Breakout Wiring
If you're using the shield, check the next page
Wiring the Breakout for SPI
The PN532 chip and breakout is designed to be used by 3.3V systems. To use it with a 5V system such as an Arduino, a level shifter is required to convert the high voltages into 3.3V. If you have a 3.3V embedded system you won't have to use the shifter of course!To begin, we'll solder in the header to the breakout board. You'll need two small 3-pin pieces of header and one 8-pin piece. You can break these off of a large piece.
- Arduino digital pin 2 is connected to 4050 pin 9 (orange wire)
- Arduino digital pin 3 is connected to 4050 pin 11(yellow wire)
- Arduino digital pin 4 is connected to 4050 pin 14 (green wire)
On the breakout board
- 3.3Vin is connected to the Arduino 3.3V pn
- SCK is connected to 4050 pin 10 (orange wire)
- MISO is connected to Arduino pin 5 (blue wire)
- MOSI is connected to 4050 pin 12 (yellow wire)
- SSEL is connected to 4050 pin 15& (green wire)
- GND connects to Arduino ground (black wire)
Also connect 4050 pin #1 to 3.3V and pin #8 to ground.
Click to see a larger image. The red power wire should be connected to the 3.3v pin on the Arduino!
That's it! Later on you can change what Arduino pins you are using but for the beginning test we suggest matching our wiring.
Shield Wiring
Solder the Headers
The first step is to solder the headers to the shield. Cut the header strip to length and insert the sections (long pins down) into an Arduino. Then place the shield on top and solder each pin.Using the Adafruit NFC Shield with I2C
The Adafruit NFC shield is designed to be used using the I2C by default. I2C only uses two pins (Analog 4 and 5 which are fixed in hardware and cannot be changed) to communicate and one pin as an 'interrupt' pin (Digital 2 - can be changed however). What is nice about I2C is that it is a 'shared' bus - unlike SPI and TTL serial - so you can put as many sensors as you'd like all on the same two pins, as long as their addresses don't collide/conflict. The Interrupt pin is handy because instead of constantly asking the NFC shield "is there a card in view yet? what about now?" constantly, the chip will alert us when a NFC target comes into the antenna range.The shield is drop-in compatible with any Classic Arduino (UNO, Duemilanove, Diecimilla, etc using the ATmega168 or '328) as well as any Mega R3 or later.
Mega R2 Arduinos work as well but you need to solder a wire from the SDA and SCL pin holes to the Mega's I2C pins on Digital #20 and #21
Arduino Library
Which Library?
In the past there were two separate Arduino libraries for using the Adafruit NFC boards. One library supported the breakout over a SPI connection, and the other library supported the breakout or shield over an I2C connection. However both of these libraries have been merged into a single Arduino library, Adafruit-PN532.
The Adafruit PN532 library has the ability to read MiFare cards, including the hard-coded ID numbers, as well as authenticate and read/write EEPROM chunks. It can work with both the breakout and shield using either a SPI or I2C connection.
Library Installation
Download the Adafruit PN532 library from github. Uncompress the folder and rename the folder Adafruit_PN532. Inside the folder you should see the Adafruit_PN532.cpp and Adafruit_PN532.h files. Install the Adafruit_PN532 library foler by placing it in your arduinosketchfolder/libraries folder. You may have to create the libraries subfolder if this is your first library. You can read more about installing libraries in our tutorial.
Restart the Arduino IDE. You should now be able to select File > Examples > Adafruit_PN532 > readMifare sketch.
If you're using the NFC breakout with a SPI connection that uses the wiring shown on previous pages you can immediately upload the sketch to the Arduino and skip down to the Testing MiFare section.
If you're using the NFC shield, or are using the breakout with an I2C connection then you must make a small change to configure the example for I2C. Scroll down to these lines near the top of the sketch:
// Uncomment just _one_ line below depending on how your breakout or shield // is connected to the Arduino: // Use this line for a breakout with a SPI connection: Adafruit_PN532 nfc(PN532_SCK, PN532_MISO, PN532_MOSI, PN532_SS); // Use this line for a breakout with a hardware SPI connection. Note that // the PN532 SCK, MOSI, and MISO pins need to be connected to the Arduino's // hardware SPI SCK, MOSI, and MISO pins. On an Arduino Uno these are // SCK = 13, MOSI = 11, MISO = 12. The SS line can be any digital IO pin. //Adafruit_PN532 nfc(PN532_SS); // Or use this line for a breakout or shield with an I2C connection: //Adafruit_PN532 nfc(PN532_IRQ, PN532_RESET);
Change them so the second line is uncommented and the first line is commented. This will configure the sketch to make the library use I2C for communication with the NFC shield or breakout. The modified code should look like:
// Uncomment just _one_ line below depending on how your breakout or shield // is connected to the Arduino: // Use this line for a breakout with a SPI connection: //Adafruit_PN532 nfc(PN532_SCK, PN532_MISO, PN532_MOSI, PN532_SS); // Use this line for a breakout with a hardware SPI connection. Note that // the PN532 SCK, MOSI, and MISO pins need to be connected to the Arduino's // hardware SPI SCK, MOSI, and MISO pins. On an Arduino Uno these are // SCK = 13, MOSI = 11, MISO = 12. The SS line can be any digital IO pin. //Adafruit_PN532 nfc(PN532_SS); // Or use this line for a breakout or shield with an I2C connection: Adafruit_PN532 nfc(PN532_IRQ, PN532_RESET);
Then upload the example to the Arduino and continue on. Note that you need to make a similar change to pick the interface for any other NFC example from the library.
Testing MiFare
In the serial monitor, you should see that it found the PN532 chip. Then you can place your tag nearby and it will display the 4 byte ID code (this one is 0xAE 0x4C 0xF0 0x6C) and then the integer version of all four bytes together. You can use this number to identify each card. Recently NXP made so many cards that they actually ran through all 4 Bytes (2^32) so the number is not guaranteed to be absolutely unique. However, the chances are extremely slim you will have two cards with the same ID so as long as you aren't using these cards for anything terribly important (like money transfer) its fine to use the number as a unique identifierPython & CircuitPython
It's easy to use the PN532 breakout and shield with Python and CircuitPython, and the Adafruit CircuitPython PN532 module. This module allows you to easily write Python code that reads and writes data from and to RFID/NFC tags.
You can use this breakout with any CircuitPython microcontroller board or with a computer that has GPIO and Python thanks to Adafruit_Blinka, our CircuitPython-for-Python compatibility library.
CircuitPython Microcontroller Wiring
First assemble a PN532 breakout or shield exactly as shown on the previous pages.
Here's an example of wiring a Feather M0 to the breakout with I2C:
- Board 3V to breakout 3.3V
- Board GND to breakout GND
- Board SCL to breakout SCL
- Board SDA to breakout SDA
- Board D6 to breakout RSTOUT_N
I2C requires external pull ups on SCL and SDA!
