91,99 €
This book provides the technical essentials, state-of-the-art knowledge, business ecosystem and standards of Near Field Communication (NFC)by NFC Lab – Istanbul research centre which conducts intense research on NFC technology.
In this book, the authors present the contemporary research on all aspects of NFC, addressing related security aspects as well as information on various business models. In addition, the book provides comprehensive information a designer needs to design an NFC project, an analyzer needs to analyze requirements of a new NFC based system, and a programmer needs to implement an application. Furthermore, the authors introduce the technical and administrative issues related to NFC technology, standards, and global stakeholders. It also offers comprehensive information as well as use case studies for each NFC operating mode to give the usage idea behind each operating mode thoroughly. Examples of NFC application development are provided using Java technology, and security considerations are discussed in detail.
Key Features:
This book will be an invaluable guide for business and ecosystem analysts, project managers, mobile commerce consultants, system and application developers, mobile developers and practitioners. It will also be of interest to researchers, software engineers, computer scientists, information technology specialists including students and graduates.
Sie lesen das E-Book in den Legimi-Apps auf:
Seitenzahl: 621
Veröffentlichungsjahr: 2011
Contents
Cover
Title Page
Copyright
Dedication
Preface
NFC Lab - Istanbul (www.NFCLab.com)
Our Motivation to Write This Book
Positive Discrimination
NFC: Is it a Big Success or Another Failure Instead?
Audience
Chapter Dependencies
Organization
Call for Feedback and Help
Acknowledgments
List of Acronyms
Chapter 1: Executive Summary
1.1 Towards NFC Era
1.2 Evolution of NFC
1.3 NFC Essentials
1.4 NFC Operating Modes and Essentials
1.5 SE and Its Management
1.6 NFC Application Development
1.7 NFC Security and Privacy
1.8 NFC Business Ecosystem
1.9 Usability in NFC
1.10 Benefits of NFC Applications
1.11 NFC Throughout the World
1.12 Status of Academic Research on NFC Literature
1.13 Chapter Summary
Chapter 2: Towards NFC Era
2.1 Ubiquitous Computing and NFC
2.2 Mobile Phones
2.3 Wireless Communication as a Communication Media for NFC Technology
2.4 RFID Technology
2.5 Smart Card Technology
2.6 Comparison between RFID Tags and Contactless Smart Cards
2.7 More on NFC
2.8 Chapter Summary
Chapter 3: NFC Essentials
3.1 Introduction to NFC
3.2 Standardization and Development Efforts of NFC Enabled Mobile Phones
3.3 General Architecture of NFC Enabled Mobile Phones
3.4 Physical Layer of NFC
3.5 Reader/Writer Operating Mode Essentials
3.6 Peer-to-Peer Operating Mode Essentials
3.7 Card Emulation Operating Mode Essentials
3.8 Chapter Summary
Chapter 4: NFC Operating Modes
4.1 Mobile Interaction Techniques
4.2 Classification of NFC Devices
4.3 Reader/Writer Mode
4.4 Peer-to-Peer Mode
4.5 Card Emulation Mode
4.6 Overview on Benefits of Operating Modes
4.7 Case Studies
4.8 Chapter Summary
Chapter 5: Developing NFC Applications
5.1 Initial Steps in NFC Application Development
5.2 Why Java?
5.3 Setting up the Environment for Java ME and NFC Programming
5.4 Introduction to Mobile Programing
5.5 NFC Application Development
5.6 Reader/Writer Mode Programing
5.7 Peer-to-Peer Mode Programing
5.8 Card Emulation Mode Programing
5.9 Reader/Writer Mode Case Study: NFC Shopping
5.10 Peer-to-Peer Mode Case Study: NFC Gossiping
5.11 Chapter Summary
Chapter 6: NFC Security and Privacy
6.1 Security in General
6.2 Security Tools and Mechanisms
6.3 NFC Security Framework
6.4 Privacy, Legal, and Ethical Aspects
6.5 Chapter Summary
Chapter 7: NFC Business Ecosystem
7.1 Business Ecosystem
7.2 Stakeholders in NFC Ecosystem
7.3 Business Models
7.4 Case Study: NFC Ticketing
7.5 Additional Reading: Pay-Buy-Mobile Project by GSMA
7.6 Chapter Summary
Chapter 8: Secure Element Management
8.1 Introduction to OTA Technology
8.2 GlobalPlatform Specifications
8.3 Life Cycle Management of SEs
8.4 Multiple SE Environments
8.5 Alternative TSM Based OTA Management Model
8.6 Chapter Summary
Chapter 9: NFC Cities and Trials
9.1 NFC Cities
9.2 NFC Trials and Projects
9.3 Chapter Summary
Index
This edition first published 2012 © 2012 John Wiley & Sons Ltd
Registered officeJohn Wiley & Sons Ltd, The Atrium, Southern Gate, Chichester, West Sussex, PO19 8SQ, United Kingdom
For details of our global editorial offices, for customer services and for information about how to apply for permission to reuse the copyright material in this book please see our website at www.wiley.com.
