Near field communication and RFID - opening for new business

63
Josef Noll, 26.4.2005 RFID - NFC tutorial 1 Near field communication and RFID – opening for new business Josef Noll 1 , Juan Carlos Lopez Calvet, Telenor R&D, , N-1331 Fornebu [email protected], [email protected] 1 from 1.6.2005 Prof. stip. University Graduate Studies (UniK) N-2027 Kjeller

description

Tutorial given at Eurescom Summit April 2005

Transcript of Near field communication and RFID - opening for new business

Page 1: Near field communication and RFID - opening for new business

Josef Noll, 26.4.2005 RFID - NFC tutorial 1

Near field communication and RFID – opening for new business

Josef Noll1, Juan Carlos Lopez Calvet, Telenor R&D, , N-1331 [email protected], [email protected]

1 from 1.6.2005 Prof. stip. University Graduate Studies (UniK)N-2027 Kjeller

Page 2: Near field communication and RFID - opening for new business

Josef Noll, 26.4.2005 RFID - NFC tutorial 2

Agenda0900 Welcome – interests0920 RFID – the means for

authentication0950 Q & A1010 RFID & NFC:

technology and scenarios1045 Q & A1100 deep breath – break1110 demonstrations1200 end of tutorial

– The upcoming digital world – need for seamless authentication

– RFID basics, frequencies, …– Applications: Sports, etc.

– NFC technology– Scenarios (travel scenario, DRM,

Information retrieval)

– State of the art

– Authentication – your own phone– Infokiosk – imagine the world

– Payment and ticketing (Giesecke& Devrient)

– NFC and mobile Commerce (Nokia/Telenor)

Page 3: Near field communication and RFID - opening for new business

Josef Noll, 26.4.2005 RFID - NFC tutorial 3

Telenor R&D

Important contributor to innovation and value creation in Telenor

Demonstrating: “Ideas that simplify

Tromsø (17)

Trondheim (23)

Fornebu (170)

Norway – what happened?

International: NO, SE, DK, Hungary, Austria, Montenegro, Malaysia, Ukraina, Bangladesh, Thailand, Russland

Page 4: Near field communication and RFID - opening for new business

Josef Noll, 26.4.2005 RFID - NFC tutorial 4

Agenda0900 Welcome – interests0920 RFID – the means for

authentication0950 Q & A1010 RFID & NFC:

technology and scenarios1045 Q & A1100 deep breath – break1110 demonstrations1200 end of tutorial

–The upcoming digital world – need for seamless authentication

– RFID basics, frequencies, …– Applications: Sports, etc.

Page 5: Near field communication and RFID - opening for new business

Josef Noll, 26.4.2005 RFID - NFC tutorial 5

Service development

1G:

1970 1980 1990 2000 2010

3G:

2G:

B3G:

Mobile telephony

Mobile telephony, SMS, FAX, Data

Multimedia communication

Personalised broadband wireless services

Page 6: Near field communication and RFID - opening for new business

Josef Noll, 26.4.2005 RFID - NFC tutorial 62001 2005 2008/2010

Service Network

2G/GPRSServices

Packet and circuit switched

Packet switchedonly

Open Services Access

Cyberworld

Ubiquitous Services

Community PersonalNetwork

Core Network

UMTSUMTS R5

Programmable Networks

IP Backbone

Modular Protocols

QoS Mobility

Access Network

GERAN PAN

WLAN ++

Ad Hoc

New CellularUbiquitous

accessIP AccessWLAN

Terminal Technology Multi-

modeSW

RadioSingle-mode

reconfigurability

PAN…wearables, open architecture(s)

