SIST EN IEC 63563-8:2026
(Main)Qi specification version 2.0 - Part 8: Nfc tag protection (IEC 63563-8:2025)
Qi specification version 2.0 - Part 8: Nfc tag protection (IEC 63563-8:2025)
IEC 63563-8:2025 provides guidelines for detecting the presence of a Radio Frequency Identification (RFID) tag or Near Field Communication (NFC) card within the operating range of the Power Transmitter and preventing damage to the tag or card.
Qi Spezifikation Version 2.0 - Teil 8: Nfc tag Schutz (IEC 63563-8:2025)
Spécification Qi version 2.0 - Partie 8: Protection des étiquettes NFC (IEC 63563-8:2025)
IEC 63563-8:2025 fournit des lignes directrices pour détecter la présence d'une étiquette d'identification par radiofréquence (RFID) ou d'une carte de communication en champ proche (NFC) dans la plage de fonctionnement de l'émetteur de puissance et pour éviter d'endommager l'étiquette ou la carte.
Različica specifikacije Qi 2.0 - 8. del: Zaščita oznake Nfc (IEC 63563-8:2025)
General Information
Standards Content (Sample)
SLOVENSKI STANDARD
oSIST prEN IEC 63563-8:2024
01-julij-2024
Različica specifikacije Qi 2.0 - 8. del: Zaščita oznake Nfc (Hitri postopek)
Qi specification version 2.0 - Part 8: Nfc tag protection (Fast track)
Ta slovenski standard je istoveten z: prEN IEC 63563-8:2024
ICS:
29.240.99 Druga oprema v zvezi z Other equipment related to
omrežji za prenos in power transmission and
distribucijo električne energije distribution networks
33.160.99 Druga avdio, video in Other audio, video and
avdiovizuelna oprema audiovisual equipment
35.200 Vmesniška in povezovalna Interface and interconnection
oprema equipment
oSIST prEN IEC 63563-8:2024 en,fr,de
2003-01.Slovenski inštitut za standardizacijo. Razmnoževanje celote ali delov tega standarda ni dovoljeno.
oSIST prEN IEC 63563-8:2024
oSIST prEN IEC 63563-8:2024
100/4129/CDV
COMMITTEE DRAFT FOR VOTE (CDV)
PROJECT NUMBER:
IEC 63563-8 ED1
DATE OF CIRCULATION: CLOSING DATE FOR VOTING:
2024-05-03 2024-07-26
SUPERSEDES DOCUMENTS:
IEC TA 15 : WIRELESS POWER TRANSFER
SECRETARIAT: SECRETARY:
Korea, Republic of Mr Ockwoo Nam
OF INTEREST TO THE FOLLOWING COMMITTEES: PROPOSED HORIZONTAL STANDARD:
TC 106,TC 108
Other TC/SCs are requested to indicate their interest, if any,
in this CDV to the secretary.
FUNCTIONS CONCERNED:
EMC ENVIRONMENT QUALITY ASSURANCE SAFETY
SUBMITTED FOR CENELEC PARALLEL VOTING NOT SUBMITTED FOR CENELEC PARALLEL VOTING
This document is still under study and subject to change. It should not be used for reference purposes.
Recipients of this document are invited to submit, with their comments, notification of any relevant patent rights of which they
are aware and to provide supporting documentation.
Recipients of this document are invited to submit, with their comments, notification of any relevant “In Some Countries”
clauses to be included should this proposal proceed. Recipients are reminded that the CDV stage is the final stage for
submitting ISC clauses. (SEE AC/22/2007 OR NEW GUIDANCE DOC).
TITLE:
Qi Specification version 2.0 - Part 8: NFC Tag Protection (Fast track)
PROPOSED STABILITY DATE: 2029
NOTE FROM TC/SC OFFICERS:
This document is only in PDF format. IEC and WPC agreed to use the pdf files as this is an adoption.
electronic file, to make a copy and to print out the content for the sole purpose of preparing National Committee positions.
