You are on page 1of 31

NFC For Dummies 1st Edition Robert P.

Sabella
Visit to download the full and correct content document:
https://textbookfull.com/product/nfc-for-dummies-1st-edition-robert-p-sabella/
More products digital (pdf, epub, mobi) instant
download maybe you interests ...

Astronomy For Dummies 4th Edition Stephen P. Maran

https://textbookfull.com/product/astronomy-for-dummies-4th-
edition-stephen-p-maran/

Design Constraints for NFC Devices 1st Edition


Dominique Paret

https://textbookfull.com/product/design-constraints-for-nfc-
devices-1st-edition-dominique-paret/

Digital SLR Photography All in One For Dummies 4th


Edition Robert Correll

https://textbookfull.com/product/digital-slr-photography-all-in-
one-for-dummies-4th-edition-robert-correll/

Personal Finance After 50 For Dummies 3rd Edition Eric


Tyson Robert C Carlson

https://textbookfull.com/product/personal-finance-after-50-for-
dummies-3rd-edition-eric-tyson-robert-c-carlson/
Global Mindset 1st Edition Robert P. French Ii

https://textbookfull.com/product/global-mindset-1st-edition-
robert-p-french-ii/

International Neurology Robert P. Lisak (Ed.)

https://textbookfull.com/product/international-neurology-robert-
p-lisak-ed/

Hacking For Dummies 6th edition For Dummies Computer


Tech Beaver

https://textbookfull.com/product/hacking-for-dummies-6th-edition-
for-dummies-computer-tech-beaver/

Chemistry For Dummies For Dummies Lifestyle John T.


Moore

https://textbookfull.com/product/chemistry-for-dummies-for-
dummies-lifestyle-john-t-moore/

C Programming For Dummies (For Dummies (Computer/Tech))


Gookin

https://textbookfull.com/product/c-programming-for-dummies-for-
dummies-computer-tech-gookin/
NFC
by Robert P. Sabella and
John Paul Mueller
NFC For Dummies®
Published by: John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030-5774, www.wiley.com

Copyright © 2016 by John Wiley & Sons, Inc., Hoboken, New Jersey

Media and software compilation copyright © 2015 by John Wiley & Sons, Inc. All rights reserved.

Published simultaneously in Canada

No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means,
electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108
of the 1976 United States Copyright Act, without the prior written permission of the Publisher. Requests to the
Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street,
Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008, or online at http://www.wiley.com/go/permissions.

Trademarks: Wiley, For Dummies, the Dummies Man logo, Dummies.com, Making Everything Easier, and related
trade dress are trademarks or registered trademarks of John Wiley & Sons, Inc. and may not be used without written
permission. All other trademarks are the property of their respective owners. John Wiley & Sons, Inc. is not
associated with any product or vendor mentioned in this book.

LIMIT OF LIABILITY/DISCLAIMER OF WARRANTY: THE PUBLISHER AND THE AUTHOR MAKE NO


REPRESENTATIONS OR WARRANTIES WITH RESPECT TO THE ACCURACY OR COMPLETENESS OF THE CONTENTS
OF THIS WORK AND SPECIFICALLY DISCLAIM ALL WARRANTIES, INCLUDING WITHOUT LIMITATION WARRANTIES
OF FITNESS FOR A PARTICULAR PURPOSE. NO WARRANTY MAY BE CREATED OR EXTENDED BY SALES OR
PROMOTIONAL MATERIALS. THE ADVICE AND STRATEGIES CONTAINED HEREIN MAY NOT BE SUITABLE FOR
EVERY SITUATION. THIS WORK IS SOLD WITH THE UNDERSTANDING THAT THE PUBLISHER IS NOT ENGAGED
IN RENDERING LEGAL, ACCOUNTING, OR OTHER PROFESSIONAL SERVICES. IF PROFESSIONAL ASSISTANCE IS
REQUIRED, THE SERVICES OF A COMPETENT PROFESSIONAL PERSON SHOULD BE SOUGHT. NEITHER THE
PUBLISHER NOR THE AUTHOR SHALL BE LIABLE FOR DAMAGES ARISING HEREFROM. THE FACT THAT AN
ORGANIZATION OR WEBSITE IS REFERRED TO IN THIS WORK AS A CITATION AND/OR A POTENTIAL SOURCE OF
FURTHER INFORMATION DOES NOT MEAN THAT THE AUTHOR OR THE PUBLISHER ENDORSES THE INFORMATION
THE ORGANIZATION OR WEBSITE MAY PROVIDE OR RECOMMENDATIONS IT MAY MAKE. FURTHER, READERS
SHOULD BE AWARE THAT INTERNET WEBSITES LISTED IN THIS WORK MAY HAVE CHANGED OR DISAPPEARED
BETWEEN WHEN THIS WORK WAS WRITTEN AND WHEN IT IS READ.

