SlideShare une entreprise Scribd logo
1  sur  4
Télécharger pour lire hors ligne
NFC: NEAR-FIELD COMMUNICATIONS
A Look Into the (Near) Future of NFC


          NFC, HUH?                   read information                    decessor. NFC operates at high
                                                                          frequencies (13.56 MHz) to allow
Imagine if your smartphone could   Sony and Philips first developed       the exchange of data between
do everything from make con-       NFC in 2002. As an extension of        enabled devices. Communication
tactless payments with a tap of    RFID, NFC is completely compat-        begins when two enabled devices
your phone to become your hotel    ible with existing structures, tags,   are in extremely close proximity
or house key. Away with all your   and contactless smart cards.           to each other (4 - 10cm) or if two
CVS, Giant, Safeway, and Staples   It does, however, dramatically         enabled devices physically touch
loyalty cards—let your smart-                     differ from its pre-    one another. In essence, this
phone take their place. Does it                                             technology brings connectivity
seem like something from a Hol-                                                to the physical world.
lywood movie? Well, reality says
otherwise. A not-so new technol-                                               The Near Field Communica-
ogy, near field communication,                                                tion Forum was created in
is on its way to simplifying our                                              2004 and seeks to advance
lives even more.                                                              NFC technology by develop-
                                                                             ing specifications, educating
NFC is a short-range wireless                                               the market about NFC, and
connectivity technology that                                               ensuring interoperability among
builds upon Radio Frequency                                                services and devices. The
Identification     technology.                                            forum’s 140 members consist
What exactly is RFID?                                                     of application developers, fi-
                                                                          nancial services institutions,
•	 It is capable of accepting                                             manufacturers,      and     more.
   and transmitting infor-
   mation beyond just a few                                                     NFC PREDICTIONS
   meters; it is less restric-
   tive than NFC                                                          NFC-enabled mobile devices
•	 It uses radio frequency                                                stand to benefit most from the
   waves that act as pas-                                                 type of technology NFC provides.
   sive, active, or a combi-                                              Factors such as chip, handset, and
   nation of both                                                         tag manufacturers have slowed
•	 It does not need a                                                     its adoption to this point, but
   direct line of sight to                                                Android devices that contain NFC



                                          Contact PointAbout at 202.391.0347, info@pointabout.com
                                          or visit www.pointabout.com for more information.
chips are already on the market    play. The initiator is the active      guided museum tour with NFC
and the iPhone 5 is expected to    device, which contains power           tags placed throughout an exhibit.
have built-in NFC capabilities as  sources and is usually a mobile
well.                              device that contains an NFC read-      2. Card Emulation Mode
                                   er/writer. The target is the passive   The Card Emulation Mode in-
In comparison to countries abroad, device, which does not have any        volves the NFC device acting as a
very few devices equipped with available power sources. The pas-          NFC tag, similar to the traditional
NFC exist in the U.S.; these few sive device contains an NFC tag,         contactless smart card. When you
include Nokia, Samsung, LG, and which is basically a printed circuit      make a payment, for example,
Motorola devices. According to integrating stored data and an             you touch your device to a NFC
the latest research by Merca- antenna which can be read by an             reader, which receives or reads
tor Advisory Group, 116 million NFC-enabled device.                       the necessary data.
smartphones equipped with NFC
will ship this year. Between 2012 The NFC Forum developed three         3. Peer-to-Peer Mode
and 2015, the shipment number modes of operation that will              The P2P Mode is when two de-
should rise to 510 million.        allow for the integration of the     vices exchange data. Suppose
                                   technology into our daily lives.     business owners John and Jane
                                   NFC devices can easily switch        meet for the first time at a mobile
         IN A NUTSHELL:            from one mode of operation to        strategy conference and they
        HOW NFC WORKS              another. These modes are:            want to keep in touch. With NFC
                                                                        there’s no need to carry around
NFC is often called an “application   1. Reader/Writer Mode             and exchange business cards;
enabler.” It opens various roads of   The Reader/Writer Mode is usu- instead, it would only take a tap
communication and transactions        ally for the exchange of content of their phones to trade their
in a quick, user-friendly way. This   information. For instance, if you contact information.
not only makes electronic services    come across a movie poster with
or other interactions accessible      an NFC tag, you can download                     NFC
to more people, but it also tran-     any available data (such as a             USES/SCENARIOS
scends age and technical ability.     movie trailer, a discount coupon,
                                      or reviews) by reading the tag
So how does it work? Think of NFC     with your NFC-enabled device. NFC-like technology is not a new
performing a handshake between        Another great example is a self- commodity. Think about the ID
two devices that are close togeth-                                      badges or key fobs that open
                                                                        doors. Remember when Master-
er. The device that first extends
or initiates the handshake is the
                                       116 MILLION                      Card (PayPass) and ExxonMobil
“initiator” and tries to establish    SMARTPHONES                       (Speedpass) implemented their
                                                                        “pay on the go” mini kiosks? These
a connection. Once connected,
the two devices exchange data           EQUIPPED                        are very common examples, but
                                                                        there are countless more which
through NFC directly or through
other wireless technologies such
                                      WITH NFC WILL                     breed convenience, synchroniza-
as Bluetooth and WiFi.                 BE SHIPPED                       tion, productivity, communica-
                                                                        tion, and the rapid exchange of
Let’s take this a step further and      THIS YEAR.                      information—all in real-time.
look at the roles the two devices


