That depends on what type of tag you use and what level of protection against cloning you want. NFC tags (as defined by the NFC Forum) have no . Everywhere a question like this is aske I see people responding that.
Because the cards contain a chip which are powered by a coil. Explore the security and privacy concerns raised by near field communication andhow the technology works to protect your data. The tag contains information an using the electromagnetic field as its power supply, sends this information to the smartphone.
NFC security: ways to avoid being hacked.
Already, home automation aficionados have used NFC tags—small devices capable of storing . Secure NFC Transponders (Tags) and RFID Transceivers (Readers) use a bidirectional security model to enable secure contactless communication. NFC or near field communication tech is changing how we use cell phones. Smart tags are tiny, read-only chips that can appear in informational posters . I’m working on application to work with nfc tags.
Infineon’s NFC Solutions: Combining Performance and Security. NFC application and business model,; NFC tags supporting smart posters, .