LU Chenglong ( ) DIAO Wenrui ( )

Slides:



Advertisements
Similar presentations
Department of IT, American University in Dubai UAE Mobile Phone Market Mobile phone infrastructure has grown exponentially over the past few years to cover.
Advertisements

Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Security Controls and Systems in E-Commerce
Michal Bodlák. Referred to as mobile money, mobile money transfer, and mobile wallet generally refer to payment services operated under financial regulation.
M-PAYMENT SYSTEM (e–WALLET ).
The GSMA July 2014 Restricted - Confidential Information
Direct Response Forum – Basel, 25./
Internet Payment Mechanisms Group 0229 Brad Boles Larry Solomon Linda Watson Li Su Scott Way Eva Thomas.
1 Secure Credit Card Transactions on an Untrusted Channel Source: Information Sciences in review Presenter: Tsuei-Hung Sun ( 孫翠鴻 ) Date: 2010/9/24.
1 Pertemuan 12 Authentication, Encryption, Digital Payments, and Digital Money Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi:
Chapter 13 Paying Via The Net. Agenda Digital Payment Requirements Fraud Detection Online Payment Methods Online Payment Types The Future Payment.
The M-Pesa Payment Platform FDCF project (DFID) An Introduction Nick Hughes November 2005.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Near Field Communication By Van Logan HTM 304. What is Near Field Communication Short range wireless communication technology between electronic devices.
Mexico´s financial reform objectives and current regulations in payment services February 11 th, 2015.
Chapter 11 Electronic Commerce Payment Systems. Learning Objectives 1.Describe the situations where micropayments are used and alternative ways to handle.
Pay As You Go – Associating Costs with Jini Leases By: Peer Hasselmeyer and Markus Schumacher Presented By: Nathan Balon.
8/14/2015 SMS Exchange: Mobile credits as an electronic payment channel. Case of RWANDA Jean Pierre NSHIMIYIMANA Rwanda Utilities Regulatory Agency & Independent.
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
Public Key Infrastructure Ammar Hasayen ….
Secure Electronic Transactions (SET). SET SET is an encryption and security specification designed to protect credit card transactions on the Internet.
InterSwyft Technology presentation. Introduction InterSwyft brings secured encrypted transmission of SMS messages for internal and external devices such.
Digital Certificates Public Key Deception Digital Certificates Certificate Authorities Public Key Infrastructures (PKIs)
Mobile Identity and Mobile Authentication (mobile e-signature) Valdis Janovs Sales Director Lattelecom Technology SIA.
Chapter 3 Mohammad Fozlul Haque Bhuiyan Assistant Professor CITI Jahangirnagar University.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
BANK IN A BOX Baku, Azerbaijan October 2012.
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
ITEC0722: Mobile Business and Implementation: Mobile Payment and Security Suronapee Phoomvuthisarn, Ph.D.
LEVERAGING UICC WITH OPEN MOBILE API FOR SECURE APPLICATIONS AND SERVICES Ran Zhou 1 9/3/2015.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
EUROCON “Computer as a Tool”, Belgrade, 24 th November 2005 (1) Paul Killoran EUROCON 2005 Paul Killoran, Fearghal Morgan & Michael Schukat National.
Secure Electronic Transaction (SET)
Copyright © 2007 Pearson Education, Inc. Slide 6-1 E-commerce Kenneth C. Laudon Carol Guercio Traver business. technology. society. Third Edition.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Electronic Payments E-payment methods –Credit cards –Electronic funds transfer (EFT) –E-payments Smart cards Digital cash and script Digital checks E-billing.
Network Security Lecture 26 Presented by: Dr. Munam Ali Shah.
·
E-commerce What are the relationships among: – Client (i.e. you) – Server – Bank – Certification authority Other things to consider: – How to set up your.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Cisco Secure Mobile Banking Enabling the Collaborative Customer Experience.
Logo Add Your Company Slogan China Financial Certification Authority Third-party certification authority Team 13 :吉露露、吴莹莹、潘韦韦 ( CFCA )
Security Protocols and E-commerce University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Chapter 18: Doing Business on the Internet Business Data Communications, 4e.
Chapter 18: Doing Business on the Internet Business Data Communications, 4e.
THE MOBILE CHANNEL IN FINANCIAL SERVICES TARIK HUSAIN BUSINESS DEVELOPMENT DIRECTOR ASIAN BANKER SUMMIT APRIL 2011.
Key Management. Session and Interchange Keys  Key management – distribution of cryptographic keys, mechanisms used to bind an identity to a key, and.
Chapter 4 E-commerce Security and Payment.
Team 13 Prathibha and Shrimi 11/12/13 Mobile Credit Card Processing.
A Generalized Effectuate Strategy for Mash-up Mobile Circumstances A Generalized Effectuate Strategy for Mash-up Mobile Circumstances Project Guide M.J.Jeyasheela.
Network Security Lecture 27 Presented by: Dr. Munam Ali Shah.
Framework for combating Importation, Supply and Use of Counterfeit/substandard terminals in EACO member states Presenter Mwende Njiraini Communications.
Interoperability: A Synopsis of Pakistan’s Experience
Module 7 – SET SET predecessors iKP, STT, SEPP. iKP Developed by IBM Three parties are involved - Customer, Merchant, and Acquirer Uses public key cryptography,
Vijay V Vijayakumar.  Implementations  Server Side Security  Transmission Security  Client Side Security  ATM’s.
Electronic Banking & Security Electronic Banking & Security.
MOBILE PAYMENTS (“M-PAYMENTS”) August 2007 Potential impact on South African banking industry Team Galahad Lionel Diakanyo Joshua Makgate Sean Rule.
Abiodun Ogunlabi Senior Manager, VAS, Content & Data MTN Nigeria Mobile Payments; A Telco’s Perspective.
The Contractual Regime of PayPal and Electronic Payments Irene Kull ETAg funding, project 9301.
Electronic Payments Revolution Hemant Adarkar Sachin Mandhare ASET colloquium May 13, 2016.
PAYMENT GATEWAY Presented by SHUJA ASHRAF SHAH ENROLL: 4471
KrypC Technologies Accelerated Blockchain Adoption.
Secure Electronic Transaction
Mobile Payment Protocol 3D by Using Cloud Messaging
Secure Electronic Transaction (SET) University of Windsor
E-Commerce for Developing Countries (EC-DC)
Secure Electronic Transactions (SET)
Brief Discussion on Payment & Settlement Systems in Bangladesh
Electronic Payment Security Technologies
Presentation transcript:

