SlideShare ist ein Scribd-Unternehmen logo
1 von 38
NFC: NEAR FIELD COMMUNICATION
Bharat Kachhwaha,
Pune, 7/9/2020,
Lenze
Reviewer: Prafulla, Dipti
SUMMAR
Y
Part 0 History
Part 2 Services
Part 3 Security, Comparison and Uses
Prerequisite
1. Basic understanding of signal (Analog and digital)
2. Basic knowledge of Electro magnetic induction.
Q & A
Appendix: Data Format
Part 1 NFC
NEAR
Exchange of data between
two devices
FIELD Communication
Wireless technology
using magnetism
A short distance
Near Field Communication (NFC) is a contact-less communication technology based on a
radio frequency (RF) field using a base frequency of 13.56 MHz .
NFC technology is perfectly designed to exchange data between two devices through a
simple touch gesture.
1983
• The first patent to be associated with the abbreviation RFID was granted to Charles
Walton
2004
• Nokia Phillips and Sony established Near Field Communication (NW) Forum
2010
• Samsung Nexus S first Android NFC phone, developed jointly by Google and Samsung
2011
• First mobile phone (Nokia 6131) with NFC released by NOKIA
2014
• The introduction of Apple Pay to the iPhone 6 and 6+ models.
2015
• Android Lollipop 5.0 and above introduced contactless payments, with the addition of
two-factor authentication, using NFC
History
of
NFC
TIMELINE,
POPULARITY &
GROWTH
260
400
600
800
1000
1200
1700
2200
0
500
1000
1500
2000
2500
2013 2014 2015 2016 2017 2018 2019 2020
in
millions
Year
Shipments of NFC-Enabled Mobile
Handsets
2013 2014 2015 2016 2017 2018 2019 2020
Since 2006, when the first
devices to support NFC were
released, the number of new
devices supporting the
technology has grown rapidly.
According to IHS Technology,
2.2 billion NFC-enabled
smartphone units will be in use
by 2020. Apple further opened
NFC possibilities in 2017 when it
began allowing NFC capabilities
beyond Apple Pay.
Smart Phones Has NFC
Card
Emulation
NFC
Payments
Read NFC Write NFC
iPhone 7, 7+, 8, 8+, X, XS, XR, 11, SE (2nd Gen)
    
iPhone 6, 6+, 6S, 6S+, SE (1st Gen)     
iPhone 5S, 5C, 5, 4S, 4, 3GS, 3G (year 2014)     
Google Pixel 1, 2, 3, XL     
Samsung Galaxy S3, 4, 5, 6, 7,Edge, 8, 8+, 9, 9+
    
Huawei P 10, 20, Pro, Lite, Plus     
Xiaomi Mi Mix, 5, 5s, 6, 8     
OnePlus 3, 3T, 5, 5T, 6, 7, 7T, Pro, 8     
Motorola Z3, E5, G6, X4, E4 * * * * *
LG G4, 6, 7, 8, V35, ThinQ, K10, V20  * *  
Nokia 8, 6, 5, 3,6.1, 8 Sirocco, 7 Plus, 5.1
    
Sony Xperia XA1, 2, XZ1, 2 (Compact, Ultra, Plus)
    
