2015 All rights reserved
|
|
- Rosamond Hood
- 7 years ago
- Views:
Transcription
1
2 CONTENTS Blockchain Digital Currencies Digital Identity Omni-channel Contactless Payments Wearable Payments
3 Blockchain What is blockchain? Blockchain is a secure transaction ledger database. The ledger is decentralized, shared by all participants. It is created on top of a distributed network of computers. Blockchain acts as the ledger recording all information related to transactions that occur within its network. The decentralized database maintains a history of every exchange ever made and bases the trust on participants rather than third parties. In its essence, Blockchain is programmable value. How it works Blockchain enables anonymous exchange of digital value. The technology removes the need for a central authority for trust verification and value transfer. Being decentralized, it enables safe, fast, cost effective transactions even though parties may not know who they are dealing with. As entities transact within a Blockchain environment, a public record of all transactions is generated and maintained. Computers verify transactions based on complex algorithms to perform the value transfer and update the ledger history. Blockchain usage examples: Digital currencies Crowd funding Smart agreements (automated agreement execution) Digital identity Decentralized communication Asset ownership
4 Key Concepts Decentralized consensus; The blockchain; Smart contracts; Trusted computing (or trustless transactions): Proof of work (and proof of stake). Read more about each concept here.
5 Digital Currencies Digital, Virtual and Crypto Currencies Digital currencies are created and stored electronically. Virtual currencies are unregulated digital money. They are issued and controlled by its developers and are used by the members of a virtual community. Crypto currencies are a subset of digital currencies, using cryptography as part of their security. The structure of crypto currencies Digital and crypto currencies are structured as a payment network. They are created on top of block chain technology allowing parties to move value digitally, securely and quickly in a decentralized manner. Digital Currency Market Capitalization: Digital currencies Crowd funding What is Bitcoin? Bitcoin is the most known crypto currency, and is a consensus network that enables a new payment system, and a full scheme for digital money. It is the first decentralized peer-to-peer payment network, powered by its users and having no central authority. Bitcoin is considered to become the gold standard for virtual money. To date, it is used as a cash system for Internet financial transactions. Smart agreements (automated agreement execution) Digital identity Decentralized communication Asset ownership
6 How does Bitcoin work? The Bitcoin network is based on the "block chain" technology and uses the public ledger database. Bitcoin ledger contains every transaction ever processed, allowing a user's computer to verify the validity of each transaction. The authenticity of each transaction is protected by digital signatures corresponding to the sending addresses, allowing all users to have full control over sending Bitcoins from their own Bitcoin addresses.
7 Digital Identity What is it? Digital Identity is the data that uniquely describes a person / entity and contains information about the subject s relationship. Technically it is a network used for identification in connections or transactions from digital devices. Trusting the link between a real identity and a digital identity first requires someone to validate the identity, or in other words, to prove you are who you say you are. The more valuable the digital identity, the more work required to validate it and establish secure authentication. Key components The strength level of a digital identity given by: registration and authentication process. Registration is the how an entity becomes known in a domain, while authentication verifies the attributes associated with identity. Digital identity is based on: Identity Verification; Personal Data; Authentication. A strong security process for verifying an identity is based on knowledge (e.g. passwords), possession (e.g. digipass) and/or the person itself (e.g. biometrics). Digital Identity use cases: Retail banking Consumer finance Healthcare B2B Agreements High value commerce
8 Facts More than 900 million consumer records compromised in Verizon's Data Breach Investigations Report shows weak or stolen login credentials account for more than 76% of analyzed breaches.
9 Omni-channel What is Omni-channel? Omni-channel is a synchronized customer communication strategy. All channels are aligned in a single touch point for the customer and present one consistent way of doing business. Omni-channel banking is a consistent cross-channel experience, aiming to provide customers seamless access to financial products and services. 2 Major principles: Centrally manage execution across all channels consistently, reducing cost and time to market; Measure and consolidate data across all channels to determine which combinations of channels and interactions have the biggest attribution to the bottom-line (increasing conversion rates and revenue). Top Omni-channel concepts in finance industry: Specialty branch Virtual banking Infomediary Key Elements of Omni-channel strategy: Consistent services access across all channels; 360 degree view of every customers; Digital management of origination; Reengineer the way you listen: listen everywhere, at once, and respond immediately; Increase understanding of customers with analytics and take data driven decisions.
