2015 All rights reserved

Size: px
Start display at page:

Download "2015 All rights reserved"

Transcription

1

2 CONTENTS Blockchain Digital Currencies Digital Identity Omni-channel Contactless Payments Wearable Payments

3 Blockchain What is blockchain? Blockchain is a secure transaction ledger database. The ledger is decentralized, shared by all participants. It is created on top of a distributed network of computers. Blockchain acts as the ledger recording all information related to transactions that occur within its network. The decentralized database maintains a history of every exchange ever made and bases the trust on participants rather than third parties. In its essence, Blockchain is programmable value. How it works Blockchain enables anonymous exchange of digital value. The technology removes the need for a central authority for trust verification and value transfer. Being decentralized, it enables safe, fast, cost effective transactions even though parties may not know who they are dealing with. As entities transact within a Blockchain environment, a public record of all transactions is generated and maintained. Computers verify transactions based on complex algorithms to perform the value transfer and update the ledger history. Blockchain usage examples: Digital currencies Crowd funding Smart agreements (automated agreement execution) Digital identity Decentralized communication Asset ownership

4 Key Concepts Decentralized consensus; The blockchain; Smart contracts; Trusted computing (or trustless transactions): Proof of work (and proof of stake). Read more about each concept here.

5 Digital Currencies Digital, Virtual and Crypto Currencies Digital currencies are created and stored electronically. Virtual currencies are unregulated digital money. They are issued and controlled by its developers and are used by the members of a virtual community. Crypto currencies are a subset of digital currencies, using cryptography as part of their security. The structure of crypto currencies Digital and crypto currencies are structured as a payment network. They are created on top of block chain technology allowing parties to move value digitally, securely and quickly in a decentralized manner. Digital Currency Market Capitalization: Digital currencies Crowd funding What is Bitcoin? Bitcoin is the most known crypto currency, and is a consensus network that enables a new payment system, and a full scheme for digital money. It is the first decentralized peer-to-peer payment network, powered by its users and having no central authority. Bitcoin is considered to become the gold standard for virtual money. To date, it is used as a cash system for Internet financial transactions. Smart agreements (automated agreement execution) Digital identity Decentralized communication Asset ownership

6 How does Bitcoin work? The Bitcoin network is based on the "block chain" technology and uses the public ledger database. Bitcoin ledger contains every transaction ever processed, allowing a user's computer to verify the validity of each transaction. The authenticity of each transaction is protected by digital signatures corresponding to the sending addresses, allowing all users to have full control over sending Bitcoins from their own Bitcoin addresses.

7 Digital Identity What is it? Digital Identity is the data that uniquely describes a person / entity and contains information about the subject s relationship. Technically it is a network used for identification in connections or transactions from digital devices. Trusting the link between a real identity and a digital identity first requires someone to validate the identity, or in other words, to prove you are who you say you are. The more valuable the digital identity, the more work required to validate it and establish secure authentication. Key components The strength level of a digital identity given by: registration and authentication process. Registration is the how an entity becomes known in a domain, while authentication verifies the attributes associated with identity. Digital identity is based on: Identity Verification; Personal Data; Authentication. A strong security process for verifying an identity is based on knowledge (e.g. passwords), possession (e.g. digipass) and/or the person itself (e.g. biometrics). Digital Identity use cases: Retail banking Consumer finance Healthcare B2B Agreements High value commerce

8 Facts More than 900 million consumer records compromised in Verizon's Data Breach Investigations Report shows weak or stolen login credentials account for more than 76% of analyzed breaches.

9 Omni-channel What is Omni-channel? Omni-channel is a synchronized customer communication strategy. All channels are aligned in a single touch point for the customer and present one consistent way of doing business. Omni-channel banking is a consistent cross-channel experience, aiming to provide customers seamless access to financial products and services. 2 Major principles: Centrally manage execution across all channels consistently, reducing cost and time to market; Measure and consolidate data across all channels to determine which combinations of channels and interactions have the biggest attribution to the bottom-line (increasing conversion rates and revenue). Top Omni-channel concepts in finance industry: Specialty branch Virtual banking Infomediary Key Elements of Omni-channel strategy: Consistent services access across all channels; 360 degree view of every customers; Digital management of origination; Reengineer the way you listen: listen everywhere, at once, and respond immediately; Increase understanding of customers with analytics and take data driven decisions.

10 4 Pillars for Omni-channel banking: New branch; Mobile enabled; Social aware; Video connected. Recommended presentation

11 Contactless Payments Definition Contactless payment technology enables payment transactions via a contactless chip embedded in payment cards, tags, key fobs and mobile phones. The chip communicates with a reader device that uses radio frequency or Near Field Communication (NFC) standards. It includes radio frequency identification (RFID) as part of a machine-to-machine communications trend. (Gartner) Technology Near Field Communication (NFC) is a short-range wireless (RF) communication technology for smartphones and similar devices enabling data transfer between the devices. NFC operates for contactless payments in card emulation mode, which enables devices to function as contactless smart cards. Host card emulation (HCE) enables NFC devices to perform contactless transactions in card emulation mode when the payment, other credentials and related card applications are stored somewhere other than on the hardware itself. Top contactless use cases: HORECA Retail Fashion Public transport

12 Facts 150M mobile devices will be contactless in coming years; Worldwide NFC-capable POS terminals installed base is 21.4 million units, reaching 74.9 million by the end of 2019; 9.5 million NFC-capable POS terminals were shipped globally in 2014; MasterCard announced it is establishing contactless acceptance as standard by 2020 for merchants accepting MasterCard and Maestro in Europe.