Radio Technology

CDMATDMA

OFDM

MIMO UWB SW Radio

WRC’03 WRC’06

MSS HAS

Source: Eurescom P1145

Page 7: Near field communication and RFID - opening for new business

Josef Noll, 26.4.2005 RFID - NFC tutorial 7

Keep customers:Enable the Open Access Network

Millions of fixed lines function asfeeder lines for open pico-base stations

fixed

Subscribers’fixed lines

UMTS

GSM/GPRS

Open access network

+

Supported by seamless authentication based on the Mobile Phone

Personalised and broadband services

Page 8: Near field communication and RFID - opening for new business

Josef Noll, 26.4.2005 RFID - NFC tutorial 8

Future Service composition(transparent for the end customer)

Next Generation Applications:– Customized services– Complex to manage

– High flexibility

– Short time to market

– Complex Telecom-IT integration

Telecom challenges– Support the customer:

security, personalisation

– Join forces with others

– Adaptive & composed services

My Company

App1

App2

App3 Support

Comp.WEB SAP

Telecom Operator

Security

Telecom access

Interface

Interface

Alternative

Home WorkFriend Train

CarHotel

RoamingPersonal

Profile

Location

Interfaceplatform

Page 9: Near field communication and RFID - opening for new business

Josef Noll, 26.4.2005 RFID - NFC tutorial 9

Need for an identifier

Real world: see and/or talkVoice

Face

Virtual world: email, webUsername, passwd

SIM

PKI

Service world (between providers)Identity management

Service level agreement (SLA)

Trust relation

Page 10: Near field communication and RFID - opening for new business

Josef Noll, 26.4.2005 RFID - NFC tutorial 10

Local interactions are a natural step toward multi-radio access of complementing radio technologies

BT

RFID

WLANWCDMA

Cellular Access Hot Spot Access

Broadcasting world:mass media

TV

Proximity world:local servicespersonal area

Cdma2000 1x

DVB-H

"personal, trustworthy, seamless global roaming"

"richest available content, browsing

just for the fun of it"

“CNN news, Sugar Bowl on the road"

“local interactions, service discovery & access,

ticketing "

EDGE

HSDPA

CDMA 1x EV_DV

GPRS

FM radio

Visual radio

Source: Andreas Lundin, Nokia

Page 11: Near field communication and RFID - opening for new business

Josef Noll, 26.4.2005 RFID - NFC tutorial 11

Agenda0900 Welcome – interests0920 RFID – the means for

authentication0950 Q & A1010 RFID & NFC:

technology and scenarios1045 Q & A1100 deep breath – break1110 demonstrations1200 end of tutorial

–The upcoming digital world – need for seamless authentication

– RFID basics, frequencies, …– Applications: Sports, etc.

Page 12: Near field communication and RFID - opening for new business

Josef Noll, 26.4.2005 RFID - NFC tutorial 12

What is RFID?Stands for Radio Frequency Identification

Mostly used for Access Control and Vehicle Immobilizer

The data carrier is generally called a “Tag” and attached to an item or location

Tags are passive (battery-less), in sticker or disc format

Radio frequency 13.56 Mhz globally the most widely used for RFID

The data gatherer is termed a “Reader”, e.g. integrated to Nokia 5140 phone

Source: Andreas Lundin, Nokia

Page 13: Near field communication and RFID - opening for new business

Josef Noll, 26.4.2005 RFID - NFC tutorial 13

RFID Tag (Transponder)

Consist of microchip that stores data and antenna

Active transponders have on-tag battery

Passive transponders obtain all power from the interrogation signal of readerActive and passive only communicate when interrogate by transceiver

Available in all forms

Page 14: Near field communication and RFID - opening for new business

Josef Noll, 26.4.2005 RFID - NFC tutorial 14

Some technologyRFID – available on tape

Price per. RFID tag: down to 0.04 €

Inductioncoile

The chip

3

Source: Tor Hjalmar Johannessen, Telenor

Page 15: Near field communication and RFID - opening for new business

Josef Noll, 26.4.2005 RFID - NFC tutorial 15

RFID Reader (Transceiver)

Consist of a RF module, a control unit, and a coupling element to interrogate tags via RF communication

