SlideShare a Scribd company logo
1 of 9
Download to read offline
Ecma/TC32-TG19/2004/1




Near Field Communication
White paper




      -i -
Table of contents




1         Introduction                                    1

2         The stage                                       1

    2.1    Transfer of content                            1
    2.2    Set up of communication for other protocols    4

3         The protocol                                    5

4         Unique features                                 6

5         Related standards and references                7

    5.1    Other references                               7




                                               - ii -
1     Introduction
      The current state of the consumer electronics can be characterized by moving from a single purpose
      device to multifunctional devices and by moving from an isolated device to networked devices. In
      this last respect, it is important that people do not face the complexities of setting up network
      connections between devices. Cumbersome network settings can possibly be dealt with in the
      computer world but certainly not in the consumer electronics world.
      This is the main driver for the Near Field Communication Interface and Protocol (NFCIP-1), which is
      targeted towards the consumer electronics users that will be able to use the secure means of
      communication between various devices without exerting much intellectual effort in configuring their
      “network”. The concept is strikingly simple: in order to make two devices communicate, bring them
      together or make them touch. This will engage the NFCIP-1 wireless devices’ interfaces and
      configure them to link up in a peer-to-peer network. Once the configuration data has been
      exchanged using NFC, the devices can set up and continue communication for longer range and
      faster protocols like Bluetooth or Wireless Ethernet (WiFi).


2     The stage
      Let’s start off with some use cases of NFC devices to illustrate the concepts. The examples
      presented here are for direct data transfer between devices and for communication set up in
      conjunction with another wireless protocol.

2.1     Transfer of content
        Let’s say you went somewhere on a trip and you took lots of pictures with your PDA with a built-in
        camera and you want to show them to your friends on a big screen TV.


        We take a picture…                           And show it on the TV by touching the “hot
                                                     spot” of the TV with the PDA.
Let’s say you want to see the world from the point of view of our Aibo here:


Here is the Aibo:                             And here is what it sees:




So all we need to do is to give the Aibo a command to take a picture and transfer it to the Clie by
touching the Aibo:
Let’s take another example. If you have a PC and a mobile phone equipped with NFC, you can
easily download a new game from a website directly onto this mobile phone for your kid using
NFC:




And this same principle will work for any sort of data transfer between two pieces of equipment
when they support NFC. There is no need to set up communication manually provided that the
applications are capable of handling the communication. This opens countless possibilities for
content transfer and management of personal data stored within different types of consumer
electronics equipment.
2.2       Set up of communication for other protocols
          Imagine that you would like to transfer a large amount of information between two computers – a
          desktop and a laptop. Let’s say you want to transfer a presentation file. Using NFC may be slow
          and we decide to use something with more bandwidth. Let’s say for this example we use
          Bluetooth. Now, to set up Bluetooth communication between two computers we would need to set
          it up manually with a password to protect the communication. Using NFC we can set up this
          communication by simply touching the two computers:




      1
                                     2




                                                            Touch the computers at the
                                            1               “hot spot”. They will open a
                                                            connection to exchange the
                                                            parameters of the Bluetooth
                                                            communication and establish a
                                                            secret key. The Bluetooth
                                                            communication is established
                                                            as a second step of this
                                                            procedure without any human
                                                            interference    using     the
                                                            exchanged parameters.




      2


                                                Bluetooth




                                          Now the computers can be put
                                          away from each other but the
                                          communication        continues
                                          using the session of Bluetooth
                                          that      was      established
                                          previously.