10 4 Pillars for Omni-channel banking: New branch; Mobile enabled; Social aware; Video connected. Recommended presentation
11 Contactless Payments Definition Contactless payment technology enables payment transactions via a contactless chip embedded in payment cards, tags, key fobs and mobile phones. The chip communicates with a reader device that uses radio frequency or Near Field Communication (NFC) standards. It includes radio frequency identification (RFID) as part of a machine-to-machine communications trend. (Gartner) Technology Near Field Communication (NFC) is a short-range wireless (RF) communication technology for smartphones and similar devices enabling data transfer between the devices. NFC operates for contactless payments in card emulation mode, which enables devices to function as contactless smart cards. Host card emulation (HCE) enables NFC devices to perform contactless transactions in card emulation mode when the payment, other credentials and related card applications are stored somewhere other than on the hardware itself. Top contactless use cases: HORECA Retail Fashion Public transport
12 Facts 150M mobile devices will be contactless in coming years; Worldwide NFC-capable POS terminals installed base is 21.4 million units, reaching 74.9 million by the end of 2019; 9.5 million NFC-capable POS terminals were shipped globally in 2014; MasterCard announced it is establishing contactless acceptance as standard by 2020 for merchants accepting MasterCard and Maestro in Europe.
13 Wearable payments What are wearable devices? Wearable describes electronic devices that can be worn on the body. They can be found today as intelligent fitness bands and smart watches, or glasses, but are being extended into fashion and jewelry as well. How do wearable payments work? Wearables enable contactless payment processes through Near Field Communication (NFC). The wearable device communicates directly to the network through inbuilt connectivity or can use Bluetooth to connect to the user s phone to finalize the payment. Host card emulation (HCE) technology is used when it comes to the wearable device connecting to the mobile for finalizing payment. Wearables can enable biometrics and geo-location as security components in the payment process. Devices can step away from just fingerprints, and enable pulse patterns and build a unique cardiac rhythm for authentication. 3 Use cases for wearable payments: Loyalty schemes Authentication B2B Commerce Key elements of wearable in payments Development platforms: easy integration; Connected: Wi-Fi, 3G/4G, Bluetooth, NFC; Environment aware: GPS, Camera, Microphone; Biometrics sensors.
14 Examples Disney is using MagicBand, a wearable device preprogrammed to hold room numbers and/or payment mechanisms throughout the park. Starbucks makes transactions possible through Microsoft Band, Samsung s Galaxy Gear or even Pebble. Eaze is pushing the idea of Nod to Pay, using two Bitcoin payment systems and planning to integrate fiat currencies. Recommended presentation
15 Maxcode Deliver your next finance or ehealth application. Maxcode is an IT service company building tailor made applications for the European market. We focus on financial and healthcare industries. Maxcode is located in The Netherlands with offices in Romania, and the Republic of Moldova. We are a modern company and a reliable partner for our customers and employees. Koninginnegracht AB Den Haag / The Hague The Netherlands info@maxcode.net Disclaimer The materials in this document may contain inaccuracies or typographical errors. Maxcode does not warrant the accuracy, reliability or completeness of the materials, advices, opinions, statements or any other information displayed or distributed in this document. All information in this document is provided as is and as available, and shall not be binding nor shall it be construed as constituting any obligation, representation or warranty on the part of Maxcode. You acknowledge that any reliance on any information in this document shall be at your sole risk. Maxcode mentions others, their products and ideas as a convenience to you. Those others, products and ideas are not under the control of Maxcode. Accordingly, Maxcode makes no representation or warranty in relation to others, their products, or ideas, other than simply listing them as relevant for your consideration. By listing them, Maxcode is not endorsing or recommending them to you.