LU Chenglong (1010161750) DIAO Wenrui (1010089510) A Journey through Mobile Payment from the Technology and Business Perspectives LU Chenglong (1010161750) DIAO Wenrui (1010089510) ELCT 5820 Distributed and Mobile Systems

Outline Part I: Introduction Part II: General framework Part III: System platforms Part IV: Security issues Part V: Business models

Introduction The payment for goods and services using a mobile device Alternative payment method to cash and credit cards Services Digital contents Physical goods Transport fare Bills Music Videos Books Tickets Current situation Widely deployed in many regions of Asia and Europe Around 100 million active users in the world

Participators of Mobile Payment Customer -mobile phone user Merchant -provides goods or services Payment Service Provider - responsible for the payment process Trusted Third Party -provides the service certificate

General framework A simple conceptual model with four major participators

Platforms Based on Different Channels Short Message Service (SMS)

Platforms Based on Different Channels Unstructured Supplementary Services Date (USSD)

Platforms Based on Different Channels GPRS/UMTS

Platforms Based on Applications Phone-based Application

Platforms Based on Applications SIM-based Application

Platforms Based on NFC Near Field Communication

Five Aspects of Security for M-Payment Confidentiality -Transmission data encryption Authentication -Possession, knowledge and property Integrity -Digital signatures Authorization -Digital certificates Non-repudiation -Digital signatures

Security Challenges Security of Mobile Devices Security of Network Technologies Security of Service -SMS -USSD -Voice-based Standardization

Business model: Operator-Centric Model Mobile network operator deploys mobile payment service independently Lack of connection with existing payment networks

Business model: Bank-Centric Model Bank responsible for deployment Payments processed through existing financial networks Clear value chain, easy to implement Transaction fees charged only by the banks

Business model: Peer-to-Peer Model Independent peer-to-peer service provider Revenue from transaction fees and licensing fees Not utilizing existing banking networks Insufficient customer base, lack of established brand and infrastructure

Business model: Collaboration Model Collaboration among different stakeholders Third party Trusted Service Manager Most feasible: each stakeholder focus on own core competency Dispute about the revenue sharing model

Thank you for your participation THE END Thank you for your participation Q & A