Welcome!

Symbian Authors: Jack Newton, Kevin Benedict, Matthew Lobas, Shelly Palmer, RealWire News Distribution

News Feed Item

NFC & mobile payments

NEW YORK, Dec. 18, 2012 /PRNewswire/ -- Reportlinker.com announces that a new market research report is available in its catalogue:

NFC & mobile payments

http://www.reportlinker.com/p01057534/NFC--mobile-payments.html#utm_sour...

This study presents the current situation of the mobile payment and mobile NFC technology markets. It analyzes the prospects for the market from a technical and economic point of view, by looking at challenges facing the economic models in key areas, including: automation, commerce, advertising, public services and transport.

• How can mobile NFC technology revolutionize payment, transportation and mobile applications?

• Can it generate revenue for the various stakeholders?

• What are some of the issues around NFC technology business models?

• What technical challenges exist that might have a direct impact on mobile NFC business models?

• Could NFC mobile payment be deployed on a large scale?

• What strategies are the major players adopting for implementing mobile NFC technology?

1. Executive Summary 7

1.1. Current status of contactless mobile technology . 8

1.2. Limited new usage, few additional revenues . 9

1.3. Multiple stakeholders vie for the market . 10

2. Methodology 11

3. NFC technology . 13

3.1. Definition . 13

3.2. NFC objects 13

3.3. How it works . 14

3.4. General hardware architecture . 15

3.4.1. NFC tags and cards architecture . 15

3.4.2. Architecture and operation of NFC devices . 16

3.5. Norms and standards . 17

3.6. The Secure Element (SE) 18

3.6.1. The Cardlet 18

3.6.2. Trusted Service Manager (TSM) and personalization . 18

3.6.3. The different types of Secure Element 19

3.7. How NFC works for secure applications 21

3.7.1. Contactless mobile payments (credit/debit card system) . 21

3.7.2. Mobile wallets 25

3.7.3. Transportation and ticketing applications 26

3.8. How NFC works for non-secure applications . 28

3.8.1. Between an NFC mobile device and an NFC tag 28

3.8.2. Between two NFC mobile devices . 29

4. Market structure 30

4.1. Market evaluation . 30

4.1.1. Initiatives around NFC . 30

4.1.2. NFC mobile devices 35

4.2. The main applications and uses for NFC . 37

4.2.1. NFC mobile payments and micro-payments 37

4.2.2. Non-NFC mobile payments . 42

4.2.3. Transportation . 47

4.2.4. Other applications 48

4.3. Business models and added value of NFC mobile technology 55

4.3.1. Automation 56

4.3.2. Transportation . 56

4.3.3. Commerce and payments . 57

4.3.4. Advertising . 60

4.3.5. Public services . 61NFC & Mobile Payment

5. Strategies from key players 62

5.1. The value chain 62

5.1.1. The NFC mobile payments value chain . 62

5.1.2. The transportation value chain 62

5.1.3. Details and role of the various stakeholders 63

5.2. Profiles of key players 65

5.2.1. Mobile service providers 65

5.2.2. Payment systems 68

5.2.3. Mobile operators 70

5.2.4. Mobile device manufacturers . 74

5.2.5. Manufacturers of NFC chips, SIM cards and microSD cards . 79

6. Strategic analysis 83

6.1. Technical maturity of NFC 83

6.1.1. Norms and standards 83

6.1.2. NFC mobile devices 84

6.1.3. Infrastructures 84

6.2. Numerous initiatives . 85

6.3. Challenges around usage 86

6.4. Business models and ecosystem . 87

6.4.1. Complex business models . 87

6.4.2. An overcrowded ecosystem . 88

6.4.3. Competing technical architectures . 88

Tables

Table 1: Comparison of different near-field wireless communication technologies . 13

Table 2: Summary of the major, recent initiatives around NFC 31

Table 3: Worldwide data for the volume of transactions made on mobile devices 34

Table 4: Number of users using mobile devices as a payment method, by region . 34

Table 5 : List of main card reader mobile plug-in solution providers 43

Table 6: Business model comparison between transportation and commerce/payments . 55

Table 7: Individual ticket price comparison in London between NFC and non-NFC . 57

