Table of Contents
Introduction 1
About This Book 1
Foolish Assumptions 2
Icons Used in This Book 3
Beyond the Book 3
Where to Go from Here 4
Part 1 Getting Started with NFC 5
Chapter 1 Introducing Near Field Communication (NFC) 7
Presenting a Quick History of NFC 8
Defining the Need for NFC 10
Interacting with devices using simpler methods 10
Buying products with ease 10
Launching a marketing campaign 11
Building your personal network quickly and easily 12
Creating ad-hoc wireless connections 12
Having fun with games 13
Discovering Where NFC Wallets Are Used Most 13
Viewing NFC wallet use by area 14
Viewing NFC wallet use by purchase type 15
Presenting a Simplified View of NFC 16
Considering what is needed for NFC 16
Understanding the three NFC modes 18
Discovering the NFC actors 18
Chapter 2 Considering the NFC Difference 21
Understanding the NFC Forum Goals 22
Considering NFC Wireless Communication Specifics 23
Understanding selectivity 23
Showing intent 23
Creating secure access 24
Understanding How NFC Compares to Other Technologies 25
Defining how NFC differs from RFID 25
Defining how NFC differs from QR codes 26
Defining how NFC differs from Bluetooth Low Energy (BLE) 27
Defining how NFC differs from powered chips (Wi-Fi) 28
Following the Evolution from Smart Cards to Smartphones 28
Creating a Secure Environment 29
Creating a secure environment on the device 29
Creating a secure environment in the cloud 31
Part 2 Understanding NFC 33
Chapter 3 Defining NFC 35
Understanding the Need for Standards 36
Investigating the Two Main NFC Standards 37
Considering ISO/IEC 14443 38
Considering ISO/IEC 18000-3 40
Considering FeliCa (JIS 6319-4) 40
Considering Card Emulation 41
Performing mobile payments 41
Accessing transit 43
Managing access control 44
Defining the Five Tag Types 46
Working with the Type 1 tag 47
Working with the Type 2 tag 47
Working with the Type 3 tag 47
Working with the Type 4 tag 48
Working with the Type 5 tag 48
Understanding the tag initiation sequence 49
Defining the NFC Data Exchange Format (NDEF) 51
Understanding NDEF messages 51
Understanding NDEF records 52
Locating Additional Resources on the NFC Forum 54
Chapter 4 Considering NFC Hardware 57
Understanding NFC Hardware Basics 58
Considering the NFC controller chip 58
Communicating with the antenna 62
Understanding tags and emitters 63
Considering NFC Communication Modes 64
Understanding active mode 64
Understanding passive mode 64
Considering NFC Operating Modes 64
Working in card emulation mode 65
Working in reader/writer mode 65
Working in peer-to-peer mode 67
Differentiating Between Interrogators and Tags 68
Understanding the Transfer of Power 70
Communicating Between Devices 71
Understanding what half duplex means 71
Working with ISO/IEC 14443 Type A tags 72
Working with ISO/IEC 14443 Type B tags 72
Working with FeliCa (JIS 6319-4) tags 73
Adding NFC to an Existing Device 73
Ensuring the device supports NFC 73
Getting the right NFC add-on type 74
Chapter 5 Considering NFC Software 77
Discovering the Key Players in NFC Development 79
Creating the NFC ecosystem 79
Working with mobile payments 81
Understanding how NFC is deployed in unique ways 82
Turning On Smartphone NFC Support 84
Performing Card Emulation Tasks 85
Defining Host Card Emulation (HCE) 85
Understanding interactions with devices 87
Using Encryption to Secure Communications 88
Understanding the concept of tokenization 89
Using the ISO/IEC 7816-4 commands 90
Writing Tags 91
Using a smartphone 91
Using an accessory reader/writer 92
Using a high-speed encoding system 93
Managing NFC Tags 94
Defining the management tasks 94
Determining whether you need an API solution 95
Making NFC Part of the Internet of Things (ioT) 96
Differentiating Between Web Apps and Mobile Apps 97
Part 3 Using NFC 99
Chapter 6 Using NFC for Payments 101
Understanding Mobile Wallet Security Requirements 102
Relying on Secure Element (SE) 102
Considering the security information locations 104
Relying on Host Card Emulation (HCE) 106
Understanding the role of Trust Zone 108
Considering the Potential Mobile Wallet Solutions 109
Using Magnetic Secure Transmission (MST) 110
Employing QR solutions 111
Enjoying NFC Solutions 112
Understanding what EMV does 114
Grasping why EMV transactions are more secure 115
Defining the advantages of using EMV 117
Chapter 7 Employing NFC for Identification 119
Using NFC for Workplace Monitoring 120
Authenticating Users 122
Entering rooms 122
Working with computers 123
Using resources 124
Working with other devices 126
Using an NFC Phone 127
Authenticating with an access control card 127
Creating a college campus ID card 128
Managing hotel room and other access control cards 129
Personalizing NFC Use 130
Using tags to perform common actions 130
Creating tags to log onto home networks 132
