Qi Specification version 2.0 - Part 8: NFC Tag Protection

IEC 63563-8:2025 provides guidelines for detecting the presence of a Radio Frequency Identification (RFID) tag or Near Field Communication (NFC) card within the operating range of the Power Transmitter and preventing damage to the tag or card.

Spécification Qi version 2.0 - Partie 8 : Protection des étiquettes NFC

IEC 63563-8:2025 fournit des lignes directrices pour détecter la présence d'une étiquette d'identification par radiofréquence (RFID) ou d'une carte de communication en champ proche (NFC) dans la plage de fonctionnement de l'émetteur de puissance et pour éviter d'endommager l'étiquette ou la carte.

General Information

Status
Published
Publication Date
13-Feb-2025
Drafting Committee
WG 1 - TC 100/TA 15/WG 1
Current Stage
PPUB - Publication issued
Start Date
14-Feb-2025
Completion Date
07-Mar-2025

Overview

IEC 63563-8:2025 - Qi Specification version 2.0, Part 8: NFC Tag Protection provides guidelines for detecting the presence of RFID tags and NFC cards within the operating range of a wireless Power Transmitter and for preventing damage to those tags or cards. Published by the IEC and based on the Wireless Power Consortium (WPC) Qi v2.0 NFC Tag Protection document, this standard addresses integration, detection procedures, and test methods to safely co‑exist wireless charging (Qi) and NFC/RFID functionality.

Key Topics

  • Scope & Compliance: Clarifies that provisions are mandatory unless marked otherwise and follows ISO/IEC directives for normative language (shall/should/may).
  • NFC tag detection: Methods for detecting passive NFC/RFID tags using dedicated NFC hardware or by leveraging power‑transfer signals.
  • Antenna and transceiver integration: Guidelines for integrating an NFC antenna and NFC transceiver into Power Transmitter products to ensure reliable detection and minimal interference with wireless power transfer.
  • Polling and detection modes: Procedures for NFC polling and recommended detection sequences during both standby and active power-transfer phases (including low‑power detection).
  • Power Receiver considerations: Design guidance and recommended detection procedures for Power Receiver products to help protect nearby NFC tags.
  • Test methods: Definition and construction of a Test PICC (test NFC card) including calibration and a stepwise test procedure to evaluate the impact of a Power Transmitter on NFC tags.
  • Documentation & references: Cross‑references to WPC resources, Electropedia, and IEC publication tools.

Applications and Who Uses It

This standard is intended for:

  • Wireless charging device manufacturers (Power Transmitters and Receivers) integrating Qi wireless power with NFC coexistence.
  • Hardware and antenna designers working on coil layouts and NFC antenna placement.
  • Test labs and compliance engineers performing NFC tag protection testing using the Test PICC procedures.
  • Product managers and systems architects ensuring products meet safety and interoperability expectations when NFC cards may be present on charging surfaces.

Practical applications include preventing data loss or physical damage to contactless payment cards, access badges, transit cards, and other RFID/NFC tags placed on or near wireless chargers.

Related Standards

  • Qi Specification family (Wireless Power Consortium)
  • IEC system documents on Wireless Power Transfer and Foreign Object Detection
  • Relevant ISO/IEC directives and RFID/NFC specifications referenced by the WPC and IEC documents

Keywords: IEC 63563-8:2025, Qi Specification 2.0, NFC Tag Protection, NFC tag detection, RFID protection, wireless charging, Power Transmitter, Power Receiver, Test PICC, NFC antenna integration.

Standard

IEC 63563-8:2025 - Qi Specification version 2.0 - Part 8: NFC Tag Protection Released:14. 02. 2025 Isbn:9782832701911

English language
31 pages
sale 15% off
Preview
sale 15% off
Preview

Frequently Asked Questions

IEC 63563-8:2025 is a standard published by the International Electrotechnical Commission (IEC). Its full title is "Qi Specification version 2.0 - Part 8: NFC Tag Protection". This standard covers: IEC 63563-8:2025 provides guidelines for detecting the presence of a Radio Frequency Identification (RFID) tag or Near Field Communication (NFC) card within the operating range of the Power Transmitter and preventing damage to the tag or card.