HTC One M9, Desire 10, U11, +, U12,+, Eyes
    
Part 1 NFC
Part 2 Services
• NFC technology
• NFC and other Contactless Protocols
• NFC Coding
• NFC Transmission Technology
• NFC Tag Types
NFC
Part 3 Security, Comparison and Uses
NFC Technology
The RF field generated by
an NFC Device to
communicate with an
NFC Tag has three tasks:
To transfer power
from the NFC Device
to the NFC Tag.
The NFC device is sending
information to an NFC Tag
by modulating the RF field
signal (signal modulation).
The NFC device is receiving
information from an NFC Tag
by sensing the modulation of
the load generated by the
NFC tag (load modulation).
Polling
Device
Listening
Device
NFC and other Contactless Protocols
NFC Devices are able to
communicate with:
• Readers and cards compliant to
the ISO/IEC 14443 Type A
standard
• Readers and cards compliant to
the ISO/IEC 14443 Type B
standard
• Cards compliant to the ISO/IEC
15693 standard
• Devices compliant to the
ISO/IEC 18092 standard
• Readers and cards compliant to
the JIS-X 6319-4 standard
• NFC Tags
• Other NFC Devices
NFC Coding
Appears as raw binary
bits without any coding.
Typically binary 1 maps
to logic-level high, and
binary 0 maps to logic-
level low.
Non-
Return-to-
Zero (L) A low-to-high transition
expresses a 0 bit,
whereas a high-to-low
transition stands for a 1
bit.
Manchester
Coding
Pauses occurring in the
carrier at different
positions of a period.
While a 1 is always
encoded in the same
way, coding a 0 is
determined on the basis
of the preceded bit.
Modified
Miller
Coding
NRZ-L
Mancheste
r
Modified
Miller
1 0 1 1 0 0
NFC-Forum
Standard
Polling /
Listening
Coding Modulation Data Rate Carrier frequency
NFC - A Polling Modified Miller ASK 100% 106 kb/s 13.56 MHz
Listening Manchester Load modulation
(ASK)
106 kb/s 13.56 MHz +- 848
kHz subcarrier
NFC – B Polling NRZ-L ASK 100% 106 kb/s 13.56 MHz
Listening NRZ-L Load modulation
(ASK)
106 kb/s 13.56 MHz +- 848
kHz subcarrier
NFC – F Polling Manchester ASK 100% 212 / 424 kb/s 13.56 MHz
Listening Manchester Load modulation
(ASK)
212 / 424 kb/s 13.56 MHz (without
subcarrier)
NFC Transmission Technologies (RF Standards )
Type 1 Type 2 Type 3 Type 4
ISO/IEC standard 14443 A 14443 A JIS 6319-4 14443 A / B
Compatible Product Innovision
Topaz
NXP MIFARE Sony FeliCa NXP DESFire,
SmartMXJCOP, …
Data rate 106 kb/s 106 kb/s 212, 424 kb/s 106/212/424 kb/s
Memory 96 bytes,
expandable to 2
kbyte
48 bytes, expandable to
2 kbyte
Variable, max.
1Mbyte
Variable, max. 32 kbyte
Anti-collision No Yes Yes Yes
NFC Tag Types
Part 1 NFC
Part 2 Services
Part 3 Comparison and Uses
• Communication mode
• Reader / Writer mode
• Peer-to-Peer mode
• Card Emulation mode
• Wireless Charging mode
Services
Communication mode
Active Mode
Passive Mode
Both the target device as well as the initiating device have their individual power supplies which
allows them communicate with one another by alternating signal transmission.
The initiator device generates radio signals (magnetic field) that is so strong that it powers on the
target device via the electromagnetic field.
Communication mode
Active Mode
Passive Mode
Both the target device as well as the initiating device have their individual power supplies which
allows them communicate with one another by alternating signal transmission.
The initiator device generates radio signals (magnetic field) that is so strong that it powers on the
target device via the electromagnetic field.
Reader/Writer mode
Active Active
Passive
Passive Active
Active
Initiator (Device 1)
Target (Device 2)
Transmission
Card Emulation mode
Active Active
Passive
Passive Active
Active
Initiator (Device 1)
Target (Device 2)
Transmission
Peer-to-Peer mode
Active Active
Passive
Passive Active
Active
Initiator (Device 1)
Target (Device 2)
Transmission
Part 1 NFC
Part 2 Services
Part 3 Comparison and Uses
• NFC Security
• NFC vs Other Technology
• Uses
• Appendix
Uses
NFC Security
Possible Attacks
• Eavesdropping
• Data corruption
• Data modification
• Man-in-middle attack
NFC Security
Possible Attacks
• Eavesdropping
• Data corruption
• Data modification
• Man-in-middle attack
Device A
Attacker
Device B
NFC Security
Possible Attacks
• Eavesdropping
• Data corruption
• Data modification
• Man-in-middle attack
Device A Attacker Device B
NFC Secure
Channel
Device 1 Device 2
NFC vs. Other Technology
NFC
Zig Bee
Bluetooth
Wi-Fi
1Gb
100Mb
10Mb
1Mb
100kb
0.01m 0.1m 1m 10m 100m 1000m
IrDA
IrDA is a short range (< 1 meter), line-of-
sight communication standard for
exchange of data over infrared light. IrDA
interfaces are frequently used in
computers and mobile phones.
NFC vs. Other Technology
NFC
ZigBee
Bluetooth
Wi-Fi
1Gb
100Mb
10Mb
1Mb
100kb
0.01m 0.1m 1m 10m 100m 1000m
ZigBee wireless technology is a standard
enabling control and monitoring
capabilities for industrial and
residential applications within a +100-
meter range.
IrDA
NFC vs. Other Technology
NFC
Zig Bee
Bluetooth
Wi-Fi
1Gb
100Mb
10Mb
1Mb
100kb
0.01m 0.1m 1m 10m 100m 1000m
Bluetooth wireless technology was
designed to replace cables between cell
phones, laptops, and other computing and
communication devices within a 10+-meter
range
IrDA
NFC vs. Other Technology
NFC
Zig Bee
Bluetooth
Wi-Fi
1Gb
100Mb
10Mb
1Mb
100kb
0.01m 0.1m 1m 10m 100m 1000m
Wi-Fi technology was designed and
optimized for Local Area Networks (LAN); it
provides an extension or replacement of
wired networks for dozens of computing
devices within a +100-meter range.
IrDA
Mobile Payment
Authentication,
Access Control
Data Transfer,
Wireless charging
“Unlock” another
Service
Ticketing
Access to digital
information
Uses of NFC
Mobile Payment
Authentication,
Access Control
Data Transfer,
Wireless charging
“Unlock” another
Service
Ticketing
Access to digital
information
Mobile Payment
Authentication,
Access Control
Data Transfer,
Wireless charging
“Unlock” another
Service
Ticketing
Access to digital
information
Mobile Payment
Authentication,
Access Control
Data Transfer,
Wireless charging
“Unlock” another
Service
Ticketing
Access to digital
information
Mobile Payment
Authentication,
Access Control
Data Transfer,
Wireless charging
“Unlock” another
Service
Ticketing
Access to digital
information
Mobile Payment
Authentication,
Access Control
Data Transfer,
Wireless charging
“Unlock” another
Service
Ticketing
Access to digital
information
Mobile Payment
Authentication,
Access Control
Data Transfer,
Wireless charging
“Unlock” another
Service
Ticketing
Access to digital
information
THANK YOU
Appendix
An NDEF message is composed of one or more NDEF records.
NDEF
message
NDEF record
NDEF record
header
Appendix
An NDEF Record Header
1. TNF: Type Name Format (3 bits)
a) Empty
b) Well Known
c) Multi-Purpose
d) Absolute
e) External
f) Unknown
g) Unchanged
h) Reserved
2. IL: Tells whether the record contains an ID length field.
3. SR: Determines whether the record is a short record.
4. CF: When a record is chunked.
5. ME: Message Ending.
6. MB: Message Beginning.

Weitere ähnliche Inhalte

Was ist angesagt?