The right of the author to be identified as the author of this work has been asserted in accordance with the Copyright, Designs and Patents Act 1988.
All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, except as permitted by the UK Copyright, Designs and Patents Act 1988, without the prior permission of the publisher.
Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not be available in electronic books.
Designations used by companies to distinguish their products are often claimed as trademarks. All brand names and product names used in this book are trade names, service marks, trademarks or registered trademarks of their respective owners. The publisher is not associated with any product or vendor mentioned in this book. This publication is designed to provide accurate and authoritative information in regard to the subject matter covered. It is sold on the understanding that the publisher is not engaged in rendering professional services. If professional advice or other expert assistance is required, the services of a competent professional should be sought.
Library of Congress Cataloging-in-Publication DataCoskun, Vedat. Near field communication : from theory to practice / Vedat Coskun, Kerem Ok, and Busra Ozdenizci. p. cm. Includes bibliographical references and index. ISBN 978-1-119-97109-2 (cloth) 1. Near field communication. I. Ok, Kerem. II. Ozdenizci, Busra. III. Title. TK6570.N43C67 2012 621.384–dc23 2011033663
A catalogue record for this book is available from the British Library.
ISBN: 9781119971092
Vedat Coskun: To lovely members of my family; Mehmet & Fatma Filiz & Ozgur & Arda Mujdat & Kilinc & Muge & Selma.
Kerem Ok: To my family who supported me all the time
Busra Ozdenizci: To my dear parents and my brother Ozan
Preface
Near Field Communication (NFC) is a currently emerging and yet promising area which will have an enormous impact on the financial ecosystem as well as mobile technology throughout the world within just a few years. Mobile phone manufacturers, mobile network operators (MNOs), financial institutions such as banks, and information technology firms are performing R&D activities just to increase their share of the pie as much as possible. NFC, being a short range wireless communication technology that potentially facilitates mobile phone usage of billions of people throughout the world offers an enormous number of use cases including credit cards, debit cards, loyalty cards, car keys, access keys for hotels, offices and houses, eventually integrating all such materials into one single mobile phone. A solid and complete understanding of NFC requires knowledge in four areas: NFC technology; NFC security and privacy; NFC application development; and NFC business ecosystem. All of these issues are covered in this book which aims to present knowledge from theory to practice; including short use cases, case studies, application development examples, and finally existing featured trials from all over the world. This book provides information on NFC technology that appeals to the needs of almost all users interested in NFC technology and its ecosystem.
NFC Lab - Istanbul (www.NFCLab.com)
This book is the collective effort of NFC Lab - Istanbul researchers, which is an integral part of Işık University, Istanbul.
NFC Lab - Istanbul considers NFC as an emerging technology that transforms innovative ideas into reality for the future information and communication society.
NFC Lab - Istanbul strives for research excellence in focused research areas relevant to NFC. The Lab aims to collaborate with MNOs, financial institutions, government agencies, research institutes, trusted third parties, and other service providers to facilitate widespread usage of NFC applications.
The Lab is committed to work on NFC technology with a multidisciplinary network of expertise all around the world. The core team is accountable for creating and maintaining business and academic partnerships and dynamically generates networks on a project basis.
Our Motivation to Write This Book
We, the members of NFC Lab - Istanbul, have performed many academic and industrial tasks over the last few years. As we required information, we had to use web sources, white papers, academic papers, works of the standardization bodies and so on. Many times the information we retrieved from several sources conflicted. Indeed, sometimes the information we obtained was inaccurate. Also, the sources involved different approaches which could not be compared easily.
Despite the fact that NFC is an emerging area, the volume of new articles being generated is increasing on a daily basis, and a satisfactory amount of information can be found on the Internet. However, the task of gathering the information and then retrieving the required knowledge is tiresome and time consuming.