          The same procedure can be used to establish a wireless (Bluetooth, WiFi etc.) link between two
          pieces of computer or consumer electronics equipment like TVs, laptop computers, PDAs, mobile
          phones and so on.
3   The protocol
    The protocol is based on a wireless interface. There are always two parties to the communication;
    hence the protocol is also known as peer-to-peer communication protocol. The protocol establishes
    wireless network connections between network appliances and consumer electronics devices.
    The interfaces operate in the unregulated RF band of 13.56 MHz. This means that no restrictions are
    applied and no licenses are required for the use of NFC devices in this RF band. Of course, each
    country imposes certain limitations on the electromagnetic emissions in this RF band. The limitations
    mean that in practice the distance at which the devices can connect to each other is restricted and
    this distance may vary from country to country. Generally speaking, we consider the operating
    distances of 0~20 cm.
    As is often the case with the devices sharing a single RF band, the communication is half-duplex.
    The devices implement the “listen before talk” policy – any device must first listen on the carrier and
    start transmitting a signal only if no other device can be detected transmitting.
    NFC protocol distinguishes between the Initiator and the Target of the communication. Any device
    may be either an Initiator or a Target. The Initiator, as follows from the name, is the device that
    initiates and controls the exchange of data. The Target is the device that answers the request from
    the Initiator.
    NFC protocol also distinguishes between two modes of operation: Active mode and Passive mode.
    All devices support both communication modes. The distinction is as follows:
           In the Active mode of communication both devices generate their own RF field to carry the
           data.
           In the Passive mode of communication only one device generates the RF field while the
           other device uses load modulation to transfer the data. The protocol specifies that the
           Initiator is the device responsible to generate the RF field.
    The application sets the initial communication speed at 106, 212 or 424 kbit/s. Subsequently the
    application and/or the communication environment may require speed adaptation, which can be
    done during communication.
    NFCIP-1 uses different modulation and bit encoding schemes depending on the speed. While
    establishing the communication, the Initiator starts the communication in a particular mode at a
    particular speed. The Target determines the current speed and the associated low-level protocol
    automatically and answers accordingly.
    The communication is terminated either on the command from the application or when devices move
    out of range.
4      Unique features
       What makes the communication between the devices so easy is that the NFC protocol provides
       some features not found in other general-purpose protocols.
       First of all, it is a very short-range protocol. It supports communication at distances measured in
       centimetres. The devices have to be literally almost touched to establish the link between them. This
       has two important consequences:
       1) The devices can rely on the protocol to be inherently secured 1 since the devices must be placed
          very close to each other. It is easy to control whether the two devices communicate by simply
          placing them next to each other or keeping them apart.
       2) The procedure of establishing the protocol is inherently familiar to people: you want something to
          communicate – touch it. This allows for the establishment of the network connection between the
          devices be completely automated and happen in a transparent manner. The whole process feels
          then like if devices recognize each other by touch and connect to each other once touched.
       Another important feature of this protocol is the support for the passive mode of communication.
       This is very important for the battery-powered devices since they have to place conservation of the
       energy as the first priority. The protocol allows such a device, like a mobile phone, to operate in a
       power-saving mode – the passive mode of NFC communication. This mode does not require both
       devices to generate the RF field and allows the complete communication to be powered from one
       side only. Of course, the device itself will still need to be powered internally but it does not have to
       “waste” the battery on powering the RF communication interface.
       Also, the protocol can be used easily in conjunction with other protocols to select devices and
       automate connection set-up. As was demonstrated in the examples of use above, the parameters of
       other wireless protocols can be exchanged allowing for automated set-up of other, longer-range,
       connections. The difficulty in using long-range protocols like Bluetooth or Wireless Ethernet is in
       selecting the correct device out of the multitude of devices in the range and providing the right
       parameters to the connection. Using NFC the whole procedure is simplified to a mere touch of one
       device to another.
       The NFC protocol is also compatible with the widely used contactless smart card protocols FeliCa ™
       and Mifare ™. The NFC devices are able to work with the smart cards and smart card readers
       conforming to these protocols in a seamless manner. Not only a card may be viewed with an NFC
       device but also an NFC device can be used instead of a card.




1
  Here we refer to the avoidance of unintended connections rather than protection against malicious intent. For
protection against eavesdropping or connections with malicious intent traditional security measures should be
implemented at the network protocol layer and above.
5     Related standards and references
      The NFC protocol requires standardisation in order to be accepted fully by the industry and provide
      for compatibility between the devices produced by different manufacturers. The standardisation also
      means keeping the specification open and accessible for everybody, facilitating the analysis of the
      protocol and adaptation of the devices for various needs.
      The work on standardisation is done within Ecma International, a standards organisation with a long
      history of successful projects. The standards are published by Ecma International and,
      consequently, become also ISO/IEC and ETSI standards. Sony Corporation and Royal Philips
      Electronics are the founders of this work. The group working on the standards within Ecma is
      growing constantly; more companies are joining the effort to enhance the NFC standards. Ecma
      invites all interested parties to join the working group.
      Standards published as of December 2003:
      1) ECMA-340 “Near Field Communication – Interface and Protocol (NFCIP-1)”
      2) ISO/IEC 18092 (ISO/IEC JTC1 adopted ECMA-340 under their fast track procedure);
      3) ECMA-352 “Near Field Communication Interface and Protocol – 2 (NFCIP-2)”.