RFID Journal Live! 2019
RFID Journal Live! 2019RFID Journal Live! 2019
RFID Journal Live! 2019NFC Forum
 
Near field communication
Near field communicationNear field communication
Near field communicationdivyasolanki101
 
Near field communication
Near field communicationNear field communication
Near field communicationRahul Patil
 
OPTIMOS Interoperability Event - Introduction to the Interoperability Initiative
OPTIMOS Interoperability Event - Introduction to the Interoperability InitiativeOPTIMOS Interoperability Event - Introduction to the Interoperability Initiative
OPTIMOS Interoperability Event - Introduction to the Interoperability InitiativeNFC Forum
 
NXP MIFARE Webinar: Added Value To Card Based Environments Through NFC And Cloud
NXP MIFARE Webinar: Added Value To Card Based Environments Through NFC And CloudNXP MIFARE Webinar: Added Value To Card Based Environments Through NFC And Cloud
NXP MIFARE Webinar: Added Value To Card Based Environments Through NFC And CloudNXP MIFARE Team
 
Near Field Communication (NFC)
Near Field Communication (NFC)Near Field Communication (NFC)
Near Field Communication (NFC)Pavan Kumar B S
 
NFC and the Growth of Connected Consumer Devices
NFC and the Growth of Connected Consumer DevicesNFC and the Growth of Connected Consumer Devices
NFC and the Growth of Connected Consumer DevicesNFC Forum
 
VISIONFC Automotive Summit
VISIONFC Automotive SummitVISIONFC Automotive Summit
VISIONFC Automotive SummitNFC Forum
 
Tapit - An NFC overview 2013
Tapit - An NFC overview 2013Tapit - An NFC overview 2013
Tapit - An NFC overview 2013Tapit
 
NFC Forum Compliance Program Overview
NFC Forum Compliance Program OverviewNFC Forum Compliance Program Overview
NFC Forum Compliance Program OverviewNFC Forum
 
WEAR Conference 2018 - "Four Ways NFC Enables Brands To Connect To A Wearable...
WEAR Conference 2018 - "Four Ways NFC Enables Brands To Connect To A Wearable...WEAR Conference 2018 - "Four Ways NFC Enables Brands To Connect To A Wearable...
WEAR Conference 2018 - "Four Ways NFC Enables Brands To Connect To A Wearable...NFC Forum
 
Application of near field communication (nfc)
Application of near field communication (nfc)Application of near field communication (nfc)
Application of near field communication (nfc)Vijay Thakkar
 
Transit Ticketing and Fare Collection Conference - Introduction to the Intero...
Transit Ticketing and Fare Collection Conference - Introduction to the Intero...Transit Ticketing and Fare Collection Conference - Introduction to the Intero...
Transit Ticketing and Fare Collection Conference - Introduction to the Intero...NFC Forum
 
HCE. . . and Beyond - It's Not Just a Transaction
HCE. . . and Beyond - It's Not Just a TransactionHCE. . . and Beyond - It's Not Just a Transaction
HCE. . . and Beyond - It's Not Just a TransactionNFC Forum
 
Embedded systems security news mar 2011
Embedded systems security news mar 2011Embedded systems security news mar 2011
Embedded systems security news mar 2011AurMiana
 
History, Background and Future Perspectives of Near Field Communication for t...
History, Background and Future Perspectives of Near Field Communication for t...History, Background and Future Perspectives of Near Field Communication for t...
History, Background and Future Perspectives of Near Field Communication for t...NFC Forum
 
Near Field Communication
Near Field CommunicationNear Field Communication
Near Field CommunicationYesha Kava
 
State of the Market
State of the MarketState of the Market
State of the MarketNFC Forum
 
RFID2015_NFC-WISP_public(delete Disney research)
RFID2015_NFC-WISP_public(delete Disney research)RFID2015_NFC-WISP_public(delete Disney research)
RFID2015_NFC-WISP_public(delete Disney research)Yi (Eve) Zhao
 

Was ist angesagt? (20)

RFID Journal Live! 2019
RFID Journal Live! 2019RFID Journal Live! 2019
RFID Journal Live! 2019
 
Near field communication
Near field communicationNear field communication
Near field communication
 
Near field communication
Near field communicationNear field communication
Near field communication
 
Nfc ppt
Nfc pptNfc ppt
Nfc ppt
 
OPTIMOS Interoperability Event - Introduction to the Interoperability Initiative
OPTIMOS Interoperability Event - Introduction to the Interoperability InitiativeOPTIMOS Interoperability Event - Introduction to the Interoperability Initiative
OPTIMOS Interoperability Event - Introduction to the Interoperability Initiative
 
NXP MIFARE Webinar: Added Value To Card Based Environments Through NFC And Cloud
NXP MIFARE Webinar: Added Value To Card Based Environments Through NFC And CloudNXP MIFARE Webinar: Added Value To Card Based Environments Through NFC And Cloud
NXP MIFARE Webinar: Added Value To Card Based Environments Through NFC And Cloud
 
Near Field Communication (NFC)
Near Field Communication (NFC)Near Field Communication (NFC)
Near Field Communication (NFC)
 
NFC and the Growth of Connected Consumer Devices
NFC and the Growth of Connected Consumer DevicesNFC and the Growth of Connected Consumer Devices
NFC and the Growth of Connected Consumer Devices
 
VISIONFC Automotive Summit
VISIONFC Automotive SummitVISIONFC Automotive Summit
VISIONFC Automotive Summit
 
Tapit - An NFC overview 2013
Tapit - An NFC overview 2013Tapit - An NFC overview 2013
Tapit - An NFC overview 2013
 
NFC Forum Compliance Program Overview
NFC Forum Compliance Program OverviewNFC Forum Compliance Program Overview
NFC Forum Compliance Program Overview
 
WEAR Conference 2018 - "Four Ways NFC Enables Brands To Connect To A Wearable...
WEAR Conference 2018 - "Four Ways NFC Enables Brands To Connect To A Wearable...WEAR Conference 2018 - "Four Ways NFC Enables Brands To Connect To A Wearable...
WEAR Conference 2018 - "Four Ways NFC Enables Brands To Connect To A Wearable...
 
Application of near field communication (nfc)
Application of near field communication (nfc)Application of near field communication (nfc)
Application of near field communication (nfc)
 
Transit Ticketing and Fare Collection Conference - Introduction to the Intero...
Transit Ticketing and Fare Collection Conference - Introduction to the Intero...Transit Ticketing and Fare Collection Conference - Introduction to the Intero...
Transit Ticketing and Fare Collection Conference - Introduction to the Intero...
 
HCE. . . and Beyond - It's Not Just a Transaction
HCE. . . and Beyond - It's Not Just a TransactionHCE. . . and Beyond - It's Not Just a Transaction
HCE. . . and Beyond - It's Not Just a Transaction
 
Embedded systems security news mar 2011
Embedded systems security news mar 2011Embedded systems security news mar 2011
Embedded systems security news mar 2011
 
History, Background and Future Perspectives of Near Field Communication for t...
History, Background and Future Perspectives of Near Field Communication for t...History, Background and Future Perspectives of Near Field Communication for t...
History, Background and Future Perspectives of Near Field Communication for t...
 