When a practitioner with some expertise of programming in Java decides to access this new area, it is necessary to find the required sources from different sources. This will not be trivial, because in order to build NFC applications using Java language, the practitioner needs to collect scattered information, and then merge it for a better understanding. Even in this case, the user would be able to collect a small amount of information.
Some basic information exists in the public domain, and much more exists in academic literature, which either is not publicly available, or not easy to combine with the public information by non-academics.
Although some basic information exists in the current literature, other information is still not available. For example, we have performed extensive ecosystem analysis in this work.
As a result, we recognized the lack of and the need for a solid source that contains accurate information and addresses all of those involved in NFC technology and the NFC business ecosystem with a standard content.
As a matter of fact, we were the right team for NFC. We were pleased when we produced some tangible products such as conference papers, journal papers, applications, scientific projects, commercial projects, courses and so on. We then thought that it might be beneficial to share our knowledge with others. But how could we do this? The solution was to write a book containing the collective knowledge of the members.
Positive Discrimination
For the sake of simplicity on using pronouns and positive discrimination, we have ignored male pronouns throughout this book. Hence, we have used only she, her, and herself and chosen to ignore he, him, his, and himself.
NFC: Is it a Big Success or Another Failure Instead?
History is indeed full of technological and ecosystem failures. The satellite phone network is one example. Only a few years ago, NFC was unknown. In a short period, NFC has been introduced to great enthusiasm by several organizations including governmental departments, research centers, and companies.
NFC usage was expected to boom over the last few years but this seems to have been postponed repeatedly until now. This has made many people from the industry suspicious about the potential success of NFC.
As a matter of fact, there are two major stumbling blocks to the success of NFC. The first is that of technological sufficiency, and the second is the ecosystem agreement by the interested parties. These issues are indeed very much related. As the involved parties become more convinced about the technical success of the new model, they tend to invest more resources for development, and as new technical improvements occur, the ecosystem becomes more established and ready for the boom. Also, when a party puts more investment into a project, it seems more eager to make an agreement with the other parties involved, in order to get their money back and hence to provide better Return of Investment (RoI).
Audience
This book is aimed at academicians, researchers, students, entrepreneurs, business and ecosystem analysts, consultants, practitioners, senior managers, product managers, project managers, software analysts, system developers and software developers who intend to invest in NFC, or at least want to have a broad knowledge of the area. The audience for each chapter is given below.
Chapter Dependencies
1.Executive Summary: This chapter does not require any prerequisite knowledge.
2.Towards NFC Era: Although this chapter does not require much background knowledge, we advise readers to read Chapter 1 to obtain an overall understanding of NFC technology. Readers of this chapter will learn the foundations of NFC technology and its evolution in detail.
3.NFC Essentials: We advise readers of this chapter to read Chapter 1 to gain general knowledge on NFC, and Chapter 2 to learn the foundation technologies of NFC in detail, so that the readers will appreciate the technical and communication essentials of NFC operating modes covered in this chapter.
4.NFC Operating Modes: Although this chapter does not require much background knowledge, we advise readers to read Chapter 1 to obtain an overall understanding of NFC technology. Readers of this chapter will learn about each operating mode in detail. They will be able to design NFC applications in each operating mode and also know the benefits of the designed application to the user.
5.Developing NFC Applications: This chapter requires general programming skills, as well as basic knowledge of Java technology. The readers should also have knowledge of the NFC operating modes described in Chapter 4 and some of the NFC technical essentials described in Chapter 3. Readers of this chapter will gain fundamental knowledge in NFC programming.
6.NFC Security and Privacy: Although this chapter does not require much background knowledge, we advise readers to read Chapter 1 to obtain an overall understanding of NFC technology. Readers of this chapter will learn about the security and privacy issues of NFC technology.
7.NFC Business Ecosystem: Although this chapter does not require much background knowledge, we advise readers to read Chapter 1 to obtain an overall understanding of NFC technology. Readers of this chapter will learn about the nature of a NFC business ecosystem from a holistic perspective.
8.Secure Element Management: We advise readers to read Chapter 1 to obtain an overall understanding of NFC technology, Chapter 3 to learn about the secure element and its infrastructure within NFC mobiles and Chapter 7 to appreciate the importance of the secure element and Over-the-Air (OTA) concepts in NFC business models.
