Wifi printer not printing the pages android - android
I have using the following code:
Socket client = new Socket(etIp.getText().toString(), 515);
String printText = "This is a print test from Wifi";
byte[] mybytearray = printText.getBytes();
OutputStream outputStream = client.getOutputStream();
outputStream.write(mybytearray, 0, mybytearray.length); //write file to the output stream byte by byte
outputStream.flush();
outputStream.close();
client.close();
Socket connection opened, and no exception while complete process of write data in output stream. But printer not eject the page.
Please help me what I have did wrong.
I think you need to send few more data for it to eject and let the printer know.
For Epson L355 I am appending a byte array at the end of my string.
byte[] EjectByteArray = {0X00, 0X0D, 0X0C, 0X1B, 0X40, 0X1B, 0X28, 0X52, 0X08, 0X00, 0X00, 0X52, 0X45, 0X4D, 0X4F, 0X54, 0X45, 0X31, 0X4C, 0X44, 0X00, 0X00, 0X1B, 0X00, 0X00, 0X00, 0X1B, 0X40, 0X1B, 0X28, 0X52, 0X08, 0X00, 0X00, 0X52, 0X45, 0X4D, 0X4F, 0X54, 0X45, 0X31, 0X4C, 0X44, 0X00, 0X00, 0X4A, 0X45, 0X01, 0X00, 0X00, 0X1B, 0X00, 0X00, 0X00};
You may need to run a Port sniffer and try to capture the last byte array being passed after a print is finished. It would give you a clue on how you should send an eject command. This is one works on me using port 9100 on Epson L355
outputStream.write(mybytearray, 0, mybytearray.length);
outputStream.write(EjectByteArray, 0, EjectByteArray.length);
outputStream.flush();
outputStream.close();
client.close();
Add \n end of the line.this is work for me
String printText = "Finally its working \n";
Related
Arduino ESP8266 HTTPS server How to install SSL certificate
I made HTTP server on my NodeMCU ESP8266 board using ESP8266WebServer library. I would like to convert it to the HTTPS server, so I used ESP8266WebServerSecure library, bought SSL certificate and got 3 files: certificate.cert dv_ca.pem private.pem Could someone explain me how should I install it on my server? Below my code when I was trying to launch https server with self-generated certificate, but there was a problem to connect it using android application(Trust anchor not found for Android SSL connection). #include <Arduino.h> #include <ESP8266WebServer.h> #include <ESP8266WebServerSecure.h> #include <ESP8266mDNS.h> #include <ArduinoJson.h> #define output4 4 #define output5 5 #define input0 A0 const char* ssid = "SSID"; const char* password = "password"; //HTTPS server object, port number 443 BearSSL::ESP8266WebServerSecure server(443); static const char serverCert[] PROGMEM = R"EOF( -----BEGIN CERTIFICATE----- -----END CERTIFICATE----- )EOF"; static const char serverKey[] PROGMEM = R"EOF( -----BEGIN PRIVATE KEY----- -----END PRIVATE KEY----- )EOF"; void handleNotFound() { String message = "No such a data or incorrect request..."; server.send(404, "text/plain", message); } void changeStatus(){ //Parsing request argument to string String postBody = server.arg("plain"); //Changing output value condition if(server.hasArg("number")&&server.hasArg("status")){ int pinNumber = server.arg("number").toInt(); if(server.arg("status")=="on"){ digitalWrite(pinNumber, HIGH); } else if(server.arg("status")=="off"){ digitalWrite(pinNumber, LOW); } } else { handleNotFound(); } Serial.println("Argument: "+postBody); server.send(200, "text/plain", postBody); } void getStatus(){ //Creating json document DynamicJsonDocument doc(200); //Pushing data to json document if(digitalRead(output4)==LOW){ JsonObject out4 = doc.createNestedObject("sensor 4"); out4["name"] = "output4"; out4["value"] = 0; } else { JsonObject out4 = doc.createNestedObject("sensor 4"); out4["name"] = "output4"; out4["value"] = 1; } if(digitalRead(output5)==LOW){ JsonObject out5 = doc.createNestedObject("sensor 5"); out5["name"] = "output5"; out5["value"] = 0; } else { JsonObject out5 = doc.createNestedObject("sensor 5"); out5["name"] = "output5"; out5["value"] = 1; } //Getting analog input value JsonObject in0 = doc.createNestedObject("sensor 0"); in0["name"] = "input0"; in0["value"] = analogRead(A0); //Variable co String outputData = ""; serializeJsonPretty(doc, outputData); server.send(200, "application/json", outputData); } void setup() { // put your setup code here, to run once: Serial.begin(115200); // Initialize the output variables as outputs pinMode(output5, OUTPUT); pinMode(output4, OUTPUT); // Set outputs to LOW digitalWrite(output5, LOW); digitalWrite(output4, LOW); //Get current time configTime(3 * 3600, 0, "pool.ntp.org", "time.nist.gov"); //Start wifi connection WiFi.begin(ssid, password); delay(100); Serial.println("Trying to connect wifi network"); while(WiFi.status() != WL_CONNECTED){ Serial.print("."); delay(500); } Serial.println(""); Serial.print("Connected to "); Serial.println(WiFi.SSID()); Serial.print("IP adress: "); Serial.println(WiFi.localIP()); //Handling requests server.on("/", HTTP_GET, getStatus); server.on("/led", HTTP_GET, changeStatus); //Setting server certificate and key server.getServer().setRSACert(new BearSSL::X509List(serverCert), new BearSSL::PrivateKey(serverKey)); // Start server server.begin(); Serial.println("Secured server ready"); } void loop() { // put your main code here, to run repeatedly: // Handling incoming client requests in loop server.handleClient(); }
The code is from examples of ESP8266. Change the certificate except testing purposes. You can get a certificate from internet or generate it with make-self-signed-cert.sh which is located in ESP8266WiFi/examples/WiFiHTTPSServer. Before execution of make-self-signed-cert.sh, modify the script.Find your-name-here and replace it with your name or organization name. Then execute the script. At the end of the execution, there will be new files that named as key.h and x509.h. Certificate codes are in the two new files. Copy&paste them into the arduino code. #include <ESP8266WiFi.h> #ifndef STASSID #define STASSID "your-ssid" #define