16 Sources: Contactless-Terminals_And-Turning-on-NFC Cover image credit: Sebastiaan ter Burg under c.c. 2.0 (modified).
Internet of Things (IoT): A vision, architectural elements, and future directions
Internet of Things (IoT): A vision, architectural elements, and future directions By IOT Group Salah Amean Ahmmed Saeed Authors: Gubbi, Jayavardhana Buyya, RajkumarMarusic, Slaven Palaniswami, Marimuthu
More informationBest Practices for the Use of RF-Enabled Technology in Identity Management. January 2007. Developed by: Smart Card Alliance Identity Council
Best Practices for the Use of RF-Enabled Technology in Identity Management January 2007 Developed by: Smart Card Alliance Identity Council Best Practices for the Use of RF-Enabled Technology in Identity
More informationTwo-Factor Authentication over Mobile: Simplifying Security and Authentication
SAP Thought Leadership Paper SAP Mobile Services Two-Factor Authentication over Mobile: Simplifying Security and Authentication Controlling Fraud and Validating End Users Easily and Cost-Effectively Table
More informationSignificance of Tokenization in Promoting Cloud Based Secure Elements
Significance of Tokenization in Promoting Cloud Based Secure Elements Busra O zdenizci 1, Vedat Coskun 1*, Kerem Ok 1 and Turgay Karlidere 2 1 NFC Lab - Istanbul, Department of Information Technologies,
More informationFrequently Asked Questions
Frequently Asked Questions NFC for Consumers What is NFC? Near Field Communication (NFC) is a short-range wireless connectivity technology standard designed for intuitive, simple, and safe communication
More informationWearable Technology Evolution & Security: Grant Brown - Security Strategist Symantec
Wearable Technology Evolution & Security: Grant Brown - Security Strategist Symantec 3.58 KM 12.11 KPH 493 Calories 114 BPM WEARABLE TECH EVOLUTION AND SECURITY GRANT BROWN SECURITY STRATEGIST @thegrantbrown
More informationUse Cases for Mobile NFC Meeting Retail
Use Cases for Mobile NFC Meeting Retail, 2012 Neil Garner Founder & CEO Who are Proxama? Enabling Your Mobile Contactless World Proxama is the next generation mobile commerce company that connects the
More informationMobile Near-Field Communications (NFC) Payments
Mobile Near-Field Communications (NFC) Payments OCTOBER 2013 GENERAL INFORMATION American Express continues to develop its infrastructure and capabilities to support growing market interest in mobile payments
More informationHow To Understand The Power Of The Internet Of Things
Next Internet Evolution: Getting Big Data insights from the Internet of Things Internet of things are fast becoming broadly accepted in the world of computing and they should be. Advances in Cloud computing,
More informationCatch all the digital moments
Catch all the digital moments of your customers Driving digital transformation in the banking sector Banking is clearly evolving in a fast-paced and changing ecosystem, either in terms of regulatory compliance
More informationImplementation of biometrics, issues to be solved
ICAO 9th Symposium and Exhibition on MRTDs, Biometrics and Border Security, 22-24 October 2013 Implementation of biometrics, issues to be solved Eugenijus Liubenka, Chairman of the Frontiers / False Documents
More informationPayPass - M/Chip Requirements. 5 December 2011
PayPass - M/Chip Requirements 5 December 2011 Notices Proprietary Rights The information contained in this document is proprietary and confidential to MasterCard International Incorporated, one or more
More informationMOBILE PAYMENT SECURITY: BLE OR NFC
NEW SCIENCE TRANSACTION SECURITY ARTICLE MOBILE PAYMENT SECURITY: BLE OR NFC SUMMER 2014 UL.COM/NEWSCIENCE NEW SCIENCE TRANSACTION SECURITY OVERVIEW From research on the latest electronic transaction security
More informationRF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards January 2007 Developed by: Smart Card Alliance Identity Council RF-Enabled Applications and Technology:
More informationEmerging Trends in the Payment Ecosystem: The Good, the Bad and the Ugly DAN KRAMER
Emerging Trends in the Payment Ecosystem: The Good, the Bad and the Ugly DAN KRAMER SHAZAM, Senior Vice President Agenda The Ugly Fraud The Bad EMV? The Good Tokenization and Other Emerging Payment Options
More information03. Part 03: The Future of Customer Experience in Retail Banking: Wearables, App Stores, Biometrics, & Cryptocurrencies
. Part 0: The Future of Customer Experience in Retail Banking: Wearables, App Stores, Biometrics, & Cryptocurrencies In the final chapter of this series we ll look at some of the most striking technological
More informationWIRECARD FUTURE OF PAYMENTS. MainFirst Insights to Go Web Conference January 22, 2015
WIRECARD FUTURE OF PAYMENTS MainFirst Insights to Go Web Conference January 22, 2015 1. MARKET READINESS FOR MOBILE PAYMENTS IS ACCELERATING NFC: Facts & Figures According to Visa Europe (January 2015),
More informationElectronic Prescribing of Controlled Substances: Establishing a Secure, Auditable Chain of Trust
Electronic Prescribing of Controlled Substances: Establishing a Secure, Auditable Chain of Trust Imprivata Confirm ID and the DEA Interim Final Rule on EPCS Technology requirements to comply with the DEA
More informationStore Logistics and Payment with Near Field Communication
with www.stolpan.com Store Logistics and Payment with Near Field Communication Hagenberg, Hagenberg, March March 20. 2007 20. 2007. Dr. László Kutor, Dr. BMF László Kutor, BMF 19/1 StoLPaN Project Summary
More informationMobile Electronic Payments
Chapter 7 Mobile Electronic Payments 7.1 Rationale and Motivation Mobile electronic payments are rapidly becoming a reality. There is no doubt that users of mobile phones are willing and even asking to
More informationExecutive Summary P 1. ActivIdentity
WHITE PAPER WP Converging Access of IT and Building Resources P 1 Executive Summary To get business done, users must have quick, simple access to the resources they need, when they need them, whether they
More informationMOBILE NEAR-FIELD COMMUNICATIONS (NFC) PAYMENTS
MOBILE NEAR-FIELD COMMUNICATIONS (NFC) PAYMENTS MAY 2013 THESE TECHNOLOGIES ARE BECOMING CONVENIENT AND SIMPLE WAYS TO PAY. Every day merchants seek better ways to grow their business and improve efficiency.
