This document discusses near field communication (NFC) technology and its use for secure mobile transactions. NFC allows contactless communication between devices within 10 cm of each other. It can be used for applications like mobile payments, data transfers, and access control. The document explores NFC architecture, communication modes, security considerations, and potential future applications like unlocking vehicles and doors with a tap. It concludes that NFC is widely used in mobile devices today and enables contactless payment models through technologies like mobile wallets.
Near field communication (NFC) is a set of standards for smartphones and similar devices to establish radio communication with each other by touching them together or bringing them into proximity, usually no more than a few inches.
Near Field Communication . In modern era every type of work we can do by the use of technology. So Nfc is a better way to use our technology in a comfortable way
Near field communication (NFC) is a set of standards for smartphones and similar devices to establish radio communication with each other by touching them together or bringing them into proximity, usually no more than a few inches.
Near Field Communication . In modern era every type of work we can do by the use of technology. So Nfc is a better way to use our technology in a comfortable way
Near Field Communication is a very Versatile wireless technology. It has its range up to just 10-20 cm, but its short range is its advantage. Lets explore this technology and try to exploit it.
NFC stands for Near Field Communication.
NFC is an extension of Radio Frequency IDentifier popularly known as RFID.
NFC is a short range high frequency wireless communication technology.
NFC was founded in the year 2004 by NOKIA, SONY and PHILIPS.
What is NFC?
NFC or Near Field Communication is a short range high frequency wireless communication technology.
A radio communication is established by touching the two phones or keeping them in a proximity of a few centimetres.
NFC is mainly aimed for mobile or handheld devices.
NFC is an extension of Radio frequency identification or RFID technology.
RFID is mainly used for tracking and identification by sending radio waves.
NFC: Shaping the Future of the Connected Customer ExperienceNFC Forum
This presentation was delivered March 8, 2017 at RETAILTECH JAPAN by Koichi Tagawa, Chairman, NFC Forum, Sony.
Technology is reshaping the face and function of the traditional brick-and-mortar store, forever changing shopping as we know it. NFC-enabled mobile payments and tags are the latest must-have accessories. Forward-thinking retailers are pushing the boundaries to further engage shoppers—often with nothing more than a simple touch, tap, or swipe. NFC, the technology link between the physical and digital world, is helping build a stronger, more meaningful—and therefore more profitable—relationships with customers. NFC-enabled industries, including transport, automotive and IoT, are opening new doors for retailers. All with a simple tap, consumers can make NFC-enabled transactions using a wearable, their car dashboard, or in an NFC-enabled train station. This presentation will highlight how the growth of NFC is leading to “retail anywhere” NFC-enabled applications. The presentation will spotlight NFC use cases in the Internet of Things, Transportation, Automotive markets and examine the future of NFC-based product innovation.
For latest developments: www.nfc-forum.org
Near Field Communication (NFC) by LogeshLogesh Kumar
Explaining the NFC (Near Field Communication) Technology, Evolution, Operating Specification, Applications, Pros & Cons.
(This slide contains video files, its good to view the slide after downloading to your PC)
Near Field Communication is a short range high frequency wireless communication technology. Which enables the exchange of data between devices over a distance of up to 10 centimeters.
In This presentation we will go through
Introduction
Evolution of NFC Technology
How NFC work
NFC mode of communication ,tags & Operation
Comparison with existing technique
Application & Uses of NFC
NFC Security
Advantages& Disadvantages of NFC
Conclusion
Sept 2009: this is an updated presentation of the Near Field Communication (NFC) technology. I tried to explain how NFC works on a SIM card, what are the standardization bodies, roles and actors in the ecosystem.
This presentation is for developers and describes technical architecture to implement a NFC application on a SIM card using Java and APDU commands (JSR-177, 257 and 268).
These slides will be presented during the Smart University 2009 in Nice, Sophia-Antipolis.
Near Field Communication is a very Versatile wireless technology. It has its range up to just 10-20 cm, but its short range is its advantage. Lets explore this technology and try to exploit it.
NFC stands for Near Field Communication.
NFC is an extension of Radio Frequency IDentifier popularly known as RFID.
NFC is a short range high frequency wireless communication technology.
NFC was founded in the year 2004 by NOKIA, SONY and PHILIPS.
What is NFC?
NFC or Near Field Communication is a short range high frequency wireless communication technology.
A radio communication is established by touching the two phones or keeping them in a proximity of a few centimetres.
NFC is mainly aimed for mobile or handheld devices.
NFC is an extension of Radio frequency identification or RFID technology.
