803 research outputs found

    Stakeholder Preferences for Mobile Payment Security Platforms: Understanding Trade-offs Between SIM, Embedded and Cloud-based Secure Elements

    Get PDF
    Authentication and identification for mobile payment transactions is typically provided by the secure element. While the SIM-card has long been the only option for locating the secure element, recently alternatives emerged like embedding the secure element into the device or offering it through the cloud. This paper elicits factors that influence stakeholder preferences for these three technical options. Exploratory interviews suggest a wide range of decision-making factors. Our results show that besides the basic security and performance traits of the technical options, other factors can only be understood when framing based on concepts of multisided platforms. The case of secure elements for mobile payments represents a highly complex illustration of platform competition that takes place on three different levels of the technical architecture

    NEAR FIELD COMMUNICATION (NFC) AND SECURE ELEMENT (SE) INTEGRATED GAMING CONTROLLER

    Get PDF
    Disclosed herein is a system 202 for providing an NFC 212 and a SE (Secure Element) 218 integrated gaming controller 210. In particular, when a user 112 taps a contactless payment card 110 on the NFC antenna 212 of the gaming controller 210 for purchasing digital assets, a cryptogram of the contactless payment card 110 is obtained through the APDU exchange by the gaming controller 210 and a device token is thereafter provisioned by a server 230 in communication with the gaming controller 210. This associates the user 112 account with the generated device token which is further used to purchase more digital assets in future without the need for tapping the contactless payment card 110. Further, the generated device token also enables the user 112 to conveniently switch between the different gaming consoles to play with teammates without any friction

    Completely Automated Public Physical test to tell Computers and Humans Apart: A usability study on mobile devices

    Get PDF
    A very common approach adopted to fight the increasing sophistication and dangerousness of malware and hacking is to introduce more complex authentication mechanisms. This approach, however, introduces additional cognitive burdens for users and lowers the whole authentication mechanism acceptability to the point of making it unusable. On the contrary, what is really needed to fight the onslaught of automated attacks to users data and privacy is to first tell human and computers apart and then distinguish among humans to guarantee correct authentication. Such an approach is capable of completely thwarting any automated attempt to achieve unwarranted access while it allows keeping simple the mechanism dedicated to recognizing the legitimate user. This kind of approach is behind the concept of Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA), yet CAPTCHA leverages cognitive capabilities, thus the increasing sophistication of computers calls for more and more difficult cognitive tasks that make them either very long to solve or very prone to false negatives. We argue that this problem can be overcome by substituting the cognitive component of CAPTCHA with a different property that programs cannot mimic: the physical nature. In past work we have introduced the Completely Automated Public Physical test to tell Computer and Humans Apart (CAPPCHA) as a way to enhance the PIN authentication method for mobile devices and we have provided a proof of concept implementation. Similarly to CAPTCHA, this mechanism can also be used to prevent automated programs from abusing online services. However, to evaluate the real efficacy of the proposed scheme, an extended empirical assessment of CAPPCHA is required as well as a comparison of CAPPCHA performance with the existing state of the art. To this aim, in this paper we carry out an extensive experimental study on both the performance and the usability of CAPPCHA involving a high number of physical users, and we provide comparisons of CAPPCHA with existing flavors of CAPTCHA

    A proposed NFC payment application

    Get PDF
    This article has been made available through the Brunel Open Access Publishing Fund. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.Near Field Communication (NFC) technology is based on a short range radio communication channel which enables users to exchange data between devices. With NFC technology, mobile services establish a contactless transaction system to make the payment methods easier for people. Although NFC mobile services have great potential for growth, they have raised several issues which have concerned the researches and prevented the adoption of this technology within societies. Reorganizing and describing what is required for the success of this technology have motivated us to extend the current NFC ecosystem models to accelerate the development of this business area. In this paper, we introduce a new NFC payment application, which is based on our previous “NFC Cloud Wallet” model [1] to demonstrate a reliable structure of NFC ecosystem. We also describe the step by step execution of the proposed protocol in order to carefully analyse the payment application and our main focus will be on the Mobile Network Operator (MNO) as the main player within the ecosystem
    • …
    corecore