More informationUsing RFID Techniques for a Universal Identification Device
Using RFID Techniques for a Universal Identification Device Roman Zharinov, Ulia Trifonova, Alexey Gorin Saint-Petersburg State University of Aerospace Instrumentation Saint-Petersburg, Russia {roman,
More informationTranform Multi-Factor Authentication from "Something You Have" to "Something You Already Have"
Tranform Multi-Factor Authentication from "Something You Have" to "Something You Already Have" DIGIPASS Embedded Solutions White Paper DIGIPASS Embedded Solutions White Paper Page 1 of 14 2009 VASCO Data
More informationCard Not Present Fraud Webinar Transcript
Card Not Present Fraud Webinar Transcript All right let s go ahead and get things started, and to do that, I d like to turn it over to Fae Ghormley. Fae? Thank you for giving us this opportunity to share
More informationUPCOMING SCHEME CHANGES
UPCOMING SCHEME CHANGES MERCHANTS/PARTNERS/ISO COPY Payvision Ref: Payvision-Upcoming Scheme Changes (v1.0)-march 2016 1 Rights of use: COMPLYING WITH ALL APPLICABLE COPYRIGHT LAWS IS THE RESPONSABILITY
More informationEMV 101: What small businesses need to know
EMV 101: What small businesses need to know DEMETRIOS MARANTIS, Head of Global Policy and Government Affairs OWEN J ENNINGS, Square Business Team June 2015 Cosponsorship Authorization # 15-2050-102. SBA
More informationMobile Financial Services Business Ecosystem Scenarios & Consequences. Summary Document. Edited By. Juha Risikko & Bishwajit Choudhary
Mobile Financial Services Business Ecosystem Scenarios & Consequences Summary Document Edited By Juha Risikko & Bishwajit Choudhary Mobey Forum Mobile Financial Services Ltd. Disclaimer: This document
More informationSHOPPING WITH LESS - MERCHANTS GO CONTACTLESS. globalpaymentsinc.co.uk
SHOPPING WITH LESS - MERCHANTS GO CONTACTLESS globalpaymentsinc.co.uk Page 2 3 FOREWORD Payment technologies have advanced greatly over the last few years and more and more merchants understand the potential
More informationSMART WIRELESS DEVICES & THE INTERNET OF ME
SMART WIRELESS DEVICES & THE INTERNET OF ME Whitepaper www.juniperresearch.com 1 1.1 Introduction Since the conception of the Web, Internet-connected devices have expanded in every conceivable direction,
More informationContactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, 2006. Developed by: Smart Card Alliance Identity Council
Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions July, 2006 Developed by: Smart Card Alliance Identity Council Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked
More informationMobile Driver s License Solution
Mobile Driver s License Solution Secure, convenient and more efficient Improved identity protection through secure mobile driver s licenses The introduction of a mobile driver s license is a huge opportunity
More informationWhat Merchants Need to Know About EMV
Effective November 1, 2014 1. What is EMV? EMV is the global standard for card present payment processing technology and it s coming to the U.S. EMV uses an embedded chip in the card that holds all the
More informationNFC: Enabler for Innovative Mobility and Payment NFC: MOBILIDADE E MEIOS DE PAGAMENTO
NFC: Enabler for Innovative Mobility and Payment Cards Brazil Sao Paulo, April 3rd to 5th 2007 Rodolfo Gomes - 1st Level Customer Application Support NFC&RFID Europe A new Company has reborn Few months
More informationBuilding Trust in a Digital World. Brian Phelps, BSc CISSP Director of Advanced Solutions Group EMEA Thales UK, Ltd.