For general information on our other products and services, please contact our Customer Care Department within
the U.S. at 877-762-2974, outside the U.S. at 317-572-3993, or fax 317-572-4002. For technical support, please visit
www.wiley.com/techsupport.
Wiley publishes in a variety of print and electronic formats and by print-on-demand. Some material included with
standard print versions of this book may not be included in e-books or in print-on-demand. If this book refers to
media such as a CD or DVD that is not included in the version you purchased, you may download this material at
http://booksupport.wiley.com. For more information about Wiley products, visit www.wiley.com.
Library of Congress Control Number: 2016933642

ISBN: 978-1-119-18292-4

ISBN 978-1-119-18296-2 (ebk); ISBN ePDF 978-1-119-18293-1 (ebk)

Manufactured in the United States of America

10 9 8 7 6 5 4 3 2 1
Contents at a Glance
Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1

Part 1: Getting Started with NFC. . . . . . . . . . . . . . . . . . . . . . . . 5


CHAPTER 1: Introducing Near Field Communication (NFC) . . . . . . . . . . . . . . . . . . . . . . . . 7
CHAPTER 2: Considering the NFC Difference . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21

Part 2: Understanding NFC. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33


CHAPTER 3: Defining NFC. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
CHAPTER 4: Considering NFC Hardware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57

CHAPTER 5: Considering NFC Software. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77

Part 3: Using NFC. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99


CHAPTER 6: Using NFC for Payments. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101
CHAPTER 7: Employing NFC for Identification. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
CHAPTER 8: Using NFC in Health Care. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137
CHAPTER 9: Considering Other NFC Uses. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155

Part 4: Avoiding NFC Issues. . . . . . . . . . . . . . . . . . . . . . . . . . . . 177


CHAPTER 10: Avoiding the Not-Used-Here Mentality. . . . . . . . . . . . . . . . . . . . . . . . . . . 179
CHAPTER 11: Understanding the Hardware Issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187
CHAPTER 12: Understanding the Software Issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197
CHAPTER 13: Considering Networking Problems. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 211

Part 5: The Part of Tens. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 223


CHAPTER 14: Ten Places to Find NFC-Specific Information. . . . . . . . . . . . . . . . . . . . . . 225
CHAPTER 15: Ten Really Cool NFC Implementations. . . . . . . . . . . . . . . . . . . . . . . . . . . 233
CHAPTER 16: Ten NFC Trends. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 241
CHAPTER 17: Ten NFC Companies You Need to Know About. . . . . . . . . . . . . . . . . . . . 251

Index. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 261
Table of Contents
INTRODUCTION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
About This Book. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Foolish Assumptions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
Icons Used in This Book. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Beyond the Book. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Where to Go from Here . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4

PART 1: GETTING STARTED WITH NFC. . . . . . . . . . . . . . . . . . . . . . . . . . 5


CHAPTER 1: Introducing Near Field Communication (NFC) . . . . . . . 7
Presenting a Quick History of NFC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
Defining the Need for NFC. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Interacting with devices using simpler methods . . . . . . . . . . . . . . . 10
Buying products with ease. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Launching a marketing campaign. . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Building your personal network quickly and easily . . . . . . . . . . . . . 12
Creating ad-hoc wireless connections . . . . . . . . . . . . . . . . . . . . . . . . 12
Having fun with games. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Discovering Where NFC Wallets Are Used Most. . . . . . . . . . . . . . . . . . . 13
Viewing NFC wallet use by area. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
Viewing NFC wallet use by purchase type. . . . . . . . . . . . . . . . . . . . . 15
Presenting a Simplified View of NFC. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
Considering what is needed for NFC . . . . . . . . . . . . . . . . . . . . . . . . . 16
Understanding the three NFC modes. . . . . . . . . . . . . . . . . . . . . . . . . 18
Discovering the NFC actors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18

CHAPTER 2: Considering the NFC Difference . . . . . . . . . . . . . . . . . . . . . . . 21


Understanding the NFC Forum Goals . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
Considering NFC Wireless Communication Specifics. . . . . . . . . . . . . . . 23
Understanding selectivity. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
Showing intent. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
Creating secure access. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Understanding How NFC Compares to Other Technologies . . . . . . . . 25
Defining how NFC differs from RFID. . . . . . . . . . . . . . . . . . . . . . . . . . 25
Defining how NFC differs from QR codes . . . . . . . . . . . . . . . . . . . . . 26
Defining how NFC differs from Bluetooth Low Energy (BLE) . . . . . 27
Defining how NFC differs from powered chips (Wi-Fi). . . . . . . . . . . 28
Following the Evolution from Smart Cards to Smartphones . . . . . . . . 28
Creating a Secure Environment. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Creating a secure environment on the device . . . . . . . . . . . . . . . . . 29
Creating a secure environment in the cloud. . . . . . . . . . . . . . . . . . . 31

Table of Contents v
PART 2: UNDERSTANDING NFC. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33

CHAPTER 3: Defining NFC. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35


Understanding the Need for Standards. . . . . . . . . . . . . . . . . . . . . . . . . . 36
Investigating the Two Main NFC Standards. . . . . . . . . . . . . . . . . . . . . . . 37
Considering ISO/IEC 14443 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
Considering ISO/IEC 18000-3. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
Considering FeliCa (JIS 6319-4) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
Considering Card Emulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
Performing mobile payments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
Accessing transit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
Managing access control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
Defining the Five Tag Types. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
Working with the Type 1 tag . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
Working with the Type 2 tag . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
Working with the Type 3 tag . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
Working with the Type 4 tag . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
Working with the Type 5 tag . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
Understanding the tag initiation sequence. . . . . . . . . . . . . . . . . . . . 49
Defining the NFC Data Exchange Format (NDEF). . . . . . . . . . . . . . . . . . 51
Understanding NDEF messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
Understanding NDEF records . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
Locating Additional Resources on the NFC Forum. . . . . . . . . . . . . . . . . 54

