Feeds

Three complains to Brussels over NFC exclusion

We want in to the bonk-n-bleep alliance

High performance access to file storage

The UK's smallest operator, Three, has launched a preemptive strike against the NFC gang of three which was announced in June, claiming its exclusion is competitively motivated.

The alleged cartel, which still lacks a name, is jointly owned by Everything Everywhere, Telefonica UK and Vodafone, and is intended to create a standard platform for the delivery of NFC-based advertising. The joint venture hasn't applied for regulatory approval yet, though it will have to soon, so Three's representation to the European Commission preempts that application.

The venture was announced in June, but despite being billed as a cross-operator initiative, Three's CEO says he didn't even hear of the deal until half an hour before it went public. The other operators say Three is welcome to sign up, just as Facebook or Skype is welcome to sign up, but only as a customer of the service, not an owner.

The single-platform plan is a good one: operators sensibly abandoning their dreams of raking a percentage of every electronic transaction, and instead ensuring that they get control over the electronic coupons and location-based advertising that NFC makes possible.

Those opportunities are significant as the secure element inherent in the Near Field Communications standard makes distribution (and use) of loyalty points and promotional vouchers possible, and it's not a business already dominated by Visa, Mastercard and their ilk.

Companies planning to use such things will want to deal with a single entity, so they can launch an electronic loyalty card and have it work on every NFC phone regardless of the network operator (and able to transition between network operators). That's what the joint venture is intended to provide, though without Three it lacks critical ubiquity.

Three reckons this is a deliberate move to stifle a growing competitor who is starting to take customers from its bigger rivals. The other operators say Three has never shown significant interest in NFC and their race to market would be delayed by including another company in the ownership structure.

The venture will need regulatory approval, and Three's arguments are pretty compelling. If a joint venture can't offer cross-network compatibility then it will simply fall to Apple and/or Google to provide the services on which the operators can't agree, and not for the first time. ®

High performance access to file storage

More from The Register

next story
Broadband Secretary of SHEEP sensationally quits Cabinet
Maria Miller finally resigns over expenses row
Skype pimps pro-level broadcast service
Playing Cat and Mouse with the media
Beat it, freetards! Dyn to shut down no-cost dynamic DNS next month
... but don't worry, charter members, you're still in 'for life'
Like Google, Comcast might roll its own mobile voice network
Says anything's possible if regulators approve merger with Time Warner
EE dismisses DATA-BURNING glitch with Orange Mail app
Bug quietly slurps PAYG credit - yet EE denies it exists
Turnbull leaves Australia's broadband blackspots in the dark
New Statement of Expectations to NBN Co offers get-out clauses for blackspot builds
Facebook claims 100 MEEELLION active users in India
Who needs China when you've got the next billion in your sights?
Facebook splats in-app chat, whacks brats into crack yakety-yak app
Jibber-jabbering addicts turfed out just as Zuck warned
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.