                                            Contact PointAbout at 202.391.0347, info@pointabout.com
                                            or visit www.pointabout.com for more information.
Below are just a few scenarios that Pairing NFC and consumer                riders looking for information on
illustrate the limitless possibilities electronics works similarly but      transit schedules.
offered by NFC.                        depends on the overall size of the
                                       transfer data. For instance, data    Most public transportation re-
1. Contactless Payments                that is reasonably small (up to a    quires fare, which comes in the
The most common example is kilobyte) may solely use NFC to                  form of a paper ticket, plastic/
contactless payments: using a transmit the data, but other situa-           metal token, or an electronic
mobile device as a digital wal- tions may call for NFC to establish         card. The use of NFC technology
let. Say you’re on the way to another wireless connection                   removes the burden of carrying
the office, but you want to stop method (such as Bluetooth or               cash, loose coins, and/or credit
for your morning cup of coffee. WiFi) to carry the information for          cards. Commuters will profit from
With just a swipe or tap of your sharing.                                   being able to monitor real-time
mobile device, you can be in and                                            transit information and schedules
out quickly, eliminating the need Suppose you have photos on                via signs that are embedded with
to carry cash or your credit card. your mobile device or digital            NFC-readable information.
In terms of contactless payments, camera that you want to print. In
NFC technology can also include that case, you’ll touch your device
the extension of redeemable against the NFC-enabled printer.
coupons, promotions, and the Because of the size of the files,              ENTERPRISE ADVANTAGES &
use of loyalty cards. At the time                                            BENEFITS OFFERED BY NFC
of purchase, customers can swipe       In essence, this
mobile phones to unlock a variety
of discounts.                            technology
                                                                         NFC presents numerous benefits
2. The Sharing of Content
                                       brings connec-                    to both mobile users and busi-
We do everything with our mobile         tivity to the                   nesses. In general, it is a versatile
                                                                         technology that can find a niche
devices—take pictures, record
videos, take notes, read, write/       physical world.                   in virtually every industry or situ-
                                                                         ation. Convenience and simplicity
edit documents, build contacts,
                                                                         of use are obvious advantages.
download/listen to music…all         you’ll connect via Bluetooth to
                                                                         The compatibility between NFC
of which we love to share. NFC       transmit the digital photos from
                                                                         and existing RFID structures, tags,
technology promotes quick and        the device to the printer.
                                                                         and contactless smart cards is
easy sharing between two mobile
                                                                         another plus because it elimi-
devices, as well as with other       3. Ticketing & Transportation
                                                                         nates the need to create and/or
consumer electronics such as         The transportation industry is
                                                                         develop an entirely new system.
cameras, TVs, and printers. Most     one of the industries set to reap
impressively, trading informa-       the benefits of using NFC. Ac-
                                                                         Given the wide range of pos-
tion only requires a quick touch     cording to the American Public
                                                                         sibilities for developers and the
between devices. In the office,      Transportation       Association,
                                                                         number of devices that will soon
you can streamline business and      nearly 14 million people depend
                                                                         come pre-equipped with NFC
revolutionize the way you swap       on buses, trains, light rails, sub-
                                                                         chips, it has become a very at-
business cards, spreadsheets, and    ways, cabs, and trolleys each day.
                                                                         tractive technology. Market and
documents.                           That’s a substantial number of
                                                                         consumer outreach efforts, as
                                     fare transactions, not to mention


