How Does NFC Work?

How Does NFC Work? NFC

*general public health information*

Do these five simple things to help stop coronavirus (COVID-19). DO THE FIVE 1. HANDS: Wash them often2. ELBOW: Cough into it 3. FACE: Don’t touch it 4. FEET: Stay more than 3ft (1m) apart5. FEEL: Sick? Stay home

Use Contact Tracing Technology >> , Follow social distancing >> guidelines and
install data surveillance system >>
to save hundreds of lives.
Use of Telemedicine concept has become very popular in
countries such as USA and China to stop the spread of COVID-19 as it is contagious disease.

2、nfc passive mode

In NFC passive mode, the NFC originating device (also known as the primary device) needs a power supply device. The master device uses the power supply device to provide the RF field and sends the data to the NFC target device (also known as the slave device).

The RF field generated by the primary device is used to power the circuit of the slave device. Data sent by the primary device is received. Load modulation is used to transmit data from the slave device back to the primary device at the same speed.

Because this working mode does not generate the RF field from the device, but passively receives the RF field generated by the master device, it is called passive mode. In this mode, the NFC master device can detect a non-contact card or NFC target device and establish a connection with it.

2、peer-to-peer

Two NFC devices can exchange data. For example, you can share a Bluetooth or Wi-Fi password to start Bluetooth or connect to Wi-Fi. You can also exchange data such as virtual business cards or digital photos.

3、card emulation

NFC-enabled phones act as readers when interacting with tags. In this mode, the mobile phone can also be used as a tag or a wireless card to be read.

5g nr section

This section covers 5G NR (New Radio) features, numerology, bands, architecture, deployment, protocol stack (PHY, MAC, RLC, PDCP, RRC) etc.
5G NR Quick reference Index >>• 5G NR Mini Slot  
• 5G NR Bandwidth Part  
• 5G NR CORESET  
• 5G NR DCI Formats  
• 5G NR UCI  
• 5G NR slot formats  
• 5G NR RRC IEs  
• 5G NR SSB, SS, PBCH  
• 5G NR PRACH  
• 5G NR PDCCH  
• 5G NR PUCCH  
• 5G NR Reference Signals  
• 5G NR m-Sequence  
• 5G NR Gold Sequence  
• 5G NR Zadoff Chu Sequence  
• 5G NR Physical layer  
• 5G NR MAC layer  
• 5G NR RLC layer  
• 5G NR PDCP layer

Additional steps

No matter which method of data collection you’re using, there’s an identity checking procedure you should follow to stay in compliance. Accordingly, there are multiple steps to an effective KYC compliance program, including document and PEP checks, face matching, and so on. NFC-based verification is only one of these steps, so it will need to be combined with others to ensure full compliance.

Jurisdictions with additional requirements:

UK:

According to the Guidance on how to prove and verify someone’s identity with NFC, you can only prove that an identity exists by collecting digital evidence and validating it.

This requires checking the following:

  • that the claimed identity has existed over time, has not been canceled, expired, reported lost or stolen;
  • that the identity belongs to the person who’s claiming it;
  • whether the claimed identity is at high risk of identity fraud.

Turkey:

The Regulation on Verification Process of the Applicant’s Identity in the Electronic Communications Sector permits NFC-based verification. However, in this case, the following is also mandated:

Advantages

NFC-based identity verification provides a range of benefits to consumers and businesses.

However, everything has its drawbacks.

Ai as an alternative to nfc-based verification

AI-driven KYC solutions with advanced liveness can reduce verification time down to seconds.

Together with liveness detection—which provides smooth biometric checks by comparing a person’s facial movements to photos on their submitted ID—AI-driven KYC solutions have proven to stand up against the most advanced fraud vectors, while maintaining a reliable, high-conversion verification flow.

Artificial intelligence (AI) automates data collection and eases the analysis stages, boosting time-efficiency and cost-effectiveness. This is instrumental in reducing human error in the fight against fraud and terrorist financing.

Sumsub is always here to provide you with such a solution. Reach out to give us a try.

