Feeds

Barclays heralds new wave of wallet-waving

Contactless tech going in cards - data-gathering to follow

The Power of One eBook: Top reasons to choose HP BladeSystem

Barclays Bank is to embed contactless technology into every debit card issued from this day forward, allowing punters to pay for coffee with a wave of the wallet - providing they can find somewhere that accepts the new technology.

Barclays has had a contactless card for a while now; the OnePulse, which also has an Oyster card embedded for use on the London underground. But that was only available to Londoners for obvious reasons. Now everyone with a debit card is going to be wirelessly enabled, next time their card is replaced, which the companies involved hope will kickstart the wireless-payments industry.

The system is based on Visa's payWave system, which is compatible with Mastercard's PayPass, and processes transactions of up to a tenner by waving the card near the reader. Every now and then, at random or in response to unusual behaviour, the user will have to put the card in a normal reader and enter their PIN in the existing manner.

The security mechanisms employed are challenge/response, and subject to the usual concerns about interception and transaction replication. The communication protocol used by both Visa and Mastercard conforms to the EMV specification, though the kernel and encryption systems are kept secret - a strategy which rarely works out for the best, though given the £10 transaction cap and the ability to fall back on the PIN the security issues would seem minimal.

However, while most debit-card transactions are performed online, so the customer's bank balance is checked before the transaction is authorised, PayWave transactions always take place offline, which will no doubt delight students everywhere - especially as the pubs start accepting them.

More concerning is the ability of the banks to collect usage information about all those cash transactions; they'll know where you drink coffee, what paper you read and how much you spend on cigarettes. It will make for almost as much data as the supermarkets are already collecting through your loyalty card.

Merchants apparently gain from faster transaction times, and thus shorter queues, though given that debit cards normally charge a minimum fee for each transaction they would seem ill-suited to a large number of small transactions. We put that point to Barclays, who pointed us to Barclaycard as they are handling negotiations with merchants, and we are still awaiting comment on the matter from them. ®

Designing a Defense for Mobile Applications

More from The Register

next story
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.