Feeds

Wave of the Future? Smartphone NFC used to buy stuff ONLINE

Like pay-bonking but across great distances

Internet Security Threat Report 2014

Mastercard has started trials of online payments using the secure element in an NFC handset in France, and it looks like it could quickly become the standard way to buy stuff on the internet.

The trial involves 160 staff at ING Bank in Paris, who've been given Galaxy SIII handsets and a PayPass account to play with. When shopping online, via the web, they are offered the chance to authenticate using the phone. The phone then asks for a PIN and generates a cryptographic authentication, all of which takes place over the cellular network rather than the public internet as NFC Times reports.

The process sounds more complicated than it is, and needs to be compared to the existing system of sending credit card details over the internet. Today's systems not only expose the credit card numbers to malware running on the PC, but they also (generally) result in those details being shared with the retailer - so one's security becomes dependent on the security of that retailer and its staff.

Such transactions are known as "card not present" and the credit card companies charge a rate which reflects their propensity to fraud. The critical question now is if handset-secured payments will incur the lower "card present" charge, which would certainly result in very rapid adoption by retailers.

NFC Times asked the question, but no decision has yet been made. Mastercard and IMG are apparently still deciding if the technique is a goer before working out how much to charge for it.

Good security comes from paired tokens - generally one provided from your side and another recognisable one from a source you know and trust - with possession of only one being insufficient. Using a credit card on the internet proves almost nothing, while the passwords introduced by Verified By Visa and similar schemes introduce "something you know" they still lack the critical physical component.

Barclays PINSentry is a good example of how far banks will go to complete the pair: the physical card-reader posted out to every customer is now used to prove possession of the card (not just the numbers on the card) and knowledge of the PIN, increasing security enormously.

The secure element in an NFC phone can fulfil the same role, and one can easily imagine Verified By Visa being replaced with such a system, and proving very popular if the lower rates were charged. It might not be as sexy as paying for a frappuccino with a bonk of the phone, but if it can reduce internet fraud, then it could prove equally revolutionary. ®

Internet Security Threat Report 2014

More from The Register

next story
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
Broadband sellers in the UK are UP TO no good, says Which?
Speedy network claims only apply to 10% of customers
Virgin Media struck dumb by NATIONWIDE packet loss balls-up
Turning it off and on again fixes glitch 12 HOURS LATER
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Fujitsu CTO: We'll be 3D-printing tech execs in 15 years
Fleshy techie disses network neutrality, helmet-less motorcyclists
Facebook, working on Facebook at Work, works on Facebook. At Work
You don't want your cat or drunk pics at the office
Soz, web devs: Google snatches its Wallet off the table
Killing off web service in 3 months... but app-happy bonkers are fine
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.