SlideShare ist ein Scribd-Unternehmen logo
1 von 61
Accessing Pay Buy Mobile Model
             by:
  Muhammad Ary Murti (ITTelkom)
Arief Hamdani Gunawan (Telkom Indonesia)
The Core Business
As of June 30, 2009 :
Penetration in Telco Industry
As of June 30, 2009 :
AGENDA
Accessing Pay Buy Mobile Model
• NFC M-Payment services
• Proposition
• Ecosystem and Value chain
• Pay-Buy-Mobile Business Models
• Mobile NFC Technical Guidelines
Mobile Technology Options


                      USSD
Telekomunikasi Seluler Indonesia : T-Cash
Merchant Category          %
Retail                   94.0%           Features :
Fashion/ Life style      1.2%
Bill Payment             0.1%            1.Cash in
Education & University   0.4%
                                         2.Purchase
Food and beverage        0.8%
Insurance                0.0%            3.Online Purchase
Portal                   0.1%            4.Bill Payment
Cellular Shop            0.5%            5.P2P Transfer
Telkomsel Channel        1.1%            6.Cash Out
Others                   1.6%
               Number of partners : over 150 companies
Telekomunikasi Seluler Indonesia : T-Cash
Telekomunikasi Seluler Indonesia : T-Cash

               Telkomsel Cash User (t-cash)
                                                             630,287
800,000                                                            728,171
                                                       604,754
600,000
                                   482,236
                                         503,267   531,557
400,000                       348,587
                                              513,511
                         112,076
200,000   103,709   108,898
               104,935
     -
Pay-Buy-Mobile
is a Mobile Network Operator (MNO)-led,
           GSMA initiative,
        for using mobile phones
             to make fast,
           secure payments
        in a retail environment
using Near Field Communications (NFC)/
        contactless technology.
Contactless smart card technology
• is typically used  transport, building access
  applications, as well as holding medical data.
• Several varieties of contactless technology exist today:
  of most interest  NFC technology.
• NFC is designed to operate over very short distances,
  typically less than 4 Cm
• Contactless technology provides an intuitive and easy
  method for users to access services, as demonstrated
  by the rapid deployment of contactless public transport
  systems globally with many users.
• The technology has also been identified as a key
  sector for payment solutions.
Mobile NFC
• the combination of contactless services based on
  NFC technology with mobile telephony,
• offers substantial advantages over basic contactless
  smart card technology, including:
   – peer-to-peer communications;
   – high-speed two-way communications; and
   – access to facilities on the mobile phone, such as the
      screen, communications link, keyboard, memory and
      processing power.
• This opens up the possibility of more complex and
  interactive applications, as well as the ability to modify
  applications on the phone via the communications link,
  for example, to download software or disable
  functionality.
Pay-Buy-Mobile initiative
• 34 of the world’s largest MNOs (KTF, AT&T, China Mobile
  Communications Corporation, Chunghwa Telecom, Far EasTone,
  Kall, KPN, Maxis, MCI, Meteor, Mobilkom Austria, Mobitel d.d.,
  MTN, NTT DoCoMo, O2, Orange, Pelephone, Partner/Orange,
  Rogers, SFR, Singtel, SK Telecom, SMART, Softbank, Starhub,
  Telenor, TeliaSonera, Telecom Italia, Telstra, Turkcell, Vimpelcom,
  Vodafone, Wind)
• serving more than 1.3 billion customers, have been
  working together on the Pay- Buy-Mobile initiative, to
  create and define a global approach to enable NFC
  payment services on mobile phones.
• which is key to enabling the development of a new
  market and to prevent market fragmentation.
NFC M-Payment services
• Among a wide range of contactless services, NFC M-
  Payment services are the most eagerly anticipated.
   – Customer feedback from usage of contactless mobile payment
     services, and trials and surveys conducted throughout the world,
     show that there is a strong desire for mobile phone users to
     enhance the capabilities of their mobile phone to perform
     more than just voice/multi-media communication.
   – MasterCard found that ‘…more than 25% of participants who
     used their PayPass card 2 to 3 times a month prior to the trial
     program increased their frequency of usage to more than 3
     times a month.
   – According to contactless card trials carried out by Visa,
     merchants have seen an increase in spending, and
     customers on the trials enjoyed the speed and convenience
     of not having to sign for purchases and to simply swipe their
     phone to make their purchase.
NFC M-Payment customer experience
NFC M-Payment customer experience
• A customer can request his/her mobile phone be enabled by a
  variety of methods including the Internet, call centre or directly with
  their CIB.
• He/she enters a shop with the phone that has subsequently had
  its UICC
• After the goods/products are selected, the customer goes to the
  checkout counter to pay.
• The customer takes mobile phone, selects the appropriate
  application (if multi-equipped) and “touches” it against the POS-
  terminal.
• He/she may then be required to enter their PIN (either into the
  phone or the POS terminal), and potentially touch it a second time
  against the terminal. The infrastructure completes the
  transaction, largely using existing contactless infrastructure and
  transaction processes, if applicable, other transactions (like loyalty
  points) are processed.
• The details of the transaction process will vary from implementation
  to implementation.
Japan: NTT Docomo Osaifu Keitai
• Mobile phones equipped with contactless IC card
• Launched in 2004 and now exceeded 30M subscribers
  as of Jul 2008. Accepted at over 640,000 stores
• Reduce payment times for merchants and allow
  payments to link to value added services such as loyalty
  program and targeted marketing
PoS
Point of Sale/Service