You may not copy or "mirror" the file or printed version of the document, or any part of it, for any other purpose without
permission in writing from IEC.
oSIST prEN IEC 63563-8:2024
WIRELESS POWER
CONSORTIUM
Qi Specification
NFC Tag Protection
Version 2.0
April 2023
oSIST prEN IEC 63563-8:2024
COPYRIGHT
© 2023 by the Wireless Power Consortium, Inc. All rights reserved.
The Qi Specification, NFC Tag Protection is published by the Wireless Power Consortium and
has been prepared by the members of the Wireless Power Consortium. Reproduction in whole or i n
part is prohibited without express and prior written permission of the Wireless Powe r
Consortium.
DISCLAIMER
The information contained herein is believed to be accurate as of the date of publication,
but is provided “as is” and may contain errors. The Wireless Power Consortium makes no
warranty, express or implied, with respect to this document and its contents, including any
warranty of title, ownership, merchantability, or fitness for a particular use or purpose.
Neither the Wireless Power Consortium, nor any member of the Wireless Power
Consortium will be liable for errors in this document or for any damages, including indirect
or consequential, from use of or reliance on the accuracy of this document. For any furthe r
explanation of the contents of this document, or in case of any perceived inconsistency or ambiguity
of interpretation, contact: info@wirelesspowerconsortium.com.
RELEASE HISTORY
Specification Version Release Date Description
2.0 April 2023 Initial release of the v2.0 Qi Specification.
oSIST prEN IEC 63563-8:2024
Table of Contents
1 General . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.1 Structure of the Qi Specification. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.2 Scope . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.3 Compliance. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.4 References. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.5 Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
1.6 Power Profiles. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
2 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
2.1 NFC tag detection and protection. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
3 NFC tag protection and device communication . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
4 NFC tag detection by a Power Transmitter Product. . . . . . . . . . . . . . . . . . . . . . . 12
4.1 NFC antenna integration in a Power Transmitter Product. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
4.2 NFC transceiver integration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
4.3 NFC polling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
5 NFC tag detection by a Power Receiver Product . . . . . . . . . . . . . . . . . . . . . . . . . 21
5.1 Design guidelines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
5.2 Recommended detection procedure. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
6 Tag detection using the NFC unit. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
6.1 Low power object detection in standby . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
6.2 Low power object detection in the power transfer phase . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
7 Testing the impact of a Power Transmitter Product on an NFC tag . . . . . . . . . . 23
7.1 Test PICC dimensions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
7.2 Construction of the Test PICC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
7.3 Test PICC calibration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
7.4 Test procedure using the Test PICC. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
oSIST prEN IEC 63563-8:2024
1 General
The Wireless Power Consortium (WPC) is a worldwide organization that aims to develop and
promote global standards for wireless power transfer in various application areas. A first
application area comprises flat-surface devices such as mobile phones and chargers in the
Baseline Power Profile (up to 5 W) and Extended Power Profile (above 5 W).
1.1 Structure of the Qi Specification
General documents
Introduction
Glossary, Acronyms, and Symbols
System description documents
Mechanical, Thermal, and User Interface
Power Delivery
Communications Physical Layer
Communications Protocol
Foreign Object Detection
NFC Tag Protection
Authentication Protocol
Reference design documents
Power Transmitter Reference Designs
Power Receiver Design Examples
Compliance testing documents
Power Transmitter Test Tools
Power Receiver Test Tools
Power Transmitter Compliance Tests
Power Receiver Compliance Tests
NOTE: The compliance testing documents are restricted and require signing in to the WPC members’
website. All other specification documents are available for download on both the WPC public website
and the WPC website for members.
oSIST prEN IEC 63563-8:2024
1.2 Scope
The Qi Specification, NFC/RFID Card Protection (this document) provides guidelines for detecting
the presence of a Radio Frequency Identification (RFID) tag or Near Field Communication (NFC)
card within the operating range of the Power Transmitter and preventing damage to the tag or
card.
1.3 Compliance
All provisions in the Qi Specification are mandatory, unless specifically indicated as recommended,
optional, note, example, or informative. Verbal expression of provisions in this Specification follow
the rules provided in ISO/IEC Directives, Part 2.