                                            Contact PointAbout at 202.391.0347, info@pointabout.com
                                            or visit www.pointabout.com for more information.
well as the opportunity to gather     modification, eavesdropping, and      As the technology matures and
valuable market research, are just    “man-in-the-middle” attacks. De-      NFC-enabled          smartphones
the beginning. For instance, a        pending on the mode (passive or       hit the market, companies are
customer in a mall scans a shirt’s    active) of the devices in question,   actively researching, seeking,
NFC tag with their mobile device      the attack may or may not be a        and developing ways to combat
to gather more information on         success.                              threats. It is imperative to craft
the product (such as availability                                           safe and secure ways to transmit
in another store location, size in-   Threat: Data modification, in         information.
formation, or perhaps the lowest      short, is when an attacker intends
price). Once the customer receives    for a valid, but manipulated, mes-
the requested product data, the       sage to be sent to the receiving               CONCLUSION
customer’s interest in the product    phone.
can then be made known to the         Solution: Establish a secure
company, which helps them un-         channel or rely on the NFC device  Like all new technologies, security
derstand the customer’s interests.    to continuously check the radio    concerns still remain. Neverthe-
This leads to a deeper knowledge      frequency field while transmitting less, the benefits of NFC mobile
of the consumer and could en-         information and to discontinue     services     are    immeasurable.
hance targeted marketing (e.g.        the transmission when a threat is  NFC-enabled devices can change
tailored promotions, loyalty point    detected.                          the way we make transactions,
incentives, and coupons).                                                exchange information, and send
                                      Threat: Eavesdropping is a more and receive data.
This also works in reverse. Using     common threat because devices
NFC, consumers can effortlessly       communicate through radio fre- In 2011, the big names in mobile
share information about com-          quency waves. An attacker, using technology plan to integrate
panies—sales, promotions, and         an antenna, can literally grab and NFC with their new devices.
product data—that can result in       decode the transmitted signals.    Both Android and Blackberry
an increase in foot traffic, sales,   Solution: Establish a secure already have or will have NFC-
and referrals.                        channel.                           supported models; the media
                                                                         predicts that Apple will follow suit
     TACKLING SECURITY                Threat: Albeit a rarity, the “man- in its next generation of iPhones.
           ISSUES                     in-the-middle” attack involves The next few years will see more
                                      two parties that want to start a NFC support in mobile devices.
The development of technology         conversation but that instead get It’ll be a matter of time before
and ease of sharing raise security    duped by an attacker into a third commerce, transportation, and
concerns. As NFC continues to         party conversation.                other institutions develop the
develop, more security risks are      Solution: Use active-passive infrastructure to jump into the
coming to light. Common at-           communication mode.                game.
tacks and threats include data




                                             Contact PointAbout at 202.391.0347, info@pointabout.com
                                             or visit www.pointabout.com for more information.

Contenu connexe

Dernier

New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 

Dernier (20)

New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 

En vedette

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by HubspotMarius Sescu
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTExpeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 

