What is NFC?
Near Field Communication (NFC) technology makes life easier and more convenient for consumers around the world by making it simpler to make transactions, exchange digital content, and connect electronic devices with a touch.
NFC devices support two communication modes.
In this mode, the target and the initiator devices have power supplies and can communicate with one another by alternate signal transmission.
In this mode, the initiator device generates radio signals and this electromagnetic field powers the target device. The target device responds to the initiator by modulating the existing electromagnetic field.
NFC devices can operate in three different modes based on the ISO/IEC 18092, NFC IP-1 and ISO/IEC 14443 contactless smart card standards.
In this mode, the NFC enabled phone can read or write data to any of the supported tag types in a standard NFC data format.
Peer to Peer
In this mode, two NFC-enabled devices can exchange data. For example, you can share Bluetooth or Wi-Fi link set up parameters to initiate a Bluetooth or Wi-Fi link. You can also exchange data such as virtual business cards or digital photos. Peer-to-Peer mode is standardized on the ISO/IEC 18092 standard.
An NFC-enabled phone acts as reader when in contact with tags. In this mode, the phone can act as a tag or contactless card for existing readers.
Key Benefits of NFC
NFC provides a range of benefits to consumers and businesses, such as:
- Intuitive: NFC interactions require no more than a simple touch
- Versatile: NFC is ideally suited to the broadest range of industries, environments, and uses
- Open and standards-based: The underlying layers of NFC technology follow universally implemented ISO, ECMA, and ETSI standards
- Technology-enabling: NFC facilitates fast and simple setup of wireless technologies, such as Bluetooth, Wi-Fi, etc.)
- Inherently secure: NFC transmissions are short range (from a touch to a few centimeters)
- Interoperable: NFC works with existing contactless card technologies
- Security-ready: NFC has built-in capabilities to support secure applications