Проблемы NFC:  Как настроить tinkoff pay и оплачивать покупки телефоном

Articles on iot based systems

IoT based Fall Detection System architecture

IoT based Fall detection system for elderly: The article covers architecture of the Fall detection system used for elderly people.
It mentions benefits or advantages of IoT Fall detection system.
Read More➤Also refer other articles on IoT based systems as follows:

• AirCraft Lavatory Cleanliness System
• Collision Impact Measuring System
• Perishable Food and Vegetables Tracking System
• Driver Assistance System
• Smart Retail System
• Water Quality monitoring System
• Smart Grid System
• Zigbee based Smart Lighting System
• Zigbee based smart parking system
• LoRaWAN based smart parking system

Comparison between nfc, bluetooth and infrared

ItemNFCBluetoothInfrared
Network TypePeer-to-PeerPoint-to-multipointPeer-to-Peer
Use Distance≤0.1m≤10m≤1m
Transmission Rate106, 212, 424 kbps, up to 868 kbps2.1 Mbps~1.0 Mbps
Response Time< 0.1s6s0.5s
SecurityHigh security (hardware implementation)High security (Software implementation)No security features (except when using IRFM)
Communication ModeActive-active/passiveActive-ActiveActive-Active
CostLowMediumLow

Compliance challenges

Below, you’ll find a list of key challenges for client onboarding via NFC-based verification:

Counterfeit products identification

NFC allows information to be read and received between two devices. This enabled company’s to create an entirely new way for their customers to identify any counterfeit products. 

Walimai, a Chinese start-up created anti-counterfeit labels that use NFC technology that buyers can scan with their smartphone to confirm the authenticity of the product they’re buying. 

Source: FoodNavigator-Asia

Differences between nfc and rfid

Although NFC is rooted in RFID technology, they are similar yet different in their own unique ways. NFC is a subset within the family of RFID technology. RFID was invented in the 1980s while NFC was invented in the 2000s. RFID, like other wireless standards like Bluetooth and WiFi, transmits data through radio waves.

Source: Asset Infinity

RFID was first created as an improvement to printed barcodes, where simple ID’s are stored and transmitted. RFID can be read quickly in batches (in <1ms) and can read at a range of 1m to 100m. 

NFC was first created as an improvement to QR codes, where multiple data types can be stored. NFC can also be read in <1ms but with a way shorter range of 0-10cm.

Disadvantages

Despite increased security, speed, and convenience, there are some things to be wary of.

  • It’s pricey: Like any advances in technology, there are costs attributed to development and implementation. Due to high costs, the introduction of NFC chips is likely to be limited to wealthier jurisdictions.
  • It’s unfamiliar: NFC-based verification is still a relatively new technology. Many people don’t know what the technology is, and wouldn’t understand if it’s secure enough to use.
  • Sometimes, it actually isn’t so secure: It’s important to note that mobile phones are vulnerable to hacking. As more and more people become reliant on their mobile phones, these devices have transformed into handheld computers. And just like computers, they are susceptible to viruses and hackers.
  • No demand from customers: Since we’re still in the early stages of adoption, customers may not be able to justify the implementation costs and ongoing expenses, as is this case with Sumsub. Sometimes it’s better to free up some resources and allow your business to focus on tasks more in line with customer needs.

Before you go ahead and opt for NFC identity verification, you should consider these pros and cons. Your business might need major improvements to introduce it, including, but not limited to, compliance-related updates.

Diverse applications

NFC-enabled mobile phones can activate a wide variety of applications, including mobile marketing (like coupons and loyalty programs), identity and access control, ticketing, gaming, and much more.

Felica

FeliCa is a patented NFC tag technology developed by Sony, which is widely used in exclusive payment and transportation applications in Asia. FeliCa tags are also integrated into the mobile phone model of the mobile FeliCa system. Felica tags belong to the Japanese industry standard. The tag is based on ISO 18902 in passive mode, with additional authentication and encryption features.

