NFC is a short-range wireless technology that allows data exchange when devices are touched or brought within close proximity. It uses magnetic field induction to enable communication between devices operating within a 10cm range. NFC standards have been developed for identification cards and RFID communication. Common uses of NFC include contactless payments, data sharing between devices, and pairing devices via Bluetooth or WiFi setup. Security aspects of NFC include risks of eavesdropping, data modification, and unauthorized access if an NFC device is lost. Future applications may involve using NFC for vehicle ignition and unlocking smart doors.
NFC: ADVANTAGES, LIMITS AND FUTURE SCOPEIJCI JOURNAL
Near Field Communication (NFC) Technology represents short range (practically up to 4 cm) wireless communication offering safe yet simple and intuitive communication between electronic devices that we use on a daily basis. Users of devices having NFC application in it can simply touch their devices to other
similar elements having NFC application to communicate with them, making application and data usage easy and convenient. NFC can be called as the next generation of Radio Frequency Identification (RFID) as technically its working principal is based on RFID however from application point of view it is similar to Bluetooth in some ways since it allows communication between two active devices. NFC can be the future medium of contactless electronic payment as it inhibits eavesdropping on NFC - enabled transactions pertaining to its short range, however range can be extended by attackers using some range extension system. In this paper we briefly discussed the advantages, limits or challenges of NFC technology along with its applications which opens up exciting new usage scenarios for mobile devices.
NFC: ADVANTAGES, LIMITS AND FUTURE SCOPEIJCI JOURNAL
Near Field Communication (NFC) Technology represents short range (practically up to 4 cm) wireless communication offering safe yet simple and intuitive communication between electronic devices that we use on a daily basis. Users of devices having NFC application in it can simply touch their devices to other
similar elements having NFC application to communicate with them, making application and data usage easy and convenient. NFC can be called as the next generation of Radio Frequency Identification (RFID) as technically its working principal is based on RFID however from application point of view it is similar to Bluetooth in some ways since it allows communication between two active devices. NFC can be the future medium of contactless electronic payment as it inhibits eavesdropping on NFC - enabled transactions pertaining to its short range, however range can be extended by attackers using some range extension system. In this paper we briefly discussed the advantages, limits or challenges of NFC technology along with its applications which opens up exciting new usage scenarios for mobile devices.
Mobile Transaction Using Near Field Communication(NFC)Shashank Lochan
This presentation highlights the potential of near field communication(NFC) as a secure mode of performing mobile banking and transaction.
It also shows a comparative study of google wallet and apple pay.
This presentation also highlights various use cases of near field communication in our day to day lives.
Near Field Communication (NFC) by LogeshLogesh Kumar
Explaining the NFC (Near Field Communication) Technology, Evolution, Operating Specification, Applications, Pros & Cons.
(This slide contains video files, its good to view the slide after downloading to your PC)
What is NFC?
NFC or Near Field Communication is a short range high frequency wireless communication technology.
A radio communication is established by touching the two phones or keeping them in a proximity of a few centimetres.
NFC is mainly aimed for mobile or handheld devices.
NFC is an extension of Radio frequency identification or RFID technology.
RFID is mainly used for tracking and identification by sending radio waves.
Mobile Transaction Using Near Field Communication(NFC)Shashank Lochan
This presentation highlights the potential of near field communication(NFC) as a secure mode of performing mobile banking and transaction.
It also shows a comparative study of google wallet and apple pay.
This presentation also highlights various use cases of near field communication in our day to day lives.
Near Field Communication (NFC) by LogeshLogesh Kumar
Explaining the NFC (Near Field Communication) Technology, Evolution, Operating Specification, Applications, Pros & Cons.
(This slide contains video files, its good to view the slide after downloading to your PC)
What is NFC?
NFC or Near Field Communication is a short range high frequency wireless communication technology.
A radio communication is established by touching the two phones or keeping them in a proximity of a few centimetres.
NFC is mainly aimed for mobile or handheld devices.
NFC is an extension of Radio frequency identification or RFID technology.
RFID is mainly used for tracking and identification by sending radio waves.
