts it to each target.
- the broadcast-transmitted SENSF_REQ command is received by the ESE 32 and the UICC 34, respectively, and the response is returned to the CLF 31. Further, the CLF 31 performs processing related to the P2P application 41L and the T3T application 42L in response to the SENSF_REQ command.
- the CLF 31 selects the P2P application 41 as a final target candidate and returns a SENSF_RES command including the NFCID2 of the P2P application 41 to the NFC reader 12. Then, in response to the SENSF_RES command from the CLF 31, the NFC reader 12 transmits a Request / System / code command including the NFCID2 of the P2P application 41.
- the CLF 31 sends a Request System code command from the NFC reader 12 to the ESE 32, but cannot send a response because the command has been sent to the wrong target. As a result, the NFC reader 12 cannot obtain a response, and in this case, the transaction has failed (“FAIL” in the figure).
- the command set for Ad-hoc communication is a command used in P2P communication defined by the NFC standard.
- the command set for Ad-hoc communication is a command for ad hoc communication compliant with a predetermined standard.
- Get Container Issue Information is a command for obtaining information related to an IC chip conforming to a predetermined standard.
- the CLF 31 changes the priority of the response from the target in the order of the ESE 32, UICC 34, T3T application 42, P2P application 41, and lowers the priority of the P2P application 41.
- the next transaction other than the P2P application 41 is established.
- the CLF 31 changes the priority only for a predetermined period, for example, for 5 to 10 seconds, and restores the priority after the period, so that the priority of the P2P application 41 becomes the highest.
- a period from “Timer start” in FIG. 16 to “Timer expire” in FIG. 17 is a period for changing the priority.
- the NFC reader 12 turns off the RF signal and then turns it on again. Then, the NFC reader 12 transmits a SENSF_REQ command again.
- the CLF 31 receives the SENSF_REQ command from the NFC reader 12 and broadcasts it to each target.
- the ESE 32 and the UICC 34 each return a SENSF_RES command.
- the CLF 31 selects the ESE 32 as a candidate for a final target and returns a SENSF_RES command including the NFCID2 of the ESE 32 to the NFC reader 12. Then, since the Request System code command including the NFCID2 of the ESE 32 is transmitted from the NFC reader 12, the CLF 31 transmits the command to the ESE 32. At this time, the CLF 31 selects the ESE 32 that has been selected as the confirmed target candidate as the confirmed target. Also, “Routing ⁇ State ”transits from the neutral state to the T3T selected state.
- ESE 32 Since the Request System Code command includes NFCID2 of ESE 32, ESE 32 returns a Request System code response command in response to the command.
- the Request System code response command is transmitted to the NFC reader 12 via the CLF 31.
- This Request System code response command includes “FE00” as the SC of ESE32.
- the NFC reader 12 transmits a SENSF_REQ command using the SC acquired by the command in response to the Request System Code response command.
- the CLF 31 receives the SENSF_REQ command from the NFC reader 12 and broadcasts it to each target. However, since the UICC 34 does not support the service with the SC of “FE00”, the SENSF_RES command is returned only from the ESE 32. Become. The CLF 31 returns the SENSF_RES command from the ESE 32 to the NFC reader 12.
- the NFC reader 12 transmits a Request service command including the NFCID2 of the ESE32 to the ESE32.
- the CLF 31 transmits a Request Service command from the NFC reader 12 to the ESE 32.
- the ESE 32 returns a Request Service response command in response to the Request Service command from the CLF 31.
- the CLF 31 returns a Request Service response command from the ESE 32 to the NFC reader 12.
- the transaction for the ESE 32 having the highest priority at that time can be established by changing the priority of the response from the target. If a transaction for the ESE 32 is not established, the establishment of the transaction is attempted in the order of the UICC 34 and the T3T application 42 having the next highest priority.
- the CLF 31 When the end time of the predetermined period has elapsed, the CLF 31 returns the priority of the response to the initial state so that the priority of the P2P application 41 becomes the highest. Thereby, for example, when performing near field communication with other NFC readers thereafter, an attempt is made to establish a transaction for the P2P application 41 having the highest priority.
- the SC of the polling parameter included in the SENSF_REQ command first sent from the NFC reader 12 is “FFFF”, even though the target other than the P2P application 41 is the communication target, and the RC When (Request Code) is other than “1”, that is, communication may be started with the same polling parameters as P2P communication by the first command of a transaction.
- the CLF 31 cannot determine from the command whether the response of the P2P application 41 is returned or whether the response of a target other than the P2P application 41 is returned. Therefore, if a command other than a predetermined command such as ATR_REQ is received after the SENSF_RES command of the P2P application 41 is responded to the SENSF_REQ command, the transaction is not established.
- the priority of the response to the SENSF_REQ command is changed for a predetermined period so that the next transaction is established.
- the target other than the P2P application 41 can be sequentially determined as a final target candidate. It becomes possible to select a target reliably. As a result, communication performed between the NFC reader 12 and the target can be quickly established.
- the CLF 31 extracts the NFCID2 stored in the SENSF_RES command packet from the ESE 32 and the UICC 34 when the SENSF_RES command is responded.
- FIG. 18 shows the storage position of NFCID2 in the packet of the SENSF_RES command.
- the CLF 31 holds one NFCID2 of each of the ESE 32 and the UICC 34 in the memory 31A in association with the target.
- the CLF 31 extracts NFCID2 every time there is a response to the SENSF_REQ command, and updates the correspondence information held in the memory 31A.
- NFCID2 of the P2P application 41 and the T3T application 42 for example, identification information compliant with a predetermined standard is stored in the memory 31A in advance.
- the CLF 31 extracts NFCID2 included in the SENSF_RES command from the ESE 32 and the UICC 34, and holds it in the memory 31A.
- NFCID2_ese_0 is extracted as the NFCID2 of the ESE 32
- NFCID2_uicc_0 is extracted as the NFCID2 of the UICC 34 and held in the memory 31A.
- the CLF 31 broadcasts the SENSF_REQ command and receives the response only from the ESE 32.
- the CLF 31 extracts “NFCID2_ese_1” as NFCID2 included in the SENSF_RES command from the ESE 32, and stores it in the memory 31A.
- the CLF 31 updates the value of NFCID2 held in the memory 31A every time the SENSF_RES command is received.