13 Wearable payments What are wearable devices? Wearable describes electronic devices that can be worn on the body. They can be found today as intelligent fitness bands and smart watches, or glasses, but are being extended into fashion and jewelry as well. How do wearable payments work? Wearables enable contactless payment processes through Near Field Communication (NFC). The wearable device communicates directly to the network through inbuilt connectivity or can use Bluetooth to connect to the user s phone to finalize the payment. Host card emulation (HCE) technology is used when it comes to the wearable device connecting to the mobile for finalizing payment. Wearables can enable biometrics and geo-location as security components in the payment process. Devices can step away from just fingerprints, and enable pulse patterns and build a unique cardiac rhythm for authentication. 3 Use cases for wearable payments: Loyalty schemes Authentication B2B Commerce Key elements of wearable in payments Development platforms: easy integration; Connected: Wi-Fi, 3G/4G, Bluetooth, NFC; Environment aware: GPS, Camera, Microphone; Biometrics sensors.

14 Examples Disney is using MagicBand, a wearable device preprogrammed to hold room numbers and/or payment mechanisms throughout the park. Starbucks makes transactions possible through Microsoft Band, Samsung s Galaxy Gear or even Pebble. Eaze is pushing the idea of Nod to Pay, using two Bitcoin payment systems and planning to integrate fiat currencies. Recommended presentation

15 Maxcode Deliver your next finance or ehealth application. Maxcode is an IT service company building tailor made applications for the European market. We focus on financial and healthcare industries. Maxcode is located in The Netherlands with offices in Romania, and the Republic of Moldova. We are a modern company and a reliable partner for our customers and employees. Koninginnegracht AB Den Haag / The Hague The Netherlands info@maxcode.net Disclaimer The materials in this document may contain inaccuracies or typographical errors. Maxcode does not warrant the accuracy, reliability or completeness of the materials, advices, opinions, statements or any other information displayed or distributed in this document. All information in this document is provided as is and as available, and shall not be binding nor shall it be construed as constituting any obligation, representation or warranty on the part of Maxcode. You acknowledge that any reliance on any information in this document shall be at your sole risk. Maxcode mentions others, their products and ideas as a convenience to you. Those others, products and ideas are not under the control of Maxcode. Accordingly, Maxcode makes no representation or warranty in relation to others, their products, or ideas, other than simply listing them as relevant for your consideration. By listing them, Maxcode is not endorsing or recommending them to you.

16 Sources: Contactless-Terminals_And-Turning-on-NFC Cover image credit: Sebastiaan ter Burg under c.c. 2.0 (modified).

Internet of Things (IoT): A vision, architectural elements, and future directions

Internet of Things (IoT): A vision, architectural elements, and future directions Internet of Things (IoT): A vision, architectural elements, and future directions By IOT Group Salah Amean Ahmmed Saeed Authors: Gubbi, Jayavardhana Buyya, RajkumarMarusic, Slaven Palaniswami, Marimuthu

More information

Best Practices for the Use of RF-Enabled Technology in Identity Management. January 2007. Developed by: Smart Card Alliance Identity Council

Best Practices for the Use of RF-Enabled Technology in Identity Management. January 2007. Developed by: Smart Card Alliance Identity Council Best Practices for the Use of RF-Enabled Technology in Identity Management January 2007 Developed by: Smart Card Alliance Identity Council Best Practices for the Use of RF-Enabled Technology in Identity

More information

Two-Factor Authentication over Mobile: Simplifying Security and Authentication

Two-Factor Authentication over Mobile: Simplifying Security and Authentication SAP Thought Leadership Paper SAP Mobile Services Two-Factor Authentication over Mobile: Simplifying Security and Authentication Controlling Fraud and Validating End Users Easily and Cost-Effectively Table

More information

Significance of Tokenization in Promoting Cloud Based Secure Elements

Significance of Tokenization in Promoting Cloud Based Secure Elements Significance of Tokenization in Promoting Cloud Based Secure Elements Busra O zdenizci 1, Vedat Coskun 1*, Kerem Ok 1 and Turgay Karlidere 2 1 NFC Lab - Istanbul, Department of Information Technologies,

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions NFC for Consumers What is NFC? Near Field Communication (NFC) is a short-range wireless connectivity technology standard designed for intuitive, simple, and safe communication

More information

Wearable Technology Evolution & Security: Grant Brown - Security Strategist Symantec

Wearable Technology Evolution & Security: Grant Brown - Security Strategist Symantec Wearable Technology Evolution & Security: Grant Brown - Security Strategist Symantec 3.58 KM 12.11 KPH 493 Calories 114 BPM WEARABLE TECH EVOLUTION AND SECURITY GRANT BROWN SECURITY STRATEGIST @thegrantbrown

More information

Use Cases for Mobile NFC Meeting Retail

Use Cases for Mobile NFC Meeting Retail Use Cases for Mobile NFC Meeting Retail, 2012 Neil Garner Founder & CEO Who are Proxama? Enabling Your Mobile Contactless World Proxama is the next generation mobile commerce company that connects the

More information

Mobile Near-Field Communications (NFC) Payments

Mobile Near-Field Communications (NFC) Payments Mobile Near-Field Communications (NFC) Payments OCTOBER 2013 GENERAL INFORMATION American Express continues to develop its infrastructure and capabilities to support growing market interest in mobile payments