Near Field Communication
Near Field CommunicationNear Field Communication
Near Field Communication
 
State of the Market
State of the MarketState of the Market
State of the Market
 
RFID2015_NFC-WISP_public(delete Disney research)
RFID2015_NFC-WISP_public(delete Disney research)RFID2015_NFC-WISP_public(delete Disney research)
RFID2015_NFC-WISP_public(delete Disney research)
 

Ähnlich wie Near field communication (NFC)

Near Field Communication (NFC)
Near Field Communication (NFC)Near Field Communication (NFC)
Near Field Communication (NFC)Seminar Links
 
Near field communication.pptx
Near field communication.pptxNear field communication.pptx
Near field communication.pptxPoriumlimited
 
Near field communication
Near field communicationNear field communication
Near field communicationVaibhav Chandak
 
Report on NEAR FIELD COMMUNICATION
Report on NEAR FIELD COMMUNICATIONReport on NEAR FIELD COMMUNICATION
Report on NEAR FIELD COMMUNICATIONPrandeep Shekhawat
 
Near field Technology
Near field TechnologyNear field Technology
Near field Technologyshrien_sahi
 
Near field communication
Near field communicationNear field communication
Near field communicationanshu kumari
 
Near field communication
Near field communicationNear field communication
Near field communicationDipen Jain
 
BT_Wifi_NFC.pdf
BT_Wifi_NFC.pdfBT_Wifi_NFC.pdf
BT_Wifi_NFC.pdfparthasrk
 
NFC technical presentation
NFC technical presentationNFC technical presentation
NFC technical presentationAkshat Rohatgi
 
Near field communication(NFC)
Near field communication(NFC)Near field communication(NFC)
Near field communication(NFC)ronak1207
 
Near Field Communications - NFC - Uses, Applications, Cost and Much More
Near Field Communications - NFC - Uses, Applications, Cost and Much MoreNear Field Communications - NFC - Uses, Applications, Cost and Much More
Near Field Communications - NFC - Uses, Applications, Cost and Much MorePraful Manjunath
 
Near Field Communication
Near Field CommunicationNear Field Communication
Near Field CommunicationVasanth Krupa
 
NFC - Near Field Communication Technology TECHNICAL SEMINAR.pptx
NFC - Near Field Communication Technology TECHNICAL SEMINAR.pptxNFC - Near Field Communication Technology TECHNICAL SEMINAR.pptx
NFC - Near Field Communication Technology TECHNICAL SEMINAR.pptxShirishaBhuvanagiri
 
Near Feild Communication (NFC)
Near Feild Communication (NFC)Near Feild Communication (NFC)
Near Feild Communication (NFC)Aditya Singh
 
Near field communication(nfc)
Near field communication(nfc)Near field communication(nfc)
Near field communication(nfc)Bhaumik Gagwani
 

Ähnlich wie Near field communication (NFC) (20)

Near Field Communication (NFC)
Near Field Communication (NFC)Near Field Communication (NFC)
Near Field Communication (NFC)
 
Nfc
NfcNfc
Nfc
 
Near field communication.pptx
Near field communication.pptxNear field communication.pptx
Near field communication.pptx
 
Near field communication
Near field communicationNear field communication
Near field communication
 
Report on NEAR FIELD COMMUNICATION
Report on NEAR FIELD COMMUNICATIONReport on NEAR FIELD COMMUNICATION
Report on NEAR FIELD COMMUNICATION
 
Near field Technology
Near field TechnologyNear field Technology
Near field Technology
 
Near field communication
Near field communicationNear field communication
Near field communication
 
Near field communication
Near field communicationNear field communication
Near field communication
 
NFC TECHNOLOGY
NFC TECHNOLOGYNFC TECHNOLOGY
NFC TECHNOLOGY
 
Near field communication
Near field communicationNear field communication
Near field communication
 
NFC tech
NFC techNFC tech
NFC tech
 
BT_Wifi_NFC.pdf
BT_Wifi_NFC.pdfBT_Wifi_NFC.pdf
BT_Wifi_NFC.pdf
 
NFC technical presentation
NFC technical presentationNFC technical presentation
NFC technical presentation
 
Near field communication(NFC)
Near field communication(NFC)Near field communication(NFC)
Near field communication(NFC)
 
Near Field Communications - NFC - Uses, Applications, Cost and Much More
Near Field Communications - NFC - Uses, Applications, Cost and Much MoreNear Field Communications - NFC - Uses, Applications, Cost and Much More
Near Field Communications - NFC - Uses, Applications, Cost and Much More
 
Near Field Communication
Near Field CommunicationNear Field Communication
Near Field Communication
 
NFC - Near Field Communication Technology TECHNICAL SEMINAR.pptx
NFC - Near Field Communication Technology TECHNICAL SEMINAR.pptxNFC - Near Field Communication Technology TECHNICAL SEMINAR.pptx
NFC - Near Field Communication Technology TECHNICAL SEMINAR.pptx
 
Near Feild Communication (NFC)
Near Feild Communication (NFC)Near Feild Communication (NFC)
Near Feild Communication (NFC)
 
Nfc
Nfc Nfc
Nfc
 
Near field communication(nfc)
Near field communication(nfc)Near field communication(nfc)
Near field communication(nfc)
 

Kürzlich hochgeladen

Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 

Kürzlich hochgeladen (20)

Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 

Near field communication (NFC)