9.NFC Cities and Trials: Although this chapter does not require much background knowledge, we advise readers to read Chapter 1 to obtain an overall understanding of NFC technology. Moreover, executive audiences of this chapter should also read Chapter 7. Readers of this chapter will learn about conducted projects, trials and implementations from all over the world and will analyze different NFC services from a holistic perspective. This will help readers to gain important knowledge about NFC service implementations around the world.
Organization
This book consists of nine chapters. They are arranged to make it easy for the reader to be able to select the material relevant to them. Potential readers of each chapter are specified in the chapter contents below.
Chapter 1: Executive Summary
This chapter consists of an executive and managerial summary on the NFC ecosystem and technology. The readers of this chapter will be able to obtain a high level introductory knowledge without being exposed to any unnecessary technical details. The readers will get enough information to understand what NFC is in almost all scenarios. People who intend to cover NFC system development, NFC application development, NFC service providing and so on will need to read related chapters additionally in order to obtain a detailed knowledge. The audience will be comfortable reading the other chapters after being exposed to NFC in this chapter.
Executive audiences of this chapter can additionally read Chapter 7 and Chapter 9. Readers who are interested in more technical aspects of NFC should read Chapters 2−4, 6 and 8 for further technical understanding. Potential members of NFC application development teams are encouraged to read Chapter 5 as well.
Chapter 2: Towards NFC Era
This chapter consists of basic knowledge on ubiquitous computing, mobile phones, radio frequency identification, smart cards, and NFC technologies. Although this chapter does not require much background knowledge, we advise readers to read Chapter 1 to obtain an overall knowledge of NFC technology for a better understanding. This chapter addresses readers of all categories.
Readers of this chapter will be able to learn and appreciate the NFC concept and also understand other chapters more easily. Executive audiences of this chapter are encouraged to also read Chapters 7 and 9. Readers who are interested in the more technical aspects of NFC should read Chapters 3, 4, 6 and 8 for further technical understanding. Chapter 5 should be read if they intend to be part of an NFC application development team.
Chapter 3: NFC Essentials
This chapter contains vast amount of information on NFC technology in order to give a solid and complete understanding. This includes sufficient knowledge on NFC devices and their capabilities, NFC enabled mobile phones and their architectural details, and standardization bodies in the development of NFC enabled mobile phones, radio frequency layer features of NFC and also technical essentials and communication architectures of each operating mode. Potential readers of this chapter are academicians, researchers, students, practitioners, product managers, and system developers.
Readers of this chapter will learn about each NFC operating mode’s communication architecture and other technical essentials in detail. This knowledge will help the reader to understand further concepts in NFC technology better and also to develop NFC based systems.
Chapter 4: NFC Operating Modes
This chapter mainly consists of NFC operating modes including descriptions, essentials, use cases, generic usage models, and benefits of each operating mode. This chapter addresses readers of all categories.
Readers of this chapter will learn about each operating mode in detail. They will be able to design NFC applications in each operating mode and also know the benefits of the designed application to the user. Our readers may read Chapter 5 which covers NFC application programming in each operating mode. Readers who are interested in the more technical aspects of NFC should read Chapters 6 and 8 for further technical understanding.
Chapter 5: Developing NFC Applications
This chapter presents all the necessary information to develop NFC applications. General information regarding NFC project design and application team management is initially provided. On account of the number of affirmative features, availability of application programming interfaces and high usage experience in the market, Java is used as the development technology. Potential readers of this chapter are academicians, researchers, students, practitioners, project managers, software analysts, system developers, and software developers.
Readers of this chapter will gain fundamental knowledge in NFC programming and the learned NFC programming skills from Java technology will help users to develop NFC based applications in other languages and development platforms more easily. Our readers are encouraged to also read Chapters 7 and 9. Readers interested in obtaining further technical understanding should read Chapters 6 and 8.
Chapter 6: NFC Security and Privacy
This chapter presents introductory knowledge on security; vulnerability, threat, attack, and risk; cryptography; NFC security issues and preventive mechanisms to handle the risks. The content is provided for both those in higher, or managerial and lower, or technical levels. Potential readers are academicians, researchers, students, consultants, practitioners, project managers, software analysts, system developers, and software developers.
Readers of this chapter will learn about the security and privacy issues concerning NFC technology in detail. Hence they will be able to design secure and interoperable NFC based systems and services in each operating mode. Readers who are interested in obtaining further technical understanding should read Chapter 8.
Chapter 7: NFC Business Ecosystem
This chapter consists of the NFC business ecosystem including comprehensive analysis of the ecosystem, generic roles, viewpoints of different associations, business model alternatives with driving factors, and a case study. Potential readers of this chapter are academicians, researchers, students, entrepreneurs, business and ecosystem analysts, consultants, practitioners, senior managers, product managers, and project managers.