Table 8: Percentage of the population who have used mobile payments during the year, for

various countries in Africa . 58

Table 9: Service provider involvement 66

Table 10: Payment systems and NFC involvement 68

Table 11: Mobile operators' involvement 70

Table 12: Involvement of mobile device manufacturers 75

Table 13: Involvement of manufacturers of NFC chips, SIM cards and microSD cards 79

Figures

Figure 1: Contents of the ISIS contactless mobile wallet . 9

Figure 2: NFC operation in P2P mode . 14

Figure 3: NFC operation in read/write mode 14

Figure 4: NFC operation in card emulation mode 15

Figure 5: Overhead view of an NFC NXP tag 15

Figure 6: Exploded view of an NFC card, showing its different elements 16

Figure 7: Hardware architecture of an NFC mobile device 17

Figure 8: Example of cardlet organization in an NFC SIM card . 18

Figure 9: NFC mobile device architecture with an integrated SE . 19

Figure 10: NFC mobile device architecture with the SE in the SIM card 20

Figure 11: NFC mobile device and traditional mobile device architecture with the SE in the SIM

card . 21

Figure 12: Personalization of the payment application on the user's mobile device 22

Figure 13: Payment amount displayed on the EPT and the user's mobile device during a

transaction 23

Figure 14: Simplfied NFC mobile payment process, with an authorization request . 24

Figure 15: Simplified process for transfer of funds from customer to merchant . 24

Figure 16: Different ways of purchasing a transport ticket for use with NFC mobile devices . 27

Figure 17: Different ways of downloading a transport ticket for use with NFC mobile devices 28

Figure 18: Possible data exchange initiated by NFC between two NFC mobile devices . 29

Figure 19: Number of NFC mobile products offered by brand . 36

Figure 20: Microsoft Wallet on Windows Phone 8 37

Figure 21: Visa's NFC mobile payment app for the London 2012 Summer Olympics 38

Figure 22: The ISIS Wallet app 38

Figure 23: The Cityzi app and BNP Paribas (KIX) payment services . 39

Figure 24: The Cityzi app and transport service in Nice . 39

Figure 25: The Google Wallet NFC app . 40

Figure 26: Signing for a card payment directly on the device 42

Figure 27: The Square Register card reader in use with an iPad 43NFC & Mobile Payment

Figure 30 : Segmentation of mobile payment systems . 45

Figure 31 : Example of a virtual currency model (Facebook Credits) involving four player types . 45

Figure 32 : Buying FarmCash, the virtual currency used in FarmVille, with Facebook Credits . 46

Figure 33: Poster for the film X-Men First Class with an NFC tag that lets users view the trailer with

their mobile devices 49

Figure 34: Overview of Groupe Casino's NFC solution 50

Figure 35: Audioguide on a Samsung Smartphone at the Cité de l'Architecture in Paris, controlled

by tapping an NFC tag with an NFC mobile device 50

Figure 36: Posters designed for restaurants by Atuch, allowing customers to download menus

directly by tapping an NFC tag or scanning a QR code 51

Figure 37: Sony Ericsson's Xperia programmable tags, which can trigger an action on a Sony

mobile device 51

Figure 38: Nokia's NFC-compatible wireless speaker for pairing with a Nokia NFC mobile phone via

Bluetooth . 52

Figure 39: Exchanging business cards between two Nokia NFC mobile phones 53

Figure 40: Passing security and boarding gates at Toulouse airport, France, using a boarding pass

stored in an NFC mobile device. . 53

Figure 41: An NFC parking ticket service by Skidata . 54

Figure 42: Yale's NFC solution for unlocking hotel doors . 54

Figure 43: Percentage of the population in different countries worldwide with an account at a

financial institution 58

Figure 44: Growth in the number of non-cash payments by inhabitants for different countries in

Europe and the United States, from 2001 to 2009 59

Figure 45: The NFC mobile and mobile payments value chain 62

Figure 46: NFC apps to become Facebook friends with someone or to like a Facebook page . 66