RFID is mainly used for tracking and identification by sending radio waves.
NFC: Shaping the Future of the Connected Customer ExperienceNFC Forum
This presentation was delivered March 8, 2017 at RETAILTECH JAPAN by Koichi Tagawa, Chairman, NFC Forum, Sony.
Technology is reshaping the face and function of the traditional brick-and-mortar store, forever changing shopping as we know it. NFC-enabled mobile payments and tags are the latest must-have accessories. Forward-thinking retailers are pushing the boundaries to further engage shoppers—often with nothing more than a simple touch, tap, or swipe. NFC, the technology link between the physical and digital world, is helping build a stronger, more meaningful—and therefore more profitable—relationships with customers. NFC-enabled industries, including transport, automotive and IoT, are opening new doors for retailers. All with a simple tap, consumers can make NFC-enabled transactions using a wearable, their car dashboard, or in an NFC-enabled train station. This presentation will highlight how the growth of NFC is leading to “retail anywhere” NFC-enabled applications. The presentation will spotlight NFC use cases in the Internet of Things, Transportation, Automotive markets and examine the future of NFC-based product innovation.
For latest developments: www.nfc-forum.org
Near Field Communication (NFC) by LogeshLogesh Kumar
Explaining the NFC (Near Field Communication) Technology, Evolution, Operating Specification, Applications, Pros & Cons.
(This slide contains video files, its good to view the slide after downloading to your PC)
Near Field Communication is a short range high frequency wireless communication technology. Which enables the exchange of data between devices over a distance of up to 10 centimeters.
In This presentation we will go through
Introduction
Evolution of NFC Technology
How NFC work
NFC mode of communication ,tags & Operation
Comparison with existing technique
Application & Uses of NFC
NFC Security
Advantages& Disadvantages of NFC
Conclusion
Sept 2009: this is an updated presentation of the Near Field Communication (NFC) technology. I tried to explain how NFC works on a SIM card, what are the standardization bodies, roles and actors in the ecosystem.
This presentation is for developers and describes technical architecture to implement a NFC application on a SIM card using Java and APDU commands (JSR-177, 257 and 268).
These slides will be presented during the Smart University 2009 in Nice, Sophia-Antipolis.
NFC Development with Qt - v2.2.0 (5. November 2012)Andreas Jakl
Learn developing Near Field Communication (NFC) apps for Nokia's Symbian and MeeGo phones with step-by-step tutorials!
The three development options Qt, Symbian native and Java ME are outlined. A more detailed explanation shows the Qt Mobility 1.2 APIs to create modern NFC applications for smartphones.
In the final part, step-by-step hands-on tutorials walk you through developing your first two NFC apps. The first demo extends an example from the Qt SDK with reading & writing both URI and text NDEF records to create new sticky notes on the virtual corkboards visible on the screen. The second demo uses the LLCP protocol to create a peer-to-peer chat application between two NFC Forum compatible devices.
On Relaying NFC Payment Transactions using Android devicescgvwzq
NFC (Near Field Communication) defines the set of RFID standards designed to bidirectionally communicate via wireless and interchange data point-to-point between devices in proximity, normally a few centimeters (up to 10cm). Services that use NFC communications as contactless payments are exponentially growing: Public transport, parkings, fast supermarket cashers, vending machines and even NFC-capable credit/debit cards.In this talk, we investigate relay attacks in NFC-capable credit/debit cards. This attack exploits the communication proximity principle in NFC, which is shown to be non secure. Although a lot of attack countermeasures exist, they do not face with this attack vector since up to date special hardware was required to perform it. However, the story is rewritten with the NFC-capable mobile devices available in the market.
This work shows how nowadays a relay attack in NFC-capable credit/debit cards is possible using an NFC-capable Android device without further modifications (i.e., no root permissions, custom firmware, or custom OS are required). A PoC app implementing the attack is shown in the talk, as well as distributed relay attack scenarios that might become real before long.
Presentation by Terunao Tsuchiya, NFC Forum Board representative for Dai Nippon Printing, from March 11, 2016 at Asia Pacific Smart Card Association
Presentation includes the NFC Forum mission and strategic focus for 2016, a review of the latest market developments, use-cases of NFC Payment, Transportation and IoT In Action, and a overview of the Role of the NFC Forum.
