Qi specification version 2.0 - Part 8: Nfc tag protection (IEC 63563-8:2025)

IEC 63563-8:2025 provides guidelines for detecting the presence of a Radio Frequency Identification (RFID) tag or Near Field Communication (NFC) card within the operating range of the Power Transmitter and preventing damage to the tag or card.

Qi Spezifikation Version 2.0 - Teil 8: Nfc tag Schutz (IEC 63563-8:2025)

Spécification Qi version 2.0 - Partie 8: Protection des étiquettes NFC (IEC 63563-8:2025)

IEC 63563-8:2025 fournit des lignes directrices pour détecter la présence d'une étiquette d'identification par radiofréquence (RFID) ou d'une carte de communication en champ proche (NFC) dans la plage de fonctionnement de l'émetteur de puissance et pour éviter d'endommager l'étiquette ou la carte.

Različica specifikacije Qi 2.0 - 8. del: Zaščita oznake Nfc (IEC 63563-8:2025)

General Information

Status
Published
Public Enquiry End Date
21-Jul-2024
Publication Date
18-Feb-2026
Current Stage
6060 - National Implementation/Publication (Adopted Project)
Start Date
30-Jul-2025
Due Date
04-Oct-2025
Completion Date
19-Feb-2026

Overview

EN IEC 63563-8:2025 - Qi Specification version 2.0, Part 8: NFC Tag Protection (CLC adoption of IEC 63563-8) provides guidelines for detecting Radio Frequency Identification (RFID) tags and Near Field Communication (NFC) cards in the operating volume of wireless power systems and for preventing damage to those tags. Published as part of the Qi Specification v2.0 by the Wireless Power Consortium (WPC), this document addresses how Power Transmitter and Power Receiver products should detect NFC tags, coordinate detection during negotiation, and limit magnetic field exposure during all protocol phases - especially the power transfer phase where risk is highest.

Key topics and technical requirements

  • Scope and mandatory compliance: Provisions are mandatory unless explicitly marked as recommendations or informative; verbal forms (shall/should/may) follow ISO/IEC Directives conventions.
  • NFC tag detection: Integration of an NFC transceiver/antenna into a Power Transmitter or Power Receiver to reliably detect tags in the operating volume. The standard defines when the transmitter, receiver, or both should execute detection.
  • Device communication: Use of Qi communications packets (e.g., GRQ/xcap and XCAP) during the negotiation phase to exchange extended capabilities and NFC detection/protection status. Fields such as TPS/TDE/TDS in XCAP determine subsequent actions.
  • Protection strategy: Power Transmitters should maintain magnetic field levels below defined limit values in all protocol phases to protect tags. Specific measurement methods use a Test Proximity Integrated Circuit Card (Test PICC) described in Section 7 for calibration and verification.
  • Testing and verification: Procedures for constructing and calibrating the Test PICC, test PICC dimensions, and test procedures to evaluate the impact of a Power Transmitter on NFC tags.
  • Risk assessment by protocol phase: The standard highlights that the power transfer phase is most likely to damage NFC tags, with other phases presenting possible risk.

Applications

  • Ensures safe coexistence of wireless power charging and NFC/RFID items (e.g., contactless cards, NFC tags embedded in accessories or packaging).
  • Used in design and validation of wireless chargers, mobile devices with integrated wireless charging and NFC, automotive wireless charging pads, and accessory ecosystems.
  • Supports development of product features that automatically reduce or halt power transfer if an NFC tag is detected.

Who should use this standard

  • Product designers and engineers for Power Transmitter and Power Receiver hardware
  • NFC and RFID system integrators
  • Certification and compliance test laboratories
  • Manufacturers registering Qi-certified products and logo licensees
  • Regulatory and safety engineers evaluating electromagnetic interactions

Related standards and references

  • Qi Specification core documents (Communications Protocol, Power Delivery, Foreign Object Detection)
  • IEC/ISO directives for normative language and compliance
  • NFC Forum resources for NFC tag technology and behavior

Keywords: EN IEC 63563-8:2025, Qi Specification version 2.0, NFC tag protection, NFC tag detection, RFID, wireless power, Power Transmitter, Power Receiver, Test PICC, XCAP.

Buy Documents

Standard

SIST EN IEC 63563-8:2026 - BARVE

English language (33 pages)
Preview
Preview
e-Library read for
1 day

Get Certified

Connect with accredited certification bodies for this standard

BSI Group

BSI (British Standards Institution) is the business standards company that helps organizations make excellence a habit.