- the CLF 31 when the CLF 31 receives a specific command code and forcibly changes the target, the CLF 31 replaces the NFCID2 for communication with the NFC reader 12 and the NFCID2 for communication with the target. I need to communicate.
- the CLF 31 when the CLF 31 receives a Get Container Issue Information command, it is necessary to use the NFCID2 of the ESE32 when forcibly changing the target to the ESE32. Communicate. In addition, when responding to the NFC reader 12, the CLF 31 responds after replacing again with NFCID2 included in the command received from the NFC reader 12.
- the CLF 31 when the CLF 31 forcibly changes the target to DH33 when the Propose Ad-hoc Mode command is received, the CLF 31 communicates with the T3T application 42 after replacing the NFCID2 of the T3T application 42 of the DH33. .
- communication with the NFC reader 12 when communication with the NFC reader 12 is performed, communication is performed using the NFCID2 before replacement.
- the CLF 31 extracts NFCID2 included in the SENSF_RES command and stores it in the memory 31A. Then, the CLF 31 returns a SENSF_RES command including NFCID2 of the P2P application 41 according to the priority.
- the CLF 31 replaces the NFCID2 included in the command with the one of the ESE32 from the P2P application 41, and then transmits to the ESE32. Then, since the response to the command is transmitted from the ESE 32, the CLF 31 transmits the NFC reader 2 to the NFC reader 12 after replacing the NFCID 2 included in the response command with that of the P2P application 41 from the ESE 32.
- the destination of the command designated by the NFC reader 12 can be forcibly changed.
- Such a replacement process is a necessary process, for example, when the above command code routing is performed.
- the CLF 31 releases the final target based on a predetermined target release condition.
- This release condition includes a trigger triggered by the user's operation to terminate the application program being executed, and a cancel condition based on external factors such as the disappearance of the RF signal.
- the CLF 31 broadcasts a SENSF_REQ command from the NFC reader 12 and releases the confirmed target when a response to the SENSF_RES command is received. In this case, the routing state transitions to the neutral state.
- the CORE_RESET_CMD command is a command for instructing a reset that conforms to a predetermined standard.
- step S101 the packet reception processing unit 101 determines whether a command is received from the NFC reader 12. If it is determined in step S101 that a command has been received, the process proceeds to step S102.
- step S102 the packet reception processing unit 101 determines whether or not the received command is a SENSF_REQ command. If it is determined in step S102 that the command is a SENSF_REQ command, the process proceeds to step S103.
- step S103 the packet reception processing unit 101 broadcasts a SENSF_REQ command to each target.
- step S104 the packet reception processing unit 101 receives a SENSF_RES command returned from the target that has received the SENSF_REQ command.
- step S105 the packet reception processing unit 101 selects a confirmed target candidate to which a response is returned from the responded targets according to the priority of the response.
- the priority of response is the highest priority in the P2P application 41 in the initial state.
- step S106 the packet reception processing unit 101 transmits a SENSF_RES command from the confirmed target candidate selected in step S105 to the NFC reader 12.
- the NFC reader 12 receives the SENSF_RES command from the NFC device 11 and performs processing according to the command.
- step S102 determines whether the received command is a command other than the SENSF_REQ command. If it is determined in step S102 that the received command is a command other than the SENSF_REQ command, the process proceeds to step S107.
- step S107 the packet reception processing unit 101 determines whether or not the current routing state is a neutral state. When it is determined in step S107 that the current routing state is the neutral state, the process proceeds to step S108.
- step S108 the packet reception processing unit 101 processes the received packet in the neutral state.
- step S131 the packet reception processing unit 101 processes the received packet in the neutral state.
- the received packet is evaluated by command code routing, protocol routing, and technology routing, and a final target is selected according to the evaluation result. Is done.
- the routing state management unit 102 changes the routing state from the current neutral state to the P2P selected state or the T3T selected state.
- step S132 the packet reception processing unit 101 determines whether a response of the SENSF_RES command of the P2P application 41 is made as a response immediately before to the NFC reader 12. If it is determined in step S132 that a response to the SENSF_RES command of the P2P application 41 has been made immediately before, the process proceeds to step S133.
- step S133 the packet reception processing unit 101 determines whether or not the P2P application 41 is selected as the final target by the process in step S131. If it is determined in step S133 that the P2P application 41 has not been selected as the final target, the process proceeds to step S134.
- step S134 the priority management unit 103 changes the priority. That is, in this case, the command other than the command for the P2P application 41 is received from the NFC reader 12 even though the response of the SENSF_RES command of the P2P application 41 selected as the confirmed target candidate is received. A degree change is made. For example, the priority management unit 103 lowers the priority of the P2P application 41 that has the highest priority in the initial state, and changes the priority in the order of the ESE 32, UICC 34, T3T application 42, and P2P application 41. In this case, the priority of the P2P application 41 is the lowest priority among the targets.
- the priority order after the change is not limited to the above order, but can be rearranged in another order.
- the priority management unit 103 when the target includes the ESE 32, the UICC 34, and the P2P application 41, when the P2P application 41 is not selected as the final target, the priority management unit 103 is in the order of the ESE 32, the UICC 34, and the P2P application 41.
- the priority can be changed. In this case, the priority management unit 103 may change the priority so that ESE 32, P2P application 41, and UICC 34 are in this order.
- the priority management unit 103 sets the priority of the P2P application 41 to the next priority of either the ESE 32 or the UICC 34. change. That is, the target includes at least one or both of the ESE 32 and the UICC 34, and the priority management unit 103 sets the priority of the P2P application 41 when the P2P application 41 is not selected as the final target. Change to the next priority of either or both of ESE 32 and UICC 34.
- the priority management unit 103 may change the response priority according to the operation sequence of the NFC reader 12.
- the priority order after the change is arbitrarily set according to, for example, the type of target and the form of operation, and in principle, the priority of the P2P application 41 having the highest priority is set. It will be rearranged so that the degree is low.
- step S132 If it is determined in step S132 that the SENSF_RES command of the P2P application 41 has not been responded immediately before, steps S133 and S134 are skipped. If it is determined in step S133 that the P2P application 41 has been selected as the final target, step S134 is skipped.
- step S134 When the process in step S134 is completed or skipped, the process returns to step S108 in FIG. 22, and the subsequent processes are performed.
