This 98-page report explains in detail the technology behind NFC and is designed for business executives seeking to understand how to take advantage of the functionality this technology offers for mobile payments, marketing, information sharing and beyond.
You’ll learn how NFC phones work, why multiple service providers can safely share space on a single secure element, the types of back office system employed and how NFC security works both in theory and in practice.
You will also learn how NFC tag reading and writing works, the role and functionality of trusted service managers (TSMs), how secure elements work and how they keep sensitive data secure, how carriers can deploy NFC services to their customers’ SIM cards over-the-air (OTA) and how this process differs to the embedded secure elements used by handset manufacturers like Apple.
This report was written and produced by our editor, Sarah Clark, and is approved by the NFC World+ editorial team.
Note: This 2012 report predates the arrival of host card emulation (HCE) and tokenization. Full details on HCE are available here and detailed information on tokenization is available here.
How to access this report
This 98-page report is available free of charge to NFC World+ Knowledge Centre members (PDF format, 1.4MB; downloaded 1374 times).
This resource is available free of charge to NFCW Knowledge Centre members. Log in or join for free to get immediate access.
Explore more...
Topics
Companies
This item is part of NFC World.