Figure 47: Paypal's mobile app for NFC payment between two mobile devices 70

Figure 48: NTT docomo's Osaifu Keitai (mobile wallet) concept 73

Figure 49: NTT docomo's iD credit payment service in use . 73

Figure 50: NTT docomo's DCMX credit service . 74

Figure 51: Nokia's range of NFC handsets 76

Figure 52: BlackBerry handsets hosting NFC technology . . 77

Figure 53: a Samsung Galaxy SII being used to make a purchase via the Visa PayWave app . 78

Figure 54: WatchData's NFC solutions 80

Figure 55: NXP's NFC chips built into Google and Samsung mobile devices. Without a Secure

Element on the left and with an SE on the right 81

Figure 56: Features of the Sony Xperia S promoted by Orange 84

Figure 57: Snapshot of different NFC mobile initiatives around the world 85

Figure 58: Starbucks Coffee non-NFC mobile payment application using bar codes 86

To order this report:

: NFC & mobile payments

Contact Nicolas: [email protected]
US: (805)-652-2626
Intl: +1 805-652-2626

SOURCE Reportlinker

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

@ThingsExpo Stories
Complete Internet of Things (IoT) embedded device security is not just about the device but involves the entire product’s identity, data and control integrity, and services traversing the cloud. A device can no longer be looked at as an island; it is a part of a system. In fact, given the cross-domain interactions enabled by IoT it could be a part of many systems. Also, depending on where the device is deployed, for example, in the office building versus a factory floor or oil field, security ha...
SYS-CON Events announced today the Enterprise IoT Bootcamp, being held November 1-2, 2016, in conjunction with 19th Cloud Expo | @ThingsExpo at the Santa Clara Convention Center in Santa Clara, CA. Combined with real-world scenarios and use cases, the Enterprise IoT Bootcamp is not just based on presentations but with hands-on demos and detailed walkthroughs. We will introduce you to a variety of real world use cases prototyped using Arduino, Raspberry Pi, BeagleBone, Spark, and Intel Edison. Y...
Is your aging software platform suffering from technical debt while the market changes and demands new solutions at a faster clip? It’s a bold move, but you might consider walking away from your core platform and starting fresh. ReadyTalk did exactly that. In his General Session at 19th Cloud Expo, Michael Chambliss, Head of Engineering at ReadyTalk, will discuss why and how ReadyTalk diverted from healthy revenue and over a decade of audio conferencing product development to start an innovati...
Fifty billion connected devices and still no winning protocols standards. HTTP, WebSockets, MQTT, and CoAP seem to be leading in the IoT protocol race at the moment but many more protocols are getting introduced on a regular basis. Each protocol has its pros and cons depending on the nature of the communications. Does there really need to be only one protocol to rule them all? Of course not. In his session at @ThingsExpo, Chris Matthieu, co-founder and CTO of Octoblu, walk you through how Oct...
The Jevons Paradox suggests that when technological advances increase efficiency of a resource, it results in an overall increase in consumption. Writing on the increased use of coal as a result of technological improvements, 19th-century economist William Stanley Jevons found that these improvements led to the development of new ways to utilize coal. In his session at 19th Cloud Expo, Mark Thiele, Chief Strategy Officer for Apcera, will compare the Jevons Paradox to modern-day enterprise IT, e...
SYS-CON Events announced today that Bsquare has been named “Silver Sponsor” of SYS-CON's @ThingsExpo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. For more than two decades, Bsquare has helped its customers extract business value from a broad array of physical assets by making them intelligent, connecting them, and using the data they generate to optimize business processes.
Identity is in everything and customers are looking to their providers to ensure the security of their identities, transactions and data. With the increased reliance on cloud-based services, service providers must build security and trust into their offerings, adding value to customers and improving the user experience. Making identity, security and privacy easy for customers provides a unique advantage over the competition.
There are several IoTs: the Industrial Internet, Consumer Wearables, Wearables and Healthcare, Supply Chains, and the movement toward Smart Grids, Cities, Regions, and Nations. There are competing communications standards every step of the way, a bewildering array of sensors and devices, and an entire world of competing data analytics platforms. To some this appears to be chaos. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, Bradley Holt, Developer Advocate a...
If you’re responsible for an application that depends on the data or functionality of various IoT endpoints – either sensors or devices – your brand reputation depends on the security, reliability, and compliance of its many integrated parts. If your application fails to deliver the expected business results, your customers and partners won't care if that failure stems from the code you developed or from a component that you integrated. What can you do to ensure that the endpoints work as expect...