STAPSK "your-password" #endif const char* ssid = STASSID; const char* password = STAPSK; // The certificate is stored in PMEM static const uint8_t x509[] PROGMEM = { 0x30, 0x82, 0x01, 0x3d, 0x30, 0x81, 0xe8, 0x02, 0x09, 0x00, 0xfe, 0x56, 0x46, 0xf2, 0x78, 0xc6, 0x51, 0x17, 0x30, 0x0d, 0x06, 0x09, 0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x01, 0x0b, 0x05, 0x00, 0x30, 0x26, 0x31, 0x10, 0x30, 0x0e, 0x06, 0x03, 0x55, 0x04, 0x0a, 0x0c, 0x07, 0x45, 0x53, 0x50, 0x38, 0x32, 0x36, 0x36, 0x31, 0x12, 0x30, 0x10, 0x06, 0x03, 0x55, 0x04, 0x03, 0x0c, 0x09, 0x31, 0x32, 0x37, 0x2e, 0x30, 0x2e, 0x30, 0x2e, 0x31, 0x30, 0x1e, 0x17, 0x0d, 0x31, 0x37, 0x30, 0x33, 0x31, 0x38, 0x31, 0x34, 0x34, 0x39, 0x31, 0x38, 0x5a, 0x17, 0x0d, 0x33, 0x30, 0x31, 0x31, 0x32, 0x35, 0x31, 0x34, 0x34, 0x39, 0x31, 0x38, 0x5a, 0x30, 0x26, 0x31, 0x10, 0x30, 0x0e, 0x06, 0x03, 0x55, 0x04, 0x0a, 0x0c, 0x07, 0x45, 0x53, 0x50, 0x38, 0x32, 0x36, 0x36, 0x31, 0x12, 0x30, 0x10, 0x06, 0x03, 0x55, 0x04, 0x03, 0x0c, 0x09, 0x31, 0x32, 0x37, 0x2e, 0x30, 0x2e, 0x30, 0x2e, 0x31, 0x30, 0x5c, 0x30, 0x0d, 0x06, 0x09, 0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x01, 0x01, 0x05, 0x00, 0x03, 0x4b, 0x00, 0x30, 0x48, 0x02, 0x41, 0x00, 0xc6, 0x72, 0x6c, 0x12, 0xe1, 0x20, 0x4d, 0x10, 0x0c, 0xf7, 0x3a, 0x2a, 0x5a, 0x49, 0xe2, 0x2d, 0xc9, 0x7a, 0x63, 0x1d, 0xef, 0xc6, 0xbb, 0xa3, 0xd6, 0x6f, 0x59, 0xcb, 0xd5, 0xf6, 0xbe, 0x34, 0x83, 0x33, 0x50, 0x80, 0xec, 0x49, 0x63, 0xbf, 0xee, 0x59, 0x94, 0x67, 0x8b, 0x8d, 0x81, 0x85, 0x23, 0x24, 0x06, 0x52, 0x76, 0x55, 0x9d, 0x18, 0x09, 0xb3, 0x3c, 0x10, 0x40, 0x05, 0x01, 0xf3, 0x02, 0x03, 0x01, 0x00, 0x01, 0x30, 0x0d, 0x06, 0x09, 0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x01, 0x0b, 0x05, 0x00, 0x03, 0x41, 0x00, 0x69, 0xdc, 0x6c, 0x9b, 0xa7, 0x62, 0x57, 0x7e, 0x03, 0x01, 0x45, 0xad, 0x9a, 0x83, 0x90, 0x3a, 0xe7, 0xdf, 0xe8, 0x8f, 0x46, 0x00, 0xd3, 0x5f, 0x2b, 0x0a, 0xde, 0x92, 0x1b, 0xc5, 0x04, 0xc5, 0xc0, 0x76, 0xf4, 0xf6, 0x08, 0x36, 0x97, 0x27, 0x82, 0xf1, 0x60, 0x76, 0xc2, 0xcd, 0x67, 0x6c, 0x4b, 0x6c, 0xca, 0xfd, 0x97, 0xfd, 0x33, 0x9e, 0x12, 0x67, 0x6b, 0x98, 0x7e, 0xd5, 0x80, 0x8f }; // And so is the key. These could also be in DRAM static const uint8_t rsakey[] PROGMEM = { 0x30, 0x82, 0x01, 0x3a, 0x02, 0x01, 0x00, 0x02, 0x41, 0x00, 0xc6, 0x72, 0x6c, 0x12, 0xe1, 0x20, 0x4d, 0x10, 0x0c, 0xf7, 0x3a, 0x2a, 0x5a, 0x49, 0xe2, 0x2d, 0xc9, 0x7a, 0x63, 0x1d, 0xef, 0xc6, 0xbb, 0xa3, 0xd6, 0x6f, 0x59, 0xcb, 0xd5, 0xf6, 0xbe, 0x34, 0x83, 0x33, 0x50, 0x80, 0xec, 0x49, 0x63, 0xbf, 0xee, 0x59, 0x94, 0x67, 0x8b, 0x8d, 0x81, 0x85, 0x23, 0x24, 0x06, 0x52, 0x76, 0x55, 0x9d, 0x18, 0x09, 0xb3, 0x3c, 0x10, 0x40, 0x05, 0x01, 0xf3, 0x02, 0x03, 0x01, 0x00, 0x01, 0x02, 0x40, 0x35, 0x0b, 0x74, 0xd3, 0xff, 0x15, 0x51, 0x44, 0x0f, 0x13, 0x2e, 0x9b, 0x0f, 0x93, 0x5c, 0x3f, 0xfc, 0xf1, 0x17, 0xf9, 0x72, 0x94, 0x5e, 0xa7, 0xc6, 0xb3, 0xf0, 0xfe, 0xc9, 0x6c, 0xb1, 0x1e, 0x83, 0xb3, 0xc6, 0x45, 0x3a, 0x25, 0x60, 0x7c, 0x3d, 0x92, 0x7d, 