Feeds

PayPal to move into the shop - without cards or NFC

Skip the queues, scan barcodes with your phone

Website security in corporate America

PayPal is consigning the shop till to the dustbin in a way that could completely wipe Visa and MasterCard out of the shopping equation.

The website is gearing up to allow punters to pay for products in-store by scanning barcodes with a mobile, and allow payments to be authorised with a phone number - among other new features.

Merchants will be able to push location-based adverts and vouchers, and the site will offer a buy-now-pay-later service. What's more, there's no demand for an NFC chip.

Some strategic start-up acquisitions, including the snapping up of BillMeLater.com and shop search website Milo.com, have given PayPal the firepower to break into these new areas.

PayPal has whizzed up a glossy video explaining it all, but here's how a shopping trip could play out in the future:

  1. Payment at the till with your mobile number: Tap in your phone number and PIN at the cash register to authorise a payment from your chosen bank account. No credit card is involved.
  2. Payment at the till with a PayPal card: Customers who like the feel of plastic can use a PayPal card, which is not associated with a bank and just needs a swipe and correct PIN.
  3. Payment with your phone: Scan a barcode with your mobile in a shop and pay for it immediately with an app, skipping the checkout queues.
  4. Finding and ordering products on your phone in the shop and get them delivered to your house: You see a t-shirt in a shop, but they don't have it in your size. You can scan the barcode again, search through the shop's inventory for one that's right (using technology that PayPal bought from Milo), buy it on your phone, and order it for delivery to your house.

One major strength of the PayPal model is that it doesn't necessarily require new kit for the consumer and merchant, giving it the edge over wireless NFC-based rivals.

The other is that PayPal already has 100m customers. ®

Reducing the cost and complexity of web vulnerability management

More from The Register

next story
Hey, Scots. Microsoft's Bing thinks you'll vote NO to independence
World's top Google-finding website calls it for the UK
Phones 4u slips into administration after EE cuts ties with Brit mobe retailer
More than 5,500 jobs could be axed if rescue mission fails
Apple CEO Tim Cook: TV is TERRIBLE and stuck in the 1970s
The iKing thinks telly is far too fiddly and ugly – basically, iTunes
Israeli spies rebel over mass-snooping on innocent Palestinians
'Disciplinary treatment will be sharp and clear' vow spy-chiefs
Huawei ditches new Windows Phone mobe plans, blames poor sales
Giganto mobe firm slams door shut on Microsoft. OH DEAR
Phones 4u website DIES as wounded mobe retailer struggles to stay above water
Founder blames 'ruthless network partners' for implosion
Found inside ISIS terror chap's laptop: CELINE DION tunes
REPORT: Stash of terrorist material found in Syria Dell box
OECD lashes out at tax avoiding globocorps' location-flipping antics
You hear that, Amazon, Google, Microsoft et al?
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.