Startup: NFC Ring Reviewed

By: Brian Rhodes, Published on Sep 24, 2013

An eccentric startup wants to empower your fistbumps with information. If the NFC Ring takes off, knocking knuckles will not only swap contact information, but it may also unlock your doors, pay your busfares, and turn on your smartphone, all in a secure fashion. A successful Kickstarter campaign suggests people love the idea, but should you? We answer that question in this note.

The Ring of Power

Essentially, the NFC Ring is a metal casting containing two NFC chips, or 'inlays'. These chips are oriented 'top' and 'bottom' to each other, and if worn correctly support two unique sets of information. These inlays are passively powered by NFC readers, but wearing the chips on a finger places it within natural activation range of handheld tablets, smartphones, or other computers. The image below reveals the basic design and appearance of the ring:

The ring is programed from an app on a smartphone, or potentially via a hardwired NFC reader. The chips are unlocked and empty until 'set' with information exchanged to it by companion software. Purchasing a ring also comes with an app to configured the ring for simple tasks, like exchanging contact details or webpage information, but has the potential to host any NFC-based information. The image below shows a screenshot of data enrollment from an Android:

 

Two Sided Security

The fundamental feature of the ring is that it actually stores two sets of information: a 'public' store that contains general contact information: Social Media profiles, Email/Phone numbers, Business Card details, and a 'private' store than contains secure information: credentials, finance details, and passwords.

In order to exchange 'public details' (ie: from the ring to a mobile device), a clenched fist is 'bumped' against the target. The mass of the wearer's fingers and the ring absorbs any potential energy from allowing the 'private inlay' from being activated. However, for more secure functions, like opening access controlled doors or activating mobile devices, the palm is opened and the inside 'private' inlay is read. The video below details the function of both inlays:

Get Notified of Video Surveillance Breaking News
Get Notified of Video Surveillance Breaking News

Like all NFC credentials, the endpoint devices must include a reader. While adoption is early, NFC readers are being integrated to many Android smartphones, tablets, and is even being featured in a number of EAC readers.

Cost

Early versions of the NFC Ring were available on the project's Kickstarter page for $40 USD. Final production versions are expected to cost around the same, and will be available in multiple styles for either gender.

Fistbumping 2.0

In the business world, a 'handshake' often 'seals the deal'. However, the NFC Ring wants you to take fistbumping to the next level. In a public or casual setting, the gesture may proclaim you "king of the streets" or someone's "best bro". However, as the image below represents, the gesture looks a little awkward in a business setting. Even if all the elements to exchange details in the coolest, high-tech manner possible (ie: via NFC Ring) are present, most stuffed-shirt business types will still opt for the refined (analog) method of exchanging business cards.

What about Access Control?

Using the Ring for door access still needs development. At current, NFC for commercial access control requires credentials to be provisioned on the chip before each opening. This is done to ensure that 'old' (previously flashed) credentials cannot open doors, and that security is maintained even for 'offline' standalone locks. Since the ring is unpowered, it could only be used for access if it was first 'cloned' to hold the same information as a networked credential (ie: smartphone). Because of the considerable amount of time it takes to first provision a phone and then copy them to the ring, it does not seem a likely technology for commercial access control.

Crowdsourcing

Say what you will about the viability of the idea, but the NFC Ring was recently bolstered by a successful Kickstarter campaign that raised nearly $385,000. The project caught the eye of many, including 'Kickstarter of the Week' award. The profile below not only is good for product knowledge, but reveals the eccentricity of the developer - UK based software developer John McLear:

1 report cite this report:

Contactless Access Credentials Guide on Oct 29, 2018
Contactless credentials are the most common component used in an access control system and while many look alike externally, important differences...
Comments (3) : PRO Members only. Login. or Join.