More information

How To Understand The Power Of The Internet Of Things

How To Understand The Power Of The Internet Of Things Next Internet Evolution: Getting Big Data insights from the Internet of Things Internet of things are fast becoming broadly accepted in the world of computing and they should be. Advances in Cloud computing,

More information

Catch all the digital moments

Catch all the digital moments Catch all the digital moments of your customers Driving digital transformation in the banking sector Banking is clearly evolving in a fast-paced and changing ecosystem, either in terms of regulatory compliance

More information

Implementation of biometrics, issues to be solved

Implementation of biometrics, issues to be solved ICAO 9th Symposium and Exhibition on MRTDs, Biometrics and Border Security, 22-24 October 2013 Implementation of biometrics, issues to be solved Eugenijus Liubenka, Chairman of the Frontiers / False Documents

More information

PayPass - M/Chip Requirements. 5 December 2011

PayPass - M/Chip Requirements. 5 December 2011 PayPass - M/Chip Requirements 5 December 2011 Notices Proprietary Rights The information contained in this document is proprietary and confidential to MasterCard International Incorporated, one or more

More information

MOBILE PAYMENT SECURITY: BLE OR NFC

MOBILE PAYMENT SECURITY: BLE OR NFC NEW SCIENCE TRANSACTION SECURITY ARTICLE MOBILE PAYMENT SECURITY: BLE OR NFC SUMMER 2014 UL.COM/NEWSCIENCE NEW SCIENCE TRANSACTION SECURITY OVERVIEW From research on the latest electronic transaction security

More information

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards January 2007 Developed by: Smart Card Alliance Identity Council RF-Enabled Applications and Technology:

More information

Emerging Trends in the Payment Ecosystem: The Good, the Bad and the Ugly DAN KRAMER

Emerging Trends in the Payment Ecosystem: The Good, the Bad and the Ugly DAN KRAMER Emerging Trends in the Payment Ecosystem: The Good, the Bad and the Ugly DAN KRAMER SHAZAM, Senior Vice President Agenda The Ugly Fraud The Bad EMV? The Good Tokenization and Other Emerging Payment Options

More information

03. Part 03: The Future of Customer Experience in Retail Banking: Wearables, App Stores, Biometrics, & Cryptocurrencies

03. Part 03: The Future of Customer Experience in Retail Banking: Wearables, App Stores, Biometrics, & Cryptocurrencies . Part 0: The Future of Customer Experience in Retail Banking: Wearables, App Stores, Biometrics, & Cryptocurrencies In the final chapter of this series we ll look at some of the most striking technological

More information

WIRECARD FUTURE OF PAYMENTS. MainFirst Insights to Go Web Conference January 22, 2015

WIRECARD FUTURE OF PAYMENTS. MainFirst Insights to Go Web Conference January 22, 2015 WIRECARD FUTURE OF PAYMENTS MainFirst Insights to Go Web Conference January 22, 2015 1. MARKET READINESS FOR MOBILE PAYMENTS IS ACCELERATING NFC: Facts & Figures According to Visa Europe (January 2015),

More information

Electronic Prescribing of Controlled Substances: Establishing a Secure, Auditable Chain of Trust

Electronic Prescribing of Controlled Substances: Establishing a Secure, Auditable Chain of Trust Electronic Prescribing of Controlled Substances: Establishing a Secure, Auditable Chain of Trust Imprivata Confirm ID and the DEA Interim Final Rule on EPCS Technology requirements to comply with the DEA

More information

Store Logistics and Payment with Near Field Communication

Store Logistics and Payment with Near Field Communication with www.stolpan.com Store Logistics and Payment with Near Field Communication Hagenberg, Hagenberg, March March 20. 2007 20. 2007. Dr. László Kutor, Dr. BMF László Kutor, BMF 19/1 StoLPaN Project Summary

More information

Mobile Electronic Payments

Mobile Electronic Payments Chapter 7 Mobile Electronic Payments 7.1 Rationale and Motivation Mobile electronic payments are rapidly becoming a reality. There is no doubt that users of mobile phones are willing and even asking to

More information

Executive Summary P 1. ActivIdentity

Executive Summary P 1. ActivIdentity WHITE PAPER WP Converging Access of IT and Building Resources P 1 Executive Summary To get business done, users must have quick, simple access to the resources they need, when they need them, whether they

More information

MOBILE NEAR-FIELD COMMUNICATIONS (NFC) PAYMENTS

MOBILE NEAR-FIELD COMMUNICATIONS (NFC) PAYMENTS MOBILE NEAR-FIELD COMMUNICATIONS (NFC) PAYMENTS MAY 2013 THESE TECHNOLOGIES ARE BECOMING CONVENIENT AND SIMPLE WAYS TO PAY. Every day merchants seek better ways to grow their business and improve efficiency.

