Skip to main content

What Is NFC (Near Field Communication)?

Have you been hearing a lot about NFC (Near Field Communication) technology lately? To a layman, this is just another technology, like ‘Super’ AMOLED, ‘Retina’ Display, ‘PureView’ camera, ‘multi-core’ processor, and probably you think this is another marketing gimmick to get the device sold at the end of the day. You may haven’t paid much attention to it either.

However, there is a group of people who are very optimistic about NFC. Let the myths be busted! Let me explain to you in simple terms what NFC is and what it does.

Near Field Communication is a set of wireless standards that enables radio communication between two electronic devices by bringing them in close proximity

Well, that doesn’t sound so easy to understand, does it? In layman’s terms, with NFC, you can connect two devices (wirelessly) by tapping them together. That’s right! Just tap your phone to another and they have established an invisible link.

The prospective applications of this technology will astound you—with a tap of your smartphone you can pay for products and services, you can establish Wi-Fi connection with a router, you can get music and small videos transferred to your phone, you can exchange electronic business cards, you can travel in train or on air without your wallet, you can get movie tickets delivered to your phone, you can review restaurant menus and pay for meals, and much more.

NFC Standardization


Unlike ‘Super’ AMOLED or ‘Retina’ display, NFC is not a technology owned by a company. It’s a standard like Bluetooth or Wi-Fi that all manufacturers have to follow. Also, NFC is not a new technology; it is a mere extension of already existing wireless technologies, like Wi-Fi, Bluetooth, RFID, GSM, etc. In order to create a common standard for all NFC based communication, Nokia, Sony, and Phillips came together in 2004 to create a forum—the NFC Forum.

It is in this forum that everything related to NFC is developed. Now, the forum has 160 members. They include industry heavyweights like Google, AT&T, Intel, Samsung, Microsoft, Toshiba, LG, MasterCard, Visa, American Express, HP, Fujitsu, HTC, Daimler, PayPal, Marvell Studios, and several others.

A lot of big and small technology companies are part of this deal—suspiciously enough Apple is missing! All of the companies out there that manufacture smartphones have come up with NFC-enabled smartphones. Apple iPhone still lacks this technology. And the latest news has confirmed it that Apple won’t be including NFC even in iPhone 5. It’s very sad that Apple wants to build its own mobile payment technology as they ‘feel that there is no common standard in mobile payment systems out there’.

NFC Range


The connectivity through NFC is available only in a very short range—shorter than Wi-Fi and even shorter than Bluetooth. The range of NFC is less than 4 centimeters (slightly less than two inches). NFC is at the lowest band of wireless technologies.

The data transferred is in kilobytes level, and it uses globally available band of 13.56 MHz (you don’t need to know the details of this). For detailed specifications, you can download documents from the NFC Forum.

Security Concerns


Since it is short range, you cannot be vulnerable unless the attacker is within that range, apparently! Recently, BBC was reporting a demonstration of security attack on NFC (a demonstration by Charlie Miller of security research firm, Accuvant). This may put people into panic mode as several of us now are walking around with NFC smartphones.

However, let me make the things clear here for you. Any device that follows NFC specifications have their communications digitally signed to make them secure. This means, the two devices communicating with each other can identify the other device and can recognize if a third party is intervening in the connection.

The NFC security standard incorporates four layers of security—digital signature, ISO/IEC 13157-1:2010 standard, application security specified by the service provider, and additional security by the carrier or service provider for applications.

In the demonstration by Mr Miller, the hacking of the devices takes advantage of the default security rules of the device, and the default set of security rules is something that the user can configure. Also, the manufacturers will be able to make devices with better defaults for application level security that will make such attacks more difficult (I don’t say impossible as nothing really is; we have all seen people hacking into government websites, and I can’t say NFC being any more secure than such a website). This has been confirmed by the NFC forum itself, following the findings of Mr Miller.

So, there you go. You can trust NFC and get communications done securely through it.

Where Can You Use It?


Wherever you see an N-mark! The following is the N-mark.

nfc forum's n-mark

This is the official NFC logo developed and promoted by the Forum. This is licensed and can be downloaded from the forum website by accepting to the terms and conditions. The logo can be used on your outlet if you are a service provider with NFC capability.

So far the NFC system is not extensively available. NFC tags can be used to circulate information to handsets worldwide. An NFC tag is a tiny disk with a power-free chip built in. The chip contains a small bit of information, such as the address of a website or some text. Some tags can even contain multimedia content (such as tiny movie posters or trailers). These tags can be stuck to anything and tapping on the tag, your phone will receive the embedded information.

These tags can have a lot of uses. You can program the tag to open a particular website or application on your phone and when you tap on it, the application on your phone will open up; for instance, you can program a tag to open music player on your phone and stick it on your car’s dashboard; every time the phone approaches the tag, it will open the music player and start playing your favorite songs.

Conclusion


As you can see, NFC has loads of applications. It’s going to change the world as we know it if used far and wide. However, so far the technology has limited reach. A lot of people have to be made aware of the advantages in order to make it more pervasive.

Popular posts from this blog

What Is the Role of a Firewall, and How Does It Secure a Network From Unsafe Traffic?

To understand firewalls, basic understanding of how networks function is requisite. Deep down, how do the packets of information that you send reach the intended receivers? How do the messages intended for you reach you safely? And how does it all function like clockwork? Let’s understand the basics of firewalls and see how a firewall secures the traffic in and out of a network. Consider this scenario for getting an understanding of how firewalls work. Say, you open up your browser to book a flight ticket for your upcoming vacation, and your computer is conveniently insecure without a firewall. Let’s say you come across an intriguing email that gives an offer you can’t refuse. You open the email and click a link, and bam! An unwanted piece of spyware is installed on your system. The spyware then proceeds to sit on your system tray, hidden from your eyes, tracking the keystrokes you make, reading the top-secret files you have, and looking for potentially rewarding information, such...

How to Send Email in Your Own Language Script Through Gmail?

Have you ever had trouble sending an email to a distant relative who speaks a different language altogether? It has never been easy on email applications to send messages in other languages. Google’s popular email service, Gmail has come up with transliteration tools and other language input tools to make the service much better. You can type using Gmail interface in any language that you want. First of all, you need to select the languages that you want to use in composer. For this, go to Gmail settings and you will see the ‘Language’ option under General. Here, go to advanced language options and put a check mark to ‘Enable input tools’. Here, you can transliterate (type in English the words in other languages to have them appear in correct script), use a virtual keyboard, or edit your input method with the help of a regular keyboard to convert words into other alphabet. Transliteration feature was available although limited in Gmail. Select the input tools from the list by d...

Digital Marketing Done Properly in the New Age

I suppose it’s coincidence that this post appears almost exactly one year after Blue Bugle went sort of inactive. Today, the blog doesn’t enjoy as many readers as it once used to. This unfortunate thing is due to my hectic schedule in my new day job as senior content writer for an organization called MSys. This job gives me more opportunities to explore the separate aspects of the digital marketing domain. In the past, all we used to do was promoting our blog posts through social media at random thereby trying to gather as many visitors as possible. You never studied the prospects, the market, or the social channels you promote your stuff to.  Most of the SEO companies out there prided themselves in creating spammy blog comments to create links to client websites. Needless to say, most of these plans never worked or had less positive impact. Now, if you follow the same spammy activities, you are sure to get a ban at best. I had to come up with a new marketing plan for MSys th...