NFC for dummies

Robert P. Sabella

Book - 2016

"Discover what the hottest new technology can do for you and your business! Near Field Communication is the technology that enables Apple Pay, but it does so much more! This plain-English guide explains what NFC is, how it works, how you may already be using it, and some of the exciting ways it will change the future of mobile devices. If you're a developer, investor, manager, or curious smartphone user, this book is for you!,"--page [4] of cover.

Saved in:

2nd Floor Show me where

621.384/Sabella
1 / 1 copies available
Location Call Number   Status
2nd Floor 621.384/Sabella Checked In
Subjects
Published
Hoboken, NJ : John Wiley & Sons, Inc [2016]
Language
English
Main Author
Robert P. Sabella (author)
Other Authors
John Mueller, 1958- (author)
Physical Description
xi, 274 pages : illustrations ; 24 cm
Bibliography
Includes bibliographic resources and index.
ISBN
9781119182924
  • Introduction
  • About This Book
  • Foolish Assumptions
  • Icons Used in This Book
  • Beyond the Book
  • Where to Go from Here
  • Part 1. Getting Started with NFC
  • Chapter 1. Introducing Near Field Communication (NFC)
  • Presenting a Quick History of NFC
  • Defining the Need for NFC
  • Interacting with devices using simpler methods
  • Buying products with ease
  • Launching a marketing campaign
  • Building your personal network quickly and easily
  • Creating ad-hoc wireless connections
  • Having fun with games
  • Discovering Where NFC Wallets Are Used Most
  • Viewing NFC wallet use by area
  • Viewing NFC wallet use by purchase type
  • Presenting a Simplified View of NFC
  • Considering what is needed for NFC
  • Understanding the three NFC modes
  • Discovering the NFC actors
  • Chapter 2. Considering the NFC Difference
  • Understanding the NFC Forum Goals
  • Considering NFC Wireless Communication Specifics
  • Understanding selectivity
  • Showing intent
  • Creating secure access
  • Understanding How NFC Compares to Other Technologies
  • Defining how NFC differs from RFID
  • Defining how NFC differs from QR codes
  • Defining how NFC differs from Bluetooth Low Energy (BLE)
  • Defining how NFC differs from powered chips (Wi-Fi)
  • Following the Evolution from Smart Cards to Smartphones
  • Creating a Secure Environment
  • Creating a secure environment on the device
  • Creating a secure environment in the cloud
  • Part 2. Understanding NFC
  • Chapter 3. Defining NFC
  • Understanding the Need for Standards
  • Investigating the Two Main NFC Standards
  • Considering ISO/IEC 14443
  • Considering ISO/IEC 18000-3
  • Considering FeliCa (JIS 6319-4)
  • Considering Card Emulation
  • Performing mobile payments
  • Accessing transit
  • Managing access control
  • Defining the Five Tag Types
  • Working with the Type 1 tag
  • Working with the Type 2 tag
  • Working with the Type 3 tag
  • Working with the Type 4 tag
  • Working with the Type 5 tag
  • Understanding the tag initiation sequence
  • Defining the NFC Data Exchange Format (NDEF)
  • Understanding NDEF messages
  • Understanding NDEF records
  • Locating Additional Resources on the NFC Forum
  • Chapter 4. Considering NFC Hardware
  • Understanding NFC Hardware Basics
  • Considering the NFC controller chip
  • Communicating with the antenna
  • Understanding tags and emitters
  • Considering NFC Communication Modes
  • Understanding active mode
  • Understanding passive mode
  • Considering NFC Operating Modes
  • Working in card emulation mode
  • Working in reader/writer mode
  • Working in peer-to-peer mode
  • Differentiating Between Interrogators and Tags
  • Understanding the Transfer of Power
  • Communicating Between Devices
  • Understanding what half duplex means
  • Working with ISO/IEC 14443 Type A tags
  • Working with ISO/IEC 14443 Type B tags
  • Working with FeliCa (JIS 6319-4) tags
  • Adding NFC to an Existing Device
  • Ensuring the device supports NFC
  • Getting the right NFC add-on type
  • Chapter 5. Considering NFC Software
  • Discovering the Key Players in NFC Development
  • Creating the NFC ecosystem
  • Working with mobile payments
  • Understanding how NFC is deployed in unique ways
  • Turning On Smartphone NFC Support
  • Performing Card Emulation Tasks
  • Defining Host Card Emulation (HCE)
  • Understanding interactions with devices
  • Using Encryption to Secure Communications
  • Understanding the concept of tokenization
  • Using the ISO/IEC 7816-4 commands
  • Writing Tags
  • Using a smartphone
  • Using an accessory reader/writer
  • Using a high-speed encoding system
  • Managing NFC Tags
  • Defining the management tasks
  • Determining whether you need an API solution
  • Making NFC Part of the Internet of Things (ioT)
  • Differentiating Between Web Apps and Mobile Apps
  • Part 3. Using NFC
  • Chapter 6. Using NFC for Payments
  • Understanding Mobile Wallet Security Requirements
  • Relying on Secure Element (SE)
  • Considering the security information locations
  • Relying on Host Card Emulation (HCE)
  • Understanding the role of Trust Zone
  • Considering the Potential Mobile Wallet Solutions
  • Using Magnetic Secure Transmission (MST)
  • Employing QR solutions
  • Enjoying NFC Solutions
  • Understanding what EMV does
  • Grasping why EMV transactions are more secure