UKAS United Kingdom Verified

Intertek Testing Services NA Inc.

Intertek certification services in North America.

ANAB United States Verified

TL 9000 QuEST Forum

Telecommunications quality management system.

ANAB United States Verified

Sponsored listings

Frequently Asked Questions

SIST EN IEC 63563-8:2026 is a standard published by the Slovenian Institute for Standardization (SIST). Its full title is "Qi specification version 2.0 - Part 8: Nfc tag protection (IEC 63563-8:2025)". This standard covers: IEC 63563-8:2025 provides guidelines for detecting the presence of a Radio Frequency Identification (RFID) tag or Near Field Communication (NFC) card within the operating range of the Power Transmitter and preventing damage to the tag or card.

IEC 63563-8:2025 provides guidelines for detecting the presence of a Radio Frequency Identification (RFID) tag or Near Field Communication (NFC) card within the operating range of the Power Transmitter and preventing damage to the tag or card.

SIST EN IEC 63563-8:2026 is classified under the following ICS (International Classification for Standards) categories: 29.240.99 - Other equipment related to power transmission and distribution networks; 33.160.99 - Other audio, video and audiovisual equipment; 35.200 - Interface and interconnection equipment; 35.240.99 - IT applications in other fields. The ICS classification helps identify the subject area and facilitates finding related standards.

SIST EN IEC 63563-8:2026 is associated with the following European legislation: EU Directives/Regulations: 2014/53/EU; Standardization Mandates: M/607. When a standard is cited in the Official Journal of the European Union, products manufactured in conformity with it benefit from a presumption of conformity with the essential requirements of the corresponding EU directive or regulation.

SIST EN IEC 63563-8:2026 is available in PDF format for immediate download after purchase. The document can be added to your cart and obtained through the secure checkout process. Digital delivery ensures instant access to the complete standard document.

Standards Content (Sample)


SLOVENSKI STANDARD
01-marec-2026
Različica specifikacije Qi 2.0 - 8. del: Zaščita oznake Nfc (IEC 63563-8:2025)
Qi specification version 2.0 - Part 8: Nfc tag protection (IEC 63563-8:2025)
Qi Spezifikation Version 2.0 - Teil 8: Nfc tag Schutz (IEC 63563-8:2025)
Spécification Qi version 2.0 - Partie 8: Protection des étiquettes NFC (IEC 63563-8:2025)
Ta slovenski standard je istoveten z: EN IEC 63563-8:2025
ICS:
29.240.99 Druga oprema v zvezi z Other equipment related to
omrežji za prenos in power transmission and
distribucijo električne energije distribution networks
33.160.99 Druga avdio, video in Other audio, video and
avdiovizuelna oprema audiovisual equipment
35.200 Vmesniška in povezovalna Interface and interconnection
oprema equipment
2003-01.Slovenski inštitut za standardizacijo. Razmnoževanje celote ali delov tega standarda ni dovoljeno.

EUROPEAN STANDARD EN IEC 63563-8

NORME EUROPÉENNE
EUROPÄISCHE NORM March 2025
ICS 29.240.99; 35.240.99
English Version
Qi Specification version 2.0 - Part 8: NFC Tag Protection
(IEC 63563-8:2025)
Spécification Qi version 2.0 - Partie 8: Protection des Qi Spezifikation Version 2.0 - Teil 8: Nfc tag Schutz
étiquettes NFC (IEC 63563-8:2025)
(IEC 63563-8:2025)
This European Standard was approved by CENELEC on 2025-03-21. CENELEC members are bound to comply with the CEN/CENELEC
Internal Regulations which stipulate the conditions for giving this European Standard the status of a national standard without any alteration.
Up-to-date lists and bibliographical references concerning such national standards may be obtained on application to the CEN-CENELEC
Management Centre or to any CENELEC member.
This European Standard exists in three official versions (English, French, German). A version in any other language made by translation
under the responsibility of a CENELEC member into its own language and notified to the CEN-CENELEC Management Centre has the
same status as the official versions.
CENELEC members are the national electrotechnical committees of Austria, Belgium, Bulgaria, Croatia, Cyprus, the Czech Republic,
Denmark, Estonia, Finland, France, Germany, Greece, Hungary, Iceland, Ireland, Italy, Latvia, Lithuania, Luxembourg, Malta, the
Netherlands, Norway, Poland, Portugal, Republic of North Macedonia, Romania, Serbia, Slovakia, Slovenia, Spain, Sweden, Switzerland,
Türkiye and the United Kingdom.