More information

Using RFID Techniques for a Universal Identification Device

Using RFID Techniques for a Universal Identification Device Using RFID Techniques for a Universal Identification Device Roman Zharinov, Ulia Trifonova, Alexey Gorin Saint-Petersburg State University of Aerospace Instrumentation Saint-Petersburg, Russia {roman,

More information

Tranform Multi-Factor Authentication from "Something You Have" to "Something You Already Have"

Tranform Multi-Factor Authentication from Something You Have to Something You Already Have Tranform Multi-Factor Authentication from "Something You Have" to "Something You Already Have" DIGIPASS Embedded Solutions White Paper DIGIPASS Embedded Solutions White Paper Page 1 of 14 2009 VASCO Data

More information

Card Not Present Fraud Webinar Transcript

Card Not Present Fraud Webinar Transcript Card Not Present Fraud Webinar Transcript All right let s go ahead and get things started, and to do that, I d like to turn it over to Fae Ghormley. Fae? Thank you for giving us this opportunity to share

More information

UPCOMING SCHEME CHANGES

UPCOMING SCHEME CHANGES UPCOMING SCHEME CHANGES MERCHANTS/PARTNERS/ISO COPY Payvision Ref: Payvision-Upcoming Scheme Changes (v1.0)-march 2016 1 Rights of use: COMPLYING WITH ALL APPLICABLE COPYRIGHT LAWS IS THE RESPONSABILITY

More information

EMV 101: What small businesses need to know

EMV 101: What small businesses need to know EMV 101: What small businesses need to know DEMETRIOS MARANTIS, Head of Global Policy and Government Affairs OWEN J ENNINGS, Square Business Team June 2015 Cosponsorship Authorization # 15-2050-102. SBA

More information

Mobile Financial Services Business Ecosystem Scenarios & Consequences. Summary Document. Edited By. Juha Risikko & Bishwajit Choudhary

Mobile Financial Services Business Ecosystem Scenarios & Consequences. Summary Document. Edited By. Juha Risikko & Bishwajit Choudhary Mobile Financial Services Business Ecosystem Scenarios & Consequences Summary Document Edited By Juha Risikko & Bishwajit Choudhary Mobey Forum Mobile Financial Services Ltd. Disclaimer: This document

More information

SHOPPING WITH LESS - MERCHANTS GO CONTACTLESS. globalpaymentsinc.co.uk

SHOPPING WITH LESS - MERCHANTS GO CONTACTLESS. globalpaymentsinc.co.uk SHOPPING WITH LESS - MERCHANTS GO CONTACTLESS globalpaymentsinc.co.uk Page 2 3 FOREWORD Payment technologies have advanced greatly over the last few years and more and more merchants understand the potential

More information

SMART WIRELESS DEVICES & THE INTERNET OF ME

SMART WIRELESS DEVICES & THE INTERNET OF ME SMART WIRELESS DEVICES & THE INTERNET OF ME Whitepaper www.juniperresearch.com 1 1.1 Introduction Since the conception of the Web, Internet-connected devices have expanded in every conceivable direction,

More information

Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, 2006. Developed by: Smart Card Alliance Identity Council

Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, 2006. Developed by: Smart Card Alliance Identity Council Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions July, 2006 Developed by: Smart Card Alliance Identity Council Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked

More information

Mobile Driver s License Solution

Mobile Driver s License Solution Mobile Driver s License Solution Secure, convenient and more efficient Improved identity protection through secure mobile driver s licenses The introduction of a mobile driver s license is a huge opportunity

More information

What Merchants Need to Know About EMV

What Merchants Need to Know About EMV Effective November 1, 2014 1. What is EMV? EMV is the global standard for card present payment processing technology and it s coming to the U.S. EMV uses an embedded chip in the card that holds all the

More information

NFC: Enabler for Innovative Mobility and Payment NFC: MOBILIDADE E MEIOS DE PAGAMENTO

NFC: Enabler for Innovative Mobility and Payment NFC: MOBILIDADE E MEIOS DE PAGAMENTO NFC: Enabler for Innovative Mobility and Payment Cards Brazil Sao Paulo, April 3rd to 5th 2007 Rodolfo Gomes - 1st Level Customer Application Support NFC&RFID Europe A new Company has reborn Few months

More information

Building Trust in a Digital World. Brian Phelps, BSc CISSP Director of Advanced Solutions Group EMEA Thales UK, Ltd.

Building Trust in a Digital World. Brian Phelps, BSc CISSP Director of Advanced Solutions Group EMEA Thales UK, Ltd. Building Trust in a Digital World Brian Phelps, BSc CISSP Director of Advanced Solutions Group EMEA Thales UK, Ltd. 2 Global incidents Equivalent of 117,339 incoming attacks per day, everyday Total number

More information

NFC Test Challenges for Mobile Device Developers Presented by: Miguel Angel Guijarro miguel-angel_guijarro@agilent.com

NFC Test Challenges for Mobile Device Developers Presented by: Miguel Angel Guijarro miguel-angel_guijarro@agilent.com NFC Test Challenges for Mobile Device Developers Presented by: Miguel Angel Guijarro miguel-angel_guijarro@agilent.com 1 Outlook About NFC Developing a NFC Device Test Challenges Test Solutions Q&A 2 What

More information

Accenture Payment Services

Accenture Payment Services Accenture Payment Services Helping banks and other payment service providers to improve business strategy, technology and operational efficiency to transform their business Over 4,000 Payments professionals,

More information

toast EMV in 2015: How Restaurants Can Prepare for the New Chip-and-Pin Standard

toast EMV in 2015: How Restaurants Can Prepare for the New Chip-and-Pin Standard toast EMV in 2015: How Restaurants Can Prepare for the New Chip-and-Pin Standard Table of Contents For more than 40 years, merchants and consumers have used magnetic stripe credit cards and compatible

More information

Training. MIFARE4Mobile. Public. MobileKnowledge April 2015

Training. MIFARE4Mobile. Public. MobileKnowledge April 2015 MIFARE4Mobile Public MobileKnowledge April 2015 Agenda Why MIFARE4Mobile? MIFARE in Mobile related technologies MIFARE technology NFC technology MIFARE4Mobile technology High level system architecture

More information

Merchant Services Payment Solutions for Your Business

Merchant Services Payment Solutions for Your Business Merchant Services Payment Solutions for Your Business Products & Services Highlights Processing Solutions VISA, MC, Discover, JCB, Diners, American Express, China UnionPay Multi Currency Cross Border Dynamic

More information

Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands. Ian Wills Country Manager, Entrust Datacard

Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands. Ian Wills Country Manager, Entrust Datacard Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands Ian Wills Country Manager, Entrust Datacard WHO IS ENTRUST DATACARD? 2 Entrust DataCard Datacard Corporation. Corporation.