Building Trust in a Digital World Brian Phelps, BSc CISSP Director of Advanced Solutions Group EMEA Thales UK, Ltd. 2 Global incidents Equivalent of 117,339 incoming attacks per day, everyday Total number
More informationNFC Test Challenges for Mobile Device Developers Presented by: Miguel Angel Guijarro miguel-angel_guijarro@agilent.com
NFC Test Challenges for Mobile Device Developers Presented by: Miguel Angel Guijarro miguel-angel_guijarro@agilent.com 1 Outlook About NFC Developing a NFC Device Test Challenges Test Solutions Q&A 2 What
More informationAccenture Payment Services
Accenture Payment Services Helping banks and other payment service providers to improve business strategy, technology and operational efficiency to transform their business Over 4,000 Payments professionals,
More informationtoast EMV in 2015: How Restaurants Can Prepare for the New Chip-and-Pin Standard
toast EMV in 2015: How Restaurants Can Prepare for the New Chip-and-Pin Standard Table of Contents For more than 40 years, merchants and consumers have used magnetic stripe credit cards and compatible
More informationTraining. MIFARE4Mobile. Public. MobileKnowledge April 2015
MIFARE4Mobile Public MobileKnowledge April 2015 Agenda Why MIFARE4Mobile? MIFARE in Mobile related technologies MIFARE technology NFC technology MIFARE4Mobile technology High level system architecture
More informationMerchant Services Payment Solutions for Your Business
Merchant Services Payment Solutions for Your Business Products & Services Highlights Processing Solutions VISA, MC, Discover, JCB, Diners, American Express, China UnionPay Multi Currency Cross Border Dynamic
More informationMobility, Security and Trusted Identities: It s Right In The Palm of Your Hands. Ian Wills Country Manager, Entrust Datacard
Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands Ian Wills Country Manager, Entrust Datacard WHO IS ENTRUST DATACARD? 2 Entrust DataCard Datacard Corporation. Corporation.
More informationUnderstanding Digital Certificates & Secure Sockets Layer (SSL): A Fundamental Requirement for Internet Transactions
Understanding Digital Certificates & Secure Sockets Layer (SSL): A Fundamental Requirement for Internet Transactions February 2005 All rights reserved. Page i Entrust is a registered trademark of Entrust,
More informationAchieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER
with Convenience and Personal Privacy version 0.2 Aug.18, 2007 WHITE PAPER CONTENT Introduction... 3 Identity verification and multi-factor authentication..... 4 Market adoption... 4 Making biometrics
More informationInside the Mobile Wallet: What It Means for Merchants and Card Issuers
Inside the Mobile Wallet: What It Means for Merchants and Card Issuers Welcome to the age of Universal Commerce commerce that is integrated, personalized, secure, open, and smart. The lines between in-store
More informationSHAPE YOUR FUTURE Your secret to getting and staying in shape. www.cloudtag.com 1
SHAPE YOUR FUTURE Your secret to getting and staying in shape www.cloudtag.com 1 Introduction CloudTag Inc. is a London Stock Exchange AIM listed digital health company bringing accurate personal monitoring
More informationBanking in the Mobile Age: MicroStrategy s Mobile Solutions. Stephen Bruggers VP Financial Services Solutions
Banking in the Mobile Age: MicroStrategy s Mobile Solutions Stephen Bruggers VP Financial Services Solutions Agenda Banking in the Mobile Age Transformation of Banking! Four Pillars of Mobile-Age Banking
More informationUser Authentication for Software-as-a-Service (SaaS) Applications White Paper
User Authentication for Software-as-a-Service (SaaS) Applications White Paper User Authentication for Software-as-a-Service (SaaS) Applications White Paper Page 1 of 16 DISCLAIMER Disclaimer of Warranties
More informationLatest and Future development of Mobile Payment in Hong Kong
Latest and Future development of Mobile Payment in Hong Kong About oti Founded in 1990 (NASDAQ: OTIV). Offices in US, Europe, Africa, Asia Global provider of cashless payment solutions Experts in secured
More informationJohn Beckwith Loyola Marymount. Access Control - Where are we and where are we going?
John Beckwith Loyola Marymount Access Control - Where are we and where are we going? Loyola Marymount University Private Jesuit Institution 1911 5500 Undergraduates 1600 Graduates 1300 Law School 3500
More informationTechnical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and
Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and procedures to govern who has access to electronic protected
More informationMOBILE PAYMENT IN THE EU: ROLE OF NFC. Gerd Thys Product Manager Clear2Pay Open Test Solutions (OTS) gerd.thys@clear2pay.com
MOBILE PAYMENT IN THE EU: ROLE OF NFC Gerd Thys Product Manager Clear2Pay Open Test Solutions (OTS) gerd.thys@clear2pay.com READY FOR MOBILE PAYMENT AT THE PUMP? Germany : One in three willing to pay for
More informationEMV in Hotels Observations and Considerations
EMV in Hotels Observations and Considerations Just in: EMV in the Mail Customer Education: Credit Card companies have already started customer training for the new smart cards. 1 Questions to be Answered
More informationW.A.R.N. Passive Biometric ID Card Solution
W.A.R.N. Passive Biometric ID Card Solution Updated November, 2007 Biometric technology has advanced so quickly in the last decade that questions and facts about its cost, use, and accuracy are often confused
More informationFrom Edge to the Core. Sicurezza dati nelle infrastrutture condivise, virtualizzate e cloud.
