Near field communication device

ABSTRACT

According to a first aspect of the present disclosure, a near field communication device is provided which comprises a storage unit, wherein said storage unit is configured and adapted to store sequence-specific data relating to at least one sequence of devices of which said near field communication device forms part. According to a second aspect of the present disclosure, a corresponding method for configuring a near field communication device is conceived. According to a third aspect of the present disclosure, a near field communication reader is provided which comprises: a near field communication unit which is configured and adapted to read at least one sequence of devices; and a processing unit which is configured and adapted to execute a function associated with said sequence only if all devices of said sequence have been read. According to a fourth aspect of the present disclosure, a corresponding method for facilitating the execution of functions is conceived. According to a fifth aspect of the present disclosure, a non-transitory computer program product corresponding to said methods is provided.

FIELD

The present disclosure relates to a near field communication device andto a corresponding method for configuring a near field communicationdevice. Furthermore, the present disclosure relates to a near fieldcommunication reader and to a corresponding method for facilitating theexecution of functions. Furthermore, the present disclosure relates to anon-transitory computer program product corresponding to said methods.

BACKGROUND

Today, the use of so-called near field communication (NFC) enables thewireless transmission of data over relatively short distances. NFCtechnology enables simple and safe two-way interactions betweenelectronic devices, allowing consumers to perform contactlesstransactions, access digital content, and connect electronic deviceswith a single touch. NFC complements many popular consumer-levelwireless technologies by utilizing the key elements in existingstandards for contactless smart card technology (for example, ISO/IEC14443 A and B and JIS-X 6319-4). NFC is compatible with existingcontactless smart card infrastructures and thus it enables a consumer toutilize one device across different systems. There are various types ofNFC devices, for example simple NFC tags or stickers and NFC readers. AnNFC tag is usually a passive device, i.e. it does not have its own powersource but instead it is powered by a field generated by another NFCdevice, such as an NFC reader. More complex NFC devices may operate indifferent modes, specifically: a reader/writer mode, which allows an NFCdevice to read and/or write passive NFC tags and stickers; apeer-to-peer mode, which allows the NFC device to exchange data withother NFC peer devices; a Host Card Emulation (HCE) mode, which allowsthe NFC device to act as an NFC card. An emulated NFC card can beaccessed by an external NFC reader, such as an NFC point-of-saleterminal. Host Card Emulation (HCE) is the presentation of a virtual andexact representation of a smart card using only software. NFC devices,such as NFC tags/stickers, emulated NFC cards and also NFC-compatiblesmart cards, often support only a limited number of functions.Typically, an NFC reader reads a limited amount of data from such NFCdevices, and subsequently performs a simple function such as a faretransaction or a discount operation. Although NFC provides a convenientway to support such functions, it may be desirable to increase the rangeand/or the amount of supported functions.

SUMMARY

According to a first aspect of the present disclosure, a near fieldcommunication device is provided which comprises a storage unit, whereinsaid storage unit is configured and adapted to store sequence-specificdata relating to at least one sequence of devices of which said nearfield communication device forms part.

In one or more embodiments, the sequence-specific data comprise asequence identifier attribute which identifies the sequence of devices.

In one or more embodiments, the sequence of devices is an orderedsequence, and the sequence-specific data comprise a sequence orderattribute which specifies a position of the near field communicationdevice in said ordered sequence.

In one or more embodiments, the sequence-specific data comprise afunction attribute which enables, at least in part, an external nearfield communication reader to execute a function associated with thesequence of devices.

In one or more embodiments, the function attribute comprisesauthentication data which enable said near field communication reader toperform an authentication algorithm that takes said authentication dataas an input.

In one or more embodiments, the authentication data comprise at least apart of a cryptographic key.

In one or more embodiments, the sequence-specific data comprise a timingattribute which specifies a timing requirement associated with saidfunction.

In one or more embodiments, the near field communication device is anear field communication tag.

According to a second aspect of the present disclosure, a method forconfiguring a near field communication device is conceived, the methodcomprising storing, in a storage unit of said near field communicationdevice, sequence-specific data relating to at least one sequence ofdevices of which said near field communication device forms part.

According to a third aspect of the present disclosure, a near fieldcommunication reader is provided which comprises: a near fieldcommunication unit which is configured and adapted to read at least onesequence of devices; and a processing unit which is configured andadapted to execute a function associated with said sequence only if alldevices of said sequence have been read.