  • 1. NFC: NEAR FIELD COMMUNICATION Bharat Kachhwaha, Pune, 7/9/2020, Lenze Reviewer: Prafulla, Dipti
  • 2. SUMMAR Y Part 0 History Part 2 Services Part 3 Security, Comparison and Uses Prerequisite 1. Basic understanding of signal (Analog and digital) 2. Basic knowledge of Electro magnetic induction. Q & A Appendix: Data Format Part 1 NFC
  • 3. NEAR Exchange of data between two devices FIELD Communication Wireless technology using magnetism A short distance Near Field Communication (NFC) is a contact-less communication technology based on a radio frequency (RF) field using a base frequency of 13.56 MHz . NFC technology is perfectly designed to exchange data between two devices through a simple touch gesture.
  • 4. 1983 • The first patent to be associated with the abbreviation RFID was granted to Charles Walton 2004 • Nokia Phillips and Sony established Near Field Communication (NW) Forum 2010 • Samsung Nexus S first Android NFC phone, developed jointly by Google and Samsung 2011 • First mobile phone (Nokia 6131) with NFC released by NOKIA 2014 • The introduction of Apple Pay to the iPhone 6 and 6+ models. 2015 • Android Lollipop 5.0 and above introduced contactless payments, with the addition of two-factor authentication, using NFC History of NFC
  • 5. TIMELINE, POPULARITY & GROWTH 260 400 600 800 1000 1200 1700 2200 0 500 1000 1500 2000 2500 2013 2014 2015 2016 2017 2018 2019 2020 in millions Year Shipments of NFC-Enabled Mobile Handsets 2013 2014 2015 2016 2017 2018 2019 2020 Since 2006, when the first devices to support NFC were released, the number of new devices supporting the technology has grown rapidly. According to IHS Technology, 2.2 billion NFC-enabled smartphone units will be in use by 2020. Apple further opened NFC possibilities in 2017 when it began allowing NFC capabilities beyond Apple Pay.
  • 6. Smart Phones Has NFC Card Emulation NFC Payments Read NFC Write NFC iPhone 7, 7+, 8, 8+, X, XS, XR, 11, SE (2nd Gen)      iPhone 6, 6+, 6S, 6S+, SE (1st Gen)      iPhone 5S, 5C, 5, 4S, 4, 3GS, 3G (year 2014)      Google Pixel 1, 2, 3, XL      Samsung Galaxy S3, 4, 5, 6, 7,Edge, 8, 8+, 9, 9+      Huawei P 10, 20, Pro, Lite, Plus      Xiaomi Mi Mix, 5, 5s, 6, 8      OnePlus 3, 3T, 5, 5T, 6, 7, 7T, Pro, 8      Motorola Z3, E5, G6, X4, E4 * * * * * LG G4, 6, 7, 8, V35, ThinQ, K10, V20  * *   Nokia 8, 6, 5, 3,6.1, 8 Sirocco, 7 Plus, 5.1      Sony Xperia XA1, 2, XZ1, 2 (Compact, Ultra, Plus)      HTC One M9, Desire 10, U11, +, U12,+, Eyes     
  • 7. Part 1 NFC Part 2 Services • NFC technology • NFC and other Contactless Protocols • NFC Coding • NFC Transmission Technology • NFC Tag Types NFC Part 3 Security, Comparison and Uses
  • 8. NFC Technology The RF field generated by an NFC Device to communicate with an NFC Tag has three tasks: To transfer power from the NFC Device to the NFC Tag. The NFC device is sending information to an NFC Tag by modulating the RF field signal (signal modulation). The NFC device is receiving information from an NFC Tag by sensing the modulation of the load generated by the NFC tag (load modulation). Polling Device Listening Device
  • 9. NFC and other Contactless Protocols NFC Devices are able to communicate with: • Readers and cards compliant to the ISO/IEC 14443 Type A standard • Readers and cards compliant to the ISO/IEC 14443 Type B standard • Cards compliant to the ISO/IEC 15693 standard • Devices compliant to the ISO/IEC 18092 standard • Readers and cards compliant to the JIS-X 6319-4 standard • NFC Tags • Other NFC Devices
  • 10. NFC Coding Appears as raw binary bits without any coding. Typically binary 1 maps to logic-level high, and binary 0 maps to logic- level low. Non- Return-to- Zero (L) A low-to-high transition expresses a 0 bit, whereas a high-to-low transition stands for a 1 bit. Manchester Coding Pauses occurring in the carrier at different positions of a period. While a 1 is always encoded in the same way, coding a 0 is determined on the basis of the preceded bit. Modified Miller Coding NRZ-L Mancheste r Modified Miller 1 0 1 1 0 0
  • 11. NFC-Forum Standard Polling / Listening Coding Modulation Data Rate Carrier frequency NFC - A Polling Modified Miller ASK 100% 106 kb/s 13.56 MHz Listening Manchester Load modulation (ASK) 106 kb/s 13.56 MHz +- 848 kHz subcarrier NFC – B Polling NRZ-L ASK 100% 106 kb/s 13.56 MHz Listening NRZ-L Load modulation (ASK) 106 kb/s 13.56 MHz +- 848 kHz subcarrier NFC – F Polling Manchester ASK 100% 212 / 424 kb/s 13.56 MHz Listening Manchester Load modulation (ASK) 212 / 424 kb/s 13.56 MHz (without subcarrier) NFC Transmission Technologies (RF Standards )