From Edge to the Core. Sicurezza dati nelle infrastrutture condivise, virtualizzate e cloud. Claudio Olati Sales Manager - Gemalto Sergio Sironi Regional Sales Manager - Safenet We are the world leader
More informationMasterCard Contactless Reader v3.0. INTRODUCTION TO MASTERCARD CONTACTLESS READER v3.0
MasterCard Contactless Reader v3.0 INTRODUCTION TO MASTERCARD CONTACTLESS READER v3.0 Introduction to MasterCard Contactless Reader v3.0 Contents 1. Introduction...2 2. Background...3 2.1 Reader Applications...3
More informationIoT Conference Call December 18, 2013 16:30 GMT
Dial in details / Replay details: Are on the ARM website at www.arm.com/ir If you have any questions: As we won t be taking questions on the call, please email any questions ahead of time to Investor.relations@arm.com
More informationBeyond e-commerce to everywhere-commerce. Accelerating UK retailers digital presence to compete globally. www.gov.uk/ukti
Beyond e-commerce to everywhere-commerce Accelerating UK retailers digital presence to compete globally www.gov.uk/ukti UK Trade & Investment Follow us @UKTIRetail Consumer spend fuelled by technology
More informationThe Impact of Emerging Payment Technologies on Retail and Hospitality Businesses. National Computer Corporation www.nccusa.com
The Impact of Emerging Payment Technologies on Retail and Hospitality Businesses The Impact of Emerging Payment Technologies on Retail and Hospitality Businesses Making the customer payment process convenient,
More informationSecurity Levels for Web Authentication using Mobile Phones
Security Levels for Web Authentication using Mobile Phones Anna Vapen and Nahid Shahmehri Department of computer and information science Linköpings universitet, SE-58183 Linköping, Sweden {annva,nahsh}@ida.liu.se
More informationEESTEL. Association of European Experts in E-Transactions Systems. Apple iphone 6, Apple Pay, What else? EESTEL White Paper.
EESTEL White Paper October 29, 2014 Apple iphone 6, Apple Pay, What else? On 2014, September 9 th, Apple has launched three major products: iphone 6, Apple Watch and Apple Pay. On October 17 th, Apple
More informationof interaction. Operate with Efficiency. Manage the Operation. Connect with Customers. Enhance with Mobility. For Table Service Restaurants
Experience a new world of interaction. Operate with Efficiency. Manage the Operation. Connect with Customers. Enhance with Mobility. For Table Service Restaurants 02 Experience a new world of interaction
More informationOmni-Channel Marketing for Customer Driven Interaction
Omni-Channel Marketing for Customer Driven Interaction 2 Omni-Channel Marketing for Customer-Driven Interaction The Customer Driven Experience With the growing impact of mobile apps and digital touchpoints
More informationOpenEdge Research & Development Group April 2015
2015: Security, Merchant Readiness & the Coming Liability Shift OpenEdge Research & Development Group April 2015 solutions@openedgepay.com openedgepay.com 2015: Security, Merchant Table of Contents The
More informationSmart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public
More informationAbracon PTM Introduction to ANFCA Series Flexible Peel & Stick NFC Antennas
Abracon PTM Introduction to ANFCA Series Flexible Peel & Stick NFC Antennas WWW.ABRACON.COM ANFCA Series Flexible Peel & Stick NFC Antennas Purpose To introduce ANFCA Series, Flexible Peel & Stick NFC
More informationBest Practices for Integrating Mobile into the Access Control Architecture
Best Practices for Integrating Mobile into the Access Control Architecture Merging Security and Convenience with Mobile Mobile Access Using a mobile device to gain access to different buildings is not
More informationAmerican Express Contactless Payments
PRODUCT CAPABILITY GUIDE American Express Contactless Payments American Express Contactless Payments Help Enable Increased Convenience For Card Members At The Point Of Sale American Express contactless
More informationMobile Payment: The next step of secure payment VDI / VDE-Colloquium. Hans-Jörg Frey Senior Product Manager May 16th, 2013
Mobile Payment: The next step of secure payment VDI / VDE-Colloquium May 16th, 2013 G&D has been growing through continuous innovation Server software and services Token and embedded security Cards for
More informationTechnical Article. NFiC: a new, economical way to make a device NFC-compliant. Prashant Dekate
