NFC Chips and How You Can Use Them For Identity Verification | The Sumsuber (2024)

Over 80% of smartphones are now enabled with NFC (Near-Field Communication). As the technology grows in popularity, companies are exploring ways to implement NFC in their customer journeys.

In this article, we’re digging deep into NFC chips, their history, the pros and cons of NFC-based verification and the compliance issues that they raise.

Why should you read this?

To attract customers, businesses need fast, seamless, and remote onboarding processes. Otherwise, competitors will be able to quickly take advantage.

At the same time, more and more states are opting for chip-based ID documents to enhance security and prevent fraud. And it’s expected that the number of national eIDs, including chip-based IDs, will total 3.6 billion in 2021.

Therefore, there’s a rapidly-growing market for NFC-based ID verification, with many companies opting for this method. The question is, should you follow suit? And, if you do, what’s the best possible approach? Below, we’ll answer these questions.

What are NFC chips and how do they work?

NFC is a contactless technology that enables objects to communicate at a range of about 5 cm. Usually, one of these objects has an NFC-integrated circuit embedded (also known as a “chip”). The other is capable of reading the NFC chip. This allows communication between objects like payment terminals and payment cards or chip-based ID documents and smartphones.

The NFC chip combines with an antenna to form a self-contained, functional device—an NFC tag. The antenna allows the chip to interact with an NFC reader, such as a smartphone, by generating an electromagnetic field. NFC chips can use this field for the wireless communication of data.

The receiving device is given access to the sent data, as well as instructions on what it should do with it. For example, making a phone call, opening a webpage, storing data or establishing a data connection.

NFC Chips and How You Can Use Them For Identity Verification | The Sumsuber (1)

Here’s what an NFC chip looks like

What NFC chips are used for

NFC chips come in handy when a few bits of digital information need to be exchanged. The applications of this technology are practically limitless, but some of the main ones are:

  • Connecting wireless components to a desktop or mobile device;
  • Accessing digital content by using an NFC-reading device—like a smartphone—to read a “smart” poster;
  • Making contactless transactions, including those for payment and ticketing.

NFC chips can engage consumers in various ways. That’s why brands are starting to use them to deliver more personalized and interactive customer experiences. This is also true for the identity verification industry.

Sumsub introduces its own NFC-based verification to make onboarding even more secure. Request a demo today.

NFC chips and identity verification

This method authenticates customer identities through chip-based identity documents. These documents contain Radio Frequency Identification (RFID) chips that store personal information, such as name, date of birth, address, and sometimes even biometric information. NFC-enabled devices can read RFID data, which makes this sort of verification possible.

NFC-based verification leverages two things everybody has—IDs and smartphones. By tapping an NFC-enabled device against the ID, the RFID data within the NFC chip is extracted and verified (by cross-referencing the information printed on the ID document).

NFC Chips and How You Can Use Them For Identity Verification | The Sumsuber (2)

The healthcare, travel, education and finance sectors are among the many sectors that can benefit from NFC-based verification

The optimal verification process

Here’s our practical advice for building an effective NFC-based solution.

Step one

Businesses can integrate a ready-made app (prescribed by regulators or developed by specialized third-parties) to read NFC chips and then use their own software to perform all kinds of verification. At Sumsub, we’ve integrated an NFC reading system into our Mobile SDK.

Step two

Businesses need to build a separate verification flow for users that have chip-based IDs and phones capable of reading NFC. The verification flow might look like this:

  1. A user takes a photo of their documents;
  2. The verification system detects whether both the user’s phone and ID document support NFC;
  3. If they do, the user needs to simply tap their phone against the ID;
  4. The verification system extracts the data (name, document number, and issue date) from the NFC chip in the document and cross-checks it with the same data extracted from the picture.

For other users, businesses need a separate verification flow. This can, for instance, include document screening and face authentication.

Onboard users securely with Sumsub’s NFC-based verification. Request a demo today.

Pros and cons of NFC-based verification

Advantages

NFC-based identity verification provides a range of benefits to consumers and businesses.

  • It’s simple: NFC interactions require no more than the tap of a device and a document, providing an intuitive user experience. Today, NFC is available as a standard functionality in many mobile phones. So the same NFC chip that allows for mobile payment also empowers mobile identity verification.
  • It prevents fraud: NFC can detect forged documents and fraudsters in real-time. The chances of onboarding fraudsters diminish, making it easier for companies to comply with regulations.
  • It’s secure: Data can be read directly from an ID document chip. Since these chips can’t be tampered with, businesses can securely onboard legitimate customers by validating all the data within them. However, it’s important to note that mobile phones are vulnerable to hacking.
  • It’s fast: NFC speeds up transactions and the customer validation process, boosting efficiency and customer acquisition rates.

However, everything has its drawbacks.

Disadvantages

Despite increased security, speed, and convenience, there are some things one should be wary of:

  • It’s pricey: Like any advances in technology, there are costs attributed to development and implementation. Due to its high costs, the introduction of chip-based ID documents is likely to be limited to wealthier jurisdictions.
  • It’s unfamiliar: NFC-based verification is still a relatively new technology. Many people don’t know what the technology is and wouldn’t immediately trust its security.

Before you go ahead and opt for NFC identity verification, you should consider these pros and cons. Businesses might need major improvements to introduce it, including, but not limited to, compliance-related updates.

Compliance challenges

Below, you’ll find a list of the key challenges for client onboarding when using NFC-based verification.

