Spelling suggestions: "subject:"cfc"" "subject:"ffc""
11 |
An Investigation of Security in Near Field Communication SystemsOlivieri, Steven 26 January 2015 (has links)
Increasingly, goods and services are purchased over the Internet without any form of physical currency. This practice, often called e-commerce, offers sellers and buyers a convenient way to trade globally as no physical currency must change hands and buyers from anywhere in the world can browse online store fronts from around the globe. Nevertheless, many transactions still require a physical presence. For these sorts of transactions, a new technology called Near Field Communication has emerged to provide buyers with some of the conveniences of e-commerce while still allowing them to purchase goods locally. Near Field Communication (NFC), an evolution of Radio-Frequency Identification (RFID), allows one electronic device to transmit short messages to another nearby device. A buyer can store his or her payment information on a tag and a cashier can retrieve that information with an appropriate reader. Advanced devices can store payment information for multiple credit and debit cards as well as gift cards and other credentials. By consolidating all of these payment forms into a single device, the buyer has fewer objects to carry with her. Further, proper implementation of such a device can offer increased security over plastic cards in the form of advanced encryption. Using a testing platform consisting of commercial, off-the-shelf components, this dissertation investigates the security of the NFC physical-layer protocols as well as the primary NFC security protocol, NFC-SEC. In addition, it analyzes a situation in which the NFC protocols appear to break, potentially compromising sensitive data. Finally, this dissertation provides a proof of security for the NFC-SEC-1 variation of NFC-SEC.
|
12 |
Intention d'adoption et utilisation d'une technologie émergente : le cas de la NFC appliquée aux systèmes de paiement électronique de détail (paiement sans contact) / [Adoption and use of an emergent technology : the case of NFC applied to retail electronic payment systems (contactless payment)Hasnaoui, Amir 27 March 2012 (has links)
Avec l’émergence de la technologie en champ proche (NFC), le terminal mobile est devenu un véritable instrument de paiement sans contact. Ce type de système constitue une nouvelle opportunité pour relancer les systèmes de paiement électronique (SPE) destinés aux micropaiements. L’objectif de cette recherche est de développer un modèle et des instruments de mesure permettant d’appréhender et de cerner les facteurs influençant l’acceptation de ces systèmes. En se basant sur les paradigmes de l’acceptation des technologies et les travaux de recherche autour des SPE, nous avons développé un modèle conceptuel qui intègre à la fois la TUAUT et l’ATT. Notre modèle permet à la fois de tenir compte des stratégies d’adoption des individus et de leur intention d’adoption. En effet, l’utilité perçue, la facilité d’utilisation perçue et les conditions facilitatrices ne sont plus suffisantes pour qu’une technologie soit adoptée. Il faut désormais que les caractéristiques de cette technologie conviennent et répondent aux caractéristiques et aux exigences de la tâche qu’elle va supporter. Nos résultats ont été mesurés et validés à l’aide d’une analyse par équations structurelles des données collectées auprès d’un échantillon de 629 individus / With the emergence of near-field technology (NFC), mobile terminal have become a true instrument of contactless payment. This type of system is a new opportunity to boost the electronic payment systems (EPS) for the micropayment. The objective of this research is to develop a model and measurement tools to handle and to identify factors influencing the acceptance of these systems. Based on the paradigms of the acceptance of technology and research around the SPE, we have developed a conceptual model which integrates the UTAUT and TTF. This model allows both to consider the adoption strategies of individuals and their intention to adopt. Indeed, perceived usefulness, perceived ease of use and facilitating conditions are no longer sufficient for a technology to be adopted. The capabilities of this technology have to match the tasks that the user will perform. Our result have been measured and validated thanks to structural equations analysis of data collected from a sample of 629 individuals
|
13 |
Dataöverföring mellan en mobiltelefon och en NFC-läsare / Data transmission between a mobile phone and a NFC readerKarlsson, Linda January 2012 (has links)
