Near field communication (NFC) allows short-range wireless data exchange between devices when they are brought within close proximity of a few centimeters. It has applications in contactless payments, data sharing, and connecting devices like pairing Bluetooth headsets. NFC operates at 13.56 MHz and supports data transfer rates up to 424 Kbit/s. It provides advantages over RFID and Bluetooth through faster setup and lower power consumption. Common uses of NFC include mobile payments, social networking, smartphone automation through NFC tags, and data sharing through technologies like Android Beam. The future of NFC may include uses in vehicle ignition, electronic ticketing, mobile commerce, and health monitoring.
Near Field Communication (NFC) by LogeshLogesh Kumar
Explaining the NFC (Near Field Communication) Technology, Evolution, Operating Specification, Applications, Pros & Cons.
(This slide contains video files, its good to view the slide after downloading to your PC)
Near field communication (NFC) is a set of standards for smartphones and similar devices to establish radio communication with each other by touching them together or bringing them into proximity, usually no more than a few inches.
Near Field Communication (NFC) by LogeshLogesh Kumar
Explaining the NFC (Near Field Communication) Technology, Evolution, Operating Specification, Applications, Pros & Cons.
(This slide contains video files, its good to view the slide after downloading to your PC)
Near field communication (NFC) is a set of standards for smartphones and similar devices to establish radio communication with each other by touching them together or bringing them into proximity, usually no more than a few inches.
Near Field Communication is a very Versatile wireless technology. It has its range up to just 10-20 cm, but its short range is its advantage. Lets explore this technology and try to exploit it.
What is NFC?
NFC or Near Field Communication is a short range high frequency wireless communication technology.
A radio communication is established by touching the two phones or keeping them in a proximity of a few centimetres.
NFC is mainly aimed for mobile or handheld devices.
NFC is an extension of Radio frequency identification or RFID technology.
RFID is mainly used for tracking and identification by sending radio waves.
Near Field Communication is a short range high frequency wireless communication technology. Which enables the exchange of data between devices over a distance of up to 10 centimeters.
In This presentation we will go through
Introduction
Evolution of NFC Technology
How NFC work
NFC mode of communication ,tags & Operation
Comparison with existing technique
Application & Uses of NFC
NFC Security
Advantages& Disadvantages of NFC
Conclusion
Near Field Communication is a very Versatile wireless technology. It has its range up to just 10-20 cm, but its short range is its advantage. Lets explore this technology and try to exploit it.
What is NFC?
NFC or Near Field Communication is a short range high frequency wireless communication technology.
A radio communication is established by touching the two phones or keeping them in a proximity of a few centimetres.
NFC is mainly aimed for mobile or handheld devices.
NFC is an extension of Radio frequency identification or RFID technology.
RFID is mainly used for tracking and identification by sending radio waves.
Near Field Communication is a short range high frequency wireless communication technology. Which enables the exchange of data between devices over a distance of up to 10 centimeters.
In This presentation we will go through
Introduction
Evolution of NFC Technology
How NFC work
NFC mode of communication ,tags & Operation
Comparison with existing technique
Application & Uses of NFC
NFC Security
Advantages& Disadvantages of NFC
Conclusion
The three most important NFC (Near Field Communication) scenarios for Windows 8 / Windows Phone 8 (WP8) app developers:
- Discover Your App
- Share to Others
- Seamless Multi-User Games & Collaboration
This presentation describes these three scenarios, and shows you how to implement them in C# from a technical perspective. It contains examples for both Windows 8 and Windows Phone 8 development, based on the new Windows Proximity APIs.
In addition, this presentation contains a quick overview of NFC as a technology, as well as pointers towards tools and documentation, including the open source NDEF library for more powerful and sophisticated NFC tag writing and reading tasks.
This presentation focuses on exploring what Near Field Communication (NFC) in Android is and how its power can be harnessed through Android. Details of the available classes and interfaces available in Android to use NFC.
Near Field Communications (NFC) is an evolution of contactless data exchange which is being employed in mobile phone applications for data exchange and payment processing, among other applications. This presentation covers the evolution and technical details of this communications protocol along with compliance testing requirements.