Technical NFiC: a new, economical way to make a device NFC-compliant Prashant Dekate NFiC: a new, economical way to make a device NFC-compliant Prashant Dekate The installed base of devices with Near Field
More informationCost Effective time clock solution for Workday
Cost Effective time clock solution for Automatically Upload Employee Time Records to s Time Tracking. Why pay someone to manually input employee time records, or waste time on staff disputes over time
More informationOT PRODUCTS AND SOLUTIONS MACHINE TO MACHINE
OT PRODUCTS AND SOLUTIONS MACHINE TO MACHINE MACHINE-TO-MACHINE ENABLE AND SECURE A CONNECTED LIFE DRIVEN BY GOVERNMENT REGULATIONS, COMPANY AND CONSUMER NEEDS, PRODUCTS ARE TRANSFORMED INTO INTELLIGENT,
More informationBlackBerry Web Desktop Manager. Version: 5.0 Service Pack: 4. User Guide
BlackBerry Web Desktop Manager Version: 5.0 Service Pack: 4 User Guide Published: 2012-10-03 SWD-20121003174218242 Contents 1 Basics... 5 Log in to the BlackBerry Web Desktop Manager... 5 Connect your
More informationMobile Commerce and Ubiquitous Computing. Chapter 6
Mobile Commerce and Ubiquitous Computing Chapter 6 Learning Objectives 1. Discuss the value-added attributes, benefits, and fundamental drivers of m-commerce. 2. Describe the mobile computing infrastructure
More informationStronger(Security(and( Mobile'Payments'! Dramatically*Faster!and$ Cheaper'to'Implement"
!!!! Stronger(Security(and( Mobile'Payments'! Dramatically*Faster!and$ Cheaper'to'Implement" Here$is$a$simple,$cost$effective$way$to$achieve$transaction$security$for$ mobile$payments$that$allows$easy$and$secure$provisioning$of$cards.$
More informationWhat s Happening? Best Practice for Embedding Mobile Technology in Your Store. Session Q&A
What s Happening? Best Practice for Embedding Mobile Technology in Your Store Session Q&A 1. Is Eagle Anywhere available if you are on the Cloud? Yes, if you are hosted with us it works on a tablet. 2.
More informationHow Secure is Authentication?
U2F & UAF Tutorial How Secure is Authentication? 2014 1.2bn? 2013 397m Dec. 2013 145m Oct. 2013 130m May 2013 22m April 2013 50m March 2013 50m Cloud Authentication Password Issues Password might be entered
More informationLongmai Mobile PKI Solution
Longmai Mobile PKI Solution A quick Solution to External and Internal fraud in Insurance Industry Putting the client at the center of modernization Contents 1. INTRODUCTION... 3 1.1 Challenges... 3 1.2
More informationAsian Payment Card Forum Growing the Business: Launching Successful Consumer Payments Products
Asian Payment Card Forum Growing the Business: Launching Successful Consumer Payments Products Dusit Thani Hotel, Bangkok, Thailand September 201 Information Brochure Focus in 2014 Payment Card Technology
More informationMulti-Factor Authentication
Enhancing network security through the authentication process Multi-Factor Authentication Passwords, Smart Cards, and Biometrics INTRODUCTION Corporations today are investing more time and resources on
More informationHow to connect your D200 using Bluetooth. How to connect your D200 using GPRS (SIM Card)
D200 En User Guide Content 3 Introduction 3 Scope 3 Related Documentation 4 Internet Connectivity 4 Using D200 with Mobile Phone 5 Using D200 with wireless (Wi-Fi) router 6 Using D200 with GPRS (requires
More informationOpinion piece. The mobile wallet already exists! It s called mobile banking. By Simon Cadbury Head of Strategy & Innovation Intelligent Environments
Opinion piece The mobile wallet already exists! It s called mobile banking By Simon Cadbury Head of Strategy & Innovation Intelligent Environments What do we mean by a Mobile Wallet? The term Mobile Wallet
More informationAugust 2013 Rising to the Omni-Channel Challenge
August 2013 Rising to the Omni-Channel Challenge and Opportunities to Engage Today s Ultra-Connected Customers Rising to the Omni-Channel Challenge and Opportunities to Engage Today s Ultra-Connected Customers
More informationACI TOKEN MANAGER FOR MOBILE: TOKEN SERVICE PROVISION, HCE AND EMBEDDED SECURE ELEMENT IN THE CLOUD
DELIVERS PEACE OF MIND PRODUCT FLYER ACI TOKEN MANAGER FOR MOBILE: TOKEN SERVICE PROVISION, HCE AND EMBEDDED SECURE ELEMENT IN THE CLOUD ENABLE FULL SUPPORT OF THE MOBILE PAYMENTS PROCESS FOR EMBEDDED
More informationThe Goods, the Payment and the Mobile!
