This document summarizes news in embedded systems security for June 2011. It highlights developments in near field communication (NFC) technology, including partnerships between mobile operators and manufacturers for NFC-enabled phones. It also mentions smart meters and grid updates, new authentication IC providers, and upcoming security events in NFC and other areas. Key companies and organizations mentioned include NXP, Sony Ericsson, RIM, HP, Inside Secure, ZTE, Infineon, Broadcom, and SIM Alliance.
This document provides instructions for building a Windows Phone 8 application that uses Near Field Communication (NFC) functionality. It discusses initializing the NFC device and speech recognition capabilities. It also explains how to create an NDEF message containing a text record when a voice command is recognized, and how to write that message to an NFC tag. When the tag is tapped, the application launches and speaks the text aloud. The document recommends using an open-source NDEF library and provides code samples to implement these NFC features.
NFC stands for Near Field Communication.
NFC is an extension of Radio Frequency IDentifier popularly known as RFID.
NFC is a short range high frequency wireless communication technology.
NFC was founded in the year 2004 by NOKIA, SONY and PHILIPS.
Near field communication (NFC) allows short-range wireless communication between devices when they are brought within close proximity of a few inches. It was established as a standard in 2004 and the first NFC phone was released in 2006. NFC operates at 13.56 MHz and has a theoretical range of about 4 cm. It can be used to transfer contact information, URLs, initiate Bluetooth connections, and for contactless payments. While NFC provides convenience, its adoption has been limited due to lack of agreement between companies and some security concerns exist. Alternatives to NFC include digital wallets that are accessible from multiple devices.
Near Field Communication (NFC) allows contactless communication between devices like smartphones or tablets when they are within a few centimeters of each other. NFC uses radio signals to establish short-range wireless connections and can operate in either active or passive mode. Some common uses of NFC include mobile payments through services like Google Wallet, connecting devices via Bluetooth and Wi-Fi, social networking, and identifying documents. While NFC has a short range, combining it with other radio technologies can increase its applications.
This document discusses NFC and BLE technologies and their uses for automating daily life and biohacking. It defines NFC and how it works, providing examples of common NFC tag types and their memory sizes. Risks of biohacking are noted. The document also demonstrates how to enable and use NFC in mobile apps to read plain text tags and manually create NFC records to write tags. Out-of-the-box uses include controlling lights, unlocking devices, and biohacking applications like embedding chips for access. More information and demos are provided in online resources.
Near Field Communication (NFC) is a short-range wireless technology that allows data exchange between devices over 10cm. The document discusses NFC technology, uses, tag types, communication modes, and its role in mobile commerce. It also examines standards, actors like TSMs, and the future potential of NFC in areas like mobile payments, ticketing, and as an alternative to physical payment cards.
An Electronic Ticketing System based on Near Field Communication for Concerts...Hussain Shah
NFC allows for short-range wireless communication between electronic devices like smartphones and payment terminals. It enables contactless transactions where users simply tap or touch their device to complete payments or data transfers. While NFC adoption has been limited, standards coordination by groups like the NFC Forum aim to address this by ensuring interoperability. NFC provides benefits like intuitive interactions, versatility across industries, and built-in security due to its short operating range. However, challenges remain around mass adoption including the need for industry collaboration between different players in the mobile ecosystem.
This document summarizes news in embedded systems security for June 2011. It highlights developments in near field communication (NFC) technology, including partnerships between mobile operators and manufacturers for NFC-enabled phones. It also mentions smart meters and grid updates, new authentication IC providers, and upcoming security events in NFC and other areas. Key companies and organizations mentioned include NXP, Sony Ericsson, RIM, HP, Inside Secure, ZTE, Infineon, Broadcom, and SIM Alliance.
This document provides instructions for building a Windows Phone 8 application that uses Near Field Communication (NFC) functionality. It discusses initializing the NFC device and speech recognition capabilities. It also explains how to create an NDEF message containing a text record when a voice command is recognized, and how to write that message to an NFC tag. When the tag is tapped, the application launches and speaks the text aloud. The document recommends using an open-source NDEF library and provides code samples to implement these NFC features.
NFC stands for Near Field Communication.
NFC is an extension of Radio Frequency IDentifier popularly known as RFID.
NFC is a short range high frequency wireless communication technology.
NFC was founded in the year 2004 by NOKIA, SONY and PHILIPS.
Near field communication (NFC) allows short-range wireless communication between devices when they are brought within close proximity of a few inches. It was established as a standard in 2004 and the first NFC phone was released in 2006. NFC operates at 13.56 MHz and has a theoretical range of about 4 cm. It can be used to transfer contact information, URLs, initiate Bluetooth connections, and for contactless payments. While NFC provides convenience, its adoption has been limited due to lack of agreement between companies and some security concerns exist. Alternatives to NFC include digital wallets that are accessible from multiple devices.
Near Field Communication (NFC) allows contactless communication between devices like smartphones or tablets when they are within a few centimeters of each other. NFC uses radio signals to establish short-range wireless connections and can operate in either active or passive mode. Some common uses of NFC include mobile payments through services like Google Wallet, connecting devices via Bluetooth and Wi-Fi, social networking, and identifying documents. While NFC has a short range, combining it with other radio technologies can increase its applications.
This document discusses NFC and BLE technologies and their uses for automating daily life and biohacking. It defines NFC and how it works, providing examples of common NFC tag types and their memory sizes. Risks of biohacking are noted. The document also demonstrates how to enable and use NFC in mobile apps to read plain text tags and manually create NFC records to write tags. Out-of-the-box uses include controlling lights, unlocking devices, and biohacking applications like embedding chips for access. More information and demos are provided in online resources.
Near Field Communication (NFC) is a short-range wireless technology that allows data exchange between devices over 10cm. The document discusses NFC technology, uses, tag types, communication modes, and its role in mobile commerce. It also examines standards, actors like TSMs, and the future potential of NFC in areas like mobile payments, ticketing, and as an alternative to physical payment cards.
An Electronic Ticketing System based on Near Field Communication for Concerts...Hussain Shah
NFC allows for short-range wireless communication between electronic devices like smartphones and payment terminals. It enables contactless transactions where users simply tap or touch their device to complete payments or data transfers. While NFC adoption has been limited, standards coordination by groups like the NFC Forum aim to address this by ensuring interoperability. NFC provides benefits like intuitive interactions, versatility across industries, and built-in security due to its short operating range. However, challenges remain around mass adoption including the need for industry collaboration between different players in the mobile ecosystem.
Designing low costs sensor system for the Internet of ThingsAndreas Schaller
The document discusses designing low-cost sensor systems for the Internet of Things (IOT). It covers various IOT application areas like future internet, energy efficient buildings, and factories of the future. Short range wireless technologies like Bluetooth, WiFi, GPS, and RFID are discussed for system integration. Example use cases presented include ambient assisted living and a "Mildew Watch Dog" sensor label for detecting moisture. The presentation aims to provide an overview on leveraging technologies like flexible substrates, printed electronics, and energy harvesting to create low-cost sensor solutions for the IOT.
Overview of NXP MIFARE product portfolio. Product families include: MIFARE Classic, MIFARE Plus, MIFARE DESFire and MIFARE Ultralight. Details the evolution and innovation of the various product families are given.
NFC Development with Qt - v2.2.0 (5. November 2012)Andreas Jakl
Learn developing Near Field Communication (NFC) apps for Nokia's Symbian and MeeGo phones with step-by-step tutorials!
The three development options Qt, Symbian native and Java ME are outlined. A more detailed explanation shows the Qt Mobility 1.2 APIs to create modern NFC applications for smartphones.
In the final part, step-by-step hands-on tutorials walk you through developing your first two NFC apps. The first demo extends an example from the Qt SDK with reading & writing both URI and text NDEF records to create new sticky notes on the virtual corkboards visible on the screen. The second demo uses the LLCP protocol to create a peer-to-peer chat application between two NFC Forum compatible devices.