IEC 63563-8:2025 provides guidelines for detecting the presence of a Radio Frequency Identification (RFID) tag or Near Field Communication (NFC) card within the operating range of the Power Transmitter and preventing damage to the tag or card.

IEC 63563-8:2025 is classified under the following ICS (International Classification for Standards) categories: 29.240.99 - Other equipment related to power transmission and distribution networks; 35.240.99 - IT applications in other fields. The ICS classification helps identify the subject area and facilitates finding related standards.

You can purchase IEC 63563-8:2025 directly from iTeh Standards. The document is available in PDF format and is delivered instantly after payment. Add the standard to your cart and complete the secure checkout process. iTeh Standards is an authorized distributor of IEC standards.

Standards Content (Sample)


IEC 63563-8 ®
Edition 1.0 2025-02
INTERNATIONAL
STANDARD
NORME
INTERNATIONALE
Qi Specification version 2.0 –
Part 8: NFC Tag Protection
All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized in any form
or by any means, electronic or mechanical, including photocopying and microfilm, without permission in writing from
either IEC or IEC's member National Committee in the country of the requester. If you have any questions about IEC
copyright or have an enquiry about obtaining additional rights to this publication, please contact the address below or
your local IEC member National Committee for further information.

Droits de reproduction réservés. Sauf indication contraire, aucune partie de cette publication ne peut être reproduite ni
utilisée sous quelque forme que ce soit et par aucun procédé, électronique ou mécanique, y compris la photocopie et
les microfilms, sans l'accord écrit de l'IEC ou du Comité national de l'IEC du pays du demandeur. Si vous avez des
questions sur le copyright de l'IEC ou si vous désirez obtenir des droits supplémentaires sur cette publication, utilisez
les coordonnées ci-après ou contactez le Comité national de l'IEC de votre pays de résidence.

IEC Secretariat Tel.: +41 22 919 02 11
3, rue de Varembé info@iec.ch
CH-1211 Geneva 20 www.iec.ch
Switzerland
About the IEC
The International Electrotechnical Commission (IEC) is the leading global organization that prepares and publishes
International Standards for all electrical, electronic and related technologies.

About IEC publications
The technical content of IEC publications is kept under constant review by the IEC. Please make sure that you have the
latest edition, a corrigendum or an amendment might have been published.

IEC publications search - webstore.iec.ch/advsearchform IEC Products & Services Portal - products.iec.ch
The advanced search enables to find IEC publications by a Discover our powerful search engine and read freely all the
variety of criteria (reference number, text, technical publications previews, graphical symbols and the glossary.
committee, …). It also gives information on projects, replaced With a subscription you will always have access to up to date
and withdrawn publications. content tailored to your needs.

IEC Just Published - webstore.iec.ch/justpublished
Electropedia - www.electropedia.org
Stay up to date on all new IEC publications. Just Published
The world's leading online dictionary on electrotechnology,
details all new publications released. Available online and once
containing more than 22 500 terminological entries in English
a month by email.
and French, with equivalent terms in 25 additional languages.

Also known as the International Electrotechnical Vocabulary
IEC Customer Service Centre - webstore.iec.ch/csc
(IEV) online.
If you wish to give us your feedback on this publication or need

further assistance, please contact the Customer Service
Centre: sales@iec.ch.
A propos de l'IEC
La Commission Electrotechnique Internationale (IEC) est la première organisation mondiale qui élabore et publie des
Normes internationales pour tout ce qui a trait à l'électricité, à l'électronique et aux technologies apparentées.

A propos des publications IEC
Le contenu technique des publications IEC est constamment revu. Veuillez vous assurer que vous possédez l’édition la
plus récente, un corrigendum ou amendement peut avoir été publié.

Recherche de publications IEC -  IEC Products & Services Portal - products.iec.ch
webstore.iec.ch/advsearchform Découvrez notre puissant moteur de recherche et consultez
La recherche avancée permet de trouver des publications IEC gratuitement tous les aperçus des publications, symboles
en utilisant différents critères (numéro de référence, texte, graphiques et le glossaire. Avec un abonnement, vous aurez
comité d’études, …). Elle donne aussi des informations sur les toujours accès à un contenu à jour adapté à vos besoins.
projets et les publications remplacées ou retirées.

