Your Security Partner

What to do with NFC Tags? An electronic business card

Most smart phones (sans the iPhone) are NFC enabled out of the box and can read NFC tags without installing any apps. Naturally early adopters will want …

Continue reading full post

NFC use case: 2nd graders Set Up 25 Nexus Tablets in 3 minutes

NFC provides a better retail user experience than Bluetooth LE

With Apple's introduction of iBeacon & Bluetooth LE (BLE) some have proclaimed the end of Near Field Communication (NFC). These two technologies are …

Continue reading full post

Near Field Communication (NFC)

My plan is to write about mobile wireless technologies & security. As the chair of the NFC Forum Security WG I come across many interesting opinions …

Continue reading full post

Implicit Certificates vs. Conventional Certificates

As devices proliferate and become more mobile, managing relationships between them is critical. Devices will move in and out of range of each other and …

Continue reading full post

About this Blog

The TrustPoint Innovation Blog covers security industry topics relating to Certificates, Elliptic Curve Cryptography (ECC), Machine-to-Machine (M2M) Communication, Near Field Communication (NFC), Vehicle-to-Vehicle (V2V) Communication, and more.

Categories