Fiber optic technology

Fiber optic component basics including detector, optical coupler, isolator, circulator, switches, amplifier,
filter, equalizer, multiplexer, connectors, de-multiplexer etc. This components are used in fiber optic communication.
Optical Components INDEX >>➤Fiber optic communication tutorial 
➤APS in SDH 
➤SONET basics 
➤SDH Frame structure 
➤SONET vs SDH

First step

NFC chips digitally verify the validity of document data without the risk of any optical character recognition or typing mistakes—an important first step.

Get started on nfc with these products

Now that you know the different benefits of NFC and how it is bringing us an edge for our convenience, here are some products to get you started!

Iot-internet of things wireless technologies

The section on IoT covers Internet of Things wireless technologies such as WLAN, WiMAX, Zigbee, Z-wave, UMTS, LTE, GSM, GPRS, THREAD, EnOcean, LoRa, SIGFOX, WHDI, Ethernet,
6LoWPAN, RF4CE, Bluetooth, Bluetooth Low Power(BLE), NFC, RFID, INSTEON, X10, KNX, ANT , Wavenis, Dash7, HomePlug and more.

It also covers IoT sensors, IoT components and IoT companies. Refer IoT main page>> and following links. ➤THREAD   
➤EnOcean   
➤LoRa tutorial  
➤SIGFOX tutorial  
➤WHDI   
➤6LoWPAN  
➤Zigbee RF4CE  
➤NFC  
➤Lonworks  
➤CEBus  
➤UPB

Проблемы NFC:  07d361k datasheet(1/4 Pages) UNSEMI | Radial Lead Varistor

Iso 14443

ISO 14443 is a well-known international standard originally designed for contactless chip cards in 13.56MHz radio communications. ISO 14443 defines a protocol stack from the wireless layer to the command protocol. There are two versions of wireless layer ISO14443-2, which have different modulation and bit coding methods.

ISO 14443 specifies two versions of the package framework and the underlying protocol portion (ISO 14443-3). The highest layer of the ISO stack defines the command interface (ISO 14443-4) that transmits information.

Matlab, labview, embedded source codes

The RF Wireless World’s source code section covers MATLAB, VHDL, VERILOG and LABVIEW Programming languages related codes.
These codes are useful for beginners in these languages.
REFER SOURCE CODE INDEX >>➤3 to 8 decoder VHDL code 
➤Scrambler descrambler MATLAB code 
➤32 bit ALU Verilog code 
➤T,D,JK,SR flipflop labview codes

Mifare

MIFARE refers to the type of NFC tag developed by NXP Semiconductor. MIFARE tags are widely used in memory cards for transport applications. ISO 14443 defines the protocol stack from the wireless layer to the command protocol.

Nfc application

NFC mobile phone has a built-in NFC chip, a part of the RFID module, which can be used as an RFID passive tag-to pay for fees, or as an RFID reader-for data exchange and acquisition. NFC technology supports a variety of applications, which can be divided into the following five categories:

Nfc implementation in apple airtag

Source: Apple

Nfc improves iot scalability

Scalability refers to the technology’s ability to adapt to changes in demand while maintaining its various functionalities.

The many functions of NFC in IoT mentioned above is only the tip of the iceberg! NFC excellence in security, ease-of-use and implementation will bring the current IoT’s technology to greater heights. NFC will simply IoT.

NFC has been existing close to twenty years and has constantly been used in different products. For example, almost all modern smartphone nowadays have built-in NFC chip for reading and writing NFC tags. A recent trending product that has NFC built-in is the Apple AirTag!

Parts of an nfc tag

In most cases, an NFC tag consists of an antenna IC (chip), PET substrate, adhesive package and release liner. However, manufacturers like Blue Bite’s partner Smartrac sometimes customize their manufacturing process to fulfill custom needs.

Personal usage

Besides Industrial Usage, due to NFC’s easy implementation, NFC is popular among regular consumers. Most consumer smartphones have built-in NFC chips that can read and write NFC devices. Therefore, hobbyists have been making use of NFC for their own smart home or convenience with NFC tags.

Source: Android Authority

Rf technology stuff

This page of RF wireless world covers step by step design of RF frequency converter with example of 70 MHz to C band RF UP converter
for microstrip board using discrete RF components viz. Mixers, Local oscillator, MMICs, synthesizer, OCXO reference oscillator,
attenuator pads.