A mobile wallet for loyalty cards
A mobile wallet for loyalty cards
A mobile wallet for loyalty cards
A mobile wallet for loyalty cards
A mobile wallet for loyalty cards
Business drivers
The main drivers for Pay-Buy-Mobile are:
• Speed and convenience leading to
  higher transaction volumes (B,M)
• Higher data traffic (O)
• Value Added Services (B,M,O)
• Access to customers (B,M)
• Reduced service delivery (C)
Creation of New Pay-Buy-Mobile value
Technical Ecosystem
(Business) Ecosystem
The Pay-Buy-Mobile ecosystem builds on the traditional payment
  infrastructure with an expanded value chain incorporating the
  following players:
• Customer
• Merchant
• Acquirer
• Card Issuing Bank (CIB)
• Payment solution company
• Mobile Network Operator
• Trusted Service Manager
• Mobile Handset Manufacturer
• UICC Manufacturer
• Terminal/Reader Manufacturer
• NFC chip manufacturer
Existing credit card ecosystem
Pay-Buy-Mobile ecosystem
Pay-Buy-Mobile value chain
Key success factors (1/3)
In order for Pay-Buy-Mobile to be successful the following
   factors need to be addressed:
• Value for all ecosystem members: Pay-Buy-Mobile will
   be successful provided that the ecosystem is steady,
   provides value for all members, and is efficient.
• Large customer base: Pay-Buy-Mobile will only take off
   if Banks are able to reach a large customer base.
• Customer trust: will be built on the existing
   relationships between a client and his bank (payment)
   and a client and his MNO (mobile services).
Key success factors (2/3)
• Avoid fragmentation: differing and incompatible
  technical solutions would lead to fragmentation, and so
  there is a need to ensure as much commonality between
  implementations whilst, after the universal credit card
  service, allow the banking industry to continue to make
  individual commercial decisions. Therefore:
   – Inter-operability: appropriate standardization is essential in
     order to provide convenient and cost-effective mobile NFC
     services, thereby achieving economy of scale and global
     interoperability. The Pay-Buy-Mobile applications and hardware
     need, therefore, to be standardized to ensure that, wherever
     possible, they are able to function anywhere around the world.
   – Backwards compatibility: the technical solution proposed by
     the MNO community is predicated on using the existing
     contactless infrastructure in the merchants’ premises, which
     should minimize changes to the systems.
Key success factors (3/3)
• Partnership: Cooperation between all ecosystem
  entities (e.g. Banks, MNOs, Trusted Services Managers
  and manufacturers etc) will be essential for the success
  of Pay-Buy-Mobile.
   – Pay-Buy-Mobile will generate new business opportunities and
     value, and does not challenge existing card transactions
     business.
• Certification: the Pay-Buy-Mobile technical solution has
  been carefully designed to satisfy all of the known
  requirements of the financial services industry.
   – Banks, and MNOs, payment scheme companies and vendors
     need to work together to build trust in the solution and achieve
     certification of the solution, where required, to allow use as a live
     service, and ensure that the UICC solution can be demonstrated
     to have security comparable to existing payment card products.
Pay-Buy-Mobile Business Models
• The TSM is introduced to the Pay-Buy-Mobile
  ecosystem as a link between the CIB and the
  MNO.
• It not only links a single CIB and a single MNO,
  but should be an integrated point of linkage
  between multiple CIBs and multiple MNOs.
  Depending on the placement of this role, various
  types of Pay-Buy-Mobile business models are
  possible, to enable an efficient ecosystem.
Positioning of the TSM
TSM business models
Four principal TSM business models
have been identified, namely:
1.   The MNO-centric model
2.   The Independent entity model
3.   The CIB-centric model
4.   The Combination model
MNO-centric model
in which the MNO performs the TSM role
Independent Entity Model
in which a trusted third party performs the TSM role
CIB-Centric Model
in which the CIB performs the TSM role
Combination Model
a combination of two or three of the above models,
 depending on the domestic market environment
Mobile NFC Technical Guidelines
UICC
 (Universal Integrated Circuit Card)
• The secure element recommended by the GSMA for the
  payment application in the mobile phone is the UICC,
  commonly known as the SIM card.
• The UICC can be divided into security domains thus
  allowing third-party service providers the ability to
  manage and operate the services independent of the
  MNO.
• The UICC securely stores the subscriber identity.
• UICCs have rapidly become ever more sophisticated,
  containing enhanced processing power, much increased
  memory and extended security management
  functionality.
UICC Solution
The UICC offers an ideal environment,
therefore, into which the Pay-Buy-Mobile
application could be installed:
– Security
– Universal deployment
– Portability
– Remote management
– Standards based solution
– Long operational lifecycle
UICC Security Domains
• Advancements in Integrated Chip (IC) technology permit
  the partitioning of the UICC into several security
  domains (SD).
• hosting applications provided by multiple 3rd parties,
  e.g. various CIBs, where the UICC space is securely
  shared between them.
• This allows the MNO, as well as 3rd parties such as
  Card Issuing Banks, to maintain the needed
  confidentiality of their data and applications and
  protect them from access by other 3rd parties.
• Each application is stored in its own SD, with neither
  the MNO nor the CIBs having the possibility to access
  each other’s application and data.
UICC Security Domains
Issuer Security Domain (ISD)
• The Issuer Security Domain (ISD) is the
  first application installed on a UICC,
  and establishes supplementary security
  domains for service providers.
• It is assumed that the keys to each SD
  will be forwarded to the 3rd parties (i.e.
  TSMs or CIBs respectively) and can then
  be subsequently reset by the 3rd party to
  establish privacy.
Selection of the secure element
 in a multiple SE architecture