WHITEPAPER The Goods, the Payment and the Mobile! This whitepaper is an extract from: Mobile Payments for Digital & Physical Goods Analysis, Markets & Vendor Strategies 2011-2015... information you can
More informationGlossary of Key Terms
and s Branch Glossary of Key Terms The terms and definitions listed in this glossary are used throughout the s Package to define key terms in the context of. Access Control Access The processes by which
More informationResearch Priorities Jean-Pierre Tual, Industrial Relations Director, Strategy and Innovation
Research Priorities Jean-Pierre Tual, Industrial Relations Director, Strategy and Innovation CELTIC Day, Berlin, June 25 th 2014 Gemalto at a glance 2.4bn revenue 2013 2bn+ end-users benefit from our solutions
More informationThe evolution of Social CRM
In a series of articles Cognizant s Customer Solutions Consulting Practice explores how organizations can use innovation and integration to engage with the new breed of technology fuelled customers of
More informationSOLUTIONS FOR HEALTHCARE PROFESSIONALS AND GOVERNMENTS
SOLUTIONS FOR HEALTHCARE PROFESSIONALS AND GOVERNMENTS The number of people in need of medical care in the world is continuously increasing, as evidenced by the evolving demographic outlook in both developed
More informationBlackBerry Enterprise Solution and RSA SecurID
Technology Overview BlackBerry Enterprise Solution and RSA SecurID Leveraging Two-Factor Authentication to Provide Secure Access to Corporate Resources Table of Contents Executive Summary 3 Empowering
More informationConnecting IPv6 capable Bluetooth Low Energy sensors with the Internet of Things
Connecting IPv6 capable Bluetooth Low Energy sensors with the Internet of Things Johanna Nieminen (Nokia), Future Internet SHOK preconference 30.05.2012 IoT Taxonomy ZigBee 802.5.4 Bluetooth Video RFID
More informationSecureCom Mobile s mission is to help people keep their private communication private.
About SecureCom Mobile SecureCom Mobile s mission is to help people keep their private communication private. We believe people have a right to share ideas with each other, confident that only the intended
More informationOpinion and recommendations on challenges raised by biometric developments
Opinion and recommendations on challenges raised by biometric developments Position paper for the Science and Technology Committee (House of Commons) Participation to the inquiry on Current and future
More informationTOURISM INNOVATIVE PAYMENT SOLUTIONS. Efficient, flexible, worldwide and secure
TOURISM INNOVATIVE PAYMENT SOLUTIONS Efficient, flexible, worldwide and secure 2 THE FUTURE OF PAYMENT FOR THE TOURISM AND TRAVEL BUSINESS The PERFECT PARTNER Wirecard is one of the world s leading independent
More informationTop 10 Anti-fraud Tips: The Cybersecurity Breach Aftermath
ebook Top 10 Anti-fraud Tips: The Cybersecurity Breach Aftermath Protecting against downstream fraud attacks in the wake of large-scale security breaches. Digital companies can no longer trust static login
More informationA Solution to the Mobile Wallet Conundrum
A Solution to the Mobile Wallet Conundrum 2014 Cortex MCP Page 1 Introduction: A new approach is needed to make the Mobile Wallet mainstream More people than ever are using smartphones to place and take
More informationTop 10 Factors That Will Increase Conversion Rates
Top 10 Factors That Will Increase Conversion Rates Top A 3VR 10 Factors WHITEPAPER That Will Increase Conversion Rates 1 Customer Insights We should be using technology to understand who our customers
More informationW3C Web Payment IG. Payment Service Providers. Alibaba Zephyr Tuan
W3C Web Payment IG Payment Service Providers Alibaba Zephyr Tuan 01 Internet Finance Ecosystem in China 02 Payment Service Provider Requirements 03 Open Questions 01 When Internet Meet Finance Internet
More informationEMV and Restaurants: What you need to know. Mike English. October 2014. Executive Director, Product Development Heartland Payment Systems
October 2014 EMV and Restaurants: What you need to know Mike English Executive Director, Product Development Heartland Payment Systems 2014 Heartland Payment Systems, Inc. All trademarks, service marks
More informationChanging E-Commerce Trends
Changing E-Commerce Trends E-Commerce trends that will change the way of shopping E-commerce came to existence more than two decades ago. It is still going strong. As per emarketer, worldwide e-commerce
More information