You must set the jumpers to enable I2C on your PN532! For I2C:
- SEL0 = ON
- SEL1 = OFF
Here's an example of wiring a Feather M0 to the breakout using SPI:
- Board 3V to breakout 3.3V
- Board GND to breakout GND
- Board MISO to breakout MISO
- Board MOSI to breakout MOSI
- Board SCK to breakout SCK
- Board D5 to breakout SSEL
You must set the jumpers to enable SPI on your PN532! For SPI:
- SEL0 = OFF
- SEL1 = ON
Here's an example of wiring a Feather M0 to the breakout using UART:
- Board 3V to breakout 3.3V
- Board GND to breakout GND
- Board RX to breakout TX
- Board TX to breakout RX
You must set the jumpers to enable UART on your PN532! For UART:
- SEL0 = OFF
- SEL1 = OFF
Here's an example of wiring a Metro M0 to the shield using I2C:
Assemble the shield as shown in the previous pages, and plug into your Metro M0.
You must set the jumpers to enable I2C on your PN532! For I2C:
- SEL0 = ON
- SEL1 = OFF
Python Computer Wiring
Since there's dozens of Linux computers/boards you can use we will show wiring for Raspberry Pi. For other platforms, please visit the guide for CircuitPython on Linux to see whether your platform is supported.
Here's the Raspberry Pi wired with SPI:
- Pi 3V to breakout 3.3V
- Pi GND to breakout GND
- Pi MOSI to breakout MOSI
- Pi MISO to breakout MISO
- Pi SCLK to breakout SCK
- Pi D5 to breakout SSEL
You must set the jumpers to enable SPI on your PN532! For SPI:
- SEL0 = OFF
- SEL1 = ON
We don't recommand using I2C, but here's the Raspberry Pi wired with I2C:
- Pi 3V to breakout 3.3V
- Pi GND to breakout GND
- Pi SCL to breakout SCL
- Pi SDA to breakout SDA
-
Pi D6 to breakout RSTPD_N
- Pi D12 to breakout P32
You must set the jumpers to enable I2C on your PN532! For I2C:
- SEL0 = ON
- SEL1 = OFF
We don't recommand using UART, but here's the Raspberry Pi wired with UART:
- Pi 3V to breakout 3.3V
- Pi GND to breakout GND
- Pi RXD to breakout TX
- Pi TXD to breakout RX
You must set the jumpers to enable UART on your PN532! For UART:
- SEL0 = OFF
- SEL1 = OFF
CircuitPython Installation of PN532 Library
Next you'll need to install the Adafruit CircuitPython PN532 library on your CircuitPython board.
First make sure you are running the latest version of Adafruit CircuitPython for your board.
Next you'll need to install the necessary libraries to use the hardware--carefully follow the steps to find and install these libraries from Adafruit's CircuitPython library bundle. Our introduction guide has a great page on how to install the library bundle for both express and non-express boards.
Remember for non-express boards like the, you'll need to manually install the necessary libraries from the bundle:
- adafruit_pn532.mpy
- adafruit_bus_device
Before continuing make sure your board's lib folder or root filesystem has the adafruit_pn532.mpy, and adafruit_bus_device files and folders copied over.
Next connect to the board's serial REPL so you are at the CircuitPython >>> prompt.
Python Installation of PN532 Library
You'll need to install the Adafruit_Blinka library that provides the CircuitPython support in Python. This may also require enabling I2C on your platform and verifying you are running Python 3. Since each platform is a little different, and Linux changes often, please visit the CircuitPython on Linux guide to get your computer ready!
Once that's done, from your command line run the following command:
sudo pip3 install adafruit-circuitpython-pn532
If your default Python is version 3 you may need to run 'pip' instead. Just make sure you aren't trying to use CircuitPython on Python 2.x, it isn't supported!
CircuitPython & Python Usage
To demonstrate the usage of the breakout we'll initialize it and read the ID from a tag using the board's Python REPL.
Run the following code to import the necessary modules and assign the reset pin to a digital pin on your board. We've used D6:
import board import busio from digitalio import DigitalInOut from adafruit_pn532.i2c import PN532_I2C reset_pin = DigitalInOut(board.D6)
On Raspberry Pi, you must also connect a pin to P32 "H_Request" for hardware wakeup. This avoids I2C clock stretching.
req_pin = DigitalInOut(board.D12)
Initialise the I2C object:
i2c = busio.I2C(board.SCL, board.SDA) pn532 = PN532_I2C(i2c, debug=False, reset=reset_pin, req=req_pin)
Now we can start interacting with NFC/RFID tags using the following functions:
-
firmware_version
- Get the latest firmware version.
SAM_configuration
- configure the PN532 to read MiFare cards.read_passive_target
- Wait for a MiFare card to be available and return its UID when found.call_function
- Send specified command to the PN532 and expect up toresponse_length
bytes back in a response.mifare_classic_authenticate_block
- Authenticate specified block number for a MiFare classic card.mifare_classic_read_block
- Read a block of data from the card.mifare_classic_write_block
- Write a block of data to the card.ntag2xx_read_block
- Read a block of data from the card.ntag2xx_write_block
- Write a block of data to the card.
First, we'll verify the PN532 is connected and check the firmware.
ic, ver, rev, support = pn532.firmware_version print('Found PN532 with firmware version: {0}.{1}'.format(ver, rev))
Now we're going to configure the PN532 to read MiFare cards. Then we'll wait for a card to be available and print the UID.
First we check to see if a card is available. While we're waiting we'll print .
to the serial output so we know it's still looking. If no card is found, we continue looking. When a card is found, we print the UID.
pn532.SAM_configuration() while True: uid = pn532.read_passive_target(timeout=0.5) print('.', end="", flush=True) if uid is None: continue print('Found card with UID:', [hex(i) for i in uid])
Touch a MiFare card to the breakout!
That's all there is to reading the UID from a card with CircuitPython and the PN532! For more information, check out the documentation.
# SPDX-FileCopyrightText: 2021 ladyada for Adafruit Industries # SPDX-License-Identifier: MIT """ This example shows connecting to the PN532 with I2C (requires clock stretching support), SPI, or UART. SPI is best, it uses the most pins but is the most reliable and universally supported. After initialization, try waving various 13.56MHz RFID cards over it! """ import board import busio from digitalio import DigitalInOut # # NOTE: pick the import that matches the interface being used # from adafruit_pn532.i2c import PN532_I2C # from adafruit_pn532.spi import PN532_SPI # from adafruit_pn532.uart import PN532_UART # I2C connection: i2c = busio.I2C(board.SCL, board.SDA) # Non-hardware # pn532 = PN532_I2C(i2c, debug=False) # With I2C, we recommend connecting RSTPD_N (reset) to a digital pin for manual # harware reset reset_pin = DigitalInOut(board.D6) # On Raspberry Pi, you must also connect a pin to P32 "H_Request" for hardware # wakeup! this means we don't need to do the I2C clock-stretch thing req_pin = DigitalInOut(board.D12) pn532 = PN532_I2C(i2c, debug=False, reset=reset_pin, req=req_pin) # SPI connection: # spi = busio.SPI(board.SCK, board.MOSI, board.MISO) # cs_pin = DigitalInOut(board.D5) # pn532 = PN532_SPI(spi, cs_pin, debug=False) # UART connection # uart = busio.UART(board.TX, board.RX, baudrate=115200, timeout=0.1) # pn532 = PN532_UART(uart, debug=False) ic, ver, rev, support = pn532.firmware_version print("Found PN532 with firmware version: {0}.{1}".format(ver, rev)) # Configure PN532 to communicate with MiFare cards pn532.SAM_configuration() print("Waiting for RFID/NFC card...") while True: # Check if a card is available to read uid = pn532.read_passive_target(timeout=0.5) print(".", end="") # Try again if no card is available. if uid is None: continue print("Found card with UID:", [hex(i) for i in uid])
About NFC
NFC (Near Field Communication)
NFC (Near Field Communication) is a set of short-range (typically up to 10cm) wireless communication technologies designed to offer light-weight and secure communication between two devices. While NFC was invented by NXP (Phillips at the time), Nokia and Sony, the main body behind the NFC 'standard' today is the NFC Forum, who are responsible for publishing and maintaining a variety of standards relating to NFC technology.NFC operates at 13.56MHz, and is based around an "initiator" and "target" model where the initiator generates a small magnetic field that powers the target, meaning that the target does not require a power source. This means of communication is referred to as Passive Communication, and is used to read and write to small, inexpensive 13.56MHz RFID tags based on standards like ISO14443A. Active communication (peer-to-peer) is also possible when both devices are powered, where each device alternately creates its own magentic field, with the secondary device as a target and vice versa in continuous rotation.
