Feeds

Mobe operators foresee SIM-based contactless payment

World obstinately fails to revolve around them, though

3 Big data security analytics techniques

Operator alliance GSMA has teamed up with the European Payments Council to work out how mobile payments will work, reaching the shock conclusion that operators are essential in banking.

That conclusion emerges from the snappily-titled "Mobile Contactless Payments Service Management Roles Requirements and Specifications", which maps out various scenarios and architectures for proximity payment systems, all of which place the network operator front and central in the process.

That's remarkable when everyone else in the industry seems to be working out the best way to provide proximity payments without having to go through the operator - not because they hate network operators, necessarily, but because most operators move with the speed of a lazy glacier.

The operators only have one decent card left to play, the SIM, over which they have absolute control. Any proximity-payment system needs a secure element, separated both logically and physically from the handset architecture, and the SIM is perfectly placed to fulfil that role.

The Single Wire Protocol (SWP) gives the SIM access to a near-field antenna, so it can conduct transactions without having to worry about the handset's security - but SWP is three years old now, and beyond technical demonstrations we still have no handsets supporting it.

However, that hasn't stopped the GSMA creating its 70-odd pages of diagrams, explanations and calls to action. The SWP handsets don't exist because operators haven't asked for them, and the GSMA is hoping that it can convince operators they can be at the centre of proximity payment systems. But being operator-centric it assumes that the secure module will be on the SIM, then maps out how banks will come begging to operators to have their client software installed, and how customers will have to ask their operator when they want to change banks.

But that assumption is far from certain. American banks are already running large-scale trials putting their secure module in an micro SD Card, while manufacturers are happily embedding secure modules in the handset - it's hard to imagine Apple doing anything else when (if) it launches an NFC-capable iPhone next year.

Anyone old enough to remember the early days of internet commerce will find the document depressingly familiar: incumbent companies producing lengthy documents outlining how they're going to extend into the new world, while the new world gets on with providing what customers want by any means available. ®

Top three mobile application threats

More from The Register

next story
Virgin Media so, so SORRY for turning spam fire-hose on its punters
Hundreds of emails flood inboxes thanks to gaffe
A black box for your SUITCASE: Now your lost luggage can phone home – quite literally
Breakfast in London, lunch in NYC, and your clothes in Peru
AT&T threatens to pull out of FCC wireless auctions over purchase limits
Company wants ability to buy more spectrum space in auction
Turnbull leaves Australia's broadband blackspots in the dark
New Statement of Expectations to NBN Co offers get-out clauses for blackspot builds
Facebook claims 100 MEEELLION active users in India
Who needs China when you've got the next billion in your sights?
Facebook splats in-app chat, whacks brats into crack yakety-yak app
Jibber-jabbering addicts turfed out just as Zuck warned
Google looks to LTE and Wi-Fi to help it lube YouTube tubes
Bandwidth hogger needs tube embiggenment if it's to succeed
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.