Guide du tag NFC : quels usages dans quels contextes ?Olivier Devillers
Guide rédigé pour le Forum SMSC sur le tag NFC (Etiquette intelligente lisible avec un smartphone NFC) et ses usages dans le commerce, le tourisme, les transports publics.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Essentials of Automations: Optimizing FME Workflows with Parameters
Near Field Communication (NFC Architecture and Operating Modes)
1. SECURE MOBILE TRANSACTIONS USING
NEAR FIELD COMMUNICATION
DEEPAK K.L
Sree Chitra Thirunal
College of Engineering
2. NFC – What is it ???
NFC or Near Field Communication is a short range high
frequency wireless communication technology.
A radio communication is established by touching the two
phones or keeping them in a proximity of a few centimeters.
NFC is mainly aimed for mobile or handheld devices.
NFC is an extension of Radio frequency identification.
It is a form of contactless communication between devices.
3. WHY NFC?
Can replace your wallets
NFC tags for task launcher
Can transfer electric charge from one device to another
device
Can work along with Bluetooth
Pairing Bluetooth devices in quick time
4. Operating Ranges
Distance: 10 cm or less
Operates at rates ranging from 106kBit/s to 424 Kbit/s
Lower power consumption
5. WORKING OF NFC
NFC is based on inductive-coupling.
NFC works using magnetic induction between two loop
antennas.
A reader emits a small electric current, which creates a
magnetic field .
That field is received by a similar coil in the client
device, where it is turned back into electrical impulses to
communicate data.
So, NFC use an initiator and a target.
8. Host Controller(HC)
•Heart of the NFC enabled mobile phone
•Also called as baseband controller
•HC interface Creates a bridge between the NFC Controller and the
Host Controller
•Sets the operating modes of the NFC controller through the HC
Interface
NFC Controller
•Secure proximity transactions with external NFC devices
•Secure Element is directly connected to NFC Controller
9. SECURE ELEMENT(SE)
•Users and service providers assured that transaction takes place
in protected environment
•Combination of h/w, s/w, interfaces, and protocols embedded in a
mobile handset
•Enables secure storage
•More secure for storing credential data than storing in removable
storage locations
11. SE option for an NFC enabled mobile phone are;
1)Embedded hardware in a mobile device as an integral, non-removable
part of the device.
2) Secure Memory Card (SMC) as a secure storage area in a
removable smart card.
3)UICC as a physical smart card and may be the most popular
one.
13. Embedded hardware
A smart card soldered onto the mobile phone that cannot be
removed
Level of security is high
Embedded into the mobile phone during the manufacturing stage
i.e. soldered
Can be personalized but cannot be transferred to another device
14. Secure Memory Card
It is a combination of a memory card and a smart card
Large storage space
More credential information can be stored
Can be inserted into a new device easily
15. UICC
Universal Integrated Circuit Card
It is commonly known as a SIM
Ensures the integrity and security of all kinds of personal
data
Can host as non-telecom applications such as payment,
loyalty, ticketing, e-passport, and so on
The cardholders can be reassured that transactions are
executed with their personal information protected
16. Communication Modes
Active mode-
Inducing magnetic
field
In this mode, both devices with NFC chip can generate an
electromagnetic field and exchange information with each other.
Two NFC enabled devices transferring
data in active mode
17. Passive mode-
A passive device, such as an
NFC tag, contains information
that other devices can read but
does not read any information
itself, so there is only one
active user.
A NFC-enabled mobile phone is paired
with a RFID-tagged "smart poster"
20. Read data and alter stored in NFC tags
Can take appropriate actions on what stored in NFC
tags
Does not require a secure area
The process only reads data stored inside the passive
tag and writing data to the passive tag.
21. Protocol Stack Architecture of Reader/Writer
Mode
•Analog is related to RF characteristics of NFC devices
and determines the operating range of devices.
•Digital protocols refer to the digital aspects of standards,
and define building blocks of the communication.
•Tag operations indicate the commands and instructions
used by NFC devices to operate NFC .
•NDEF applications are based on NDEF specifications
such as smart poster and reading product information from
NFC enabled smart shopping fliers.
•Non NDEF applications are vendor specific applications
such as an electronic purse balance reader and contactless
ticket reader which are not based on NDEF specifications.