Passive Communication: ISO14443A Cards (Mifare, etc.)
While the PN53x family of transceivers from NXP are compatible with a number of 13.56MHz RFID card standards, by far the most popular standard is ISO14443A. A variety of manufacturers produce ISO14443A compatible cards or chips, but the most common are based around the Mifare family from NXP. Mifare Classic and Mifare Ultralight are probably the most frequently encountered and useful for basic projects, though many tags with improved security and encryption also exist (Mifare DESFire, etc.). All of the tags sold at adafruit.com are Mifare Classic 1K, meaning that they contains 1K (1024 bytes) of programmable EEPROM memory which can be read and modified in passive mode by the initiator device (the PN532).While all ISO14443A cards share certain common characteristics on the highest level (defined by the four part standard), each set of Mifare chips (Classic, Ultralight, Plus, DESFire, etc.) has it's own features and peculiarities. The two most common formats are described below.
- Mifare Classic: These cards are extremely common, and contain 1K or 4K of EEPROM, with basic security for each 64 byte (1K/4K cards) or 256 byte (4K cards) sector.
- Mifare Ultralight: Contains 512 bytes of EEPROM, including 32-bits of OTP memory. These tags are inexpensive, often come in sticker format and are are frequently used for transportation ticketing, concert tickets, etc.
Active Communication (Peer-to-Peer)
Active or "Peer-to-Peer" communication is still based around the Initiator/Target model described earlier, but both devices are actively powered and switch roles from being an Initiator or a Target during the communication. When one device is initiating a conversation with the other, it enables it's magnetic field and the receiving device listens in (with it's own magnetic field disabled). Afterwards, the target/recipient device may need to respond and will in turn activate it's own magnetic field and the original device will be configured as the target. Despite two devices being present, only one magnetic field is active at a time, with each device constantly enabling or disabling its own magnetic field.ToDo: Add better description of active mode, but I need to test it out a bit first myself!
NFC Data Exchange Format (NDEF)
The NFC Data Exchange Format (NDEF) is a standardised data format that can be used to exchange information between any compatible NFC device and another NFC device or tag. The data format consists of NDEF Messages and NDEF Records. The standard is maintained by the NFC Forum and is freely available for consultation but requires accepting a license agreement to download.The NDEF format is used to store and exchange information like URIs, plain text, etc., using a commonly understood format. NFC tags like Mifare Classic cards can be configured as NDEF tags, and data written to them by one NFC device (NDEF Records) can be understood and accessed by any other NDEF compatible device. NDEF messages can also be used to exchange data between two active NFC devices in "peer-to-peer" mode. By adhering to the NDEF data exchange format during communication, devices that would otherwise have no meaningful knowledge of each other or common language are able to share data in an organised, mutually understandable manner.
The NDEF standard includes numerous Record Type Definitions (RTDs) that define how information like URIs should be stored, and each NDEF device, tag or message can contained multiple RTDs. Standard RTD definitions are described in "NFC Record Type Definition (RTD) Specification” maintained by the NFC Forum.
* NDEF Overview: This page offers a more detailed explanation of NDEF, including how Mifare Classic cards can be used to store NDEF messages.
NOTE: The dedicated NDEF page is still a work in progress and some information is currently incomplete.
Reading
For more details about NFC/RFID and this chip we suggest the following fantastic resources:- RFID selection guide - a lot of details about RFID in general
- Nokia's Introduction to NFC - a lot of details about NFC in general
- NXP S50 chip datasheet , the chip inside MiFare classic tags
- NXP PN532 Short Form Datasheet
- NXP PN532 Long Form Datasheet
- NXP PN532 User Manual
- NXP PN532 App Note
- Using PN532 with libnfc
MiFare Cards & Tags
MiFare Classic Cards
MIFARE Classic cards come in 1K and 4K varieties. While several varieties of chips exist, the two main chipsets used are described in the following publicly accessible documents:Mifare Classic cards typically have a 4-byte NUID that uniquely (within the numeric limits of the value) identifies the card. It's possible to have a 7 byte IDs as well, but the 4 byte models are far more common for Mifare Classic.EEPROM Memory
Mifare Classic cards have either 1K or 4K of EEPROM memory. Each memory block can be configured with different access conditions, with two seperate authentication keys present in each block.Mifare Classic cards are divided into section called sectors and blocks. Each "sector" has individual access rights, and contains a fixed number of "blocks" that are controlled by these access rights. Each block contains 16 bytes, and sectors contains either 4 blocks (1K/4K cards) for a total of 64 bytes per sector, or 16 blocks (4K cards only) for a total of 256 bytes per sector. The card types are organised as follows:
- 1K Cards - 16 sectors of 4 blocks each (sectors 0..15)
- 4K Cards - 32 sectors of 4 blocks each (sectors 0..31) and 8 sectors of 16 blocks each (sectors 32..39)
4 Block Sectors
1K and 4K cards both use 16 sectors of 4 blocks each, with the bottom 1K of memory on the 4K cards being organised identically to the 1K models for compatability reasons. These individual 4 block sectors (containing 64 byts each) have basic security features are can each be configured with seperate read/write access and two different 6-byte authentication keys (the keys can be different for each sector). Due to these security features (which are stored in the last block, called the Sector Trailer), only the bottom 3 blocks of each sector are actually available for data storage, meaning you have 48 bytes per 64 byte sector available for your own use.Each 4 block sector is organised as follows, with four rows of 16 bytes each for a total of 64-bytes per sector. The first two sectors of any card are shown:
Sector Block Bytes Description ------ ----- ----- ----------- 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
1 3 [-------KEY A-------] [Access Bits] [-------KEY B-------] Sector Trailer 2 [ Data ] Data 1 [ Data ] Data 0 [ Data ] Data
0 3 [-------KEY A-------] [Access Bits] [-------KEY B-------] Sector Trailer 2 [ Data ] Data 1 [ Data ] Data 0 [ Manufacturer Data ] Manufacturer Block
The sector trailer block contains the two secret keys (Key A and Key B), as well as the access conditions for the four blocks. It has the following structure:
Sector Trailer Bytes -------------------------------------------------------------- 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 [ Key A ] [Access Bits] [ Key B ]
Data Blocks (Blocks 0..2)
Data blocks are 16 bytes wide and, depending on the permissions set in the access bits, can be read from and written to. You are free to use the 16 data bytes in any way you wish. You can easily store text input, store four 32-bit integer values, a 16 character uri, etc.