Denna rapport handlar om att använda en trådlös kommunikationsteknik som kallas NFC (Near Field Communication) vid kommunikation mellan en Android mobiltelefon och en NFC-läsare som kallas ACR122U. Syftet med detta projekt är att: Välja en Androidtelefon som har stöd för NFC. Skapa en applikation som skall köras på Androidtelefonen och som skall skicka ett lösenord via NFC. Skapa ett program som skall köras på en dator med operativsystemet Windows 7 och som skall hantera ACR122U. Förklara den insamlade kunskapen i detta dokument så andra lättare skall kunna arbeta med NFC. Följande frågor kommer att besvaras i denna rapport: Vilken Androidtelefon bör användas vid utveckling av en applikation som kan kommunicera via NFC? Vad krävs vid utveckling av en applikation som kan kommunicera via NFC? Aktionsforskning är den forskningsmetod som användes vid sökandet efter svar på frågorna ovan. Detta innebär att forskningen görs genom att läsa om ämnet, genomföra en eller flera lösningar för att hitta en fungerande lösning och sedan dokumentera resultaten. Implementeringen av programvaran på mobiltelefonen genomfördes med mycket hjälp från Android Developers hemsida. Vid utvecklingen av den programvara som skall användas av datorn för att hantera ACR122U gjordes en hel del forskning. En demoapplikation och ett Javabibliotek som heter "nfctools" som är skapade av det Tyska GrundID GmbH var mycket användbara vid försöken att ta reda på hur kommunikationen fungerar. Programmet som hanterar ACR122U har utvecklats genom att växelvis läsa och testa olika lösningar. Den mobiltelefon som valdes under det här projektet är Samsung Galaxy Nexus som kör Android 4.0.Den programvara som hanterar ACR122U måste hantera dessa saker: Skicka data via USB till ACR122U - Detta gjordes med hjälp av en klass som kallas "ModWinsCard" vilken kom med ett utvecklingspaket för NFC. Ett ACR122U pseudo-APDU (Application Protocol Data Unit) kommando. Några av ACR122U:s NFC-kontroller (PN532) kommandon. Delar av NFC lagren: NDEF (NFC Data Exchange Format), SNEP (Simple NDEF Exchange Protocol) och LLCP (Logical Link Control Protocol). Det är viktigt att veta vilka NFC lager som finns implementerade i de enheter som skall kommunicera med varandra via NFC. Samma lager måste användas för att packa och packa upp data. / This report is about using a wireless communication technology called NFC (Near Field Communication) when communicating between a mobile phone using an Android operating system and a NFC reader called ACR122U. The purpose of this project is to: Select an Android phone which supports NFC. Create an application that runs on the Android mobile phone and which shall send a password via NFC. Create a program which will run on a PC running Windows 7 and which will handle ACR122U. Explain the gathered knowledge in this document so that others may more readily be able to work with NFC. The following questions will be answered in this report: Which Android mobile phone should be used when developing an application which will communicate via NFC? What is required when developing an application that can communicate via NFC? Action research is the research method that was used when searching for answers to the questions above. This means the research is done by reading about the subject, implementing one or more solutions in order to find a working solution and then documenting the results. The implementation of the software on the mobile phone was done with a lot of help from the Android Developers website. When developing the software to be used by the computer to handle ACR122U a lot of research was made. A demo application and a java library called “nfctools” made by the German company GrundID GmbH were very useful when trying to figure out how the communication works. The program that handles ACR122U was developed through alternating between reading and testing different solutions. The mobile phone that was chosen during this project is Samsung Galaxy Nexus running Android 4.0.The software that handles ACR122U needs to handle these things: Sending data via USB to ACR122U – This was done using a class called “ModWinsCard” which came with an NFC development package. An ACR122U Pseudo-APDU (Application Protocol Data Unit) command. Some of ACR122U’s NFC controller (PN532) commands. Some parts of the NFC layers: NDEF (NFC Data Exchange Format), SNEP (Simple NDEF Exchange Protocol) and LLCP (Logical Link Control Protocol). It is important to know which NFC layers are implemented in the devices that are to communicate with each other via NFC. The same layers must be used when packing and unpacking data.