                  Security Domain On card entity providing
                  support for the control, security and
                  communication requirement of an off-card entity,
                  supporting services such
                  as key handling, encryption, decryption, digital
                  signature generation and
                  verification for their provider’s application.
Selection of the secure element
 in a multiple SE architecture
Selection of the secure element
 in a multiple SE architecture
UICC environment
UICC Architecture
Mobile NFC device architecture overview
Mobile NFC Device Architecture
• A Mobile NFC device provides a combination of
  NFC services with mobile telephony services.
  With this definition, a mobile phone employing a
  UICC as the Secure Element and an NFC
  controller can provide an ideal platform for NFC
  service applications.
• Within this context, the UICC hosts and
  manages the NFC service files and applications,
  while the NFC controller manages the NFC
  interface (i.e. to the contactless reader)
Mobile NFC Device Architecture
               Security Issues:
               Handset
               • Secure display on the
                 screen and secure entry
                 on the keyboard
               • User Interface
                 Authentication
               NFC services
               • Enhancing security by
                 employing handset
                 connectivity
               • NFC Application Approval
The standard was developed by the Working
      Group 8 of Subcommittee 17 in
  ISO's/IEC's Joint Technical Committee 1
Four Tag Types to be operable with NFC Device

• The backbone of interoperability between
  deferent NFC tag provider and NFC
  device manufacturers (existing)
• modulation methods, coding schemes,
  protocol initialization procedures and
  transmission protocol
Type 1 Tag
• Based on ISO/IEC 14443A
• Tags are read and re-write capable
• Users can configure the tag to become
  read only
• Memory availability is 96 byte (expandable
  to 2kbyte
• Communication speed is 106 kbit/s
Type 2 Tag
• Based on ISO/IEC 14443A
• Tags are read and re-write capable
• Users can configure the tag to become
  read only
• Memory availability is 48 byte (expandable
  to 2kbyte
• Communication speed is 106 kbit/s
Type 3 Tag
• Based on Japanese Industrial Standard (JIS) X
  6319-4
• know as FeliCa
• Tags are pre-configured at manufacture to be
  either read and re-writeable, or read only
• Memory availability is variable, theoretical
  memory limit is 1MByte per service
• Communication speed is 212 kbit/s or 424kbit/s
Type 4 Tag
• Fully compatible with the ISO/IEC 14443
  standard series.
• Tags are pre-configured at manufacture to be
  either read and re-writeable, or read only
• Memory availability is variable, up to 32 KByte
  per service
• Communication interface is either Type A or
  Type B compliant and its speed is up to 424
  kbit/s
Thanks You
        m_ary_murti@ieee.org

Weitere ähnliche Inhalte

Was ist angesagt?