Data Blocks as "Value Blocks"
An alternative to storing random data in the 16 byte-wide blocks is to configure them as "Value Blocks". Value blocks allow performing electronic purse functions (valid commands are: read, write, increment, decrement, restore, transfer).
Each Value block contains a single signed 32-bit value, and this value is stored 3 times for data integrity and security reasons. It is stored twice non-inverted, and once inverted. The last 4 bytes are used for a 1-byte address, which is stored 4 times (twice non-inverted, and twice inverted).
Data blocks configured as "Value Blocks" have the following structure:
Value Block Bytes -------------------------------------------------------------- 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 [ Value ] [ ~Value ] [ Value ] [A ~A A ~A]
Sector 0 is special since it contains the Manufacturer Block. This block contains the manufacturer data, and is read-only. It should be avoided unless you know what you are doing.
16 Block Sectors
16 block sectors are identical to 4 block sectors, but with more data blocks. The same structure described in the 4 block sectors above applies.Sector Block Bytes Description ------ ----- ----- ---------- 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
32 15 [-------KEY A-------] [Access Bits] [-------KEY B-------] Sector Trailer 32 14 [ Data ] Data 13 [ Data ] Data ... 2 [ Data ] Data 1 [ Data ] Data 0 [ Data ] Data
Accessing EEPROM Memory
To access the EEPROM on the cards, you need to perform the following steps:- You must retrieve the 4-byte NUID of the card (this can sometimes be 7-bytes long as well, though rarely for Mifare Classic cards). This is required for the subsequent authentication process.
- You must authenticate the sector you wish to access according to the access rules defined in the Sector Trailer block for that sector, by passing in the appropriate 6 byte Authentication Key (ex. 0xFF 0xFF 0xFF 0xFF 0xFF 0xFF for new cards).
- Once authenication has succeeded, and depending on the sector permissions, you can then read/write/increment/decrement the contents of the specific block. Note that you need to re-authenticate for each sector that you access, since each sector can have it's own distinct access keys and rights!
Note on Authentication
Before you can do access the sector's memory, you first need to "authenticate" according to the security settings stored in the Sector Trailer. By default, any new card will generally be configured to allow full access to every block in the sector using Key A and a value of 0xFF 0xFF 0xFF 0xFF 0xFF 0xFF. Some other common keys that you may wish to try if this doesn't work are:0XFF 0XFF 0XFF 0XFF 0XFF 0XFF 0XD3 0XF7 0XD3 0XF7 0XD3 0XF7 0XA0 0XA1 0XA2 0XA3 0XA4 0XA5 0XB0 0XB1 0XB2 0XB3 0XB4 0XB5 0X4D 0X3A 0X99 0XC3 0X51 0XDD 0X1A 0X98 0X2C 0X7E 0X45 0X9A 0XAA 0XBB 0XCC 0XDD 0XEE 0XFF 0X00 0X00 0X00 0X00 0X00 0X00 0XAB 0XCD 0XEF 0X12 0X34 0X56
Example of a New Mifare Classic 1K Card
The follow memory dump illustrates the structure of a 1K Mifare Classic Card, where the data and Sector Trailer blocks can be clearly seen:[--------------------------Start of Memory Dump--------------------------] ------------------------Sector 0------------------------- Block 0 8E 02 6F 66 85 08 04 00 62 63 64 65 66 67 68 69 ?.of?...bcdefghi Block 1 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Block 2 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Block 3 00 00 00 00 00 00 FF 07 80 69 FF FF FF FF FF FF ......ÿ.?iÿÿÿÿÿÿ ------------------------Sector 1------------------------- Block 4 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Block 5 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Block 6 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Block 7 00 00 00 00 00 00 FF 07 80 69 FF FF FF FF FF FF ......ÿ.?iÿÿÿÿÿÿ ------------------------Sector 2------------------------- Block 8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Block 9 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Block 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Block 11 00 00 00 00 00 00 FF 07 80 69 FF FF FF FF FF FF ......ÿ.?iÿÿÿÿÿÿ ------------------------Sector 3------------------------- Block 12 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Block 13 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Block 14 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Block 15 00 00 00 00 00 00 FF 07 80 69 FF FF FF FF FF FF ......ÿ.?iÿÿÿÿÿÿ ------------------------Sector 4------------------------- Block 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Block 17 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Block 18 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Block 19 00 00 00 00 00 00 FF 07 80 69 FF FF FF FF FF FF ......ÿ.?iÿÿÿÿÿÿ ------------------------Sector 5------------------------- Block 20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Block 21 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Block 22 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Block 23 00 00 00 00 00 00 FF 07 80 69 FF FF FF FF FF FF ......ÿ.?iÿÿÿÿÿÿ ------------------------Sector 6------------------------- Block 24 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Block 25 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Block 26 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Block 27 00 00 00 00 00 00 FF 07 80 69 FF FF FF FF FF FF ......ÿ.?iÿÿÿÿÿÿ ------------------------Sector 7------------------------- Block 28 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Block 29 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Block 30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Block 31 00 00 00 00 00 00 FF 07 80 69 FF FF FF FF FF FF ......ÿ.?iÿÿÿÿÿÿ ------------------------Sector 8------------------------- Block 32 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Block 33 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Block 34 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Block 35 00 00 00 00 00 00 FF 07 80 69 FF FF FF FF FF FF ......ÿ.?iÿÿÿÿÿÿ ------------------------Sector 9------------------------- Block 36 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Block 37 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Block 38 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Block 39 00 00 00 00 00 00 FF 07 80 69 FF FF FF FF FF FF ......ÿ.?iÿÿÿÿÿÿ ------------------------Sector 10------------------------- Block 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Block 41 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Block 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Block 43 00 00 00 00 00 00 FF 07 80 69 FF FF FF FF FF FF ......ÿ.?iÿÿÿÿÿÿ ------------------------Sector 11------------------------- Block 44 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Block 45 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Block 46 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Block 47 00 00 00 00 00 00 FF 07 80 69 FF FF FF FF FF FF ......ÿ.?iÿÿÿÿÿÿ ------------------------Sector 12------------------------- Block 48 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Block 49 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Block 50 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Block 51 00 00 00 00 00 00 FF 07 80 69 FF FF FF FF FF FF ......ÿ.?iÿÿÿÿÿÿ ------------------------Sector 13------------------------- Block 52 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Block 53 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Block 54 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Block 55 00 00 00 00 00 00 FF 07 80 69 FF FF FF FF FF FF ......ÿ.?iÿÿÿÿÿÿ ------------------------Sector 14------------------------- Block 56 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Block 57 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Block 58 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Block 59 00 00 00 00 00 00 FF 07 80 69 FF FF FF FF FF FF ......ÿ.?iÿÿÿÿÿÿ ------------------------Sector 15------------------------- Block 60 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Block 61 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Block 62 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Block 63 00 00 00 00 00 00 FF 07 80 69 FF FF FF FF FF FF ......ÿ.?iÿÿÿÿÿÿ [---------------------------End of Memory Dump---------------------------]
MiFare Ultralight Cards
MiFare Ultralight cards typically contain 512 bits (64 bytes) of memory, including 4 bytes (32-bits) of OTP (One Time Programmable) memory where the individual bits can be written but not erased.MF0ICU1 MiFare Ultralight Functional Specification
MiFare Ultralight cards have a 7-byte UID that uniquely identifies the card.