0x53, 0xec, 0x49, 0x8d, 0xb5, 0x45, 0x10, 0x99, 0x9b, 0xc6, 0x22, 0x3a, 0x68, 0xc7, 0x13, 0x4e, 0xb6, 0x04, 0x61, 0x21, 0x01, 0x02, 0x21, 0x00, 0xea, 0x8c, 0x21, 0xd4, 0x7f, 0x3f, 0xb6, 0x91, 0xfa, 0xf8, 0xb9, 0x2d, 0xcb, 0x36, 0x36, 0x02, 0x5f, 0xf0, 0x0c, 0x6e, 0x87, 0xaa, 0x5c, 0x14, 0xf6, 0x56, 0x8e, 0x12, 0x92, 0x25, 0xde, 0xb3, 0x02, 0x21, 0x00, 0xd8, 0x99, 0x01, 0xf1, 0x04, 0x0b, 0x98, 0xa3, 0x71, 0x56, 0x1d, 0xea, 0x6f, 0x45, 0xd1, 0x36, 0x70, 0x76, 0x8b, 0xab, 0x69, 0x30, 0x58, 0x9c, 0xe0, 0x45, 0x97, 0xe7, 0xb6, 0xb5, 0xef, 0xc1, 0x02, 0x21, 0x00, 0xa2, 0x01, 0x06, 0xc0, 0xf2, 0xdf, 0xbc, 0x28, 0x1a, 0xb4, 0xbf, 0x9b, 0x5c, 0xd8, 0x65, 0xf7, 0xbf, 0xf2, 0x5b, 0x73, 0xe0, 0xeb, 0x0f, 0xcd, 0x3e, 0xd5, 0x4c, 0x2e, 0x91, 0x99, 0xec, 0xb7, 0x02, 0x20, 0x4b, 0x9d, 0x46, 0xd7, 0x3c, 0x01, 0x4c, 0x5d, 0x2a, 0xb0, 0xd4, 0xaa, 0xc6, 0x03, 0xca, 0xa0, 0xc5, 0xac, 0x2c, 0xe0, 0x3f, 0x4d, 0x98, 0x71, 0xd3, 0xbd, 0x97, 0xe5, 0x55, 0x9c, 0xb8, 0x41, 0x02, 0x20, 0x02, 0x42, 0x9f, 0xd1, 0x06, 0x35, 0x3b, 0x42, 0xf5, 0x64, 0xaf, 0x6d, 0xbf, 0xcd, 0x2c, 0x3a, 0xcd, 0x0a, 0x9a, 0x4d, 0x7c, 0xad, 0x29, 0xd6, 0x36, 0x57, 0xd5, 0xdf, 0x34, 0xeb, 0x26, 0x03 }; // Create an instance of the server // specify the port to listen on as an argument WiFiServerSecure server(443); void setup() { Serial.begin(115200); // prepare GPIO2 pinMode(2, OUTPUT); digitalWrite(2, 0); // Connect to WiFi network Serial.println(); Serial.println(); Serial.print("Connecting to "); Serial.println(ssid); WiFi.begin(ssid, password); while (WiFi.status() != WL_CONNECTED) { delay(500); Serial.print("."); } Serial.println(""); Serial.println("WiFi connected"); // Set the certificates from PMEM (if using DRAM remove the _P from the call) server.setServerKeyAndCert_P(rsakey, sizeof(rsakey), x509, sizeof(x509)); // Start the server server.begin(); Serial.println("Server started"); // Print the IP address Serial.println(WiFi.localIP()); } void loop() { // Check if a client has connected WiFiClientSecure client = server.available(); if (!client) { return; } // Wait until the client sends some data Serial.println("new client"); unsigned long timeout = millis() + 3000; while (!client.available() && millis() < timeout) { delay(1); } if (millis() > timeout) { Serial.println("timeout"); client.flush(); client.stop(); return; } // Read the first line of the request String req = client.readStringUntil('\r'); Serial.println(req); client.flush(); // Match the request int val; if (req.indexOf("/gpio/0") != -1) { val = 0; } else if (req.indexOf("/gpio/1") != -1) { val = 1; } else { Serial.println("invalid request"); client.print("HTTP/1.1 404 Not Found\r\nContent-Type: text/html\r\n\r\n<!DOCTYPE HTML>\r\n<html><body>Not found</body></html>"); return; } // Set GPIO2 according to the request digitalWrite(2, val); client.flush(); // Prepare the response String s = "HTTP/1.1 200 OK\r\nContent-Type: text/html\r\n\r\n<!DOCTYPE HTML>\r\n<html>\r\nGPIO is now "; s += (val) ? "high" : "low"; s += "</html>\n"; // Send the response to the client client.print(s); delay(1); Serial.println("Client disconnected"); // The client will actually be disconnected // when the function returns and 'client' object is detroyed }