Replacing Your Car Keys 132
Gaining vehicle access 132
Adjusting the seat position 133
Automating Vehicle Interactions 134
Presenting a driver's license 134
Performing vehicle inspections 135
Chapter 8 Using NFC in Health Care 137
Dealing with Privacy Issues 138
Performing Hospital-related Tasks 138
Accessing medical records 139
Ensuring that patients receive correct medications and dosages 140
Tracking patient progress 141
Scheduling occupational and physical therapy 143
Tracking doctors and nurses 145
Working with Logger Tags 145
Differentiating between transdermal and subdermal 146
Making measurements 148
Monitoring Patients Remotely 150
Managing patient care 150
Verifying health care professional visits 150
Interacting with Patient Monitors 151
Addressing Accessibility Needs 152
Chapter 9 Considering Other NFC Uses 155
Performing Marketing Tasks 156
Interacting with customers 156
Managing products 158
Having Fun with Applications 159
Playing games 159
Producing video greetings and invitations 160
Making donations easy 161
Keeping track of time 162
Managing trees 162
Managing Events 163
Purchasing tickets 164
Tracking attendance 164
Addressing emergency needs 165
Interacting with Customers 166
Getting and using coupons 166
Getting and using gift cards 166
Providing a store layout 167
Managing sweepstakes and loyalty campaigns 169
Sharing recipes and other supplemental information 169
Managing receipts 170
Creating NFC Wearable Devices 170
Working with Appliances 172
Developing NFC Smart Posters 173
Discovering the advantages of NFC smart posters 173
Understanding how smart posters work 174
Getting the N-Mark Iogo 176
Part 4 Avoiding NFC Issues 177
Chapter 10 Avoiding the Not-Used-Here Mentality 179
Working with Businesses that Don't Use NFC 180
Considering the digital payment conundrum 180
Defining the digital payment benefits 181
Using NFC in the B2B environment 181
Developing Apps that Won't Work Without NFC 183
Creating a Business Plan Showing NFC Advantages 184
Chapter 11 Understanding the Hardware Issues 187
Ensuring that the Device is Ready 188
Turning the device on 188
Configuring the device to use NFC 188
Configuring the device to use a related technology 189
Using the Device Correctly 190
Understanding Odd Device Behaviors 192
Considering the MIFARE Classic tag compatibility issue 192
Determining device functionality 192
Finding the Device's Sweet Spot 193
Considering Other Tag Issues 194
Determining when a tag is simply broken 194
Reading tags on metal 195
Reading tags near water 195
Chapter 12 Understanding the Software Issues 197
Installing Needed Software 198
Getting a general application 198
Using a tag writer or other utilities 199
Encoding tags using a USB tag reader/writer 201
Knowing the Modes Your Device Supports 203
Providing Biometric Authentication 204
Considering the types of biometric authentication 204
Discovering the problems that could occur with biometric authentication 206
Understanding how hackers overcome biometric authentication 207
Getting Apps from Reliable Sources 208
Chapter 13 Considering Networking Problems 211
Understanding the Cost of Using Wi-Fi 213
Comparing Wi-Fi and Bluetooth 213
Pairing with consumer electronics 214
Pairing with a network 215
Understanding the Cost of Using Bluetooth 216
Pairing with consumer electronics 217
Detecting the Bluetooth version problem 218
Making devices discoverable 219
Dealing with Environmental Factors 219
Considering the effects of water 220
Considering the effects of metal 220
Eliminating sources of interference 221
Considering Potential Security Issues 222
Part 5 The Part of Tens 223
Chapter 14 Ten Places to Find NFC-Specific Information 225
NFC Forum 226
Smart Card Alliance 226
Groupe Speciale Mobile Association (GSMA) 227
NFC World 228
NFC Times 228
NearFieldCommunication.org 229
Pymnts.com 229
EverydayNFC 230
Gartner 230
IHS Technology 231
Chapter 15 Ten Really Cool NFC Implementations 233
Harvard Medical School and Brigham and Women's Hospital 234
Blue Bite 234
Galatea: Jewelry by Artist 235
NFC Ring 236
Khushi Baby 236
Rémy Martin 236
Tracking the Things You Love 237
Tappy 237
PetHub 237
London History Museum 238
Oxfam 239
Skylanders Superchargers 239
Chapter 16 Ten NFC Trends 241
Moving from Tap-to-Pay to Tap-to-Buy 242
Enhancing the Gaming Experience 243
Improving Health care 244
Creating New Marketing Strategies 245
Managing Events ZHD 246
Enhancing the Effects of Mobile Commerce 247
Making the Most of Wearables 248
Interacting with Smart Appliances 249
Authenticating Products 250
Considering B2B Trends 250
Chapter 17 Ten NFC Companies You Need to Know About 251
Blue Bite 252
NXP 252
Flomio 254
Smartrac 254
HID Global 255
Poken 256
Cellotape 257
Advanced Card Systems (ACS) Holdings Limited 257
Thinfilm 258
Smartwhere 258
Index 261