The NFC Forum expands accessibility of the N-Mark symbol


NFC Forum NewsMobile Commerce

The NFC Forum, a non-profit association that works for the progress of NFC technology, has announced that its N-Mark symbol is growing in popularity. The N-Mark was introduced in late 2010 and serves as a special marker for certified NFC-enabled mobile devices. The NFC Forum has worked to standardize the symbol in an effort to provide some stability to the emerging industries of mobile commerce and NFC technology in general. Due to the rising demand for NFC-enabled devices and technology, the organization has decided to expand the availability of the N-Mark.

The symbol was originally meant to be used on tags and digital content. The NFC Forum has now determined that the symbol will also be used for software and mobile devices. The N-Mark can be obtained and used for free once interested parties have attained a simple license that justifies their use of the symbol. The NFC Forum is also drawing attention to its N-Mark Brand Guide, which provides usage guidelines for the symbol and examples from companies and organizations that have successfully implemented it.

More than 1,000 companies have signed on to use the N-Mark worldwide. The NFC Forum expects this number to grow as the accessibility of the symbol expands. According to recent research conducted by Deloitte, an audit, consulting and financial advisory firm, more than 200 million NFC-enabled mobile devices are expected to be shipped by the end of 2012. These mobile devices could soon be emblazoned with the N-Mark, should their manufacturers show interest in adopting the symbol.

The symbol is meant to inform consumers that they can interact with NFC technology in some way. Many consumers have shown interest in the technology recently, but few currently own mobile devices that are compatible with NFC. Telecommunications companies are working to get more NFC-enabled devices to the commercial market, but have been met with caution from consumers. Many are concerned about the security of the technology and how contactless interactions can be exploited by criminals.

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.