Introduction to the Interoperability InitiativeNFC Forum
Key take-aways of the NFC Forum – Introduction to the Interoperability Initiative presentation:
• RF Interoperability with mobile Public Transport Services is a reality
• All certified NFC-enabled mobile devices will work with Public Transport systems
• NFC Forum is leading the interoperability efforts.
This presentation was delivered at the APTA Annual Conference by Dr. Joerg Schmidt, Co-chair of NFC Forum Transport Special Interest Group (SIG)
For more info visit: http://nfc-forum.org/nfc-and-transport/
Near Field Communications (NFC) is an evolution of contactless data exchange which is being employed in mobile phone applications for data exchange and payment processing, among other applications. This presentation covers the evolution and technical details of this communications protocol along with compliance testing requirements.
Learn more: http://wireless-connectivity-test.com
NFC, short for Near Field Communication, is a short range wireless RFID technology that makes use of interacting electromagnetic radio fields instead of the typical direct radio transmissions used by technologies such as Bluetooth. It is meant for applications where a physical touch, or close to it, is required in order to maintain security. NFC is planned for use in mobile phones for, among other things, payment, in conjunction with an electronic wallet
Near Field Communication is a short range high frequency wireless communication technology. Which enables the exchange of data between devices over a distance of up to 10 centimeters.
In This presentation we will go through
Introduction
Evolution of NFC Technology
How NFC work
NFC mode of communication ,tags & Operation
Comparison with existing technique
Application & Uses of NFC
NFC Security
Advantages& Disadvantages of NFC
Conclusion
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
2. What is NFC?
NFC is a short range communication
technology that allows communications
to take place between devices that
either touch or momentarily held close
to each other.
It is based on Radio Frequency
Identification (RFID) technology.
It works via magnetic field induction
technology and operates on an
unlicensed radio frequency band.
3. Specifications
Two major specifications exist for NFC
technology:
– ISO/IEC 14443: It defines the ID cards used to
store information, such as that found in NFC tags.
– ISO/IEC 18000-3: It specifies the RFID
communication used by NFC devices.
Distance: 10 cm or less
Operates at rates ranging from 106kBit/s to
424 kBit/s.
5. Uses
NFC builds upon RFID systems by allowing two-way
communication between endpoints, where earlier systems
such as contactless smart cards were one-way only.
It has been used in devices such as Google Nexus, powered
with Ice Cream Sandwich, named with a feature called
"Android Beam" which was first introduced in Google Nexus.
Android Beam uses NFC to enable Bluetooth on both devices,
instantly pair them, and disable Bluetooth once complete
automatically on both devices. This only works between
Android devices version Jelly Bean and above.
The advantage of using WiFi Direct over Bluetooth is that it
is much faster than Bluetooth, having a speed of 300Mbit/s
for sharing large files.
Since unpowered NFC "tags" can also be read by NFC devices,
it is also capable of replacing earlier one-way applications.
6. Uses in Commerce
NFC devices can be used in contactless payment
systems, similar to those currently used in credit cards
and electronic ticket smartcards, and allow mobile
payment to replace or supplement these systems.
For example, Google Wallet allows consumers to store credit card and
store loyalty card information in a virtual wallet and then use an
NFC-enabled device at terminals that also accept MasterCard PayPass
transactions.
Germany, Austria, Finland, New Zealand, Italy, Iran and Turkey,
have trialed NFC ticketing systems for public transport. Vilnius fully
replaced paper tickets for public transportation with ISO/IEC 14443
Type A cards on July 1, 2013.
India is implementing NFC based transactions in box offices for
ticketing purposes.
A partnership of Google and Equity Bank in Kenya has introduced
NFC payment systems for public transport in the Capital city Nairobi
under the branding "Beba Pay"
7. Uses in Wifi and BT
NFC offers a low-speed connection with extremely
simple setup, and can be used to bootstrap more
capable wireless connections.
For example, the Android Beam software uses NFC to
complete the steps of enabling, pairing and establishing
a Bluetooth connection when doing a file transfer.
Nokia, BlackBerry and Sony have used NFC technology
to pair Bluetooth headsets, media players, and
speakers with one tap in its NFC-enabled devices.
The same principle can be applied to the configuration
of Wi-Fi networks.