Related Reports

Securing Access Control Installations Tutorial on Oct 17, 2019
The physical security of access control components is critical to ensuring that a facility is truly secure. Otherwise, the entire system can be...
Access Control Course Fall 2019 - Last Chance on Oct 17, 2019
Register Now - Fall 2019 Access Control Course. Thursday, October 17th is the last day to register. IPVM offers the most comprehensive access...
Pelco CEO Out, New CEO Found on Oct 15, 2019
Just 2 months after Pelco was sold, Pelco's CEO is out, with Pelco bringing in an outside President and searching for a new CEO from the industry,...
HID Fingerprint Reader Tested on Oct 09, 2019
HID has released their first access reader to use Lumidigm optical sensors, that touts it 'works with anyone, anytime, anywhere'. We bought and...
'Bunker Busting' Wireless Access Startup: Sure-Fi Profile on Oct 03, 2019
An access startup is claiming its 'bunker busting' wireless Wiegand radios can punch through 'any obstruction'. We examine their offering,...
Fail Safe vs. Fail Secure Tutorial on Oct 02, 2019
Few terms carry greater importance in access control than 'fail safe' and 'fail secure'. Access control professionals must know how these...
Access Control Mustering Guide on Sep 30, 2019
In emergencies, determining where employees are located can be critical for knowing whether they are in danger. Access systems can be used for...
Access Control Mantraps Guide on Sep 26, 2019
One of access's primary goals is keeping people out of places they should not be, but slipping through open doors (ie: Tailgating) is often...
Startup XNOR.ai, Inventors of YOLO, Video Surveillance Plans Examined on Sep 24, 2019
YOLO is arguably the most discussed and hyped computer vision model today. The inventors of YOLO have a startup named XNOR.ai that aims to bring...
Access Control Time & Attendance Guide on Sep 24, 2019
Access control systems can do more than lock doors. With little or no extra equipment, they can be used to track labor hours for employees...

Most Recent Industry Reports

Alarm Veteran "Demands A Criminal Investigation" Of UL on Oct 18, 2019
The Interceptor's Project pressure against UL continues to rise. Following Keith Jentoft's allegation that "UL Has Blood On Their Hands", Jentoft...
Camect "Worlds Smartest Camera Hub" Tested on Oct 18, 2019
Camect is a Silicon Valley startup that claims the "Smartest AI Object Detection On The Market", detecting not only people and vehicles, but...
Hikvision Global News Reports Directory on Oct 17, 2019
Hikvision has received the most global news reporting of any video surveillance company, ever, ranging from the WSJ, the Financial Times, Reuters,...
Camera Calculator V3.1 Release Improves User Experience on Oct 17, 2019
IPVM has released a new version of our Camera Calculator, V3.1, with significant user experience improvements, a new development plan, and an...
Securing Access Control Installations Tutorial on Oct 17, 2019
The physical security of access control components is critical to ensuring that a facility is truly secure. Otherwise, the entire system can be...
Access Control Course Fall 2019 - Last Chance on Oct 17, 2019
Register Now - Fall 2019 Access Control Course. Thursday, October 17th is the last day to register. IPVM offers the most comprehensive access...
US DoD Comments on Huawei, Hikvision, Dahua Cyber Security Concerns on Oct 16, 2019
A senior DoD official said the US is "concerned" with the cybersecurity of Hikvision, Dahua, and Huawei due to "CCP" (China Communist Party)...
Pelco Sarix Pro3 Camera Tested on Oct 16, 2019
Pelco has released their Sarix Professional Series 3 cameras, claiming "more security detail in challenging scenes with excellent low light and...
IPVM Camera Calculator User Manual / Guide on Oct 16, 2019
Learn how to use the IPVM Camera Calculator. The guide below includes instructions, images, gifs, and videos demonstrating and explaining the...
Altronix Claims Tango 'Eliminates Electricians' on Oct 15, 2019
Power supply provider Altronix claims its new Tango power supply 'eliminates the need for an electrician, dedicated conduit and wire runs'. In...