EEPROM Memory
MiFare Ultralight cards have 512 bits (64 bytes) of EEPROM memory, including 4 byte (32 bits) of OTP memory. Unlike Mifare Classic cards, there is no authentication on a per block level, although the blocks can be set to "read-only" mode using Lock Bytes (described below).EEPROM memory is organised into 16 pages of four bytes eachs, in the following order:
Page Description ---- ------------ 0 Serial Number (4 bytes) 1 Serial Number (4 bytes) 2 Byte 0: Serial Number Byte 1: Internal Memory Byte 2..3: lock bytes 3 One-time programmable memory (4 bytes) 4..15 User memory (4 bytes)
Page Block 0 Block 1 Block 2 Block 3 ----- --------------------------------------- 0 [ Serial Number ] 1 [ Serial Number ] 2 [Serial] - [Intern] - [ Lock Bytes ] 3 [ One Time Programmable Memory ] 4 [ User Data ] 5 [ User Data ] 6 [ User Data ] 7 [ User Data ] 8 [ User Data ] 9 [ User Data ] 10 [ User Data ] 11 [ User Data ] 12 [ User Data ] 13 [ User Data ] 14 [ User Data ] 15 [ User Data ]
Lock Bytes (Page 2)
Bytes 2 and 3 of page 2 are referred to as "Lock Bytes". Each page from 0x03 and higher can individually locked by setting the corresponding locking bit to "1" to prevent further write access, effectively making the memory read only.For more information on the lock byte mechanism, refer to section 8.5.2 of the datasheet (referenced above).
OTP Bytes (Page 3)
Page 3 is the OTP memory, and by default all bits on this page are set to 0. These bits can be bitwise modified using the MiFare WRITE command, and individual bits can be set to 1, but can not be changed back to 0.Data Pages (Page 4-15)
Pages 4 to 15 are can be freely read from and written to, provided there is no conflict with the Lock Bytes described above.After production, the bytes have the following default values:
Page Byte Values ---- ---------------------- 0 1 2 3 4 0xFF 0xFF 0xFF 0xFF 5..15 0x00 0x00 0x00 0x00
Accessing Data Blocks
In order to access the cards, you must following two steps:- 'Connect' to a Mifare Ultralight card and retrieve the 7 byte UID of the card.
- Memory can be read and written directly once a passive mode connection has been made. No authentication is required for Mifare Ultralight cards.
Read/Write Lengths
For compatability reasons, "Read" requests to a Mifare Ultralight card will retrieve 16 bytes (4 pages) at a time (which corresponds to block size of a Mifare Classic card). For example, if you specify that you want to read page 3, in reality pages 3, 4, 5 and 6 will be read and returned, and you can simply discard the last 12 bytes if they aren't needed. If you select a higher page, the 16 byte read will wrap over to page 0. For example, reading page 14 will actually return page 14, 15, 0 and 1."Write" requests occur in pages (4 bytes), so there is no problem with overwriting data on subsequent pages.
About the NDEF Format
NDEF (NFC Data Exchange Format)
The NFC Data Exchange Format (NDEF) is a standardised data format that can be used to exchange information between any compatible NFC device and another NFC device or tag. The data format consists of NDEF Messages and NDEF Records. The standard is maintained by the NFC Forum and is freely available for consultation but requires accepting a license agreement to download.
The NDEF format is used to store and exchange information like URIs, plain text, etc., using a commonly understood format. NFC tags like Mifare Classic cards can be configured as NDEF tags, and data written to them by one NFC device (NDEF Records) can be understood and accessed by any other NDEF compatible device. NDEF messages can also be used to exchange data between two active NFC devices in "peer-to-peer" mode. By adhering to the NDEF data exchange format during communication, devices that would otherwise have no meaningful knowledge of each other or common language are able to share data in an organised, mutually understandable manner.
NDEF Messages
NDEF Messages are the basic "transportation" mechanism for NDEF records, with each message containing one or more NDEF Records.NDEF Records
NDEF Records contain a specific payload, and have the following structure that identifies the contents and size of the record:Bit 7 6 5 4 3 2 1 0 ------ ------ ------ ------ ------ ------ ------ ------ [ MB ] [ ME ] [ CF ] [ SR ] [ IL ] [ TNF ] [ TYPE LENGTH ] [ PAYLOAD LENGTH ] [ ID LENGTH ] [ RECORD TYPE ] [ ID ] [ PAYLOAD ]
Record Header (Byte 0)
The record header contains a number of important fields, including a 3-bit field that identifies the type of record that follows (the Type Name Format or TNF):TNF: Type Name Format Field
The Type Name Format or TNF Field of an NDEF record is a 3-bit value that describes the record type, and sets the expectation for the structure and content of the rest of the record. Possible record type names include:
TNF Value Record Type --------- ----------------------------------------- 0x00 Empty Record Indicates no type, id, or payload is associated with this NDEF Record. This record type is useful on newly formatted cards since every NDEF tag must have at least one NDEF Record. 0x01 Well-Known Record Indicates the type field uses the RTD type name format. This type name is used to stored any record defined by a Record Type Definition (RTD), such as storing RTD Text, RTD URIs, etc., and is one of the mostly frequently used and useful record types. 0x02 MIME Media Record Indicates the payload is an intermediate or final chunk of a chunked NDEF Record 0x03 Absolute URI Record Indicates the type field contains a value that follows the absolute-URI BNF construct defined by RFC 3986 0x04 External Record Indicates the type field contains a value that follows the RTD external name specification 0x05 Unknown Record Indicates the payload type is unknown 0x06 Unchanged Record Indicates the payload is an intermediate or final chunk of a chunked NDEF Record
IL: ID LENGTH Field
The IL flag indicates if the ID Length Field is preent or not. If this is set to 0, then the ID Length Field is ommitted in the record.
SR: Short Record Bit
The SR flag is set to one if the PAYLOAD LENGTH field is 1 byte (8 bits/0-255) or less. This allows for more compact records.
CF: Chunk Flag
The CF flag indicates if this is the first record chunk or a middle record chunk.
ME: Message End
The ME flag indicates if this is the last record in the message.
MB: Message Begin
The MB flag indicates if this is the start of an NDEF message.
