Electronic payments — and — emerging technologies peter honeyman center for information technology integration.

Slides:



Advertisements
Similar presentations
A Link to the Future Where is Education Going with Technology?
Advertisements

Voice and Data Encryption over mobile networks July 2012 IN-NOVA TECNOLOGIC IN-ARG SA MESH VOIP.
Creating HIPAA-Compliant Medical Data Applications with Amazon Web Services Presented by, Tulika Srivastava Purdue University.
A Survey on Dual Interface and Multi Technology Cards ICMA – EXPO 2004 Prague, 17th – 20th October Presented by: Thies Janczek.
1 GP Confidential © GlobalPlatform’s Value Proposition for Mobile Point of Sale (mPOS)
Computer Security Biometric authentication Based on a talk by Dr J.J. Atick, Identix, “Biometrics in the Decade of Security”, CNSS 2003.
What is Biometrics?  Biometrics is referred as an authentication system that measures the physiological and individual characteristics of a human being.
UMTS / 3G Wireless ENGR 475 – Telecommunications November 7, 2006 Harding University Jonathan White.
Mobile Payments Index: Introduction Technologies Payment methods
Principles and Learning Objectives
1 A study on Location Aware Computing Presenter : Narendiran Visvanathan Instructor : Dr. Chin-Chih Chang Course : CS 898T Mobile and Wireless Networks.
An Analysis of The Mobile Market and Location-Based Services What About Wireless…?
Biometrics and Authentication Shivani Kirubanandan.
Smart Card Development in Hong Kong SIMmate 2000 Product Launch 28 November 2000 Dr LM Cheng Director Smart Card Design Center Dept. of Electronic Engineering.
Biometrics: Identity Verification in a Networked World
Restricted © Siemens AG 2013 All rights reserved.siemens.com/answers Multifactor Iris Recognition Biometric Reader.
Mobile Computer Communication Services Daytime Organizer.
Online Game JAVA for PDA WAP for Mobile Phone. Java for PDA  Hardware limit - Java API Power Memory  JDK 2M byte. Connectivity Display size.
Security systems need to be able to distinguish the “white hats” from the “black hats”. This all begins with identity. What are some common identifiers.
InterSwyft Technology presentation. Introduction InterSwyft brings secured encrypted transmission of SMS messages for internal and external devices such.
National Smartcard Project Work Package 8 – Security Issues Report.
WELCOME TO THE SEMINAR ON Money Pad, The Future Wallet
Contribution since August,2008 National MSME Conclave 19 November, 2014 Use of ICT to make MSME more competitive and sustainable Tapan K. Patra Director.
BANK IN A BOX Baku, Azerbaijan October 2012.
Copyright ARC Group 2000 September 2000Regina Wong- GSM Congress Asia Pacific Wireless Internet: Market Trends and Strategies Regina Wong Consultant.
0 Electronic banking news 1 Agenda Internet banking Dialog B-mail Mobil banking Daily account statements via i:expert i:deposit i:key.
Information Assurance... Smart Card Interoperability Steve Haynes Phone
DECT Data Applications Contents DECT Data Application Scenarios DECT Data Interoperability DECT Data Standards DECT Data Trends Conclusions.
Smart Card Application. Smart-card is a plastic card, the size of a standard credit card, with one or several integrated circuits (chips) capable to store.
Mobile data. Introduction Wireless (cellular) communications has experienced a tremendous growth in this decade. Most of the wireless users also access.
Mobile Terminals WAP, WML and Bluetooth Edoardo Berera University of Nice Sophia Antipolis Telelinea 26 September 2001 Seminar on Electronic Commerce
©2013 Cengage Learning. All Rights Reserved. Business Management, 13e Technology and Information Management Electronic Technology Fundamentals.
Wireless Technology An Entrepreneurial View Michael Hathaway Venture Partner, Austin Ventures.
Securing Electronic Transactions University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Lecture 31 Electronic Business (MGT-485). Review of Lecture
Public Key Infrastructures and mCommerce Baltimore’s offerings for wireless technologies.
» Jun 9, 2003 Speaker Verification Secure AND Efficient, Deployments in Finance and Banking Jonathan Moav Director of Marketing
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Cisco Secure Mobile Banking Enabling the Collaborative Customer Experience.
The Digital Revolution and The Global E-Marketplace Chapter 25 Matakuliah: J0474 International Marketing Tahun: 2009.
Chapter 7 Mobile Commerce— The Business of Time
A security framework combining access control and trust management for mobile e-commerce applications Gregor v.Bochmann, Zhen Zhang, Carlisle Adams School.
Seamless Mobility: Michael Wehrs Director of Technology & Standards Mobile Device Division, Microsoft Corp. Wireless Software Innovations Spurring User.
FOREWORD By: Howard Shrobe MIT CS & AI Laboratory
Lecture 7 Page 1 CS 236, Spring 2008 Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know.
BIOMETRICS FOR RECOGNITION. Presentation Outlines  Traditional methods of security  Need for biometrics  Biometrics recognition techniques  How biometrics.
Smart Cards by Mahadev Karadigudda. * Introduction * How smart cards assist in enhancing security * Security vulnerabilities * Conclusion.
Traditional Security Issues Confidentiality –Prevent unauthorized access or reading of information Integrity –Insure that writing or operations are allowed.
Private Information Protection based on User-Trusted Program Institute of Systems and Information Engineering/KYUSHU Ken ’ ichi Takahashi.
Wireless Telecommunications Networks personal area network (PAN) A wireless telecommunications network for device-to-device connections within a very short.
Payment and Wireless Technologies. Engineering Services. July 2015.
CISC 849 : Applications in Fintech Cybersecurity in Banking.
WebGiro Key Note at: 1 Copyright © WebGiro AB all rights reserved Europe ECSB Meeting Christofer Friberg – Vice President, Sales &
Networking Network Classification, by there: 3 Security And Communications software.
Biometric Technology Jordan Seaton CIS 320 WKU. Essay Questions Which industries would find biometric technology the most useful? Why?
INGRID SVENDSEN, SIMEN KINDEM & THEA TOFTHAGEN Financial Services Banking & Stocks.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
BOPS – Biometric Open Protocol Standard Emilio J. Sanchez-Sierra.
What does it mean to us?.  History  Biometrics Defined  Modern Day Applications  Spoofing  Future of Biometrics.
Electronic Banking & Security Electronic Banking & Security.
Biometric ATM Created by:. Introduction Biometrics refers to the automatic identification of a person based on his physiological/behavioral characteristics.
An Introduction to Biometrics
The technology behind the USPS EPM. AND COMPLIANCE March 25, 2004 Adam Hoffman.
Follow-up of Prof. Honeyman’s lecture, by Galina Schwartz U of M Business School My comments are in italics, and underlined. They are at the end of almost.
Chapter 5 – E-commerce and Enterprise Systems
AGENDA Introduction Kind of information smart card contain
Challenge/Response Authentication
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
موضوع پروژه : تشخیص هویت بر اساس اثر انگشت
Presentation transcript:

electronic payments — and — emerging technologies peter honeyman center for information technology integration

problem statement u risk management u elevate trustworthiness of electronic payments to “card present” status u simple, practical, inexpensive

emerging technologies u computing: moore’s law dictating faster and smaller computers at a constant price u smartcards are the ultimate mobile computer u communications u ubiquitous internet u wireless data communications u biometric identification

smartcards u tamper resistant u secure key storage and management u “personal cryptography assistant”

how can smartcards be applied? u secure identification u trust platform u to do: solve the infrastructure problem

what is this? u  u a mobile phone? NO! u portable, disposable smartcard reader u solves the infrastructure problem

emerging communications technologies u gsm u europe now, n. america coming on line u europe: gprs, umts u japan: i-mode u cdpd u n. america now, will fade from the scene u n.a. telecoms don’t “get it” u wap u and other futile efforts to occupy this space

the convergence u pda + mobile phone + bluetooth + smartcard u offers opportunity for secure, authenticated payments

biometrics u goal: personal identification u fingerprint u faceprint u retina or iris scan u voice recognition u questionable technical foundation to date u secrecy abounds

biometrics? u revocation is difficult u fingerprints and other durable identifiers u spoofing is easy u fingerprint u voice recognition u compare to present biometric identification u signature on paper u demeanor of customer

multi-factor identification u combination of methods u secure crypto platform u biometrics, possibly more than one u can this offer risk management comparable to “card present” transaction? u maybe u “data collection yields to pattern recognition” -- m. mcluhan

promoting (and preventing) competition u the wap re-intermediators u wap must die u internet protocol will be the instrument of its death! u open systems u has huge advantages in risk management u gsm protocols u french bank card u aes (des replacement)

next steps u explosive growth in internet deployment application space will continue unabated u it will continue to accelerate! u this provides fertile ground for innovation, development, and deployment  Subject: MAKE MONEY FAST u €omputing + €ommuni€ation$

thank you for your attention