|
14 |
E-paslaugų sprendimai naudojant mobiliąsias NFC technologijas / E-service solutions using mobile NFC technologyStasiukynas, Andrius 11 August 2009 (has links)
Magistrinio darbo tikslas yra – atlikti NFC technologijos ir su ja suderinto mobiliojo telefono analizę bei pasiūlyti įvairių paslaugų realizavimo mobiliajame NFC telefone sprendimus. Šiame darbe išsiaiškinama NFC technologijos veikimas bei panaudojimo sritys ir teikiama nauda. Nagrinėjama Nokia 6131 NFC mobiliojo telefono architektūra ir sprendžiamos jo panaudojimo galimybės elektroninių paslaugų įgyvendinimo uždaviniuose. Pateikiamas NFC telefono naudingumas pritaikant jį elektroninėms paslaugoms. Suprojektuoti viešojo transporto elektroninio bilieto įgyvendinimo modeliai. Pateikti siūlomų sprendimų pranašumai. Išanalizuotas ir pateiktas keleto paslaugų talpinimo mobiliajame telefone sprendimas. Aprašomas telefono atminties paskirstymas paslaugoms bei jų valdymas. Pasiūloma elektroninių paslaugų naudojant NFC mobiliąsias technologijas diegimo ir aptarnavimo infrastruktūra Panaudojant emuliatorių pademonstruojami pasiūlytiems sprendimams spręsti tinkamų aplikacijų pavyzdžiai. / The goal of Master Thesis is - the NFC technology and the coordinated analysis of the mobile phone and offer a variety of marketing services for mobile NFC phone solutions. In this paper, clear NFC technology and the use of areas of operation and benefits. Examining the Nokia 6131 NFC mobile phone architecture and its use in addressing the possibility of the electronic services of the tasks. Provide mobile NFC phone utility of the electronic services. Designed for the public transport e-ticket implementation models. Provide the advantages of the proposed solutions. Analyzed and presented in a number of hosting services for mobile phone solution. Describes the distribution of services in the phone memory, and their management. Offered e-services using NFC mobile technology implementation and service infrastructure. Using the emulator showing the proposed solutions address the application of appropriate examples.
|
15 |
Processus sécurisés de dématérialisation de cartes sans contact / Secure processes of dematerialization of contactless cardsBouazzouni, Mohamed Amine 08 November 2017 (has links)
Au fil des années, la technologie sans contact NFC s'est imposée dans notre quotidien au travers des différents services proposés. Les cas d'utilisation sont nombreux allant des cartes de fidélité, des cartes de transport, des cartes de paiement sans contact jusqu'aux cartes de contrôle d'accès. Cependant, les premières générations des cartes NFC ont une sécurité minimale reposant sur l'hypothèse de leur non-clonabilité. De multiples vulnérabilités ont été découvertes et leur exploitation a permis des copies frauduleuses. Afin de remédier à ces vulnérabilités, une nouvelle génération de cartes à la sécurité augmentée a vu le jour. Ces cartes permettent une authentification avec un lecteur basée sur des algorithmes de chiffrements symétriques tels qu'AES, DES, et 3DES. Elles sont plus robustes que la première génération mais ont subi des également une attaque en reverse-engineering. Pour garantir et améliorer le niveau de sécurité du système de contrôle d'accès, nous proposons dans le cadre de l'opération neOCampus, la dématérialisation sécurisée de la carte sans contact sur un smartphone muni de la technologie NFC. Cette dématérialisation nous permet d'exploiter la puissance de calcul et la capacité de stockage du smartphone afin de déployer des algorithmes d'authentification plus robustes. Cependant, l'OS du smartphone ne peut être considéré comme un environnement de confiance. Afin de répondre à la problématique du stockage et du traitement sécurisés sur un smartphone, plusieurs solutions ont été proposées : les Secure Elements (SE), les Trusted Platform Module (TPM), les Trusted Execution Environment (TEE) et la virtualisation. Afin de stocker et de traiter de manière sécurisée les données d'authentification, le TEE apparait comme la solution idéale avec le meilleur compromis sécurité/performances. Cependant, de nombreux smartphones n'embarquent pas encore de TEE. Pour remédier à cette contrainte, nous proposons une architecture basée sur l'utilisation de TEEs déportés sur le Cloud. Le smartphone peut le contacter via une liaison Wi-Fi ou 4G. Pour se faire, un protocole d'authentification basé sur IBAKE est proposé. En plus de ce scénario nominal, deux autres scenarii complémentaires ont été proposés permettant d'accompagner le développement et la démocratisation des TEE non seulement dans le monde des smartphones mais aussi sur des dispositifs peu onéreux comme le Raspberry Pi 3. Ces architectures déploient