Also have secondary interface to communicate with backend systems

Reads tags located in hostile environment and are obscured from view

Page 16: Near field communication and RFID - opening for new business

Josef Noll, 26.4.2005 RFID - NFC tutorial 16

Example RFID Readers

Source: Andreas Lundin, Nokia

Page 17: Near field communication and RFID - opening for new business

Josef Noll, 26.4.2005 RFID - NFC tutorial 17

RFID Tag Average Selling Price

0,00

0,10

0,20

0,30

0,40

0,50

0,60

2000 2001 2002 2003 2004 2005 2006 2007

US

D p

er t

ag

Source: Andreas Lundin, Nokia

Page 18: Near field communication and RFID - opening for new business

Josef Noll, 26.4.2005 RFID - NFC tutorial 18

RFID – communication modes

RFID tag:- microchip attached to an antenna - sends signals to a reader. - contains a unique serial number, but may have other information, such as a customers' account number.

Inductive Coupling

Propagation Coupling

Aktive (own power) Range: ad lib (no limit) Passive (inductive) Range: from mm to some metres

Source: Tor Hjalmar Johannessen, Telenor

Reader (passiv RFID):- Inductor to create electromagnetic field in tag- Receiver for radio response from tag

(ROM-value: up to 600 bytes, typical 64-128 bits

Page 19: Near field communication and RFID - opening for new business

Josef Noll, 26.4.2005 RFID - NFC tutorial 19

Security:Magnetic Field Power drop off

Source: Auracomm.com

Page 20: Near field communication and RFID - opening for new business

Josef Noll, 26.4.2005 RFID - NFC tutorial 20

Tag principles

RFID-tag

- own processor-w/ EEPROM / flash-ROM & RAM

Source: Tor Hjalmar Johannessen, Telenor

Page 21: Near field communication and RFID - opening for new business

Josef Noll, 26.4.2005 RFID - NFC tutorial 21

Principle function – passive RFID

1. RFID comes close to a contact point

2. Contact point induces magnetic field (to the magnetic coil)

3. Coil generates power for the chip (which starts immediately)

4. Chip generates RF response (RFID)

Reader

To backend system

RFID-tag

Source: Tor Hjalmar Johannessen, Telenor

Page 22: Near field communication and RFID - opening for new business

Josef Noll, 26.4.2005 RFID - NFC tutorial 22

Frequency area - applications

Frequency Band Characteristics Typical Applications

Low100-500 kHz

Short to medium read rangeInexpensivelow reading speed

Access controlAnimal identificationInventory controlCar immobiliser

High850-950 MHz2.4-5.8 GHz (*)

Long read rangeHigh reading speedLine of sight requiredExpensive

Railroad car monitoringToll collection systems

(*) 2 megabits per second data rates may be achieved, with added noise immunity provided by the spread spectrum modulation approach.

Source: Tor Hjalmar Johannessen, Telenor

Intermediate10-15 MHz

Short to medium read rangepotentially inexpensivemedium reading speed

Access controlSmart cards

Page 23: Near field communication and RFID - opening for new business

Josef Noll, 26.4.2005 RFID - NFC tutorial 23

Agenda0900 Welcome – interests0920 RFID – the means for

authentication0950 Q & A1010 RFID & NFC:

technology and scenarios1045 Q & A1100 deep breath – break1110 demonstrations1200 end of tutorial

–The upcoming digital world – need for seamless authentication

– RFID basics, frequencies, …– Applications: Sports, etc.– Potential Risks

Page 24: Near field communication and RFID - opening for new business

Josef Noll, 26.4.2005 RFID - NFC tutorial 24

Applications- steadily increasing…

Reality:- Identification of animals: cats, horses (value,

identity), …, salmon (origin), farms (feeding)- Logistic: Transport, parcels (DHL), bagage (airports),

stocks- Purchase: Wal-Mart, Gillette, Bennetton (automatic

cashier)- Loan: library- Traffic: rush hour charging, traffic light priority, bus

information in Edingburgh- Border control (USA-Canada)- Credit card: alternative to magnetic stripe, AMEX &

