Understanding Near Field Communication (NFC) Technology

Understanding Near Field Communication (NFC) Technology

This white paper explores the capabilities and technological background of NFC and NFC tags

Payment systems and marketing loyalty programs are just the beginning for NFC technology. In addition to the mounting interest in NFC for mobile access control, NFC technology also promises to empower more efficient, effective industrial applications. Specifically, combining NFC-enabled smart mobile devices with (rugged) RFID tags offers additional benefits when compared to traditional RFID solutions.

Additionally, while the NFC standards for tags enable a broad variety of use cases and security, the concept of “trust” is not generally specified. HID Trusted Tag™ Services are available to confer trust onto items that are the subject of transactions between individuals and organisations. This white paper explores the capabilities and technological background of NFC and NFC tags enabling organisations to evaluate the potential role NFC can have in their market.

What's inside?

  • What is Near Field Communications - NFC?
  • NFC Operation Modes
  • NFC-enabled devices
  • Secure Element for storage of data for NFC applications
  • What is an NFC Tag?
  • NFC use cases with HID Global
Register to download...

Thank you for submitting your information.

Thank you for your download. Please check your inbox shortly – the asset will be emailed to you.

No email? Please check your Junk or Clutter folders; your email is likely to have been delivered there. To prevent this happening again, please white list our domain @SourceSecurity.com. Instructions can be found here.

Thank you!

Your request has been sent to the company. A representative from the company will get in touch with you shortly via the email / phone number you have provided.

Have a great day!

SourceSecurity.com Team

Popular Whitepapers

The truth behind 9 mobile access myths

6 good reasons to embrace mobile credentialing

Three essential reasons to upgrade your access control technology in 2022

The role of access control in a safe return to the workplace