En vedette (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

NFC: Near Field Communication - A Look Into the (Near) Future of NFC

  • 1. NFC: NEAR-FIELD COMMUNICATIONS A Look Into the (Near) Future of NFC NFC, HUH? read information decessor. NFC operates at high frequencies (13.56 MHz) to allow Imagine if your smartphone could Sony and Philips first developed the exchange of data between do everything from make con- NFC in 2002. As an extension of enabled devices. Communication tactless payments with a tap of RFID, NFC is completely compat- begins when two enabled devices your phone to become your hotel ible with existing structures, tags, are in extremely close proximity or house key. Away with all your and contactless smart cards. to each other (4 - 10cm) or if two CVS, Giant, Safeway, and Staples It does, however, dramatically enabled devices physically touch loyalty cards—let your smart- differ from its pre- one another. In essence, this phone take their place. Does it technology brings connectivity seem like something from a Hol- to the physical world. lywood movie? Well, reality says otherwise. A not-so new technol- The Near Field Communica- ogy, near field communication, tion Forum was created in is on its way to simplifying our 2004 and seeks to advance lives even more. NFC technology by develop- ing specifications, educating NFC is a short-range wireless the market about NFC, and connectivity technology that ensuring interoperability among builds upon Radio Frequency services and devices. The Identification technology. forum’s 140 members consist What exactly is RFID? of application developers, fi- nancial services institutions, • It is capable of accepting manufacturers, and more. and transmitting infor- mation beyond just a few NFC PREDICTIONS meters; it is less restric- tive than NFC NFC-enabled mobile devices • It uses radio frequency stand to benefit most from the waves that act as pas- type of technology NFC provides. sive, active, or a combi- Factors such as chip, handset, and nation of both tag manufacturers have slowed • It does not need a its adoption to this point, but direct line of sight to Android devices that contain NFC Contact PointAbout at 202.391.0347, info@pointabout.com or visit www.pointabout.com for more information.
  • 2. chips are already on the market play. The initiator is the active guided museum tour with NFC and the iPhone 5 is expected to device, which contains power tags placed throughout an exhibit. have built-in NFC capabilities as sources and is usually a mobile well. device that contains an NFC read- 2. Card Emulation Mode er/writer. The target is the passive The Card Emulation Mode in- In comparison to countries abroad, device, which does not have any volves the NFC device acting as a very few devices equipped with available power sources. The pas- NFC tag, similar to the traditional NFC exist in the U.S.; these few sive device contains an NFC tag, contactless smart card. When you include Nokia, Samsung, LG, and which is basically a printed circuit make a payment, for example, Motorola devices. According to integrating stored data and an you touch your device to a NFC the latest research by Merca- antenna which can be read by an reader, which receives or reads tor Advisory Group, 116 million NFC-enabled device. the necessary data. smartphones equipped with NFC will ship this year. Between 2012 The NFC Forum developed three 3. Peer-to-Peer Mode and 2015, the shipment number modes of operation that will The P2P Mode is when two de- should rise to 510 million. allow for the integration of the vices exchange data. Suppose technology into our daily lives. business owners John and Jane NFC devices can easily switch meet for the first time at a mobile IN A NUTSHELL: from one mode of operation to strategy conference and they HOW NFC WORKS another. These modes are: want to keep in touch. With NFC there’s no need to carry around NFC is often called an “application 1. Reader/Writer Mode and exchange business cards; enabler.” It opens various roads of The Reader/Writer Mode is usu- instead, it would only take a tap communication and transactions ally for the exchange of content of their phones to trade their in a quick, user-friendly way. This information. For instance, if you contact information. not only makes electronic services come across a movie poster with or other interactions accessible an NFC tag, you can download NFC to more people, but it also tran- any available data (such as a USES/SCENARIOS scends age and technical ability. movie trailer, a discount coupon, or reviews) by reading the tag So how does it work? Think of NFC with your NFC-enabled device. NFC-like technology is not a new performing a handshake between Another great example is a self- commodity. Think about the ID two devices that are close togeth- badges or key fobs that open doors. Remember when Master- er. The device that first extends or initiates the handshake is the 116 MILLION Card (PayPass) and ExxonMobil “initiator” and tries to establish SMARTPHONES (Speedpass) implemented their “pay on the go” mini kiosks? These a connection. Once connected, the two devices exchange data EQUIPPED are very common examples, but there are countless more which through NFC directly or through other wireless technologies such WITH NFC WILL breed convenience, synchroniza- as Bluetooth and WiFi. BE SHIPPED tion, productivity, communica- tion, and the rapid exchange of Let’s take this a step further and THIS YEAR. information—all in real-time. look at the roles the two devices Contact PointAbout at 202.391.0347, info@pointabout.com or visit www.pointabout.com for more information.