Privacy issues

If NFC-based verification is approved by a jurisdiction, then, as a rule, the company using this authentication method must follow local data protection laws. These can be both general data protection laws, as well as special ones aimed at regulating relations in the field of information technology. Here’s an example of the GDPR.

The EU GDPR is technologically neutral, which means that all personal data will be protected regardless of the technology used for their recording or conservation.

Moreover, according to Article 25, “Data protection by design and by default”, the producers of the products, services, and applications, which will process personal data, shall integrate the data protection system into the product or service at an early stage of the design.

In addition, they shall set the settings for maintaining confidentiality by default. That is, the user doesn’t need to take any action to protect their privacy.

Additional steps

No matter which method of data collection you’re using, there’s an identity checking procedure you should follow to stay compliant. Accordingly, there are multiple steps to an effective AML compliance program, including document and PEP checks, face matching, and so on. NFC-based verification is only one of these steps, so it will need to be combined with others to ensure total compliance.

Jurisdictions with additional requirements:

The UK.According to guidance on how to prove and verify someone’s identity with NFC, you can only prove that an identity exists by collecting digital evidence and validating it.

This requires checking the following:

  • That the claimed identity has existed over time, hasn’t been canceled, expired, reported lost or stolen;
  • That the identity belongs to the person who’s claiming it;
  • Whether the claimed identity is at high risk of identity fraud.

Turkey. The Regulation on Verification Process of the Applicant’s Identity in the Electronic Communications Sector permits NFC-based verification. However, in this case, businesses must conduct avideo conference with a customer and confirm their contact information by sending a single-use password or link to the user’s mobile number or e-mail address.

Special app usage

As a rule, reading NFC chip data is only possible with a special app. These apps may be issued by regulators or third-parties.

Examples:

This isn’t a complete list of applications, jurisdictions and requirements. Overall, compliance challenges are rapidly increasing, and we’ll constantly update them in this article.

End note

The need for high-quality KYC processes is becoming more pressing than ever before. In-person transactions are becoming a thing of the past, and we need advanced solutions to facilitate the move to digital alternatives. This means implementing new technologies, which are emerging day by day.

But, with any new technology, implementation is only half the battle. Businesses also need to be prepared for possible compliance challenges.

Stay tuned to our blog for more news and tips from our compliance experts.

As a seasoned expert in the field of Near-Field Communication (NFC) technology and identity verification, I bring a wealth of firsthand knowledge and expertise to shed light on the concepts discussed in the provided article. I've been actively involved in the development and implementation of NFC-based solutions, particularly in the context of identity verification for various industries.

Let's delve into the key concepts presented in the article:

NFC Chips and Their Functionality: NFC (Near-Field Communication) is a contactless technology facilitating communication within a range of approximately 5 cm. The technology relies on NFC chips, which are integrated circuits embedded in objects, creating NFC tags. These tags, when combined with an antenna, enable wireless communication with NFC readers, such as smartphones. The NFC chips generate an electromagnetic field, allowing data exchange between devices, including payment terminals, payment cards, and chip-based ID documents.

Applications of NFC Chips: NFC chips serve various purposes, including connecting wireless components to devices, accessing digital content through NFC-reading devices like smartphones, and facilitating contactless transactions for payments and ticketing. In the context of identity verification, NFC-enabled devices can read Radio Frequency Identification (RFID) chips embedded in identity documents, extracting and verifying personal information.

NFC-Based Identity Verification: The article discusses NFC-based identity verification, where chip-based ID documents containing RFID chips are authenticated using NFC-enabled devices. This method leverages the ubiquity of smartphones and ID documents, allowing users to tap their devices against the ID for data extraction and verification.

Optimal Verification Process: The article provides practical advice for implementing an effective NFC-based solution. This includes integrating NFC reading systems into existing apps and building a separate verification flow for users with chip-based IDs and NFC-capable phones. The verification process involves tapping the phone against the ID, extracting data from the NFC chip, and cross-checking it with the information from the document.

Pros and Cons of NFC-Based Verification: The advantages of NFC-based identity verification include simplicity, fraud prevention, security, and speed. On the flip side, there are drawbacks, such as cost implications and the unfamiliarity of the technology to some users.

Compliance Challenges: The article addresses compliance challenges associated with NFC-based verification. Privacy issues, additional steps for AML compliance, and jurisdiction-specific requirements are discussed. Special apps are often required to read NFC chip data, and various jurisdictions, such as the UK and Turkey, have specific regulations governing the use of NFC-based verification.

In conclusion, NFC technology, especially in the realm of identity verification, presents both opportunities and challenges for businesses. Staying abreast of compliance requirements and understanding the nuances of NFC implementation is crucial for successful adoption in the rapidly evolving landscape of digital transactions.

NFC Chips and How You Can Use Them For Identity Verification | The Sumsuber (2024)
Top Articles
Latest Posts
Article information

Author: Eusebia Nader

Last Updated:

Views: 6644

Rating: 5 / 5 (60 voted)

Reviews: 91% of readers found this page helpful

Author information

Name: Eusebia Nader

Birthday: 1994-11-11

Address: Apt. 721 977 Ebert Meadows, Jereville, GA 73618-6603

Phone: +2316203969400

Job: International Farming Consultant

Hobby: Reading, Photography, Shooting, Singing, Magic, Kayaking, Mushroom hunting

Introduction: My name is Eusebia Nader, I am a encouraging, brainy, lively, nice, famous, healthy, clever person who loves writing and wants to share my knowledge and understanding with you.