Understanding Near Field Communication (NFC) Technology

Payment systems and marketing loyalty programs are just the beginning for NFC technology. In addition to the mounting interest in NFC for mobile access control, NFC technology also promises to empower more efficient, effective industrial applications. Specifically, combining NFC-enabled smart mobile devices with (rugged) RFID tags offers additional benefits when compared to traditional RFID solutions.

Additionally, while the NFC standards for tags enable a broad variety of use cases and security, the concept of “trust” is not generally specified. HID Trusted Tag™ Services are available to confer trust onto items that are the subject of transactions between individuals and organisations. This white paper explores the capabilities and technological background of NFC and NFC tags enabling organisations to evaluate the potential role NFC can have in their market.

What's inside?

  • What is Near Field Communications - NFC?
  • NFC Operation Modes
  • NFC-enabled devices
  • Secure Element for storage of data for NFC applications
  • What is an NFC Tag?
  • NFC use cases with HID Global
Register to download...

Thank you for submitting your information.

Thank you for your download. Please check your inbox shortly – the asset will be emailed to you.

No email? Please check your Junk or Clutter folders; your email is likely to have been delivered there. To prevent this happening again, please white list our domain @SourceSecurity.com. Instructions can be found here.

Thank you!

Your request has been sent to the company. A representative from the company will get in touch with you shortly via the email / phone number you have provided.

Have a great day!

SourceSecurity.com Team

Popular Whitepapers

Financial institutions require future-ready physical security technologies

Physical security supports a future-proof cyber security strategy

Why outdated access control systems are a big problem

Is your access control as effective as you think?