Electropedia - www.electropedia.org
IEC Just Published - webstore.iec.ch/justpublished
Le premier dictionnaire d'électrotechnologie en ligne au monde,
Restez informé sur les nouvelles publications IEC. Just
avec plus de 22 500 articles terminologiques en anglais et en
Published détaille les nouvelles publications parues.
français, ainsi que les termes équivalents dans 25 langues
Disponible en ligne et une fois par mois par email.
additionnelles. Egalement appelé Vocabulaire

Electrotechnique International (IEV) en ligne.
Service Clients - webstore.iec.ch/csc

Si vous désirez nous donner des commentaires sur cette
publication ou si vous avez des questions contactez-nous:
sales@iec.ch.
IEC 63563-8 ®
Edition 1.0 2025-02
INTERNATIONAL
STANDARD
NORME
INTERNATIONALE
Qi Specification version 2.0 –

Part 8: NFC Tag Protection
INTERNATIONAL
ELECTROTECHNICAL
COMMISSION
COMMISSION
ELECTROTECHNIQUE
INTERNATIONALE
ICS 29.240.99, 35.240.99 ISBN 978-2-8327-0191-1

- 2 - IEC 63563-8:2025 © IEC 2025
INTERNATIONAL ELECTROTECHNICAL COMMISSION
____________
QI SPECIFICATION VERSION 2.0 –
Part 8: NFC Tag Protection
FOREWORD
 The International Electrotechnical Commission (IEC) is a worldwide organization for standardization comprisingall
national electrotechnical committees (IEC National Committees). The object of IEC is to promote internationalco-
operation on all questions concerning standardization in the electrical and electronic fields. To this end andin addition
to other activities, IEC publishes International Standards, Technical Specifications, TechnicalReports, Publicly
Available Specifications (PAS) and Guides (hereafter referred to as “IEC Publication(s)”). Theirpreparation is entrusted to
technical committees; any IEC National Committee interested in the subject dealt withmay participate in this
preparatory work. International, governmental and non-governmental organizationsliaising with the IEC also
participate in this preparation. IEC collaborates closely with the InternationalOrganization for Standardization
(ISO) in accordance with conditions determined by agreement between the twoorganizations.
 The formal decisions or agreements of IEC on technical matters express, as nearly as possible, an international
consensus of opinion on the relevant subjects since each technical committee has representation from all
interested IEC National Committees.
 IEC Publications have the form of recommendations for international use and are accepted by IEC National
Committees in that sense. While all reasonable efforts are made to ensure that the technical content of IEC
Publications is accurate, IEC cannot be held responsible for the way in which they are used or for any
misinterpretation by any end user.
 In order to promote international uniformity, IEC National Committees undertake to apply IEC Publications
transparently to the maximum extent possible in their national and regional publications. Any divergence betweenany IEC
Publication and the corresponding national or regional publication shall be clearly indicated in the latter.
 IEC itself does not provide any attestation of conformity. Independent certification bodies provide conformity
assessment services and, in some areas, access to IEC marks of conformity. IEC is not responsible for any
services carried out by independent certification bodies.
 All users should ensure that they have the latest edition of this publication.
 No liability shall attach to IEC or its directors, employees, servants or agents including individual experts and
members of its technical committees and IEC National Committees for any personal injury, property damage orother
damage of any nature whatsoever, whether direct or indirect, or for costs (including legal fees) andexpenses
arising out of the publication, use of, or reliance upon, this IEC Publication or any other IECPublications.
 Attention is drawn to the Normative references cited in this publication. Use of the referenced publications is
indispensable for the correct application of this publication.
 IEC draws attention to the possibility that the implementation of this document may involve the use of (a)
patent(s). IEC takes no position concerning the evidence, validity or applicability of any claimed patent rights inrespect
thereof. As of the date of publication of this document, IEC had not received notice of (a) patent(s),which may be
required to implement this document. However, implementers are cautioned that this may notrepresent the latest
information, which may be obtained from the patent database available athttps://patents.iec.ch. IEC shall
not be held responsible for identifying any or all such patent rights.
IEC 635-8 has been prepared by technical area 15: Wireless Power Transfer, of IEC
technical committee 100: Audio, video and multimedia systems and equipment. It is an
International Standard.
It is based on Qi Specification version 2.0, NFC Tag Protection and was submitted as a Fast-
Track document.
The text of this International Standard is based on the following documents:
Draft Report on voting
//FDIS //RVD
Full information on the voting for its approval can be found in the report on voting indicated in
the above table.
The language used for the development of this International Standard is English.
The structure and editorial rules used in this publication reflect the practice of the organization
which submitted it.
This document was developed in accordance with ISO/IEC Directives, Part 1 and ISO/IEC
Directives, IEC Supplement available at www.iec.ch/members_experts/refdocs. The main
document types developed by IEC are described in greater detail at www.iec.ch/publications.
The committee has decided that the contents of this document will remain unchanged until the
stability date indicated on the IEC website under webstore.iec.ch in the data related to the
specific document. At this date, the document will be
x reconfirmed,
x withdrawn, or
x revised.
- 4 - IEC 63563-8:2025 © IEC 2025
WIRELESS POWER
CONSORTIUM
Qi Specification
NFC Tag Protection
Version 2.0
April 2023
DISCLAIMER
The information contained herein is believed to be accurate as of the date of publication,
but is provided “as is” and may contain errors. The Wireless Power Consortium makes no
warranty, express or implied, with respect to this document and its contents, including any
warranty of title, ownership, merchantability, or fitness for a particular use or purpose.
Neither the Wireless Power Consortium, nor any member of the Wireless Power
Consortium will be liable for errors in this document or for any damages, including indirect
or consequential, from use of or reliance on the accuracy of this document. For any furthe r
explanation of the contents of this document, or in case of any perceived inconsistency or ambiguity
of interpretation, contact: info@wirelesspowerconsortium.com.
RELEASE HISTORY
Specification Version Release Date Description
2.0 April 2023 Initial release of the v2.0 Qi Specification.