5.1     Other references
        1) Ecma International: http://www.ecma-international.org
        2) Press release regarding NFC standardisation http://www.ecma-international.org/news/ECMA-
           340-NFCIP-1.htm

More Related Content

What's hot

NEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATIONNEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATIONavtechno
 
NEAR FIELD COMMUNICATION (NFC)
NEAR FIELD COMMUNICATION (NFC)NEAR FIELD COMMUNICATION (NFC)
NEAR FIELD COMMUNICATION (NFC)mahima28
 
Near Field Communication (NFC) by Logesh
Near Field Communication (NFC) by LogeshNear Field Communication (NFC) by Logesh
Near Field Communication (NFC) by LogeshLogesh Kumar
 
Other types of networks: Bluetooth, Zigbee, & NFC
Other types of networks: Bluetooth, Zigbee, & NFCOther types of networks: Bluetooth, Zigbee, & NFC
Other types of networks: Bluetooth, Zigbee, & NFCDilum Bandara
 
Near Field Communication (NFC) technology
Near Field Communication (NFC) technologyNear Field Communication (NFC) technology
Near Field Communication (NFC) technologyIshtdeep Hora
 
how does smart phone works?
how does smart phone works?how does smart phone works?
how does smart phone works?Sakshi Bhargava
 
Near Field Communication (NFC)
Near Field Communication (NFC)Near Field Communication (NFC)
Near Field Communication (NFC)deepak171991
 
Near field communication(NFC)
Near field communication(NFC)Near field communication(NFC)
Near field communication(NFC)divyakalra200
 
Near Field Communication (NFC)
Near Field Communication (NFC)Near Field Communication (NFC)
Near Field Communication (NFC)Tejasvi Kurusetti
 
NFC documation
NFC documationNFC documation
NFC documationSaiprasad
 
NFC Technology
NFC TechnologyNFC Technology
NFC TechnologyNeha Singh
 

What's hot (20)

NEAR FIELD COMMUNICATION (NFC)
NEAR FIELD COMMUNICATION (NFC)NEAR FIELD COMMUNICATION (NFC)
NEAR FIELD COMMUNICATION (NFC)
 
Near field communication
Near field communicationNear field communication
Near field communication
 
NEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATIONNEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATION
 
Near-field communication
Near-field communicationNear-field communication
Near-field communication
 
NEAR FIELD COMMUNICATION (NFC)
NEAR FIELD COMMUNICATION (NFC)NEAR FIELD COMMUNICATION (NFC)
NEAR FIELD COMMUNICATION (NFC)
 
10.1
10.110.1
10.1
 
Near Field Communication (NFC) by Logesh
Near Field Communication (NFC) by LogeshNear Field Communication (NFC) by Logesh
Near Field Communication (NFC) by Logesh
 
LALIT NFC
LALIT NFCLALIT NFC
LALIT NFC
 
Iot
IotIot
Iot
 
Other types of networks: Bluetooth, Zigbee, & NFC
Other types of networks: Bluetooth, Zigbee, & NFCOther types of networks: Bluetooth, Zigbee, & NFC
Other types of networks: Bluetooth, Zigbee, & NFC
 
Near Field Communication (NFC) technology
Near Field Communication (NFC) technologyNear Field Communication (NFC) technology
Near Field Communication (NFC) technology
 
how does smart phone works?
how does smart phone works?how does smart phone works?
how does smart phone works?
 
nfc report file
nfc report filenfc report file
nfc report file
 
Near field communication ppt
Near field communication pptNear field communication ppt
Near field communication ppt
 
Nfc
NfcNfc
Nfc
 
Near Field Communication (NFC)
Near Field Communication (NFC)Near Field Communication (NFC)
Near Field Communication (NFC)
 
Near field communication(NFC)
Near field communication(NFC)Near field communication(NFC)
Near field communication(NFC)
 
Near Field Communication (NFC)
Near Field Communication (NFC)Near Field Communication (NFC)
Near Field Communication (NFC)
 
NFC documation
NFC documationNFC documation
NFC documation
 
NFC Technology
NFC TechnologyNFC Technology
NFC Technology
 

Viewers also liked

NFC for the Real World
NFC for the Real WorldNFC for the Real World
NFC for the Real WorldRobert Labancz
 
NFC technical presentation
NFC technical presentationNFC technical presentation
NFC technical presentationAkshat Rohatgi
 
NFC - Near Field Communication
NFC - Near Field CommunicationNFC - Near Field Communication
NFC - Near Field CommunicationSalomon Thomas
 
Near field communication
Near field communicationNear field communication
Near field communicationSanchit Chopra
 
2008 07 - ss - near field communication
2008 07 - ss - near field communication2008 07 - ss - near field communication
2008 07 - ss - near field communicationBoni
 