  • 12. Type 1 Type 2 Type 3 Type 4 ISO/IEC standard 14443 A 14443 A JIS 6319-4 14443 A / B Compatible Product Innovision Topaz NXP MIFARE Sony FeliCa NXP DESFire, SmartMXJCOP, … Data rate 106 kb/s 106 kb/s 212, 424 kb/s 106/212/424 kb/s Memory 96 bytes, expandable to 2 kbyte 48 bytes, expandable to 2 kbyte Variable, max. 1Mbyte Variable, max. 32 kbyte Anti-collision No Yes Yes Yes NFC Tag Types
  • 13. Part 1 NFC Part 2 Services Part 3 Comparison and Uses • Communication mode • Reader / Writer mode • Peer-to-Peer mode • Card Emulation mode • Wireless Charging mode Services
  • 14. Communication mode Active Mode Passive Mode Both the target device as well as the initiating device have their individual power supplies which allows them communicate with one another by alternating signal transmission. The initiator device generates radio signals (magnetic field) that is so strong that it powers on the target device via the electromagnetic field.
  • 15. Communication mode Active Mode Passive Mode Both the target device as well as the initiating device have their individual power supplies which allows them communicate with one another by alternating signal transmission. The initiator device generates radio signals (magnetic field) that is so strong that it powers on the target device via the electromagnetic field.
  • 16. Reader/Writer mode Active Active Passive Passive Active Active Initiator (Device 1) Target (Device 2) Transmission
  • 17.
  • 18. Card Emulation mode Active Active Passive Passive Active Active Initiator (Device 1) Target (Device 2) Transmission
  • 19. Peer-to-Peer mode Active Active Passive Passive Active Active Initiator (Device 1) Target (Device 2) Transmission
  • 20. Part 1 NFC Part 2 Services Part 3 Comparison and Uses • NFC Security • NFC vs Other Technology • Uses • Appendix Uses
  • 21. NFC Security Possible Attacks • Eavesdropping • Data corruption • Data modification • Man-in-middle attack
  • 22. NFC Security Possible Attacks • Eavesdropping • Data corruption • Data modification • Man-in-middle attack Device A Attacker Device B
  • 23. NFC Security Possible Attacks • Eavesdropping • Data corruption • Data modification • Man-in-middle attack Device A Attacker Device B
  • 25. NFC vs. Other Technology NFC Zig Bee Bluetooth Wi-Fi 1Gb 100Mb 10Mb 1Mb 100kb 0.01m 0.1m 1m 10m 100m 1000m IrDA IrDA is a short range (< 1 meter), line-of- sight communication standard for exchange of data over infrared light. IrDA interfaces are frequently used in computers and mobile phones.
  • 26. NFC vs. Other Technology NFC ZigBee Bluetooth Wi-Fi 1Gb 100Mb 10Mb 1Mb 100kb 0.01m 0.1m 1m 10m 100m 1000m ZigBee wireless technology is a standard enabling control and monitoring capabilities for industrial and residential applications within a +100- meter range. IrDA
  • 27. NFC vs. Other Technology NFC Zig Bee Bluetooth Wi-Fi 1Gb 100Mb 10Mb 1Mb 100kb 0.01m 0.1m 1m 10m 100m 1000m Bluetooth wireless technology was designed to replace cables between cell phones, laptops, and other computing and communication devices within a 10+-meter range IrDA
  • 28. NFC vs. Other Technology NFC Zig Bee Bluetooth Wi-Fi 1Gb 100Mb 10Mb 1Mb 100kb 0.01m 0.1m 1m 10m 100m 1000m Wi-Fi technology was designed and optimized for Local Area Networks (LAN); it provides an extension or replacement of wired networks for dozens of computing devices within a +100-meter range. IrDA
  • 29. Mobile Payment Authentication, Access Control Data Transfer, Wireless charging “Unlock” another Service Ticketing Access to digital information Uses of NFC
  • 30. Mobile Payment Authentication, Access Control Data Transfer, Wireless charging “Unlock” another Service Ticketing Access to digital information
  • 31. Mobile Payment Authentication, Access Control Data Transfer, Wireless charging “Unlock” another Service Ticketing Access to digital information
  • 32. Mobile Payment Authentication, Access Control Data Transfer, Wireless charging “Unlock” another Service Ticketing Access to digital information
  • 33. Mobile Payment Authentication, Access Control Data Transfer, Wireless charging “Unlock” another Service Ticketing Access to digital information
  • 34. Mobile Payment Authentication, Access Control Data Transfer, Wireless charging “Unlock” another Service Ticketing Access to digital information
  • 35. Mobile Payment Authentication, Access Control Data Transfer, Wireless charging “Unlock” another Service Ticketing Access to digital information
  • 37. Appendix An NDEF message is composed of one or more NDEF records. NDEF message NDEF record NDEF record header
  • 38. Appendix An NDEF Record Header 1. TNF: Type Name Format (3 bits) a) Empty b) Well Known c) Multi-Purpose d) Absolute e) External f) Unknown g) Unchanged h) Reserved 2. IL: Tells whether the record contains an ID length field. 3. SR: Determines whether the record is a short record. 4. CF: When a record is chunked. 5. ME: Message Ending. 6. MB: Message Beginning.