- 6 - IEC 63563-8:2025 © IEC 2025
Table of Contents
1  General . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.1 Structure of the Qi Specification. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.2 Scope . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.3 Compliance. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.4 References. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.5 Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
1.6 Power Profiles. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
2  Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
2.1 NFC tag detection and protection. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
3  NFC tag protection and device communication . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
4  NFC tag detection by a Power Transmitter Product. . . . . . . . . . . . . . . . . . . . . . . 12
4.1 NFC antenna integration in a Power Transmitter Product. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
4.2 NFC transceiver integration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
4.3 NFC polling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
5  NFC tag detection by a Power Receiver Product . . . . . . . . . . . . . . . . . . . . . . . . . 21
5.1 Design guidelines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
5.2 Recommended detection procedure. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
6  Tag detection using the NFC unit. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
6.1 Low power object detection in standby . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
6.2 Low power object detection in the power transfer phase . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
7  Testing the impact of a Power Transmitter Product on an NFC tag . . . . . . . . . . 23
7.1 Test PICC dimensions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
7.2 Construction of the Test PICC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
7.3 Test PICC calibration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
7.4 Test procedure using the Test PICC. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26

1  General
The Wireless Power Consortium (WPC) is a worldwide organization that aims to develop and
promote global standards for wireless power transfer in various application areas. A first
application area comprises flat-surface devices such as mobile phones and chargers in the
Baseline Power Profile (up to 5 W) and Extended Power Profile (above 5 W).
1.1 Structure of the Qi Specification
General documents
ƒ Introduction
ƒ Glossary, Acronyms, and Symbols
System description documents
ƒ Mechanical, Thermal, and User Interface
ƒ Power Delivery
ƒ Communications Physical Layer
ƒ Communications Protocol
ƒ Foreign Object Detection
ƒ NFC Tag Protection
ƒ Authentication Protocol
- 8 - IEC 63563-8:2025 © IEC 2025
1.2 Scope
The QiSpecification,NFC/RFIDCardProtection (this document) provides guidelines for detecting
the presence of a Radio Frequency Identification (RFID) tag or Near Field Communication (NFC)
card within the operating range of the Power Transmitter and preventing damage to the tag or
card.
1.3 Compliance
All provisions in the QiSpecification are mandatory, unless specifically indicated as recommended,
optional, note, example, or informative. Verbal expression of provisions in this Specification follow
the rules provided in ISO/IEC Directives, Part 2.
Table 1: Verbal forms for expressions of provisions
Provision Verbal form
requirement “shall” or “shall not”
recommendation “should” or “should not”
permission “may” or “may not”
capability “can” or “cannot”
1.4 References
For undated references, the most recently published document applies. The most recent WPC
publications can be downloaded from http://www.wirelesspowerconsortium.com.