NFC Apdu Response 67 00 (wrong length) on Android using isodep
i tried to send extended APDU command into Desfire card on Android. i was select the application on the card and success. but when i tried to authentication process and send this command, i got response 67 00 (wrong length) i send data : 00820000288C9D8E3837E8E47514E9010801C1615E65E677A21DC40E07B32DF6DE24EED3D6CD950BA8CB5E738528 where: CLA : 0x00 INS : 0x82 P1 : 0x00 P2 : 0x00 Lc : 0x28 //(40 bytes) data : 0x8C, 0x9D, 0x8E, 0x38, 0x37, 0xE8, 0xE4, 0x75, 0x14, 0xE9, 0x01, 0x08, 0x01, 0xC1 , 0x61, 0x5E, 0x65, 0xE6, 0x77, 0xA2, 0x1D, 0xC4, 0x0E, 0x07, 0xB3, 0x2D, 0xF6, 0xDE , 0x24, 0xEE, 0xD3, 0xD6, 0xCD, 0x95, 0x0B, 0xA8, 0xCB, 0x5E, 0x73, 0x85 **Le : 0x28 (expected return length)** i think there is nothing wrong with the command structure, but why the response is 67 00 i am using isodep library. please some one help me..
Android BLE: Is it possible to add Service Data and Manufacturer Data at the same time when advertising an iBeacon packet?
I'm currently doing an experiment in order to trigger a beacon detection device. Here is the sample of a detected beacon that can be used to trigger that device. In my experiment, I'm trying to replicate the beacon like in the above picture by using Android BLE library and using iBeacon protocol, since the detection device claims that it follows iBeacon protocol. First, I try to set the service UUID and service data by using AdvertiseData object, then advertise it. The code roughly looks like this: AdvertiseData.Builder dataBuilder = new AdvertiseData.Builder(); byte[] experimentData = {0x48, 0x6E, (byte) 0xDD, 0x2A, 0x40, (byte) 0xA6, (byte) 0xF0, 0x07, 0x05, 0x00, 0x00, 0x00, 0x00, 0x00}; byte[] uuidBytes = {0x10, 0x02} byte[] advertisingBytes = getAdvertisingBytes(); ParcelUuid parcelUuid = parseUuidFrom(uuidBytes); dataBuilder.addServiceData(parcelUuid, experimentData); dataBuilder.addServiceUuid(parcelUuid); dataBuilder.setIncludeTxPowerLevel(false); dataBuilder.setIncludeDeviceName(false); //dataBuilder.addManufacturerData(manufacturerCode, advertisingBytes); AdvertiseSettings.Builder settingsBuilder = new AdvertiseSettings.Builder(); settingsBuilder.setAdvertiseMode(0); settingsBuilder.setTxPowerLevel(3); settingsBuilder.setConnectable(false); bluetoothLeAdvertiser.startAdvertising(settingsBuilder.build(), dataBuilder.build(), null); I commented the addManufacturerData() part for now. The result looks like this. Now I modify the code so that instead of using Service UUID and Service Data, I use addManufacturerData to advertise the data. The code looks like this: AdvertiseData.Builder dataBuilder = new AdvertiseData.Builder(); byte[] experimentData = {0x48, 0x6E, (byte) 0xDD, 0x2A, 