le même algorithme d'authentification que le scénario nominal. Nous proposons aussi une architecture hors ligne permettant à un utilisateur de s'authentifier à l'aide d'un jeton de connexion en cas d'absence de réseaux sans fil. Cette solution permet de relâcher la contrainte sur la connectivité du smartphone à son Cloud. Nous procédons à une évaluation de l'architecture de dématérialisation et de l'algorithme d'authentification en terme de performances et de sécurité. Les opérations cryptographiques du protocole d'authentification sont les plus coûteuses. Nous avons alors procédé à leur évaluation en nous intéressant en particulier aux opérations de chiffrement IBE et à la génération de challenges ECC. Nos implémentations ont été évaluées pour l'infrastructure Cloud et l'environnement mobile. Nous avons ensuite procédé à une validation du protocole d'authentification sur les trois architectures sélectionnées à l'aide de l'outil Scyther. Nous avons montré, que pour les trois scenarii, la clé de session négociée via le protocole d'authentification restait secrète durant tout le protocole. Cette caractéristique nous garantit que les données d'authentification chiffrées avec cette clé resteront secrètes et que la phase d'identification de la personne est protégée tout en préservant l'ergonomie du système existant. / Over the years, the Near Field Communication technology has emerged in our daily lives through a variety of services. There are several use cases for contactless cards : loyalty cards, metro and bus cards, payment cards and access control cards. However, the first version of these cards has a low security level that is based on the assumption that the cards can not be cloned. To address this issue, a new version of NFC cards has been developed. It allows an authentication with the NFC reader through symmetric encryption algorithms such as AES, DES or 3DES. These cards are more robust that the previous ones. However, these cards have also undergone a reverseengineering attack. We propose, in the context of the neOCampus project, to replace the contactless cards with a smartphone equipped with the NFC capabilities. This process, called dematerialization, allows us to take advantage of the computational power and the storage capabilities of the smartphone to deploy more complex and robust authentication algorithms. However, the OS of the smartphone can not be considered as a trusted environment for the storage and the processing of sensitive data. To address these issues, several solutions were proposed : Secure Elements (SE), Trusted Platform Module (TPM), Trusted Execution Environment (TEE) and Virtualization. In order to store and process securely authentication data, the TEE seems to be the best trade-off between security and performances. Nevertheless, many smartphones do not embeed TEE and it is necessary to negotiate agreements with the TEE manufacturers in order to deploy a secure application on it. In order to figure out these issues, we propose to set up an architecture with a TEE in the Cloud. The smartphone has a secure Cloud that can be reached through a Wi-Fi or 4G connection. The reader has also its own secure Cloud reachable with an Ethernet link. An authentication protocol based on IBAKE is also proposed. In addition to this scenario, two other scenarios were proposed to follow the development and democratization of the TEE on the smartphones and on some inexpensive devices such as Raspberry Pi 3. These alternative architectures deploy the same authentication protocol as the main scenario. We propose an offline architecture allowing a user to authenticate using a connection token. This solution relaxes the connectivity constraint between the smartphone and its secure Cloud. We perform an evaluation of our architecture and of the authentication algorithm in terms of performances and security. The cryptographical operations of the authentication protocol are the most consuming operations in term of performance. We have chosen to target these operations especially the encryption with the IBE and the ECC challenges generation. Our implementations have been evaluated for a Cloud infrastructure and a mobile-like environment. We also perform a formal verification of the authentication protocol through the three considered architectures with Scyther. We showed that, for the three scenarios, that the session key negotiated through the authentication protocol remains secret during the overall execution of the protocol. These characteristic guarantee that the authentication data encrypted with this key will remain secret and that this step of the algorithm will be secure while preserving the ergonomy of the existing system.