Table 1: Verbal forms for expressions of provisions
Provision Verbal form
requirement “shall” or “shall not”
recommendation “should” or “should not”
permission “may” or “may not”
capability “can” or “cannot”
1.4 References
For undated references, the most recently published document applies. The most recent WPC
publications can be downloaded from http://www.wirelesspowerconsortium.com. In addition, the
Qi Specification references documents listed below. Documents marked here with an asterisk (*)
are restricted and require signing in to the WPC website for members.
Product Registration Procedure Web page*
Qi Product Registration Manual, Logo Licensee/Manufacturer*
Qi Product Registration Manual, Authorized Test Lab*
Power Receiver Manufacturer Codes,* Wireless Power Consortium
The International System of Units (SI), Bureau International des Poids et Mesures
Verbal forms for expressions of provisions, International Electotechnical Commission
For regulatory information about product safety, emissions, energy efficiency, and use of the
frequency spectrum, visit the regulatory environment page of the WPC members’ website.
oSIST prEN IEC 63563-8:2024
1.5 Conventions
1.5.1 Notation of numbers
Real numbers use the digits 0 to 9, a decimal point, and optionally an exponential part.
Integer numbers in decimal notation use the digits 0 to 9.
Integer numbers in hexadecimal notation use the hexadecimal digits 0 to 9 and A to F, and are
prefixed by "0x" unless explicitly indicated otherwise.
Single bit values use the words ZERO and ONE.
1.5.2 Tolerances
Unless indicated otherwise, all numeric values in the Qi Specification are exactly as specified and do
not have any implied tolerance.
1.5.3 Fields in a data packet
A numeric value stored in a field of a data packet uses a big-endian format. Bits that are more
significant are stored at a lower byte offset than bits that are less significant. Table 2 and Figure 1
provide examples of the interpretation of such fields.
Table 2: Example of fields in a data packet
b b b b b b b b
7 6 5 4 3 2 1 0
(msb)
B
16-bit Numeric Data Field
B
(lsb)
B Other Field (msb)
B 10-bit Numeric Data Field (lsb) Field
Figure 1. Examples of fields in a data packet
16-bit Numeric Data Field
b b b b b b b b b b b b b b b b
15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 0
B B
0 1
10-bit Numeric Data Field
b b b b b b b b b b
9 8 7 6 5 4 3 2 1 0
B B
2 3
oSIST prEN IEC 63563-8:2024
1.5.4 Notation of text strings
Text strings consist of a sequence of printable ASCII characters (i.e. in the range of 0x20 to 0x7E)
enclosed in double quotes ("). Text strings are stored in fields of data structures with the first
character of the string at the lowest byte offset, and are padded with ASCII NUL (0x00) characters
to the end of the field where necessary.
EXAMPLE: The text string “WPC” is stored in a six-byte fields as the sequence of characters 'W', 'P', 'C', NUL,
NUL, and NUL. The text string “M:4D3A” is stored in a six-byte field as the sequence 'M', ':', '4', 'D',
'3', and 'A'.
1.5.5 Short-hand notation for data packets
In many instances, the Qi Specification refers to a data packet using the following shorthand
notation:
/
In this notation, refers to the data packet's mnemonic defined in the Qi Specification,
Communications Protocol, and refers to a particular value in a field of the data packet.
The definitions of the data packets in the Qi Specification, Communications Protocol, list the
meanings of the modifiers.
For example, EPT/cc refers to an End Power Transfer data packet having its End Power Transfer
code field set to 0x01.
oSIST prEN IEC 63563-8:2024
1.6 Power Profiles
A Power Profile determines the level of compatibility between a Power Transmitter and a Power
Receiver. Table 3 defines the available Power Profiles.
BPP PTx: A Baseline Power Profile Power Transmitter.
EPP5 PTx: An Extended Power Profile Power Transmitter having a restricted power transfer
()pot
capability, i.e. P = 5 W.
L
EPP PTx: An Extended Power Profile Power Transmitter.
BPP PRx: A Baseline Power Profile Power Receiver.
