X

Everything you need to know about NFC and mobile payments

Now available in the iPhone 6, iPhone 6 Plus and Apple Watch, NFC is poised to play an important role in the way we use our phones, especially when it comes to mobile payments. Here's how it works.

Sharon Profis Vice President of Content
Sharon Profis is a vice president of content.
Sharon Profis
4 min read

samsung-galaxy-s3-visa-nfc.jpg
Even if you've never owned an NFC-equipped phone or tablet (like the Samsung Galaxy S5 or a Nokia Lumia), you've probably used NFC.

The technology, which lets two local devices share small bits of data, is embedded in things like commuter cards, print advertisements, and smart cards.

Now that the technology is placed in more Android and Windows phones -- and Apple's iPhone 6, iPhone 6 Plus and Apple Watch -- NFC is more relevant than ever. Especially when it comes to mobile payments.

Under the hood

NFC (near-field communication) allows two devices placed within a few centimeters of each other to exchange data. In order for this to work, both devices must be equipped with an NFC chip.

In the real world, there are a essentially two ways this works.

Two-way communication: This involves two devices that can both read and write to each other. For example, using NFC, you can touch two Android devices together to transfer data like contacts, links, or photos.

One-way communication: Here, a powered device (like a phone, credit card reader, or commuter card terminal) reads and writes to an NFC chip. So, when you tap your commuter card on the terminal, the NFC-powered terminal subtracts money from the balance written to the card.

It's all about power

If you're thinking, "Bluetooth can do these things, too.", you're right. However, even compared to Bluetooth LE, NFC uses significantly less power. This is crucial when you consider that phones may one day replace wallets, and battery life will be more important than ever.

Not to mention, pairing two Bluetooth devices can be a major headache. Make device discoverable...search for the device...enter passcode...forget about it.

In fact, NFC can work directly with Bluetooth. For instance, instead of going through this process to pair your phone with Bluetooth speakers, you can simply tap the phone to a speaker, let the devices use NFC to exchange the pairing data, and you're set.

NFC and mobile payments

One day, we'll all be paying for things with our phones, and NFC is the ticket to that future. In light of the many recent credit card data breaches, now is an especially good time to present a solution that finally shields our wallets from theft and fraud.

Many retailers -- including Target, Macys, and Walgreens -- already have NFC-based contactless pay terminals in place, making the transition to mobile payments easy. Phones compatible with Google Wallet can currently use these terminals, as can Apple's iPhone 6 and 6 Plus.

The biggest concern around NFC payments is security, but the mobile payment structure is so complex, any hacking or intercepting would be very difficult. To understand why, here's how it works.

After launching the payment application on your phone, the phone is tapped on the credit card terminal and a connection is made using NFC. At this point, you may be asked to scan your finger or enter a passcode to approve the transaction. The transaction is then validated with a separate chip called the secure element (SE), which relays that authorization back to the NFC modem. From there, the payment finishes processing the same way it would in a traditional credit card swipe transaction.

Three years after Wallet's launch, Apple entered the game with its own mobile payment solution, Apple Pay . Building upon Passbook (the Apple app that digitizes things like concert tickets and boarding passes) and combined with Apple's Touch ID fingerprint scanner, Apple presented a payment solution that might finally make this technology go mainstream.

Why NFC-based payments are secure

The most important step in the mobile payment transaction is the secure element, which holds all the authorization power. Whether it's a chip in the phone, or functions virtually in the cloud, the secure element is tamper-proof and protected by a unique digital signature. As explained by Michael Armentrout of Infineon, which manufactures secure element chips, the architecture of the secure element is designed to be hardened against attacks on the phone.

"That includes software attacks but also hardware-based attacks where someone got your phone or SIM card, it would be extremely difficult to obtain info off of that because it's a chip that is designed to have security mechanisms that go well beyond a normal processor. "

Apple's approach to the secure element is a physical chip, which is only available in the iPhone 6 and 6 Plus. Each time a user initiates a transaction, the SE assists in generating a random, one-time use code in lieu of transmitting the user's debit or credit card number.

Other ways to use NFC

If you own an NFC-compatible phone or tablet, there are a few practical ways it can be used -- and not just for mobile payments.

NFC: Not just for mobile payments (pictures)

See all photos

NFC tags: This is probably the most common way NFC is currently used on Android and Windows phones. Using your phone (or tablet), you can tap a strategically-placed NFC tag, which prompts your phone to take action on something.

Take this example: You put an NFC tag on your office desk. When you get to work in the morning, you tap the tag, and it automatically prompts your phone to enable Wi-Fi, disable sounds, and decrease brightness.

For more practical and creative ideas on programming NFC tags, check out this post.

Android Beam: Use this NFC-based technology to exchange information between two Android phones.

Pairing with devices: Speakers like the Samsung DA-F60 let you pair Bluetooth by simply tapping your NFC-enabled phone to the speaker. Even smart household appliances are adopting NFC. For example, LG's smart washing machines let you pair your phone with the machine so that you can remotely monitor the washing cycle.

The credit card data breaches of 2014

See all photos