0x40, (byte) 0xA6, (byte) 0xF0, 0x07, 0x05, 0x00, 0x00, 0x00, 0x00, 0x00}; byte[] uuidBytes = {0x10, 0x02} byte[] advertisingBytes = getAdvertisingBytes(); //ParcelUuid parcelUuid = parseUuidFrom(uuidBytes); //dataBuilder.addServiceData(parcelUuid, experimentData); //dataBuilder.addServiceUuid(parcelUuid); //dataBuilder.setIncludeTxPowerLevel(false); //dataBuilder.setIncludeDeviceName(false); dataBuilder.addManufacturerData(manufacturerCode, advertisingBytes); AdvertiseSettings.Builder settingsBuilder = new AdvertiseSettings.Builder(); settingsBuilder.setAdvertiseMode(0); settingsBuilder.setTxPowerLevel(3); settingsBuilder.setConnectable(false); bluetoothLeAdvertiser.startAdvertising(settingsBuilder.build(), dataBuilder.build(), null); The result is shown below. The "Service Data" part is gone, and it is now recognized as an iBeacon packet: Now, in the first picture, there are "Service Data" section and "Beacon" section, so I though that by adding Service Data and Manufacturer Data, the two section will be shown. I uncomment all of the code, and now it looks like this: AdvertiseData.Builder dataBuilder = new AdvertiseData.Builder(); byte[] experimentData = {0x48, 0x6E, (byte) 0xDD, 0x2A, 0x40, (byte) 0xA6, (byte) 0xF0, 0x07, 0x05, 0x00, 0x00, 0x00, 0x00, 0x00}; byte[] uuidBytes = {0x10, 0x02} byte[] advertisingBytes = getAdvertisingBytes(); ParcelUuid parcelUuid = parseUuidFrom(uuidBytes); dataBuilder.addServiceData(parcelUuid, experimentData); dataBuilder.addServiceUuid(parcelUuid); dataBuilder.setIncludeTxPowerLevel(false); dataBuilder.setIncludeDeviceName(false); dataBuilder.addManufacturerData(manufacturerCode, advertisingBytes); AdvertiseSettings.Builder settingsBuilder = new AdvertiseSettings.Builder(); settingsBuilder.setAdvertiseMode(0); settingsBuilder.setTxPowerLevel(3); settingsBuilder.setConnectable(false); bluetoothLeAdvertiser.startAdvertising(settingsBuilder.build(), dataBuilder.build(), null); But then the advertising packet does not shown at all in the beacon detection app. No exception either, so I don't know whether the beacon is advertised or not So, it is possible by using Android BLE library to replicate beacon as shown in the first picture (Service data and beacon/manufacturer data in one packet)?
A single advertisement packet is limited to about 23 data bytes so it does not have room for both manufacturer data and service data of the sizes you have in your example. Try advertising both at the same time each in its own advertisement. Android devices support transmitting multiple advertisements simultaneously.
ACR122 - Android / How to get the UID's [duplicate]
I try to integrate an ACR122 to my android app. I'm using the ANDROID Library (http://www.acs.com.hk/en/products/3/acr122u-usb-nfc-reader/) available from ACS. Everything work, I can detect the presence of a card but I want to extract the UID/ID of the card. Someone know the function to do that? Do you have an example of this type of integration?