- step S107 If it is determined in step S107 that the current routing state is not the neutral state, the process proceeds to step S109.
- step S109 the packet reception processing unit 101 determines whether or not the current routing state is the T3T selected state. If it is determined in step S109 that the current routing state is the T3T selected state, the process proceeds to step S110.
- step S110 the packet reception processing unit 101 performs reception packet processing in the T3T selected state.
- the received packet is evaluated by the command code routing and the P2P protocol routing, and the final target is selected according to the evaluation result.
- step S109 determines whether the current routing state is the T3T selected state, that is, the P2P selected state. If it is determined in step S109 that the current routing state is not the T3T selected state, that is, the P2P selected state, the process proceeds to step S111.
- step S111 the packet reception processing unit 101 performs reception packet processing in the P2P selected state.
- the received packet is not evaluated, and the received packet is always transmitted to the P2P application 41.
- step S101 If it is determined in step S101 that a command has not been received, or if the processing of steps S108, S110, and S111 is completed, the process proceeds to step S112.
- step S112 the priority management unit 103 determines whether or not the response priority has been changed in step S134 of FIG. If it is determined in step S112 that the priority has been changed, the process proceeds to step S113.
- step S113 the priority management unit 103 determines whether or not a predetermined period has elapsed. If it is determined in step S113 that the predetermined period has elapsed, the process proceeds to step S114.
- step S114 the priority management unit 103 returns the priority of the response to the initial state and changes the priority of the P2P application 41 so as to be the highest.
- step S112 If it is determined in step S112 that the priority has not been changed, if it is determined in step S113 that the predetermined period has not elapsed, or if the process in step S114 is completed, the process proceeds to step S101. Return to, and the subsequent processing is repeated.
- the command response processing has been described above.
- a received packet processing process corresponding to the routing state is performed.
- the received packet is evaluated, and the P2P application 41 is not selected as the final target even though the SENSF_RES command of the P2P application 41 is responded.
- the priority of the response is changed, and the priority of the P2P application 41 is lowered.
- the series of processes described above can be executed by hardware or software.
- a program constituting the software is installed in the computer.
- the computer includes, for example, a general-purpose personal computer capable of executing various functions by installing a computer incorporated in dedicated hardware and various programs.
- FIG. 24 is a block diagram showing an example of the hardware configuration of a computer that executes the above-described series of processing by a program.
- a CPU Central Processing Unit
- ROM Read Only Memory
- RAM Random Access Memory
- An input / output interface 205 is further connected to the bus 204.
- An input unit 206, an output unit 207, a storage unit 208, a communication unit 209, and a drive 210 are connected to the input / output interface 205.
- the input unit 206 includes a keyboard, a mouse, a microphone, and the like.
- the output unit 207 includes a display, a speaker, and the like.
- the storage unit 208 includes a hard disk, a nonvolatile memory, and the like.
- the communication unit 209 includes a network interface and the like.
- the drive 210 drives a removable medium 211 such as a magnetic disk, an optical disk, a magneto-optical disk, or a semiconductor memory.
- the CPU 201 loads the program stored in the storage unit 208 to the RAM 203 via the input / output interface 205 and the bus 204 and executes the program, as described above. A series of processing is performed.
- the program executed by the computer 200 can be provided by being recorded in, for example, a removable medium 211 such as a package medium.
- the program can be provided via a wired or wireless transmission medium such as a local area network, the Internet, or digital satellite broadcasting.
- the program can be installed in the storage unit 208 via the input / output interface 205 by attaching the removable medium 211 to the drive 210.
- the program can be received by the communication unit 209 via a wired or wireless transmission medium and installed in the storage unit 208.
- the program can be installed in the ROM 202 or the storage unit 208 in advance.
- the program executed by the computer 200 may be a program that is processed in time series in the order described in this specification, or a necessary timing such as in parallel or when a call is made. It may be a program in which processing is performed.
- processing steps for describing a program for causing the computer 200 to perform various processes do not necessarily have to be processed in time series according to the order described in the flowchart, and may be performed in parallel or individually. (For example, parallel processing or object processing).
- the program may be processed by one computer, or may be processed in a distributed manner by a plurality of computers. Furthermore, the program may be transferred to a remote computer and executed.
- the system means a set of a plurality of components (devices, modules (parts), etc.), and it does not matter whether all the components are in the same housing. Accordingly, a plurality of devices housed in separate housings and connected via a network and a single device housing a plurality of modules in one housing are all systems. .
- the present technology can take a configuration of cloud computing in which one function is shared by a plurality of devices via a network and is jointly processed.
- each step described in the above-described flowchart can be executed by one device or can be shared by a plurality of devices.
- the plurality of processes included in the one step can be executed by being shared by a plurality of apparatuses in addition to being executed by one apparatus.
- this technique can take the following structures.
- a plurality of targets each performing a predetermined process;
- the plurality of targets include a P2P (Peer to Peer) application,
- the front end is Transmitting a first command received from the external device to select a candidate for the final target, to the plurality of targets;
- the P2P application is set as the highest priority target, and the final target candidate is selected.
- the candidate for the final target is selected as the final target.
- the priority of the P2P application in the selection of the confirmed target candidate is lowered.
- targets excluding the P2P application include at least one or both of a secure element and a UICC (Universal Integrated Circuit Card),
- the other target further includes a predetermined application conforming to a predetermined standard,
- the front end returns the priority of the P2P application to the highest priority when a predetermined period has elapsed. (1) Thru
- a plurality of targets each performing a predetermined process;
- a control method for a communication device comprising: a front end that selects a final target to be communicated with an external device from the plurality of targets and performs near field communication with the external device,
- the plurality of targets are: Including an application of P2P (Peer to Peer) received from the external device,
- the front end is Transmitting a first command for selecting the final target candidates to the plurality of targets;
- the P2P application is set as the highest priority target, and the final target candidate is selected.
- the candidate for the final target is selected as the final target.
- the priority of the P2P application in the selection of the confirmed target candidate is lowered. Control method.
- a plurality of targets each performing a predetermined process comprising: a front end that selects a target to be communicated with an external device from the plurality of targets including a P2P (Peer to Peer) application and performs near field communication with the external device
- P2P Peer to Peer
- the P2P application is set as the highest priority target, and the final target candidate is selected.