European Committee for Electrotechnical Standardization
Comité Européen de Normalisation Electrotechnique
Europäisches Komitee für Elektrotechnische Normung
CEN-CENELEC Management Centre: Rue de la Science 23, B-1040 Brussels
© 2025 CENELEC All rights of exploitation in any form and by any means reserved worldwide for CENELEC Members.
Ref. No. EN IEC 63563-8:2025 E

European foreword
The text of document 100/4252/FDIS, future edition 1 of IEC 63563-8, prepared by TC 100/Technical
Area 15 "Wireless Power Transfer" was submitted to the IEC-CENELEC parallel vote and approved by
CENELEC as EN IEC 63563-8:2025.
The following dates are fixed:
• latest date by which the document has to be implemented at national (dop) 2026-03-31
level by publication of an identical national standard or by endorsement
• latest date by which the national standards conflicting with the (dow) 2028-03-31
document have to be withdrawn
Attention is drawn to the possibility that some of the elements of this document may be the subject of
patent rights. CENELEC shall not be held responsible for identifying any or all such patent rights.
Any feedback and questions on this document should be directed to the users’ national committee. A
complete listing of these bodies can be found on the CENELEC website.
Endorsement notice
The text of the International Standard IEC 63563-8:2025 was approved by CENELEC as a European
Standard without any modification.

IEC 63563-8 ®
Edition 1.0 2025-02
INTERNATIONAL
STANDARD
Qi Specification version 2.0 –
Part 8: NFC Tag Protection
INTERNATIONAL
ELECTROTECHNICAL
COMMISSION
ICS 29.240.99, 35.240.99 ISBN 978-2-8327-0191-1
 ,(&‹,(&
INTERNATIONAL ELECTROTECHNICAL COMMISSION
____________
QI SPECIFICATION VERSION 2.0 –
Part 8: NFC Tag Protection
FOREWORD
 The International Electrotechnical Commission (IEC) is a worldwide organization for standardization comprisingall
national electrotechnical committees (IEC National Committees). The object of IEC is to promote internationalco-
operation on all questions concerning standardization in the electrical and electronic fields. To this end andin addition
to other activities, IEC publishes International Standards, Technical Specifications, TechnicalReports, Publicly
Available Specifications (PAS) and Guides (hereafter referred to as “IEC Publication(s)”). Theirpreparation is entrusted to
technical committees; any IEC National Committee interested in the subject dealt withmay participate in this
preparatory work. International, governmental and non-governmental organizationsliaising with the IEC also
participate in this preparation. IEC collaborates closely with the InternationalOrganization for Standardization
(ISO) in accordance with conditions determined by agreement between the twoorganizations.
 The formal decisions or agreements of IEC on technical matters express, as nearly as possible, an international
consensus of opinion on the relevant subjects since each technical committee has representation from all
interested IEC National Committees.
 IEC Publications have the form of recommendations for international use and are accepted by IEC National
Committees in that sense. While all reasonable efforts are made to ensure that the technical content of IEC
Publications is accurate, IEC cannot be held responsible for the way in which they are used or for any
misinterpretation by any end user.
 In order to promote international uniformity, IEC National Committees undertake to apply IEC Publications
transparently to the maximum extent possible in their national and regional publications. Any divergence betweenany IEC
Publication and the corresponding national or regional publication shall be clearly indicated in the latter.
 IEC itself does not provide any attestation of conformity. Independent certification bodies provide conformity
assessment services and, in some areas, access to IEC marks of conformity. IEC is not responsible for any
services carried out by independent certification bodies.
 All users should ensure that they have the latest edition of this publication.
 No liability shall attach to IEC or its directors, employees, servants or agents including individual experts and
members of its technical committees and IEC National Committees for any personal injury, property damage orother
damage of any nature whatsoever, whether direct or indirect, or for costs (including legal fees) andexpenses
arising out of the publication, use of, or reliance upon, this IEC Publication or any other IECPublications.
 Attention is drawn to the Normative references cited in this publication. Use of the referenced publications is
indispensable for the correct application of this publication.
 IEC draws attention to the possibility that the implementation of this document may involve the use of (a)
patent(s). IEC takes no position concerning the evidence, validity or applicability of any claimed patent rights inrespect
thereof. As of the date of publication of this document, IEC had not received notice of (a) patent(s),which may be
required to implement this document. However, implementers are cautioned that this may notrepresent the latest
information, which may be obtained from the patent database available athttps://patents.iec.ch. IEC shall
not be held responsible for identifying any or all such patent rights.
IEC 635-8 has been prepared by technical area 15: Wireless Power Transfer, of IEC
technical committee 100: Audio, video and multimedia systems and equipment. It is an
International Standard.
It is based on Qi Specification version 2.0, NFC Tag Protection and was submitted as a Fast-
Track document.
The text of this International Standard is based on the following documents:
Draft Report on voting
//FDIS //RVD
,(&‹,(& 
Full information on the voting for its approval can be found in the report on voting indicated in
the above table.
The language used for the development of this International Standard is English.
The structure and editorial rules used in this publication reflect the practice of the organization
which submitted it.
This document was developed in accordance with ISO/IEC Directives, Part 1 and ISO/IEC
Directives, IEC Supplement available at www.iec.ch/members_experts/refdocs. The main
document types developed by IEC are described in greater detail at www.iec.ch/publications.
The committee has decided that the contents of this document will remain unchanged until the
stability date indicated on the IEC website under webstore.iec.ch in the data related to the
specific document. At this date, the document will be
x reconfirmed,
x withdrawn, or
x revised.
 ,(&‹,(&
WIRELESS POWER
CONSORTIUM
Qi Specification
NFC Tag Protection
Version 2.0
April 2023
,(&‹,(& 
DISCLAIMER
The information contained herein is believed to be accurate as of the date of publication,
but is provided “as is” and may contain errors. The Wireless Power Consortium makes no
warranty, express or implied, with respect to this document and its contents, including any
warranty of title, ownership, merchantability, or fitness for a particular use or purpose.
Neither the Wireless Power Consortium, nor any member of the Wireless Power
Consortium will be liable for errors in this document or for any damages, including indirect
or consequential, from use of or reliance on the accuracy of this document. For any furthe r
explanation of the contents of this document, or in case of any perceived inconsistency or ambiguity
of interpretation, contact: info@wirelesspowerconsortium.com.
RELEASE HISTORY
Specification Version Release Date Description
2.0 April 2023 Initial release of the v2.0 Qi Specification.