NFC is an open standard technology that allows short-range wireless communication between devices like phones and readers. It operates at 13.56 MHz and supports data transfer rates up to 424 kbit/s. NFC operates in both passive and active communication modes. The NFC Forum has defined the NFC Data Exchange Format (NDEF) for storing and transporting various data types. Many trials of NFC payment and ticketing have taken place across Europe, Asia, North America, and Australia involving banks, mobile operators, and transit authorities.
The document discusses emerging technologies that can be applied to logistics, including QR codes, NFC, WiFi, Bluetooth, and mobile applications. It provides examples of how these technologies are currently used in areas like ticketing, payments, inventory tracking, and asset management. It also examines factors like power consumption, size, and data flow that must be considered when determining the best technology solution for a given logistics problem.
- Ganesh is seeking an opportunity to utilize his 3+ years of experience in mobile development and testing, particularly with Android applications and NFC technologies.
- He has a Bachelor's degree in Electronics and Communications and has expertise in languages like C and Python.
- Some of his key projects involved designing and developing Android applications for testing NFC controllers and automating test cases using Python.
RFID2015_NFC-WISP_public(delete Disney research)Yi (Eve) Zhao
This document describes NFC-WISP, a sensing and computationally enhanced near-field RFID platform. NFC-WISP allows researchers to explore new applications of near-field RFID before expensive custom integrated circuit design. It is a fully programmable, passive or semi-passive device that can harvest power wirelessly and integrate peripherals and sensors. Examples applications discussed include using NFC-WISP as a secondary smartphone display or for cold chain monitoring with temperature and motion logging.
Koichi Tagawa, SONY; Chairman, NFC Forum
Chairman Koichi Tagawa-san kicks of the NFC Forum Spotlight for Developers in San Francisco with an update on the NFC industry.
Near Field Communication (NFC) is a wireless technology that allows data exchange between devices over short distances. It was standardized in 2006 and uses electromagnetic fields for communication instead of radio waves like Bluetooth or Wi-Fi. Major applications of NFC include contactless payments, ticketing, data sharing, and multi-player gaming. While common in Asia and Europe, adoption is growing in the US as well with integration into mobile platforms like Android and inclusion in many smartphones. Security is ensured through encryption of data exchanged between NFC devices.
The document analyzes patents related to wireless communication technologies including 4G LTE, WiFi, WPAN, NFC, RFID, and mobile IoT. It identifies the most prolific patent holders for each technology by analyzing patents granted by the USPTO and their essentiality to relevant standards. For 4G LTE, LG has the most patents followed by Samsung and Qualcomm. For WiFi, Marvell has the most patents followed by Intel and Samsung. For other technologies the top patent holders include Broadcom, Sony, Round Rock Research, and Nokia.
Civintec is an OEM/ODM manufacturer specialized in NFC, contactless smart cards, and biometric readers. They export their products under OEM or their own brand to over 100 countries. Civintec is committed to providing innovative, high quality smart card and security solutions for access control, time attendance, payments, and other applications. They have certifications like ISO9001 and partner with other technology leaders. Civintec provides a full turnkey solution from product design to manufacturing to software.
The document describes the StoLPaN project which aims to build a European NFC ecosystem. It discusses the key points of NFC including operating distance and data exchange rates. It outlines the project structure including developing a handset independent mobile host application to enable multiple NFC services on a phone. The objectives are to facilitate service definition, OTA requirements and leverage NFC to enhance business procedures.
New use cases thanks to adding crypto to RFID tagsIhar Bayarenka
Presentation from technology seminar in Jakarta, Feb 2017. Describing new use cases that are made possible when cryptographic authentication is added to long range RFID tags in HF and UHF frequency bands (ICODE DNA and UCODE DNA, respectively)
This document provides an overview of NFC on Nokia & Symbian platforms for developers. It discusses Nokia's developer offering and positioning in mobile platforms. The document then details the NFC architecture in Symbian, including the various API options for application development. It also covers distributing applications through Nokia's channels.
ASK provides contactless terminals and readers for various industries including transportation, access control, and banking. Their product lines include OEM couplers, desktop readers, contactless modules, and contactless terminals. ASK has been developing contactless technology expertise since 1997 and their readers are recognized for top performance and universal card acceptance.
NFC security guard systems allow tracking of security guard routes using NFC technology. Guards scan NFC tags at stations to log their locations and times. This allows monitoring of guard routes. The system was tested tracking guards at a historic waterfront area in Malta. A second project involved using similar NFC tracking for employees at a large brewery in Malta.
Functional phones are needed for lone workers to improve safety. Phones used should have GPS, an alarm button, long battery life, waterproofing and shock resistance. An example phone meeting these needs was presented. Applications could include GPS tracking, automated check-ins, and triggering an audio alarm if no motion is detected for 10 minutes to request help.
Near Field Communication (NFC) is a short-range wireless technology that allows data exchange between devices within 10 cm of each other. There are two modes of NFC - active mode where both devices generate an electromagnetic field to exchange data, and passive mode where one device is active and powers the other. NFC tags come in four types that vary in memory size, read/write capabilities, and communication speeds. Common applications of NFC include mobile payments, data transfer between devices like photos, and electronic ticketing for transportation or events. The future of NFC is promising as major tech companies like Apple and Microsoft plan to incorporate it into their mobile devices, expanding its use for small monetary transactions and other applications.
Near field communication and RFID - opening for new businessJosef Noll
This document provides an agenda and slides for an RFID and NFC tutorial given by Josef Noll. The agenda covers RFID basics like frequencies and applications. It also discusses NFC technology and scenarios. The slides define RFID and its components like tags and readers. They describe communication modes and provide examples of RFID applications in areas like sports, payment systems, and supply chain management. Potential security issues with RFID like cloning and uncontrolled surveillance are also addressed.
Near Field Communication (NFC) is a short-range wireless technology that allows data exchange between devices within close proximity. NFC operates at 13.56 MHz and has a maximum range of about 4 cm. It can be used for contactless payments, data sharing, and connecting electronic devices like accessing a building. NFC provides security through its very short transmission range which requires devices to be in close physical contact to communicate, preventing unwanted access. It also uses protocols that prevent collisions when multiple devices transmit simultaneously.
Designing low costs sensor system for the Internet of ThingsAndreas Schaller
The document discusses designing low-cost sensor systems for the Internet of Things (IOT). It covers various IOT application areas like future internet, energy efficient buildings, and factories of the future. Short range wireless technologies like Bluetooth, WiFi, GPS, and RFID are discussed for system integration. Example use cases presented include ambient assisted living and a "Mildew Watch Dog" sensor label for detecting moisture. The presentation aims to provide an overview on leveraging technologies like flexible substrates, printed electronics, and energy harvesting to create low-cost sensor solutions for the IOT.
Overview of NXP MIFARE product portfolio. Product families include: MIFARE Classic, MIFARE Plus, MIFARE DESFire and MIFARE Ultralight. Details the evolution and innovation of the various product families are given.
NFC Development with Qt - v2.2.0 (5. November 2012)Andreas Jakl
Learn developing Near Field Communication (NFC) apps for Nokia's Symbian and MeeGo phones with step-by-step tutorials!
The three development options Qt, Symbian native and Java ME are outlined. A more detailed explanation shows the Qt Mobility 1.2 APIs to create modern NFC applications for smartphones.
In the final part, step-by-step hands-on tutorials walk you through developing your first two NFC apps. The first demo extends an example from the Qt SDK with reading & writing both URI and text NDEF records to create new sticky notes on the virtual corkboards visible on the screen. The second demo uses the LLCP protocol to create a peer-to-peer chat application between two NFC Forum compatible devices.
NFC is an open standard technology that allows short-range wireless communication between devices like phones and readers. It operates at 13.56 MHz and supports data transfer rates up to 424 kbit/s. NFC operates in both passive and active communication modes. The NFC Forum has defined the NFC Data Exchange Format (NDEF) for storing and transporting various data types. Many trials of NFC payment and ticketing have taken place across Europe, Asia, North America, and Australia involving banks, mobile operators, and transit authorities.
