Payment is the most important initial application of NFC, but it is by no means the only application. NFC is fully compliant with the ISO standard for contactless smart cards, making access control an ideal application for this technology. In addition, NFC establishes connections more quickly than standard Bluetooth and low-power modified Bluetooth 3.0: no need to manually configure the identification device, two NFC devices can automatically establish a connection in tenths of a second. A mobile phone equipped with NFC technology can be used to register an identity voucher card and then wirelessly send it to the card reader. Just point the phone at the card reader and the user can open the door.
The NFC technology design includes an initiating device and a target device. The initiating device generates a radio frequency (RF) magnetic field to power the target device, making the target device in a simple form that requires no power (eg, a contactless smart card). Various operating modes are available for NFC devices:
· In peer-to-peer mode, two devices can actively exchange data. Application examples include establishing a connection exchange business card or aligning the phone with an NFC printer to print the file on the phone;
• In read/write mode, the NFC device can act as a reader to read or write information on the interop labels. Examples of applications include interactive advertising (NFC ads can direct devices to open web pages) or remote security (security personnel use mobile devices to read access cards);
· In virtual card mode, NFC devices work similarly to traditional contactless cards. Examples of applications include keyless entry systems for homes, hotels or offices. Virtual cards can be dispatched and revoked remotely.
Hongkong Onice Limited , https://www.ousibangvape.com