Rf wireless articles

This Articles section covers articles on Physical layer(PHY), MAC layer, protocol stack and network architecture based on WLAN, WiMAX, zigbee, GSM, GPRS, TD-SCDMA, LTE, 5G NR, VSAT, Gigabit ethernet based IEEE/3GPP etc. standards.
It also covers test and measurement related articles on compliance testing used for device RF/PHY conformance tests. REFER ARTICLES INDEX >>.

Rf wireless calculators and converters

The calculators and converters section covers RF calculators, wireless calculators as well as unit converters.
These covers wireless technologies such as GSM, UMTS, LTE, 5G NR etc.
REFER CALCULATORS Index >>. ➤5G NR Throughput calculator  
➤5G NR ARFCN vs frequency conversion  
➤LoRa Data Rate Calculator 
➤LTE EARFCN to Frequency conversion 
➤Yagi Antenna Calculator 
➤5G NR sampling time calculator

Security access to prohibited areas and machinery

How Does NFC Work?
Source: WinMagic

NFC is used in many prohibited areas for restricted security access. NFC enables personnel to use their badge, phone, wristband, or key fob to open physical doors to access these restricted areas.

As mentioned, NFC is almost impossible to hack into as it has no connection to the internet, and also has built-in encryption features. Therefore, it is ideal to use NFC technology for restricted access. Using NFC for restricted security access brings in several features:

  • Time and Attendance logging for secure areas
  • Temporary Access grant to service personnel
  • Remote Key distribution management
  • Reduced maintenance cost with reduced tampering of significant machinery by unauthorised personnel

Special app usage

As a rule, reading NFC chip data is only possible with a special app. These apps may be issued by regulators or third-parties.

Examples:

This is not a complete list of applications, jurisdictions and requirements. Overall, compliance challenges are rapidly increasing, and we will constantly update them in this article.

Step two

Verify that the document belongs to the person presenting it and not someone else. To do this, you’ll need to perform face-matching.

Summary

NFC is a great technology. It brings several benefits to IoT technology and the real world! It is currently widely used in industrial and personal scenarios, where it brings convenience and simple data transmission with the highest level of security.

Test and measurement section

This section covers T&M resources, test and measurement equipments for testing DUTs based on
WLAN, WiMAX, Zigbee, Bluetooth, GSM, UMTS, LTE standards.
Test and Measurement INDEX >>➤PXI system for T&M.
➤Signal generation and analysis 
➤PHY layer measurements 
➤WiMAX device conformance test 
➤Zigbee conformance test 
➤LTE UE conformance test 
➤TD-SCDMA conformance test

Проблемы NFC:  Не работает сайт и приложение петроэлектросбыта

The optimal kyc process

Here’s our practical advice on building an effective NFC-based solution:

Type 1

  • Type 1 tags are cheap and suitable for a variety of NFC applications
  • Based on ISO-14443A standard
  • Readable and rewritable and configurable as read-only
  • 96-byte memory, scalable to 2KB
  • Transmission rate 106kbits/s
  • No data conflict protection
  • Compatible products: Innovision Topaz, Broadcom BCM20203

Type 2

  • Type 2, like type 1, is derived from the NXP MIFARE Ultralight tag
  • Based on ISO-14443A standard
  • Readable and rewritable and configurable as read-only
  • 96-byte memory, scalable to 2KB
  • Transmission rate 106kbits/s
  • Support for data conflict protection
  • Compatible products: NXP MIFARE Ultralight

Type 3

  • Type 3 is derived from the unclassified part of the Sony FeliCa tag. It is more expensive than the label of type 1 and 2, suitable for more complex applications
  • Based on the Japanese industry-standard (JIS) X 6319-4
  • Define properties that are readable, rewritable, or read-only at production time
  • Variable memory, up to 1MB space
  • Two transfer rates are supported: 212 or 424kbits/s
  • Support for data conflict protection
  • Compatible products: Sony FeliCa