Nfc forum 14_feb07_press_and_analyst_briefing_slides
Nfc forum 14_feb07_press_and_analyst_briefing_slidesNfc forum 14_feb07_press_and_analyst_briefing_slides
Nfc forum 14_feb07_press_and_analyst_briefing_slidesBabu Kumar
 
NFC - quick primer
NFC - quick primerNFC - quick primer
NFC - quick primeramsanjeev
 
Near field communication
Near field communicationNear field communication
Near field communicationVaibhav Chandak
 
Near field communication
Near field communicationNear field communication
Near field communicationNithin Krishna
 
OPTIMOS Interoperability Event - Introduction to the Interoperability Initiative
OPTIMOS Interoperability Event - Introduction to the Interoperability InitiativeOPTIMOS Interoperability Event - Introduction to the Interoperability Initiative
OPTIMOS Interoperability Event - Introduction to the Interoperability InitiativeNFC Forum
 
NEAR FIELD COMMUNICATION (NFC)
NEAR FIELD COMMUNICATION (NFC)NEAR FIELD COMMUNICATION (NFC)
NEAR FIELD COMMUNICATION (NFC)mahima28
 
Introduction to the Interoperability Initiative
Introduction to the Interoperability InitiativeIntroduction to the Interoperability Initiative
Introduction to the Interoperability InitiativeNFC Forum
 
Transit Ticketing and Fare Collection Conference - Introduction to the Intero...
Transit Ticketing and Fare Collection Conference - Introduction to the Intero...Transit Ticketing and Fare Collection Conference - Introduction to the Intero...
Transit Ticketing and Fare Collection Conference - Introduction to the Intero...NFC Forum
 

Viewers also liked (20)

NFC for the Real World
NFC for the Real WorldNFC for the Real World
NFC for the Real World
 
NFC technical presentation
NFC technical presentationNFC technical presentation
NFC technical presentation
 
It nfc presentation
It nfc presentationIt nfc presentation
It nfc presentation
 
NFC - Near Field Communication
NFC - Near Field CommunicationNFC - Near Field Communication
NFC - Near Field Communication
 
Near field communication
Near field communicationNear field communication
Near field communication
 
2008 07 - ss - near field communication
2008 07 - ss - near field communication2008 07 - ss - near field communication
2008 07 - ss - near field communication
 
Nfc forum 14_feb07_press_and_analyst_briefing_slides
Nfc forum 14_feb07_press_and_analyst_briefing_slidesNfc forum 14_feb07_press_and_analyst_briefing_slides
Nfc forum 14_feb07_press_and_analyst_briefing_slides
 
Bluetooth Slides
Bluetooth SlidesBluetooth Slides
Bluetooth Slides
 
NFC - quick primer
NFC - quick primerNFC - quick primer
NFC - quick primer
 
Near field communication
Near field communicationNear field communication
Near field communication
 
Near field communication
Near field communicationNear field communication
Near field communication
 
OPTIMOS Interoperability Event - Introduction to the Interoperability Initiative
OPTIMOS Interoperability Event - Introduction to the Interoperability InitiativeOPTIMOS Interoperability Event - Introduction to the Interoperability Initiative
OPTIMOS Interoperability Event - Introduction to the Interoperability Initiative
 
NEAR FIELD COMMUNICATION (NFC)
NEAR FIELD COMMUNICATION (NFC)NEAR FIELD COMMUNICATION (NFC)
NEAR FIELD COMMUNICATION (NFC)
 
Introduction to the Interoperability Initiative
Introduction to the Interoperability InitiativeIntroduction to the Interoperability Initiative
Introduction to the Interoperability Initiative
 
Transit Ticketing and Fare Collection Conference - Introduction to the Intero...
Transit Ticketing and Fare Collection Conference - Introduction to the Intero...Transit Ticketing and Fare Collection Conference - Introduction to the Intero...
Transit Ticketing and Fare Collection Conference - Introduction to the Intero...
 
Near field communication
Near field communicationNear field communication
Near field communication
 
NFC
NFCNFC
NFC
 
Nfc
NfcNfc
Nfc
 
Project
ProjectProject
Project
 
NFC Basic Concepts
NFC Basic ConceptsNFC Basic Concepts
NFC Basic Concepts
 

Similar to 2008 02 - ecma international nfc white paper

Similar to 2008 02 - ecma international nfc white paper (20)

182 185
182 185182 185
182 185
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Chapter 1 pdf
Chapter 1 pdfChapter 1 pdf
Chapter 1 pdf
 