MasterCard WWW.PAYPASS.COM- Sports: Boston Marathon, Birkebeiner- Theft alarm: clothes, cars,.., car key/start control- Security: Admission control

Brand ProtectionLogisticsAnti counterfeitingPositioningLocatingTalking medicines for the blindAuto rejecting wrong partsTransactionsMerchandisingEntertainmentSecure AccesseCommerce fulfilmentControlling grey marketsReal time theft detectionReal time tampering detectionThe Internet of ThingsFast Track Behaviour monitoring Market researchVirtual queuingAutomated diagnosticsAutomated performance recordAnd more...

Source: Tor Hjalmar Johannessen, Telenor

Page 25: Near field communication and RFID - opening for new business

Josef Noll, 26.4.2005 RFID - NFC tutorial 25

Sports & Money

The Boston MarathonReal-time Tracking of Runners-every 5 km-introduced in 1999

http://www.ti.com/tiris/docs/solutions/sports.shtml &http://www.championchip.com/chips/

RFID-tag

Euro bank notes to embed RFID chips by 2005http://www.eetimes.com/story/OEG20011219S0016

Money identification:

Source: Tor Hjalmar Johannessen, Telenor

Page 26: Near field communication and RFID - opening for new business

Josef Noll, 26.4.2005 RFID - NFC tutorial 26

Credit card-developments towards RFID

Source: Mastercard

Page 27: Near field communication and RFID - opening for new business

Josef Noll, 26.4.2005 RFID - NFC tutorial 27

Mastercard PayPasswww.paypass.com

Page 28: Near field communication and RFID - opening for new business

Josef Noll, 26.4.2005 RFID - NFC tutorial 28

Agenda0900 Welcome – interests0920 RFID – the means for

authentication0950 Q & A1010 RFID & NFC:

technology and scenarios1045 Q & A1100 deep breath – break1110 demonstrations1200 end of tutorial

–The upcoming digital world – need for seamless authentication

– RFID basics, frequencies, …– Applications: Sports, etc.– Potential Risks

Page 29: Near field communication and RFID - opening for new business

Josef Noll, 26.4.2005 RFID - NFC tutorial 29

Potential Security Problems

Security problem 1: RFID is easy to clone

- hide a reader in a lift door, a chair, or other places you come closeRead respons and programme a separate tag with same RFID id.The user can’t know where reading took place. Difficult to trace later on

WARNING

1. Authentication: Cloning – theft of RFID2. Confidentiallity – Uncontrolled surveillance

Security problem 2: Uncontrolled Surveillance

-With hidden tags in clothes, money, credit card the user has no longer controlwhen/where/how he can be detected.

Organisations are active to stop RFID. Ref: www.stop-rfid.orgPotential restrictions on the way in the USA.

WARNING

Source: Tor Hjalmar Johannessen, Telenor

Page 30: Near field communication and RFID - opening for new business

Josef Noll, 26.4.2005 RFID - NFC tutorial 30

Vulnerability

Security in RFID is weak if not enhanced by an extra layer, e.g. PKI (encryption is not resistant against replay, if content is not shifted)

Remember:

����������� ��������������� ��������������� ��������������� ���� ��� ���������� ������� ���������� ������� ���������� ������� ���������� ����

Controlled case

ReaderUncontrolled reader

Reading up to several cm

This is also recognised by the public: www.stoprfid.org

Source: Tor Hjalmar Johannessen, Telenor

Page 31: Near field communication and RFID - opening for new business

Josef Noll, 26.4.2005 RFID - NFC tutorial 31

Enhancement

RFID security can be enhanced:- ”on/off” switch if the circuit is activated- under user’s control

Suggestion: Combination with SIM/PKI (two factor authentication)a) RFID = triggerb) RFID signal routes to SIM for explicit verification

Source: Tor Hjalmar Johannessen, Telenor

Page 32: Near field communication and RFID - opening for new business

Josef Noll, 26.4.2005 RFID - NFC tutorial 32

Boycott Gillette Products! Click for details.