In one or more embodiments, the processing unit is configured andadapted to execute said function only if the devices of said sequencehave been read in a predefined order.

In one or more embodiments, the processing unit is configured andadapted to execute said function only if the time elapsed betweenreading particular ones of said devices does not exceed a predefinedthreshold and/or only if at least one of said devices has been readbefore a predefined expiry time.

In one or more embodiments, the function is an authentication algorithmthat takes authentication data retrieved from said devices as input, andthe processing unit is further configured and adapted to enable useraccess to the near field communication reader in dependence on an outputof said authentication algorithm.

According to a fourth aspect of the present disclosure, a method forfacilitating the execution of functions is conceived, the methodcomprising: reading, by a near field communication unit comprised in anear field communication reader, at least one sequence of devices; andexecuting, by a processing unit comprised in said near fieldcommunication reader, a function associated with said sequence only ifall devices of said sequence have been read.

According to a fifth aspect of the present disclosure, a non-transitorycomputer program product is provided comprising instructions which, whenbeing executing by a processing unit, cause said processing unit tocarry out a method according to the second aspect or a method accordingto the fourth aspect.

DESCRIPTION OF DRAWINGS

Embodiments will be described in more detail with reference to theappended drawings, in which:

FIG. 1 shows an illustrative embodiment of an NFC device;

FIG. 2 shows an illustrative embodiment of the content of a storageunit.

FIG. 3 shows an illustrative embodiment of an NFC reader;

FIG. 4 shows an illustrative embodiment of an NFC system;

FIG. 5 shows another illustrative embodiment of an NFC system;

FIG. 6 shows a further illustrative embodiment of an NFC system.

DESCRIPTION OF EMBODIMENTS

FIG. 1 shows an illustrative embodiment of an NFC device 100. The NFCdevice 100 comprises a storage unit 102. The storage unit 102 isconfigured and adapted to store sequence-specific data relating to atleast one sequence of devices of which said near field communicationdevice forms part. Thus, if an NFC reader reads these sequence-specificdata from said NFC device, and combines said sequence-specific data withsequence-specific data retrieved from other NFC devices of the samesequence, the NFC reader may perform sequence-specific functions. Inother words, the NFC reader may, in addition to the functions alreadysupported by stand-alone or individual NFC devices, now also executesequence-specific functions, and thus the range and/or the amount ofexecutable functions may effectively be increased.

FIG. 2 shows an illustrative embodiment of the content of a storage unitas shown in FIG. 1. As mentioned above, in one or more embodiments, thesequence-specific data comprise a sequence identifier attribute whichidentifies the sequence of devices. In this way, it is easier for anexternal NFC reader to determine to which sequence the NFC devicebelongs. By consequence, the use of multiple sequences is alsofacilitated: the NFC device may form part of more than one sequence, andin that case the storage unit may store a plurality of sequenceidentifier attribute values. This is shown in the example of FIG. 2: theNFC device forms part of two sequences, identified by the attributevalues “SeqID_1” and “SeqID_2”.

Furthermore, the storage unit may contain a sequence order attribute.This attribute defines, for a given sequence of which the NFC deviceforms part, its position in said sequence. It is noted that thisattribute is relevant only for ordered sequences, and may be dispensedwith, remain unused or have an arbitrary value for unordered sequences.The use of the sequence order attribute allows for supporting orimplementing functions for which an NFC reader needs to receive data ina certain predefined order, as will be described in more detail withreference to some examples hereinbelow. In the shown example, thesequence order attribute has value “2” for “SeqID_1”, which indicatesthat the NFC device occupies the second position in the ordered sequenceidentified by “SeqID_1”. Likewise, the sequence order attribute hasvalue “4” for “SeqID_2”, which indicates that the NFC device occupiesthe fourth position in the ordered sequence identified by “SeqID_2”.

Furthermore, the storage unit may contain a function attribute. Thefunction attribute may enable, at least in part, the external NFC readerto execute a specific function associated with a given sequence ofdevices. Thus, in addition to functional instructions and/or functionaldata that are fully contained in the NFC reader and that may be used bysaid NFC reader simply after haying tapped all NFC devices of a givensequence, the NFC reader may also collect functional instructions and/orfunctional data from the NFC devices and use them to execute acorresponding function. In that case, since the functional instructionsand/or functional data should be obtained from a plurality of sourcesand the function cannot be executed until all of them are collected, ahigher security level may be achieved. In the shown example, thefunction attribute contains a fragment of a discount code for theordered sequence identified by “SeqID_1”. This may mean that an NFCreader should first collect a first fragment of the discount code fromanother (first) NFC device (i.e., from an NFC device having sequenceorder attribute value “1” for “SeqID_1”) and then collect the secondfragment of the discount code from the current (second) NFC device.Possibly, the NFC reader should then obtain further discount codefragments from other NFC devices. Finally, the NFC reader may assembleall code fragments into a discount code and perform a discountoperation.