COMPUTER NETWORKING.pptx
COMPUTER NETWORKING.pptxCOMPUTER NETWORKING.pptx
COMPUTER NETWORKING.pptx
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
AUTOMATED TOLL COLLECTION
AUTOMATED TOLL COLLECTIONAUTOMATED TOLL COLLECTION
AUTOMATED TOLL COLLECTION
 
IOT Lecture 6.pdf
IOT Lecture 6.pdfIOT Lecture 6.pdf
IOT Lecture 6.pdf
 
IOT Lecture 6.pptx
IOT Lecture 6.pptxIOT Lecture 6.pptx
IOT Lecture 6.pptx
 
COMPARISON OF SHORT RANGE WIRELESS NETWORKS (PAN’ s)
COMPARISON OF SHORT RANGE WIRELESS NETWORKS (PAN’ s) COMPARISON OF SHORT RANGE WIRELESS NETWORKS (PAN’ s)
COMPARISON OF SHORT RANGE WIRELESS NETWORKS (PAN’ s)
 
Cell phone based automation systems
Cell phone based automation systemsCell phone based automation systems
Cell phone based automation systems
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Bluetooth paper (IEEE)
Bluetooth paper (IEEE)Bluetooth paper (IEEE)
Bluetooth paper (IEEE)
 
Bluetooth paper presentation ieee
Bluetooth paper presentation ieee Bluetooth paper presentation ieee
Bluetooth paper presentation ieee
 
Security in NFC
Security in NFCSecurity in NFC
Security in NFC
 
NFC TECHNOLOGY
NFC TECHNOLOGYNFC TECHNOLOGY
NFC TECHNOLOGY
 
siddharth bt ppt.pptx
siddharth bt ppt.pptxsiddharth bt ppt.pptx
siddharth bt ppt.pptx
 
Bluetooth Based Smart Sensor Network By SAIKIRAN PANJALA
Bluetooth Based Smart Sensor Network By SAIKIRAN PANJALABluetooth Based Smart Sensor Network By SAIKIRAN PANJALA
Bluetooth Based Smart Sensor Network By SAIKIRAN PANJALA
 

More from Boni

beacon summit berlin, boni presentation about mall solution, merchant app, an...
beacon summit berlin, boni presentation about mall solution, merchant app, an...beacon summit berlin, boni presentation about mall solution, merchant app, an...
beacon summit berlin, boni presentation about mall solution, merchant app, an...Boni
 
Boni
BoniBoni
BoniBoni
 
Webinar presentation-for-web
Webinar presentation-for-webWebinar presentation-for-web
Webinar presentation-for-webBoni
 
Epc mobile payments whitepaper
Epc mobile payments whitepaperEpc mobile payments whitepaper
Epc mobile payments whitepaperBoni
 
Mobile learning transforming the delivery of education and training
Mobile learning transforming the delivery of education and trainingMobile learning transforming the delivery of education and training
Mobile learning transforming the delivery of education and trainingBoni
 
Mobile phone - The new way to pay
Mobile phone - The new way to payMobile phone - The new way to pay
Mobile phone - The new way to payBoni
 
Mobile Money Definitions
Mobile Money DefinitionsMobile Money Definitions
Mobile Money DefinitionsBoni
 
contactless mobile payments
contactless mobile paymentscontactless mobile payments
contactless mobile paymentsBoni
 
The unwired continent - africas mobile success story
The unwired continent - africas mobile success storyThe unwired continent - africas mobile success story
The unwired continent - africas mobile success storyBoni
 
Role of icts as enabler for agriculture and small scale farmers
Role of icts as enabler for agriculture and small scale farmersRole of icts as enabler for agriculture and small scale farmers
Role of icts as enabler for agriculture and small scale farmersBoni
 
Organic business guide developing sustainable value chains with smallholders
Organic business guide   developing sustainable value chains with smallholdersOrganic business guide   developing sustainable value chains with smallholders
Organic business guide developing sustainable value chains with smallholdersBoni
 
Livelihood changes enabled by mobile phones the case of tanzanian fishermen
Livelihood changes enabled by mobile phones   the case of tanzanian fishermenLivelihood changes enabled by mobile phones   the case of tanzanian fishermen
Livelihood changes enabled by mobile phones the case of tanzanian fishermenBoni
 
Inventory of innovative farmer advisory services using ic ts
Inventory of innovative farmer advisory services using ic tsInventory of innovative farmer advisory services using ic ts
Inventory of innovative farmer advisory services using ic tsBoni
 
E agriculture - a definition and profile of its application
E agriculture - a definition and profile of its applicationE agriculture - a definition and profile of its application
E agriculture - a definition and profile of its applicationBoni
 
