46,638 research outputs found

    Innovations, incentives, and regulation: forces shaping the payments environment

    Get PDF
    The migration to more efficient payment mechanisms is affected by innovations, incentives, and regulation. While advances in technology have yielded numerous payment method alternatives, many have not been widely adopted. A recent Chicago Fed conference explored why certain payment innovations have been more successful than others.Payment systems

    RFID Demystified: Part 3. Company Case Studies.

    Get PDF
    In the previous two parts of RFID Demystified we have discussed the technology, possible benefits and areas of application for with Radio Frequency Identification (RFID) systems. In this final part we review Company Case-Studies of those who have decided to apply the technology within their organisation. It will be seen that considerable benefits are being experienced within some organisations, pilot applications are increasing our learning and providing a foundation for the future success of projects in this area

    Personal on-line payments

    Get PDF
    The swift growth of e-commerce and the Internet has led to the development of a new form of electronic funds transfer—the personal on-line payment—that uses web and e-mail technologies to initiate and confirm payments. This article describes this payment instrument and the trends that have given rise to it. The authors explain that personal on-line payment systems are already providing a convenient alternative to checks, money orders, and cash, and may replace credit cards for some small-scale retail e-commerce. However, issues such as the interoperability of diverse systems and the systems’ inherent risks will continue to be central. The authors also suggest that although personal on-line payment systems are not likely to have a great impact on monetary policy, they do raise regulatory issues associated with consumer rights and protection.Electronic funds transfers ; Electronic commerce ; Payment systems ; Finance, Personal

    Cell me the money: unlocking the value in the mobile payment ecosystem

    Get PDF
    This report examines the challenges and benefits of mobile commerce in the United States. The report is based on a survey of senior executives from the mobile payment value chain. Survey results shed light on the key barriers that have traditionally challenged the mobile payment market in the United States, including the lack of revenue-sharing agreements, a dearth of consumer knowledge, low levels of demand and competing platforms in a fragmented market. Getting ahead of the curve will require companies to develop mutually beneficial business models and take advantage of further innovations made on the mobile platform. Ultimately, mobile carriers and financial institutions must come to the table and sacrifice in the short-term to create an opportunity to win big down the road

    Analysis of roles and position of mobile network operators in mobile payment infrastructure

    Get PDF
    A number of different mobile payment solutions have been presented the last decade. The phone subscription with its security mechanisms are used for user identification and payments. This is the case for SMS based payment and ticketing systems that are getting more and more popular. However, there are other ways to implement a Trusted Element (TE) , where a SIM card architecture is only one. It can be in the mobile phone, as a separate integrated circuit, as an optional customer deployed plug-in device (e.g., microSD) or be running as an application on a server existing entirely as software. In this paper we analyze what roles and responsibilities different actors have in different types of mobile payments solutions. The main focus is on the implications for the mobile operator business. It turns out that new types of intermediary actors in most cases play an important role. Sometimes mobile operators are not even involved. The emergence of new payment together with other non-SIM card based TE solutions opens up for many different market scenarios for mobile payment services. --

    The Data Breach Dilemma: Proactive Solutions for Protecting Consumers’ Personal Information

    Get PDF
    Data breaches are an increasingly common part of consumers’ lives. No institution is immune to the possibility of an attack. Each breach inevitably risks the release of consumers’ personally identifiable information and the strong possibility of identity theft. Unfortunately, current solutions for handling these incidents are woefully inadequate. Private litigation like consumer class actions and shareholder lawsuits each face substantive legal and procedural barriers. States have their own data security and breach notification laws, but there is currently no unifying piece of legislation or strong enforcement mechanism. This Note argues that proactive solutions are required. First, a national data security law—setting minimum data security standards, regulating the use and storage of personal information, and expanding the enforcement role of the Federal Trade Commission—is imperative to protect consumers’ data. Second, a proactive solution requires reconsidering how to minimize the problem by going to its source: the collection of personally identifiable information in the first place. This Note suggests regulating companies’ collection of Social Security numbers, and, eventually, using a system based on distributed ledger technology to replace the ubiquity of Social Security numbers

    BUMP TO INITIATE AUTHENTICATION BASED TOKEN ON A MOVING DEVICE

    Get PDF
    The present invention aims to employ the second device for propagating to the loyalty model to allow a user to access a temporary card token without disclosing primary account number (PAN) information. A first device (101) is pre-registered with the software development kit (SDK) of the user\u27s payment network provider for authorization tokens without disclosing card information. In addition, if a token is bumped on the dashboard of the first device, a token of low value might be sent to the second device based on the consolidated loyalty score of the devices. A silent push message sent by the payment network provider is forwarded by the Issuer to the second device (102). An Instant Token of the specified amount is generated on the second device after it has verified the push message\u27s authenticity. Utilizing the identity data from the second device, Issuer will bill the customer for the transaction
    • …
    corecore