Type 4

  • Type 4 is similar to type 1 in that it is derived from the NXP DESFire tag
  • Based on ISO-14443A standard
  • Define properties that are readable, rewritable, or read-only at production time
  • Variable memory, up to 32kB
  • Three transfer rates are supported: 106,212 or 424kbits/s
  • Support for data conflict protection
  • Compatible products: NXP DESFire, SmartMX-JCOP

Type 5

  • It is the latest type of NFC tag defined in recent years. NFC Forum introduced this series of chips to meet the growing variety of long-distance, miniaturized NFC tags, and their applications
  • Based on ISO-15693 standard
  • Readable and rewritable
  • Variable memory: 256 bits, 896 bits, 1280 bits, 2528 bits
  • Up to 53kbits/s
  • Support for data conflict protection
  • Compatible products: ICODE SLI-Xseries/TI 2K/ST LRI2K

Type 6

  • This type is only compatible with some mobile phones
  • Based on ISO-14443A standard
  • Readable and rewritable
  • Variable memory: 1KB,4KB
  • Data transfer of 106kbits/s
  • Support for data conflict protection
  • Compatible products: M1(S50,F08)

What is nfc?

NFC (Near Field Communication), jointly developed by Philips and Sony, is a contactless identification and interconnection technology that enables close wireless communication between mobile devices, consumer electronics, PC, and smart control tools.

NFC integrates contactless card reader, contactless card, and peer-to-peer functions into a single chip, creating countless new opportunities for consumers’ lifestyles. This is an open interface platform that can set up wireless networks quickly and actively. It is also a virtual connector for existing cellular networks, Bluetooth, and wireless 802.11 devices.

What is the range of nfc?

Theoretically, the maximum NFC tag range is 20 cm. But, in the real world, you would rarely find a reader of that range. This makes sense because NFC technology should be used at a relatively close distance for security reasons.

At a shorter identification distance, NFC can diminish the probability of undesirable capture, especially to prevent our credit cards or bank cards from being remotely stolen by criminals. Mostly it requires you to tap the tag, which makes it more secure to pay with NFC.

Where is nfc used in the real-world?

NFC will bring great benefits to IoT and it is also currently used in different products such as the Apple AirTag. However, where is it currently put to use in the Real-world?

Wireless technology tutorials

This section covers RF and Wireless tutorials. It covers tutorials on topics such as
cellular communication, WLAN (11ac, 11ad) , wimax, bluetooth, zigbee, zwave, LTE, DSP, GSM, GPRS,
GPS, UMTS, CDMA, UWB, RFID, radar, VSAT, satellite, wlan, waveguide, antenna, femtocell, test and measurements, IoT etc.
Refer TUTORIALS INDEX >>

End note

The need for high-quality KYC processes is more pressing than ever before. In-person transactions are becoming a thing of the past, and we need advanced solutions to facilitate the move to digital alternatives. This means implementing new technologies, which are emerging day by day.

But, with any new technology, implementation is only half the battle. The more difficult task is deciding exactly when to implement it. And while there are certainly positive outcomes in being ahead of the curve, there are also inherent risks for early adopters, especially during the experimentation phase.

NFC-based verification is relatively new and accordingly presents a risk for first-movers. Therefore, as a minimum, companies that decide to implement it should always be mindful and prepared for possible compliance challenges.

So, to stay fully compliant with all the current regulations, we recommend that you still use proven solutions, while continuing to monitor the latest trends in identity verification technology.

Stay tuned to our blog for more news and tips from our compliance experts.

Rf wireless vendors, manufacturers

RF Wireless World site covers manufacturers and vendors of various Rf components, systems and subsystems for vivid applications,
refer Vendors INDEX >>.

RF Wireless World Home Page-Passive RF components

RF Component vendors covering rf isolator, rf circulator, rf mixer, rf amplifier, rf adapter, rf connector, rf modulator, rf transceiver, PLL, VCO, synthesizer, Antenna, oscillator, power divider, power combiner, filter, attenuator, diplexer, duplexer, chip resistor, chip capacitor, chip inductor, coupler, EMC stuff, RF Design Software, dielectric material, diode etc.

Оцените статью
NFC в смартфонах