22. NDEF message and NDEF
record
Eg):
new NdefRecord(NdefRecord.TNF_MIME_MEDIA, "text/plain".getBytes(), new byte[0],
"Hello, NFC World!".getBytes())
23. Permissions and
preparation
In order for an application to be able to use NFC hardware and software of a
device, it must have the NFC permission, so add the following line to your
AndroidManifest.xml:
<uses-permission android:name="android.permission.NFC" />
Since NFC is a fairly new technology, it will not work with older versions of
Android - according to developer.android.com, minimum API level 10 is
recommended:
<uses-sdk android:minSdkVersion="10"
android:targetSdkVersion="17" />
If your application can’t do its work on non NFC-enabled devices, you can make
sure that only compatible devices will see your app in the store:
<uses-feature android:name="android.hardware.nfc"
android:required="true" />
24. A simple write to a tag
private boolean writeTag(final NdefMessage pMessage, final Tag pTag)
{
Ndef ndef = Ndef.get(pTag);
try {
if (ndef != null)
{
ndef.connect();
if (messageSize > ndef.getMaxSize())
{
logAndToast("Write failed - message size exceeds tag size");
return false;
}
if (!ndef.isWritable())
{
logAndToast("Write failed - tag is not writable");
return false;
}
ndef.writeNdefMessage(pMessage); logAndToast("Write completed");
return true;
}
27. Analog and digital protocols are lower layer protocols .
LLCP allows the transfer of upper layer information units
between two NFC devices .
Protocol bindings provide standard bindings to NFC Forum
protocols and allow interoperable use of registered
protocols.
28. Simple NDEF exchange protocol allows exchange of NDEF
messages. It is also possible to run other protocols over the
data link layer provided by LLCP.
Applications may run over the simple NDEF exchange
protocol, other protocols, or NFC Forum protocols. Example
applications are printing from a camera, business card
exchange, and so on.
30. Here NFC enabled mobile phone acts as a smart card.
User touches the mobile phone to an NFC reader.
The NFC reader initiates the communication.
NFC mobile behaves like a standard smart card.
NFC reader interacts with the payment applications on the
Secure Element.
Only card emulation mode uses SE efficiently and securely
to perform functions that require high security.
31. APPLICATIONS OF NFC
1) Touch and go
Applications such as access control, where the user needs only to
bring the device storing the ticket or access code close to the reader.
A person gathering info
about a movie using his
NFC enabled Mobile
Phone
32. 2) Touch and Confirm
Applications such as mobile payment where the
user has to confirm the interaction by entering a
password or just accepting the transaction.
33. 3) Touch and Connect
Linking two NFC-enabled devices to
enable peer to peer transfer of data.
4) A latest development is that NFC can
be used to configure Wi-Fi networks
through mobile devices.
34. Security Concerns with NFC Technology
Eavesdropping
Data Corruption and Manipulation
Interception Attacks
Theft
35. COUNTER MEASURES
Use secure channel (only the authorized device could
decode the encrypted information).
Some NFC devices “listen” for data corruption attacks and
prevent them before they have a chance to get up and
running.
Use Active – Passive modes with encrypted keys
Keeping phone’s password protected.
36. ADVANTAGES OF NFC
High convenience to the user.
Reduces cost of electronic issuance .
Secure communication.
No manual configuration and settings.
No search and pair procedure.
NFC can be used together with existing technologies
like Bluetooth and thus act for longer range also.
NFC uses are practically limitless.
37. DISADVANTAGES OF NFC
The system has the limitation that it can be operated only with devices
under a short range i.e. around 10 cm.
The data transfer rate is very less at about 106kbps, 212 kbps and
424kbps.
Eavesdropping
Data Corruption and Manipulation
Theft
39. Future Aspects
Vehicle Ignition
A NFC enabled vehicle can be unlocked and started just by tapping the User’s
NFC device onto the vehicle, thus removing the need of keys.
Can find the health of vehicle by using specific apps
Unlocking Door
Smart keyless doors can be made by implementing NFC technology into doors,
where a single tap of the device onto the door would unlock it
40. Conclusion
NFC is implemented in most handheld devices now a days.
The advancements in mobile wireless technology and
communication standards have enabled usage of contactless
and NFC based payment models.
The mobile wallet based payment model is gaining
considerable momentum and is currently being seen as one of
the key payment model.
The mobile wallet technology enables the end-users to make
payments with their mobile wallet accounts, without having to
use credit or debit cards.
41. REFERENCES
http://www.nfc-forum.org
http://en.wikipedia.org/wiki/Near_field_communication
http://www.nfccommunication.org
http://apcmag.com/inside-nfc-how-near-field-communication-works.html
http://www.mobilecommercepress.com
Google. "Google Wallet: How it Works." (Jan. 28, 2012)
http://www.google.com/wallet/how-it-works.html#in-store
Kessler, Sarah. "NFC Technology: 6 Ways it Could Change Our Daily Lives
" Mash able “ . May 6, 2010. (Feb. 6, 2012)
http://mashable.com/2010/05/06/near-field-communication/