Learn more: http://wireless-connectivity-test.com
Near Field Communication (NFC) is an emerging short-range radio technology that is poised to revolutionise how we use mobile phones in everyday interactions. In this webinar, we’ll introduce the basics of NFC and how the technology is implemented in Nokia Lumia phones. We’ll also demonstrate how you can use NFC via Microsoft Windows Phone 8’s Proximity API in your applications to share content, read data from and write data to NFC tags, and create your own application-launch tags. We suggest that you install the Microsoft Windows Phone SDK 8.0 in advance to get the most out of this training lab. While you’ll learn a lot with or without the SDK, you’ll learn even more if you have the SDK installed and can begin using the API as soon as you complete the training. Also, it will be helpful to have a Nokia Lumia phone built on Windows Phone 8 available for testing.
The quick walkthrough will show you how to create your first NFC app for Windows Phone 8.
The NearSpeak app (available soon in the WP Store) writes voice NFC tags - touch the tags again to hear your message! Leave notes for your partner, reminders for yourself, or use them for a fun public social experiment.
This hands-on tutorial will show you how to create this app. You will see how to write a LaunchApp tag using the NDEF Library for Proximity APIs, how to recognize text spoken by the user, and how to use the speech synthesizer to let the phone read the text again.
Note that the instructions require basic knowledge of Windows Phone development.
Near Field Communication (NFC) technology makes life easier and more convenient for consumers around the world by making it simpler to make transactions, exchange digital content, and connect electronic devices with a touch.
NFC traces its roots back to radio-frequency identification, or RFID. RFID allows a reader to send radio waves to a passive electronic tag for identification, authentication and tracking.
2004 Nokia, Philips and Sony established the Near Field Communication (NFC) Forum.
2006 Initial specifications for NFC Tags.
2006 Nokia 6131 was the first NFC phone.
2009 In January, NFC Forum released Peer-to-Peer standards to transfer contact, URL, initiate Bluetooth, etc.
2010 Samsung Nexus S: First Android NFC phone shown.
2013 Samsung and Visa announce major partnership to develop mobile payments
NFC was approved as an ISO/IEC standard on December 8, 2003 and later as an ECMA standard.
ISO/IEC 18092 / ECMA-340 - Near Field Communication Interface and Protocol-1 (NFCIP).
ISO/IEC 21481 / ECMA-352 - Near Field Communication Interface and Protocol-2 (NFCIP-2).
NFC incorporates a variety of existing standards including ISO/IEC 14443.
In addition, the NFC Forum has defined a common data format called NFC Data Exchange Format (NDEF).
As with proximity card technology, near-field communication uses magnetic induction between two loop antennas located within each other's near field, effectively forming an air-core transformer.
NFC always involves an initiator and a target; the initiator actively generates an RF field that can power a passive target.
This enables NFC targets to take very simple form factors such as tags, stickers, key fobs, or cards that do not require batteries.
NFC peer-to-peer communication is possible, provided both devices are powered.
Most of the RF energy is concentrated in the allowed ±7 kHz bandwidth range, but the full spectral envelope may be as wide as 1.8 MHz when using ASK modulation
NFC is a set of short-range wireless technologies, typically requiring a distance of 10 cm or less.
NFC operates at 13.56 MHz on ISO/IEC 18000-3 air interface and at rates ranging from 106 kbit/s to 424 kbit/s.
It operates within the globally available and unlicensed radio frequency ISM band of 13.56 MHz.
Theoretical working distance with compact standard antennas: up to 20 cm (practical working distance of about 4 cm).
Supported data rates: 106, 212 or 424 kbit/s (the bit rate 848 kbit/s is not compliant with the standard ISO/IEC 18092).
NFC devices are able to receive and transmit data at the same time.
The 'digital wallet' exists in the cloud, and it is not tethered to one specific device such as a mobile phone, but accessible from a variety of devices such as laptop, iPad, ultrabook or even Xbox.
http://en.wikipedia.org/wiki/Near_field_communication
http://electronics.howstuffworks.com/near-field-communication6.htm
http://en.wikipedia.org/wiki/List_of_NFC-enabled_mobile_devices
http://www.techradar.com/news/phone-and-communications/what-is-nfc-and-why-is-it-in-your-phone-948410
http://near-field.blogspot.in/p/pros-cons.html
Near field communication (NFC) is a set of standards for smartphones and similar devices to establish
NFC is based on a short-range wireless connectivity, designed for simple and safe interaction between electronic devices. It is easy to use wireless communication interface for last few centimetres . Connection between two devices is established just by holding the devices close to each other or touch them together.
