Mobile phones are essential items that gradually replace the original objects of life, including keys, access cards, credit cards, tickets, etc. How can NFC technology be applied to human life through portable devices?
NFC (Near Field CommunicaTIon) is not a new technology, but more and more related issues have recently been applied. Especially when the topic of third-party payment methods has been heated up, everyone is suddenly worried about the mobile phone. In the case of non-contact machines, the purpose of mutual sensing and payment is to use NFC technology. The most typical example is the bus card. What is NFC technology? Where is the application level?
What is the reason for the development of NFC? NFC is based on the integration of RFID (Radio Frequency IdenTIficaTIon) and interconnection technology. This is the development and innovation of non-contact technology and RFID technology. It is a short-range wireless communication technology standard.
The basic applications of NFC technology can be divided into the following four categories:
Contact, such as access control, tickets and tickets, users only need to carry a mobile device with a ticket or a gated password to access the reading device.
Contact confirmation, such as mobile payment, the user confirms the transaction by entering a password or simply accepting the transaction.
Contact connection, such as connecting two built-in NFC devices for point-to-point data transmission, such as downloading music, picture transfer and synchronous exchange of communication books;
With Browsing, a built-in NFC device can seamlessly and conveniently browse information stored in another NFC-enabled device.
At present, NFC is widely used in mobile phones. It is not new to use mobile phones to sense other devices to achieve wireless transmission. However, because mobile phones are already indispensable for modern people, applications that extend from mobile phones equipped with NFC functions are increasingly coming. The more extensive. In terms of intelligent building category, what are the current applications of NFC on the access control system?
Michael WAI, idenTIv Asia Pacific Sales Manager, said that if a technology is to be adopted on a large scale, the technology needs to be digitized as much as possible to be distributed or remotely downloaded via the (mobile) Internet, thereby overcoming the costs and barriers of its logistics. . With the trend of BYOD (Bring Your Own Device), we are seeing more and more companies let employees use their personal mobile phones or portable devices to handle official duties, such as email, document signing, workflow sign-off and employees. Applications such as authentication with the corporate security system.
In the case of access control, digitizing the access card (becoming a digital certificate) can be easily and securely sent to the designated user's mobile phone or other mobile device, and then manage the life cycle of the digital certificate through the mobile network and the cloud. For example, if a temporary staff member needs to enter or leave the building today, the management unit can send a “temporary†access control certificate to these staff members. When the set time is up, the access control certificate will be invalid, and the security will be undoubted.
With the popularity of NFC, digital door cards/credentials can be preloaded or downloaded to mobile phones, or only attached to mobile phones or wallets with an NFC tag. When users open the door with NFC phones, they can simply touch them with their mobile phones. The door is like a traditional door card. At present, many European restaurants have adopted NFC door locks. The hotel will send the NFC key to the guest's mobile phone before the check-in, and the guest will be able to open the door with his mobile phone directly to the designated room on the scheduled date. Go to the counter check-in.
It is even foreseeable that in the near future, NFC will make the door disappear on the door. Users only need to touch the NFC tag on the door through the mobile phone. The system will put the door position (or ID) and user credentials and visitors. The position is used as a combination to request a door opening request to the access control system.
In addition, the administrator of the access control system can also change the function card of different functions at any time through the NFC mobile phone, and send different levels of instructions to the access control system under different crisis management conditions to lock the access control or release area of ​​a certain area. Access control to guide the crowd.
Wireless Speaker,Bluetooth Speakers,Bt Wireless Speaker,Portable Bluetooth Speaker
Guangzhou YISON Electron Technology Co., Limited , https://www.yisonearphone.com