The document discusses emerging technologies that can be applied to logistics, including QR codes, NFC, WiFi, Bluetooth, and mobile applications. It provides examples of how these technologies are currently used in areas like ticketing, payments, inventory tracking, and asset management. It also examines factors like power consumption, size, and data flow that must be considered when determining the best technology solution for a given logistics problem.
- Ganesh is seeking an opportunity to utilize his 3+ years of experience in mobile development and testing, particularly with Android applications and NFC technologies.
- He has a Bachelor's degree in Electronics and Communications and has expertise in languages like C and Python.
- Some of his key projects involved designing and developing Android applications for testing NFC controllers and automating test cases using Python.
RFID2015_NFC-WISP_public(delete Disney research)Yi (Eve) Zhao
This document describes NFC-WISP, a sensing and computationally enhanced near-field RFID platform. NFC-WISP allows researchers to explore new applications of near-field RFID before expensive custom integrated circuit design. It is a fully programmable, passive or semi-passive device that can harvest power wirelessly and integrate peripherals and sensors. Examples applications discussed include using NFC-WISP as a secondary smartphone display or for cold chain monitoring with temperature and motion logging.
Koichi Tagawa, SONY; Chairman, NFC Forum
Chairman Koichi Tagawa-san kicks of the NFC Forum Spotlight for Developers in San Francisco with an update on the NFC industry.
Near Field Communication (NFC) is a wireless technology that allows data exchange between devices over short distances. It was standardized in 2006 and uses electromagnetic fields for communication instead of radio waves like Bluetooth or Wi-Fi. Major applications of NFC include contactless payments, ticketing, data sharing, and multi-player gaming. While common in Asia and Europe, adoption is growing in the US as well with integration into mobile platforms like Android and inclusion in many smartphones. Security is ensured through encryption of data exchanged between NFC devices.
The document analyzes patents related to wireless communication technologies including 4G LTE, WiFi, WPAN, NFC, RFID, and mobile IoT. It identifies the most prolific patent holders for each technology by analyzing patents granted by the USPTO and their essentiality to relevant standards. For 4G LTE, LG has the most patents followed by Samsung and Qualcomm. For WiFi, Marvell has the most patents followed by Intel and Samsung. For other technologies the top patent holders include Broadcom, Sony, Round Rock Research, and Nokia.
Civintec is an OEM/ODM manufacturer specialized in NFC, contactless smart cards, and biometric readers. They export their products under OEM or their own brand to over 100 countries. Civintec is committed to providing innovative, high quality smart card and security solutions for access control, time attendance, payments, and other applications. They have certifications like ISO9001 and partner with other technology leaders. Civintec provides a full turnkey solution from product design to manufacturing to software.
The document describes the StoLPaN project which aims to build a European NFC ecosystem. It discusses the key points of NFC including operating distance and data exchange rates. It outlines the project structure including developing a handset independent mobile host application to enable multiple NFC services on a phone. The objectives are to facilitate service definition, OTA requirements and leverage NFC to enhance business procedures.
New use cases thanks to adding crypto to RFID tagsIhar Bayarenka
Presentation from technology seminar in Jakarta, Feb 2017. Describing new use cases that are made possible when cryptographic authentication is added to long range RFID tags in HF and UHF frequency bands (ICODE DNA and UCODE DNA, respectively)
This document provides an overview of NFC on Nokia & Symbian platforms for developers. It discusses Nokia's developer offering and positioning in mobile platforms. The document then details the NFC architecture in Symbian, including the various API options for application development. It also covers distributing applications through Nokia's channels.
ASK provides contactless terminals and readers for various industries including transportation, access control, and banking. Their product lines include OEM couplers, desktop readers, contactless modules, and contactless terminals. ASK has been developing contactless technology expertise since 1997 and their readers are recognized for top performance and universal card acceptance.
NFC security guard systems allow tracking of security guard routes using NFC technology. Guards scan NFC tags at stations to log their locations and times. This allows monitoring of guard routes. The system was tested tracking guards at a historic waterfront area in Malta. A second project involved using similar NFC tracking for employees at a large brewery in Malta.
Functional phones are needed for lone workers to improve safety. Phones used should have GPS, an alarm button, long battery life, waterproofing and shock resistance. An example phone meeting these needs was presented. Applications could include GPS tracking, automated check-ins, and triggering an audio alarm if no motion is detected for 10 minutes to request help.
Near Field Communication (NFC) is a short-range wireless technology that allows data exchange between devices within 10 cm of each other. There are two modes of NFC - active mode where both devices generate an electromagnetic field to exchange data, and passive mode where one device is active and powers the other. NFC tags come in four types that vary in memory size, read/write capabilities, and communication speeds. Common applications of NFC include mobile payments, data transfer between devices like photos, and electronic ticketing for transportation or events. The future of NFC is promising as major tech companies like Apple and Microsoft plan to incorporate it into their mobile devices, expanding its use for small monetary transactions and other applications.
Near field communication and RFID - opening for new businessJosef Noll
This document provides an agenda and slides for an RFID and NFC tutorial given by Josef Noll. The agenda covers RFID basics like frequencies and applications. It also discusses NFC technology and scenarios. The slides define RFID and its components like tags and readers. They describe communication modes and provide examples of RFID applications in areas like sports, payment systems, and supply chain management. Potential security issues with RFID like cloning and uncontrolled surveillance are also addressed.
Near Field Communication (NFC) is a short-range wireless technology that allows data exchange between devices within close proximity. NFC operates at 13.56 MHz and has a maximum range of about 4 cm. It can be used for contactless payments, data sharing, and connecting electronic devices like accessing a building. NFC provides security through its very short transmission range which requires devices to be in close physical contact to communicate, preventing unwanted access. It also uses protocols that prevent collisions when multiple devices transmit simultaneously.
NFC payment technology provides a solution to challenges faced by ice cream truck franchises from increased theft and customers preferring non-cash payments. The technology works by transferring data via radio frequency between an NFC chip and payment terminal. Major players in the NFC ecosystem include chip manufacturers, payment terminal vendors, and mobile wallet applications. NFC allows contactless payment for items like public transit fares and store purchases using a smartphone instead of cash or cards.
This document provides a summary of the NFC Standard Essential Patent Candidates Data 4Q 2014 report. The report identifies 124 issued US patents that are essential to NFC standards, including patents held by companies like Apple, Broadcom, Microsoft, Nokia, NXP and Qualcomm. The methodology involved searching patent databases for NFC-related patents issued through 4Q 2014 and categorizing them by standards specifications. The deliverable is an Excel file with information on the identified essential patent candidates.
[Presentation from June 2 Tap into NFC Showcase]
At the Tap into NFC Meetup in Shanghai on June 2, 2015, attendees learned about NFC technology and heard use-cases from local companies. Slide deck includes:
-NFC Everywhere: Creating new user experiences and enabling the Internet of Things, plus a glimpse at an NXP powered Shanghai “Smart City” implementation– James Zhu, NXP Semiconductors
-Lightning talks:
-Accelerating the “Time-to-Market” of your NFC product — Ping Huang, Keysight
-Speeding up NFC adoption with An Open Platform — Ching-Ting Huang, MediaTek
-Passively-operated NFC Solutions — Manop Thamsirianunt, Silicon Craft Technology
Get involved in or meet us at one of our upcoming events: http://nfc-forum.org/nfc-forum-events/
NFC in the automotive industry was the focus of the VISIONFC Automotive Summit, an NFC Forum event, that took place in Vienna, Austria. At this event stakeholders came together to talk about how NFC enhances the automotive consumer experience and discussed NFC automotive developments, market needs and requirements.
This presentation was delivered at the HCE+Tokenization Summit Amsterdam by Alexander Rensink, Vice Chairman of NFC Forum.
Presentation reviews:
- NFC and the Connected World
- Latest Market Developments
- HCE in Action
This document summarizes news related to embedded systems security for May 2011. It focuses on developments in near field communication (NFC) technology, smart meters and smart cards. Upcoming events highlighted include conferences on mobile payments, NFC payments, smart grids, and smart technologies. Key organizations announced partnerships and product releases involving NFC, smart meters, and security processors.