Hinweis der Redaktion

  1. The NFC Forum was founded in the year 2004 by NXP, Sony and Nokia to harmonize the NFC technique and to stimulate its deployment. The NFC forum develops specifications which ensure interoperability of NFC units and services. The NFC Forum certifies NFC units compatible to its specifications from December 2010 onwards.
  2. Reference : Android: https://www.bluebite.com/nfc/android-nfc-compatibility iPhone: https://www.bluebite.com/nfc/iphone-nfc-compatibility
  3. For Wireless Charging the primary goal of NFC Technology is to transfer power thus extending communication. In this case NFC communication is used to regulate the power transfer. When Wireless Charging mode is active the field strength of the RF field can be increased allowing a power transfer of up to 1 W. Due to the coupling of the coils of a polling and a listening device, a passive listening device also affects the active polling device. A variation in the impedance of the listening device causes amplitude or phase changes to the antenna voltage of the polling device, detected by the polling device. This technique is called load modulation.
  4. Depending on the communication protocol used and the capability of the remote device, a communication speed of up to 424 Kbit/s is supported by NFC Forum Devices.
  5. Depending on the communication protocol used and the capability of the remote device, a communication speed of up to 424 Kbit/s is supported by NFC Forum Devices.
  6. Every mode (card emulation, peer-to-peer, reader/writer mode) can be combined with one of the following transmission technologies: Amplitude-shift keying is a form of amplitude modulation that represents digital data as variations in the amplitude of a carrier wave.
  7. Every mode (card emulation, peer-to-peer, reader/writer mode) can be combined with one of the following transmission technologies: NFC operates in a frequency range centered on 13.56 MHz and offers a data transmission rate of up to 424 kbit/s within a distance of approximately 10 centimeters. In contrast to the conventional contactless technology in this frequency range (only active-passive communications), communications between NFC-capable devices can be active-active (peer-to-peer) as well as active-passive, NFC therefore represents a link to the RFID world. NFC is backwards compatible with the widely used Smart Card infrastructure based on ISO/IEC 14443 A (e. g. NXP's MIFARE technology) and ISO/IEC 14443 B as well as with the Sony FeliCa card (JIS X 6319-4). For the exchange of information between two NFC devices, a new protocol was developed which is defined in the standards ECMA-340 and ISO/IEC 18092.
  8. https://nfc-forum.org/what-is-nfc/about-the-technology/
  9. Active Device which has power
  10. Every mode (card emulation, peer-to-peer, reader/writer mode) can be combined with one of the following transmission technologies: NFC-A (backward compatible to ISO/IEC 14443 A) NFC-B (backward compatible to ISO/IEC 14443 B) NFC-F (backward compatible to JIS X 6319-4)
  11. Every mode (card emulation, peer-to-peer, reader/writer mode) can be combined with one of the following transmission technologies: NFC-A (backward compatible to ISO/IEC 14443 A) NFC-B (backward compatible to ISO/IEC 14443 B) NFC-F (backward compatible to JIS X 6319-4)
  12. Every mode (card emulation, peer-to-peer, reader/writer mode) can be combined with one of the following transmission technologies: NFC-A (backward compatible to ISO/IEC 14443 A) NFC-B (backward compatible to ISO/IEC 14443 B) NFC-F (backward compatible to JIS X 6319-4)
  13. https://developer.android.com/guide/topics/connectivity/nfc/ https://docs.microsoft.com/en-us/xamarin/ios/platform/introduction-to-ios11/corenfc https://docs.oracle.com/javacard/3.0.5/api/index.html https://developer.apple.com/documentation/corenfc https://nfc-forum.org/
  14. Though NFC operated over shorter distance, less prone to attacks but complete security is not ensured. Eavesdropping – receiving signals without transmitters knowledge. Radio waves used for communication would be picked up by unwanted user. Can be minimized using active-passive mode. Passive devices hard to eavesdropping. Can be prevented using secure channel. As NFC uses radio waves to communicate, and these propagate in the vicinity of the transmitter, and not just to the wanted receiver, it is possible for unwanted users to pick up the signals. The technology to receive this signals is not difficult to create. The only real solution to prevent eavesdropping is to use a secure channel. Data corruption – Attacker disturbs communication. attacker does not need to be able to decipher the valid data being sent the attacker may try to disturb the communications by sending data that may be valid, or even blocking he channel so that the legitimate data is corrupted. Solution By listening when data is transmitted they will be able to detect any attack of this form because the power required to successfully attack a system is significantly higher than that which can be detected by the NFC device transmitting the data. Data modification – here attacker modifies actual payload being sent. . This form of NFC security issue involves the attacker aiming to arrange for the receiving device to receive data that has been manipulated in some form. This data will naturally have to be in the correct format for it to be accepted. This form of attack is possible for some bits under different coding schemes. There are a number of ways to provide protection against this form of security attack. It is impossible for an attacker to modify all the data transmitted at the 106 Baud data rate in active mode. As a result, the 106 Baud data rate, active mode would be required for data transfer in both directions. However this is the most vulnerable mode to eavesdropping. The best option is to use a secure channel as this provides the greatest level of NFC security NFC security - man-in-the-middle   This form of NFC security issue involves a two party communication being intercepted by a third party. The third party acts as a relay, but using information received and modifying it if required to enable the attacker to achieve their aims. This must obviously be achieved without the two original parties knowing that there is an interceptor between them.
  15. Though NFC operated over shorter distance, less prone to attacks but complete security is not ensured. Eavesdropping – receiving signals without transmitters knowledge. Radio waves used for communication would be picked up by unwanted user. Can be minimized using active-passive mode. Passive devices hard to eavesdropping. Can be prevented using secure channel. As NFC uses radio waves to communicate, and these propagate in the vicinity of the transmitter, and not just to the wanted receiver, it is possible for unwanted users to pick up the signals. The technology to receive this signals is not difficult to create. The only real solution to prevent eavesdropping is to use a secure channel. Data corruption – Attacker disturbs communication. attacker does not need to be able to decipher the valid data being sent the attacker may try to disturb the communications by sending data that may be valid, or even blocking he channel so that the legitimate data is corrupted. Solution By listening when data is transmitted they will be able to detect any attack of this form because the power required to successfully attack a system is significantly higher than that which can be detected by the NFC device transmitting the data. Data modification – here attacker modifies actual payload being sent. . This form of NFC security issue involves the attacker aiming to arrange for the receiving device to receive data that has been manipulated in some form. This data will naturally have to be in the correct format for it to be accepted. This form of attack is possible for some bits under different coding schemes. There are a number of ways to provide protection against this form of security attack. It is impossible for an attacker to modify all the data transmitted at the 106 Baud data rate in active mode. As a result, the 106 Baud data rate, active mode would be required for data transfer in both directions. However this is the most vulnerable mode to eavesdropping. The best option is to use a secure channel as this provides the greatest level of NFC security NFC security - man-in-the-middle   This form of NFC security issue involves a two party communication being intercepted by a third party. The third party acts as a relay, but using information received and modifying it if required to enable the attacker to achieve their aims. This must obviously be achieved without the two original parties knowing that there is an interceptor between them.