  • 3. Below are just a few scenarios that Pairing NFC and consumer riders looking for information on illustrate the limitless possibilities electronics works similarly but transit schedules. offered by NFC. depends on the overall size of the transfer data. For instance, data Most public transportation re- 1. Contactless Payments that is reasonably small (up to a quires fare, which comes in the The most common example is kilobyte) may solely use NFC to form of a paper ticket, plastic/ contactless payments: using a transmit the data, but other situa- metal token, or an electronic mobile device as a digital wal- tions may call for NFC to establish card. The use of NFC technology let. Say you’re on the way to another wireless connection removes the burden of carrying the office, but you want to stop method (such as Bluetooth or cash, loose coins, and/or credit for your morning cup of coffee. WiFi) to carry the information for cards. Commuters will profit from With just a swipe or tap of your sharing. being able to monitor real-time mobile device, you can be in and transit information and schedules out quickly, eliminating the need Suppose you have photos on via signs that are embedded with to carry cash or your credit card. your mobile device or digital NFC-readable information. In terms of contactless payments, camera that you want to print. In NFC technology can also include that case, you’ll touch your device the extension of redeemable against the NFC-enabled printer. coupons, promotions, and the Because of the size of the files, ENTERPRISE ADVANTAGES & use of loyalty cards. At the time BENEFITS OFFERED BY NFC of purchase, customers can swipe In essence, this mobile phones to unlock a variety of discounts. technology NFC presents numerous benefits 2. The Sharing of Content brings connec- to both mobile users and busi- We do everything with our mobile tivity to the nesses. In general, it is a versatile technology that can find a niche devices—take pictures, record videos, take notes, read, write/ physical world. in virtually every industry or situ- ation. Convenience and simplicity edit documents, build contacts, of use are obvious advantages. download/listen to music…all you’ll connect via Bluetooth to The compatibility between NFC of which we love to share. NFC transmit the digital photos from and existing RFID structures, tags, technology promotes quick and the device to the printer. and contactless smart cards is easy sharing between two mobile another plus because it elimi- devices, as well as with other 3. Ticketing & Transportation nates the need to create and/or consumer electronics such as The transportation industry is develop an entirely new system. cameras, TVs, and printers. Most one of the industries set to reap impressively, trading informa- the benefits of using NFC. Ac- Given the wide range of pos- tion only requires a quick touch cording to the American Public sibilities for developers and the between devices. In the office, Transportation Association, number of devices that will soon you can streamline business and nearly 14 million people depend come pre-equipped with NFC revolutionize the way you swap on buses, trains, light rails, sub- chips, it has become a very at- business cards, spreadsheets, and ways, cabs, and trolleys each day. tractive technology. Market and documents. That’s a substantial number of consumer outreach efforts, as fare transactions, not to mention Contact PointAbout at 202.391.0347, info@pointabout.com or visit www.pointabout.com for more information.
  • 4. well as the opportunity to gather modification, eavesdropping, and As the technology matures and valuable market research, are just “man-in-the-middle” attacks. De- NFC-enabled smartphones the beginning. For instance, a pending on the mode (passive or hit the market, companies are customer in a mall scans a shirt’s active) of the devices in question, actively researching, seeking, NFC tag with their mobile device the attack may or may not be a and developing ways to combat to gather more information on success. threats. It is imperative to craft the product (such as availability safe and secure ways to transmit in another store location, size in- Threat: Data modification, in information. formation, or perhaps the lowest short, is when an attacker intends price). Once the customer receives for a valid, but manipulated, mes- the requested product data, the sage to be sent to the receiving CONCLUSION customer’s interest in the product phone. can then be made known to the Solution: Establish a secure company, which helps them un- channel or rely on the NFC device Like all new technologies, security derstand the customer’s interests. to continuously check the radio concerns still remain. Neverthe- This leads to a deeper knowledge frequency field while transmitting less, the benefits of NFC mobile of the consumer and could en- information and to discontinue services are immeasurable. hance targeted marketing (e.g. the transmission when a threat is NFC-enabled devices can change tailored promotions, loyalty point detected. the way we make transactions, incentives, and coupons). exchange information, and send Threat: Eavesdropping is a more and receive data. This also works in reverse. Using common threat because devices NFC, consumers can effortlessly communicate through radio fre- In 2011, the big names in mobile share information about com- quency waves. An attacker, using technology plan to integrate panies—sales, promotions, and an antenna, can literally grab and NFC with their new devices. product data—that can result in decode the transmitted signals. Both Android and Blackberry an increase in foot traffic, sales, Solution: Establish a secure already have or will have NFC- and referrals. channel. supported models; the media predicts that Apple will follow suit TACKLING SECURITY Threat: Albeit a rarity, the “man- in its next generation of iPhones. ISSUES in-the-middle” attack involves The next few years will see more two parties that want to start a NFC support in mobile devices. The development of technology conversation but that instead get It’ll be a matter of time before and ease of sharing raise security duped by an attacker into a third commerce, transportation, and concerns. As NFC continues to party conversation. other institutions develop the develop, more security risks are Solution: Use active-passive infrastructure to jump into the coming to light. Common at- communication mode. game. tacks and threats include data Contact PointAbout at 202.391.0347, info@pointabout.com or visit www.pointabout.com for more information.