CHAPTER 4: Considering NFC Hardware. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57


Understanding NFC Hardware Basics . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
Considering the NFC controller chip. . . . . . . . . . . . . . . . . . . . . . . . . . 58
Communicating with the antenna . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
Understanding tags and emitters. . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
Considering NFC Communication Modes . . . . . . . . . . . . . . . . . . . . . . . . 64
Understanding active mode. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
Understanding passive mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
Considering NFC Operating Modes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
Working in card emulation mode. . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
Working in reader/writer mode. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
Working in peer-to-peer mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
Differentiating Between Interrogators and Tags . . . . . . . . . . . . . . . . . . 68
Understanding the Transfer of Power. . . . . . . . . . . . . . . . . . . . . . . . . . . 70
Communicating Between Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
Understanding what half duplex means . . . . . . . . . . . . . . . . . . . . . . 71
Working with ISO/IEC 14443 Type A tags. . . . . . . . . . . . . . . . . . . . . . 72
Working with ISO/IEC 14443 Type B tags. . . . . . . . . . . . . . . . . . . . . . 72
Working with FeliCa (JIS 6319-4) tags . . . . . . . . . . . . . . . . . . . . . . . . . 73

vi NFC For Dummies


Adding NFC to an Existing Device. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
Ensuring the device supports NFC . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
Getting the right NFC add-on type . . . . . . . . . . . . . . . . . . . . . . . . . . . 74

CHAPTER 5: Considering NFC Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77


Discovering the Key Players in NFC Development. . . . . . . . . . . . . . . . . 79
Creating the NFC ecosystem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
Working with mobile payments. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
Understanding how NFC is deployed in unique ways . . . . . . . . . . . 82
Turning On Smartphone NFC Support. . . . . . . . . . . . . . . . . . . . . . . . . . . 84
Performing Card Emulation Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
Defining Host Card Emulation (HCE). . . . . . . . . . . . . . . . . . . . . . . . . . 85
Understanding interactions with devices. . . . . . . . . . . . . . . . . . . . . .87
Using Encryption to Secure Communications. . . . . . . . . . . . . . . . . . . . . 88
Understanding the concept of tokenization . . . . . . . . . . . . . . . . . . . 89
Using the ISO/IEC 7816-4 commands. . . . . . . . . . . . . . . . . . . . . . . . . 90
Writing Tags. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
Using a smartphone . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
Using an accessory reader/writer. . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
Using a high-speed encoding system. . . . . . . . . . . . . . . . . . . . . . . . . 93
Managing NFC Tags. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
Defining the management tasks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
Determining whether you need an API solution. . . . . . . . . . . . . . . . 95
Making NFC Part of the Internet of Things (IoT). . . . . . . . . . . . . . . . . . . 96
Differentiating Between Web Apps and Mobile Apps . . . . . . . . . . . . . . 97

PART 3: USING NFC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99


CHAPTER 6: Using NFC for Payments. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101
Understanding Mobile Wallet Security Requirements. . . . . . . . . . . . . 102
Relying on Secure Element (SE). . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102
Considering the security information locations . . . . . . . . . . . . . . . 104
Relying on Host Card Emulation (HCE). . . . . . . . . . . . . . . . . . . . . . . 106
Understanding the role of Trust Zone . . . . . . . . . . . . . . . . . . . . . . . 108
Considering the Potential Mobile Wallet Solutions . . . . . . . . . . . . . . . 109
Using Magnetic Secure Transmission (MST) . . . . . . . . . . . . . . . . . . 110
Employing QR solutions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111
Enjoying NFC Solutions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112
Understanding what EMV does. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114
Grasping why EMV transactions are more secure . . . . . . . . . . . . . 115
Defining the advantages of using EMV. . . . . . . . . . . . . . . . . . . . . . . 117

CHAPTER 7: Employing NFC for Identification. . . . . . . . . . . . . . . . . . . . 119


Using NFC for Workplace Monitoring. . . . . . . . . . . . . . . . . . . . . . . . . . . 120
Authenticating Users. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122

Table of Contents vii


Entering rooms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122
Working with computers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
Using resources. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124
Working with other devices. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126
Using an NFC Phone. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127
Authenticating with an access control card. . . . . . . . . . . . . . . . . . . 127
Creating a college campus ID card . . . . . . . . . . . . . . . . . . . . . . . . . . 128
Managing hotel room and other access control cards . . . . . . . . . 129
Personalizing NFC Use . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130
Using tags to perform common actions. . . . . . . . . . . . . . . . . . . . . .130
Creating tags to log onto home networks. . . . . . . . . . . . . . . . . . . . 132
Replacing Your Car Keys. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132
Gaining vehicle access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132
Adjusting the seat position. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .133
Automating Vehicle Interactions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134
Presenting a driver’s license. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .134
Performing vehicle inspections. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135

CHAPTER 8: Using NFC in Health Care. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137


