简体   繁体   English

让 Nexus S Android NFC 进入卡模拟模式

[英]Getting Nexus S Android NFC into Card emulation mode

Has anyone been able to get the nexus s into card emulation mode?有没有人能够让 nexus 进入卡模拟模式?

The latest android release does not seem to support this yet.最新的 android 版本似乎还不支持这一点。

This article says it's possible http://www.nearfieldcommunicationsworld.com/2011/02/13/35913/uncovered-the-hidden-nfc-potential-of-the-google-nexus-s-and-the-nokia-c7/这篇文章说它是可能的/

Long story short:长话短说:

Yes, it's possible, but only if you hack.是的,这是可能的,但前提是你破解了。 The article you've posted shows how it's done.您发布的文章显示了它是如何完成的。

Such a hack will only work with the Nexus-S, and only on modified phones with android 2.3.3 Everything relies on undocumented framework classes that may change anytime.这样的 hack 仅适用于 Nexus-S,并且仅适用于具有 android 2.3.3 的修改手机。一切都依赖于可能随时更改的未记录的框架类。

With the official android SDK it is not possible.使用官方 android SDK 是不可能的。

Here you can download a patch for Gingerbread who enable card emulation: http://groups.google.com/group/android-developers/browse_thread/thread/d5fc35a9f16aa467/dec4843abd73d9e9%3Flnk%3Dgst%26q%3Dsecure%2Belement%2Bdiff%2527s%23dec4843abd73d9e9在这里您可以下载启用卡模拟的 Gingerbread 补丁: http://groups.google.com/group/android-developers/browse_thread/thread/d5fc35a9f16aa467/dec4843abd73d9e9%3Flnk%3Dgst%26q%2527s %23dec4843abd73d9e9

The emulated card will be Mifare Classic 4K.模拟卡将是 Mifare Classic 4K。

There are many questions around NFC card emulation on Android.关于 Android 上的 NFC 卡仿真有很多问题。 Some doubts were solved in this post . 这篇文章解决了一些疑问。 So far all my findinds are summarized in this other post .到目前为止,我的所有发现都在另一篇文章中进行了总结。

I think with card emulation you mean the P2P mode.我认为卡模拟是指 P2P 模式。 Android 2.3.3+ has limited support for that, you can push NDEF messages and make the phoen appear as it was a passive nfc tag. Android 2.3.3+ 对此的支持有限,您可以推送 NDEF 消息并使 phoen 显示为被动 nfc 标签。 You can write and read from 2.3.3 on by the way.顺便说一句,你可以从 2.3.3 开始读写。 No more hacking.没有更多的黑客行为。

I was able to enable card-emulation mode on the Nexus S. I will post more information about the process on xda-developers.我能够在 Nexus S 上启用卡模拟模式。我将在 xda-developers 上发布有关该过程的更多信息。

However, after a lot of hacking, I was only able to force some fixed data on the SE (Secure Element).然而,经过大量黑客攻击后,我只能在 SE(安全元素)上强制执行一些固定数据。 I also force the SE to have a fixed ID.我还强制 SE 有一个固定的 ID。 On an unhacked Nexus S, the ID changes all the time.在未破解的 Nexus S 上,ID 一直在变化。

When I tried to read the Card-emulated Nexus S, using an NFC Shield on Arduino, I got the ID of the card and the forced data on the SE.当我尝试使用 Arduino 上的 NFC Shield 读取卡模拟 Nexus S 时,我得到了卡的 ID 和 SE 上的强制数据。 However, when I tried to read my phone using another Nexus S, the phone was not even detected.但是,当我尝试使用另一个 Nexus S 读取我的手机时,甚至没有检测到该手机。

The "forced fixed data" on the SE can only be set within the source code of Android, in my attempt. SE上的“强制固定数据”只能在Android的源代码中设置,在我的尝试中。 I have not yet found a way to write data to the SE using an android application.我还没有找到使用 android 应用程序将数据写入 SE 的方法。

声明:本站的技术帖子网页,遵循CC BY-SA 4.0协议,如果您需要转载,请注明本站网址或者原文地址。任何问题请咨询:yoyou2525@163.com.

 
粤ICP备18138465号  © 2020-2024 STACKOOM.COM