2. Short range, high frequency wireless technology.
Based on Radio Frequency Identification (RFID)
technology.
Operates in the 13.56 MHz frequency range.
NFC works at the rate of 424 Kbit/s.
3. Features of NFC :
Short contactless transmission range (~10cm app)
Gesture based (touch-tap ) process.
Provides the key to Omnipresent wireless
networking of all kinds.
Low power consumption.
4. 1983 The first patent to be associated with the
abbreviation RFID was granted to Charles Walton.
2004 Nokia, Philips and Sony established the Near
Field Communication (NFC) Forum
2006 Specification for "Smart Poster" records.
Nokia 6131 was the first NFC phone
2009 In January, NFC Forum released Peer-to-Peer
standards to transfer contact, URL, initiate
Bluetooth
2010 Samsung Nexus S: First Android NFC phone
2011 NFC support becomes part of the Symbian mobile
operating system with the release of Symbian Anna
version.
Nokia 610 is the first windows phone to have NFC.
5. The NFC system consists of
A reader/interrogator device
one or several transponders/tags.
The reader and tags interacts on the principle of
magnetic induction.
7. An inductively coupled
transponder comprises an
electronic data carrying device,
usually a single microchip, and
a large coil that functions as an
antenna
11. NFC employs two different type of coding to
transfer data.
Manchester coding
It is used with a modulation ratio of 10%.
A low-to-high transition expresses a 0 bit,
whereas a high-to-low transition stands
for a 1 bit.
12. Modified Miller Coding.
It is used with a modulation ratio of 100%.
1 is always encoded in the same way, coding a 0 is
determined on the basis of the preceded bit
13. Active Mode
• The communication between
two active
devices is
Active communication
mode.
An active device generates
its own radio
frequency (RF) field
14. Passive Mode.
• It is communication between an active and a
passive device.
• A passive device uses the
inductive coupling to
receive data.
15. Social networking
• File Sharing
• Electronic business card
• Electronic money
eCommerce
• PayPal
• Mobile payment
• Ticketing
• Boarding pass
• Point of Sale
Identity Documents
• Personal Identification proof
• Keycard
• Rental car and Hotel Keys
19. Eavesdropping
When two devices communicate via NFC an attacker
can use an antenna to also receive the transmitted
signals.
20. Data Corruption
Attacker can try to modify the data transmitted and
the receiver is not able to understand data sent by the
other device.
Data Modification
Attacker wants the receiving device to actually
receive some valid, but
manipulated data.
21. Man–in–the–middle attack
Two parties talking to each other, are tricked into a
three party conversation by an attacker and the parties
are not aware of the fact that they are not talking to
each other.
22. Using 106k baud in active mode.
Establishing a secure channel.
Devices can check the RF field while sending.
Security passwords can be activated by the user.
Answering device answers with no delay.
23. The secure element can either be held on
A chip within the mobile phone, or
On the SIM card or
A memory card device.
25. RBI approved daily transaction limit upto
50,000 on contactless smart card payment
DMRC deploying NFC for ticketing in Delhi
Metro.
Introduction of automated toll plaza
Projects like Citi Tap and Pay successfully
implemented in Bengaluru.
26. Company Contributions
Samsung Electronics NFC chips
Broadcom NFC chips
Nokia NFC Enabled handsets
Sony Contactless Smart Card Reader
Platform
Airtel, Vodafone Implement SIM based NFC
solutions
27.
28. Revolutionize the user experience.
Bridge the gap between real and digital world.
Potentially disruptive technology.