Do sustainable livelihoods approaches have a positive impact of the rural poo...
Do sustainable livelihoods approaches have a positive impact of the rural poo...Do sustainable livelihoods approaches have a positive impact of the rural poo...
Do sustainable livelihoods approaches have a positive impact of the rural poo...Boni
 
smart card alliance - mobile payment business model research report on stakeh...
smart card alliance - mobile payment business model research report on stakeh...smart card alliance - mobile payment business model research report on stakeh...
smart card alliance - mobile payment business model research report on stakeh...Boni
 
near field interactions with the internet of things
near field interactions with the internet of thingsnear field interactions with the internet of things
near field interactions with the internet of thingsBoni
 
contactless commerce enables a world beyond payment cards
contactless commerce enables a world beyond payment cardscontactless commerce enables a world beyond payment cards
contactless commerce enables a world beyond payment cardsBoni
 
a manifesto for networked objects — cohabiting with pigeons, arphids and aibo...
a manifesto for networked objects — cohabiting with pigeons, arphids and aibo...a manifesto for networked objects — cohabiting with pigeons, arphids and aibo...
a manifesto for networked objects — cohabiting with pigeons, arphids and aibo...Boni
 
bell dourish-yesterdays tomorrows - notes on ubiuitous computings dominant vi...
bell dourish-yesterdays tomorrows - notes on ubiuitous computings dominant vi...bell dourish-yesterdays tomorrows - notes on ubiuitous computings dominant vi...
bell dourish-yesterdays tomorrows - notes on ubiuitous computings dominant vi...Boni
 

More from Boni (20)

beacon summit berlin, boni presentation about mall solution, merchant app, an...
beacon summit berlin, boni presentation about mall solution, merchant app, an...beacon summit berlin, boni presentation about mall solution, merchant app, an...
beacon summit berlin, boni presentation about mall solution, merchant app, an...
 
Boni
BoniBoni
Boni
 
Webinar presentation-for-web
Webinar presentation-for-webWebinar presentation-for-web
Webinar presentation-for-web
 
Epc mobile payments whitepaper
Epc mobile payments whitepaperEpc mobile payments whitepaper
Epc mobile payments whitepaper
 
Mobile learning transforming the delivery of education and training
Mobile learning transforming the delivery of education and trainingMobile learning transforming the delivery of education and training
Mobile learning transforming the delivery of education and training
 
Mobile phone - The new way to pay
Mobile phone - The new way to payMobile phone - The new way to pay
Mobile phone - The new way to pay
 
Mobile Money Definitions
Mobile Money DefinitionsMobile Money Definitions
Mobile Money Definitions
 
contactless mobile payments
contactless mobile paymentscontactless mobile payments
contactless mobile payments
 
The unwired continent - africas mobile success story
The unwired continent - africas mobile success storyThe unwired continent - africas mobile success story
The unwired continent - africas mobile success story
 
Role of icts as enabler for agriculture and small scale farmers
Role of icts as enabler for agriculture and small scale farmersRole of icts as enabler for agriculture and small scale farmers
Role of icts as enabler for agriculture and small scale farmers
 
Organic business guide developing sustainable value chains with smallholders
Organic business guide   developing sustainable value chains with smallholdersOrganic business guide   developing sustainable value chains with smallholders
Organic business guide developing sustainable value chains with smallholders
 
Livelihood changes enabled by mobile phones the case of tanzanian fishermen
Livelihood changes enabled by mobile phones   the case of tanzanian fishermenLivelihood changes enabled by mobile phones   the case of tanzanian fishermen
Livelihood changes enabled by mobile phones the case of tanzanian fishermen
 
Inventory of innovative farmer advisory services using ic ts
Inventory of innovative farmer advisory services using ic tsInventory of innovative farmer advisory services using ic ts
Inventory of innovative farmer advisory services using ic ts
 
E agriculture - a definition and profile of its application
E agriculture - a definition and profile of its applicationE agriculture - a definition and profile of its application
E agriculture - a definition and profile of its application
 
Do sustainable livelihoods approaches have a positive impact of the rural poo...
Do sustainable livelihoods approaches have a positive impact of the rural poo...Do sustainable livelihoods approaches have a positive impact of the rural poo...
Do sustainable livelihoods approaches have a positive impact of the rural poo...
 
smart card alliance - mobile payment business model research report on stakeh...
smart card alliance - mobile payment business model research report on stakeh...smart card alliance - mobile payment business model research report on stakeh...
smart card alliance - mobile payment business model research report on stakeh...
 