Dealing with Privacy Issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138
Performing Hospital-related Tasks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138
Accessing medical records. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139
Ensuring that patients receive correct
medications and dosages. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 140
Tracking patient progress. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .141
Scheduling occupational and physical therapy. . . . . . . . . . . . . . . . 143
Tracking doctors and nurses. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145
Working with Logger Tags . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145
Differentiating between transdermal and subdermal. . . . . . . . . . 146
Making measurements. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148
Monitoring Patients Remotely. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150
Managing patient care . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150
Verifying health care professional visits. . . . . . . . . . . . . . . . . . . . . . 150
Interacting with Patient Monitors. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151
Addressing Accessibility Needs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152

CHAPTER 9: Considering Other NFC Uses. . . . . . . . . . . . . . . . . . . . . . . . . . 155


Performing Marketing Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 156
Interacting with customers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 156
Managing products. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 158
Having Fun with Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159
Playing games . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159
Producing video greetings and invitations . . . . . . . . . . . . . . . . . . . 160
Making donations easy. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161
Keeping track of time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162
Managing trees . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162

viii NFC For Dummies


Managing Events. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163
Purchasing tickets. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164
Tracking attendance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164
Addressing emergency needs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165
Interacting with Customers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 166
Getting and using coupons . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 166
Getting and using gift cards. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 166
Providing a store layout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167
Managing sweepstakes and loyalty campaigns . . . . . . . . . . . . . . . 169
Sharing recipes and other supplemental information. . . . . . . . . . 169
Managing receipts. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170
Creating NFC Wearable Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170
Working with Appliances . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172
Developing NFC Smart Posters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173
Discovering the advantages of NFC smart posters . . . . . . . . . . . . 173
Understanding how smart posters work. . . . . . . . . . . . . . . . . . . . . 174
Getting the N-Mark logo. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 176

PART 4: AVOIDING NFC ISSUES. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177

CHAPTER 10: Avoiding the Not-Used-Here Mentality. . . . . . . . . . . . . 179


Working with Businesses that Don’t Use NFC. . . . . . . . . . . . . . . . . . . . 180
Considering the digital p
­ ayment ­conundrum. . . . . . . . . . . . . . . . . 180
Defining the digital payment benefits . . . . . . . . . . . . . . . . . . . . . . . 181
Using NFC in the B2B environment . . . . . . . . . . . . . . . . . . . . . . . . . 181
Developing Apps that Won’t Work Without NFC. . . . . . . . . . . . . . . . . . 183
Creating a Business Plan Showing NFC Advantages . . . . . . . . . . . . . . 184

CHAPTER 11: Understanding the Hardware Issues. . . . . . . . . . . . . . . . 187


Ensuring that the Device is Ready. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 188
Turning the device on. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 188
Configuring the device to use NFC . . . . . . . . . . . . . . . . . . . . . . . . . . 188
Configuring the device to use a related technology. . . . . . . . . . . . 189
Using the Device Correctly. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 190
Understanding Odd Device Behaviors. . . . . . . . . . . . . . . . . . . . . . . . . . 192
Considering the MIFARE Classic tag compatibility issue . . . . . . . . 192
Determining device functionality . . . . . . . . . . . . . . . . . . . . . . . . . . . 192
Finding the Device’s Sweet Spot . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193
Considering Other Tag Issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194
Determining when a tag is simply broken. . . . . . . . . . . . . . . . . . . . 194
Reading tags on metal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195
Reading tags near water. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195

Table of Contents ix
CHAPTER 12: Understanding the Software Issues. . . . . . . . . . . . . . . . . 197
Installing Needed Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 198
Getting a general application. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 198
Using a tag writer or other utilities. . . . . . . . . . . . . . . . . . . . . . . . . . 199
Encoding tags using a USB tag reader/writer . . . . . . . . . . . . . . . . . 201
Knowing the Modes Your Device Supports. . . . . . . . . . . . . . . . . . . . . . 203
Providing Biometric Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . 204
Considering the types of biometric authentication . . . . . . . . . . . . 204
Discovering the problems that could occur
with biometric authentication. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 206
Understanding how hackers overcome
biometric authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207
Getting Apps from Reliable Sources. . . . . . . . . . . . . . . . . . . . . . . . . . . . 208

CHAPTER 13: Considering Networking Problems. . . . . . . . . . . . . . . . . . 211


Understanding the Cost of Using Wi-Fi . . . . . . . . . . . . . . . . . . . . . . . . . 213
Comparing Wi-Fi and Bluetooth . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213
Pairing with consumer electronics . . . . . . . . . . . . . . . . . . . . . . . . . . 214
Pairing with a network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 215
Understanding the Cost of Using Bluetooth. . . . . . . . . . . . . . . . . . . . . 216
Pairing with consumer electronics . . . . . . . . . . . . . . . . . . . . . . . . . . 217
Detecting the Bluetooth version problem. . . . . . . . . . . . . . . . . . . . 218
Making devices discoverable. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 219
Dealing with Environmental Factors. . . . . . . . . . . . . . . . . . . . . . . . . . . . 219
Considering the effects of water. . . . . . . . . . . . . . . . . . . . . . . . . . . . 220
Considering the effects of metal. . . . . . . . . . . . . . . . . . . . . . . . . . . . 220
Eliminating sources of interference . . . . . . . . . . . . . . . . . . . . . . . . . 221
Considering Potential Security Issues . . . . . . . . . . . . . . . . . . . . . . . . . . 222