In one or more embodiments, the function attribute comprisesauthentication data which enable the NFC reader to perform anauthentication algorithm that takes said authentication data as aninput. The authentication algorithm may be based on a cryptographicalgorithm, such as AES and 3-DES. Alternatively or in addition, theauthentication algorithm may verify a predefined code such as apassword. In this way, the NFC reader may easily and securely controlaccess to its functions, for example by unlocking itself or enablingcertain features only in response to an expected output of theauthentication algorithm. For instance, the authentication data maycomprise at least a part of a cryptographic key. In the shown example,the function attribute contains a fragment of an authentication key(i.e., a cryptographic key used for authentication purposes) for theordered sequence identified by “SeqID_2”. This may mean that the NFCreader should collect key fragments from a first, second and third NFCdevice, then collect the key fragment from the current (fourth) NFCdevice, and possibly collect further key fragments from other NFCdevices. Finally, the NFC device may assemble the key fragments into acomplete authentication key and execute the authentication algorithm.

In one or more embodiments, the sequence-specific data comprise a timingattribute which specifies a timing requirement associated with saidfunction. In this way, the function may become time-dependent, which maybe attractive for commercial purposes. For instance, in order toencourage a potential consumer to purchase a product quickly, atime-limited discount may be offered. In the shown example, the timingattribute has value “24 hours” for “SeqID_1”, which indicates to the NFCreader that the current NFC device should be read within 24 hours afterreading the previous NFC device. Thus, in this case, the timingattribute specifies the maximum amount of time that may elapse betweenreading the previous NFC device and the current NFC device. Likewise,the timing attribute has value “1 Jan. 2016” for “SeqID_2”, whichindicates to the NFC reader that the current NFC device should be readbefore Jan. 1, 2016. Thus, in this case, the timing attribute specifiesthat the current NFC device should be read before a predefined expirytime.

It is noted that, in the specific case where the function is anauthentication algorithm, the authentication steps may also be performedin a time-dependent manner by using the aforementioned timing attribute.For example, explained above, the timing attribute has value “1 Jan.2016” for “SeqID_2”, which indicates to the NFC reader that the currentNFC device should be read (i.e., that the authentication key fragmentshould be retrieved from said NFC device) before Jan. 1, 2016,Furthermore, the authentication steps may be performed in anorder-dependent manner using the aforementioned sequence orderattribute. For example, as explained above, the sequence order attributehas value “4” for “SeqID_2”, which indicates that the NFC deviceoccupies the fourth position in the ordered sequence identified by“SeqID_2”. Thus, the authentication will fail if, for instance, one ormore of the NFC devices occupying the first, second and third positionsin said ordered sequence has not been read before the current NFC deviceis read.

In one or more embodiments, the NFC device is an NFC tag. An NFC tag isa relatively cheap and simple device which can easily be attached to allkinds of devices, ranging from home appliances to office equipment. Theuse of sequences of NFC tags thus facilitates the implementation of awide range of functions in various environments. However, it isemphasized that the present disclosure is not limited to NFC tags. Thatis to say, the NFC device may also be implemented differently, forexample as an emulated NFC card comprised in a portable device or as anNYC device acting in peer-to-peer mode.