Near Field Communications - NFC - Uses, Applications, Cost and Much MorePraful Manjunath
Near-field communication (NFC) is a set of communication protocols that enable two electronic devices, one of which is usually a portable device such as a smartphone, to establish communication by bringing them within 4 cm (1.6 in) of each other.
See More!!
Near Field Communication or NFC, is a short-range high-frequency wireless communication technology which enables the exchange of data between devices over about a 10centimeter (around 4 inches) distance. NFC is an integration of Radio Frequency Identification (RFID) technology with mobile devices. The technology is a simple extension of the ISO 14443 proximity-card standard (contactless card, RFID) that combines the interface of a smartcard and a reader into a single device. NFC operates at 13.56MHz and has 424kbps maximum data transfer rate. NFC technology is being grown up at enormous speed as it provides the fastest way to communicate between two devices within a fraction of the second. Also, NFC offers a quick and convenient method of interaction between humans and NFC enabled devices. An NFC device can communicate with both existing ISO 14443 smartcards and readers, as well as with other NFC devices, and is thereby compatible with existing contactless infrastructure already in use for public transportation and payment. This technology has only been implemented on smartphones so far. Near-field Communication is characterized as a very short-range radio communication technology with a lot of potentials, especially when applied to mobile handsets. Usage of NFC includes the electronic wallet to make payments using the handset, the same way as credit cards. Several security issues are attached with NFC, which is a big concern. Security attacks like eavesdropping, data corruption and modification, interference attacks and theft, are the most dangerous for the customer who is using his/her smartphone for payment purpose.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™UiPathCommunity
In questo evento online gratuito, organizzato dalla Community Italiana di UiPath, potrai esplorare le nuove funzionalità di Autopilot, il tool che integra l'Intelligenza Artificiale nei processi di sviluppo e utilizzo delle Automazioni.
📕 Vedremo insieme alcuni esempi dell'utilizzo di Autopilot in diversi tool della Suite UiPath:
Autopilot per Studio Web
Autopilot per Studio
Autopilot per Apps
Clipboard AI
GenAI applicata alla Document Understanding
👨🏫👨💻 Speakers:
Stefano Negro, UiPath MVPx3, RPA Tech Lead @ BSP Consultant
Flavio Martinelli, UiPath MVP 2023, Technical Account Manager @UiPath
Andrei Tasca, RPA Solutions Team Lead @NTT Data
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
Enhancing Performance with Globus and the Science DMZGlobus
ESnet has led the way in helping national facilities—and many other institutions in the research community—configure Science DMZs and troubleshoot network issues to maximize data transfer performance. In this talk we will present a summary of approaches and tips for getting the most out of your network infrastructure using Globus Connect Server.
The Metaverse and AI: how can decision-makers harness the Metaverse for their...Jen Stirrup
The Metaverse is popularized in science fiction, and now it is becoming closer to being a part of our daily lives through the use of social media and shopping companies. How can businesses survive in a world where Artificial Intelligence is becoming the present as well as the future of technology, and how does the Metaverse fit into business strategy when futurist ideas are developing into reality at accelerated rates? How do we do this when our data isn't up to scratch? How can we move towards success with our data so we are set up for the Metaverse when it arrives?
How can you help your company evolve, adapt, and succeed using Artificial Intelligence and the Metaverse to stay ahead of the competition? What are the potential issues, complications, and benefits that these technologies could bring to us and our organizations? In this session, Jen Stirrup will explain how to start thinking about these technologies as an organisation.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
NFC TECHNOLOGY
1. Sitaram naranjibhai patel inStitUte OF
teCnOlOGY anD reSearCh Centre
Near field communication
Guided By:
Prof.Bhavesh Patel
Submitted By:
Kinjal Pandya
2. Contents
• Introduction
• Near Field & Far Field
• Technical Architecture
• Technology Overview
• Comparison of other technology
• Communication Mode
• Security Aspect
• User & Application
• Future NFC
• Advantages and disadvantages
• Conclusion
3. INTRODUCTION
• Near field communication (NFC) is a set of standards
for smartsphones and similar devices to establish
radio communication with each other by touching them together or
bringing them into close proximity, usually no more than a few
centimetres. Present and anticipated applications include contactless
transactions, data exchange, and simplified setup of more complex
communications such as Wi-Fi.
• NFC is a short-range wireless technology.
