Feeds

'Mobile eCash' could change the face of commerce

Near field or far, far away?

Designing a Defense for Mobile Applications

Cash or plastic? From starting with seashells, gold coins, and rewarding soldiers with salt, payment systems have evolved to keep lowering the cost of making each transaction, and separating the real item of value from the point of the transaction.

Bank notes came to represent the value of gold held somewhere else and were far easier to carry, and credit or debit cards helped to identify an individual and link them to their remotely stored pot of gold, bank balance, or debt.

The anonymity, flexibility, and lack of an attached age limit makes cash still a compelling payment instrument, but in the networked age it limits payment to direct contact, and is getting increasingly expensive to process and handle. The dangers of fraud or counterfeiting on the one hand, and the costs and risks of theft or "shrinkage" on the other make cash an increasingly dangerous commodity.

The answer, at least from the smartcard industry, was to move cash to stored value on plastic - e-cash, or some form of prepay system. There have been any number of e-cash deployments, but success is often constrained to a closed group of users or narrow set of transaction types for a limited range of goods or services - transport tickets, or mobile phone calls, for example.

However, as more discrete solutions appear, we will all rapidly end up with a wallet full of e-cash cards to add to a range of credit or debit cards and a plethora of loyalty cards. At one time, smart card vendors offered the promise of universal multi-function cards. However, although the technology is willing, widespread deployment is hindered by the need to bring together diverse commercial agendas such as branding and customer ownership onto a limited piece of plastic real estate - and then there are the infrastructure costs.

There is another problem. If the card itself stores value, how much is on the card at any moment in time? The user might like to know, as although the smart card might have integral security, the anonymous and stored value nature means that once stolen or mislaid, the cash value is lost. Some solutions have pocketable readers with numeric displays, others rely on web portals and user access to the internet. Neither is appealing in a multiple service scenario.

The mobile phone probably is more appealing and is capable of serving such multiple requirements. Alongside their security and payment instruments - a set of keys and wallet or purse - the mobile phone is one of the three items most people are likely to take out with them.

Adding payment to the phone would seem a logical step: after all, there is the payment system in place with the operator, either billed monthly or pre-paid. However, much as mobile operators would like to expand the scope of that payment system, they are not banks, and are limited in scope by transaction value, the cost of processing, and their universal acceptance by merchants as a payment system.

A number of attempts have been made to provide a more uniform, network-independent payment system, along the lines perhaps of the online model for Paypal, but online levels of ease of use rarely translate well enough to a simple mobile experience. There are also software solutions that place an application on the phone, but the varied nature of the software platforms on mobile phones makes this a challenge.

A solution is required that is independent of individual network providers, and broad enough to accommodate multiple payment and receipt instruments in a single phone. While not reliant upon a particular technology, there is an idea to extend the phone hardware that makes this simple enough to be a hit with consumers - providing it can become widely deployed sufficiently quickly.

The current buzz around the edge of the mobile industry is Near Field Communications (NFC), which is essentially the same idea as contact-less smart cards where the user taps or waves their card next to a reader. Companies already use contact-less cards for security access passes and some for employee catering payment systems. Travellers in London or Singapore/HongKong use the Oyster and Octopus cards this way and some users of Mastercard's PayPass in the US will also recognise the concept.

Putting NFC in a device with a SIM (Subscriber Identity Module) and the computing, communications and user interface capabilities of a mobile phone does several things. It provides a wallet for multiple payment systems, a screen to display balances, and the brand identity of the system currently in use, and a way to enter a PIN code to secure use. It also provides the cellular communications link to acquire, update, monitor and securely manage the payment systems.

To put such a solution in place requires skills from the payment services and telecoms industries. It also requires complete interoperability and acceptance by a wide range of companies of standards and common principles. There are already moves afoot to build this consensus, an NFC forum which brings together one group of diverse interests, and a consortium led by Motorola involving a European Commission co-funded initiative. Still early stages and, as yet, the mobile operator community is not as involved as it should be.

However, unlike many of the proposed "killer" applications for mobile phone users - TV, music, internet - which appeal to specific segments of the mobile phone wielding community, the potential appeal of a simple to use "Mobile eCash" is far, far more universal.

As the mobile industry approaches its annual festival of hype at 3GSM in Barcelona, NFC may not be one of the short-lived concepts getting all the (hot) airtime, but as an enabler for financial transactions that everyone could easily use, its impact in the mobile industry and beyond is likely to be far more significant.

The utopian dream of one, personally carried item that safely fulfils our needs for secured access - keys - securely supports our commercial interactions - credit cards, cash, tickets - and our need to communicate with friends and the world in general - the mobile phone - is taking a step closer.

Copyright © 2007, IT-Analysis.com

HP ProLiant Gen8: Integrated lifecycle automation

More from The Register

next story
Scotland's BIG question: Will independence cost me my broadband?
They can take our lives, but they'll never take our SPECTRUM
Bring back error correction, say Danish 'net boffins
We don't need no steenkin' TCP/IP retransmission and the congestion it causes
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
NBN Co adds apartments to FTTP rollout
Commercial trial locations to go live in September
Samsung Z Tizen OS mobe is post-phoned – this time for good?
Russian launch for Sammy's non-droid knocked back
Telstra to KILL 2G network by end of 2016
GSM now stands for Grave-Seeking-Mobile network
Seeking LTE expert to insert small cells into BT customers' places
Is this the first step to a FON-a-like 4G network?
What FTC lawsuit? T-Mobile US touts 10GB, $100 family-of-4 plan
Folks 'could use that money for more important things' says CEO Legere
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Securing Web Applications Made Simple and Scalable
Learn how automated security testing can provide a simple and scalable way to protect your web applications.