Others:- Wal-Mart-Benetton: http://boycottbenetton.or

Benetton was considering putting RFID tracking chipin their clothing that can be read from a distance andused to monitor the people wearing them.

Annet: http://www.epic.org/privacy/rfid/

Source: www.stop-rfid.org

Page 33: Near field communication and RFID - opening for new business

Josef Noll, 26.4.2005 RFID - NFC tutorial 33

Agenda0900 Welcome – interests0920 RFID – the means for

authentication0950 Q & A1010 RFID & NFC:

technology and scenarios1045 Q & A1100 deep breath – break1110 demonstrations1200 end of tutorial

– Speed?– Understanding?

– …

- I want to hear more of…

Page 34: Near field communication and RFID - opening for new business

Josef Noll, 26.4.2005 RFID - NFC tutorial 34

Agenda0900 Welcome – interests0920 RFID – the means for

authentication0950 Q & A1010 RFID & NFC:

technology and scenarios1045 Q & A1100 deep breath – break1110 demonstrations1200 end of tutorial

– NFC technology– Scenarios (travel scenario, DRM,

Information retrieval)

– State of the art

Page 35: Near field communication and RFID - opening for new business

Josef Noll, 26.4.2005 RFID - NFC tutorial 35

Future scenario: „My services at home“

1.

2.

3.

4.Status of my family

5. eGovernment, el. signature

Page 36: Near field communication and RFID - opening for new business

Josef Noll, 26.4.2005 RFID - NFC tutorial 36

Security in the virtual world

Sec

urity

Req

uire

men

t

Nice to know

Needto know

Haveto know

Examples:

mHandel,VPN

Intranet, email,Admittance

Network access

Page 37: Near field communication and RFID - opening for new business

Josef Noll, 26.4.2005 RFID - NFC tutorial 37

Security infrastructure

Security depends on application– Nice to know: WLAN network access

– Need to know: email, Intranett– Have to know: VPN, (eCommerce)

Higher level require more than just username & passwordhttp://www.openauthentication.org/ suggests 3 methods

– SIM authentication (GSM, EAP-SIM,…)– Public Key Infrastructure (PKI)

– One-Time-Password (OTP)

In-line with requirements from Norwegian government for eSignature Depending on application: username & password or PKIThe Mobile phone has all three: SIM, PKI, and OTPChallenge: Usability and exchange of credentials to “my working devices”

Page 38: Near field communication and RFID - opening for new business

Josef Noll, 26.4.2005 RFID - NFC tutorial 38

The only thing you need:Your Mobile Phone

SIM with RFID & PKI

Page 39: Near field communication and RFID - opening for new business

Josef Noll, 26.4.2005 RFID - NFC tutorial 39

Four-in-one: Your mobile integrates them all

Sec

urity

Req

uire

men

t

Nice to know

Needto know

Haveto know

Examples:

mHandel,VPN

Intranet, email,Admittance

Network access

*Patent pending

&* RFID (& SIM)

&

* RFID & SIM passwd

*

&

RFID, SIM & PKI

Page 40: Near field communication and RFID - opening for new business

Josef Noll, 26.4.2005 RFID - NFC tutorial 40

Service access

Seamless authentication

Physical access

VPNHome access,

.mp3, .jpg

Page 41: Near field communication and RFID - opening for new business

Josef Noll, 26.4.2005 RFID - NFC tutorial 41

Timeline: Phone with RFID & PKI

Near Field Communication (NFC)