- the candidate for the final target is selected as the final target.
- the priority of the P2P application in the selection of the confirmed target candidate is lowered.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
- Near-Field Transmission Systems (AREA)
- Computer And Data Communications (AREA)
- Communication Control (AREA)
Abstract
Description
図3は、NFCデバイスの構成例を示す図である。
図4は、図3のCLF31の詳細な構成例を示す図である。
次に、CLF31によるルーティングの概要について説明する。CLF31にて行われるルーティングは、ルーティングのステートマシンと、各ステートにおける受信パケットの処理プロセスによって実現される。
図5に示すように、ステートマシンは、ニュートラル状態(NEUTRAL)と、セレクト状態(SELECTED)の2つの状態で構成される。ニュートラル状態は、ターゲットが確定していない状態を意味し、セレクト状態は、ターゲットが確定している状態を意味する。
パケット受信の処理プロセスは、ポーリングコマンドを受信した場合の処理プロセスと、ポーリングコマンド以外のコマンドを受信した場合の処理プロセスに分類される。
図7は、ポーリングコマンドを受信した場合の処理プロセスを示す図である。
図10は、ポーリングコマンド以外のコマンドを受信した場合の処理プロセスを示す図である。
次に、上記の各ルーティング状態における受信パケットの処理プロセスについて説明する。
図11は、ニュートラル状態における受信パケットの処理プロセスの概要を示す図である。
図13は、T3Tセレクト状態における受信パケットの処理プロセスの概要を示す図である。
図15は、P2Pセレクト状態における受信パケットの処理プロセスを示す図である。
次に、図16及び図17のシーケンス図を参照して、本技術を利用した具体的な運用例について説明する。
次に、図18及び図19を参照して、NFCID2の抽出及び一時的保持に関する処理について説明する。
次に、図20及び図21を参照して、NFCID2のリプレイス処理について説明する。
次に、ターゲットの解除処理について説明する。CLF31は、所定のターゲット解除条件に基づいて、確定ターゲットを解除する。この解除条件は、ユーザによる実行中のアプリケーションプログラムの終了操作をトリガとするものと、RF信号の消失などの外部要因によるものとがある。
CLF31は、DH33から、RF_DEACTIVATE_CMDコマンド(Idle Mode,DH_Request)などの特定のコマンドを受信した場合、NFCリーダ12との通信そのものが終了するので、確定ターゲットを解除する。なお、当該コマンドが受信された場合には、いかなるルーティング状態にあっても、確定ターゲットが解除される。この場合、ルーティング状態は、ニュートラル状態に遷移する。
CLF31は、ルーティング状態がT3Tセレクト状態にある場合に、NFCリーダ12からのSENSF_REQコマンドをブロードキャスト送信して、SENSF_RESコマンドの応答があったときには、確定ターゲットを解除する。この場合、ルーティング状態は、ニュートラル状態に遷移する。
CLF31は、P2Pアプリ41が確定ターゲットに選択されている場合に、RLS_REQコマンドを受信したときには、確定ターゲットを解除する。この場合、ルーティング状態は、ニュートラル状態に遷移する。
CLF31は、P2Pアプリ41が確定ターゲットに選択されている場合に、DSL_REQコマンドを受信したときには、確定ターゲットを解除する。この場合、ルーティング状態は、ニュートラル状態に遷移する。
CLF31は、P2Pアプリ41が確定ターゲットに選択されている場合に、RF信号のオフが検出された場合には、確定ターゲットを解除する。この場合、ルーティング状態は、ニュートラル状態に遷移する。
CLF31は、P2Pアプリ41が確定ターゲットに選択されている場合に、NFC-Aへのtechnology changeを伴うPSL_REQコマンドを受信したときには、確定ターゲットを解除する。この場合、ルーティング状態は、ニュートラル状態に遷移する。
CLF31は、デバイスリセットが発生した場合やCORE_RESET_CMDコマンドを受信した場合など、RF_DEACTIVATE_CMDコマンド以外のRFST_IDLE状態への遷移を引き起こす事象が発生した場合には、確定ターゲットを解除する。この場合、ルーティング状態は、ニュートラル状態に遷移する。なお、CORE_RESET_CMDコマンドは、所定の規格に準拠したリセットを指示するためのコマンドである。
次に、図22のフローチャートを参照して、NFCリーダ12からのコマンドを受信した際に、CLF31にて実行されるコマンド対応処理について説明する。
前述した一連の処理は、ハードウェアにより実行することもできるし、ソフトウェアにより実行することもできる。一連の処理をソフトウェアにより実行する場合には、そのソフトウェアを構成するプログラムが、コンピュータにインストールされる。ここで、コンピュータには、専用のハードウェアに組み込まれているコンピュータや、各種のプログラムをインストールすることで、各種の機能を実行することが可能な、例えば汎用のパーソナルコンピュータなどが含まれる。
それぞれが所定の処理を実行する複数のターゲットと、
前記複数のターゲットの中から、外部装置の通信対象となる確定ターゲットを選択して、前記外部装置との近接通信を行うフロントエンドと
を備え、
前記複数のターゲットは、P2P(Peer to Peer)のアプリケーションを含み、
前記フロントエンドは、
前記外部装置から受信した、前記確定ターゲットの候補を選択するための第1のコマンドを、前記複数のターゲットに送信し、
前記確定ターゲットの候補を選択するにあたり前記P2Pのアプリケーションを最も高い優先度のターゲットとし、前記確定ターゲットの候補を選択し、
前記外部装置から受信した、所定のターゲットの識別情報を含む第2のコマンドに基づいて、前記確定ターゲットの候補を、前記確定ターゲットとして選択し、
前記P2Pのアプリケーションが前記確定ターゲットの候補として選択された場合に、前記P2Pのアプリケーションが前記確定ターゲットに選択されなかったとき、前記確定ターゲットの候補の選択における前記P2Pのアプリケーションの優先度を下げる
通信装置。
(2)
前記フロントエンドは、前記外部装置から前記第1のコマンドを受信した場合、前記第1のコマンドを、前記複数のターゲットにブロードキャスト送信する
(1)に記載の通信装置。
(3)
前記複数のターゲットのうち、前記P2Pのアプリケーションを除く他のターゲットは、セキュアエレメント及びUICC(Universal Integrated Circuit Card)のいずれか一方又は双方を少なくとも含んでおり、
前記フロントエンドは、前記P2Pのアプリケーションの前記優先度を、前記セキュアエレメント及び前記UICCのいずれか一方又は双方の次の優先度に変更する
(1)又は(2)に記載の通信装置。
(4)
前記フロントエンドは、前記セキュアエレメント、前記UICC、前記P2Pのアプリケーションの順となるように前記優先度を変更する
(3)に記載の通信装置。
(5)
前記フロントエンドは、前記セキュアエレメント、前記P2Pのアプリケーション、前記UICCの順となるように前記優先度を変更する
(3)に記載の通信装置。
(6)
前記他のターゲットは、さらに、所定の規格に準拠した所定のアプリケーションを含んでおり、
前記フロントエンドは、前記セキュアエレメント、前記UICC、前記所定のアプリケーション、前記P2Pのアプリケーションの順となるように前記優先度を変更する
(3)に記載の通信装置。
(7)
前記フロントエンドは、前記P2Pのアプリケーションの優先度を、最も低い優先度に変更する
(1)乃至(3)のいずれかに記載の通信装置。
(8)
前記フロントエンドは、前記外部装置の動作シーケンスに応じて、前記優先度を変更する
(1)乃至(3)のいずれかに記載の通信装置。
(9)
前記フロントエンドは、前記P2Pのアプリケーションの前記優先度を変更した場合に、あらかじめ設定された所定の期間を経過したとき、前記P2Pのアプリケーションの前記優先度を、最も高い優先度に戻す