EPP PRx: An Extended Power Profile Power Receiver.
Table 3: Capabilities included in a Power Profile
Feature BPP PTx EPP5 PTx EPP PTx BPP PRx EPP PRx
Ax or Bx design Yes Yes No N/A N/A
MP-Ax or MP-Bx design No No Yes N/A N/A
Baseline Protocol Yes Yes Yes Yes Yes
Extended Protocol No Yes Yes No Yes
Authentication N/A Optional Yes N/A Optional
oSIST prEN IEC 63563-8:2024
2 Introduction
A Power Transmitter can damage Near Field Communication (NFC) tags present in the Operating
Volume during any phase if the emitted power levels are above the defined limit values (see
Section 2, Introduction, and its subsections).
For more information about NFC tags, see https://nfc-forum.org/.
The highest risk of damage occurs in the power transfer phase, as shown in Table 4.
Table 4: Risk of damage to NFC tags by protocol phase
Protocol phase Risk of damage
Ping phase Possible
Configuration phase Possible
Negotiation phase Possible
Power transfer phase Likely
2.1 NFC tag detection and protection
The goal of this document is to describe how NFC tags can be detected and protected by extending
the functionality of the Power Transmitter Product or Power Receiver Product.
2.1.1 NFC tag detection
By integrating an NFC transceiver into a Power Transmitter Product or into a Power Receiver
Product, any NFC tag that can be present between the Power Transmitter Product and the Power
Receiver Product can be reliably detected. The capabilities of the devices determines which one
will execute NFC tag detection.
If neither the Power Transmitter Product nor the Power Receiver Product can detect NFC tags,
NFC tag protection does not happen and any NFC tag in the Operating Volume are susceptible
to damage.
If either the Power Transmitter Product or the Power Receiver Product (but not both) can
detect NFC tags, that device should execute tag detection.
If both the Power Transmitter Product and the Power Receiver Product can detect NFC tags,
one or both of the devices should execute tag detection.
Selection of the device that should execute NFC tag detection happens when the Power Transmitter
and Power Receiver exchange information in the negotiation phase.
See Section 3, NFC tag protection and device communication, for further information.
oSIST prEN IEC 63563-8:2024
2.1.2 Protecting NFC tags
A Power Transmitter can protect NFC tags by maintaining the magnetic field levels in all phases of
the power transfer protocol below a defined limit value. This limit is defined by specific
measurement methods using the Test Proximity Integrated Circuit Card (PICC) described in
Section 7, Testing the impact of a Power Transmitter Product on an NFC tag, and helps to ensure that
NFC tags are not damaged.
NOTE: In rare cases, damage can still occur even at magnetic field levels below the limit value.
oSIST prEN IEC 63563-8:2024
3 NFC tag protection and device communication
A Power Receiver should send a GRQ/xcap data packet to an EPP Power Transmitter during the
negotiation phase to examine the Power Transmitter Product’s extended capabilities. The XCAP
data packet returned in response provides the result of any NFC tag detection operation it has
executed. See Section 9.5, Qi Specification, Communications Protocol, for more information.
oSIST prEN IEC 63563-8:2024
The Power Receiver Product should perform one of the actions listed in Table 5 depending on
values contained in the TPS, TPE, and TDS fields of the XCAP data packet.
Table 5: Power Receiver actions based on XCAP data
XCAP data XCAP meaning Power Receiver Product action
TPS = ZERO The Power Transmitter Product does The Power Receiver Product should perform NFC
not support NFC tag detection. tag detection as defined in Section 5, NFC tag
detection by a Power Receiver Product.
TPS = ONE The Power Transmitter Product The power transfer proceeds as defined in the
supports NFC tag detection and has not Qi Specification, Communications Protocol.
TDE = ONE
detected a tag.
TDS = 0
TPS = ONE The Power Transmitter Product To proceed, the Power Receiver Product should
supports NFC tag protection but has not select one of the following actions:
TDE = ZERO
executed the latter.
