Ce diaporama a bien été signalé.
Nous utilisons votre profil LinkedIn et vos données d’activité pour vous proposer des publicités personnalisées et pertinentes. Vous pouvez changer vos préférences de publicités à tout moment.
Near FieldCommunication   (NFC)            By:       Vivek Prasad   ¾ B.Tech(CSE), GIT         B1 - 65
What is NFC ? • NFC is a short range wireless technology that allows   communications to take place between devices that  ...
Specification and Importance• Distance of 10 cm or less• Operates at 13.56 MHz on ISO/IEC 18000-3 air  interface and at ra...
Communication ModesDevice A   Device B               Description Active    Active     When a device sends, it generates an...
Why NFC ?
Applications:
Other uses are:
Potential Security Threats
The Solution
The Solution (Cont.)• Establishing a secure channel between two NFC  devices is the best approach to protect against  eave...
Future Prospects• Vehicle Ignition  A NFC enabled vehicle can be unlocked and started just  by tapping the user’s NFC devi...
Latest news about NFC•   Google is working with Citigroup and MasterCard on    NFC mobile payment solution•   Airlines mov...
Conclusion NFC has the potential to be a disruptive  technology, changing the way that lives are  lived, transforming eve...
Questions?
Prochain SlideShare
Chargement dans…5
×

Nfc ppt

56 322 vues

Publié le

Near Field Communication (NFC) Technology

Publié dans : Formation

Nfc ppt

  1. 1. Near FieldCommunication (NFC) By: Vivek Prasad ¾ B.Tech(CSE), GIT B1 - 65
  2. 2. What is NFC ? • NFC is a short range wireless technology that allows communications to take place between devices that either touch or are momentarily held close together
  3. 3. Specification and Importance• Distance of 10 cm or less• Operates at 13.56 MHz on ISO/IEC 18000-3 air interface and at rates ranging from 106 Kbit/s to 424 Kbit/s• Requires low power• Compatible with contactless RFID technology
  4. 4. Communication ModesDevice A Device B Description Active Active When a device sends, it generates an RF field. When waiting for data, a device doesn’t generate an RF field. Thus, the RF field is alternately generated by Device A and Device B.Active Passive The RF field is generated by Device A only.Passive Active The RF field is generated by Device B only.
  5. 5. Why NFC ?
  6. 6. Applications:
  7. 7. Other uses are:
  8. 8. Potential Security Threats
  9. 9. The Solution
  10. 10. The Solution (Cont.)• Establishing a secure channel between two NFC devices is the best approach to protect against eavesdropping and any kind of data modification attack.• The NFC Specific Key Agreement
  11. 11. Future Prospects• Vehicle Ignition A NFC enabled vehicle can be unlocked and started just by tapping the user’s NFC device onto the vehicle removing the need of carrying a pair of keys. It can even be used to communicate between the device and the vehicle and monitor the vehicle’s health through some specific app• Unlock Door Smart keyless doors can be made by implementing NFC technology onto doors, where a single tap of the device onto the door would unlock it eradicating the pain of inserting the key and unlocking it.
  12. 12. Latest news about NFC• Google is working with Citigroup and MasterCard on NFC mobile payment solution• Airlines move closer to NFC tech for passengers- NFC allows a Smartphone to be used to "tap and check-in" or "tap and board" their flight• Nintendos Wii successor, the Wii U, will come equipped with near-field communication (NFC) technology• Nokia went on record to say that all future Symbian devices will have built-in NFC support, a de-facto feature• Recently “Ra.One” became the first Indian movie to be marketed through NFC
  13. 13. Conclusion NFC has the potential to be a disruptive technology, changing the way that lives are lived, transforming everyday tasks, making things easier, more intuitive and more effective A significant advantage of this technique is the compatibility with existing RFID infrastructures. Additionally it would bring benefits to the setup of longer-range wireless techniques such as Bluetooth Though security concerns are present, they can be overcome through the use of various schemes such as setting up a secure channel, combined with which NFC can provide confidentiality, integrity and authenticity
  14. 14. Questions?

×