|
16 |
Säkerhetsstandard för ett mjukvarubaserat säkerhetselementKabir, Sanzida January 2013 (has links)
Researchers today anticipate that in the near future, the majority of the owners of a smartphone will use it as a wallet, i.e. for contactless payment. The technology that enables contactless payment today is “Near Field Communication” (NFC), which is increasingly embedded in smartphones. Applications like mobile payment between a phone and a terminal use NFC. With Mobile payment the user’s credit and banking information gets saved and it’s extremely important for a user that the saved data doesn’t fall into the wrong hands. How should then a user of an NFC equipped device ensure that end-to-end security is strong enough when they use NFC technology? Can user feel safe enough to keep their private documents on the phone without getting “robbed”? NFC uses a security element “Secure Element” (SE) that offers the user safety for their mobile purchases but also in other applications such as transportation tickets. The security element comes in three forms: SD card based, SIM card based or embedded in the smartphone. Over time, the technology behind the secure element is further developed and a new phenomenon has emerged, a new type of secure element. The new technology is an application based secure element: “Software Emulation Card” (Soft-SE), which offers security without a physical SE This thesis will deal with the Secure Element’s area to see if the Soft-SE are so confident that we can count it as an option when we do our mobile purchases in the store. A number of threats and attacks that an SE or generally an NFC device can be exposed to will be mentioned and some will also be described and some possible threats and attacks against Soft-SE. In addition, a few pros and cons of applying Soft-SE will be discussed. The analysis is based on how a user can get more out of the existing SE instead of applying the Soft-SE. Based on the facts, pros and cons, and the analysis that has been treated, it has been concluded that the Soft-SE is not a more secure alternative than the SE that is already used by NFC phones. Since Soft-SE is still new, it has not yet developed to protect themselves against the possible attacks that they may be exposed to. It is strongly recommended that users of Google Wallet adhere to the Secure Element that the smartphone use instead of applying Soft-SE. / Dagen forskare förutser att inom en snar framtid kommer majoriteten av ägarna till smarttelefon använda den som sin plånbok, det vill säga använda sig utav kontaktlös betalning. Tekniken som möjliggör kontaktklös betalning idag är närfältkommunikation (Engelska: “Near Field Communication” - NFC) som finns inbäddad i smarttelefoner. Applikationer som mobila betalningar mellan en telefon och terminal använder sig av NFC. Vid mobila betalningar sparas användarens kredit- och bankinformation och det är ytterst viktigt för en användare att dess sparade data inte kommer i fel händer. Hur ska då en användare av NFC vara säker på att säkerhetsutvecklingen går hand i hand med NFC-tekniken? Kan en användare känna sig tillräckligt säker för att spara sina privata handlingar på telefonen utan att bli bestulen? NFC använder sig utav ett säkerhetselement (Engelska: “Secure Element” - SE) som erbjuder användaren säkerhet vid alla mobilköp men även i andra applikationer som till exempel färdmedelsbiljetter. Säkerhetselementet kommer i tre olika former: SD-kortbaserat, SIM-kortbaserat eller inbäddad i smarttelefonen. Med tiden har tekniken bakom SE vidareutvecklats och ett nytt fenomen har uppstått, nämligen ett nytt slags säkerhetselement. Den nya tekniken är ett applikationsbaserat säkerhetselement: mjukvarubaserad kortemulering (Engelska: “Software Card Emulation” - Soft SE), som erbjuder säkerhet utan ett fysiskt SE. Denna avhandling kommer behandla säkerhetselementets område och se över om Soft-SE är så pass säker att vi kan räkna det som ett alternativ vid våra mobilköp i affären. Ett antal hot och attacker som ett SE eller allmänt en NFC-enhet kan utsättas för kommer att nämnas och en del kommer även att beskrivas samt möjliga hot och attacker mot Soft-SE. Utöver det kommer ett par för- och nackdelar med att tillämpa Soft-SE att diskuteras. Analysen är baserat på hur en användare kan få ut mer av den existerande SE istället för att tillämpa Soft-SE. Utifrån fakta, för- och nackdelar och analysen som har behandlats drogs slutsatsen att Soft-SE inte är ett säkrare alternativ än den SE som redan används av NFC-telefoner. Eftersom Soft-SE fortfarande är något nytt har den inte ännu utvecklats tillräckligt för att skydda sig mot de möjliga attacker som den kan utsättas för. Det är starkt rekommenderat att användarna av Google Wallet håller sig till det säkerhetselement som smarttelefonen använder sig utav istället för att tillämpa Soft-SE.
