NFC
-
Upload
shailesh-jain -
Category
Documents
-
view
213 -
download
0
Transcript of NFC
![Page 1: NFC](https://reader036.fdocuments.net/reader036/viewer/2022062905/577ccf1a1a28ab9e788ee217/html5/thumbnails/1.jpg)
NFC History Introduction Architecture Application Potential Threats Conclusion
![Page 2: NFC](https://reader036.fdocuments.net/reader036/viewer/2022062905/577ccf1a1a28ab9e788ee217/html5/thumbnails/2.jpg)
History
• 1983 The first patent to be associated with the abbreviation RFID was
granted to Charles Walton.
• 2002 Sony and Philips agreed on establishing a new technology March 25,
2002.
• 2004 Nokia, Philips and Sony established the Near Field Communication
(NFC) forum.
• 2006 Initial specifications for NFC Tags
• 2006 Specification for "SmartPoster" records
• 2006 Nokia 6131 was the first NFC phone
![Page 3: NFC](https://reader036.fdocuments.net/reader036/viewer/2022062905/577ccf1a1a28ab9e788ee217/html5/thumbnails/3.jpg)
Contd…
• 2010 Samsung Nexus S: First Android NFC phone
• 2010 The city of Nice in Southern France launches the "Nice City
of contactless mobile" project, providing inhabitants with new NFC
generation mobile phones and bank cards, and a real "bouquet of
services" for their daily lives covering transportation, tourism and
student's services
• 2011 NFC support becomes part of the Symbian mobile operating
system with the release of Symbian Anna version.
![Page 4: NFC](https://reader036.fdocuments.net/reader036/viewer/2022062905/577ccf1a1a28ab9e788ee217/html5/thumbnails/4.jpg)
Contd…
• 2012 Sony introduces the "Smart Tags", which use NFC technology to change modes and
profiles on a Sony smartphone at close range, included in the package of (and "perfectly
paired" with) the Sony Xperia P Smartphone released the same year.
• 2012 Samsung introduces TecTile; a set of MIFARE NFC stickers and a companion
application for Android to read and write the TecTile stickers, and design macros that can be
triggered by them.
• 2013 Samsung and Visa announce major partnership to develop mobile payments.
• 2013 IBM Scientists from Zurich, in an effort to curb fraud and security breaches have come
up with a new mobile authentication security technology based on Near-Field Communication
(NFC). IBM’s new technology works on similar principles to that of a dual-factor
authentication security measure.
![Page 5: NFC](https://reader036.fdocuments.net/reader036/viewer/2022062905/577ccf1a1a28ab9e788ee217/html5/thumbnails/5.jpg)
NFCNFC is a set of standards allowing low-power
wireless links to transfer small amounts of data from one device to another, securely and at very short range.
NFC is derived from an existing communications technology standard, Radiofrequency Identification (RFID), first patented in the early 1970s.
RFID technology as applied today is a one-way communication system that allows information to be put on a tag which can be read by an RFID reader.
![Page 6: NFC](https://reader036.fdocuments.net/reader036/viewer/2022062905/577ccf1a1a28ab9e788ee217/html5/thumbnails/6.jpg)
NFC
RFID is currently used in a variety of swipe cards (public transport ticketing systems such as Myki, ‘tap and go’ credit and debit cards, electronic toll-road readers and building access passes), in advertising (RFID tags on posters), and as a potential replacement to universal product bar codes in the retail and manufacturing industries.
Building on RFID technology, NFC allows for secure two-way communication to transfer data between endpoints, such as a mobile phone and an electronic pay station in a car park.
![Page 7: NFC](https://reader036.fdocuments.net/reader036/viewer/2022062905/577ccf1a1a28ab9e788ee217/html5/thumbnails/7.jpg)
NFCNFC can read smart tags in read/write operation mode in the
same way as RFID technology. However, NFC has two additional modes, card emulation and
peer-to-peer, which are used in smartphones and other newer NFC-capable devices.
Card emulation transforms smartphones into mobile wallets by storing a financial value. Peer-to-peer mode allows the easy sharing of information between phones and devices, such as exchanging business card contacts. Peer-to-peer also supports device pairing so that two phones can be synchronised, for example, to allow multi-player online gaming.
Both modes of operation give the consumer a range of existing and potential commercial applications.
![Page 8: NFC](https://reader036.fdocuments.net/reader036/viewer/2022062905/577ccf1a1a28ab9e788ee217/html5/thumbnails/8.jpg)
NFC
![Page 9: NFC](https://reader036.fdocuments.net/reader036/viewer/2022062905/577ccf1a1a28ab9e788ee217/html5/thumbnails/9.jpg)
Architecture
![Page 10: NFC](https://reader036.fdocuments.net/reader036/viewer/2022062905/577ccf1a1a28ab9e788ee217/html5/thumbnails/10.jpg)
![Page 11: NFC](https://reader036.fdocuments.net/reader036/viewer/2022062905/577ccf1a1a28ab9e788ee217/html5/thumbnails/11.jpg)
Application
![Page 12: NFC](https://reader036.fdocuments.net/reader036/viewer/2022062905/577ccf1a1a28ab9e788ee217/html5/thumbnails/12.jpg)
![Page 13: NFC](https://reader036.fdocuments.net/reader036/viewer/2022062905/577ccf1a1a28ab9e788ee217/html5/thumbnails/13.jpg)
Advantages of NFC• High convenience to there user ,because the
date exchange is done just by bringing two mobiles together.
• Secure communication.• No special software.• No manual config and settings.• No search and pair procedure• Nfc uses are practically limitless
![Page 14: NFC](https://reader036.fdocuments.net/reader036/viewer/2022062905/577ccf1a1a28ab9e788ee217/html5/thumbnails/14.jpg)
![Page 15: NFC](https://reader036.fdocuments.net/reader036/viewer/2022062905/577ccf1a1a28ab9e788ee217/html5/thumbnails/15.jpg)
Conclusion
•The contactless payments and services market, driven by NFC technology, is predicted by many to grow exponentially in coming years.
• Wider adoption of NFC will depend on a range of factors being addressed—primarily industry developing more appealing, market-defining applications of NFC technology for consumers, while supporting this technology with ubiquitous and interoperable infrastructure.
•Losing the NFC RFID card or the mobile phone will open access to any finder and act as a single-factor authenticating entity