PART 5: THE PART OF TENS. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 223


CHAPTER 14: Ten Places to Find NFC-Specific Information . . . . . . 225
NFC Forum. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 226
Smart Card Alliance. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 226
Groupe Speciale Mobile Association (GSMA) . . . . . . . . . . . . . . . . . . . . 227
NFC World. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 228
NFC Times. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 228
NearFieldCommunication.org. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229
Pymnts.com. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229
EverydayNFC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 230
Gartner. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 230
IHS Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231

x NFC For Dummies


CHAPTER 15: Ten Really Cool NFC Implementations. . . . . . . . . . . . . . 233
Harvard Medical School and Brigham and Women’s Hospital. . . . . . 234
Blue Bite. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234
Galatea: Jewelry by Artist . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235
NFC Ring. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235
Khushi Baby. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 236
Rémy Martin. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 236
Tracking the Things You Love . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 237
Tappy. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 237
PetHub . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 237
London History Museum . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 238
Oxfam. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239
Skylanders Superchargers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239

CHAPTER 16: Ten NFC Trends . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 241


Moving from Tap-to-Pay to Tap-to-Buy . . . . . . . . . . . . . . . . . . . . . . . . . 242
Enhancing the Gaming Experience. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 243
Improving Health care . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 244
Creating New Marketing Strategies . . . . . . . . . . . . . . . . . . . . . . . . . . . . 245
Managing Events. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 246
Enhancing the Effects of Mobile Commerce. . . . . . . . . . . . . . . . . . . . . 247
Making the Most of Wearables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 248
Interacting with Smart Appliances . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 249
Authenticating Products. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 250
Considering B2B Trends. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 250

CHAPTER 17: Ten NFC Companies You Need to Know About. . . . 251
Blue Bite. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 252
NXP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 252
Flomio. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 254
Smartrac. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 254
HID Global . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 255
Poken . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 256
Cellotape. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 257
Advanced Card Systems (ACS) Holdings Limited . . . . . . . . . . . . . . . . . 257
Thinfilm. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 258
Smartwhere. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 258

INDEX. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 261

Table of Contents xi
Introduction
A
sk most people what NFC stands for and they will probably answer “the
National Football Conference.” But the NFC in this book is far more impor-
tant than football. It stands for Near Field Communication, a technology
that has the potential to significantly change how you interact with the people and
things around you. The exciting news about NFC is that we haven’t even scratched
the surface yet of how this technology is going to change our lives. That’s why you
need NFC For Dummies. This book is your introduction to the larger world of NFC,
and it helps you see why this technology is so amazing.

About This Book


NFC For Dummies begins by introducing you to NFC. You discover that NFC is
already used all over the place, and you might not have even realized it.

Discovering how this technology has been hiding in plain sight is a good starting
point. The second part of the book tells you how NFC actually works and why it
needs to work in this specific way. You may initially find some of this material a
little technical, but if you want to use NFC to the fullest extent possible, you need
to know what makes it special.

After you know how NFC works, it’s time to see it in action. The next part of the
book discusses many of the ways in which you can use NFC to perform useful
tasks. Each chapter introduces another area in which NFC is in use today. Amazing
as these uses are, they’re really just the tip of the iceberg, and the links in these
chapters will lead you to still more resources.

Every technology comes with a few implementation issues. Some set of tech-
nical circumstances inevitably causes problems. Fortunately, this book tells you
about those issues and tells you how to fix them. You end up looking really smart
because while your buddies are sitting there not doing much, you’ve already fixed
the problem and are doing something useful with NFC.

Introduction 1
A single book can’t even begin to tell you about everything NFC has to offer. In
fact, you could probably read several books and still not begin to exhaust this
topic. That’s why the Parts of Ten is there. It gives you access to resources that
will keep you reading for quite some time to come. When you finish it all, you’ll
become an NFC guru, and everyone around you will be looking to you as the NFC
expert.

To make absorbing the concepts even easier, this book uses the following
conventions:

»» When you see terms in the text in italics, the surrounding text provides a
definition for that term.

»» Web addresses appear in monofont. If you’re reading a digital version of this


book on a device connected to the Internet, note that you can click the web
address to visit that website, like this: http://www.dummies.com.

Foolish Assumptions
You might find it difficult to believe that I’ve assumed anything about you —
after all, we haven’t even met yet! Although most assumptions are indeed foolish,
I made these assumptions to provide a starting point for the book.

Of course, you do need to have some desire to work with NFC to solve some sort of
problem or address a need. In many cases, the problem or need is business or task
specific, but you might be amazed at the ways in which you can use NFC to address
personal needs as well. The point is that you need to have some anticipated pur-
pose for using NFC to get the most out of this book.

You should also understand some basics of technology. For example, if you aren’t
on speaking terms with your smartphone, this book might not be a good fit for
you. You do need some level of technical savvy to make good use of the material,
even though the bar isn’t set very high.

This book also assumes that you can access items on the Internet. Sprinkled
throughout are numerous references to online material that will enhance your
learning experience. However, these added sources are useful only if you actually
find and use them.

2 NFC For Dummies


Icons Used in This Book
As you read this book, you see icons in the margins that indicate material of inter-
est (or not, as the case may be). This section briefly describes each icon in this
book.