(1)乃至(3)のいずれかに記載の通信装置。
(10)
前記フロントエンドは、所定のターゲット解除条件に基づいて、前記確定ターゲットを、前記外部装置の通信対象から解除する
(1)乃至(3)のいずれかに記載の通信装置。
(11)
前記フロントエンドは、前記第1のコマンドを、前記複数のターゲットにブロードキャスト送信した場合に、いずれかのターゲットからの応答があったとき、前記確定ターゲットを、前記外部装置の通信対象から解除する
(10)に記載の通信装置。
(12)
前記フロントエンドは、前記第2のコマンドに含まれる識別情報と、前記確定ターゲットの候補の識別情報が一致する場合、前記確定ターゲットの候補を、前記確定ターゲットとして選択する
(1)乃至(11)のいずれかに記載の通信装置。
(13)
それぞれが所定の処理を実行する複数のターゲットと、
前記複数のターゲットの中から、外部装置の通信対象となる確定ターゲットを選択して、前記外部装置との近接通信を行うフロントエンドと
を備える通信装置の制御方法であって、
前記複数のターゲットは、
前記外部装置から受信した、P2P(Peer to Peer)のアプリケーションを含み、
前記フロントエンドが、
前記確定ターゲットの候補を選択するための第1のコマンドを、前記複数のターゲットに送信し、
前記確定ターゲットの候補を選択するにあたり前記P2Pのアプリケーションを最も高い優先度のターゲットとし、前記確定ターゲットの候補を選択し、
前記外部装置から受信した、所定のターゲットの識別情報を含む第2のコマンドに基づいて、前記確定ターゲットの候補を、前記確定ターゲットとして選択し、
前記P2Pのアプリケーションが前記確定ターゲットの候補として選択された場合に、前記P2Pのアプリケーションが前記確定ターゲットに選択されなかったとき、前記確定ターゲットの候補の選択における前記P2Pのアプリケーションの優先度を下げる
ステップを含む制御方法。
(14)
それぞれが所定の処理を実行する複数のターゲットと、
P2P(Peer to Peer)のアプリケーションを含む前記複数のターゲットの中から、外部装置の通信対象となる確定ターゲットを選択して、前記外部装置との近接通信を行うフロントエンドと
を備える通信装置の制御用のプログラムであって、
前記外部装置から受信した、前記確定ターゲットの候補を選択するための第1のコマンドを、前記複数のターゲットに送信し、
前記確定ターゲットの候補を選択するにあたり前記P2Pのアプリケーションを最も高い優先度のターゲットとし、前記確定ターゲットの候補を選択し、
前記外部装置から受信した、所定のターゲットの識別情報を含む第2のコマンドに基づいて、前記確定ターゲットの候補を、前記確定ターゲットとして選択し、
前記P2Pのアプリケーションが前記確定ターゲットの候補として選択された場合に、前記P2Pのアプリケーションが前記確定ターゲットに選択されなかったとき、前記確定ターゲットの候補の選択における前記P2Pのアプリケーションの優先度を下げる
ステップを含む処理を、通信装置のコンピュータに実行させるプログラム。
Claims (14)
- それぞれが所定の処理を実行する複数のターゲットと、
前記複数のターゲットの中から、外部装置の通信対象となる確定ターゲットを選択して、前記外部装置との近接通信を行うフロントエンドと
を備え、
前記複数のターゲットは、P2P(Peer to Peer)のアプリケーションを含み、
前記フロントエンドは、
前記外部装置から受信した、前記確定ターゲットの候補を選択するための第1のコマンドを、前記複数のターゲットに送信し、
前記確定ターゲットの候補を選択するにあたり前記P2Pのアプリケーションを最も高い優先度のターゲットとし、前記確定ターゲットの候補を選択し、
前記外部装置から受信した、所定のターゲットの識別情報を含む第2のコマンドに基づいて、前記確定ターゲットの候補を、前記確定ターゲットとして選択し、
前記P2Pのアプリケーションが前記確定ターゲットの候補として選択された場合に、前記P2Pのアプリケーションが前記確定ターゲットに選択されなかったとき、前記確定ターゲットの候補の選択における前記P2Pのアプリケーションの優先度を下げる
通信装置。 - 前記フロントエンドは、前記外部装置から前記第1のコマンドを受信した場合、前記第1のコマンドを、前記複数のターゲットにブロードキャスト送信する
請求項1に記載の通信装置。 - 前記複数のターゲットのうち、前記P2Pのアプリケーションを除く他のターゲットは、セキュアエレメント及びUICC(Universal Integrated Circuit Card)のいずれか一方又は双方を少なくとも含んでおり、
前記フロントエンドは、前記P2Pのアプリケーションの前記優先度を、前記セキュアエレメント及び前記UICCのいずれか一方又は双方の次の優先度に変更する
請求項2に記載の通信装置。 - 前記フロントエンドは、前記セキュアエレメント、前記UICC、前記P2Pのアプリケーションの順となるように前記優先度を変更する
請求項3に記載の通信装置。 - 前記フロントエンドは、前記セキュアエレメント、前記P2Pのアプリケーション、前記UICCの順となるように前記優先度を変更する
請求項3に記載の通信装置。 - 前記他のターゲットは、さらに、所定の規格に準拠した所定のアプリケーションを含んでおり、
前記フロントエンドは、前記セキュアエレメント、前記UICC、前記所定のアプリケーション、前記P2Pのアプリケーションの順となるように前記優先度を変更する
請求項3に記載の通信装置。 - 前記フロントエンドは、前記P2Pのアプリケーションの優先度を、最も低い優先度に変更する
請求項3に記載の通信装置。 - 前記フロントエンドは、前記外部装置の動作シーケンスに応じて、前記優先度を変更する
請求項3に記載の通信装置。 - 前記フロントエンドは、前記P2Pのアプリケーションの前記優先度を変更した場合に、あらかじめ設定された所定の期間を経過したとき、前記P2Pのアプリケーションの前記優先度を、最も高い優先度に戻す
請求項3に記載の通信装置。 - 前記フロントエンドは、所定のターゲット解除条件に基づいて、前記確定ターゲットを、前記外部装置の通信対象から解除する
請求項3に記載の通信装置。 - 前記フロントエンドは、前記第1のコマンドを、前記複数のターゲットにブロードキャスト送信した場合に、いずれかのターゲットからの応答があったとき、前記確定ターゲットを、前記外部装置の通信対象から解除する
請求項10に記載の通信装置。 - 前記フロントエンドは、前記第2のコマンドに含まれる識別情報と、前記確定ターゲットの候補の識別情報が一致する場合、前記確定ターゲットの候補を、前記確定ターゲットとして選択する
請求項1に記載の通信装置。 - それぞれが所定の処理を実行する複数のターゲットと、
前記複数のターゲットの中から、外部装置の通信対象となる確定ターゲットを選択して、前記外部装置との近接通信を行うフロントエンドと
を備える通信装置の制御方法であって、
前記複数のターゲットは、P2P(Peer to Peer)のアプリケーションを含み、
前記フロントエンドが、
前記外部装置から受信した、前記確定ターゲットの候補を選択するための第1のコマンドを、前記複数のターゲットに送信し、
前記確定ターゲットの候補を選択するにあたり前記P2Pのアプリケーションを最も高い優先度のターゲットとし、前記確定ターゲットの候補を選択し、
前記外部装置から受信した、所定のターゲットの識別情報を含む第2のコマンドに基づいて、前記確定ターゲットの候補を、前記確定ターゲットとして選択し、
前記P2Pのアプリケーションが前記確定ターゲットの候補として選択された場合に、前記P2Pのアプリケーションが前記確定ターゲットに選択されなかったとき、前記確定ターゲットの候補の選択における前記P2Pのアプリケーションの優先度を下げる
ステップを含む制御方法。 - それぞれが所定の処理を実行する複数のターゲットと、
P2P(Peer to Peer)のアプリケーションを含む前記複数のターゲットの中から、外部装置の通信対象となる確定ターゲットを選択して、前記外部装置との近接通信を行うフロントエンドと
を備える通信装置の制御用のプログラムであって、
前記外部装置から受信した、前記確定ターゲットの候補を選択するための第1のコマンドを、前記複数のターゲットに送信し、
前記確定ターゲットの候補を選択するにあたり前記P2Pのアプリケーションを最も高い優先度のターゲットとし、前記確定ターゲットの候補を選択し、
前記外部装置から受信した、所定のターゲットの識別情報を含む第2のコマンドに基づいて、前記確定ターゲットの候補を、前記確定ターゲットとして選択し、