  16. Though NFC operated over shorter distance, less prone to attacks but complete security is not ensured. Eavesdropping – receiving signals without transmitters knowledge. Radio waves used for communication would be picked up by unwanted user. Can be minimized using active-passive mode. Passive devices hard to eavesdropping. Can be prevented using secure channel. As NFC uses radio waves to communicate, and these propagate in the vicinity of the transmitter, and not just to the wanted receiver, it is possible for unwanted users to pick up the signals. The technology to receive this signals is not difficult to create. The only real solution to prevent eavesdropping is to use a secure channel. Data corruption – Attacker disturbs communication. attacker does not need to be able to decipher the valid data being sent the attacker may try to disturb the communications by sending data that may be valid, or even blocking he channel so that the legitimate data is corrupted. Solution By listening when data is transmitted they will be able to detect any attack of this form because the power required to successfully attack a system is significantly higher than that which can be detected by the NFC device transmitting the data. Data modification – here attacker modifies actual payload being sent. . This form of NFC security issue involves the attacker aiming to arrange for the receiving device to receive data that has been manipulated in some form. This data will naturally have to be in the correct format for it to be accepted. This form of attack is possible for some bits under different coding schemes. There are a number of ways to provide protection against this form of security attack. It is impossible for an attacker to modify all the data transmitted at the 106 Baud data rate in active mode. As a result, the 106 Baud data rate, active mode would be required for data transfer in both directions. However this is the most vulnerable mode to eavesdropping. The best option is to use a secure channel as this provides the greatest level of NFC security NFC security - man-in-the-middle   This form of NFC security issue involves a two party communication being intercepted by a third party. The third party acts as a relay, but using information received and modifying it if required to enable the attacker to achieve their aims. This must obviously be achieved without the two original parties knowing that there is an interceptor between them.
  17. The best approach to ensuring NFC security is to use an NFC secure channel. This will protect against eavesdropping and data modification attacks.It is possible to use standard key agreement protocols such as Diffe-hellman because of the inherent protection has against man in the middle attacks. This protocol can be sued in the standard non-authenticated version because of the inherent NFC security. The shared key can be used to derive a symmetric key which can then be used for the NFC secure channel. The NFC secure channel provides for confidentiality, integrity and authenticity of the data transferred between devices.
  18. https://www.samsung.com/global/galaxy/samsung-pay/ https://support.apple.com/en-in/guide/iphone/iphbd4cf42b4/ios https://pay.google.com/intl/en_in/about/ NFC Payment: NFC may be most well known for mobile payments, where it powers services like Apple Pay and Google Wallet. Instead of using the same credit card number for each transaction, mobile payment solutions leverage the power of NFC card emulation to generate a single-use transaction key that can only be used once, and expires within seconds. This technology makes it nearly impossible for bad actors to make unauthorized charges on an account. Mobile payment Pay with NFC phones for tickets or taxi rides Pay with NFC phones at contactless POS (point of sales) Store vouchers on NFC phones
  19. store electronic keys, legitimations on NFC phones Secure building access Secure PC log-in Unlock car doors Setup your home office with a touch by your NFC phone Product Authentication Counterfeits have arisen as a real threat to customers seeking legitimate products, especially with fakes increasingly sold on legitimate sites like Amazon, Facebook, and Instagram. While some brands try to thwart these efforts with holograms, micro-threading and QR codes, NFC provides the most secure product authentication.   Once a legitimate product is embedded with NFC at the factory, it is given a unique digital identity that can be verified by customers (using an app like decode) before purchase. 6. Protect your brand. 7. Attendance Tracking 8. Transportation — Public and private transportation methods (such as taxis and buses) can benefit from using NFC tags that, when scanned, will direct the passenger to an application, URL, or payment method.
  20. Data transfer between different NFC-units (peer-to-peer data exchange) like NFCsmart phones, digital cameras, notebooks, etc. Exchange electronic business cards Print out photos by holding the camera close to printer In Wireless  Charging mode, small IoT devices such as a Bluetooth headset, fitness tracker or smartwatch can be charged with the contact-less transfer of up to1 W of power. https://nfc-forum.org/resources/what-are-the-operating-modes-of-nfc-devices/
  21. Tap-to-Pair (Wireless Pairing) Bluetooth Speakers Phones Watches : Apple Watch and few android watch Wifi Phones ‘Unlock’ another service (such as opening another communication link for data transfer) – Setting up Bluetooth, WLAN links
  22. Tourism — Tourist locations, such as museums, can benefit from using NFC tags to easily store and deliver information regarding historical events, descriptions of statues/sculptures/artwork, etc. Restaurants and Accommodation — Restaurants and other customer service oriented businesses can benefit from using NFC tags to quickly and easily deliver data such as menus, promotions, Wi-Fi passwords, and other information. Customer Support — NFC tags are often used as a way of tracking asset information—such as serial numbers, purchase information, lifespan, etc.—to allow for streamlined customer service and support. Medicine and Healthcare - NFC offers greater accuracy and convenience in prescribing medicine, easier check-in, payments, checking status of patients, tracking records by embedding NFC tags to patient’s charts. Read schedules from smart poster to NFC phone Download maps from smart poster to NFC phone Record location such as a parking in NFC phone
  23. Smart Ticketing - Integrated smart chips can be used to replace traditional ticketing systems with smart tickets for airlines, train and bus tickets etc… NFC tags can be used for Smart posters, movie tickets, ticket to concerts, advertisements, flyers and information links.
  24. An NDEF message is composed of one or more NDEF records. There can be multiple records in a NDEF message. The limit for the number of records that can be encapsulated into an NFC NDEF message depends upon the application in use and the tag type used.
  25. 0 – Empty: The record doesn’t contain any information. 1 – Well-known: The data is defined by the Record Type Definition (RTD) specification available from NFC Forum. 2 – Multipurpose Internet Mail Extensions (MIME): This is one of the data types normally found in Internet communications as defined by RFC 2046. 3 – Absolute Uniform Resource Identifier (URI): This is a pointer to a resource that follows the RFC 3986 syntax. 4 – External: This is user-defined data that relies on the format specified by the RTD specification. 5 – Unknown: The data type is unknown, which means that you must set the type length to 0. 6 – Unchanged: Some payloads are chunked, which means that the data is too large to fit within a single record. In this case, each record contains a piece of the data — a chunk. This TNF indicates that this is not the first record in the chunk — it’s one of the middle or the terminating records. The TNF is unchanged from the kind of data found in the first record of the chunked set. 7 – Reserved: This value is reserved for future use. A short record is one with a payload length <= 255 bytes. Normal records can have payload lengths exceeding 255 bytes up to a maximum 4 GB. CF flag tells you when a record is chunked. In other words, if you see this flag set, reading a single record won’t provide you with all the data for that data item. You must read all the records associated with that data item to get the complete information about it. The first record in a message has the MB (message begin) flag set to true so that you know that this is the first record. The last record in the message has the ME flag set so that you know this is the last record. All the intermediate records have both the MB and the ME flags set to false.