FIG. 3 shows an illustrative embodiment of an NFC reader 300. The NFCreader 300 comprises an NFC unit 302 and a processing unit 304 which areoperatively connected to each other. The NFC unit 302 is configured andadapted to read at least one sequence of devices. Furthermore, theprocessing unit 304 is configured and adapted to execute a functionassociated with said sequence only if all devices of said sequence havebeen read. This may be implemented as follows. For instance, the NFCreader 300 may read, through the NFC unit 302, at least one sequenceattribute value from an NFC tag which is brought into proximity. Theprocessing unit 304 may then, for example, compare this sequence IDattribute value with a list of known sequence identifiers stored in amemory (not shown) of the NFC reader 300 and, if it matches a knownsequence identifier, check if all NFC tags of the particular sequencehave already been read. For instance, the memory may contain a table inwhich, for each known sequence identifier, a set of NFC tag identifiers(Unique Identification Numbers, UIDs) is kept. Typically, the NFC reader300 will also read the UID of NFC tags, so the processing unit 302 mayflag which NFC tags of the particular sequence have already been read,such that said checking is facilitated. It is noted that the list ofknown sequence identifiers need not necessarily be stored within thememory of the NFC reader 300; it can for instance also be a part of aback-end system which is linked to the NFC reader 300. Alternatively,the information on the complete sequence may be kept in each NFC tagbelonging to said sequence. The NFC reader 300 may then simply keep,when it starts reading tags of a particular sequence, a history of UIDsretrieved from tags of said sequence, and pass on this history to a nexttag of said sequence. This tag may then check if it is the last tag ofthe sequence, and if so, transmit a sequence-completion signal to theNFC reader 300. In response to this sequence-completion signal, the NFCreader 300 may execute the function. The skilled person will appreciatethat there are other ways to check whether all NFC devices of a givensequence have been read. Furthermore, the skilled person will appreciatethat the phrase “reading the NFC device” may in the present context beinterpreted broadly. For example, it may suffice that the NFC reader 300is able to identify an NFC device in its proximity and retrieve only thesequence-specific data relevant for executing a particular function fromit. Thus, reading the NFC device does not mean that the whole contentsof the NFC device's memory must or can be read. It is conceivable, forexample, that an error condition occurs when the NFC reader 300 attemptsto read some parts of the NFC device's memory, while it is stillpossible to retrieve the relevant sequence-specific data. In that case,the condition that the NFC device is read is also deemed to befulfilled,

In one or more embodiments, the processing unit 304 is configured andadapted to execute the function only if the devices of the sequence havebeen read in a predefined order. The use of ordered sequences mayincrease the threshold for unlocking some functions, for example. Inorder to further increase this threshold, the function may be madetime-dependent in the manner described above. More specifically, theprocessing unit 304 may be configured and adapted to execute saidfunction only if the time elapsed between reading particular ones of thedevices of a sequence does not exceed a predefined threshold.Alternatively or in addition, the processing unit 304 may be configuredand adapted to execute said function only if at least one of saiddevices has been read before a predefined expiry time. The processingunit 304 may use timing attribute values read from the devices in orderto determine which timing requirements apply to particular devices ofthe sequence.

FIG. 4 shows an illustrative embodiment of an NFC system 400. The NFCsystem 400 comprises an NFC reader 300 of the kind set forth and aplurality of NFC devices 100 of the kind set forth. In this example, theNFC devices 100 form part of an unordered sequence. Thus, the NFC reader300 will execute a function associated with said sequence provided thatall NFC devices 100 of the sequence have been read, regardless of theorder in which the NFC devices 100 have been read.

FIG. 5 shows another illustrative embodiment of an NFC system 500. TheNFC system 500 comprises an NFC reader 300 of the kind set forth and aplurality of NFC devices 100 of the kind set forth. In this example, theNFC devices 100 form part of an ordered sequence. Thus, the NFC reader300 will execute a function associated with said sequence provided thatall NFC devices 100 of the sequence have been read in a specific,predefined order. In the shown example, the middle NFC device 100 shouldbe read first, then the upper NFC device 100 should be read, then thelower NFC device 100 should be read. The storage unit of each NFC device100 may store a sequence order attribute which enables that the NFCreader 300 quickly checks if the NFC devices 100 are read in the correctorder. Alternatively, the order information may be kept in the memory ofthe NFC reader 300, for example in a table which contains, for eachsequence identified by a sequence identifier, at least two tuples of theform <<tag UID, position>>. It is noted that the order information neednot necessarily be kept in the NFC reader 300; it can for instance alsobe kept in a back-end database which is linked to the NFC reader 300.

FIG. 6 shows a further illustrative embodiment of an NFC system 600. TheNFC system 500 comprises an NFC reader 300 of the kind set forth and aplurality of NFC devices 100 of the kind set forth. In this example, theNFC devices 100 are read in sequence as part of a user authenticationprocedure, for example in order to enable user access to the NFC reader300. The NFC reader 300 may for example collect authentication keyfragments from the NFC devices 100 in three subsequent authenticationssteps, assemble the key fragments into a complete authentication key andexecute an authentication algorithm that takes the assembledauthentication key as input. The NFC reader 300 may enable user accessto itself in dependence on an output of the authentication algorithm.This provides a convenient yet effective way to unlock the NFC reader300. It is noted that the authentication algorithm may be regarded as aparticular instance of a function of the kind set forth. Thus, the NFCreader 300 may perform a sequence-specific authentication function bymeans of which it unlocks itself in response to a correct authenticationinput.