More information

Understanding Digital Certificates & Secure Sockets Layer (SSL): A Fundamental Requirement for Internet Transactions

Understanding Digital Certificates & Secure Sockets Layer (SSL): A Fundamental Requirement for Internet Transactions Understanding Digital Certificates & Secure Sockets Layer (SSL): A Fundamental Requirement for Internet Transactions February 2005 All rights reserved. Page i Entrust is a registered trademark of Entrust,

More information

Achieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER

Achieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER with Convenience and Personal Privacy version 0.2 Aug.18, 2007 WHITE PAPER CONTENT Introduction... 3 Identity verification and multi-factor authentication..... 4 Market adoption... 4 Making biometrics

More information

Inside the Mobile Wallet: What It Means for Merchants and Card Issuers

Inside the Mobile Wallet: What It Means for Merchants and Card Issuers Inside the Mobile Wallet: What It Means for Merchants and Card Issuers Welcome to the age of Universal Commerce commerce that is integrated, personalized, secure, open, and smart. The lines between in-store

More information

SHAPE YOUR FUTURE Your secret to getting and staying in shape. www.cloudtag.com 1

SHAPE YOUR FUTURE Your secret to getting and staying in shape. www.cloudtag.com 1 SHAPE YOUR FUTURE Your secret to getting and staying in shape www.cloudtag.com 1 Introduction CloudTag Inc. is a London Stock Exchange AIM listed digital health company bringing accurate personal monitoring

More information

Banking in the Mobile Age: MicroStrategy s Mobile Solutions. Stephen Bruggers VP Financial Services Solutions

Banking in the Mobile Age: MicroStrategy s Mobile Solutions. Stephen Bruggers VP Financial Services Solutions Banking in the Mobile Age: MicroStrategy s Mobile Solutions Stephen Bruggers VP Financial Services Solutions Agenda Banking in the Mobile Age Transformation of Banking! Four Pillars of Mobile-Age Banking

More information

User Authentication for Software-as-a-Service (SaaS) Applications White Paper

User Authentication for Software-as-a-Service (SaaS) Applications White Paper User Authentication for Software-as-a-Service (SaaS) Applications White Paper User Authentication for Software-as-a-Service (SaaS) Applications White Paper Page 1 of 16 DISCLAIMER Disclaimer of Warranties

More information

Latest and Future development of Mobile Payment in Hong Kong

Latest and Future development of Mobile Payment in Hong Kong Latest and Future development of Mobile Payment in Hong Kong About oti Founded in 1990 (NASDAQ: OTIV). Offices in US, Europe, Africa, Asia Global provider of cashless payment solutions Experts in secured

More information

John Beckwith Loyola Marymount. Access Control - Where are we and where are we going?

John Beckwith Loyola Marymount. Access Control - Where are we and where are we going? John Beckwith Loyola Marymount Access Control - Where are we and where are we going? Loyola Marymount University Private Jesuit Institution 1911 5500 Undergraduates 1600 Graduates 1300 Law School 3500

More information

Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and

Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and procedures to govern who has access to electronic protected

More information

MOBILE PAYMENT IN THE EU: ROLE OF NFC. Gerd Thys Product Manager Clear2Pay Open Test Solutions (OTS) gerd.thys@clear2pay.com

MOBILE PAYMENT IN THE EU: ROLE OF NFC. Gerd Thys Product Manager Clear2Pay Open Test Solutions (OTS) gerd.thys@clear2pay.com MOBILE PAYMENT IN THE EU: ROLE OF NFC Gerd Thys Product Manager Clear2Pay Open Test Solutions (OTS) gerd.thys@clear2pay.com READY FOR MOBILE PAYMENT AT THE PUMP? Germany : One in three willing to pay for

More information

EMV in Hotels Observations and Considerations

EMV in Hotels Observations and Considerations EMV in Hotels Observations and Considerations Just in: EMV in the Mail Customer Education: Credit Card companies have already started customer training for the new smart cards. 1 Questions to be Answered

More information

W.A.R.N. Passive Biometric ID Card Solution

W.A.R.N. Passive Biometric ID Card Solution W.A.R.N. Passive Biometric ID Card Solution Updated November, 2007 Biometric technology has advanced so quickly in the last decade that questions and facts about its cost, use, and accuracy are often confused

More information

From Edge to the Core. Sicurezza dati nelle infrastrutture condivise, virtualizzate e cloud.