Type Length
Indicates the length (in bytes) of the Record Type field. This value is always zero for certain types of records defined with the TNF Field described above.Payload Length
Indicates the length (in bytes) of the record payload. If the SR field (described above) is set to 1 in the record header, this value will be one byte long (for a payload length from 0-255 bytes). If the SR field is set to 0, this value will be a 32-bit value occupying 4 bytes.ID Length
Indicates the length in bytes of the ID field. This field is present only if the IL flag (described above) is set to 1 in the record header.Record Type
This value describes the 'type' of record that follows. The values of the type field must corresponse to the value entered in the TNF bits of the record header.Record ID
The value of the ID field if an ID is included (the IL bit in the record header is set to 1). If the IL bit is set to 0, this field is ommitted.Payload
The record payload, which will be exactly the number of bytes described in the Payload Length field earlier.Well-Known Records (TNF Record Type 0x01)
Probably the most useful record type is the "NFC Forum Well-Known Type" (TNF Type 0x01). Record types that adhere to the "Well-Defined" type are each described by something called an RTD or Record Type Definition. Some of the current Well-Defined RTDs are:URI Records (0x55/'U')
The "Well Known Type" for a URI record is 0x55 ('U'), and this record type can be used to store a variety of useful information such as telephone numbers (tel:), website addresses, links to FTP file locations, etc.URI Records are defined in the document "URI Record Type Definition" from the NFC Forum, and it has the following structure:
Name Offset Size Description ---- ------ ---- ----------- Identifier Code 0 1 byte See table below URI Field 1 N bytes The rest of the URI (depending on byte 0 above)
Value Protocol ----- -------- 0x00 No prepending is done ... the entire URI is contained in the URI Field 0x01 http://www. 0x02 https://www. 0x03 http:// 0x04 https:// 0x05 tel: 0x06 mailto: 0x07 ftp://anonymous:[email protected] 0x08 ftp://ftp. 0x09 ftps:// 0x0A sftp:// 0x0B smb:// 0x0C nfs:// 0x0D ftp:// 0x0E dav:// 0x0F news: 0x10 telnet:// 0x11 imap: 0x12 rtsp:// 0x13 urn: 0x14 pop: 0x15 sip: 0x16 sips: 0x17 tftp: 0x18 btspp:// 0x19 btl2cap:// 0x1A btgoep:// 0x1B tcpobex:// 0x1C irdaobex:// 0x1D file:// 0x1E urn:epc:id: 0x1F urn:epc:tag: 0x20 urn:epc:pat: 0x21 urn:epc:raw: 0x22 urn:epc: 0x23 urn:nfc:
Example NDEF Records
Well Known Records
URI Record
An example of a URI record is shown in "Memory Dump of a Mifare Classic 1K Card with an NDEF Record" below.
Text Record
To Do
Smartposter Record
To Do
Absolute URI Record
To Do
Using Mifare Classic Cards as an NDEF Tag
Mifare Classic 1K and 4K cards can be configured as NFC Forum compatible NDEF tags, but they must be organised in a certain manner to do so. The requirements to make a Mifare Classic card "NFC Forum compliant" are described in the following App Note from NXP:AN1304 - NFC Type MIFARE Classic Tag Operation
While the App Note above is the authoritative source on the matter, the following notes may also offer a quick overview of the key concepts involved in using Mifare Classic cards as NFC Forum compatible 'NDEF' tags:
Mifare Application Directory (MAD)
In order to form a relationship between the sector-based memory of a Mifare Classic card and the individual NDEF records, the Mifare Application Directory (MAD) structure is used. The MAD indicates which sector(s) contains which NDEF record. The definitive source of information on the Mifare Application Directory is the following application note:AN10787 - MIFARE Application Directory (MAD)
For reference sake, the two types of MADs (depending on the size of the card in question) are defined below:
Mifare Application Directory 1 (MAD1)
MAD1 can be used in any Mifare Classic card regardless of the size of the EEPROM, although if it is used with cards larger than 1KB only the first 1KB of memory will be accessible for NDEF records.The MAD1 is stored in the Manufacturer Sector (Sector 0x00) on the Mifare Classic card.
Mifare Application Directory 2 (MAD2)
MAD2 can only be used on Mifare Classic cards with more than 1KB of storage (Mifare Classic 4K cards, etc.). It is NOT compatible with cards containing only 1KB of memory!The MAD2 is stored in sectors 0x00 (the Manufacturer Sector) and 0x10.
MAD Sector Access
The sectors containing the MAD1 (0x00) and MAD2 (0x00 and 0x10) are protected with a KEY A and KEY B (if you're not familiar with this concept, consult the Mifare Classic summary elsewhere in the PN532/NFC wiki). To ensure that these sectors can be read by any application, the following common KEY A should always be used:Public KEY A of MAD Sectors --------------------------------------------------- BYTE 0 BYTE 1 BYTE 2 BYTE 3 BYTE 4 BYTE 5 0xA0 0xA1 0xA2 0xA3 0xA4 0xA5
Storing NDEF Messages in Mifare Sectors
NDEF messages/records may be stored in any sector of the Mifare card, other than the sector(s) use by the MAD or sectors beyond the 1K range if a MAD1 table is used.When a sector is used to store NDEF records, it is referred to as an NFC Sector. As with the MAD Sector(s) described above, these sectors must always be accessible in at least read-only mode, and as such a common public KEY A also exists for NFC Sectors, though it is not the same KEY A used in the MAD sector(s):
Public KEY A of NFC Sectors --------------------------------------------------- BYTE 0 BYTE 1 BYTE 2 BYTE 3 BYTE 4 BYTE 5 0xD3 0xF7 0xD3 0xF7 0xD3 0xF7
TLV Blocks
TLV is an abbreviation for three different fields: T for Tag Field, L for Length Field and V for Value Field. A TLV Block consist of one or more bytes, depending on which of these three fields is present. Note that the TLV Block will always be at least one byte since the T Field is mandatory in every case.Tag Field
The Tag Field (or T Field) is the only mandatory field, and uses a single-byte to identify the type of TLV block accordingly to a pre-determined table of values:
TLV Block Types Block Type Value Description ------------- ----- -------------------------------------- NULL 0x00 These blocks should be ignored NDEF Message 0x03 Block contains an NDEF message Proprietary 0xFD Block contains proprietary information Terminator 0xFE Last TLV block in the data area
The Length Field (or L Field) contains the size (in bytes) of the value field. The Length Field can be organised in two different ways, using either one or three bytes.
The one byte format simple contains a single byte value from 0x00..0xFF.
The three byte format consists of the following format:
Byte 0: Always 0xFF to indicate that we are using the three byte format Byte 1..2: Can be a value between 0x00FF and 0xFFFE
The Value Field (or V Field) is only present if the Length Field (described above) is present and not equal to 0x00. If the Length Field is not equal to 0, the Value Fields will contain N bytes of data in the format indicated by the T Field above.
The value field is where the payload (an NDEF Message, for example) is stored.
Terminator TLV
The Terminator TLV is the last TLV block in the data area, and consist of a single byte: 0x0FE (see the TLV Block Type table above). This TLV Block in mandatory.
