The Electronic Wallet

Emerging Trends - The Electronic Wallet

Conversant Leaders blog by Cindy McCoy

The MasterCard and Visa commercials have become increasingly persuasive, with examples of using credit cards to speed through the checkout lines, immediately download music, or the ease of making unexpected purchases. The use of that plastic card to facilitate payment is a process that relies on technology standards and practices to protect data integrity and mitigate risk. Emerging technologies support transformations in various industries such as Healthcare, Financial Services, Energy and Environmental. The information presented summarizes current fundamental technology affecting change in the Financial Services sector.

Most networks use broadcast technology to send and receive information. Therefore, careful planning, risk management and monitoring are required to ensure the technology has appropriate security otherwise; network communication technologies may expose the system to additional vulnerabilities. Currently the most significant technology employed to connect payment devices with Point of Sale devices are Infrared, Radio Frequency Identification, Near Field Communication, and Bluetooth. This technology essentially transforms mobile devices into electronic wallets.

  • Infrared is a communication technology similar to a television remote control. Infrared supports financial management and data transfers by sending frequency to Point of Sale terminals or Automated Teller Machines equipped with an Infrared port. The Infrared signal can broadcast for several yards enabling consumers to perform financial transactions between devices and payment terminals.
  • Radio Frequency Identification or RFID uses machine-readable tags that store binary code and contain antennas that talk to network systems, communicating via radio frequency. RFID’s method of storing and accessing data on devices via tags has the potential to create new environments by providing data and information to support professionals, processes, and customers. RFID tags are in many retail products such as key fobs, credit and debit cards. Tags placed inside security badges, products, or devices can be monitored with a transceiver to improve safety or track human, and inventory movement.
  • Near Field Communication or NFC, chips are embedded in mobile devices such as telephones enabling the device to acts as a reader of other NFC devices. This short-range technology similar to RFID shares data and transmits payments enabling devices to act as a contactless payment systems. Consumers can waive a cell phone over a reader and make retail, event, and other purchases.
  • Bluetooth is a wireless radio frequency communication protocol that when employed with existing online authentication infrastructure can approve financial transactions. Bluetooth automatically connects devices as they come in range such as a retail kiosk, or keys to start the car without the key being in the ignition. Bluetooth is detectable at greater distances and compliments a wide range of technologies.

Infrared, Radio Frequency Identification, Near Field Communication, and Bluetooth are complementary technologies that inter-operate with other technologies such as proximity and biometric payments systems and used in conjunction with, ISO 8583, NIST, and EMV can provide unlimited services. Innovative products and services are not without compliance, process, or security challenges. Financial Institutions must comply with federal and state laws, operating rules of clearinghouses, bankcard networks, in addition to congressional laws such as Gramm-Leach-Bliley Act or GLBA and Sarbanes Oxley Act or SOX.

Innovations also make modification of customer identification and authentication methods a necessity. Coupled with electronic banking applications use of open network standards requires reliance on multi-factor authentication and layered security approaches to prevent unauthorized transactions. The approach is effective to address the following areas:

  1. Approval for authorized users
  2. Secure encrypted delivery
  3. Load balancing and clustering architecture to support automatic fail-over and centralized data storage
  4. Logging and log viewing of all client server activities

Cynthia McCoy is a consultant and home business coach that collaborates with companies and individuals helping them do more in the Financial Services, Healthcare, Government, and Information Technology industries. She can be reached at http://dcomcorp.com

Resources:

www.nttdocomo.com.


Comments 9 comments

SimeyC profile image

SimeyC 6 years ago from NJ, USA

Excellent information. The RFID idea really scares me - big brother really is watching us!!!


ConversantLeaders profile image

ConversantLeaders 6 years ago from Virtual USA Author

Hello SimeyC

Thank you and yes big brother has the capability.


zulker 5 years ago

i dont like this


ConversantLeaders profile image

ConversantLeaders 5 years ago from Virtual USA Author

Hello Zulker,

I respect your opinion.

Could you tell me specifically what about the article you do not like?


Lee the Trainer 5 years ago

This technology has begun use in my business, public libraries. People have entered their library bar code into their mobile phones and are authorized to check out books using the phone in conert with the library's infrared scanners. I suppose this supports the idea of "electronic wallets," doesn't it?

Good article, CMcC.


ConversantLeaders profile image

ConversantLeaders 5 years ago from Virtual USA Author

Hello Lee the Trainer,

You are correct!

What benefits other than convenience for the customer does the library derive from using the technology?

What other articles would assist the Trainer?


Paul 5 years ago

I think this sounds like a good idea it will keep everything simple as long as the security is good on these new phones.


ConversantLeaders profile image

ConversantLeaders 5 years ago from Virtual USA Author

Hi Paul,

You touch on a very real concern, especially as more types of mobile devices are introduced to the public. A multi-prong approach is a good start for security. The manufacturer and carrier should provide for all mobile devices minimum-security measures such as:

•The use of gateways between the devices and networks

•Allow configuration of Bluetooth so devices link only to other safe devices

•Encrypt sensitive data as it sits on the mobile devices

We also need resources to vet those app stores that we use to purchase mobile applications.

What concerns you most about security?


Richard 5 years ago

NFC is already being embraced by Payment solution corporations, First Data seem to be at the forefront. I also know that Visa have been working with the phone network giant's Orange and Vodafone to test mobile payments in Spain. Some added reading you might enjoy is on this blog http://tiny.cc/qosvn There is also a cool video about Google Wallet.

    Sign in or sign up and post using a HubPages Network account.

    0 of 8192 characters used
    Post Comment

    No HTML is allowed in comments, but URLs will be hyperlinked. Comments are not for promoting your articles or other sites.


    Click to Rate This Article
    working