In case of Mifare card you need to send this APDU byte array to the card: (byte) 0xFF, (byte) 0xCA, (byte) 0x00, (byte) 0x00, (byte) 0x00 . I'm not sure about ACR122 API but probably you need to wrap this APDU into specific API method like transmit() UPDATE Sample code: byte[] command = new byte[] { (byte) 0xFF, (byte) 0xCA, (byte) 0x00, (byte) 0x00, (byte) 0x00 }; byte[] response = new byte[300]; int responseLength; responseLength = reader.transmit(slotNum, command, command.length, response,response.length); System.out.println(new String(response)); Reader is com.acs.smartcard.Reader object and slotNum is a the slot number. I’m not sure how to find it because I don’t have ACR to test. But if you told that you was able to establish basic communication with reader probably you know slotNum.
In order to prevent this error when trying to read the UID: com.acs.smartcard.InvalidDeviceStateException: The current state is not equal to specific. This should rather be: int slotNum = 0; byte[] payload = new byte[] { (byte) 0xFF, (byte) 0xCA, (byte) 0x00, (byte) 0x00, (byte) 0x00 }; byte[] response = new byte[7]; // 7 bytes + 90 00 (9 bytes) try { reader.power(slotNum, Reader.CARD_WARM_RESET); reader.setProtocol(slotNum, Reader.PROTOCOL_T0 | Reader.PROTOCOL_T1); reader.transmit(slotNum, payload, payload.length, response, response.length); logBuffer(response, response.length); } catch (ReaderException e) { Log.e(LOG_TAG, e.getMessage(), e); }
NFC Smartposter to Dial a number
i want to create a NFC SmartPoster which dial a number with Action Record type "act". Can anyone tell how to get Action Record type "act" in android from packet and check whether packet contains Action Record type "act" or not. Below is packet i have created. /** * Smart Poster containing a Telephone number and Action record type. */ public static final byte[] SMART_POSTER_Dial_Number = new byte[] { // SP type record (byte) 0xd1, (byte) 0x02, (byte) 0x26, (byte) 0x53, (byte) 0x70, // Call type record (byte) 0xd1, (byte) 0x01, (byte) 0x0e, (byte) 0x55, (byte) 0x05, (byte) 0x2b, (byte) 0x39, (byte) 0x31, (byte) 0x38, (byte) 0x38, (byte) 0x37, (byte) 0x32, (byte) 0x37, (byte) 0x34, (byte) 0x33, (byte) 0x39, (byte) 0x33, (byte) 0x39, // Action type record (byte) 0x11, (byte) 0x03, (byte) 0x01, (byte) 0x61, (byte) 0x63, (byte) 0x74, (byte) 0x00, // Text type record with 'T' (byte) 0x91, (byte) 0x01, (byte) 0x09, (byte) 0x54, (byte) 0x02, (byte) 'C', (byte) 'a', (byte) 'l', (byte) 'l', (byte) 'i', (byte) 'n', (byte) 'g', (byte) '.' }; Please help..
When you receive an NDEF message in your Activity via an ACTION_NDEF_DISCOVERED intent, you can parse and check the contents for a SmartPoster record with an embedded 'act' record as follows: Intent intent = getIntent(); final Parcelable[] rawMsgs = intent.getParcelableArrayExtra(NfcAdapter.EXTRA_NDEF_MESSAGES); NdefMessage mesg = (NdefMessage) rawMsgs[0]; // in theory there can be more messages // let's inspect the first record only NdefRecord[] record = mesg.getRecords()[0]; byte[] type = record.getType(); // check if it is a SmartPoster byte[] smartPoster = { 'S', 'p'}; if (Arrays.equals(smartPoster, type) { byte[] payload = record.getPayload(); // try to parse the payload as NDEF message NdefMessage n; try { n = new NdefMessage(payload); } catch (FormatException e) { return; // not an NDEF message, we're done } // try to find the 'act' record NdefRecord[] recs = n.getRecords(); byte[] act = { 'a', 'c', 't' }; for (NdefRecord r : recs) { if (Arrays.equals(act, r.getType()) { ... // found it; do your thing! return; } } } return; // nothing found BTW: You will find that there are a couple of format errors in the example message in your question: the first byte of the Uri record should be 0x81 and the first byte of the Text record should be 0x51.