The devices, methods and systems described herein may be used toadvantage in various environments and contexts. For example, a productmanufacturer could manufacture a number of goods equipped with NFC tags,and each of them when bought in a set can form a sequence, and thusbuying such a sequence can entail you for certain benefits, such asdiscounts and loyalty points. Similar benefits could be offered by inshopping malls or by retail outlets. When a user buys a particular setof DVD/CD's, for example, each having NFC tags that form part of asequence, the user may be able to unlock a bonus feature by tapping eachNFC tag to an NFC reader embedded in a DVD/CD player. Other applicationsmay be envisaged as well: for instance, tapping an air-conditionerremote control after tapping a health monitor device could automaticallytune an air-conditioning device. Furthermore, using a sequencedauthentication mechanism based on NFC devices, a home-security oroffice-security system can be improved and customized. Morespecifically, the threshold for accessing certain areas can be increasedby requiring tapping a sequence of tags instead of stand-alone orindividual tags. This threshold may be further increased by requiringtapping said tags in a predefined order. Applications in tourism andgaming are conceivable as well.

The systems and methods described herein may be embodied by a computerprogram or a plurality of computer programs, which may exist in avariety of forms both active and inactive in a single computer system oracross multiple computer systems. For example, they may exist assoftware program(s) comprised of program instructions in source code,object code, executable code or other formats for performing some of thesteps. Any of the above may be embodied on a computer-readable medium,which may include storage devices and signals, in compressed oruncompressed form.

As used herein, the term “mobile device” refers to any type of portableelectronic device, including a cellular telephone, a Personal DigitalAssistant (PDA), smartphone, tablet etc. Furthermore, the term“computer” refers to any electronic device comprising a processor, suchas a general-purpose central processing unit (CPU), a specific-purposeprocessor or a microcontroller. A computer is capable of receiving data(an input), of performing a sequence of predetermined operationsthereupon, and of producing thereby a result in the form of informationor signals (an output). Depending on the context, the term “computer”will mean either a processor in particular or more generally a processorin association with an assemblage of interrelated elements containedwithin a single case or housing.

The term “processor” refers to a data processing circuit that may be amicroprocessor, a co-processor, a microcontroller, a microcomputer, acentral processing unit, a field programmable gate array (FPGA), aprogrammable logic circuit, and/or any circuit that manipulates signals(analog or digital) based on operational instructions that are stored ina memory. The term “storage unit” or “memory” refers to a storagecircuit or multiple storage circuits such as read-only memory, randomaccess memory, volatile memory, non-volatile memory, static memory,dynamic memory, Flash memory, cache memory, and/or any circuit thatstores digital information.

As used herein, a “computer-readable medium” or “storage medium” may beany means that can contain, store, communicate, propagate, or transporta computer program for use by or in connection with the instructionexecution system, apparatus, or device. The computer-readable medium maybe, for example but not limited to, an electronic, magnetic, optical,electromagnetic, infrared, or semiconductor system, apparatus, device,or propagation medium. More specific examples (non-exhaustive list) ofthe computer-readable medium may include the following: an electricalconnection having one or more wires, a portable computer diskette, arandom access memory (RAM), a read-only memory (ROM), an erasableprogrammable read-only memory (EPROM or Flash memory), an optical fiber,a portable compact disc read-only memory (CDROM), a digital versatiledisc (DVD), a Blu-ray disc (BD), and a memory card.

It is noted that the embodiments above have been described withreference to different subject-matters. In particular, some embodimentsmay have been described with reference to method-type claims whereasother embodiments may have been described with reference toapparatus-type claims. However, a person skilled in the art will gatherfrom the above that, unless otherwise indicated, in addition to anycombination of features belonging to one type of subject-matter also anycombination of features relating to different subject-matters, inparticular a combination of features of the method-type claims andfeatures of the apparatus-type claims, is considered to be disclosedwith this document.