From Edge to the Core. Sicurezza dati nelle infrastrutture condivise, virtualizzate e cloud. From Edge to the Core. Sicurezza dati nelle infrastrutture condivise, virtualizzate e cloud. Claudio Olati Sales Manager - Gemalto Sergio Sironi Regional Sales Manager - Safenet We are the world leader

More information

MasterCard Contactless Reader v3.0. INTRODUCTION TO MASTERCARD CONTACTLESS READER v3.0

MasterCard Contactless Reader v3.0. INTRODUCTION TO MASTERCARD CONTACTLESS READER v3.0 MasterCard Contactless Reader v3.0 INTRODUCTION TO MASTERCARD CONTACTLESS READER v3.0 Introduction to MasterCard Contactless Reader v3.0 Contents 1. Introduction...2 2. Background...3 2.1 Reader Applications...3

More information

IoT Conference Call December 18, 2013 16:30 GMT

IoT Conference Call December 18, 2013 16:30 GMT Dial in details / Replay details: Are on the ARM website at www.arm.com/ir If you have any questions: As we won t be taking questions on the call, please email any questions ahead of time to Investor.relations@arm.com

More information

Beyond e-commerce to everywhere-commerce. Accelerating UK retailers digital presence to compete globally. www.gov.uk/ukti

Beyond e-commerce to everywhere-commerce. Accelerating UK retailers digital presence to compete globally. www.gov.uk/ukti Beyond e-commerce to everywhere-commerce Accelerating UK retailers digital presence to compete globally www.gov.uk/ukti UK Trade & Investment Follow us @UKTIRetail Consumer spend fuelled by technology

More information

The Impact of Emerging Payment Technologies on Retail and Hospitality Businesses. National Computer Corporation www.nccusa.com

The Impact of Emerging Payment Technologies on Retail and Hospitality Businesses. National Computer Corporation www.nccusa.com The Impact of Emerging Payment Technologies on Retail and Hospitality Businesses The Impact of Emerging Payment Technologies on Retail and Hospitality Businesses Making the customer payment process convenient,

More information

Security Levels for Web Authentication using Mobile Phones

Security Levels for Web Authentication using Mobile Phones Security Levels for Web Authentication using Mobile Phones Anna Vapen and Nahid Shahmehri Department of computer and information science Linköpings universitet, SE-58183 Linköping, Sweden {annva,nahsh}@ida.liu.se

More information

EESTEL. Association of European Experts in E-Transactions Systems. Apple iphone 6, Apple Pay, What else? EESTEL White Paper.

EESTEL. Association of European Experts in E-Transactions Systems. Apple iphone 6, Apple Pay, What else? EESTEL White Paper. EESTEL White Paper October 29, 2014 Apple iphone 6, Apple Pay, What else? On 2014, September 9 th, Apple has launched three major products: iphone 6, Apple Watch and Apple Pay. On October 17 th, Apple

More information

of interaction. Operate with Efficiency. Manage the Operation. Connect with Customers. Enhance with Mobility. For Table Service Restaurants

of interaction. Operate with Efficiency. Manage the Operation. Connect with Customers. Enhance with Mobility. For Table Service Restaurants Experience a new world of interaction. Operate with Efficiency. Manage the Operation. Connect with Customers. Enhance with Mobility. For Table Service Restaurants 02 Experience a new world of interaction

More information

Omni-Channel Marketing for Customer Driven Interaction

Omni-Channel Marketing for Customer Driven Interaction Omni-Channel Marketing for Customer Driven Interaction 2 Omni-Channel Marketing for Customer-Driven Interaction The Customer Driven Experience With the growing impact of mobile apps and digital touchpoints

More information

OpenEdge Research & Development Group April 2015

OpenEdge Research & Development Group April 2015 2015: Security, Merchant Readiness & the Coming Liability Shift OpenEdge Research & Development Group April 2015 solutions@openedgepay.com openedgepay.com 2015: Security, Merchant Table of Contents The

More information

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public

More information

Abracon PTM Introduction to ANFCA Series Flexible Peel & Stick NFC Antennas

Abracon PTM Introduction to ANFCA Series Flexible Peel & Stick NFC Antennas Abracon PTM Introduction to ANFCA Series Flexible Peel & Stick NFC Antennas WWW.ABRACON.COM ANFCA Series Flexible Peel & Stick NFC Antennas Purpose To introduce ANFCA Series, Flexible Peel & Stick NFC

More information

Best Practices for Integrating Mobile into the Access Control Architecture

Best Practices for Integrating Mobile into the Access Control Architecture Best Practices for Integrating Mobile into the Access Control Architecture Merging Security and Convenience with Mobile Mobile Access Using a mobile device to gain access to different buildings is not

More information

American Express Contactless Payments

American Express Contactless Payments PRODUCT CAPABILITY GUIDE American Express Contactless Payments American Express Contactless Payments Help Enable Increased Convenience For Card Members At The Point Of Sale American Express contactless

More information

Mobile Payment: The next step of secure payment VDI / VDE-Colloquium. Hans-Jörg Frey Senior Product Manager May 16th, 2013

Mobile Payment: The next step of secure payment VDI / VDE-Colloquium. Hans-Jörg Frey Senior Product Manager May 16th, 2013 Mobile Payment: The next step of secure payment VDI / VDE-Colloquium May 16th, 2013 G&D has been growing through continuous innovation Server software and services Token and embedded security Cards for

More information

Technical Article. NFiC: a new, economical way to make a device NFC-compliant. Prashant Dekate

Technical Article. NFiC: a new, economical way to make a device NFC-compliant. Prashant Dekate Technical NFiC: a new, economical way to make a device NFC-compliant Prashant Dekate NFiC: a new, economical way to make a device NFC-compliant Prashant Dekate The installed base of devices with Near Field

More information

Cost Effective time clock solution for Workday

Cost Effective time clock solution for Workday Cost Effective time clock solution for Automatically Upload Employee Time Records to s Time Tracking. Why pay someone to manually input employee time records, or waste time on staff disputes over time

