Skip to content

6. Examples

Andrea ZGuz edited this page Dec 26, 2023 · 2 revisions

Detecting an NFC Card/Tag

This example shows how a device with the needed hardware embedded (PN7150 module) is able to detect a card or tag with NFC features.

Approaching the device with PN7150 module to a debit card

Serial Monitor output “DetectingTags” example

Detecting an NFC Reader

This example shows that an NFC reader can be detected by any device with a PN7150 module included.

Approaching the device with PN7150 module to a NFC reader

Serial Monitor output “DetectingReaders” example

This library includes 9 examples that you can use to test the performance of the PN7150 module, of course, with any device that works under NFC:

  • Detecting Readers : This example allows you to detect NFC readers. It can prevent information theft caused by card cloning.

  • Detecting Tags : This example helps you find devices capable to work with NFC

  • ISO14443-3A Reader / ISO14443-3A Writer : This example helps you to read or write in a ISO14443-3A (Tag Type 2 – T2T) block 5. These tags are proximity contactless cards working at 13.56MHz for different applications such as access control, public transport, and vending machines, among others.

  • ISO15693 Reader / ISO15693 Writer : This example helps you to read or write in a ISO15693 block 8. These tags are better known as “Vicinity Cards” and can be read from longer distances than proximity cards (up to 1 to 1.5 m).

  • Mifare Classic Reader / Mifare Classic Writer : This example helps you to read or write in a Mifare Classic block 4. Proximity cards and smart contactless cards developed by NXP Semiconductors.

  • Peer to peer discovery : This example allows you to detect a P2P devices. Peer-to-peer mode establishes a two-way communication channel between a pair of NFC-enabled devices. When a user brings two devices close to each other, the two NFC chips establish a P2P connection and exchange data.

Other examples

You can check out for more of our examples here.