1.5 Conventions
1.5.1 Notation of numbers
ƒ Real numbers use the digits 0 to 9, a decimal point, and optionally an exponential part.
ƒ Integer numbers in decimal notation use the digits 0 to 9.
ƒ Integer numbers in hexadecimal notation use the hexadecimal digits 0 to 9 and A to F, and are
prefixed by "0x" unless explicitly indicated otherwise.
ƒ Single bit values use the words ZERO and ONE.
1.5.2 Tolerances
Unless indicated otherwise, all numeric values in the QiSpecification are exactly as specified and do
not have any implied tolerance.
1.5.3 Fields in a data packet
A numeric value stored in a field of a data packet uses a big-endian format. Bits that are more
significant are stored at a lower byte offset than bits that are less significant. Table 2 and Figure 1
provide examples of the interpretation of such fields.
Table 2: Example of fields in a data packet
b b b b b b b b
7 6 5 4 3 2 1 0
(msb)
B
16-bit Numeric Data Field
B
(lsb)
B Other Field (msb)
B 10-bit Numeric Data Field (lsb) Field
Figure 1. Examples of fields in a data packet
16-bit Numeric Data Field
b b b b b b b b b b b b b b b b
15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 0
B B
0 1
10-bit Numeric Data Field
b b b b b b b b b b
9 8 7 6 5 4 3 2 1 0
B B
2 3
- 10 - IEC 63563-8:2025 © IEC 2025
1.5.4 Notation of text strings
Text strings consist of a sequence of printable ASCII characters (i.e. in the range of 0x20 to 0x7E)
enclosed in double quotes ("). Text strings are stored in fields of data structures with the first
character of the string at the lowest byte offset, and are padded with ASCII NUL (0x00) characters
to the end of the field where necessary.
EXAMPLE: The text string “WPC” is stored in a six-byte fields as the sequence of characters 'W', 'P', 'C', NUL,
NUL, and NUL. The text string “M:4D3A” is stored in a six-byte field as the sequence 'M', ':', '4', 'D',
'3', and 'A'.
1.5.5 Short-hand notation for data packets
In many instances, the QiSpecification refers to a data packet using the following shorthand
notation:
/
In this notation, refers to the data packet's mnemonic defined in the QiSpecification,
CommunicationsProtocol, and refers to a particular value in a field of the data packet.
The definitions of the data packets in the QiSpecification,CommunicationsProtocol, list the
meanings of the modifiers.
For example, EPT/cc refers to an End Power Transfer data packet having its End Power Transfer
code field set to 0x01.
1.6 Power Profiles
A Power Profile determines the level of compatibility between a Power Transmitter and a Power
Receiver. Table 3 defines the available Power Profiles.
ƒ BPPPTx: A Baseline Power Profile Power Transmitter.
ƒ EPP5PTx: An Extended Power Profile Power Transmitter having a restricted power transfer
()pot
capability, i.e. P = 5 W.
L
ƒ EPPPTx: An Extended Power Profile Power Transmitter.
ƒ BPPPRx: A Baseline Power Profile Power Receiver.
ƒ EPPPRx: An Extended Power Profile Power Receiver.
Table 3: Capabilities included in a Power Profile
Feature BPP PTx EPP5 PTx EPP PTx BPP PRx EPP PRx
Ax or Bx design Yes Yes No N/A N/A
MP-Ax or MP-Bx design No No Yes N/A N/A
Baseline Protocol Yes Yes Yes Yes Yes
Extended Protocol No Yes Yes No Yes
Authentication N/A Optional Yes N/A Optional

