Feeds

iPhone gets NFC tap-cash tech

Externally, though, in 500-user trial

Internet Security Threat Report 2014

Discover is to run trials of pay-by-wave for iPhones in Chicago and Salt Lake City, despite having to strap the requisite radios to the outside of the Jesus mobes' cases.

Apple's iPhone doesn't have the required Near-Field Communication hardware, and NFC Times reports that for the trials Discover will be using the iCarte case, which has an NFC radio and secure component built in. The company is reportedly already testing Android and BlackBerry handsets, but reckons iPhone compatibility is essential.

"A good number of your cardholders are going to be iPhone users. As a network, I need a certified [iPhone] option," the company told NFC Times, explaining that the removable microSD solution touted by Device Fidelity wasn't an option as it adds another layer of complexity.

Device Fidelity's solution also needs a special casing too, as the iPhone doesn't have a microSD slot, but it does mean the microSD card can be switched to a different model of handset, taking the electronic wallet with it.

Discover calls its proximity payment system Zip, as opposed to Visa's PayWave and MasterCard's PayPass. All three systems use NFC technology to make payments and all three are already used in plastic cards, so it should be possible (one day) to have a single phone with all three installed, but don't hold your breath.

While the payment systems are settling into recognisable camps, the whole business of vouchers and electronic coupons is still up for grabs. US network operators have banded together to make ISIS, a platform that hosts the payment cards; in the UK all the operators (except Three) have formed a similar consortium. Those platforms will have to compete with Google Wallet, and other players who will no doubt emerge in the next year or two.

Discover says it's happy to create an instances of Zip that will install on the ISIS platform and Google Wallet, but it's also testing coupons of its own. For the trials those will be on-screen QR Codes or just displayed discounts to be shown to the shopkeeper, but even that demonstrates that Discover is far from ceding control of what's anticipated to be an important market. ®

Beginner's guide to SSL certificates

More from The Register

next story
Facebook pays INFINITELY MORE UK corp tax than in 2012
Thanks for the £3k, Zuck. Doh! you're IN CREDIT. Guess not
Big Content outs piracy hotbeds: São Paulo, Beijing ... TORONTO?
MPAA calls Canadians a bunch of bootlegging movie thieves
Google Glassholes are UNDATEABLE – HP exec
You need an emotional connection, says touchy-feely MD... We can do that
YARR! Pirates walk the plank: DMCA magnets sink in Google results
Spaffing copyrighted stuff over the web? No search ranking for you
Just don't blame Bono! Apple iTunes music sales PLUMMET
Cupertino revenue hit by cheapo downloads, says report
Hungary's internet tax cannot be allowed to set a precedent, says EC
More protests planned against giga-tariff for Tuesday evening
US court SHUTS DOWN 'scammers posing as Microsoft, Facebook support staff'
Netizens allegedly duped into paying for bogus tech advice
prev story

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
New hybrid storage solutions
Tackling data challenges through emerging hybrid storage solutions that enable optimum database performance whilst managing costs and increasingly large data stores.
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.