near field interactions with the internet of things
near field interactions with the internet of thingsnear field interactions with the internet of things
near field interactions with the internet of things
 
contactless commerce enables a world beyond payment cards
contactless commerce enables a world beyond payment cardscontactless commerce enables a world beyond payment cards
contactless commerce enables a world beyond payment cards
 
a manifesto for networked objects — cohabiting with pigeons, arphids and aibo...
a manifesto for networked objects — cohabiting with pigeons, arphids and aibo...a manifesto for networked objects — cohabiting with pigeons, arphids and aibo...
a manifesto for networked objects — cohabiting with pigeons, arphids and aibo...
 
bell dourish-yesterdays tomorrows - notes on ubiuitous computings dominant vi...
bell dourish-yesterdays tomorrows - notes on ubiuitous computings dominant vi...bell dourish-yesterdays tomorrows - notes on ubiuitous computings dominant vi...
bell dourish-yesterdays tomorrows - notes on ubiuitous computings dominant vi...
 

Recently uploaded

(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 

Recently uploaded (20)

(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 

2008 02 - ecma international nfc white paper

  • 2. Table of contents 1 Introduction 1 2 The stage 1 2.1 Transfer of content 1 2.2 Set up of communication for other protocols 4 3 The protocol 5 4 Unique features 6 5 Related standards and references 7 5.1 Other references 7 - ii -
  • 3. 1 Introduction The current state of the consumer electronics can be characterized by moving from a single purpose device to multifunctional devices and by moving from an isolated device to networked devices. In this last respect, it is important that people do not face the complexities of setting up network connections between devices. Cumbersome network settings can possibly be dealt with in the computer world but certainly not in the consumer electronics world. This is the main driver for the Near Field Communication Interface and Protocol (NFCIP-1), which is targeted towards the consumer electronics users that will be able to use the secure means of communication between various devices without exerting much intellectual effort in configuring their “network”. The concept is strikingly simple: in order to make two devices communicate, bring them together or make them touch. This will engage the NFCIP-1 wireless devices’ interfaces and configure them to link up in a peer-to-peer network. Once the configuration data has been exchanged using NFC, the devices can set up and continue communication for longer range and faster protocols like Bluetooth or Wireless Ethernet (WiFi). 2 The stage Let’s start off with some use cases of NFC devices to illustrate the concepts. The examples presented here are for direct data transfer between devices and for communication set up in conjunction with another wireless protocol. 2.1 Transfer of content Let’s say you went somewhere on a trip and you took lots of pictures with your PDA with a built-in camera and you want to show them to your friends on a big screen TV. We take a picture… And show it on the TV by touching the “hot spot” of the TV with the PDA.
  • 4. Let’s say you want to see the world from the point of view of our Aibo here: Here is the Aibo: And here is what it sees: So all we need to do is to give the Aibo a command to take a picture and transfer it to the Clie by touching the Aibo:
  • 5. Let’s take another example. If you have a PC and a mobile phone equipped with NFC, you can easily download a new game from a website directly onto this mobile phone for your kid using NFC: And this same principle will work for any sort of data transfer between two pieces of equipment when they support NFC. There is no need to set up communication manually provided that the applications are capable of handling the communication. This opens countless possibilities for content transfer and management of personal data stored within different types of consumer electronics equipment.
  • 6. 2.2 Set up of communication for other protocols Imagine that you would like to transfer a large amount of information between two computers – a desktop and a laptop. Let’s say you want to transfer a presentation file. Using NFC may be slow and we decide to use something with more bandwidth. Let’s say for this example we use Bluetooth. Now, to set up Bluetooth communication between two computers we would need to set it up manually with a password to protect the communication. Using NFC we can set up this communication by simply touching the two computers: 1 2 Touch the computers at the 1 “hot spot”. They will open a connection to exchange the parameters of the Bluetooth communication and establish a secret key. The Bluetooth communication is established as a second step of this procedure without any human interference using the exchanged parameters. 2 Bluetooth Now the computers can be put away from each other but the communication continues using the session of Bluetooth that was established previously. The same procedure can be used to establish a wireless (Bluetooth, WiFi etc.) link between two pieces of computer or consumer electronics equipment like TVs, laptop computers, PDAs, mobile phones and so on.