This document summarizes key NFC developments from January 2011. It describes OTI introducing a new NFC SIM and antenna device to support banking, transit and loyalty programs. It also mentions Visa partnering with Wireless Dynamics to bring contactless payments to iPhone, and several French cities piloting NFC deployments. The document lists upcoming NFC and related technology conferences in 2011.
Smartrac webinar tap and play December 2013Mikko Nikkanen
SMARTRAC / Mikko Nikkanen's presentation Tap and Play describes how NFC/ RFID technology will be effecting gaming industry and merchandise will be connected for ultimate gaming experience. Webinar was hosted 12/2013 by NFC World.
The document summarizes news in embedded systems security for May 2011, focusing on near field communication (NFC) technologies, smart meters and smart cards. Key events highlighted include Google launching a mobile wallet using NFC, partnerships between technology companies to advance NFC payments, and upcoming security conferences on NFC and other smart technologies.
This document discusses NFC concepts, Windows 8/Phone 8 NFC applications, NDEF format, NDEF records, NFC tags, and the Windows.Networking.Proximity namespace for NFC on Windows platforms. It describes NFC communication modes and operating modes, how NFC can enable device pairing and data transfer in Windows 8 and Phone 8. It also covers different NFC tag types and forums, and common NFC chip compatibility issues.
The document provides information on smartphone components from various manufacturers used in popular smartphones in 2013. It lists the main processor, memory, radio frequency, audio, display and other components for BlackBerry Z10, Motorola Moto X and options for the Qualcomm Snapdragon 600 mobile platform. Key components include Qualcomm Snapdragon and PMIC chips, Samsung and SK Hynix memory, RF chips from Skyworks, Avago and Texas Instruments.
To assess licensing potentials of the key IPR holders, forward citation based Amber Cluster Search was used. Identified NFC patents of a specific IPR holder were used as an input to the cluster search to evaluate licensing opportunities. All the values of licensing potential higher than one are aggregated for a specific potential licensee. Thus, higher in licensing potential value for a specific potential licensee means higher in licensing opportunity.
TechIPm researched over 600 patents related to NFC-enabled smartphones and mobile payment systems issued by the USPTO as of June 2015. Their analysis found that Sony holds the most patents, followed by Visa, NXP, Nokia, Broadcom and Samsung Electronics. They identified 164 patents as potential standard essential patents by comparing patent disclosures to NFC Forum standards specifications. Among holders of these standard essential patents, NXP leads, followed by Sony, Broadcom, Round Rock, Samsung Electronics and Nokia.
This document summarizes news related to embedded systems security from March 2011. It highlights developments in near field communication (NFC) technology, including new products from companies like Taztag, Morpho, Ingenico, Gemalto, and STMicroelectronics. It also mentions smart meter and smart card news, as well as upcoming events focused on NFC, smart cities, smart grids, and other topics related to embedded systems security.
This document presents a final report on a Human Interaction Library. It describes the design and architecture of a Java library that allows users to interact with applications using non-conventional devices like the Nintendo Wii controller, microphone, and webcam. The library provides capabilities for finger tracking, head tracking, and speech recognition and has been integrated with the WorldWind open source mapping toolkit. The report covers requirements, system architecture, developer and user manuals, and known bugs and limitations.
Near Field Communication (NFC) is a short-range wireless technology that allows data exchange when devices are touched or brought close together. NFC was co-invented in 2002 and standardized by the NFC Forum in 2004. It enables contactless transactions, data exchange, and wireless connections using magnetic field induction between devices within 10 centimeters of each other. NFC offers advantages like easy setup, fast communication, and convenience by reducing the number of cards needed, but also risks like eavesdropping, data corruption, and lost property if not implemented securely.
DefCon 2012 - Near-Field Communication / RFID Hacking - MillerMichael Smith
The document explores the NFC attack surface by examining NFC protocols and fuzzing the NFC stack on two devices. It finds that some phones can be forced to parse content like images, contacts, and open web pages without user interaction through NFC technologies. In some cases, full control of the phone is possible, allowing theft of data and sending of messages/calls. Proper understanding of NFC and its protocols is needed to analyze risks introduced by the inclusion of NFC functionality on mobile devices.
VIVOTEK is a leading manufacturer of IP surveillance products founded in 2000. It specializes in integrating audio-visual components into network operations. Key components of an IP surveillance system include network cameras, video servers, network video recorders, and central management software. Network cameras digitize and transmit video streams over networks allowing remote viewing on devices like PCs. Common network camera types are fixed, pan/tilt/zoom, fixed dome, and speed dome cameras used in various professional and home applications.
This document outlines the topics that will be covered in a networking and protocols course, including introductions to networking concepts like the Internet, protocols, sockets, security, and remote access. Specific topics that will be discussed include TCP/IP, packet switching, physical media, protocol layers, the history of networking, socket programming, authentication, encryption, and network analysis tools. The course appears to provide an in-depth overview of computer networking from the ground level up.
Near Field Communication (NFC) is a short-range wireless connectivity technology that allows data transmission between devices that are 4-5 cm apart. NFC uses inductive coupling to transmit data securely at 13.56 MHz. It originated from RFID technology and was standardized by the NFC Forum in 2004. NFC provides benefits like intuitive interactions with a simple touch, versatility across many industries, and inherently secure transmissions over short ranges. Common applications of NFC include contactless payments, data sharing, and setup of wireless connections.
NFC (Near Field Communication) is a short-range wireless technology that allows data exchange when devices are touched or brought within close proximity. It was established in 2004 by Nokia, Philips, and Sony. NFC provides advantages over other wireless technologies due to its near-field design and ability to establish connections quickly with low power usage. Common applications of NFC include contactless payments, data sharing, and identification. While NFC has benefits like multi-device communication and compatibility without special software, it also has limitations such as a small data transfer rate and working range.
Smartphone Challenge: Guidelines for development of network friendly applicat...Daniel Appelquist
This document provides guidelines for developing mobile applications that are friendly to mobile networks. It discusses constraints of mobile networks like limited bandwidth, variable connectivity, and impact on battery life. It emphasizes the need for applications to have asynchronous network requests so they can handle delays and failures gracefully without blocking the user interface. Applications should also cache data for offline use, compress content, and manage foreground and background states efficiently. The document provides platform-specific recommendations for iOS, Android and Windows Phone to help developers address these issues and create responsive applications that perform well on mobile networks.
The document provides an introduction to mobile networks and mobile broadband, covering the evolution from GSM to LTE. It discusses key aspects of GSM, GPRS, UMTS, HSPA and LTE including network elements, air interfaces, mobility management, and data services. The document is intended to explain the core concepts and technologies underlying modern cellular networks.
This document provides an overview and instructions for using a dual SIM mobile phone. It includes sections on getting started, phone layout and basic functions, inserting SIM cards and memory cards, making calls, using apps like contacts, messages, camera, and settings menus. The document also outlines safety precautions and contains a table of contents for easy navigation.
The document provides an overview of how to build an NFC application, including:
- The anatomy of an NFC app and its components like middleware, NFC interface, tags, and application logic.
- Details on NFC technologies, tag types, NDEF formatting, and the Android NFC APIs.
- Examples of writing and reading data from NFC tags using Android apps and demonstrating common NFC use cases.
This document describes the Routing Information Protocol (RIP), which is used to exchange routing information between gateways and hosts. It aims to formally document the protocol, which was previously undocumented but widely used. The document specifies improvements to the distance vector routing algorithms to improve stability in large networks, and suggests optional features to increase configurability and control. RIP is intended for use within autonomous systems to exchange routing information.
Communication Networks: The Complete GuideDaisyWatson5
A computer network consists of nodes and communication links which implement its protocols. It interconnects a set of hosts which conform to the network protocols.
A network may be classified as a LAN, MAN, or WAN, depending on its geographic spread, and as private or public, depending on its access restrictions. It may employ a point-to-point or a broadcast communication
www.ThesisScientist.com Chapter 1: Introduction 15
model. A point-to-point model may be based on circuit switching or packet
switching.