• NFC provides unique advantages over other available wireless
technologies.
• The design includes a near-field transmitter and receiver to send data
from one computer to another
4. • NFC is mainly aimed for mobile or handheld devices.
• NFC is an extension of Radio frequency identification
or RFID technology.
• RFID is mainly used for tracking and identification by
sending radio waves.
• Enables the exchange of data between devices over
a distance of up to 20 centimeters.(4 cm Practically)
5. Near Field & Far Field
• The terms “far field” and “near field” describe the fields
around an antenna or, more generally, any electromagnetic-
radiation source .
• The names imply that two regions with a boundary between
them exist around an antenna.
• Actually, as many as three regions and two boundaries exist.
7. CARD EMULATION MODE
• The NFC device behaves as a contactless smart card.
• The external card reader accesses the secure
elements of the device, such as Universal Subscriber
Identity Module (USIM) and embedded Secure
Element (eSE), that are compatible with the
contactless card technology.
• This enables contactless payments and ticketing by
NFC enabled phones without changing the existing
infrastructure. Mobile payment, ticketing access
control etc are use case of this category.
8. Card Emulation Mode Block Diagram
Proprietary contactless card applicationse.g.,
payment, ticketing, access controlBased on
ISO 14443 A/B .
9. READER WRITER MODE
• In this use case, NFC enabled device (for example mobile
phones) can read or write data to NFC tag.
• NFC enabled smart poster is one example. Inside the
poster there is embedded NFC tag where more
information is written about the product.
• Device and read and act accordingly what is written in
the tag.
10. READER WRITER MODE DIAGRAM
Define how to read and write NDEF data from/to a tag
Types 1 and 2: Proprietary tags based on ISO14443 Type A
Type 3: Proprietary tag based on FeliCa
Type 4: Open tag based on ISO 14443 Type A or B and ISO 7816-4
NFC Forum-defined reference
applications, e.g., connection handover,
smart posterNFnC Forum-defined
reference applications, e.g., connection
handover, smart posterposter
Proprietary applications that
communicate with contactless
cards, e.g., electronic purse balance
reader, contactless ticket reader
Proprietary tag-
based
applications
using NDEF, e.g.,
reading
information on
medicine bottles
11. PEER TO PEER MODE
• In this mode two NFC enabled devices can exchange
data with each other.
• Both devices take part in the communication.
• One example could be business card exchange.
• Another example could be pairing Bluetooth headset
with the help of NFC enabled phone.
• Third example could be NFC chat application where
two phones can take part in data exchange as
specified by NFC forum.
12. Peer to Peer Mode block diagram
Link activation, supervision, deactivation
Asynchronous balanced mode
Protocol multiplexing
Connectionless transport
Connection oriented transport
Protocol to allow the exchange of NDEF
messages in Peer ModeAnalogous to tag
operation specifications
Provides standard bindings (e.g., port numbers) to
NFC Forum registered protocols. Allows
interoperable use of registered protocols
Provides standard
bindings (e.g., port
numbers) to NFC
Forum registered
protocols. Allows
interoperable use
of registered
protocols
NFC Forum reference applications
may be run over the Simple NDEF
exchange protocol
Peer to peer
applications –
e.g., printing
from a camera,
business card
exchange, third
party NDEF
applications
13. Technology Overview
• NFC is a set of short-range wireless technologies,
typically requiring a distance of 4 cm or less.
• NFC operates at 13.56 MHz on ISO/IEC 18000-3 air
interface and at rates ranging from 106 Kbit/s to 424
Kbit/s.
• Supported data rates: 106, 212 or 424 kbit/s
• NFC employs two different codlings to transfer data. If
an active device transfers data at 106 kbit/s, a
modified Miller coding with 100% modulation is used.
In all other cases Manchester coding is used with a
modulation ratio of 10%.
14. Comparison with RFID technology
• Basically, the technologies Radio Frequency
Identification and Near Field Communication use the
same working standards.
• However, the essential extension of RFID is the
communication mode between two active devices.
• In addition to contactless smart cards (ISO 14443
[7]), which only support communication between
powered devices and passive tags, NFC also provides
peer-to-peer communication
15. Comparison with Bluetooth
• NFC and Bluetooth are both short-range communication
technologies .
• NFC operates at slower speeds than Bluetooth, but consumes far
less power and doesn’t require pairing.