Standardisation of Philips, Nokia, Sony, …

Phones with RFID chipPhone status: Nokia: on stock, Siemens: prototypes

SIM card with integrated RFID

Prototypes available from:– Giesecke & Devrient:

demonstrated on Siemens phones

– Gemplus: both on one chip, (terminated) NFC

Page 42: Near field communication and RFID - opening for new business

Josef Noll, 26.4.2005 RFID - NFC tutorial 42

Near Field Communication (NFC) is a touch-based RFID technology

• NFC works in the globally available 13.56 MHz band• The effective working distance is up to a few centimeters• Based on ISO 18092 including ISO14443A MiFare and FeliCa

standards, ie compatible with the most broadly established smart card infrastructure covering >80% of the market

Technology

Tags

Devices

• Tags in smart objects are powered by the radio signal of the reader, and do not require any battery or other source of power

• The tags contain some memory that can store URLs, SMS and similar information

• Costs currently a few ten EUR cents and decreasing rapidly

• Devices do not contain tags, but can communicate using the same interface

• Devices can not only read tags, but also write to enabled tags

Sources: Nokia, Froster & Sullivan; Forrester

Page 43: Near field communication and RFID - opening for new business

Josef Noll, 26.4.2005 RFID - NFC tutorial 43

NFC changes the role of the mobile operator

The mobile operator is the communication provider– Everybody has a mobile phone

– People know that they can reach me – and not my parents– Companies have identified the value of personal phones and change their

infrastructure– The phone carries all my contacts

– Connected 24/7 (all the time, not just 4 h a day)

From access to communication– Provide communication: voice, SMS, MMS, IM,

email,….– Seamless login (wap.telenormobil.no) – my

email, last 10 visited

Provide presence and community servicesProvide authentication and security

Page 44: Near field communication and RFID - opening for new business

Josef Noll, 26.4.2005 RFID - NFC tutorial 44

Near field communication (NFC) Based on RFID technology at 13.56 MHz

Typical operating distance 10 cm

Compatible with RFIDData rate today up to 424 kbit/s

Philips and Sony

ECMA-340, ISO/IEC 18092 & ECMA-352, …standards

Powered and non-self powered devices

Page 45: Near field communication and RFID - opening for new business

Josef Noll, 26.4.2005 RFID - NFC tutorial 45

NFC applications

Source: ecma, tc32-tg19-205-013.pdf

Page 46: Near field communication and RFID - opening for new business

Josef Noll, 26.4.2005 RFID - NFC tutorial 46

Near field communication (NFC) - Applications and Compatibility

ApplicationsTransmit pictures from Camera to PC or TVDownload applications or gamesConfigure communication parameters in e.g. home network

Smart card compatibility (Philip’s MIFARE and Sony’s Felica)Secure NFC (NFC + smart card)Active or passive operation

Page 47: Near field communication and RFID - opening for new business

Josef Noll, 26.4.2005 RFID - NFC tutorial 47

“How does it work?”Nokia Field Force Solutions

http://www.nokia.com/nokia/0,,70857,00.html

Better service idea?

Click to start flash

Page 48: Near field communication and RFID - opening for new business

Josef Noll, 26.4.2005 RFID - NFC tutorial 48

NFC standardisation

ECMA-340Specifies the RF signal interfaceInitialisation, anti-collision and protocols

Communication mode selection mechanism ECMA 352 (v1, Dec 2003)

Selects communication modes: NFC, PCD, and VCDEnables communication in that mode

Page 49: Near field communication and RFID - opening for new business

Josef Noll, 26.4.2005 RFID - NFC tutorial 49

Near Field Communication Interface Protocol (NFCIP) - finalised

Page 50: Near field communication and RFID - opening for new business

Josef Noll, 26.4.2005 RFID - NFC tutorial 50

NFCIP-2 Interface and protocol(ISO/IEC 21481)

ECMA-340ISO/IEC 14443

PCD mode

(MIFARE, FeliCa)

ISO/IEC 15693VCD mode

(facility access)

InterfaceStandards

Page 51: Near field communication and RFID - opening for new business

Josef Noll, 26.4.2005 RFID - NFC tutorial 51

NFC Interface and ProtocolSummary

Page 52: Near field communication and RFID - opening for new business

Josef Noll, 26.4.2005 RFID - NFC tutorial 52

ECMA: NFC work items & future plans

Work itemsECMA-356: RF interface tests for ECMA-340 devicesECMA-362: Protocol Test Methods