The OSI model proposes a seven-layer architecture for networks. Each layer is characterized by a set of protocols. The network nodes implement only the bottom three layers, while the hosts implement all the layers.
The physical layer controls the transmission of raw data bits over communication lines. The data link layer facilitates the reliable transfer of data over communication channels. The network layer controls the end-to-end routing of data across the network. The transport layer manages the efficient and cost-effective transportation of data across the network. The session layer manages the negotiation of the establishment and termination of connections (sessions). The presentation layer provides a mutually-agreeable binary representation of application data (syntax). The application layer provides a mutually-agreeable meaning of application data (semantics).
A service primitive is an abstract representation of the interaction between a service provider and a service user, and may be of one of four types: request, indication, response, and confirmation.
A sequence diagram defines a service protocol by specifying the permissible sequence of service primitives that may be exchanged between service users and service providers.
A state transition diagram describes the various execution states a station can assume and how service primitives cause it to transit from one state to another.
Communication standards are essential in order to achieve interoperability between different equipment and networks.
Disruptive innovations for the RFID technologies. How amplify the reading distance of small NFC antennas. How displace the NFC reading area. How read an UHF tag using the NFC engine of a smartphone.
This document provides an introduction to computer networks. It discusses network components, different network types, and the OSI reference model. The OSI model is described in detail, outlining the seven layers from physical to application layer. Protocol notations and standards are also introduced. The document serves to familiarize readers with fundamental network concepts and terminology.
Become A Best Programer In 3Months
Best 600 Solved Programs
Best 600 Interview Questions
Interview Point Programs
All in one Programming Website
1. Java all programs
2. Java Important programs
3. Python Programs
4. C Programs
5. C Pattern programs
6. C,Java,.Net etc.. Interview Questions
7. .Net Materials
For more details click here
http://www.msktutorials.com/
http://inihsrav.com
Forward This Website To All Your Students.
Thank you.....
This document provides an introduction to communication networks. It discusses network components, different network types based on geographic spread, access restrictions, and communication models. It also introduces the OSI reference model and its seven layers - physical, data link, network, transport, session, presentation, and application layer. It describes some basic protocol notations like service primitives, sequence diagrams, and state transition diagrams. Finally, it discusses standards, further reading resources, and exercises.
This document summarizes an open source implementation of the ZigBee wireless networking standard. It discusses applications of ZigBee networks in home automation and commercial buildings. It provides an overview of ZigBee nodes, topologies, and stack architecture. The presentation outlines a work plan to make the protocol layers independent, define socket interfaces, and develop a user-space library. Progress on a Wireshark dissector and socket interfaces is also summarized.
The document provides an acknowledgement for the completion of a project titled "LAN CHAT MESSENGER (LCM)". It expresses gratitude to the project guide and head of the computer science department for their guidance and support. It also thanks the director of the institute for encouragement. Signatures from the involved teacher, head of department, and director are provided to certify that the project was completed under supervision. The document includes contents like introduction, fundamentals, software requirements specification, analysis, design, testing, snapshots of the software, future scope, and conclusion. It aims to develop a messaging software that allows users connected to the same local area network to communicate via live chat and file sharing while filtering unwanted content.
This document provides an overview of Near Field Communication (NFC) technology, including NFC modes, use cases, tag types, related specifications, and forum standards. It describes key aspects of NFC such as communication occurring when devices are 4 cm or closer, the reader/tag relationship, and operating modes including read/write, peer-to-peer, and card emulation. Common use cases like service initiation, sharing, connecting devices, ticketing, and payment are outlined. The document also discusses NFC tag types, related specifications like ISO 14443 and MIFARE, and forum standards including NDEF, RTD, and LLCP.
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
Building RAG with self-deployed Milvus vector database and Snowpark Container...Zilliz
This talk will give hands-on advice on building RAG applications with an open-source Milvus database deployed as a docker container. We will also introduce the integration of Milvus with Snowpark Container Services.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
2. Table of contents
1. Introduction 4
2. What is NFC? 5
2.1 Tag and reader 5
2.1.1 Tag 5
2.1.2 Reader 6
3. NFC modes 7
3.1 Communication modes 7
3.1.1 Active 7
3.1.2 Passive 7
3.2 Operating modes 7
3.2.1 Read/write 7
3.2.2 Peer to peer 7
3.2.3 Card emulation 8
4. NFC use cases 9
4.1 Service initiation 9
4.2 Sharing 10
4.3 Connecting devices 10
4.4 Ticketing 10
4.5 Payment 10
5. NFC tags 11
5.1 NFC Forum tag types 11
5.1.1 Type 1 Tag 11
5.1.2 Type 2 Tag 12
5.1.3 Type 3 Tag 12
5.1.4 Type 4 Tag 12
5.2 NXP-specific tag type 13
5.2.1 Type MIFARE Classic Tag 13
6. NFC-related specifications 14
6.1 ISO 14443 14
6.2 NFCIP-1 14
6.3 MIFARE 15
6.4 FeliCa 16
7. NFC Forum standards 17
7.1 NDEF 17
7.2 RTD 19
7.3 LLCP 19
8. NFC in Nokia phones 20
8.1 Qt APIs 20
8.1.1 Use cases 20
8.1.2 Classes 21
8.1.3 Examples 21
8.2 Symbian APIs 23
Introduction to NFC 2
3. 8.2.1 Use cases 23
8.2.2 Examples 25
8.3 Java APIs 25
8.3.1 Use cases 25
8.3.2 Examples 25
8.4 Nokia phones with NFC support 26
8.5 NFC standards and tags supported 26
8.6 NFC data handling in Nokia phones 27
8.6.1 NDEF record handling 27
8.6.2 Reserved RTDs supported 27
8.6.3 MIME types supported 28
8.6.4 Smart Poster RTD handling 28
8.6.5 Smart Poster RTD/URI stand-alone use cases 29
8.6.5.1 Open URL 29
8.6.5.2 Make a phone call 29
8.6.5.3 Send SMS 29
8.6.5.4 Open a local file or an application 30
8.7 API feature comparisons 31
9. Terms and abbreviations 32
10. References 33
Change history
19 April 2011 1.0 Initial document release
Added information on NFC Standards and tags
8 July 2011 1.1 supported in Symbian and MeeGo 1.2 Harmattan
platforms.
Introduction to NFC 3
4. 1. Introduction
This document introduces Near Field Communication (NFC) technology in general and the
specific features that are supported on Nokia phones.
The document is intended for developers who are new to NFC and are looking to develop
applications for Nokia phones using the Qt/Symbian/Java™ APIs.
Introduction to NFC 4
5. 2. What is NFC?
NFC stands for Near Field Communication. It is a short-range radio technology that enables communication
between devices that either touch or are momentarily held close together.
‒ NFC is an open-platform technology that is being standardised in the NFC Forum.
‒ NFC is based on and extends on RFID. It operates on 13.56 MHz frequency.
‒ The NFC communication range is up to 10 cm. However, for the best user experience with Nokia phones it is
recommended that the devices touch each other.
‒ The NFC standard supports different data transmission rates such as 106 kBps, 212 kBps, and 424 kBps.
2.1 Tag and reader
NFC-based communication between two devices is possible when one device acts as a reader/writer and the
other as a tag.
2.1.1 Tag
The tag is a simple, thin device containing an antenna and a small amount of memory. It is a passive device,
powered by a magnetic field. Depending on the tag type, the memory can be read only, rewritable, or writable
once.
Figure 1: Tag
Introduction to NFC 5
6. 2.1.2 Reader
The reader is an active device that generates radio signals to communicate with the tags. The reader powers the
passive device when the two are engaged in the passive mode of communication.
Figure 2: Reader
Introduction to NFC 6
7. 3. NFC modes
3.1 Communication modes
NFC devices support two communication modes.
3.1.1 Active
In this mode, the target and the initiator devices have power supplies and can communicate with one another by
alternate signal transmission.