  • 7. 3 The protocol The protocol is based on a wireless interface. There are always two parties to the communication; hence the protocol is also known as peer-to-peer communication protocol. The protocol establishes wireless network connections between network appliances and consumer electronics devices. The interfaces operate in the unregulated RF band of 13.56 MHz. This means that no restrictions are applied and no licenses are required for the use of NFC devices in this RF band. Of course, each country imposes certain limitations on the electromagnetic emissions in this RF band. The limitations mean that in practice the distance at which the devices can connect to each other is restricted and this distance may vary from country to country. Generally speaking, we consider the operating distances of 0~20 cm. As is often the case with the devices sharing a single RF band, the communication is half-duplex. The devices implement the “listen before talk” policy – any device must first listen on the carrier and start transmitting a signal only if no other device can be detected transmitting. NFC protocol distinguishes between the Initiator and the Target of the communication. Any device may be either an Initiator or a Target. The Initiator, as follows from the name, is the device that initiates and controls the exchange of data. The Target is the device that answers the request from the Initiator. NFC protocol also distinguishes between two modes of operation: Active mode and Passive mode. All devices support both communication modes. The distinction is as follows: In the Active mode of communication both devices generate their own RF field to carry the data. In the Passive mode of communication only one device generates the RF field while the other device uses load modulation to transfer the data. The protocol specifies that the Initiator is the device responsible to generate the RF field. The application sets the initial communication speed at 106, 212 or 424 kbit/s. Subsequently the application and/or the communication environment may require speed adaptation, which can be done during communication. NFCIP-1 uses different modulation and bit encoding schemes depending on the speed. While establishing the communication, the Initiator starts the communication in a particular mode at a particular speed. The Target determines the current speed and the associated low-level protocol automatically and answers accordingly. The communication is terminated either on the command from the application or when devices move out of range.
  • 8. 4 Unique features What makes the communication between the devices so easy is that the NFC protocol provides some features not found in other general-purpose protocols. First of all, it is a very short-range protocol. It supports communication at distances measured in centimetres. The devices have to be literally almost touched to establish the link between them. This has two important consequences: 1) The devices can rely on the protocol to be inherently secured 1 since the devices must be placed very close to each other. It is easy to control whether the two devices communicate by simply placing them next to each other or keeping them apart. 2) The procedure of establishing the protocol is inherently familiar to people: you want something to communicate – touch it. This allows for the establishment of the network connection between the devices be completely automated and happen in a transparent manner. The whole process feels then like if devices recognize each other by touch and connect to each other once touched. Another important feature of this protocol is the support for the passive mode of communication. This is very important for the battery-powered devices since they have to place conservation of the energy as the first priority. The protocol allows such a device, like a mobile phone, to operate in a power-saving mode – the passive mode of NFC communication. This mode does not require both devices to generate the RF field and allows the complete communication to be powered from one side only. Of course, the device itself will still need to be powered internally but it does not have to “waste” the battery on powering the RF communication interface. Also, the protocol can be used easily in conjunction with other protocols to select devices and automate connection set-up. As was demonstrated in the examples of use above, the parameters of other wireless protocols can be exchanged allowing for automated set-up of other, longer-range, connections. The difficulty in using long-range protocols like Bluetooth or Wireless Ethernet is in selecting the correct device out of the multitude of devices in the range and providing the right parameters to the connection. Using NFC the whole procedure is simplified to a mere touch of one device to another. The NFC protocol is also compatible with the widely used contactless smart card protocols FeliCa ™ and Mifare ™. The NFC devices are able to work with the smart cards and smart card readers conforming to these protocols in a seamless manner. Not only a card may be viewed with an NFC device but also an NFC device can be used instead of a card. 1 Here we refer to the avoidance of unintended connections rather than protection against malicious intent. For protection against eavesdropping or connections with malicious intent traditional security measures should be implemented at the network protocol layer and above.
  • 9. 5 Related standards and references The NFC protocol requires standardisation in order to be accepted fully by the industry and provide for compatibility between the devices produced by different manufacturers. The standardisation also means keeping the specification open and accessible for everybody, facilitating the analysis of the protocol and adaptation of the devices for various needs. The work on standardisation is done within Ecma International, a standards organisation with a long history of successful projects. The standards are published by Ecma International and, consequently, become also ISO/IEC and ETSI standards. Sony Corporation and Royal Philips Electronics are the founders of this work. The group working on the standards within Ecma is growing constantly; more companies are joining the effort to enhance the NFC standards. Ecma invites all interested parties to join the working group. Standards published as of December 2003: 1) ECMA-340 “Near Field Communication – Interface and Protocol (NFCIP-1)” 2) ISO/IEC 18092 (ISO/IEC JTC1 adopted ECMA-340 under their fast track procedure); 3) ECMA-352 “Near Field Communication Interface and Protocol – 2 (NFCIP-2)”. 5.1 Other references 1) Ecma International: http://www.ecma-international.org 2) Press release regarding NFC standardisation http://www.ecma-international.org/news/ECMA- 340-NFCIP-1.htm