- 12 - IEC 63563-8:2025 © IEC 2025
2  Introduction
A Power Transmitter can damage Near Field Communication (NFC) tags present in the Operating
Volume during any phase if the emitted power levels are above the defined limit values (see
Section 2, Introduction, and its subsections).
For more information about NFC tags, see https://nfc-forum.org/.
The highest risk of damage occurs in the powertransfer phase, as shown in Table 4.
Table 4: Risk of damage to NFC tags by protocol phase
Protocol phase Risk of damage
Ping phase Possible
Configuration phase Possible
Negotiation phase Possible
Power transfer phase Likely
2.1 NFC tag detection and protection
The goal of this document is to describe how NFC tags can be detected and protected by extending
the functionality of the Power Transmitter Product or Power Receiver Product.
2.1.1 NFC tag detection
By integrating an NFC transceiver into a Power Transmitter Product or into a Power Receiver
Product, any NFC tag that can be present between the Power Transmitter Product and the Power
Receiver Product can be reliably detected. The capabilities of the devices determines which one
will execute NFC tag detection.
ƒ If neither the Power Transmitter Product nor the Power Receiver Product can detect NFC tags,
NFC tag protection does not happen and any NFC tag in the Operating Volume are susceptible
to damage.
ƒ If either the Power Transmitter Product or the Power Receiver Product (but not both) can
detect NFC tags, that device should execute tag detection.
ƒ If both the Power Transmitter Product and the Power Receiver Product can detect NFC tags,
one or both of the devices should execute tag detection.
Selection of the device that should execute NFC tag detection happens when the Power Transmitter
and Power Receiver exchange information in the negotiation phase.
See Section 3, NFCtagprotectionanddevicecommunication, for further information.

2.1.2 Protecting NFC tags
A Power Transmitter can protect NFC tags by maintaining the magnetic field levels in all phases of
the power transfer protocol below a defined limit value. This limit is defined by specific
measurement methods using the Test Proximity Integrated Circuit Card (PICC) described in
Section 7, TestingtheimpactofaPowerTransmitterProductonanNFCtag, and helps to ensure that
NFC tags are not damaged.
NOTE: In rare cases, damage can still occur even at magnetic field levels below the limit value.

- 14 - IEC 63563-8:2025 © IEC 2025
3  NFC tag protection and device communication
A Power Receiver should send a GRQ/xcap data packet to an EPP Power Transmitter during the
negotiation phase to examine the Power Transmitter Product’s extended capabilities. The XCAP
data packet returned in response provides the result of any NFC tag detection operation it has
executed. See Section 9.5, QiSpecification,CommunicationsProtocol, for more information.

The Power Receiver Product should perform one of the actions listed in Table 5 depending on
values contained in the TPS, TPE, and TDS fields of the XCAP data packet.
Table 5: Power Receiver actions based on XCAP data
XCAP data XCAP meaning Power Receiver Product action
TPS = ZERO The Power Transmitter Product does The Power Receiver Product should perform NFC
not support NFC tag detection. tag detection as defined in Section 5, NFC tag
detection by a Power Receiver Product.
TPS = ONE The Power Transmitter Product The power transfer proceeds as defined in the
supports NFC tag detection and has not Qi Specification, Communications Protocol.
TDE = ONE
detected a tag.
TDS = 0
TPS = ONE The Power Transmitter Product To proceed, the Power Receiver Product should
supports NFC tag protection but has not select one of the following actions:
TDE = ZERO
executed the latter.
ƒ Send an EPT/rep data packet and perform tag
TDS = 0
detection itself as defined in Section 5, NFC
tag detection by a Power Receiver Product
ƒ Send an EPT/ptxnfc data packet to request
the Power Transmitter Product to perform
tag detection. This should cause the Power
Transmitter Product to remove its Power
Signal and perform NFC tag detection.
TPS = ONE The Power Transmitter Product The Power Receiver Product should select one of
supports NFC tag protection and has the following actions to proceed:
TDE = ONE
detected a single tag.
ƒ Send an EPT/rep data packet itself as defined
TDS = 1
NOTE: The Power Transmitter Product in Section 5, NFC tag detection by a Power
may not be able to distinguish between Receiver Product.
an NFC tag and the NFC interface of the
ƒ Send an EPT/ptxnfc data packet to request
Power Receiver Product.
the Power Transmitter to perform tag
detection. This should cause the Power
Transmitter Product to remove its Power
Signal and perform NFC tag detection.
ƒ Proceed to the power transfer phase and
limit its drawing the power level to 5 W.
ƒ Proceed at full power if it knows that its own
NFC transceiver is active in the Operating
Volume.
ƒ Send an EPT/nfc data packet and power
transfer terminates.
Note: Whenever an NFC tag is potentially in the
Operating Volume, the Power Receiver P
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.

