21 research outputs found
A proposed NFC payment application
This article has been made available through the Brunel Open Access Publishing Fund. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.Near Field Communication (NFC) technology is based on a short range radio communication channel which enables users to exchange data between devices. With NFC technology, mobile services establish a contactless transaction system to make the payment methods easier for people. Although NFC mobile services have great potential for growth, they have raised several issues which have concerned the researches and prevented the adoption of this technology within societies. Reorganizing and describing what is required for the success of this technology have motivated us to extend the current NFC ecosystem models to accelerate the development of this business area. In this paper, we introduce a new NFC payment application, which is based on our previous βNFC Cloud Walletβ model [1] to demonstrate a reliable structure of NFC ecosystem. We also describe the step by step execution of the proposed protocol in order to carefully analyse the payment application and our main focus will be on the Mobile Network Operator (MNO) as the main player within the ecosystem
Recommended from our members
Trusted integration of cloud-based NFC transaction players
Near Field Communication (NFC) is a short range wireless technology that provides contactless transmission of data between devices. With an NFC enabled device, users can exchange information from one device to another, make payments and use their NFC enabled device as their identity. As the main payment ecosystem players such as service providers and secure element issuers have crucial roles in a multi-application mobile environment similar to NFC, managing such an environment has become very challenging. One of the technologies that can be used to ensure secure NFC transaction is cloud computing which offers wide range of advantages compare to the use of a Secure Element (SE) as a single entity in an NFC enabled phone. This approach provides a comprehensive leadership of the cloud provider towards managing and controlling customer's information where it allows the SE which is stored within an NFC phone to deal with authentication mechanisms rather than storing and managing sensitive transaction information. This paper discusses the NFC cloud Wallet model which has been proposed by us previously [1] and introduces a different insight that defines a new integrated framework based on a trusted relationship between the vendor and the Mobile Network Operator (MNO). We then carry out an analysis of such a relationship to investigate different possibilities that arise from this approach
Recommended from our members
Mobile transactions over NFC and GSM
Dynamic relationships between Near Field Communication (NFC) ecosystem players in a monetary transaction make them partners in a way that they sometimes require to share access permission to applications that are running in the service environment. One of the technologies that can be used to ensure secure NFC transactions is cloud computing. This offers a wider range of advantages than the use of only a Secure Element (SE) in an NFC enabled mobile phone. In this paper, we propose a protocol for NFC mobile payments over NFC using Global System for Mobile Communications (GSM) authentication. In our protocol, the SE in the mobile device is used for customer authentication whereas the customer's banking credentials are stored in a cloud under the control of the Mobile Network Operator (MNO). The proposed protocol eliminates the requirement for a shared secret between the Point of Sale (PoS) and the MNO before execution of the protocol, a mandatory requirement in the earlier version of this protocol. This elimination makes the protocol more practicable and user friendly. A detailed analysis of the protocol discusses multiple attack scenarios
Ethical, legal and social aspects of the approach in Sudan
The global malaria situation, especially in Africa, and the problems frequently encountered in chemical control of vectors such as insecticide resistance, emphasize the urgency of research, development and implementation of new vector control technologies that are applicable at regional and local levels. The successful application of the sterile insect technique (SIT) for the control of the New World screwworm Cochliomyia hominivorax and several species of fruit flies has given impetus to the use of this method for suppression or elimination of malaria vectors in some areas of Africa including Northern State of Sudan. The research and development phase of the Northern State feasibility study has been started. Sudanese stakeholders are working side-by-side with the International Atomic Energy Agency in the activities of this important phase. Several ethical, legal and social issues associated with this approach arose during this phase of the project. They need to be seriously considered and handled with care. In this paper, these issues are described, and the current and proposed activities to overcome potential hurdles to ensure success of the project are listed
Spatial Segregation of BMP/Smad Signaling Affects Osteoblast Differentiation in C2C12 Cells
BACKGROUND: Bone morphogenetic proteins (BMPs) are involved in a plethora of cellular processes in embryonic development and adult tissue homeostasis. Signaling specificity is achieved by dynamic processes involving BMP receptor oligomerization and endocytosis. This allows for spatiotemporal control of Smad dependent and non-Smad pathways. In this study, we investigate the spatiotemporal regulation within the BMP-induced Smad transcriptional pathway. METHODOLOGY/PRINCIPAL FINDINGS: Here we discriminate between Smad signaling events that are dynamin-dependent (i.e., require an intact endocytic pathway) and dynamin-independent. Inhibition of dynamin-dependent endocytosis in fluorescence microscopy and fractionation studies revealed a delay in Smad1/5/8 phosphorylation and nuclear translocation after BMP-2 stimulation of C2C12 cells. Using whole genome microarray and qPCR analysis, we identified two classes of BMP-2 induced genes that are differentially affected by inhibition of endocytosis. Thus, BMP-2 induced gene expression of Id1, Id3, Dlx2 and Hey1 is endocytosis-dependent, whereas BMP-2 induced expression of Id2, Dlx3, Zbtb2 and Krt16 is endocytosis-independent. Furthermore, we demonstrate that short term inhibition of endocytosis interferes with osteoblast differentiation as measured by alkaline phosphatase (ALP) production and qPCR analysis of osteoblast marker gene expression. CONCLUSIONS/SIGNIFICANCE: Our study demonstrates that dynamin-dependent endocytosis is crucial for the concise spatial activation of the BMP-2 induced signaling cascade. Inhibition of endocytic processes during BMP-2 stimulation leads to altered Smad1/5/8 signaling kinetics and results in differential target gene expression. We show that interfering with the BMP-2 induced transcriptional network by endocytosis inhibition results in an attenuation of osteoblast differentiation. This implies that selective sensitivity of gene expression to endocytosis provides an additional mechanism for the cell to respond to BMP in a context specific manner. Moreover, we suggest a novel Smad dependent signal cascade induced by BMP-2, which does not require endocytosis
Inflammatory Gene Regulatory Networks in Amnion Cells Following Cytokine Stimulation: Translational Systems Approach to Modeling Human Parturition
A majority of the studies examining the molecular regulation of human labor have
been conducted using single gene approaches. While the technology to produce
multi-dimensional datasets is readily available, the means for facile analysis
of such data are limited. The objective of this study was to develop a systems
approach to infer regulatory mechanisms governing global gene expression in
cytokine-challenged cells in vitro, and to apply these methods
to predict gene regulatory networks (GRNs) in intrauterine tissues during term
parturition. To this end, microarray analysis was applied to human amnion
mesenchymal cells (AMCs) stimulated with interleukin-1Ξ², and differentially
expressed transcripts were subjected to hierarchical clustering, temporal
expression profiling, and motif enrichment analysis, from which a GRN was
constructed. These methods were then applied to fetal membrane specimens
collected in the absence or presence of spontaneous term labor. Analysis of
cytokine-responsive genes in AMCs revealed a sterile immune response signature,
with promoters enriched in response elements for several inflammation-associated
transcription factors. In comparison to the fetal membrane dataset, there were
34 genes commonly upregulated, many of which were part of an acute inflammation
gene expression signature. Binding motifs for nuclear factor-ΞΊB were
prominent in the gene interaction and regulatory networks for both datasets;
however, we found little evidence to support the utilization of
pathogen-associated molecular pattern (PAMP) signaling. The tissue specimens
were also enriched for transcripts governed by hypoxia-inducible factor. The
approach presented here provides an uncomplicated means to infer global
relationships among gene clusters involved in cellular responses to
labor-associated signals