Inside Secure DESKREAD Manuel D’Utilisation
deskRead user manual
INSIDE General Business Use Document
Page:
10/11
Date:
2011 05 05
Reference: <Document Reference> v1
© INSIDE Secure - 2011 - All rights reserved
Two deskRead devices may be used as peer devices when held in front of each other
6.1.4
Secure elements hosted applications
Two types of secure elements car be used to manage NFC secure applications.
The SWP UICC is a NFC host as it is able to configure the NFC controller. The UICC is removable
and usually delivered by a network or service operator which controls the hosted contactless
and applications.
The NFC controller internal secure element is controlled by the device
manufacturer. Depending on the device manufacturer service
offering, this secure element may offer higher flexibility to applications
developpers as the device manufacturer may include secure
aplications APIs to the application developper’s environment.
Depending on the processor and OS security level, the control software
that runs into the device operating system may also provide secure
applications hosting from the primary host.
The SWP UICC is a NFC host as it is able to configure the NFC controller. The UICC is removable
and usually delivered by a network or service operator which controls the hosted contactless
and applications.
The NFC controller internal secure element is controlled by the device
manufacturer. Depending on the device manufacturer service
offering, this secure element may offer higher flexibility to applications
developpers as the device manufacturer may include secure
aplications APIs to the application developper’s environment.
Depending on the processor and OS security level, the control software
that runs into the device operating system may also provide secure
applications hosting from the primary host.
6.1.5
Secure element connectivity
Open NFC API implements the connectivity API that allows
exchange between the secure elments and the control software,
in order to display user feedback after a secure element has
performed a contactless transaction ;
exchange between the secure elments and the control software,
in order to display user feedback after a secure element has
performed a contactless transaction ;
7
UICC
The UICC (not supplied) may be inserted as shown aside :
The UICC is correctly inserted after the click.
If the UICC cannot be fully inserted, make sure the notched corner is inserted first and the circuit
side up.
Use a sharp tool to insert the UICC.
To remove the UICC, use a sharp tool in order to push the UICC card and release the spring.
Do not remove or insert the UICC while the control software is running (LED RED).
The UICC is correctly inserted after the click.
If the UICC cannot be fully inserted, make sure the notched corner is inserted first and the circuit
side up.
Use a sharp tool to insert the UICC.
To remove the UICC, use a sharp tool in order to push the UICC card and release the spring.
Do not remove or insert the UICC while the control software is running (LED RED).
It is advised to stop control software and disconnect USB connector before inserting or
removing the UICC, just the same as for standard handset. Otherwise, the control
software may stop responding or the UICC may be damaged or operating improperly.
removing the UICC, just the same as for standard handset. Otherwise, the control
software may stop responding or the UICC may be damaged or operating improperly.
After a new UICC inserted, it is necessary to run a control software and configure the UICC
access rights before it can be used in contactless applications.
8
T
ROUBLESHOOTING
Operationnal bitrate :