Feeds

'Mobile eCash' could change the face of commerce

Near field or far, far away?

Providing a secure and efficient Helpdesk

Cash or plastic? From starting with seashells, gold coins, and rewarding soldiers with salt, payment systems have evolved to keep lowering the cost of making each transaction, and separating the real item of value from the point of the transaction.

Bank notes came to represent the value of gold held somewhere else and were far easier to carry, and credit or debit cards helped to identify an individual and link them to their remotely stored pot of gold, bank balance, or debt.

The anonymity, flexibility, and lack of an attached age limit makes cash still a compelling payment instrument, but in the networked age it limits payment to direct contact, and is getting increasingly expensive to process and handle. The dangers of fraud or counterfeiting on the one hand, and the costs and risks of theft or "shrinkage" on the other make cash an increasingly dangerous commodity.

The answer, at least from the smartcard industry, was to move cash to stored value on plastic - e-cash, or some form of prepay system. There have been any number of e-cash deployments, but success is often constrained to a closed group of users or narrow set of transaction types for a limited range of goods or services - transport tickets, or mobile phone calls, for example.

However, as more discrete solutions appear, we will all rapidly end up with a wallet full of e-cash cards to add to a range of credit or debit cards and a plethora of loyalty cards. At one time, smart card vendors offered the promise of universal multi-function cards. However, although the technology is willing, widespread deployment is hindered by the need to bring together diverse commercial agendas such as branding and customer ownership onto a limited piece of plastic real estate - and then there are the infrastructure costs.

There is another problem. If the card itself stores value, how much is on the card at any moment in time? The user might like to know, as although the smart card might have integral security, the anonymous and stored value nature means that once stolen or mislaid, the cash value is lost. Some solutions have pocketable readers with numeric displays, others rely on web portals and user access to the internet. Neither is appealing in a multiple service scenario.

The mobile phone probably is more appealing and is capable of serving such multiple requirements. Alongside their security and payment instruments - a set of keys and wallet or purse - the mobile phone is one of the three items most people are likely to take out with them.

Adding payment to the phone would seem a logical step: after all, there is the payment system in place with the operator, either billed monthly or pre-paid. However, much as mobile operators would like to expand the scope of that payment system, they are not banks, and are limited in scope by transaction value, the cost of processing, and their universal acceptance by merchants as a payment system.

A number of attempts have been made to provide a more uniform, network-independent payment system, along the lines perhaps of the online model for Paypal, but online levels of ease of use rarely translate well enough to a simple mobile experience. There are also software solutions that place an application on the phone, but the varied nature of the software platforms on mobile phones makes this a challenge.

A solution is required that is independent of individual network providers, and broad enough to accommodate multiple payment and receipt instruments in a single phone. While not reliant upon a particular technology, there is an idea to extend the phone hardware that makes this simple enough to be a hit with consumers - providing it can become widely deployed sufficiently quickly.

The current buzz around the edge of the mobile industry is Near Field Communications (NFC), which is essentially the same idea as contact-less smart cards where the user taps or waves their card next to a reader. Companies already use contact-less cards for security access passes and some for employee catering payment systems. Travellers in London or Singapore/HongKong use the Oyster and Octopus cards this way and some users of Mastercard's PayPass in the US will also recognise the concept.

Putting NFC in a device with a SIM (Subscriber Identity Module) and the computing, communications and user interface capabilities of a mobile phone does several things. It provides a wallet for multiple payment systems, a screen to display balances, and the brand identity of the system currently in use, and a way to enter a PIN code to secure use. It also provides the cellular communications link to acquire, update, monitor and securely manage the payment systems.

To put such a solution in place requires skills from the payment services and telecoms industries. It also requires complete interoperability and acceptance by a wide range of companies of standards and common principles. There are already moves afoot to build this consensus, an NFC forum which brings together one group of diverse interests, and a consortium led by Motorola involving a European Commission co-funded initiative. Still early stages and, as yet, the mobile operator community is not as involved as it should be.

However, unlike many of the proposed "killer" applications for mobile phone users - TV, music, internet - which appeal to specific segments of the mobile phone wielding community, the potential appeal of a simple to use "Mobile eCash" is far, far more universal.

As the mobile industry approaches its annual festival of hype at 3GSM in Barcelona, NFC may not be one of the short-lived concepts getting all the (hot) airtime, but as an enabler for financial transactions that everyone could easily use, its impact in the mobile industry and beyond is likely to be far more significant.

The utopian dream of one, personally carried item that safely fulfils our needs for secured access - keys - securely supports our commercial interactions - credit cards, cash, tickets - and our need to communicate with friends and the world in general - the mobile phone - is taking a step closer.

Copyright © 2007, IT-Analysis.com

Protecting against web application threats using SSL

More from The Register

next story
Brit telcos warn Scots that voting Yes could lead to HEFTY bills
BT and Co: Independence vote likely to mean 'increased costs'
Phones 4u slips into administration after EE cuts ties with Brit mobe retailer
More than 5,500 jobs could be axed if rescue mission fails
New 'Cosmos' browser surfs the net by TXT alone
No data plan? No WiFi? No worries ... except sluggish download speed
Radio hams can encrypt, in emergencies, says Ofcom
Consultation promises new spectrum and hints at relaxed licence conditions
Blockbuster book lays out the first 20 years of the Smartphone Wars
Symbian's David Wood bares all. Not for the faint hearted
Bonking with Apple has POUNDED mobe operators' wallets
... into submission. Weve squeals, ditches payment plans
This flashlight app requires: Your contacts list, identity, access to your camera...
Who us, dodgy? Vast majority of mobile apps fail privacy test
Apple Watch will CONQUER smartwatch world – analysts
After Applelocalypse, other wristputers will get stuck in
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.