 ,(&‹,(&
Table of Contents
1  General . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.1 Structure of the Qi Specification. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.2 Scope . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.3 Compliance. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.4 References. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.5 Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
1.6 Power Profiles. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
2  Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
2.1 NFC tag detection and protection. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
3  NFC tag protection and device communication . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
4  NFC tag detection by a Power Transmitter Product. . . . . . . . . . . . . . . . . . . . . . . 12
4.1 NFC antenna integration in a Power Transmitter Product. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
4.2 NFC transceiver integration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
4.3 NFC polling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
5  NFC tag detection by a Power Receiver Product . . . . . . . . . . . . . . . . . . . . . . . . . 21
5.1 Design guidelines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
5.2 Recommended detection procedure. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
6  Tag detection using the NFC unit. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
6.1 Low power object detection in standby . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
6.2 Low power object detection in the power transfer phase . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
7  Testing the impact of a Power Transmitter Product on an NFC tag . . . . . . . . . . 23
7.1 Test PICC dimensions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
7.2 Construction of the Test PICC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
7.3 Test PICC calibration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
7.4 Test procedure using the Test PICC. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26

,(&‹,(& 
1  General
The Wireless Power Consortium (WPC) is a worldwide organization that aims to develop and
promote global standards for wireless power transfer in various application areas. A first
application area comprises flat-surface devices such as mobile phones and chargers in the
Baseline Power Profile (up to 5 W) and Extended Power Profile (above 5 W).
1.1 Structure of the Qi Specification
General documents
ƒ Introduction
ƒ Glossary, Acronyms, and Symbols
System description documents
ƒ Mechanical, Thermal, and User Interface
ƒ Power Delivery
ƒ Communications Physical Layer
ƒ Communications Protocol
ƒ Foreign Object Detection
ƒ NFC Tag Protection
ƒ Authentication Protocol
 ,(&‹,(&
1.2 Scope
The QiSpecification,NFC/RFIDCardProtection (this document) provides guidelines for detecting
the presence of a Radio Frequency Identification (RFID) tag or Near Field Communication (NFC)
card within the operating range of the Power Transmitter and preventing damage to the tag or
card.
1.3 Compliance
All provisions in the QiSpecification are mandatory, unless specifically indicated as recommended,
optional, note, example, or informative. Verbal expression of provisions in this Specification follow
the rules provided in ISO/IEC Directives, Part 2.
Table 1: Verbal forms for expressions of provisions
Provision Verbal form
requirement “shall” or “shall not”
recommendation “should” or “should not”
permission “may” or “may not”
capability “can” or “cannot”
1.4 References
For undated references, the most recently published document applies. The most recent WPC
publications can be downloaded from http://www.wirelesspowerconsortium.com.