3.1.2 Passive
In this mode, the initiator device generates radio signals and the target device is powered by this electromagnetic
field. The target device responds to the initiator by modulating the existing electromagnetic field.
3.2 Operating modes
NFC devices can operate in three different modes based on the ISO/IEC 18092, NFC IP-1, and ISO/IEC 14443
contactless smart card standards.
3.2.1 Read/write
In this mode, the NFC-enabled phone can read or write data to any of the supported tag types in a standard NFC
data format.
3.2.2 Peer to peer
In this mode, two NFC-enabled devices can exchange data. For example, you can share Bluetooth or Wi-Fi link
setup parameters to initiate a Bluetooth or Wi-Fi link. You can also exchange data such as virtual business cards
or digital photos. Peer-to-peer mode is standardised on the ISO/IEC 18092 standard.
Note: The Symbian implementation for NFC currently supports initiation of a Bluetooth link, while Wi-Fi is not
supported yet. Also, the Java implementation for NFC does not support this mode of operation.
Introduction to NFC 7
8. 3.2.3 Card emulation
An NFC-enabled phone acts as a reader when in contact with tags. In this mode, the phone can act as a tag or
contactless card for existing readers.
Note: The Symbian and Java implementations for NFC do not currently support this mode of operation.
Figure 3: Card emulation
Introduction to NFC 8
9. 4. NFC use cases
This section discusses the use cases that NFC offers and describes some scenarios.
4.1 Service initiation
In the service initiation scenario, an NFC-enabled Nokia phone tapped against an NFC tag can receive information
such as a URL, a phone number, or text, based upon which an action can be defined.
A smart poster serves as an example of this, where NFC tags have been placed on the backside of the poster
under each hot spot. Each tag contains a piece of data in the NFC data format known as Smart Poster. When an
NFC-enabled Nokia phone touches a tag (or the hot spot) in the poster, it reads the information in the tag.
Depending on the type of information, the Nokia phone may start a video stream, open a web browser, or ask the
user if he or she wants to place a telephone call.
Figure 4: Smart poster
Introduction to NFC 9
10. 4.2 Sharing
NFC-enabled devices can share data through a peer-to-peer communication mode.
For example, two NFC-enabled Nokia phones can share business card information. When a user chooses to share
contact information, the phone sends a radio signal to the other phone in the NFC radio range and initiates peer-
to-peer communication. The information is shared in the NFC data format recognised by both devices.
Note: Sharing is not done over NFC. Rather, NFC is used to initiate Bluetooth service and sharing is done via
Bluetooth.
4.3 Connecting devices
NFC helps connect devices easily without the need for any configuration or setup. For example, a user can pair an
NFC-enabled Nokia phone with a Bluetooth headset by touching the headset with the phone. The Bluetooth
headset contains an embedded NFC tag that contains all the information required for Bluetooth pairing, stored in
the NFC data format. The NFC-enabled Nokia phone acts as a reader; it reads Bluetooth information from the tag
(that is, from the headset) and performs the Bluetooth pairing.
4.4 Ticketing
An NFC-enabled phone can be used in a ticketing application as a travel ticket, replacing a physical travel ticket.
To present the ticket, the user must touch the ticket reader with the phone. Users can refill tickets by paying and
touching the ticketing machine. The NFC-enabled phone acts as a contactless card to the ticket reader and so
operates in card emulation mode.
To use an NFC-enabled phone as a travel ticket, a secure environment known as secure element (SE) must be
implemented on the phone. The secure environment runs the ticketing application, which may, for example, keep
track of remaining travel time or prepaid journeys.
Note: The ticketing use case is not yet supported in Nokia phones.
4.5 Payment
An NFC-enabled phone can be used in a payment application like a credit card to make payments. To pay, the
user must touch the payment terminal with the phone. The NFC-enabled phone acts as a contactless card (chip-
based credit card) to the payment terminal (reader) and so operates in card emulation mode.
Introduction to NFC 10
11. The NFC-enabled phone must implement the secure element, which runs payment applications similar to the
applications on normal chip-based credit cards.
Note: The payment use case is not yet supported in Nokia phones.
5. NFC tags
NFC tags can be used in applications such as posters, where small amounts of data can be stored and transferred
to active NFC devices. The stored data on the NFC tag may contain any form of data such as a URL, a phone
number, or calendar information.
To ensure interoperability between different NFC tag providers and NFC device manufacturers, the NFC Forum
has defined four tag types.
For information on tags that are supported in Symbian and MeeGo 1.2 Harmattan platforms, refer to Section 8.5,
―NFC standards and tags supported‖.
5.1 NFC Forum tag types
The NFC Forum is a consortium that was formed to advance the use of NFC technology by developing
specifications, ensuring interoperability among devices and services, and educating the market about NFC
technology.
For operation specifications of the NFC Forum tag types, see the technical specifications at the NFC Forum
website (http://www.nfc-forum.org/specs/spec_list/). The operation specifications for the tags provide the
technical information required for implementing the reader/writer and the associated control functionality of the
NFC device to interact with the tags.
5.1.1 Type 1 Tag
Type 1 Tags are cost effective and ideal for many NFC applications.
‒ Based on ISO-14443A standard
‒ Read and rewrite capable; also users can configure the tag to be read-only
‒ 96 bytes of memory, expandable up to 2 kB
‒ Communication speed 106 kbits/s
‒ No data collision protection
Introduction to NFC 11
12. ‒ Compatible products available in the market — Innovision Topaz, Broadcom BCM20203
For information about how the NFC Forum device should operate in the NFC Forum Type 1 Tag platform and how
the NFC Forum Device detects, reads, and writes NDEF (see Section 7.1, ―NDEF‖) data into the Type 1 Tag
platform, see the Type 1 Tag Operation Specification at the NFC Forum website: http://www.nfc-
forum.org/specs/spec_list/.
5.1.2 Type 2 Tag
Type 2 Tags are similar to Type 1 Tags and are derived from the NXP/Philips MIFARE Ultralight tag.
‒ Based on ISO-14443A standard
‒ Read and rewrite capable; also users can configure the tag to be read-only
‒ 96 bytes of memory, expandable up to 2 kB
‒ Communication speed 106 kbits/s
‒ Anticollision support
‒ Compatible products available in the market — NXP MIFARE Ultralight
5.1.3 Type 3 Tag
Type 3 Tags are derived from the nonsecure parts of Sony FeliCa tags. These tags are costlier than Types 1 and 2.
‒ Based on the Japanese Industrial Standard (JIS) X 6319-4
‒ Preconfigured at manufacture to be either read and rewritable, or read-only
‒ Variable memory, up to 1 MB per service
‒ Supports two communication speeds: 212 or 424 kbits/s
‒ Anticollision support
‒ Compatible products available in the market — Sony FeliCa
5.1.4 Type 4 Tag
Type 4 Tags are similar to Type 1 Tags and are derived from the NXP DESFire tag.
Introduction to NFC 12
13. ‒ Based on ISO-14443A standard
‒ Preconfigured at manufacture to be either read and rewritable, or read-only
‒ Variable memory, up to 32 kB per service
‒ Supports three different communication speeds: 106, 212, or 424 kbits/s
‒ Anticollision support
‒ Compatible products available in the market — NXP DESFire, SmartMX-JCOP
5.2 NXP-specific tag type
This is a proprietary tag type defined by NXP Semiconductors.
5.2.1 Type MIFARE Classic Tag
‒ Based on ISO-14443A standard
‒ Read and rewrite capable; also users can configure the tag to be read-only
‒ Variable memory 192/768/3584 bytes
‒ Communication speed 106 kbits/s
‒ Anticollision support
‒ Compatible products available in the market — NXP MIFARE Classic 1K, MIFARE Classic 4K, and Classic Mini
For more information on the MIFARE Classic Tag, see the NXP website: http://www.nxp.com/.
Introduction to NFC 13
14. 6. NFC-related specifications
For information on standards that are supported in Symbian and MeeGo 1.2 Harmattan platforms, see Section
8.5, ―NFC standards and tags supported‖.
