Feeds

ISIS signs Gemalto, aims to scoff Google Wallet's lunch

Two thirds of American bonk-banking goes Dutchy

SANS - Survey on application security programs

The ISIS Consortium has awarded the contract for running its NFC platform to Dutch specialist Gemalto, claiming that two thirds of proximity transactions will end up being routed through the company's service.

ISIS can make that claim as it counts AT&T, T-Mobile USA and Verizon as its members, and will be managing the deployment of secure applications using Near Field Communications, including proximity payment systems from the likes of Visa and MasterCard. That puts ISIS in competition with Google Wallet, and while ISIS may come late to the table it still plans on eating the biggest portion.

Near Field Communications is a short-range radio technology being built into high-end smartphones, amongst other things, and once it's linked to a secure element then it can be used to make payments with a tap of the phone. The location of that secure element is still open to debate - Google Wallet embeds it in the telephone, while ISIS would (unsurprisingly) prefer to see it embedded in the (operator-owned) SIM.

Gemalto makes SIMs capable of supporting an NFC secure element, but that's not part of this deal. This announcement is that the company will be providing management software, capable of securely communicating with applications (including payment applications) running within a secure element of any kind, and relaying that communications to a payment provider or similar.

So MasterCard might, for example, create an ISIS-compatible version of it's PayPass (proximity payment) application. MasterCard won't distribute that application, it will be the banks which offer it to their customers (just as credit cards are offered today). That application will be distributed to ISIS-compatible wallets, from when all communications will (for as long as this contract lasts) fall to Gemalto's Allynis Trusted Service Manager software.

No one is saying how much the deal is worth to Gemalto, or how long ISIS has committed to using the company's software, but Gemalto did tell us it's investing considerable resources into the USA to support the expected avalanche of users and that the contract is long enough for it to recoup that investment. ISIS expects the first users to come on line next year, but mass deployment will follow as the technology gets more support from handsets, and the general public.

But it is a big win for Gemalto: ISIS will probably be the world's biggest Trusted Service Manager for some time to come, so Gemalto is now in a very strong position to mop up a decent proportion of other NFC platforms as they launch around the world. ®

High performance access to file storage

More from The Register

next story
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Did a date calculation bug just cost hard-up Co-op Bank £110m?
And just when Brit banking org needs £400m to stay afloat
Sorry London, Europe's top tech city is Munich
New 'Atlas of ICT Activity' finds innovation isn't happening at Silicon Roundabout
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
prev story

Whitepapers

Designing a defence for mobile apps
In this whitepaper learn the various considerations for defending mobile applications; from the mobile application architecture itself to the myriad testing technologies needed to properly assess mobile applications risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.