  • Defining the advantages of using EMV
  • Chapter 7. Employing NFC for Identification
  • Using NFC for Workplace Monitoring
  • Authenticating Users
  • Entering rooms
  • Working with computers
  • Using resources
  • Working with other devices
  • Using an NFC Phone
  • Authenticating with an access control card
  • Creating a college campus ID card
  • Managing hotel room and other access control cards
  • Personalizing NFC Use
  • Using tags to perform common actions
  • Creating tags to log onto home networks
  • Replacing Your Car Keys
  • Gaining vehicle access
  • Adjusting the seat position
  • Automating Vehicle Interactions
  • Presenting a driver's license
  • Performing vehicle inspections
  • Chapter 8. Using NFC in Health Care
  • Dealing with Privacy Issues
  • Performing Hospital-related Tasks
  • Accessing medical records
  • Ensuring that patients receive correct medications and dosages
  • Tracking patient progress
  • Scheduling occupational and physical therapy
  • Tracking doctors and nurses
  • Working with Logger Tags
  • Differentiating between transdermal and subdermal
  • Making measurements
  • Monitoring Patients Remotely
  • Managing patient care
  • Verifying health care professional visits
  • Interacting with Patient Monitors
  • Addressing Accessibility Needs
  • Chapter 9. Considering Other NFC Uses
  • Performing Marketing Tasks
  • Interacting with customers
  • Managing products
  • Having Fun with Applications
  • Playing games
  • Producing video greetings and invitations
  • Making donations easy
  • Keeping track of time
  • Managing trees
  • Managing Events
  • Purchasing tickets
  • Tracking attendance
  • Addressing emergency needs
  • Interacting with Customers
  • Getting and using coupons
  • Getting and using gift cards
  • Providing a store layout
  • Managing sweepstakes and loyalty campaigns
  • Sharing recipes and other supplemental information
  • Managing receipts
  • Creating NFC Wearable Devices
  • Working with Appliances
  • Developing NFC Smart Posters
  • Discovering the advantages of NFC smart posters
  • Understanding how smart posters work
  • Getting the N-Mark Iogo
  • Part 4. Avoiding NFC Issues
  • Chapter 10. Avoiding the Not-Used-Here Mentality
  • Working with Businesses that Don't Use NFC
  • Considering the digital payment conundrum
  • Defining the digital payment benefits
  • Using NFC in the B2B environment
  • Developing Apps that Won't Work Without NFC
  • Creating a Business Plan Showing NFC Advantages
  • Chapter 11. Understanding the Hardware Issues
  • Ensuring that the Device is Ready
  • Turning the device on
  • Configuring the device to use NFC
  • Configuring the device to use a related technology
  • Using the Device Correctly
  • Understanding Odd Device Behaviors
  • Considering the MIFARE Classic tag compatibility issue
  • Determining device functionality
  • Finding the Device's Sweet Spot
  • Considering Other Tag Issues
  • Determining when a tag is simply broken
  • Reading tags on metal
  • Reading tags near water
  • Chapter 12. Understanding the Software Issues
  • Installing Needed Software
  • Getting a general application
  • Using a tag writer or other utilities
  • Encoding tags using a USB tag reader/writer
  • Knowing the Modes Your Device Supports
  • Providing Biometric Authentication
  • Considering the types of biometric authentication
  • Discovering the problems that could occur with biometric authentication
  • Understanding how hackers overcome biometric authentication
  • Getting Apps from Reliable Sources
  • Chapter 13. Considering Networking Problems
  • Understanding the Cost of Using Wi-Fi
  • Comparing Wi-Fi and Bluetooth
  • Pairing with consumer electronics
  • Pairing with a network
  • Understanding the Cost of Using Bluetooth
  • Pairing with consumer electronics
  • Detecting the Bluetooth version problem
  • Making devices discoverable
  • Dealing with Environmental Factors
  • Considering the effects of water
  • Considering the effects of metal
  • Eliminating sources of interference
  • Considering Potential Security Issues
  • Part 5. The Part of Tens
  • Chapter 14. Ten Places to Find NFC-Specific Information
  • NFC Forum
  • Smart Card Alliance
  • Groupe Speciale Mobile Association (GSMA)
  • NFC World
  • NFC Times
  • NearFieldCommunication.org
  • Pymnts.com
  • EverydayNFC
  • Gartner
  • IHS Technology
  • Chapter 15. Ten Really Cool NFC Implementations
  • Harvard Medical School and Brigham and Women's Hospital
  • Blue Bite
  • Galatea: Jewelry by Artist
  • NFC Ring
  • Khushi Baby
  • Rémy Martin
  • Tracking the Things You Love
  • Tappy
  • PetHub
  • London History Museum
  • Oxfam
  • Skylanders Superchargers
  • Chapter 16. Ten NFC Trends
  • Moving from Tap-to-Pay to Tap-to-Buy
  • Enhancing the Gaming Experience
  • Improving Health care
  • Creating New Marketing Strategies
  • Managing Events ZHD
  • Enhancing the Effects of Mobile Commerce
  • Making the Most of Wearables
  • Interacting with Smart Appliances
  • Authenticating Products
  • Considering B2B Trends
  • Chapter 17. Ten NFC Companies You Need to Know About
  • Blue Bite
  • NXP
  • Flomio
  • Smartrac
  • HID Global
  • Poken
  • Cellotape
  • Advanced Card Systems (ACS) Holdings Limited
  • Thinfilm
  • Smartwhere
  • Index