6.1 ISO 14443
ISO 14443 is a well-known international standard originally developed for contactless chip card communication
over a 13.56 MHz radio.
ISO 14443 defines a protocol stack from the radio layer up to a command protocol.
There are two versions of the radio layer ISO 14443-2, with different modulation and bit-encoding methods.
These versions are known as the –A and –B versions of the ISO 14443. Similarly, ISO 14443 specifies two versions
of the packet framing and low-level protocol part (ISO 14443-3). The topmost layer of the ISO protocol stack
defines a command interface (ISO 14443-4) for transferring information.
Figure 5: ISO 14443 protocol stack
6.2 NFCIP-1
Peer-to-peer communication between two NFC devices is made possible by mechanisms defined in the Near Field
Communication — Interface and Protocol Specification, NFCIP-1. This key NFC specification is also known as ISO
18092 and ECMA-340.
Introduction to NFC 14
15. The protocol stack in NFCIP-1 is based on ISO 14443. The main difference is a new command protocol, which
replaces the topmost part of the stack.
NFCIP-1 includes two communication modes that allow an NFC device to communicate with other NFC devices in
a peer-to-peer manner, as well as with NFCIP-1 based NFC tags.
Figure 6: ISO 14443 protocol stack
6.3 MIFARE
MIFARE refers to an NFC tag type developed by NXP Semiconductors. MIFARE tags are widely used as memory
cards in transportation applications. ISO 14443 defines a protocol stack from the radio layer up to a command
protocol.
Figure 7: Protocol stack
Introduction to NFC 15
16. 6.4 FeliCa
FeliCa is a proprietary NFC tag technology developed by Sony, and it is widely used in proprietary payment and
transportation applications in the Asian markets. FeliCa tags have also been integrated with select mobile phone
models in the Mobile FeliCa system. FeliCa tags are standardised as a Japanese industry standard. The tags are
based on the passive mode of ISO 18092, with added authentication and encryption capabilities.
Figure 8: Protocol stack
Introduction to NFC 16
17. 7. NFC Forum standards
7.1 NDEF
To enable interoperability when transferring data to and from tags and between NFC devices, the NFC Forum has
specified a common data format known as the NFC Data Exchange Format (NDEF).
NDEF is a lightweight and compact binary format that can carry URLs, vCards, and NFC-specific data types.
NDEF allows NFC functionality to easily use any supported tag type to transfer data, because NDEF hides all the
tag type-specific details from the application.
NDEF is exchanged in messages that consist of a sequence of records. Each record carries a payload. The payload
contents can be of type URL, MIME media, or an NFC-specific data type. For NFC-specific data types, the payload
contents must be defined in an NFC Record Type Definition (RTD) file.
The type of data in the record and the size of the record are indicated in a header attached to the payload.
The header includes a type field for identifying the type of payload. The payload length indicates the number of
octets in the payload. The optional payload identifier allows user applications to identify the payload carried
within an NDEF record.
The format of the TYPE field value is indicated using the Type Name Format (TNF) field. For information on
supported types and corresponding TNF values, see Section 3.2.6 of the NDEF technical specification on the NFC
Forum website (http://www.nfc-forum.org/specs/spec_list/).
Introduction to NFC 17
19. 7.2 RTD
The NFC Forum has specified several optimised record types that can be carried in NDEF records. Each NFC
Forum record type is specified in a Record Type Definition (RTD) document. NFC defines the following RTDs:
‒ NFC Text RTD
‒ NFC URI RTD
‒ NFC Smart Poster RTD
‒ NFC Generic Control RTD
‒ NFC Signature RTD
The simplest is a Text record type, which can carry a Unicode string. A text record can be included in an NDEF
message as a descriptive text for another record. The URI record type can be used to store a URI such as a web
address, an email, or a phone number in an optimised binary form.
The Smart Poster RTD defines how to put URLs, SMSs, or phone numbers on an NFC Forum tag and how to
transport them between devices.
7.3 LLCP
To enhance the peer-to-peer mode of operation, the NFC Forum has specified the link-level protocol known as
the Logical Link Control Protocol (LLCP). In the NFC peer-to-peer protocol stack, LLCP provides additional
communication capabilities on top of the NFCIP-1/ ISO 18092.
LLCP introduces a two-way, link-level connection, allowing both peers to send and receive data using the
following methods of data exchange:
‒ Connection-oriented transfer, where data exchanges are acknowledged;
‒ Connectionless transfer, where data exchanges are unacknowledged.
Introduction to NFC 19
20. 8. NFC in Nokia phones
Qt, Symbian, and Java™ technologies provide a choice of APIs for NFC support.
8.1 Qt APIs
The Qt NFC API is included as a cross-platform API in the Qt Mobility project. This API is part of the connectivity
API and integrates into the Qt SDK.
Note: The Qt NFC API is currently available only at a Technology Preview level of maturity.
For information on Qt Mobility APIs for NFC, go to http://doc.qt.nokia.com/qtmobility-1.2.0-tp1/connectivity-
api.html.
For a source package of the Qt Mobility 1.2 APIs at a Technology Preview level of maturity, go to
http://labs.qt.nokia.com/2010/12/24/qt-mobility-1-2-technology-preview/.
8.1.1 Use cases
The following use cases are supported by Qt NFC APIs:
‒ Interacting with NFC Forum tags and NFC Forum devices
‒ Target detection and loss
‒ Registering NDEF message handlers
‒ Reading and writing NDEF messages to NFC Forum tags
‒ Sending tag-specific commands
‒ Client and server LLCP sockets for peer-to-peer communication
Introduction to NFC 20
21. 8.1.2 Classes
API Description
QLlcpServer NFC LLCP socket-based server
QLlcpSocket NFC LLCP socket
QNdefFilter Filter for matching NDEF messages
QNdefMessage NFC NDEF message
QNdefNfcTextRecord NFC RTD-Text
QNdefNfcUriRecord NFC RTD-URI
QNdefRecord NFC NDEF record
QNearFieldManager Access to notifications for NFC events
QNearFieldTagType1 Interface for communicating with NFC Tag Type 1 tag
QNearFieldTagType2 Interface for communicating with NFC Tag Type 2 tag
QNearFieldTagType3 Interface for communicating with NFC Tag Type 3 tag
QNearFieldTagType4 Interface for communicating with NFC Tag Type 4 tag
QNearFieldTarget Interface for communicating with a target device
8.1.3 Examples
‒ NFC Annotated URL: Displays URL along with caption text and an image from an NFC tag containing a
specially formatted NDEF message.
Introduction to NFC 21
22. ‒ NDEF Editor: Creates NDEF messages using the NDEF records supported by the Connectivity API and saves
them to supported NFC Forum tags.
Introduction to NFC 22
23. 8.2 Symbian APIs
In Symbian S^3, the following native APIs are provided for NFC:
API Description
NFC Discovery API Provides methods to subscribe and discover tags and NDEF messages
NFC Tag Extension API Provides implementation and access (read/write) methods for different types of NFC
targets
NDEF API Provides methods for handling NDEF messages and accessing NDEF messages on
tags
NFC Peer-to-Peer API Provides LLCP API for peer-to-peer communication between NFC devices
NFC Content Handler API Provides ECOM plug-in interface for subscribing and receiving NDEF messages
Table 1: Native APIs in Symbian S^3
8.2.1 Use cases
The following use cases are supported by Symbian APIs:
‒ Creating content handler plug-ins
‒ Setting up a Bluetooth connection
‒ Sharing a file or data
‒ Reading NDEF messages
‒ Discovering NFC tags
‒ Exchanging data with NFC Forum Type 4 Tags
‒ Reading NFC Forum Type 1, 2, 3 Tags
‒ Writing to NFC Forum Type 1, 2, 3 Tags
‒ Transferring and receiving "Hello World!" ASCII text using the LLCP stack (connectionless)
‒ Transferring and receiving "Hello World!" ASCII text using the LLCP stack (connection-oriented)
Introduction to NFC 23
24. Note: The Symbian implementation for NFC does not support the Card emulation mode of operation.
Introduction to NFC 24
25. 8.2.2 Examples
‒ Sharing using the NFC stack and AIW framework APIs: Demonstrates the usage of Tag Discovery and NDEF
Discovery APIs and various readwrite operations that can be performed with the tags.