So, you bought into the current machine learning craze and went on to collect millions/billions of records from this promising new data source. Now, what do you do with them? Too often, the abundance of data quickly turns into an abundance of problems. How do you extract that "magic essence" from your data without falling into the common pitfalls? In her session at @ThingsExpo, Natalia Ponomareva, Software Engineer at Google, provided tips on how to be successful in large scale machine learning...
If you had a chance to enter on the ground level of the largest e-commerce market in the world – would you? China is the world’s most populated country with the second largest economy and the world’s fastest growing market. It is estimated that by 2018 the Chinese market will be reaching over $30 billion in gaming revenue alone. Admittedly for a foreign company, doing business in China can be challenging. Often changing laws, administrative regulations and the often inscrutable Chinese Interne...
In his general session at 18th Cloud Expo, Lee Atchison, Principal Cloud Architect and Advocate at New Relic, discussed cloud as a ‘better data center’ and how it adds new capacity (faster) and improves application availability (redundancy). The cloud is a ‘Dynamic Tool for Dynamic Apps’ and resource allocation is an integral part of your application architecture, so use only the resources you need and allocate /de-allocate resources on the fly.
Enterprise IT has been in the era of Hybrid Cloud for some time now. But it seems most conversations about Hybrid are focused on integrating AWS, Microsoft Azure, or Google ECM into existing on-premises systems. Where is all the Private Cloud? What do technology providers need to do to make their offerings more compelling? How should enterprise IT executives and buyers define their focus, needs, and roadmap, and communicate that clearly to the providers?
SYS-CON Events announced today that Commvault, a global leader in enterprise data protection and information management, has been named “Bronze Sponsor” of SYS-CON's 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Commvault is a leading provider of data protection and information management solutions, helping companies worldwide activate their data to drive more value and business insight and to transform moder...
The many IoT deployments around the world are busy integrating smart devices and sensors into their enterprise IT infrastructures. Yet all of this technology – and there are an amazing number of choices – is of no use without the software to gather, communicate, and analyze the new data flows. Without software, there is no IT. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists will look at the protocols that communicate data and the emerging data analy...
Digital innovation is the next big wave of business transformation based on digital technologies of which IoT and Big Data are key components, For example: Business boundary innovation is a challenge to excavate third-party business value using IoT and BigData, like Nest Business structure innovation may propose re-building business structure from scratch, as Uber does in the taxicab industry The social model innovation is also a big challenge to the new social architecture with the design fr...
Data is an unusual currency; it is not restricted by the same transactional limitations as money or people. In fact, the more that you leverage your data across multiple business use cases, the more valuable it becomes to the organization. And the same can be said about the organization’s analytics. In his session at 19th Cloud Expo, Bill Schmarzo, CTO for the Big Data Practice at EMC, will introduce a methodology for capturing, enriching and sharing data (and analytics) across the organizati...
IoT is fundamentally transforming the auto industry, turning the vehicle into a hub for connected services, including safety, infotainment and usage-based insurance. Auto manufacturers – and businesses across all verticals – have built an entire ecosystem around the Connected Car, creating new customer touch points and revenue streams. In his session at @ThingsExpo, Macario Namie, Head of IoT Strategy at Cisco Jasper, will share real-world examples of how IoT transforms the car from a static p...
There is little doubt that Big Data solutions will have an increasing role in the Enterprise IT mainstream over time. Big Data at Cloud Expo - to be held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA - has announced its Call for Papers is open. Cloud computing is being adopted in one form or another by 94% of enterprises today. Tens of billions of new devices are being connected to The Internet of Things. And Big Data is driving this bus. An exponential increase is...
SYS-CON Events has announced today that Roger Strukhoff has been named conference chair of Cloud Expo and @ThingsExpo 2016 Silicon Valley. The 19th Cloud Expo and 6th @ThingsExpo will take place on November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. "The Internet of Things brings trillions of dollars of opportunity to developers and enterprise IT, no matter how you measure it," stated Roger Strukhoff. "More importantly, it leverages the power of devices and the Interne...