Tips are nice because they help you save time or perform some task without a
lot of extra work. The tips in this book are time-saving techniques or pointers to
resources that you should try in order to get the maximum benefit from NFC or in
performing NFC-related tasks.

I don’t want to sound like an angry parent or some kind of maniac, but you
should avoid doing anything that’s marked with a Warning icon. Otherwise, you
might find that your NFC application fails to work as expected, you get incor-
rect responses from seemingly bulletproof configurations, or (in the worst-case
scenario) you lose data or damage equipment.

Whenever you see this icon, think advanced tip or technique. You might find these
tidbits of useful information just too boring for words, or they could contain the
solution you need to get an NFC solution running. Skip these bits of information
whenever you like.

If you don’t get anything else out of a particular chapter or section, remember the
material marked by this icon. This text usually contains an essential process or a
bit of information that you must know to work with NFC successfully.

Beyond the Book


This book isn’t the end of your NFC experience — it’s really just the beginning.
I provide online content to make this book more flexible and better able to meet
your needs. That way, as you send me email about the book, I can address ques-
tions and tell you how updates to NFC affect book content. In fact, you gain access
to all these cool additions:

»» Cheat sheet: You remember using crib notes in school to make a better mark
on a test, don’t you? You do? Well, a cheat sheet is sort of like that. It provides
you with some special notes about tasks that you can do with NFC. You can
find the cheat sheet for this book at http://www.dummies.com/
cheatsheet/nfc. It contains really neat information such as the NFC operat-
ing modes and tag types.

Introduction 3
Viewing NFC wallet use by purchase type
It matters not only where but also how you use NFC. Many companies have already
found that NFC is an indispensable part of their business environment, as shown in
Figure 1-3. Of course, this figure doesn’t show all the companies that use NFC, but
it does show some of the larger organizations. Even in places like ­Wisconsin (one
of the lighter areas in Figure 1-2, shown previously), you can go into a ­Subway,
tap your card, and pay for your dinner. So, it’s not impossible to find NFC usage
wherever you go because these larger companies are already using it.

Figure 1-3 shows the relative strength of NFC by purchase area. Look for these
numbers to change dramatically for the better as more national and global
companies start to use NFC at the cash register. The article at https://www.
nfcbootcamp.com/near-field-communication-more-than-mobile-marketing/
provides you with more details on just how much of an impact NFC is starting to
make in other industries.

FIGURE 1-3:
Types of
items that are
­commonly
purchased using
NFC.

CHAPTER 1 Introducing Near Field Communication (NFC) 15


Another random document with
no related content on Scribd:
1.C. The Project Gutenberg Literary Archive Foundation (“the
Foundation” or PGLAF), owns a compilation copyright in the
collection of Project Gutenberg™ electronic works. Nearly all the
individual works in the collection are in the public domain in the
United States. If an individual work is unprotected by copyright
law in the United States and you are located in the United
States, we do not claim a right to prevent you from copying,
distributing, performing, displaying or creating derivative works
based on the work as long as all references to Project
Gutenberg are removed. Of course, we hope that you will
support the Project Gutenberg™ mission of promoting free
access to electronic works by freely sharing Project
Gutenberg™ works in compliance with the terms of this
agreement for keeping the Project Gutenberg™ name
associated with the work. You can easily comply with the terms
of this agreement by keeping this work in the same format with
its attached full Project Gutenberg™ License when you share it
without charge with others.

1.D. The copyright laws of the place where you are located also
govern what you can do with this work. Copyright laws in most
countries are in a constant state of change. If you are outside
the United States, check the laws of your country in addition to
the terms of this agreement before downloading, copying,
displaying, performing, distributing or creating derivative works
based on this work or any other Project Gutenberg™ work. The
Foundation makes no representations concerning the copyright
status of any work in any country other than the United States.

1.E. Unless you have removed all references to Project


Gutenberg:

1.E.1. The following sentence, with active links to, or other


immediate access to, the full Project Gutenberg™ License must
appear prominently whenever any copy of a Project
Gutenberg™ work (any work on which the phrase “Project
Gutenberg” appears, or with which the phrase “Project
Gutenberg” is associated) is accessed, displayed, performed,
viewed, copied or distributed:

This eBook is for the use of anyone anywhere in the United


States and most other parts of the world at no cost and with
almost no restrictions whatsoever. You may copy it, give it
away or re-use it under the terms of the Project Gutenberg
License included with this eBook or online at
www.gutenberg.org. If you are not located in the United
States, you will have to check the laws of the country where
you are located before using this eBook.

1.E.2. If an individual Project Gutenberg™ electronic work is


derived from texts not protected by U.S. copyright law (does not
contain a notice indicating that it is posted with permission of the
copyright holder), the work can be copied and distributed to
anyone in the United States without paying any fees or charges.
If you are redistributing or providing access to a work with the
phrase “Project Gutenberg” associated with or appearing on the
work, you must comply either with the requirements of
paragraphs 1.E.1 through 1.E.7 or obtain permission for the use
of the work and the Project Gutenberg™ trademark as set forth
in paragraphs 1.E.8 or 1.E.9.