Future working itemsA mapping of NFC to other communication protocols including the Internet Protocol (IP), GSM and Bluetooth

– Advanced Logical Link Control with addressing and segmentation support

Support for Data Link and end-to-end security and key managementAir-to-wired interface specificationApplication extensions in NFCIP-1

– Power control as an example application extension

Page 53: Near field communication and RFID - opening for new business

Josef Noll, 26.4.2005 RFID - NFC tutorial 53

Agenda0900 Welcome – interests0920 RFID – the means for

authentication0950 Q & A1010 RFID & NFC:

technology and scenarios1045 Q & A1100 deep breath – break1110 demonstrations1200 end of tutorial

– NFC technology– Scenarios (travel scenario, DRM,

Information retrieval)

– State of the art

Page 54: Near field communication and RFID - opening for new business

Josef Noll, 26.4.2005 RFID - NFC tutorial 54

Page 55: Near field communication and RFID - opening for new business

Josef Noll, 26.4.2005 RFID - NFC tutorial 55Source: GemPlus

Page 56: Near field communication and RFID - opening for new business

Josef Noll, 26.4.2005 RFID - NFC tutorial 56

RFID payment usage coffee machines in Telenor R&D

Payment on coffee machine

Entrance to door B6e

RFID card in 2005

Tests in OSL and Arlanda

RFID cards

Think

Planned Q4.2005, Univ. Tromsø (N)

Payment

EntranceElectronic access (VPN) - Telenor

Page 57: Near field communication and RFID - opening for new business

Josef Noll, 26.4.2005 RFID - NFC tutorial 57

NFC – near field communication in praxis[copyright: www.nfc-forum.org]

- Example: travelling

Page 58: Near field communication and RFID - opening for new business

Josef Noll, 26.4.2005 RFID - NFC tutorial 58

NFC – near field communication in praxis[copyright: www.nfc-forum.org]

- Example: streaming DRM

Page 59: Near field communication and RFID - opening for new business

Josef Noll, 26.4.2005 RFID - NFC tutorial 59

NFC – near field communication in praxis[copyright: www.nfc-forum.org]

- Example: Poster Information

Page 60: Near field communication and RFID - opening for new business

Josef Noll, 26.4.2005 RFID - NFC tutorial 60

SIM City Platform

Ticketing Payment ID

Service Providers

Banks

Telenor CPA

Buy Ticket

SendTicket

Ticketing

Page 61: Near field communication and RFID - opening for new business

Josef Noll, 26.4.2005 RFID - NFC tutorial 61

Conclusions“The last time we were connected by a wire was at birth!” [Motorola]No cable, that’s the challenge

– Various radio systems: GSM, UMTS; WLAN, Bluetooth, DVB, …

– Limitations: battery, integration

All services from your mobileYour mobile is the authentication centreTelecom as authentication provider

Page 62: Near field communication and RFID - opening for new business

Josef Noll, 26.4.2005 RFID - NFC tutorial 62

Agenda0900 Welcome – interests0920 RFID – the means for

authentication0950 Q & A1010 RFID & NFC:

technology and scenarios1045 Q & A1100 deep breath – break1110 demonstrations1200 end of tutorial

– NFC technology?– State of the art?

– …

Page 63: Near field communication and RFID - opening for new business

Josef Noll, 26.4.2005 RFID - NFC tutorial 63

Agenda0900 Welcome – interests0920 RFID – the means for

authentication0950 Q & A1010 RFID & NFC:

technology and scenarios1045 Q & A1100 deep breath – break1110 demonstrations1200 end of tutorial

– Authentication – your own phone– Infokiosk – imagine the world

– Payment and ticketing (Giesecke& Devrient)

– NFC and mobile Commerce (Nokia/Telenor)