• NFC sets up faster than standard Bluetooth.
• The connection between two NFC devices is automatically
established quickly: in less than a tenth of a second.
• The maximum data transfer rate of NFC (424 kbit/s) is slower than
that of Bluetooth V2.1 (2.1 Mbit/s).
18. ACTIVE MODE
• Both initiator and target device communicate by alternately
generating their own fields. A device deactivates its RF field
while it is waiting for data. In this mode, both devices typically
have power supplies.
19. PASSIVE MODE
• The initiator device provides a carrier fields and the target
device answers by modulating the existing field. In this mode,
the target device may draw its operating power from the
initiator-provided electromagnetic field.
20. HOW IT WORKS
• In the reader (phone) , when the NFC in the device is active
then it continuously generates periodic sine wave signal at
frequency 13.56 MHz center frequency.
• tag gets energy from the magnetic fluxes and create counter
frequency
• The changes are detected by the phone and phone knows
that there is a tag nearby.
• RFID systems communicating on very short range are
commonly known as close couple systems.
• Range 0 to 1 cm.
21. • This means that the tag has to be placed either in the reader
or more or less pressed against the reader device.
• The benefit from these short distances is that a rather large
amount of energy can be extracted from the magnetic field
by the tag.
• Close coupling is also preferred for systems with high security
requirements.
24. USE OF NFC
• NFC technology is currently mainly aimed at being
used with mobile phones. There are three main use
cases for NFC:
– card emulation: the NFC device behaves like an existing
contactless card
– reader mode: the NFC device is active and read a passive
RFID tag, for example for interactive advertising
– P2P mode: two NFC devices are communicating together
and exchanging information.
25. APPLICATIONS
• Commerce: NFC devices can be used in contactless payment
systems, similar to those currently used in credit cards and
electronic ticket smartcards, and allow mobile payment to
replace or supplement these systems.
• Social networking: Sharing contacts, photos, videos or files ,
and entering multiplayer mobile games in the field of social
networking it is very useful to exchange the contacts & other
files.
• Smartphone automation and NFC tags : Smart phones
equipped with NFC can be paired with NFC tags or stickers
which can be programmed by NFC apps to automate tasks.
26. ANDROID BEAM
• Android Beam is a feature of the Android mobile operating
system to allow data to be transferred via near field
communication (NFC) .
• It allows the rapid short-range exchange of web bookmarks,
contact info, directions, YouTube videos, and other data.
Android Beam was introduced in Android version 4.0 (Ice
Cream Sandwich).
27. GOOGLE WALLET
• Google Wallet is a mobile payment system developed by
Google that allows its users to store debit cards, credit cards,
loyalty cards, and gift cards among other things, as well as
redeeming sales promotions on their mobile phone.
• Google Wallet can use near field communication (NFC) to
"make secure payments fast and convenient by simply
tapping the phone on any PayPass-enabled terminal at
checkout.“
28. ADVANTAGES
• High convenience to the user, because the
data exchange is done by bringing two
mobiles together.
• Versatility
• Reduces cost of electronic issuance .
• Secure communication.
• No special software.
• No search and pair procedure.
29. DISADVANTAGES
• The system has the limitation that it can be operated
only with devices under a short range i.e around 10
cm.
• The data transfer rate is very less at about 106kbps,
212 kbps and 424kbps.
• Can be costly for merchant companies to initially
adopt the technology.
30. FUTURE OF NFC
• Vehicle Ignition
• Electronic Ticketing
• Electronic Money
• Travel Card
• Identity Document
• Mobile commerce
• Electronic keys— car keys, house/office keys, hotel room keys, etc.
• NFC can be used to configure and initiate other wireless network
connections such s Bluetooth , Wi-Fi or Ultra-wideband.
• NFC for Health Monitoring in Daily Life .
31. Latest News about NFC
• Google is working with Citi group and
MasterCard on NFC mobile payment solution.
• Airlines move closer to NFC tech for
passengers-NFC allows a smartphone to be
used to “tap and check-in” or “tap and board”
their flight.
• “Ra-One” is the first Indian movie to be
marketed through NFC.
32. CONCLUSION
• Mobile handsets are the primary target for NFC and
soon NFC will be implemented in most handheld
devices. Even though NFC have the shortest range
among radio frequency technologies, combining
them with existing technologies like Bluetooth or
Infrared can increase its range of applications.