|
17 |
Sambandet mellan cellulosakedjans polymerisationsgrad och styrkan i nanofibrillerad cellulosafilm / The Relationship between the Degree of Polymerization of Cellulose Chains and the Strength of Nanofibrillated Cellulose FilmLandmér, Alice January 2015 (has links)
Studiens syfte var att undersöka vilken effekt cellulosakedjornas polymerisationsgrad (D.P.) har på styrkan i nanofibrillerad cellulosafilm (NFC-film). Detta är av intresse på grund av tidigare studier som indikerar att både filmstyrkan och töjningen hos NFC-film ökar med ett ökande D.P. hos materialet som NFC produceras ifrån, samt att starkare NFC-filmer önskas tas fram. En ökad styrka och töjning hos NFC-filmer är viktigt för att kunna utöka användningsområdet för filmen, t.ex. inom applikationer som beständiga displayers eller till förpackningar. I denna studie framställdes NFC system genom att först hydrolysera ett bomullsmaterial med högt D.P. till olika grader. Bomullen karboxymetylerades därefter för att sedan homogeniseras till NFC. Avslutningsvis, framställdes filmer baserade på de olika NFC systemen, vars mekaniska egenskaper undersöktes för att utvärdera effekten av D.P. Dragtesten som utfördes på filmerna visade på att dragindexet (TSI) var det som påverkades mest markant av D.P. variationen. Det tycktes finnas en kritisk gräns för D.P. ≤ 2600, under vilken styrkan sjunker medan en icke nämnvärd förändring av styrkan sker över gränsen. / The purpose of this study was to investigate the effect of the degree of polymerization (D.P.) of cellulose on the strength of nanofibrillated cellulose film (NFC-film). The interest to investigate this effect is based on earlier studies, which have shown results that indicate on an increasing strength and strain for the films with an increasing D.P. of the material from which the NFC is produced. The desire to produce stronger NFC-films is also a reason for the study. Both an increased strength and strain are desired in the NFC-films, because it would expand the possible use of the films, for example as displays and in packaging applications. In this study, the NFC systems were prepared by first hydrolyzing the cotton linters, which had a high D.P., to different degrees. Then the cotton systems were carboxymetylated and homogenized. Finally, the films were prepared from the different NFC systems, whose mechanical properties were studied to evaluate the effect of D.P. The tensile tests that were performed on the films showed that the tensile strength index (TSI) was most significantly affected by the D.P. variation. There seemed to be a critical limit for D.P. at ≤ 2600, below which the strength decreases while a non-significant change in strength occurred above.
|
18 |
Swedish vs. Japanese Mobile Technology : A study on the technologies and services which can be transferred between the two markets.Edbor, Mikael January 2011 (has links)
This report investigates what services and technologies currently sepatare the Swedish and the Japaneese phone markets, and what they can learn from each other. The purpose of the report is to find if there are any sevices or technologies that can be transferred between the two markets. The research was done by both literature study and interviews with people and companies who work in both markets, or who condutcs their own research on the subject brought up in this report. The interviews were conducted using questionnaire with a few core questions and then extended by questions fitting the person's own area of expertise. A few services such as micro payments via near field communications (NFC) technology, were found to be eligible candidates for introduction to the Swedish market. / Den här rapporten undersöker vilka tjänster och teknologier som för tillfället skiljer den svenska och den japanska moblmarknaden åt, och vad dessa marknader kan lära av varandra. Syftet med rapporten är att finna ifall det finns några tjänster eller teknologier som kan överföras mellan marknaderna. Undersökningen gjordes både genom litteraturstudie och intervjuer med personer och företag som jobbar i de två marknaderna, eller utför egen forskning inom området som tas upp i den här rapporten. Intervjuerna utfördes genom att följa ett frågeformulär där ett par kärnfrågor användes och som sedan bygdes på med frågor som passade den intervjuades expertis. Några tjänster, så som betalning via Near Field Communications tekniken (NFC), anses vara passande kandidater för att importeras till den svenska marknaden.