1.E.3. If an individual Project Gutenberg™ electronic work is


posted with the permission of the copyright holder, your use and
distribution must comply with both paragraphs 1.E.1 through
1.E.7 and any additional terms imposed by the copyright holder.
Additional terms will be linked to the Project Gutenberg™
License for all works posted with the permission of the copyright
holder found at the beginning of this work.

1.E.4. Do not unlink or detach or remove the full Project


Gutenberg™ License terms from this work, or any files
containing a part of this work or any other work associated with
Project Gutenberg™.
1.E.5. Do not copy, display, perform, distribute or redistribute
this electronic work, or any part of this electronic work, without
prominently displaying the sentence set forth in paragraph 1.E.1
with active links or immediate access to the full terms of the
Project Gutenberg™ License.

1.E.6. You may convert to and distribute this work in any binary,
compressed, marked up, nonproprietary or proprietary form,
including any word processing or hypertext form. However, if
you provide access to or distribute copies of a Project
Gutenberg™ work in a format other than “Plain Vanilla ASCII” or
other format used in the official version posted on the official
Project Gutenberg™ website (www.gutenberg.org), you must, at
no additional cost, fee or expense to the user, provide a copy, a
means of exporting a copy, or a means of obtaining a copy upon
request, of the work in its original “Plain Vanilla ASCII” or other
form. Any alternate format must include the full Project
Gutenberg™ License as specified in paragraph 1.E.1.

1.E.7. Do not charge a fee for access to, viewing, displaying,


performing, copying or distributing any Project Gutenberg™
works unless you comply with paragraph 1.E.8 or 1.E.9.

1.E.8. You may charge a reasonable fee for copies of or


providing access to or distributing Project Gutenberg™
electronic works provided that:

• You pay a royalty fee of 20% of the gross profits you derive from
the use of Project Gutenberg™ works calculated using the
method you already use to calculate your applicable taxes. The
fee is owed to the owner of the Project Gutenberg™ trademark,
but he has agreed to donate royalties under this paragraph to
the Project Gutenberg Literary Archive Foundation. Royalty
payments must be paid within 60 days following each date on
which you prepare (or are legally required to prepare) your
periodic tax returns. Royalty payments should be clearly marked
as such and sent to the Project Gutenberg Literary Archive
Foundation at the address specified in Section 4, “Information
about donations to the Project Gutenberg Literary Archive
Foundation.”

• You provide a full refund of any money paid by a user who


notifies you in writing (or by e-mail) within 30 days of receipt that
s/he does not agree to the terms of the full Project Gutenberg™
License. You must require such a user to return or destroy all
copies of the works possessed in a physical medium and
discontinue all use of and all access to other copies of Project
Gutenberg™ works.

• You provide, in accordance with paragraph 1.F.3, a full refund of


any money paid for a work or a replacement copy, if a defect in
the electronic work is discovered and reported to you within 90
days of receipt of the work.

• You comply with all other terms of this agreement for free
distribution of Project Gutenberg™ works.

1.E.9. If you wish to charge a fee or distribute a Project


Gutenberg™ electronic work or group of works on different
terms than are set forth in this agreement, you must obtain
permission in writing from the Project Gutenberg Literary
Archive Foundation, the manager of the Project Gutenberg™
trademark. Contact the Foundation as set forth in Section 3
below.

1.F.

1.F.1. Project Gutenberg volunteers and employees expend


considerable effort to identify, do copyright research on,
transcribe and proofread works not protected by U.S. copyright
law in creating the Project Gutenberg™ collection. Despite
these efforts, Project Gutenberg™ electronic works, and the
medium on which they may be stored, may contain “Defects,”
such as, but not limited to, incomplete, inaccurate or corrupt
data, transcription errors, a copyright or other intellectual
property infringement, a defective or damaged disk or other
medium, a computer virus, or computer codes that damage or
cannot be read by your equipment.

1.F.2. LIMITED WARRANTY, DISCLAIMER OF DAMAGES -


Except for the “Right of Replacement or Refund” described in
paragraph 1.F.3, the Project Gutenberg Literary Archive
Foundation, the owner of the Project Gutenberg™ trademark,
and any other party distributing a Project Gutenberg™ electronic
work under this agreement, disclaim all liability to you for
damages, costs and expenses, including legal fees. YOU
AGREE THAT YOU HAVE NO REMEDIES FOR NEGLIGENCE,
STRICT LIABILITY, BREACH OF WARRANTY OR BREACH
OF CONTRACT EXCEPT THOSE PROVIDED IN PARAGRAPH
1.F.3. YOU AGREE THAT THE FOUNDATION, THE
TRADEMARK OWNER, AND ANY DISTRIBUTOR UNDER
THIS AGREEMENT WILL NOT BE LIABLE TO YOU FOR
ACTUAL, DIRECT, INDIRECT, CONSEQUENTIAL, PUNITIVE
OR INCIDENTAL DAMAGES EVEN IF YOU GIVE NOTICE OF
THE POSSIBILITY OF SUCH DAMAGE.

1.F.3. LIMITED RIGHT OF REPLACEMENT OR REFUND - If


you discover a defect in this electronic work within 90 days of
receiving it, you can receive a refund of the money (if any) you
paid for it by sending a written explanation to the person you
received the work from. If you received the work on a physical
medium, you must return the medium with your written
explanation. The person or entity that provided you with the
defective work may elect to provide a replacement copy in lieu
of a refund. If you received the work electronically, the person or
entity providing it to you may choose to give you a second
opportunity to receive the work electronically in lieu of a refund.
If the second copy is also defective, you may demand a refund
in writing without further opportunities to fix the problem.