‒ Tag discovery and NDEF discovery: Demonstrates how two devices get paired using the NFC channel and
share a file using the secondary bearer channel (for example, Bluetooth). Using the AIW framework, this
example shows how to share a vCard or vCal from one device to another.
See the Nokia Symbian^3 Developer's Library at Nokia Developer for documentation about Symbian API
use cases and to download the examples:
http://library.developer.nokia.com/topic/GUID-E35887BB-7E58-438C-AA27-97B2CDE7E069/GUID-
7A72B008-901E-454D-AD93-F99555CA904A.html#GUID-7A72B008-901E-454D-AD93-F99555CA904A.
8.3 Java APIs
The JSR 257 Contactless Communication API 1.0 is supported on Symbian devices with NFC capabilities.
The Contactless Communication API allows MIDlets to use the NFC capabilities of a mobile device to
communicate with contactless targets. Specifically, MIDlets can read and write small amounts of data to the tags
(integrated circuits) in the contactless targets.
8.3.1 Use cases
The following use cases are supported by the Contactless Communication API:
‒ Detecting contactless targets
‒ Exchanging data with detected contactless targets
Note: The Java implementation for NFC does not support the Card emulation mode or Peer to peer mode of
operation.
8.3.2 Examples
‒ UIDReader: Shows how to create a MIDlet that reads data from contactless targets.
‒ URLWriter: Shows how to create a MIDlet that writes data to contactless targets.
Introduction to NFC 25
26. See the Java Developer's Library at Nokia Developer for documentation about Java API use cases and to
download the examples:
http://library.developer.nokia.com/index.jsp?topic=/Java_Developers_Library/GUID-9248DD7F-23BE-40A6-
A8DC-823783443F10.html.
8.4 Nokia phones with NFC support
For information about Nokia phones that provide support for NFC, go to:
http://www.developer.nokia.com/Devices/Device_specifications/?filter1=all&filter2=nfc.
8.5 NFC standards and tags supported
The following NFC standards and tags are supported in both Symbian and MeeGo 1.2 Harmattan platforms:
‒ NFC A technology
‒ NFC B technology
‒ NFC F technology (JIS 6319-A)
‒ ISO DEP protocol (ISO 14443)
‒ NFC DEP protocol (NFCIP1 - ISO 18092)
The following NFC Forum tag types are supported:
‒ NFC Forum Type 1
‒ NFC Forum Type 2
‒ NFC Forum Type 3
‒ NFC Forum Type 4
Note: The Java implementation for NFC does not support NFC Forum Type 4 Tags.
Other proprietary tag types supported:
‒ MIFARE Classic
Introduction to NFC 26
27. 8.6 NFC data handling in Nokia phones
In the Symbian implementation, applications in the background are not allowed to handle Reserved RTDs such as
Smart Poster, URI, BT headset, and other common MIME types.
When a tag containing a reserved RTD is detected (see Section 8.6.2, ―Reserved RTDs supported‖), the application
in the UI foreground can only get a callback. Similarly, sharing (or easy setup) can be initiated only when the
application is in the foreground.
However, users can define their own data types and in which case the applications can handle the user-defined
data types from both foreground and background.
8.6.1 NDEF record handling
The Symbian implementation supports handling of multiple NDEF records. In case of multiple NDEF records, it
reads the first records and checks if there is a handler available (either an NFC Discovery API or an NFC Content
Handler API client) to handle the data according to record type. If YES, it will stop and give the whole NDEF
message to that particular handler. If a handler for the first record is not found, it will move to the second record
and repeat the process, and so on. In other words, if for a record any handle is found, then the whole NDEF
message is given to that particular handler.
Note: The Symbian implementation supports multiple NDEF records but not multiple NDEF messages.
8.6.2 Reserved RTDs supported
The NFC implementation in the Symbian platform provides support for handling the following RTDs:
RTD Identifier
Bluetooth 2.0 urn:nfc:ext:nokia.com:bt
Bluetooth 2.1 application/vnd.bluetooth.ep.oob
Handover Request urn:nfc:wkt:Hr
Handover Select urn:nfc:wkt:Hs
Smart Poster urn:nfc:wkt:Sp
URI record urn:nfc:wkt:U
Table 2: RTDs supported in Symbian platform
Introduction to NFC 27
28. Applications must be in the foreground to handle Reserved RTDs. It is not possible to read a Reserved NDEF from
a background process. For more information on NFC data handling, see Section 8.6, ―NFC data handling in Nokia
phones‖.
8.6.3 MIME types supported
The Symbian implementation can read the following file types from the NFC tags:
Type Subtype
image All subtypes are supported
audio All subtypes are supported
text All subtypes are supported
video All subtypes are supported
application vnd.Nokia.ringing-tone
application vnd.symbian.install
application java-archive
application x-java-archive
application vnd.wap
Table 3: MIME types supported in Symbian platform
8.6.4 Smart Poster RTD handling
The Smart Poster message can have one or more records. The NFC implementation in the Symbian platform
supports the URI record (mandatory record), and the optional records Action and Title. For information on
records supported in the Smart Poster RTD, see the NFC Forum Technical Specifications (http://www.nfc-
forum.org/specs/spec_list/#rtds).
The Action record specifies the action the device must perform with the content.
Value Action
0 Specifies that the action is to be done immediately
1 Specifies that the content in URL and SMS cases is to be saved for later
use
Introduction to NFC 28
29. Table 4: Action record values
‒ The content of the Title record is used to describe the action specified in the Action record.
‒ The mandatory URI record contains a URI Identifier Code for specifying the URI scheme and shortening the
actual URI field.
8.6.5 Smart Poster RTD/URI stand-alone use cases
The following use cases are supported in the Symbian platform:
8.6.5.1 Open URL
URI identifier codes Schemes
0x01 http://www.
0x02 https://www.
0x03 http://
0x04 https://
8.6.5.2 Make a phone call
URI identifier codes Schemes
0x01 http://www.
0x05 tel:
8.6.5.3 Send SMS
URI identifier codes Schemes
0x00 sms:
Introduction to NFC 29
30. 8.6.5.4 Open a local file or an application
URI identifier codes Schemes
0x1D file://
Introduction to NFC 30
31. 8.7 API feature comparisons
For information on standards and tags that are supported in the Symbian and MeeGo 1.2 Harmattan platforms,
see Section 8.5, ―NFC standards and tags supported‖.
Core NFC API capabilities JSR-257 JSR-257 Symbian Symbian Qt Mobility
Nokia Java Native API 1.2 API
extensions support
Register Detecting a specified N/A
application for RTD Type in a tag
launch upon… Connection to a × × ×
specified LLCP SAP/
Service name
Event NDEF Tag detected N/A
notifications
Specified RTD Type N/A
detected
Target detected N/A
NDEF reading Provide NDEF and
RTD concepts
Read NDEF record(s)
Write NDEF record(s)
LLCP Open connection × × ×
Send data × × ×
Receive data × × ×
Tag Type Tag Type 1 specific ×
support commands
Tag Type 2 specific ×
commands
Tag Type 3 specific ×
commands
Tag Type 4 specific × ×
commands
MIFARE Std × ×
Table 5: API feature comparisons
Introduction to NFC 31
32. 9. Terms and abbreviations
This section defines all relevant terms and acronyms used in this document.
Term or abbreviation Meaning
ECMA European Computer Manufacturers’ Association
ISO International Organization for Standardization
LLCP Logical Link Control Protocol
NDEF NFC Data Exchange Format
NFC Near Field Communications
RFID Radio Frequency Identification
RTD Record Type Definition
URL Uniform Resource Locator
Introduction to NFC 32
33. 10. References
[1] Technical Specifications at NFC Forum, http://www.nfc-forum.org/specs/
[2] NXP Specific Type Tag details from NXP Semiconductors, http://www.nxp.com/
Introduction to NFC 33