Loading comments...

IEC 63563-8:2025は、無線周波数識別(RFID)タグまたは近距離通信(NFC)カードの存在を検出するためのガイドラインを提供し、パワートランスミッターの動作範囲内でのタグやカードの損傷を防ぐことを目的としています。この標準は、NFC技術の発展に伴い、機器の相互作用が増加する中で、重要な役割を果たします。 標準の強みは、RFIDおよびNFCのタグ保護に関連する具体的な手法を提示している点です。これにより、メーカーや技術者は、製品設計段階において安全性を確保できるため、消費者の信頼性が向上します。また、IEC 63563-8:2025のガイドラインは、国際的な適用性があり、さまざまな地域の規制に適応することで、グローバルな市場での競争力を高めます。 さらに、この標準は、NFC技術に関連する技術革新を促進するために定期的に更新されており、最新の技術動向に対応しています。このように、IEC 63563-8:2025は、業界のニーズに応えると同時に、今後の技術発展を見据えた重要な基準と言えます。

IEC 63563-8:2025는 무선 주파수 식별(RFID) 태그 또는 근거리 통신(NFC) 카드의 존재를 감지하고, 파워 송신기 운영 범위 내에서 태그나 카드의 손상을 방지하기 위한 지침을 제공합니다. 이 표준은 NFC 태그 보호에 관한 최신 기술적 요구 사항을 다루며, Power Transmitter와의 상호작용을 최적화하여 사용자가 NFC 기술을 안전하게 사용할 수 있도록 합니다. 이 문서의 강점 중 하나는 NFC 태그 및 RFID 시스템의 전반적인 안전성을 높이는 것입니다. NFC 태그와 카드가 파워 송신기에 의해 오작동하거나 손상되는 것을 예방하기 위해 수립된 명확한 기준이 포함되어 있습니다. 이는 소비자와 제조업체 모두에게 높은 신뢰성을 제공합니다. 또한, IEC 63563-8:2025는 NFC 태그 보호를 위한 도전 과제를 효율적으로 해결하는 방안을 제시합니다. 기존의 규제 틀을 넘어, 이 표준은 혁신적인 기술 발전을 반영하며, 새로운 응용 프로그램과 시장 요구에 대한 유연성을 제공합니다. 이러한 점에서, IEC 63563-8:2025는 NFC 및 RFID 기술의 발전과 함께 진화하는 중요한 표준이라고 할 수 있습니다. 결론적으로, IEC 63563-8:2025는 보안과 신뢰성을 강조하며, NFC 태그 및 RFID 기술의 안전한 사용을 장려하는 매우 중요한 문서입니다. 이 표준은 기술적 발전을 반영하고, 증가하는 NFC 응용 프로그램 수요에 부응하는 방식으로 설계되었습니다. 이를 통해 NFCC 및 RFID 기술의 향후 발전에 필수적인 기초를 제공하고 있습니다.

The IEC 63563-8:2025 standard provides a crucial framework for ensuring the safe interaction between Power Transmitters and NFC tags or RFID cards. The scope of this document emphasizes the importance of detecting these devices within the operational range, thereby safeguarding them from potential damage. This aspect is particularly relevant in the current landscape where the integration of NFC technology in various applications is rapidly increasing. One of the significant strengths of IEC 63563-8:2025 is its comprehensive guidelines that facilitate improved detection mechanisms for NFC and RFID devices. The standard outlines specific criteria and methodologies that manufacturers and developers can adopt to enhance the reliability and safety of their products. This ensures that devices can operate seamlessly without compromising the integrity of NFC tags or RFID cards. Moreover, the relevance of IEC 63563-8:2025 extends beyond just technical specifications; it plays a vital role in promoting consumer confidence in NFC technology. By establishing protocols that prevent damage to these essential components, the standard contributes to a more robust ecosystem for their usage in various fields, including mobile payments, access control, and information sharing. In conclusion, IEC 63563-8:2025 stands out as a pivotal standard that addresses the need for NFC tag protection. Its well-defined scope, coupled with its strengths in offering detailed guidelines for detection and damage prevention, underscores its significance in advancing NFC technology and ensuring user safety. This standard is poised to enhance device interactions while fostering innovation across the industry.