In-Depth on NFC

Blog Date: 2/16/2012
Author: Ray Coulombe

Much has been written about Near-Field Communications (NFC) for consumer transactions; however, NFC is still so new that I want to address it in a broader security context and, hopefully stimulate some creative thinking. In my opinion, multiple security applications are waiting to be developed.
NFC is an RFID standards-based wireless technology, operating at 13.56 MHz over extremely short distances (less than 2 inches). When designed into a smartphone, it is capable of enabling data transfer between the phone and a companion device. The Nokia model 6131 was the first NFC phone, introduced in 2006. The predominant application driving this technology has been electronic payment as a follow-on to contactless smart cards, and manufacturer interest has been significant, as witnessed by the growth of the NFC Forum (www.nfc-forum.org) — founded in 2004 by Nokia, Philips and Sony — to more than 135 members today.
Like RFID, data transfer is based on inductive coupling in an unlicensed ISM band. Devices can function as readers or writers and be active or passive, as long as one device is active. Energy from an active device will couple to and power the passive device. In peer-to-peer mode, devices may actively exchange data and set up Bluetooth or Wi-Fi sessions; and, in card emulation mode, the NFC phone may mimic a traditional smart card, because the RFID infrastructure is essentially the same.
Given its roots in RFID technology, access control was a natural first application for NFC in the security space. HID Global and Assa Abloy have taken a strong proactive approach in the implementation of NFC technology (Editor’s Note: see page 29 of this issue for a report on HID’s NFC pilot at Arizona State). Other, less obvious applications will undoubtedly emerge. For some, it is simply a matter of answering questions like: “Is there information I would like to access,” or “Do I need to control or activate something,” or “Do I want to authorize someone or some action,” or “How can existing RFID function be enhanced through the use of a highly intelligent smartphone reader device?” <>br/> Link to Complete Article as it appeared in Security Technology Executive Magazine

 

Resource Blogs

Most Recent Blog List for Blog Author: Ray Coulombe
RFS Article Image

Stay Safe! While Traveling This Summer

It’s summer vacation time! The last thing you need to worry about it is getting your identity stolen while you’re sitting on a beach somewhere exotic. In 2016, more than 15 million Americans were victims of identity theft, up 16 percent from the previous year, according to Experian. Plus, about 33 percent of that fraud took place when people were traveling. Here’s a few tips to staying safe all summer while traveling...
read more -->

RFS Article Image

Rethinking Cabling

Cat 5e became an ANSI/TIA/EIA standard in 2001, Cat 6 in 2002, and Cat 6a in 2008. However, it may be extremely useful to consider taking advantage of other existing cabling infrastructure in lieu of running new. Read more to learn how to approach cabling.
read more -->

RFS Article Image

Off the Beaten Path at ISC West

This year at ISC (the International Security Conference and Exposition), I was determined to try to see the latest iStechnologies hiding in the nooks and crannies—literally! I visited booths in the back, the basement, small kiosks hidden inside larger vendor books, and throughout the Emerging Technology Zone.

In case you missed the show, I’ll round up some of the best new technologies and companies to keep an eye on. Read more.
read more -->

RFS Article Image

Cyber Crime Taking Down Cities

Earlier this year, in March, the City of Atlanta’s nearly 8,000 employees heard words they never thought they would hear: “It’s okay to turn your computers on.” Their computers were powered off for five days. In those five days Atlanta residents could not pay traffic tickets, water bills, or report city issues. Read how ransomware impacted this metropolitan area.
read more -->

RFS Article Image

A Few Thoughts on K-12 School Security

There is no one size fits all when it comes to K-12 school security. Schools vary in so many ways: size, age, local environment, affluence, culture, governance, and more. Read some helpful tips and resources that might just help your school be better prepared.
read more -->