Readers of this chapter will learn the nature of the NFC business ecosystem and understand participating stakeholders’ business requirements as well. They will be able to evaluate and design NFC services with sustainable business models. Readers may also read Chapter 9 which gives real NFC trials throughout the world in diverse business environments.
Chapter 8: Secure Element Management
This chapter mainly consists of NFC technology including essentials of OTA technology, an overview on GlobalPlatform specifications, the Universal Integrated Circuit Card (UICC) based secure element and its security domain architecture, different UICC based secure element management models, multiple secure element management within a single NFC mobile and an alternative OTA management model. Potential readers of this chapter are academicians, researchers, students, practitioners, product managers, project managers, and system developers.
Readers of this chapter will gather a broad knowledge of OTA technology; UICC based secure elements and their life-cycle management via OTA technology, and also an alternative OTA management model.
Chapter 9: NFC Cities and Trials
This chapter consists of NFC cities, launched NFC trials and projects that have been developed all over the world so far. Potential readers of this chapter are academicians, researchers, students, entrepreneurs, business and ecosystem analysts, consultants, practitioners, senior managers, product managers, and project managers.
The chapter starts by describing NFC cities which are the most popular implementations of NFC technology. The purpose of an NFC city may be either to test implementations or even to actually use them in a defined arena. NFC cities mostly test the social aspect of the NFC technology when compared with trials and projects. The usability issues together with the problems residing in the technology are easily obtained continuously through tests in NFC cities. In the case of NFC trials and projects, the business aspect of an application or an NFC ecosystem is tested more than the social aspect.
Call for Feedback and Help
This is one of the pioneer materials on NFC technology providing such an extensive content. One of the challenges that we have faced is that improvements are continuously being introduced, almost exponentially. Hence, the book will already need to be updated within a few years. We intend to update this book by improving it frequently. Our motivation here is to put this book at the center of the NFC ecosystem in the world. In addition to the work we intend to carry out, we would appreciate receiving any feedback, additional supportive material, or information that might help improve future editions for potential readers.
We would appreciate receiving comments such as:
Any mistakes that we have inserted, or possibly ignoring some facts;Any missing, yet important points that the user considers essential;Any missing, yet important contribution to the NFC technology and ecosystem that we have ignored;Proposals for new chapters or additional material that should be added in future edition(s).For more information, please visit the companion website -www.wiley.com/go/coskun
Any such e-mails should be directed to: [email protected]. Any other material can be sent to:
Vedat Coskun
ISIK University
Sile 34980 Istanbul
Turkey
Acknowledgments
We are grateful for the support of ISIK University to NFC Lab - Istanbul; especially Prof. Dr. Siddik Binboga Yarman, Chairman, Board of Trustees; Prof. Dr. Nafiye Gunec Kiyak, Rector; Aziz Genc, Secretary General. We are also grateful to Prof. Dr. Erdal Cayirci, who has given support for this book.
List of Acronyms
3DESTriple DES3GThird Generation3GPP3rd Generation Partnership ProjectACAlternating CurrentAESAdvanced Encryption StandardAMSApplication Management SoftwareANSIAmerican National Standards InstituteAPDUApplication Protocol Data UnitAPIApplication Programming InterfaceAPSDApplication Provider Security DomainASKAmplitude Shift KeyingBPSKBinary Phase Shift KeyingBSBase StationCACertificate AuthorityCASDControlling Authority Security DomainCDCConnected Device ConfigurationCIBCard Issuing BankCLDCConnected Limited Device ConfigurationCLFContactless Front-endCSMACarrier Sense Multiple AccessDCDirect CurrentDESData Encryption StandardDoSDenial of ServiceDSPDigital Signal ProcessorEANEuropean Article NumberECCElliptic Curve CryptographyECMAEuropean Computer Manufacturer AssociationEDGEEnhanced Data for GSM EvolutionEMVEuropay, Mastercard and VisaEPC™Electronic Product CodeETSIEuropean Telecommunications