|
19 |
Technologie NFC a její zabezpečení / NFC technology and its securityMertlík, Tomáš January 2013 (has links)
The first objective of this paper is to describe the Android operating system. The chapter presents history and architecture regarding to all versions of the operating system. The significant part of chapter is focused on security. The second main topic of this paper is analysing the NFC (Near Field Communication) technology. This technology is based on an older contactless system RFID (Radio Frequency Communication), so RFID is described either. The NFC technology chapter contains the description of usability, history and the definitions of physical layer, link layer and NDEF (NFC Data Exchange) data format, used for data transmitting. The next chapter is focusing on the analysis of the NFC vulnerability. It contains a possible attacks methods and solutions how to prevent them. The output of this paper is the projection and creation of an application, which allow sending an arbitrary data between two devices using the NFC technology. Additional Bluetooth technology can be used for larger files. In this case, NFC helps to create Bluetooth communication channel which is utilized for data transfer.
|
20 |
Konsumentens möte med teknologi i butik : Den digitaliserade köpprocessenFalck, Ewelina, Nordström, Klara January 2016 (has links)
Konsumenter födda i generation Y är mer digitalt kompetenta i jämförelse med tidigare generationer. De har växt upp i takt med teknologins utveckling och ser inga hinder med att använda den. Denna studie behandlar därför hur olika teknologiska lösningar kan användas i fysiska modebutiker för att undersöka hur detta påverkar konsumenternas köpprocess. Personlig service utgörs vanligtvis av att personalen tar kontakt med en konsument och riktar sin uppmärksamhet gentemot denne och försöker få personen i fråga att fullfölja köpprocessen. Med olika teknologiska lösningar tillåts konsumenter däremot att genomföra denna köpprocess mer självständigt och därför har denna studie även ett serviceperspektiv där vi undersöker hur den personliga servicen förändras av teknologins inverkan. Den teknologi som specifikt har undersökts har bestått av RFID- och NFC- tekniker via pekskärmar i provrum och betalstationer. Vidare har studien innefattat dels hur konsumenter upplever dessa typer av teknologier i en fysisk modebutik och dels hur konsumenter vill erhålla personlig service. Detta har gjorts genom en enkätundersökning via Internet och en kundundersökning med intervjuer i en labbmiljö. Vårt resultat visar att konsumenterna upplever teknologin som ett uppskattat och underlättande verktyg i köpprocessen då de föredrar att genomföra köp på ett effektivt sätt och på egen hand. Fortsättningsvis ser vi att konsumenterna efterfrågar en personlig service men däremot önskas överhuvudtaget ingen mänsklig kontakt med personalen i butik.Engelsk titel (kopiera från uppsats) *: Consumer´s meeting with technology in storesEngelska nyckelord *: Technology, RFID, NFC, Omni, In-store, Buying Process, Personalized ServiceSustainable development anges som nyckelord på engelska?: NEJEngelsk sammanfattning *: Consumers born in generation Y are more digitally literate than people born in previous generations. They have grown up in pace with the development of technology and sees no obstacles with using it. This study therefore addresses how technological solutions can be used in physical fashion stores to investigate how this affects the consumer´s buying process. Personalized service usually consists of that the staff will contact a consumer and direct her attention towards the costumer in attempt to complete their buying process. With different technological solutions the consumer is allowed to perform this process more independently and therefore this study also holds a service perspective, where we examine how the personalized service is affected by the technology´s impact. The technologies that have been studied specifically consisted of RFID and NFC technologies via touch screens in fitting rooms and pay stations. Furthermore, this study includes both how consumers experience these types of technologies in a physical fashion store and also how consumers want to receive personalized service. This has been done through a survey via the Internet and through a customer survey with interviews in a lab environment. Our results show that consumers perceive the technology as a valued and facilitative tool in the buying process since they prefer to make purchases in an efficient way and by their selves. Henceforth, we can see that consumers want a personalized service but no human contact at all is desired with the staff in the fashion store.
|
Page generated in 0.0458 seconds