NFC World

Apple to focus on access control for next wave of NFC applications

Why Apple didn’t try to disrupt credit cards with Apple Pay — Fortune — “Apple’s own campus lets its employees gain access via their Apple Wallet. And next week, Apple is set to roll out student ID cards on the Apple Wallet for Duke University, the University of Oklahoma, and the University of Alabama. That feature will combine access and payments, allowing students to use their Apple Wallet ID card to enter their dorms and pay for laundry. ‘It’s a tremendous new area for us to focus on, which is really access,’ Bailey said.”


NFC World

NXP unveils high security NFC tags that let brands deliver digitally connected products at scale

A brochure explaining the NTAG 424 DNA's features, benefits and suggested applications is now available in the NFC World Knowledge Centre

PARTNER NEWS: NXP has launched two new NFC tags that incorporate both product protection and channel authentication security features, enabling brands to take advantage of the tag reading capabilities of both Android and iOS devices to roll out NFC-based customer communication and product authentication services at scale... More




NFC World

Huami includes NFC for travelcards, payments and access control in $116 budget smartwatch

Huami announces launch of new Amazfit Verge smartwatch — Huami — “Digital wallet functionality in conjunction with UnionPay and Alipay, combined with integrated one-touch public transportation payment in over 160 cities in China, [helps] users capture the convenience of full digital transactions (through NFC and QR codes). The Verge can be also used as entrance access device utilising NFC technology.”













NFC World welcomes 120 new members from 43 countries

NFC World+ Knowledge Centre

120 new members from 43 countries joined The NFC World Knowledge Centre in May 2018, bringing our total membership to more than 10,500 executives, technical experts and decision makers at banks, card issuers, mobile network operators, merchants, brands, device makers, regulators and policy makers around the world... More


Researchers show how invisible backdoors can be hidden in chips during manufacture

Adding backdoors at the chip level — Schneier on Security — “In this paper we propose an extremely stealthy approach for implementing hardware Trojans below the gate level… we insert our hardware Trojans by changing the dopant polarity of existing transistors. Since the modified circuit appears legitimate on all wiring layers (including all metal and polysilicon), our family of Trojans is resistant to most detection techniques.”