8. Other Uses
NFC can be used in social networking situations, such as sharing
contacts, photos, videos or files, and entering multiplayer mobile
games. In the field of social networking NFC is very useful to
exchange contacts and other files.
The NFC Forum promotes the potential for NFC-enabled devices to act
as electronic identity documents and keycards. As NFC has a short
range and supports encryption, it may be more suitable than earlier,
less private RFID systems.
Smartphones equipped with NFC can be paired with NFC Tags or
stickers which can be programmed by NFC apps to automate
tasks.These programs can allow for a change of phone settings, a text
to be created and sent, an app to be launched, or any number of
commands to be executed, limited only by the NFC app and other apps
on the smartphone. These applications are perhaps the most practical
current uses for NFC since it does not rely on a company or
manufacturer but can be utilized immediately by anyone anywhere
with an NFC-equipped smartphone and an NFC tag.
9. Why NFC?
Wide Reach & Availability
Can be used in Various Situations
Very Easy to Use
Value Added Services
Compatible with existing RFID infrastructure
10. Comparison
Aspect
NFC
Bluetooth
Bluetooth
Low Energy
RFID
Compatible
ISO 18000 – 3
Active
Active
Standardisation
body
ISO/IEC
Bluetooth SIG
Bluetooth SIG
Network
Standard
ISO 13157
Network Type
Point to Point
WPAN
WPAN
Range
Less than 0.2
m
~ 100 m
~ 50 m
Frequency
13.56 MHz
2.4-2.5 GHz
2.4-2.5 GHz
Bit rate
424 Kbit/s
2.1Mbit/s
1 Mbit/s
Set up time
Less than 0.1 s
Less than 6 s
Less than
0.006s
IEEE 802.15.1 IEEE 802.15.1
12. Eavesdropping
The RF signal for the wireless data transfer can be
picked up with antennas. The distance from which an
attacker is able to eavesdrop the RF signal depends on
numerous parameters, but is typically a small number
of metres.
Also, eavesdropping is highly affected by the
communication mode. A passive device that doesn't
generate its own RF field is much harder to eavesdrop
on than an active device.
An attacker can typically eavesdrop within 10m and 1m
for active devices and passive devices, respectively. With
the use of a patch loop antenna it is possible to place a
receiver close to the target and disguise it. This is much
like ATM skimming in that it needs to be near the
location however in this case no contact with the device
13. Data Modification
It is easy to destroy data by using a jammer. There is no way currently
to prevent such an attack. However, if NFC devices check the RF field
while they are sending, it is possible to detect attacks.
It is much more difficult to modify data in such a way that it appears
to be valid to users. To modify transmitted data, an intruder has to
deal with the single bits of the RF signal. The feasibility of this attack,
(i.e., if it is possible to change the value of a bit from 0 to 1 or the
other way around), is amongst others subject to the strength of the
amplitude modulation.
If data is transferred with the modified Miller coding and a
modulation of 100%, only certain bits can be modified. A modulation
ratio of 100% makes it possible to eliminate a pause of the RF signal,
but not to generate a pause where no pause has been. Thus, only a 1
that is followed by another 1 might be changed. Transmitting
Manchester-encoded data with a modulation ratio of 10% permits a
modification attack on all bits.
14. Walk Off
Lawfully opened access to a secure NFC function or
data is protected by time-out closing after a period of
inactivity. Attacks may happen despite provisions to
shut down access to NFC after the bearer has become
inactive.
The known concepts described primarily do not address
the geometric distance of a fraudulent attacker using a
lost communication entity against lawful access from
the actual location of the registered bearer.
Additional features to cover such an attack scenario
dynamically shall make use of a second wireless
authentication factor that remains with the bearer in
case of the lost NFC communicator. Relevant
approaches are described as an electronic leash or its
equivalent, a wireless key.
15. Future Aspects
Vehicle Ignition
– A NFC enabled vehicle can be unlocked and started just by
tapping the User’s NFC device onto the vehicle, thus
removing the need of keys. It can also be used to
communicate between the device and the vehicle and also
find the health of vehicle by using specific apps
Unlocking Door
– Smart keyless doors can be made by implementing NFC
technology into doors, where a single tap of the device onto
the door would unlock it eradicating the need of a key to
open it.