ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

The Electronic Wallet

Updated on February 11, 2018
ConversantLeaders profile image

Cyndi is a multi-dimensional Entrepreneur, Speaker, Business, and IT Consultant for Corporations and Startups.

Emerging Trends - The Electronic Wallet

Conversant Leaders blog by Cyndi Mccoy

The MasterCard and Visa commercials have become increasingly persuasive, with examples of using credit cards to speed through the checkout lines, immediately download music, or the ease of making unexpected purchases. The use of that plastic card to facilitate payment is a process that relies on technology standards and practices to protect data integrity and mitigate risk. Emerging technologies support transformations in various industries such as Healthcare, Financial Services, Energy and Environmental. The information presented summarizes current fundamental technology affecting change in the Financial Services sector.

Most networks use broadcast technology to send and receive information. Therefore, careful planning, risk management and monitoring are required to ensure the technology has appropriate security otherwise; network communication technologies may expose the system to additional vulnerabilities. Currently the most significant technology employed to connect payment devices with Point of Sale devices are Infrared, Radio Frequency Identification, Near Field Communication, and Bluetooth. This technology essentially transforms mobile devices into electronic wallets.

  • Infrared is a communication technology similar to a television remote control. Infrared supports financial management and data transfers by sending frequency to Point of Sale terminals or Automated Teller Machines equipped with an Infrared port. The Infrared signal can broadcast for several yards enabling consumers to perform financial transactions between devices and payment terminals.
  • Radio Frequency Identification or RFID uses machine-readable tags that store binary code and contain antennas that talk to network systems, communicating via radio frequency. RFID’s method of storing and accessing data on devices via tags has the potential to create new environments by providing data and information to support professionals, processes, and customers. RFID tags are in many retail products such as key fobs, credit and debit cards. Tags placed inside security badges, products, or devices can be monitored with a transceiver to improve safety or track human, and inventory movement.
  • Near Field Communication or NFC, chips are embedded in mobile devices such as telephones enabling the device to acts as a reader of other NFC devices. This short-range technology similar to RFID shares data and transmits payments enabling devices to act as a contactless payment systems. Consumers can waive a cell phone over a reader and make retail, event, and other purchases.
  • Bluetooth is a wireless radio frequency communication protocol that when employed with existing online authentication infrastructure can approve financial transactions. Bluetooth automatically connects devices as they come in range such as a retail kiosk, or keys to start the car without the key being in the ignition. Bluetooth is detectable at greater distances and compliments a wide range of technologies.

Infrared, Radio Frequency Identification, Near Field Communication, and Bluetooth are complementary technologies that inter-operate with other technologies such as proximity and biometric payments systems and used in conjunction with, ISO 8583, NIST, and EMV can provide unlimited services. Innovative products and services are not without compliance, process, or security challenges. Financial Institutions must comply with federal and state laws, operating rules of clearinghouses, bankcard networks, in addition to congressional laws such as Gramm-Leach-Bliley Act or GLBA and Sarbanes Oxley Act or SOX.

Innovations also make modification of customer identification and authentication methods a necessity. Coupled with electronic banking applications use of open network standards requires reliance on multi-factor authentication and layered security approaches to prevent unauthorized transactions. The approach is effective to address the following areas:

  1. Approval for authorized users
  2. Secure encrypted delivery
  3. Load balancing and clustering architecture to support automatic fail-over and centralized data storage
  4. Logging and log viewing of all client server activities




© 2010 ConversantLeaders

Comments

    0 of 8192 characters used
    Post Comment

    • profile image

      Richard 

      6 years ago

      NFC is already being embraced by Payment solution corporations, First Data seem to be at the forefront. I also know that Visa have been working with the phone network giant's Orange and Vodafone to test mobile payments in Spain. Some added reading you might enjoy is on this blog http://tiny.cc/qosvn There is also a cool video about Google Wallet.

    • ConversantLeaders profile imageAUTHOR

      ConversantLeaders 

      7 years ago from Virtual USA

      Hi Paul,

      You touch on a very real concern, especially as more types of mobile devices are introduced to the public. A multi-prong approach is a good start for security. The manufacturer and carrier should provide for all mobile devices minimum-security measures such as:

      •The use of gateways between the devices and networks

      •Allow configuration of Bluetooth so devices link only to other safe devices

      •Encrypt sensitive data as it sits on the mobile devices

      We also need resources to vet those app stores that we use to purchase mobile applications.

      What concerns you most about security?

    • profile image

      Paul 

      7 years ago

      I think this sounds like a good idea it will keep everything simple as long as the security is good on these new phones.

    • ConversantLeaders profile imageAUTHOR

      ConversantLeaders 

      7 years ago from Virtual USA

      Hello Lee the Trainer,

      You are correct!

      What benefits other than convenience for the customer does the library derive from using the technology?

      What other articles would assist the Trainer?

    • profile image

      Lee the Trainer 

      7 years ago

      This technology has begun use in my business, public libraries. People have entered their library bar code into their mobile phones and are authorized to check out books using the phone in conert with the library's infrared scanners. I suppose this supports the idea of "electronic wallets," doesn't it?

      Good article, CMcC.

    • ConversantLeaders profile imageAUTHOR

      ConversantLeaders 

      7 years ago from Virtual USA

      Hello Zulker,

      I respect your opinion.

      Could you tell me specifically what about the article you do not like?

    • profile image

      zulker 

      7 years ago

      i dont like this

    • ConversantLeaders profile imageAUTHOR

      ConversantLeaders 

      8 years ago from Virtual USA

      Hello SimeyC

      Thank you and yes big brother has the capability.

    • SimeyC profile image

      Simon Cook 

      8 years ago from NJ, USA

      Excellent information. The RFID idea really scares me - big brother really is watching us!!!

    working

    This website uses cookies

    As a user in the EEA, your approval is needed on a few things. To provide a better website experience, hubpages.com uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

    For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at: https://hubpages.com/privacy-policy#gdpr

    Show Details
    Necessary
    HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
    LoginThis is necessary to sign in to the HubPages Service.
    Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
    AkismetThis is used to detect comment spam. (Privacy Policy)
    HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
    HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
    Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
    CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
    Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the googleapis.com or gstatic.com domains, for performance and efficiency reasons. (Privacy Policy)
    Features
    Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
    Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
    Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
    Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
    Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
    VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
    PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
    Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
    MavenThis supports the Maven widget and search functionality. (Privacy Policy)
    Marketing
    Google AdSenseThis is an ad network. (Privacy Policy)
    Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
    Index ExchangeThis is an ad network. (Privacy Policy)
    SovrnThis is an ad network. (Privacy Policy)
    Facebook AdsThis is an ad network. (Privacy Policy)
    Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
    AppNexusThis is an ad network. (Privacy Policy)
    OpenxThis is an ad network. (Privacy Policy)
    Rubicon ProjectThis is an ad network. (Privacy Policy)
    TripleLiftThis is an ad network. (Privacy Policy)
    Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
    Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
    Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
    Statistics
    Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
    ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
    Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)