Feeds

Mobe operators foresee SIM-based contactless payment

World obstinately fails to revolve around them, though

Remote control for virtualized desktops

Operator alliance GSMA has teamed up with the European Payments Council to work out how mobile payments will work, reaching the shock conclusion that operators are essential in banking.

That conclusion emerges from the snappily-titled "Mobile Contactless Payments Service Management Roles Requirements and Specifications", which maps out various scenarios and architectures for proximity payment systems, all of which place the network operator front and central in the process.

That's remarkable when everyone else in the industry seems to be working out the best way to provide proximity payments without having to go through the operator - not because they hate network operators, necessarily, but because most operators move with the speed of a lazy glacier.

The operators only have one decent card left to play, the SIM, over which they have absolute control. Any proximity-payment system needs a secure element, separated both logically and physically from the handset architecture, and the SIM is perfectly placed to fulfil that role.

The Single Wire Protocol (SWP) gives the SIM access to a near-field antenna, so it can conduct transactions without having to worry about the handset's security - but SWP is three years old now, and beyond technical demonstrations we still have no handsets supporting it.

However, that hasn't stopped the GSMA creating its 70-odd pages of diagrams, explanations and calls to action. The SWP handsets don't exist because operators haven't asked for them, and the GSMA is hoping that it can convince operators they can be at the centre of proximity payment systems. But being operator-centric it assumes that the secure module will be on the SIM, then maps out how banks will come begging to operators to have their client software installed, and how customers will have to ask their operator when they want to change banks.

But that assumption is far from certain. American banks are already running large-scale trials putting their secure module in an micro SD Card, while manufacturers are happily embedding secure modules in the handset - it's hard to imagine Apple doing anything else when (if) it launches an NFC-capable iPhone next year.

Anyone old enough to remember the early days of internet commerce will find the document depressingly familiar: incumbent companies producing lengthy documents outlining how they're going to extend into the new world, while the new world gets on with providing what customers want by any means available. ®

Intelligent flash storage arrays

More from The Register

next story
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
Broadband sellers in the UK are UP TO no good, says Which?
Speedy network claims only apply to 10% of customers
Virgin Media struck dumb by NATIONWIDE packet loss balls-up
Turning it off and on again fixes glitch 12 HOURS LATER
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Fujitsu CTO: We'll be 3D-printing tech execs in 15 years
Fleshy techie disses network neutrality, helmet-less motorcyclists
Facebook, working on Facebook at Work, works on Facebook. At Work
You don't want your cat or drunk pics at the office
Soz, web devs: Google snatches its Wallet off the table
Killing off web service in 3 months... but app-happy bonkers are fine
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Internet Security Threat Report 2014
An overview and analysis of the year in global threat activity: identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape.