Forum Replies Created

  • Re: Reply To: Emulate Mifare DESFire

    31. January 2018 at 12:44
    in reply to: Emulate Mifare DESFire
    Hello again,

    Ahh that's a shame, I'm not even sure modern Android devices *have* a Secure Element.
    I misunderstood what you were trying to accomplish with your SDK.

    Regardless, with a bit of work, I discovered that I was able to use HCE to emulate a card, and use APDU as a wrapper to chat to it from my reader/writer.
    This suits my needs - It was just incredibly difficult to get my head around and I naively thought you guys might have done some of that work as part of your SDK's USP.

    What can I use your SDK for, if not abstracting HCE?
    What are its advantages over Android's NFC/HCE classes?
    What if my device doesn't have an SE? In this case do you do something else to present cards in front of the NFC reader?

    Thanks for getting back to me, have a nice day

    + 0  |  - 0

    Re: Reply To: Emulate Mifare DESFire

    30. January 2018 at 11:12
    in reply to: Emulate Mifare DESFire
    Hey there TapLinx, thanks for getting back!

    So does this mean that the TapLinx SDK capable of DESfire HCE [on an Android device of course]?
    + 0  |  - 0

    Re: Reply To: Emulate Mifare DESFire

    24. January 2018 at 13:02
    in reply to: Emulate Mifare DESFire
    Hi there,

    Is this information still correct?
    According to Google they don't use the Secure Element
    Apple Pay does, but not Android Pay
    Also it is explicitly referred to as Host Card *Emulation* (so I see where OP was coming from!) Is it not this?

    What is the difference between MIFARE4Mobile (yucky name!!!) and your Android SDK?

    Sorry if these are stupid questions, I'm new to NFC and see lots of conflicting information
    + 0  |  - 0
Viewing 3 posts - 1 through 3 (of 3 total)