6,903 research outputs found
A proposed NFC payment application
This article has been made available through the Brunel Open Access Publishing Fund. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.Near Field Communication (NFC) technology is based on a short range radio communication channel which enables users to exchange data between devices. With NFC technology, mobile services establish a contactless transaction system to make the payment methods easier for people. Although NFC mobile services have great potential for growth, they have raised several issues which have concerned the researches and prevented the adoption of this technology within societies. Reorganizing and describing what is required for the success of this technology have motivated us to extend the current NFC ecosystem models to accelerate the development of this business area. In this paper, we introduce a new NFC payment application, which is based on our previous “NFC Cloud Wallet” model [1] to demonstrate a reliable structure of NFC ecosystem. We also describe the step by step execution of the proposed protocol in order to carefully analyse the payment application and our main focus will be on the Mobile Network Operator (MNO) as the main player within the ecosystem
Recommended from our members
Trusted integration of cloud-based NFC transaction players
Near Field Communication (NFC) is a short range wireless technology that provides contactless transmission of data between devices. With an NFC enabled device, users can exchange information from one device to another, make payments and use their NFC enabled device as their identity. As the main payment ecosystem players such as service providers and secure element issuers have crucial roles in a multi-application mobile environment similar to NFC, managing such an environment has become very challenging. One of the technologies that can be used to ensure secure NFC transaction is cloud computing which offers wide range of advantages compare to the use of a Secure Element (SE) as a single entity in an NFC enabled phone. This approach provides a comprehensive leadership of the cloud provider towards managing and controlling customer's information where it allows the SE which is stored within an NFC phone to deal with authentication mechanisms rather than storing and managing sensitive transaction information. This paper discusses the NFC cloud Wallet model which has been proposed by us previously [1] and introduces a different insight that defines a new integrated framework based on a trusted relationship between the vendor and the Mobile Network Operator (MNO). We then carry out an analysis of such a relationship to investigate different possibilities that arise from this approach
Recommended from our members
Mobile transactions over NFC and GSM
Dynamic relationships between Near Field Communication (NFC) ecosystem players in a monetary transaction make them partners in a way that they sometimes require to share access permission to applications that are running in the service environment. One of the technologies that can be used to ensure secure NFC transactions is cloud computing. This offers a wider range of advantages than the use of only a Secure Element (SE) in an NFC enabled mobile phone. In this paper, we propose a protocol for NFC mobile payments over NFC using Global System for Mobile Communications (GSM) authentication. In our protocol, the SE in the mobile device is used for customer authentication whereas the customer's banking credentials are stored in a cloud under the control of the Mobile Network Operator (MNO). The proposed protocol eliminates the requirement for a shared secret between the Point of Sale (PoS) and the MNO before execution of the protocol, a mandatory requirement in the earlier version of this protocol. This elimination makes the protocol more practicable and user friendly. A detailed analysis of the protocol discusses multiple attack scenarios
1-(4,6-Dimethylpyrimidin-2-yl)thiourea
In the crystal structure of the title compound, C7H10N4S, weak intermolecular N—H⋯S interactions form a two-dimensional network parallel to the ab plane. An intramolecular N—H⋯N hydrogen bond occurs
An approximate dynamic programming approach to food security of communities following hazards
Food security can be threatened by extreme natural hazard events for
households of all social classes within a community. To address food security
issues following a natural disaster, the recovery of several elements of the
built environment within a community, including its building portfolio, must be
considered. Building portfolio restoration is one of the most challenging
elements of recovery owing to the complexity and dimensionality of the problem.
This study introduces a stochastic scheduling algorithm for the identification
of optimal building portfolio recovery strategies. The proposed approach
provides a computationally tractable formulation to manage multi-state,
large-scale infrastructure systems. A testbed community modeled after Gilroy,
California, is used to illustrate how the proposed approach can be implemented
efficiently and accurately to find the near-optimal decisions related to
building recovery following a severe earthquake.Comment: As opposed to the preemptive scheduling problem, which was addressed
in multiple works by us, we deal with a non-preemptive stochastic scheduling
problem in this work. Submitted to 13th International Conference on
Applications of Statistics and Probability in Civil Engineering, ICASP13
Seoul, South Korea, May 26-30, 201
Theory of correlations in strongly interacting fluids of two-dimensional dipolar bosons
Ground-state properties of a two-dimensional fluid of bosons with repulsive
dipole-dipole interactions are studied by means of the Euler-Lagrange
hypernetted-chain approximation. We present a self-consistent semi-analytical
theory of the pair distribution function and ground-state energy of this
system. Our approach is based on the solution of a zero-energy scattering
Schr\"{o}dinger equation for the "pair amplitude" with an
effective potential from Jastrow-Feenberg correlations. We find excellent
agreement with quantum Monte Carlo results over a wide range of coupling
strength, nearly up to the critical coupling for the liquid-to-crystal quantum
phase transition. We also calculate the one-body density matrix and related
quantities, such as the momentum distribution function and the condensate
fraction.Comment: 8 pages, 8 figures, submitte
- …