More information

OT PRODUCTS AND SOLUTIONS MACHINE TO MACHINE

OT PRODUCTS AND SOLUTIONS MACHINE TO MACHINE OT PRODUCTS AND SOLUTIONS MACHINE TO MACHINE MACHINE-TO-MACHINE ENABLE AND SECURE A CONNECTED LIFE DRIVEN BY GOVERNMENT REGULATIONS, COMPANY AND CONSUMER NEEDS, PRODUCTS ARE TRANSFORMED INTO INTELLIGENT,

More information

BlackBerry Web Desktop Manager. Version: 5.0 Service Pack: 4. User Guide

BlackBerry Web Desktop Manager. Version: 5.0 Service Pack: 4. User Guide BlackBerry Web Desktop Manager Version: 5.0 Service Pack: 4 User Guide Published: 2012-10-03 SWD-20121003174218242 Contents 1 Basics... 5 Log in to the BlackBerry Web Desktop Manager... 5 Connect your

More information

Mobile Commerce and Ubiquitous Computing. Chapter 6

Mobile Commerce and Ubiquitous Computing. Chapter 6 Mobile Commerce and Ubiquitous Computing Chapter 6 Learning Objectives 1. Discuss the value-added attributes, benefits, and fundamental drivers of m-commerce. 2. Describe the mobile computing infrastructure

More information

Stronger(Security(and( Mobile'Payments'! Dramatically*Faster!and$ Cheaper'to'Implement"

Stronger(Security(and( Mobile'Payments'! Dramatically*Faster!and$ Cheaper'to'Implement !!!! Stronger(Security(and( Mobile'Payments'! Dramatically*Faster!and$ Cheaper'to'Implement" Here$is$a$simple,$cost$effective$way$to$achieve$transaction$security$for$ mobile$payments$that$allows$easy$and$secure$provisioning$of$cards.$

More information

What s Happening? Best Practice for Embedding Mobile Technology in Your Store. Session Q&A

What s Happening? Best Practice for Embedding Mobile Technology in Your Store. Session Q&A What s Happening? Best Practice for Embedding Mobile Technology in Your Store Session Q&A 1. Is Eagle Anywhere available if you are on the Cloud? Yes, if you are hosted with us it works on a tablet. 2.

More information

How Secure is Authentication?

How Secure is Authentication? U2F & UAF Tutorial How Secure is Authentication? 2014 1.2bn? 2013 397m Dec. 2013 145m Oct. 2013 130m May 2013 22m April 2013 50m March 2013 50m Cloud Authentication Password Issues Password might be entered

More information

Longmai Mobile PKI Solution

Longmai Mobile PKI Solution Longmai Mobile PKI Solution A quick Solution to External and Internal fraud in Insurance Industry Putting the client at the center of modernization Contents 1. INTRODUCTION... 3 1.1 Challenges... 3 1.2

More information

Asian Payment Card Forum Growing the Business: Launching Successful Consumer Payments Products

Asian Payment Card Forum Growing the Business: Launching Successful Consumer Payments Products Asian Payment Card Forum Growing the Business: Launching Successful Consumer Payments Products Dusit Thani Hotel, Bangkok, Thailand September 201 Information Brochure Focus in 2014 Payment Card Technology

More information

Multi-Factor Authentication

Multi-Factor Authentication Enhancing network security through the authentication process Multi-Factor Authentication Passwords, Smart Cards, and Biometrics INTRODUCTION Corporations today are investing more time and resources on

More information

How to connect your D200 using Bluetooth. How to connect your D200 using GPRS (SIM Card)

How to connect your D200 using Bluetooth. How to connect your D200 using GPRS (SIM Card) D200 En User Guide Content 3 Introduction 3 Scope 3 Related Documentation 4 Internet Connectivity 4 Using D200 with Mobile Phone 5 Using D200 with wireless (Wi-Fi) router 6 Using D200 with GPRS (requires

More information

Opinion piece. The mobile wallet already exists! It s called mobile banking. By Simon Cadbury Head of Strategy & Innovation Intelligent Environments

Opinion piece. The mobile wallet already exists! It s called mobile banking. By Simon Cadbury Head of Strategy & Innovation Intelligent Environments Opinion piece The mobile wallet already exists! It s called mobile banking By Simon Cadbury Head of Strategy & Innovation Intelligent Environments What do we mean by a Mobile Wallet? The term Mobile Wallet

More information

August 2013 Rising to the Omni-Channel Challenge

August 2013 Rising to the Omni-Channel Challenge August 2013 Rising to the Omni-Channel Challenge and Opportunities to Engage Today s Ultra-Connected Customers Rising to the Omni-Channel Challenge and Opportunities to Engage Today s Ultra-Connected Customers

More information

ACI TOKEN MANAGER FOR MOBILE: TOKEN SERVICE PROVISION, HCE AND EMBEDDED SECURE ELEMENT IN THE CLOUD

ACI TOKEN MANAGER FOR MOBILE: TOKEN SERVICE PROVISION, HCE AND EMBEDDED SECURE ELEMENT IN THE CLOUD DELIVERS PEACE OF MIND PRODUCT FLYER ACI TOKEN MANAGER FOR MOBILE: TOKEN SERVICE PROVISION, HCE AND EMBEDDED SECURE ELEMENT IN THE CLOUD ENABLE FULL SUPPORT OF THE MOBILE PAYMENTS PROCESS FOR EMBEDDED

More information

The Goods, the Payment and the Mobile!