,(&‹,(& 
1.5 Conventions
1.5.1 Notation of numbers
ƒ Real numbers use the digits 0 to 9, a decimal point, and optionally an exponential part.
ƒ Integer numbers in decimal notation use the digits 0 to 9.
ƒ Integer numbers in hexadecimal notation use the hexadecimal digits 0 to 9 and A to F, and are
prefixed by "0x" unless explicitly indicated otherwise.
ƒ Single bit values use the words ZERO and ONE.
1.5.2 Tolerances
Unless indicated otherwise, all numeric values in the QiSpecification are exactly as specified and do
not have any implied tolerance.
1.5.3 Fields in a data packet
A numeric value stored in a field of a data packet uses a big-endian format. Bits that are more
significant are stored at a lower byte offset than bits that are less significant. Table 2 and Figure 1
provide examples of the interpretation of such fields.
Table 2: Example of fields in a data packet
b b b b b b b b
7 6 5 4 3 2 1 0
(msb)
B
16-bit Numeric Data Field
B
(lsb)
B Other Field (msb)
B 10-bit Numeric Data Field (lsb) Field
Figure 1. Examples of fields in a data packet
16-bit Numeric Data Field
b b b b b b b b b b b b b b b b
15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 0
B B
0 1
10-bit Numeric Data Field
b b b b b b b b b b
9 8 7 6 5 4 3 2 1 0
B B
2 3
 ,(&‹,(&
1.5.4 Notation of text strings
Text strings consist of a sequence of printable ASCII characters (i.e. in the range of 0x20 to 0x7E)
enclosed in double quotes ("). Text strings are stored in fields of data structures with the first
character of the string at the lowest byte offset, and are padded with ASCII NUL (0x00) characters
to the end of the field where necessary.
EXAMPLE: The text string “WPC” is stored in a six-byte fields as the sequence of characters 'W', 'P', 'C', NUL,
NUL, and NUL. The text string “M:4D3A” is stored in a six-byte field as the sequence 'M', ':', '4', 'D',
'3', and 'A'.
1.5.5 Short-hand notation for data packets
In many instances, the QiSpecification refers to a data packet using the following shorthand
notation:
/
In this notation, refers to the data packet's mnemonic defined in the QiSpecification,
CommunicationsProtocol, and refers to a particular value in a field of the data packet.
The definitions of the data packets in the QiSpecification,CommunicationsProtocol, list the
meanings of the modifiers.
For example, EPT/cc refers to an End Power Transfer data packet having its End Power Transfer
code field set to 0x01.
,(&‹,(& 
1.6 Power Profiles
A Power Profile determines the level of compatibility between a Power Transmitter and a Power
Receiver. Table 3 defines the available Power Profiles.
ƒ BPPPTx: A Baseline Power Profile Power Transmitter.
ƒ EPP5PTx: An Extended Power Profile Power Transmitter having a restricted power transfer
()pot
capability, i.e. P = 5 W.
L
ƒ EPPPTx: An Extended Power Profile Power Transmitter.
ƒ BPPPRx: A Baseline Power Profile Power Receiver.
ƒ EPPPRx: An Extended Power Profile Power Receiver.
Table 3: Capabilities included in a Power Profile
Feature BPP PTx EPP5 PTx EPP PTx BPP PRx EPP PRx
Ax or Bx design Yes Yes No N/A N/A
MP-Ax or MP-Bx design No No Yes N/A N/A
Baseline Protocol Yes Yes Yes Yes Yes
Extended Protocol No Yes Yes No Yes
Authentication N/A Optional Yes N/A Optional