Memory Dump of a Mifare Classic 1K Card with an NDEF Record
[ Start of Memory Dump ] ------------------------Sector 0------------------------- Block 0 3E 39 AB 7F D3 88 04 00 47 41 16 57 4D 10 34 08 >9«Ó?..GA.WM.4. Block 1 14 01 03 E1 03 E1 03 E1 03 E1 03 E1 03 E1 03 E1 ...á.á.á.á.á.á.á Block 2 03 E1 03 E1 03 E1 03 E1 03 E1 03 E1 03 E1 03 E1 .á.á.á.á.á.á.á.á Block 3 00 00 00 00 00 00 78 77 88 C1 00 00 00 00 00 00 ......xw?Á...... ------------------------Sector 1------------------------- Block 4 00 00 03 11 D1 01 0D 55 01 61 64 61 66 72 75 69 ....Ñ..U.adafrui Block 5 74 2E 63 6F 6D FE 00 00 00 00 00 00 00 00 00 00 t.comþ.......... Block 6 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Block 7 00 00 00 00 00 00 7F 07 88 40 00 00 00 00 00 00 [email protected] ------------------------Sector 2------------------------- Block 8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Block 9 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Block 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Block 11 00 00 00 00 00 00 7F 07 88 40 00 00 00 00 00 00 [email protected] ------------------------Sector 3------------------------- Block 12 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Block 13 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Block 14 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Block 15 00 00 00 00 00 00 7F 07 88 40 00 00 00 00 00 00 [email protected] ------------------------Sector 4------------------------- Block 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Block 17 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Block 18 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Block 19 00 00 00 00 00 00 7F 07 88 40 00 00 00 00 00 00 [email protected] ------------------------Sector 5------------------------- Block 20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Block 21 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Block 22 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Block 23 00 00 00 00 00 00 7F 07 88 40 00 00 00 00 00 00 [email protected] ------------------------Sector 6------------------------- Block 24 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Block 25 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Block 26 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Block 27 00 00 00 00 00 00 7F 07 88 40 00 00 00 00 00 00 [email protected] ------------------------Sector 7------------------------- Block 28 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Block 29 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Block 30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Block 31 00 00 00 00 00 00 7F 07 88 40 00 00 00 00 00 00 [email protected] ------------------------Sector 8------------------------- Block 32 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Block 33 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Block 34 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Block 35 00 00 00 00 00 00 7F 07 88 40 00 00 00 00 00 00 [email protected] ------------------------Sector 9------------------------- Block 36 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Block 37 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Block 38 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Block 39 00 00 00 00 00 00 7F 07 88 40 00 00 00 00 00 00 [email protected] ------------------------Sector 10------------------------- Block 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Block 41 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Block 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Block 43 00 00 00 00 00 00 7F 07 88 40 00 00 00 00 00 00 [email protected] ------------------------Sector 11------------------------- Block 44 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Block 45 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Block 46 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Block 47 00 00 00 00 00 00 7F 07 88 40 00 00 00 00 00 00 [email protected] ------------------------Sector 12------------------------- Block 48 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Block 49 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Block 50 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Block 51 00 00 00 00 00 00 7F 07 88 40 00 00 00 00 00 00 [email protected] ------------------------Sector 13------------------------- Block 52 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Block 53 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Block 54 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Block 55 00 00 00 00 00 00 7F 07 88 40 00 00 00 00 00 00 [email protected] ------------------------Sector 14------------------------- Block 56 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Block 57 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Block 58 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Block 59 00 00 00 00 00 00 7F 07 88 40 00 00 00 00 00 00 [email protected] ------------------------Sector 15------------------------- Block 60 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Block 61 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Block 62 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ Block 63 00 00 00 00 00 00 7F 07 88 40 00 00 00 00 00 00 [email protected] [ End of Memory Dump ]
NDEF Records
The above example contains two records, both located in sector 1 (sector 0 contains the MAD).Record 1
The first record on the card can be identified by looking at the first byte of block 4 in sector 1.
Block 00 01 02 03 04 05 06 07 08 09 10 11 12 13 14 15 Char Value ----- ----------------------------------------------- ------------ 04 00 00 ..
This record was likely inserted when the card was first formatted to ensure that at least one record is present.
The second record on the card starts at byte 0x02 of block 4 and continues into block 5.
Block 00 01 02 03 04 05 06 07 08 09 10 11 12 13 14 15 Char Value ----- ----------------------------------------------- ------------ 04 03 11 D1 01 0D 55 01 61 64 61 66 72 75 69 Ñ..U.adafrui 05 74 2E 63 6F 6D t.com
Byte(s) Value Description ------- ----- ----------- 04:02 0x03 Field Type (0x03 = NDEF Message) 04:03 0x11 Length Field (17 bytes)
Byte(s) Value Description ------- ----- ----------- 04:04 0xD1 This byte is the **NDEF Record Header**, and indicates that this is an NFC Forum Well Known Record (0x01 in the first 3 bits), and that this is the first and last record (MB=1, ME=1), and that this is a short record (SR = 1) meaning the payload length is less than or equal to 255 chars (len=one byte). TNF = 0x01 (NFC Forum Well Known Type) IL = 0 (No ID present, meaning there is no ID Length or ID Field either) SR = 1 (Short Record) CF = 0 (Record is not 'chunked') ME = 1 (End of message) MB = 1 (Beginning of message) 04:05 0x01 This byte is the **Type Length** for the Record Type Indicator (see above for more information), which is 1 byte (0x55/'U' below) 04:06 0x0D This is the payload length (13 bytes) 04:07 0x55 Record Type Indicator (0x55 or 'U' = URI Record) 04:08 0x01 This is the **start of the record payload**, which contains the URI Identifier ("http://www.") since this is a URI Well-Defined Record Type (see Well-Defined Records above). This will be prepended to the rest of the URI that follows in the rest of the message payload 04:09..05:04 ... The remainder of the URI ("adafruit.com"), which combined with the pre-pended value from byte 04:08 yields: http://www.adafruit.com
Block 00 01 02 03 04 05 06 07 08 09 10 11 12 13 14 15 Char Value ----- ----------------------------------------------- ------------ 05 FE þ
Using with LibNFC
Using the PN532 Breakout Boards with libnfc
libnfc is a mature, cross-platform, open-source NFC library that can be easily configured to work with the PN532 Breakout Board. While Linux is probably the easiest platform to use libnfc with, it can be configured for the Mac and Windows as well, though you may need to dig around on the libnfc Community Forums for some specific details on compiling .dlls for Windows, etc.If you want to test the PN532 Breakout Board out with libnfc, this simple tutorial should walk you through the absolute basics of compiling and configuring libnfc, and using some of the canned example SW included in the library.
libnfc In Linux (Ubuntu 10.10 used in this example)
Step One: Download libnfc
Download the latest version of libnfc from Google Code (ex. "libnfc-1.4.1.tar.gz") and extract the contents of the file as follows:$ wget http://libnfc.googlecode.com/files/libnfc-x.x.x.tar.gz $ tar -xvzf libnfc-x.x.x.tar.gz $ cd libnfc-x.x.x
Step Two: Configure libnfc for PN532 and UART
libnfc currently only supports communication over UART, using any inexpensive USB to UART adapter like the FTDI Friend or a TTL FTDI cable. Before compiling, however, you will need to configure libnfc to include support for UART and the PN532 chipset, which can be done with the following commmand (executing in the folder where the above archive was unzipped):$ ./configure --with-drivers=pn532_uart --enable-serial-autoprobe
Step Three: Build and install libnfc
You can build and install libnfc with the following three commands, also run from the folder where the original archive was unzipped:$ make clean $ make $ make install
Step Four: Check for installed devices
Now that libnfc is (hopefully) built and installed, you can run the 'nfc-list' example to try to detect an attached NFC board. Make sure the board is connected to the FTDI or USB/UART adapter, and that it is connected to your PC, and run the following commands:$ cd examples $ ./nfc-list
Step Five: Poll for an ISO14443A (Mifare, etc.) Card
Next, you can use the 'nfc-poll' example to wait 30 seconds for an ISO14443A card or tag and display some basic information about this card. In the examples folder that we changed to above, run the following command:$ ./nfc-poll
libnfc With Mac OSX Lion
scott-42 was kind of enough to post some tips on getting libnfc working on a Mac using an FTDI adapter. A couple simple changes to the code were required (as of v1.6.0-rc1), with the details here.Keeping in mind the code changes mentionned above, the following steps should get libnfc compiling and working via an FTDI type adapter and UART on Lion (using libnfc 1.6.0_rc1):
Download and build libnfc and configure if for PN532 UART (making the code changes above before running make):
wget http://libnfc.googlecode.com/files/libnfc-1.6.0-rc1.tar.gz tar -xvzf libnfc-1.6.0-rc1.tar.gz cd libnfc-1.6.0-rc1 ./configure --with-drivers=pn532_uart --enable-serial-autoprobe sudo make sudo make install
If everything worked out, switch to the examples folder and see if you can find the PN532 and wait for an appropriate tag:
cd examples Kevins-Mac-mini:examples kevin$ ./nfc-poll /Users/kevin/libnfc-1.6.0-rc1/examples/.libs/nfc-poll uses libnfc 1.6.0-rc1 (r1326) NFC reader: pn532_uart:/dev/tty.usbserial-FTE5WWPB - PN532 v1.6 (0x07) opened NFC device will poll during 30000 ms (20 pollings of 300 ms for 5 modulations) ISO/IEC 14443A (106 kbps) target: ATQA (SENS_RES): 00 04 UID (NFCID1): 3e b9 6e 66 SAK (SEL_RES): 08
FAQ
For example, the key functions in the I2C library (which was written to go along with the NFC shield since it defaults to I2C) are:
uint8_t mifareclassic_AuthenticateBlock (uint8_t * uid, uint8_t uidLen, uint32_t blockNumber, uint8_t keyNumber, uint8_t * keyData); uint8_t mifareclassic_ReadDataBlock (uint8_t blockNumber, uint8_t * data); uint8_t mifareclassic_WriteDataBlock (uint8_t blockNumber, uint8_t * data);
We would like to improve NDEF support for Mifare tags in the near future and some initial planning has gone into this, but at the moment our suggestion is to stick to plain text and 'vanilla' Mifare Classic reads and writes. You can read and write Mifare Classic and Mifare Ultralight blocks from Android, and you don't need to used the more complicated NDEF standard to simply pass data back and forth via a Mifare Classic or Ultralight card.