Send an EPT/rep data packet and perform tag
TDS = 0
detection itself as defined in Section 5, NFC
tag detection by a Power Receiver Product
Send an EPT/ptxnfc data packet to request
the Power Transmitter Product to perform
tag detection. This should cause the Power
Transmitter Product to remove its Power
Signal and perform NFC tag detection.
TPS = ONE The Power Transmitter Product The Power Receiver Product should select one of
supports NFC tag protection and has the following actions to proceed:
TDE = ONE
detected a single tag.
Send an EPT/rep data packet itself as defined
TDS = 1
NOTE: The Power Transmitter Product in Section 5, NFC tag detection by a Power
may not be able to distinguish between Receiver Product.
an NFC tag and the NFC interface of the
Send an EPT/ptxnfc data packet to request
Power Receiver Product.
the Power Transmitter to perform tag
detection. This should cause the Power
Transmitter Product to remove its Power
Signal and perform NFC tag detection.
Proceed to the power transfer phase and
limit its drawing the power level to 5 W.
Proceed at full power if it knows that its own
NFC transceiver is active in the Operating
Volume.
Send an EPT/nfc data packet and power
transfer terminates.
Note: Whenever an NFC tag is potentially in the
Operating Volume, the Power Receiver Product
should provide a warning to the user.
oSIST prEN IEC 63563-8:2024
Table 5: Power Receiver actions based on XCAP data (Continued)
XCAP data XCAP meaning Power Receiver Product action
TPS = ONE The Power Transmitter Product The Power Receiver Product should select one of
supports NFC tag protection and has the following actions to proceed:
TDE = ZERO
detected multiple tags.
Send an EPT/rep data packet itself as defined
TDS = 2
NOTE: TDS=2 may be multiple NFC tags in Section 5, NFC tag detection by a Power
or a tag and an NMD. Receiver Product.
Send an EPT/ptxnfc data packet to request
the Power Transmitter to perform tag
detection. This should cause the Power
Transmitter Product to remove its Power
Signal and perform NFC tag detection.
Proceed to the power transfer phase and
limit its drawing the power level to 5 W.
Proceed at full power if it knows that its own
NFC transceiver is active in the Operating
Volume.
Send an EPT/nfc data packet and power
transfer terminates.
Whenever an NFC tag is potentially in the
Operating Volume, the Power Receiver Product
should provide a warning to the user.
The following generic guidelines apply to EPP Power Transmitter Products for NFC tag detection.
The Power Transmitter Product does not detect NFC tags
If the Power Transmitter Product does not detect any NFC tag (TDS is 0 in the XCAP data packet), it
should proceed with normal operation.
The Power Transmitter Product detects one NFC tag
When a Power Receiver Product requests an XCAP data packet, it indicates to the Power
Transmitter that it supports NFC tag protection. The Power Transmitter should not limit the
Negotiable Load Power when it detects an NFC tag.
If a Power Receiver Product does not request an XCAP data packet, the Power Transmitter may
assume that the it does not support NFC tag protection. In that case, the Power Transmitter should
limit the Negotiable Load Power to 5 W or below to avoid damaging the detected NFC tag.
The Power Transmitter Product detects more than one NFC tag
The Power Transmitter should limit the Negotiable Load Power to 5 W or below. The Power
Receiver Product cannot proceed at full power.
oSIST prEN IEC 63563-8:2024
4 NFC tag detection by a Power Transmitter Product
The most reliable way to detect NFC tags in the Operating Volume is to integrate an NFC transceiver
into the Power Transmitter Product. The transceiver uses the NFC communication channel to poll
for all types of NFC tags.
In addition, an NFC transceiver typically implements low-power tag detection in order to fulfill low
power requirements. For this purpose, the NFC transceiver continuously monitors its antenna
impedance (see Section 6, Tag detection using the NFC unit).
The main building blocks relevant to NFC transceiver integration for tag protection are the antenna,
the NFC transceiver block, and the NFC poll profile. All three points are discussed in the following
subsections.
4.1 NFC antenna integration in a Power Transmitter Product
Due to the different operating frequencies used for power
...








Questions, Comments and Discussion
Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.
Loading comments...