The Goods, the Payment and the Mobile! WHITEPAPER The Goods, the Payment and the Mobile! This whitepaper is an extract from: Mobile Payments for Digital & Physical Goods Analysis, Markets & Vendor Strategies 2011-2015... information you can

More information

Glossary of Key Terms

Glossary of Key Terms and s Branch Glossary of Key Terms The terms and definitions listed in this glossary are used throughout the s Package to define key terms in the context of. Access Control Access The processes by which

More information

Research Priorities Jean-Pierre Tual, Industrial Relations Director, Strategy and Innovation

Research Priorities Jean-Pierre Tual, Industrial Relations Director, Strategy and Innovation Research Priorities Jean-Pierre Tual, Industrial Relations Director, Strategy and Innovation CELTIC Day, Berlin, June 25 th 2014 Gemalto at a glance 2.4bn revenue 2013 2bn+ end-users benefit from our solutions

More information

The evolution of Social CRM

The evolution of Social CRM In a series of articles Cognizant s Customer Solutions Consulting Practice explores how organizations can use innovation and integration to engage with the new breed of technology fuelled customers of

More information

SOLUTIONS FOR HEALTHCARE PROFESSIONALS AND GOVERNMENTS

SOLUTIONS FOR HEALTHCARE PROFESSIONALS AND GOVERNMENTS SOLUTIONS FOR HEALTHCARE PROFESSIONALS AND GOVERNMENTS The number of people in need of medical care in the world is continuously increasing, as evidenced by the evolving demographic outlook in both developed

More information

BlackBerry Enterprise Solution and RSA SecurID

BlackBerry Enterprise Solution and RSA SecurID Technology Overview BlackBerry Enterprise Solution and RSA SecurID Leveraging Two-Factor Authentication to Provide Secure Access to Corporate Resources Table of Contents Executive Summary 3 Empowering

More information

Connecting IPv6 capable Bluetooth Low Energy sensors with the Internet of Things

Connecting IPv6 capable Bluetooth Low Energy sensors with the Internet of Things Connecting IPv6 capable Bluetooth Low Energy sensors with the Internet of Things Johanna Nieminen (Nokia), Future Internet SHOK preconference 30.05.2012 IoT Taxonomy ZigBee 802.5.4 Bluetooth Video RFID

More information

SecureCom Mobile s mission is to help people keep their private communication private.

SecureCom Mobile s mission is to help people keep their private communication private. About SecureCom Mobile SecureCom Mobile s mission is to help people keep their private communication private. We believe people have a right to share ideas with each other, confident that only the intended

More information

Opinion and recommendations on challenges raised by biometric developments

Opinion and recommendations on challenges raised by biometric developments Opinion and recommendations on challenges raised by biometric developments Position paper for the Science and Technology Committee (House of Commons) Participation to the inquiry on Current and future

More information

TOURISM INNOVATIVE PAYMENT SOLUTIONS. Efficient, flexible, worldwide and secure

TOURISM INNOVATIVE PAYMENT SOLUTIONS. Efficient, flexible, worldwide and secure TOURISM INNOVATIVE PAYMENT SOLUTIONS Efficient, flexible, worldwide and secure 2 THE FUTURE OF PAYMENT FOR THE TOURISM AND TRAVEL BUSINESS The PERFECT PARTNER Wirecard is one of the world s leading independent

More information

Top 10 Anti-fraud Tips: The Cybersecurity Breach Aftermath

Top 10 Anti-fraud Tips: The Cybersecurity Breach Aftermath ebook Top 10 Anti-fraud Tips: The Cybersecurity Breach Aftermath Protecting against downstream fraud attacks in the wake of large-scale security breaches. Digital companies can no longer trust static login

More information

A Solution to the Mobile Wallet Conundrum

A Solution to the Mobile Wallet Conundrum A Solution to the Mobile Wallet Conundrum 2014 Cortex MCP Page 1 Introduction: A new approach is needed to make the Mobile Wallet mainstream More people than ever are using smartphones to place and take

More information

Top 10 Factors That Will Increase Conversion Rates

Top 10 Factors That Will Increase Conversion Rates Top 10 Factors That Will Increase Conversion Rates Top A 3VR 10 Factors WHITEPAPER That Will Increase Conversion Rates 1 Customer Insights We should be using technology to understand who our customers

More information

W3C Web Payment IG. Payment Service Providers. Alibaba Zephyr Tuan

W3C Web Payment IG. Payment Service Providers. Alibaba Zephyr Tuan W3C Web Payment IG Payment Service Providers Alibaba Zephyr Tuan 01 Internet Finance Ecosystem in China 02 Payment Service Provider Requirements 03 Open Questions 01 When Internet Meet Finance Internet

More information

EMV and Restaurants: What you need to know. Mike English. October 2014. Executive Director, Product Development Heartland Payment Systems

EMV and Restaurants: What you need to know. Mike English. October 2014. Executive Director, Product Development Heartland Payment Systems October 2014 EMV and Restaurants: What you need to know Mike English Executive Director, Product Development Heartland Payment Systems 2014 Heartland Payment Systems, Inc. All trademarks, service marks

More information

Changing E-Commerce Trends

Changing E-Commerce Trends Changing E-Commerce Trends E-Commerce trends that will change the way of shopping E-commerce came to existence more than two decades ago. It is still going strong. As per emarketer, worldwide e-commerce

More information