Standards InstituteFIPSFederal Information Processing StandardGPRSGeneral Packet Radio SystemGPSGlobal Positioning SystemGSMGlobal System for Mobile CommunicationsGSMAGSM AssociationGUIGraphical User InterfaceHCPHost Controller ProtocolHCIHost Controller InterfaceHDLCHigh-Level Data Link ControlHMACHash-based Message Authentication CodeHSPAHigh Speed Packet AccessI/OInput/OutputICIntegrated CircuitICAOInternational Civil Aviation OrganizationICTInformation and Communications TechnologiesIDPSIntrusion Detection and Prevention SystemIECInternational Electrotechnical CommissionIFFIdentify Friend or FoeISDIssuer Security DomainISOInternational Organization of StandardizationITUInternational Telecommunication UnionJ2EEJavaTM 2 Enterprise EditionJ2MEJavaTM 2 Micro EditionJ2SEJavaTM 2 Standard EditionJADJava Application DescriptorJARJava ArchiveJCPJava Community ProcessJCVMJavaCard Virtual MachineJCRMIJavaCard Remote Method InvocationJISJapanese Industrial StandardJLSJava Language SpecificationJSPJava Community ProcessJSRJava Specification RequestsJVMJava Virtual MachineKDFKey Derivation FunctionKMAKey Management AuthorityKVMKilobyte Virtual MachineLLCPLogical Link Control ProtocolMACMessage Authentication CodeMIDPMobile Information Device ProfileMIMMan in the MiddleMMSMultimedia Messaging ServiceMNOMobile Network OperatorMULTOSMulti-application Operating SystemMVNOMobile Virtual Network OperatorNDEFNFC Data Exchange FormatNFCNear Field CommunicationNFCIPNear Field Communication Interface and ProtocolNFCIP-1Near Field Communication Interface and Protocol-1NFCIP-2Near Field Communication Interface and Protocol-2OMAOpen Mobile AllianceOSOperating SystemOTAOver-the-AirPCPersonal ComputerPCDProximity Coupling DevicePDAPersonal Digital AssistantPICCProximity Integrated Circuit CardPINPersonal Identification NumberPKIPublic Key InfrastructurePOSPoint of SalePSKPhase Shift KeyingQoSQuality of ServiceRFRadio FrequencyRFIDRadio Frequency IdentificationRoIReturn of InvestmentRSTReset the microprocessorRTDRecord Type DefinitionSATSIM Application ToolkitSCOSSmart Card Operating SystemSCPSmart Card PlatformSCPSecure Channel ProtocolSDKSoftware Development KitSESecure ElementSEPSecure Exchange ProtocolSIMSubscriber Identity ModuleSMCSecure Memory CardSMSShort Messaging ServiceSSDSupplementary Security DomainSSLSecure Sockets LayerSTEPSecure Trusted Environment ProvisioningSWPSingle Wire ProtocolTLSTransport Layer SecurityTNFType Name FormatTSMTrusted Service ManagerTTPTrusted Third PartyUICCUniversal Integrated Circuit CardUMTSUniversal Mobile Telecommunication SystemUPCUniversal Product CodeURIUniform Resource IdentifierUSIMUniversal Subscriber Identity ModuleVMVirtual MachineVPNVirtual Private NetworkWEPWired Equivalent PrivacyWIWired InterfaceWi-FiWireless FidelityWiMAXWorldwide Interoperability for Microwave AccessWLANWireless Local Area NetworkWPAWi-Fi Protected AccessWPANWireless Personal Area NetworkWWANWireless Wide Area Networks1
Executive Summary
Near Field Communication (NFC) is a new technology and ecosystem that has emerged in the last decade. NFC technology is a short range, high frequency, low bandwidth and wireless communication technology between two NFC enabled devices. Communication between NFC devices occurs at 13.56 MHz high frequency which was originally used by Radio Frequency Identification (RFID). Although RFID is capable of reception and transmission beyond a few meters, NFC is restricted to within very close proximity. Currently, integration of NFC technology into mobile phones is considered as the most practical solution because almost everyone carries one.
NFC technology enables communication between an NFC enabled mobile phone at one end, and another NFC enabled mobile phone, an NFC reader or an NFC tag at the other end. Potential NFC applications and services making use of NFC technology include e-payment, e-ticketing, loyalty services, identification, access control, content distribution, smart advertising, data/money transfer and social services. Due to its applicability to a wide range of areas and the promising value added opportunities, it has attracted many academicians, researchers, organizations, and commercial companies.
The changes or improvements on RFID to expose NFC technology can be described as:
Short range communication, where RFID may use long range especially for active tags that contain embedded energy.Passive tag usage only (actually occurs only in reader/writer mode) whereas both active and passive tags are possible in RFID.Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
