Windows Phone Week 2013 - NFC & Windows (Phone) 8


Published on

Published in: Mobile, Technology, Business
1 Like
  • Be the first to comment

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Windows Phone Week 2013 - NFC & Windows (Phone) 8

  1. 1. TAP AND DO A gesture that is a natural interaction between people in close proximity used to trigger doing something together between the devices they are holding. System: Near Field Proximity (e.g., NFC)
  2. 2. NFC NFC is opening up new possibilities for mobile applications. Applications using this short-range radio technology can greatly simplify how a user gathers data and interacts with their environment. When a phone touches, or is held near an NFC tag or another NFC capable device, the phone can exchange data with that tag or device. This data could be a link to download the menu of a favorite restaurant, the specifications for an electronic gizmo, paring information from a Bluetooth headset or another phone that can be used to exchange objects: the possibilities are endless.
  3. 3. NFC technology basics Standardized radio technology Works on short distances (typically up to 4 centimeters) in the 13.56 Mhz spectrum Works on short distances (typically up to 4 centimeters) in the 13.56 Mhz spectrum 3 operating modes: Reader/Writer, Peer-2-peer and card emulation working simultaneously
  4. 4. NFC use cases
  5. 5. Tap to share This use case family is when two NFC enabled devices are held in close proximity with each other and exchange information. The information exchanged may be a photo, vCard, URL or it can be an application specific object (i.e. social profile, game object, ID or other type of data). NFC radio is suitable for exchanging small data objects. If larger quantities of data need to be transferred between devices, NFC can be used to establish a connection using another bearer technology such as Bluetooth or WiFi.
  6. 6. Tap to pair Due to the short range of the interaction (e.g., tapping) NFC can be used to establish a direct connection between two devices using a secondary bearer technology such as Bluetooth. By using NFC pairing to facilitate connecting two Bluetooth devices, the connection is done by a single tap gesture, which significantly improves the user experience. Nokia has championed this use case by implementing it in its Bluetooth-enabled accessories.
  7. 7. Tap to initiate a service NFC-enabled devices can gather and transmit information to and from passive NFC tags. NFC tags come in variety of shapes, types and sizes and can be read only or rewriteable. They consist of an antenna and a memory chip and do not require any power. They receive power from the NFC device that comes in close proximity and tries to either write or read data from the tag. Tags can be embedded into various products such as merchandise, inventory, posters (smart posters), business cards, etc. The information stored on NFC tags can be generic and standardized (e.g., URL, vCard, telephone number, or Bluetooth pairing information), or it can be application-specific (e.g., URI, raw data, or mimetype). Use cases range from enabling automated check-ins, auto-starting applications, running marketing campaigns, displaying situation relevant information (e.g. timetables), augmenting products by embedding tags with links to rich content (e.g. museums, merchandise, retail). The possibilities are endless.
  8. 8. Tap to pay/authenticate/redeem In this case, the NFC mobile device emulates a standard NFC tag or a contactless SmartCard – generally referred to as Card emulation mode. This means the mobile device can be used as a credit/payment card, transit card, access key, coupon, or loyalty card. Typically for this use case, the information from the emulated card (i.e. credit card information, transit ticket, discount voucher) needs to be stored and managed in a secure and tamper-proof way. This is done via the Secure Element, a dedicated chip with restricted and managed access control that is either embedded into the device or connected externally via a SIM card or SD chip. The service provider (bank, transportation authority, retailer, or operator) deploys and manages the card information on the Secure Element using a broker, the Trusted Service Manager (TSM). These types of use cases can be done without an application or using an application or application framework (i.e. Wallet).
  9. 9. SCENARIOS Connect Devices Exchange Digital Objects Acquire Content
  10. 10. Thank you! Contact: •My Blog •My Email
  11. 11. • • •
  12. 12. •€18M (US$24M) joint investment from Microsoft, Nokia, and Aalto University over 3 years to fund and support high potential mobile startups around the world •Startups get: •Award: €20K, €50K, or €70K •Training and coaching •Go-to-market support •Startups give: •90 day exclusivity period after publish to Windows Phone Store
  13. 13.