前記P2Pのアプリケーションが前記確定ターゲットの候補として選択された場合に、前記P2Pのアプリケーションが前記確定ターゲットに選択されなかったとき、前記確定ターゲットの候補の選択における前記P2Pのアプリケーションの優先度を下げる
ステップを含む処理を、通信装置のコンピュータに実行させるプログラム。
Priority Applications (10)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP13758604.6A EP2824611B1 (en) | 2012-03-07 | 2013-02-25 | Communication device, control method, and program |
JP2014503767A JP6162683B2 (ja) | 2012-03-07 | 2013-02-25 | 通信装置、制御方法、プログラム、及びフロントエンド |
US14/382,070 US9237409B2 (en) | 2012-03-07 | 2013-02-25 | Communication device, control method, program, and front end |
IN7294DEN2014 IN2014DN07294A (ja) | 2012-03-07 | 2013-02-25 | |
CN201380011796.4A CN104428796B (zh) | 2012-03-07 | 2013-02-25 | 通信设备、控制方法、程序和前端 |
KR1020147024308A KR102040348B1 (ko) | 2012-03-07 | 2013-02-25 | 통신 장치, 제어 방법, 비일시적 컴퓨터 판독가능 기록 매체 및 프론트 엔드 |
EP17187515.6A EP3276537B1 (en) | 2012-03-07 | 2013-02-25 | Communication device, control method, program, and front end |
US14/955,582 US9444519B2 (en) | 2012-03-07 | 2015-12-01 | Communication device, control method, program, and front end |
US15/220,020 US10305547B2 (en) | 2012-03-07 | 2016-07-26 | Communication device, control method, program, and front end |
US16/380,432 US11088724B2 (en) | 2012-03-07 | 2019-04-10 | Communication device, control method, program and front end |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2012-050016 | 2012-03-07 | ||
JP2012050016 | 2012-03-07 |
Related Child Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/382,070 A-371-Of-International US9237409B2 (en) | 2012-03-07 | 2013-02-25 | Communication device, control method, program, and front end |
US14/955,582 Continuation US9444519B2 (en) | 2012-03-07 | 2015-12-01 | Communication device, control method, program, and front end |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2013133058A1 true WO2013133058A1 (ja) | 2013-09-12 |
Family
ID=49116540
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2013/054671 WO2013133058A1 (ja) | 2012-03-07 | 2013-02-25 | 通信装置、制御方法、及びプログラム |
Country Status (8)
Country | Link |
---|---|
US (4) | US9237409B2 (ja) |
EP (2) | EP2824611B1 (ja) |
JP (3) | JP6162683B2 (ja) |
KR (1) | KR102040348B1 (ja) |
CN (1) | CN104428796B (ja) |
IN (1) | IN2014DN07294A (ja) |
MY (1) | MY166919A (ja) |
WO (1) | WO2013133058A1 (ja) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR3012236A1 (ja) * | 2013-10-17 | 2015-04-24 | Proton World Int Nv | |
WO2017038821A1 (ja) * | 2015-09-04 | 2017-03-09 | フェリカネットワークス株式会社 | 情報処理装置、情報処理方法、プログラム、および情報処理システム |
JP2017182625A (ja) * | 2016-03-31 | 2017-10-05 | ブラザー工業株式会社 | 通信装置 |
JP2018512104A (ja) * | 2015-02-19 | 2018-05-10 | クゥアルコム・インコーポレイテッドQualcomm Incorporated | 近傍界通信フォーラムリッスンモードプロファイル |
EP2858259B1 (en) * | 2013-10-07 | 2019-06-26 | Nxp B.V. | NFC tag, communication method and system |
Families Citing this family (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP5860631B2 (ja) * | 2011-08-12 | 2016-02-16 | フェリカネットワークス株式会社 | 通信装置、制御方法、及びプログラム |
CN104428796B (zh) * | 2012-03-07 | 2017-09-01 | 飞力凯网路股份有限公司 | 通信设备、控制方法、程序和前端 |
FR3018972B1 (fr) * | 2014-03-18 | 2016-04-15 | Proton World Int Nv | Secure nfc routing |
US10303134B2 (en) * | 2015-04-10 | 2019-05-28 | Fisher Controls International Llc | Methods and apparatus for multimode RFST communications in process control systems |
KR101993959B1 (ko) | 2016-07-21 | 2019-06-27 | 이도훈 | 모바일을 이용한 통합 근거리 통신 시스템 및 그 방법 |
WO2018198813A1 (ja) * | 2017-04-28 | 2018-11-01 | ソニー株式会社 | 通信装置および方法 |
EP3696759B1 (en) * | 2019-02-15 | 2024-07-24 | Nxp B.V. | Method of managing priority in the context of a secure element domain with multiple interfaces, electronic device and communication system |
CN110491028B (zh) * | 2019-08-19 | 2021-09-28 | 马健 | 一种通过无线通信实现控制的智能感应取电卡及取电方法 |