Furthermore, it is noted that the drawings are schematic. In differentdrawings, similar or identical elements are provided with the samereference signs. Furthermore, it is noted that in an effort to provide aconcise description of the illustrative embodiments, implementationdetails which fall into the customary practice of the skilled person maynot have been described. It should be appreciated that in thedevelopment of any such implementation, as in any engineering or designproject, numerous implementation-specific decisions must be made inorder to achieve the developers' specific goals, such as compliance withsystem-related and business-related constraints, which may vary from oneimplementation to another. Moreover, it should be appreciated that sucha development effort might be complex and time consuming, but wouldnevertheless be a routine undertaking of design, fabrication, andmanufacture for those of ordinary skill.

Finally, it is noted that the skilled person will be able to design manyalternative embodiments without departing from the scope of the appendedclaims. In the claims, any reference sign placed between parenthesesshall not be construed as limiting the claim. The word “comprise(s)” or“comprising” does not exclude the presence of elements or steps otherthan those listed in a claim. The word “a” or “an” preceding an elementdoes not exclude the presence of a plurality of such elements. Measuresrecited in the claims may be implemented by means of hardware comprisingseveral distinct elements and/or by means of a suitably programmedprocessor. In a device claim enumerating several means, several of thesemeans may be embodied by one and the same item of hardware. The merefact that certain measures are recited in mutually different dependentclaims does not indicate that a combination of these measures cannot beused to advantage.

LIST OF REFERENCE SIGNS

-   100 NFC device-   102 storage unit-   200 content of storage unit-   300 NFC reader-   302 NFC unit-   304 processing unit-   400 NFC system-   500 NFC system-   600 NFC system

1. A near field communication device comprising a storage unit, whereinsaid storage unit is configured and adapted to store sequence-specificdata relating to at least one sequence of devices of which said nearfield communication device forms part.
 2. A near field communicationdevice as claimed in claim 1, wherein the sequence-specific datacomprise a sequence identifier attribute which identifies the sequenceof devices.
 3. A near field communication device as claimed in claim 1,wherein the sequence of devices is an ordered sequence, and wherein thesequence-specific data comprise a sequence order attribute whichspecifies a position of the near field communication device in saidordered sequence.
 4. A near field communication device as claimed inclaim 1, wherein the sequence-specific data comprise a functionattribute which enables, at least in part, an external near fieldcommunication reader to execute a function associated with the sequenceof devices.
 5. A near field communication device as claimed in claim 4,wherein the function attribute comprises authentication data whichenable said near field communication reader to perform an authenticationalgorithm that takes said authentication data as an input.
 6. A nearfield communication device as claimed in claim 5, wherein theauthentication data comprise at least a part of a cryptographic key. 7.A near field communication device as claimed in claim 1, wherein thesequence-specific data comprise a timing attribute which specifies atiming requirement associated with said function.
 8. A near fieldcommunication device as claimed in claim 1, being a near fieldcommunication tag.
 9. A method for configuring a near fieldcommunication device, comprising storing, in a storage unit of said nearfield communication device, sequence-specific data relating to at leastone sequence of devices of which said near field communication deviceforms part.
 10. A near field communication reader comprising: a nearfield communication unit which is configured and adapted to read atleast one sequence of devices; and a processing unit which is configuredand adapted to execute a function associated with said sequence only ifall devices of said sequence have been read.
 11. A near fieldcommunication reader as claimed in claim 10, wherein the processing unitis configured and adapted to execute said function only if the devicesof said sequence have been read in a predefined order.
 12. A near fieldcommunication reader as claimed in claim 10, wherein the processing unitis configured and adapted to execute said function only if the timeelapsed between reading particular ones of said devices does not exceeda predefined threshold and/or only if at least one of said devices hasbeen read before a predefined expiry time.
 13. A near fieldcommunication reader as claimed in claim 10, wherein the function is anauthentication algorithm that takes authentication data retrieved fromsaid devices as input, and wherein the processing unit is furtherconfigured and adapted to enable user access to the near fieldcommunication reader in dependence on an output of said authenticationalgorithm.
 14. A method for facilitating the execution of functions,comprising: reading, by a near field communication unit comprised in anear field communication reader, at least one sequence of devices; andexecuting, by a processing unit comprised in said near fieldcommunication reader, a function associated with said sequence only ifall devices of said sequence have been read.
 15. A non-transitorycomputer program product comprising instructions which, when beingexecuting by a processing unit, cause said processing unit to carry outa method as claimed in claim 9.