Yes, the PN532 supports peer to peer communication, but the SW support for this isn't implemented in the Adafruit libraries.
Peer to peer communication with Android is possible, for example, but the actual implementation is quite complicated on the PN532 side. You need to go through a lot of SW layers to communicate with Android in a way that it understands -- it would require developing a full NDEF stack for the messages, SNEP and LLCP stacks, etc. -- which is unfortunately well beyond the scope of what we can offer on a development board at this price point.
All of the HW requirements for this are met with the Adafruit shield and breakout board, but the stack implementation is non trivial and would require us to charge a significant premium for these boards if we implemented this.
We've focused our energy on providing a reliable, proven, properly-tuned HW reference, and enough of a SW building block to get everyone started, but there are too many holes to fill in to cover everything NFC can do with a development board at this price point.
No. The PN532 is designed to be used with ISO14443 tags, with Mifare Classic probably the most common general-purpose tag type in use.
readPassiveTargetID() intentionally waits around in a blocking delay until a card enters the magnetic field. The reason for this blocking delay is to ensure a well-understood command/response flow. Once the magnetic field is activated and a read request is sent via readPassiveTargetID, you can keep sending new commands to the PN532, but the moment a card or tag enters the field, the PN532 will send a response to the initial read request, even if it's in the middle of some other response or activity. To avoid having to debug this in SW, a blocking delay was implemented to keep the command/response pattern as clear as possible.
As a workaround to this blocking-delay limitation, setPassiveActivationRetries(maxRetries) was added to the latest NFC libraries to allow you to set a specific timeout after read requests.
By default, the PN532 will wait forever for a card to enter the field. By specifying a fixed number of retries via MxRtyPassiveActivation (see UM section 7.3.1 describing the RFConfiguration register, specifically CfgItem 5) the PN532 will abort the read request after specified number of attempts, and you can safely send new commands without worrying about mixing up response frames. To wait forever, set MxRtyPassiveActivation to 0xFF. To timeout after a fixed number of retries, set MxRtyPassiveActivation to anything less than 0xFF.
Example Sketch:
#include <Wire.h> #include <Adafruit_NFCShield_I2C.h> #define IRQ (2) #define RESET (3) // Not connected by default on the NFC Shield Adafruit_NFCShield_I2C nfc(IRQ, RESET); void setup(void) { Serial.begin(115200); Serial.println("Hello!"); nfc.begin(); uint32_t versiondata = nfc.getFirmwareVersion(); if (! versiondata) { Serial.print("Didn't find PN53x board"); while (1); // halt } // Got ok data, print it out! Serial.print("Found chip PN5"); Serial.println((versiondata>>24) & 0xFF, HEX); Serial.print("Firmware ver. "); Serial.print((versiondata>>16) & 0xFF, DEC); Serial.print('.'); Serial.println((versiondata>>8) & 0xFF, DEC); // Set the max number of retry attempts to read from a card // This prevents us from waiting forever for a card, which is // the default behaviour of the PN532. nfc.setPassiveActivationRetries(0xFF); // configure board to read RFID tags nfc.SAMConfig(); Serial.println("Waiting for an ISO14443A card"); } void loop(void) { boolean success; uint8_t uid[] = { 0, 0, 0, 0, 0, 0, 0 }; // Buffer to store the returned UID uint8_t uidLength; // Length of the UID (4 or 7 bytes depending on ISO14443A card type) // Wait for an ISO14443A type cards (Mifare, etc.). When one is found // 'uid' will be populated with the UID, and uidLength will indicate // if the uid is 4 bytes (Mifare Classic) or 7 bytes (Mifare Ultralight) success = nfc.readPassiveTargetID(PN532_MIFARE_ISO14443A, &uid[0], &uidLength); if (success) { Serial.println("Found a card!"); Serial.print("UID Length: ");Serial.print(uidLength, DEC);Serial.println(" bytes"); Serial.print("UID Value: "); for (uint8_t i=0; i < uidLength; i++) { Serial.print(" 0x");Serial.print(uid[i], HEX); } Serial.println(""); // Wait 1 second before continuing delay(1000); } else { // PN532 probably timed out waiting for a card Serial.println("Timed out waiting for a card"); } }
We recommend using the I2C libraries with both the shield and the breakout boards since the I2C library represents the latest code from Adafruit, and the shield version should work without too much effort.
There is one caveat combining the breakout, I2C and the Due, though: The Due includes pullup resistors for I2C0 (SCL0 and SDA1), but there are no pullups resistors on SCL1 and SDA1. SCL1/SDA1 are the pins used as replacements for the Uno I2C pins (the pins used on standard shields), so you will need to add two 1.5K pullups on SCL1 and SDA1 to use the breakout board with I2C1 and the Due. Simply solder two 1.5K resistors, one from SCL1 to 3V3 and another from SDA1 to 3.3V, and then connect the board the same way you would with an Uno.
This issue only applies to the PN532 Breakout board since the PN532 shield includes I2C pullup resistors right on board.
Downloads
Files
- SPI and I2C library is available from github
- Deprecated I2C-only library is available from github (don't recommend)
- Fritzing objects available in the Adafruit Fritzing library
Datasheets
For more details about NFC/RFID and this chip we suggest the following fantastic resources:
- RFID selection guide- a lot of details about RFID in general
- Nokia's Introduction to NFC - a lot of details about NFC in general
- Antenna design document
This guide was first published on Dec 30, 2012. It was last updated on Nov 29, 2012.