 ,(&‹,(&
2  Introduction
A Power Transmitter can damage Near Field Communication (NFC) tags present in the Operating
Volume during any phase if the emitted power levels are above the defined limit values (see
Section 2, Introduction, and its subsections).
For more information about NFC tags, see https://nfc-forum.org/.
The highest risk of damage occurs in the powertransfer phase, as shown in Table 4.
Table 4: Risk of damage to NFC tags by protocol phase
Protocol phase Risk of damage
Ping phase Possible
Configuration phase Possible
Negotiation phase Possible
Power transfer phase Likely
2.1 NFC tag detection and protection
The goal of this document is to describe how NFC tags can be detected and protected by extending
the functionality of the Power Transmitter Product or Power Receiver Product.
2.1.1 NFC tag detection
By integrating an NFC transceiver into a Power Transmitter Product or into a Power Receiver
Product, any NFC tag that can be present between the Power Transmitter Product and the Power
Receiver Product can be reliably detected. The capabilities of the devices determines which one
will execute NFC tag detection.
ƒ If neither the Power Transmitter Product nor the Power Receiver Product can detect NFC tags,
NFC tag protection does not happen and any NFC tag in the Operating Volume are susceptible
to damage.
ƒ If either the Power Transmitter Product or the Power Receiver Product (but not both) can
detect NFC tags, that device should execute tag detection.
ƒ If both the Power Transmitter Product and the Power Receiver Product can detect NFC tags,
one or both of the devices should execute tag detection.
Selection of the device that should execute NFC tag detection happens when the Power Transmitter
and Power Receiver exchange information in the negotiation phase.
See Section 3, NFCtagprotectionanddevicecommunication, for further information.

,(&‹,(& 
2.1.2 Protecting NFC tags
A Power Transmitter can protect NFC tags by maintaining the magnetic field levels in all phases of
the power transfer protocol below a defined limit value. This limit is defined by specific
measurement methods using the Test Proximity Integrated Circuit Card (PICC) described in
Section 7, TestingtheimpactofaPowerTransmitterProductonanNFCtag, and helps to ensure that
NFC tags are not damaged.
NOTE: In rare cases, damage can still occur even at magnetic field levels below the limit value.

 ,(&‹,(&
3  NFC tag protection and device communication
A Power Receiver should send a GRQ/xcap data packet to an EPP Power Transmitter during the
negotiation phase to examine the Power Transmitter Product’s extended capabilities. The XCAP
data packet returned in response provides the result of any NFC tag detection operation it has
executed. See Section 9.5, QiSpecification,CommunicationsProtocol, for more information.

,(&‹,(& 
The Power Receiver Product should perform one of the actions listed in Table 5 depending on
values contained in the TPS, TPE, and TDS fields of the XCAP data packet.
Table 5: Power Receiver actions based on XCAP data
XCAP data XCAP meaning Power Receiver Product action
TPS = ZERO The Power Transmitter Product does The Power Receiver Product should perform NFC
not support NFC tag detection. tag detection as defined in Section 5, NFC tag
detection by a Power Receiver Product.
TPS = ONE The Power Transmitter Product The power transfer proceeds as defined in the
supports NFC tag detection and has not Qi Specification, Communications Protocol.
TDE = ONE
detected a tag.
TDS = 0
TPS = ONE The Power Transmitter Product To proceed, the Power Receiver Product should
supports NFC tag protection but has not select one of the following actions:
TDE = ZERO
executed the latter.
ƒ Send an EPT/rep data packet and perform tag
TDS = 0
detection itself as defined in Section 5, NFC
tag detection by a Power Receiver Product
ƒ Send an EPT/ptxnfc data packet to request
the Power Transmitter Product to perform
tag detection. This should cause the Power
Transmitter Product to remove its Power
Signal and perform NFC tag detection.
TPS = ONE The Power Transmitter Product The Power Receiver Product should select one of
supports NFC tag protection and has the following actions to proceed:
TDE = ONE
detected a single tag.
ƒ Send an EPT/rep data packet itself as defined
TDS = 1
NOTE: The Power Transmitter Product in Section 5, NFC tag detection by a Power
may not be able to distinguish between Receiver Product.
an NFC tag and the NFC interface of the
ƒ Send an EPT/ptxnfc data packet to request
Power Receiver Product.
the Power Transmitter to perform tag
detection. This should cause the Power
Transmitter Product to remove its Power
Signal and perform NFC tag detection.
ƒ Proceed to the power transfer phase and
limit its drawing the power level to 5 W.
ƒ Proceed at full power if it knows that its own
NFC transceiver is active in the Operating
Volume.
ƒ Send an EPT/nfc data packet and power
transfer terminates.
Note: Whenever an NFC tag is potentially in the
Operating Volume, the Power Receiver Product
should provide a warning to the user.

 ,(&‹,(&
Table 5: Power Receiver actions based on XCAP data (Continued)
XCAP data XCAP meaning Power Receiver Product action
TPS = ONE The Power Transmitter Product The Power Receiver Product should select one of
supports NFC tag protection and has the following actions to proceed:
TDE = ZERO
detected multiple tags.
ƒ Send an EPT/re
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.

Loading comments...