CN118400790B (zh) * | 2024-06-25 | 2024-08-30 | 广州旋坤信息科技有限公司 | 一种无线节点加入网络的系统 |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2005223722A (ja) * | 2004-02-06 | 2005-08-18 | Matsushita Electric Ind Co Ltd | 携帯端末及び車載端末 |
JP2009128942A (ja) * | 2007-11-19 | 2009-06-11 | Felica Networks Inc | 情報処理装置、情報処理方法、及びプログラム |
WO2010115770A1 (en) * | 2009-04-08 | 2010-10-14 | Gemalto Sa | Method of preselecting at least one application in a mobile communication device comprising an nfc system |
JP2011049778A (ja) | 2009-08-26 | 2011-03-10 | Sony Corp | 情報処理装置およびプログラム |
JP2011259412A (ja) * | 2010-05-13 | 2011-12-22 | Canon Inc | 通信装置、通信装置の制御方法およびプログラム。 |
Family Cites Families (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5481140A (en) * | 1992-03-10 | 1996-01-02 | Mitsubishi Denki Kabushiki Kaisha | Demand control apparatus and power distribution control system |
WO2005010766A1 (ja) * | 2003-07-24 | 2005-02-03 | Fujitsu Limited | データ格納システム |
JP4086304B2 (ja) * | 2004-04-23 | 2008-05-14 | 株式会社東芝 | 通信装置、通信システム、および通信制御プログラム |
FR2888071A1 (fr) * | 2005-06-30 | 2007-01-05 | France Telecom | Module et systeme de communication pour la mise en oeuvre d'un systeme de gestion a distance d'equipements |
DE602007008313D1 (de) | 2006-05-10 | 2010-09-23 | Inside Contactless | Verfahren zur Weiterleitung von aus- und eingehenden Daten in ein NFC-Chipset |
US20090037326A1 (en) * | 2007-07-30 | 2009-02-05 | Sriram Chitti | Virtual Card Selector for a Portable Electronic Device |
EP2221984A1 (en) * | 2009-02-23 | 2010-08-25 | Motorola, Inc. | Wireless communication device for providing at least one near field communication service |
JP5740102B2 (ja) | 2010-04-23 | 2015-06-24 | 国立大学法人名古屋大学 | 細胞評価装置、インキュベータ、プログラム、培養方法、手技評価装置、および、細胞評価モデル構築装置 |
US9614641B2 (en) * | 2010-05-12 | 2017-04-04 | Qualcomm Incorporated | Resource coordination for peer-to-peer groups through distributed negotiation |
JP2012039257A (ja) * | 2010-08-04 | 2012-02-23 | Sony Corp | 携帯端末、情報処理方法及びコンピュータプログラム |
US8977195B2 (en) * | 2011-01-06 | 2015-03-10 | Texas Insruments Incorporated | Multiple NFC card applications in multiple execution environments |
CN103404109B (zh) * | 2011-02-21 | 2017-04-05 | 黑莓有限公司 | 蜂窝网络中管理的对等共享 |
CN104428796B (zh) * | 2012-03-07 | 2017-09-01 | 飞力凯网路股份有限公司 | 通信设备、控制方法、程序和前端 |
US9161168B2 (en) * | 2013-03-15 | 2015-10-13 | Intel Corporation | Personal information communicator |
-
2013
- 2013-02-25 CN CN201380011796.4A patent/CN104428796B/zh active Active
- 2013-02-25 IN IN7294DEN2014 patent/IN2014DN07294A/en unknown
- 2013-02-25 JP JP2014503767A patent/JP6162683B2/ja active Active
- 2013-02-25 MY MYPI2014702341A patent/MY166919A/en unknown
- 2013-02-25 EP EP13758604.6A patent/EP2824611B1/en active Active
- 2013-02-25 EP EP17187515.6A patent/EP3276537B1/en active Active
- 2013-02-25 WO PCT/JP2013/054671 patent/WO2013133058A1/ja active Application Filing
- 2013-02-25 US US14/382,070 patent/US9237409B2/en active Active
- 2013-02-25 KR KR1020147024308A patent/KR102040348B1/ko active IP Right Grant
-
2015
- 2015-12-01 US US14/955,582 patent/US9444519B2/en active Active
-
2016
- 2016-07-26 US US15/220,020 patent/US10305547B2/en active Active
-
2017
- 2017-06-15 JP JP2017117860A patent/JP6461242B2/ja active Active
-
2018
- 2018-12-25 JP JP2018240885A patent/JP6792315B2/ja active Active
-
2019
- 2019-04-10 US US16/380,432 patent/US11088724B2/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2005223722A (ja) * | 2004-02-06 | 2005-08-18 | Matsushita Electric Ind Co Ltd | 携帯端末及び車載端末 |
JP2009128942A (ja) * | 2007-11-19 | 2009-06-11 | Felica Networks Inc | 情報処理装置、情報処理方法、及びプログラム |
WO2010115770A1 (en) * | 2009-04-08 | 2010-10-14 | Gemalto Sa | Method of preselecting at least one application in a mobile communication device comprising an nfc system |
JP2011049778A (ja) | 2009-08-26 | 2011-03-10 | Sony Corp | 情報処理装置およびプログラム |
