NFC, short for Near Field Communication, is a short range wireless RFID technology that makes use of interacting electromagnetic radio fields instead of the typical direct radio transmissions used by technologies such as Bluetooth. It is meant for applications where a physical touch, or close to it, is required in order to maintain security. NFC requires at least one transmitting device, and another to receive the signal. A range of devices can use the NFC standard and can be considered either passive or active, depending on how the device works.
Passive NFC devices include tags, and other small transmitters, that can send information to other NFC devices without the need for a power source of their own. However, they don’t really process any information sent from other sources, and can’t connect to other passive components. These often take the form of interactive signs on walls or advertisements. It can work with passive devices that don't require their own power supply, such as travel card readers. NFC's data-transmission frequency is 13.56MHz. NFC can transmit data at either 106, 212 or 424 Kbps (kilobits per second).
Active devices are able to both send and receive data, and can communicate with each other as well as with passive devices. Smartphones are by far the most common implementation of active NFC devices, but public transport card readers and touch payment terminals are also good examples of the technology.
Advantages of NFC:
Near Field Communication provides secure communication to all users. It promotes the transfer of data through safe channels as well as the encryption of sensitive information. Although some risk still exists, these measures significantly reduce the threat of hackers and stolen information.
The close proximity needed for NFC to function is not just a technical advantage; it proves to be very useful when in crowded locations. The two inch range allows for less interference which in turn provides a smooth data sharing feed between devices.
NFC provides the technology that permits users to transfer files and perform transactions with ease. It allows individuals to share data cost-efficiently as it has the ability to transfer files like pictures or music without carrier charges. NFC also lets users purchase items wirelessly. The introduction of Passbook on the iPhone and Google Wallet allows individuals to store all their credit card, coupon, and ticket information on their smartphone device for use at any given time.
NFC has a competitive advantage over its rival, Bluetooth. It consumes less power and does not require the setup and connection establishment with another device like Bluetooth does. NFC allows users to connect to other devices in less than one second, whereas, Bluetooth connections take significantly longer.
As a business user, NFC provides many advantages for improving workplace efficiency and customer service. It allows managers to maintain knowledge as to where their employees are if one were to use location services. In regards to improving customer service, the implementation of NFC transactional services such as, Pay Pass or Passbook, enables a fast and efficient experience for consumers
Disadvantages of NFC:
Since Near Field Communication is a relatively new technology, it may not be compatible with other devices. This is the main challenge that NFC technology is facing because device compatibility is a key aspect to expanding its consumer base.
Many companies do not have the motive to implement NFC technology into the workplace as the technology they currently use may be all they need to perform efficiently. Transferring employees over to NFC compatible devices is costly and may not align with the goals of the organization. Another major risk to NFC is computer hacking or phone hacking. As mobile phones become more developed, they become much like a hand held computer, and as with computers, they become prone to viruses. Hackers will want to gain access to these tiny computers because it contains a lot of important information all in one device.
Examples include a phone’s owner credit card information, bill payments, social security information, etc. Moreover, as technology advances, it will becomes easier for hackers to do this.