1.F.4. Except for the limited right of replacement or refund set


forth in paragraph 1.F.3, this work is provided to you ‘AS-IS’,
WITH NO OTHER WARRANTIES OF ANY KIND, EXPRESS
OR IMPLIED, INCLUDING BUT NOT LIMITED TO
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR
ANY PURPOSE.

1.F.5. Some states do not allow disclaimers of certain implied


warranties or the exclusion or limitation of certain types of
damages. If any disclaimer or limitation set forth in this
agreement violates the law of the state applicable to this
agreement, the agreement shall be interpreted to make the
maximum disclaimer or limitation permitted by the applicable
state law. The invalidity or unenforceability of any provision of
this agreement shall not void the remaining provisions.

1.F.6. INDEMNITY - You agree to indemnify and hold the


Foundation, the trademark owner, any agent or employee of the
Foundation, anyone providing copies of Project Gutenberg™
electronic works in accordance with this agreement, and any
volunteers associated with the production, promotion and
distribution of Project Gutenberg™ electronic works, harmless
from all liability, costs and expenses, including legal fees, that
arise directly or indirectly from any of the following which you do
or cause to occur: (a) distribution of this or any Project
Gutenberg™ work, (b) alteration, modification, or additions or
deletions to any Project Gutenberg™ work, and (c) any Defect
you cause.

Section 2. Information about the Mission of


Project Gutenberg™
Project Gutenberg™ is synonymous with the free distribution of
electronic works in formats readable by the widest variety of
computers including obsolete, old, middle-aged and new
computers. It exists because of the efforts of hundreds of
volunteers and donations from people in all walks of life.

Volunteers and financial support to provide volunteers with the


assistance they need are critical to reaching Project
Gutenberg™’s goals and ensuring that the Project Gutenberg™
collection will remain freely available for generations to come. In
2001, the Project Gutenberg Literary Archive Foundation was
created to provide a secure and permanent future for Project
Gutenberg™ and future generations. To learn more about the
Project Gutenberg Literary Archive Foundation and how your
efforts and donations can help, see Sections 3 and 4 and the
Foundation information page at www.gutenberg.org.

Section 3. Information about the Project


Gutenberg Literary Archive Foundation
The Project Gutenberg Literary Archive Foundation is a non-
profit 501(c)(3) educational corporation organized under the
laws of the state of Mississippi and granted tax exempt status by
the Internal Revenue Service. The Foundation’s EIN or federal
tax identification number is 64-6221541. Contributions to the
Project Gutenberg Literary Archive Foundation are tax
deductible to the full extent permitted by U.S. federal laws and
your state’s laws.

The Foundation’s business office is located at 809 North 1500


West, Salt Lake City, UT 84116, (801) 596-1887. Email contact
links and up to date contact information can be found at the
Foundation’s website and official page at
www.gutenberg.org/contact

Section 4. Information about Donations to


the Project Gutenberg Literary Archive
Foundation
Project Gutenberg™ depends upon and cannot survive without
widespread public support and donations to carry out its mission
of increasing the number of public domain and licensed works
that can be freely distributed in machine-readable form
accessible by the widest array of equipment including outdated
equipment. Many small donations ($1 to $5,000) are particularly
important to maintaining tax exempt status with the IRS.

The Foundation is committed to complying with the laws


regulating charities and charitable donations in all 50 states of
the United States. Compliance requirements are not uniform
and it takes a considerable effort, much paperwork and many
fees to meet and keep up with these requirements. We do not
solicit donations in locations where we have not received written
confirmation of compliance. To SEND DONATIONS or
determine the status of compliance for any particular state visit
www.gutenberg.org/donate.

While we cannot and do not solicit contributions from states


where we have not met the solicitation requirements, we know
of no prohibition against accepting unsolicited donations from
donors in such states who approach us with offers to donate.

International donations are gratefully accepted, but we cannot


make any statements concerning tax treatment of donations
received from outside the United States. U.S. laws alone swamp
our small staff.

Please check the Project Gutenberg web pages for current


donation methods and addresses. Donations are accepted in a
number of other ways including checks, online payments and
credit card donations. To donate, please visit:
www.gutenberg.org/donate.

Section 5. General Information About Project


Gutenberg™ electronic works
Professor Michael S. Hart was the originator of the Project
Gutenberg™ concept of a library of electronic works that could
be freely shared with anyone. For forty years, he produced and
distributed Project Gutenberg™ eBooks with only a loose
network of volunteer support.

Project Gutenberg™ eBooks are often created from several


printed editions, all of which are confirmed as not protected by
copyright in the U.S. unless a copyright notice is included. Thus,
we do not necessarily keep eBooks in compliance with any
particular paper edition.

Most people start at our website which has the main PG search
facility: www.gutenberg.org.

This website includes information about Project Gutenberg™,


including how to make donations to the Project Gutenberg
Literary Archive Foundation, how to help produce our new
eBooks, and how to subscribe to our email newsletter to hear
about new eBooks.

You might also like