JP2011259412A (ja) * | 2010-05-13 | 2011-12-22 | Canon Inc | 通信装置、通信装置の制御方法およびプログラム。 |
Non-Patent Citations (1)
Title |
---|
See also references of EP2824611A4 |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2858259B1 (en) * | 2013-10-07 | 2019-06-26 | Nxp B.V. | NFC tag, communication method and system |
FR3012236A1 (ja) * | 2013-10-17 | 2015-04-24 | Proton World Int Nv | |
US9838941B2 (en) | 2013-10-17 | 2017-12-05 | Proton World International N.V. | NFC routing method |
US9967798B2 (en) | 2013-10-17 | 2018-05-08 | Proton World lnternational N.V. | NFC routing method |
JP2018512104A (ja) * | 2015-02-19 | 2018-05-10 | クゥアルコム・インコーポレイテッドQualcomm Incorporated | 近傍界通信フォーラムリッスンモードプロファイル |
WO2017038821A1 (ja) * | 2015-09-04 | 2017-03-09 | フェリカネットワークス株式会社 | 情報処理装置、情報処理方法、プログラム、および情報処理システム |
JPWO2017038821A1 (ja) * | 2015-09-04 | 2018-06-14 | フェリカネットワークス株式会社 | 情報処理装置、情報処理方法、プログラム、および情報処理システム |
JP2017182625A (ja) * | 2016-03-31 | 2017-10-05 | ブラザー工業株式会社 | 通信装置 |
Also Published As
Publication number | Publication date |
---|---|
CN104428796A (zh) | 2015-03-18 |
KR20140141584A (ko) | 2014-12-10 |
JP2019083026A (ja) | 2019-05-30 |
JP6461242B2 (ja) | 2019-01-30 |
US9444519B2 (en) | 2016-09-13 |
EP2824611A4 (en) | 2015-11-25 |
EP3276537A1 (en) | 2018-01-31 |
KR102040348B1 (ko) | 2019-11-04 |
EP2824611A1 (en) | 2015-01-14 |
US20160087683A1 (en) | 2016-03-24 |
CN104428796B (zh) | 2017-09-01 |
EP3276537B1 (en) | 2019-04-24 |
MY166919A (en) | 2018-07-24 |
IN2014DN07294A (ja) | 2015-04-24 |
US20150038077A1 (en) | 2015-02-05 |
US9237409B2 (en) | 2016-01-12 |
JP6162683B2 (ja) | 2017-07-19 |
EP2824611B1 (en) | 2017-10-11 |
US20160337002A1 (en) | 2016-11-17 |
US10305547B2 (en) | 2019-05-28 |
JP2017201544A (ja) | 2017-11-09 |
JP6792315B2 (ja) | 2020-11-25 |
US11088724B2 (en) | 2021-08-10 |
JPWO2013133058A1 (ja) | 2015-07-30 |
US20190238187A1 (en) | 2019-08-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP6461242B2 (ja) | 通信装置 | |
US9907091B2 (en) | Communication device, control method, and program | |
EP2563046B1 (en) | Terminal, system, and method for retrieving an application | |
CN103503323B (zh) | 近场通信射频通信方法、装置和终端设备 | |
US20140176306A1 (en) | Near-field-communication (nfc) enabled mobile device and operation method thereof | |
US20170169263A1 (en) | Systems and methods for a cloud connected transponder | |
WO2015189229A1 (en) | Electronic device, system and method for nfc | |
CN107636982A (zh) | 数据帧路由处理的方法、近场通信控制器和终端 | |
US9547781B2 (en) | Method for recognizing tag in environment using same frequency band and NFC device for the same | |
CN113170376B (zh) | 用于装置集群管理的系统和方法 | |
Park et al. | Fast object identification with mode switching for coexistence of NFC and RFID | |
CN109195142B (zh) | 一种移动终端nfc数据传输检测方法、移动终端及存储介质 | |
KR101717231B1 (ko) | Nfc 장치와 rfid 시스템이 공존하는 환경에서 nfc 장치간 p2p 통신을 고려한 충돌 방지 방법 및 장치 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 13758604 Country of ref document: EP Kind code of ref document: A1 |
|
DPE1 | Request for preliminary examination filed after expiration of 19th month from priority date (pct application filed from 20040101) | ||
NENP | Non-entry into the national phase |
Ref country code: DE |
|
ENP | Entry into the national phase |
Ref document number: 2014503767 Country of ref document: JP Kind code of ref document: A |
|
REEP | Request for entry into the european phase |
Ref document number: 2013758604 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2013758604 Country of ref document: EP |
|
ENP | Entry into the national phase |
Ref document number: 20147024308 Country of ref document: KR Kind code of ref document: A |
|
WWE | Wipo information: entry into national phase |
Ref document number: IDP00201405190 Country of ref document: ID Ref document number: 14382070 Country of ref document: US |