Sip vo ip-ims-convergence-d2-10 at kishore
Sip vo ip-ims-convergence-d2-10 at kishoreSip vo ip-ims-convergence-d2-10 at kishore
Sip vo ip-ims-convergence-d2-10 at kishore
AT Kishore
 
CPP contactless and mobile payments white paper 2011
CPP contactless and mobile payments white paper 2011CPP contactless and mobile payments white paper 2011
CPP contactless and mobile payments white paper 2011
CPPGroup Plc
 
Mobile Money Brochure
Mobile Money BrochureMobile Money Brochure
Mobile Money Brochure
raquelfreitas
 
Linking m-commerce to the physical point of sale
Linking m-commerce to the physical point of saleLinking m-commerce to the physical point of sale
Linking m-commerce to the physical point of sale
OGZ
 
Grabovsky a.t.kearney telco-form_08.06.11
Grabovsky a.t.kearney telco-form_08.06.11Grabovsky a.t.kearney telco-form_08.06.11
Grabovsky a.t.kearney telco-form_08.06.11
Андрей Лукин
 

Was ist angesagt? (20)

Sip vo ip-ims-convergence-d2-10 at kishore
Sip vo ip-ims-convergence-d2-10 at kishoreSip vo ip-ims-convergence-d2-10 at kishore
Sip vo ip-ims-convergence-d2-10 at kishore
 
Mobile.Broadband Dan.Warren 101012
Mobile.Broadband Dan.Warren 101012Mobile.Broadband Dan.Warren 101012
Mobile.Broadband Dan.Warren 101012
 
ISACA Mobile Payments Forum presentation
ISACA Mobile Payments Forum presentationISACA Mobile Payments Forum presentation
ISACA Mobile Payments Forum presentation
 
MasterCard and Penrillian Partnership in NFC
MasterCard and Penrillian Partnership in NFCMasterCard and Penrillian Partnership in NFC
MasterCard and Penrillian Partnership in NFC
 
Rabo Mobiel & NMB Mobile: Mobile Banking & Payments Development
Rabo Mobiel & NMB Mobile: Mobile Banking & Payments DevelopmentRabo Mobiel & NMB Mobile: Mobile Banking & Payments Development
Rabo Mobiel & NMB Mobile: Mobile Banking & Payments Development
 
121010_Mobile Banking & Payments for Emerging Asia Summit 2012_Building block...
121010_Mobile Banking & Payments for Emerging Asia Summit 2012_Building block...121010_Mobile Banking & Payments for Emerging Asia Summit 2012_Building block...
121010_Mobile Banking & Payments for Emerging Asia Summit 2012_Building block...
 
Future Communications
Future CommunicationsFuture Communications
Future Communications
 
Unstoppable Wireless Forces
Unstoppable Wireless ForcesUnstoppable Wireless Forces
Unstoppable Wireless Forces
 
Mobile Money Business Track: understanding the Model and Market
Mobile Money Business Track: understanding the Model and MarketMobile Money Business Track: understanding the Model and Market
Mobile Money Business Track: understanding the Model and Market
 
CPP contactless and mobile payments white paper 2011
CPP contactless and mobile payments white paper 2011CPP contactless and mobile payments white paper 2011
CPP contactless and mobile payments white paper 2011
 
Card issuance solution - Giai phap phat hanh the tai chinh
Card issuance solution - Giai phap phat hanh the tai chinhCard issuance solution - Giai phap phat hanh the tai chinh
Card issuance solution - Giai phap phat hanh the tai chinh
 
Vs
VsVs
Vs
 
Mobile Money Brochure
Mobile Money BrochureMobile Money Brochure
Mobile Money Brochure
 
WiFi data offloading whitepaper
WiFi data offloading whitepaperWiFi data offloading whitepaper
WiFi data offloading whitepaper
 
Linking m-commerce to the physical point of sale
Linking m-commerce to the physical point of saleLinking m-commerce to the physical point of sale
Linking m-commerce to the physical point of sale
 
Grabovsky a.t.kearney telco-form_08.06.11
Grabovsky a.t.kearney telco-form_08.06.11Grabovsky a.t.kearney telco-form_08.06.11
Grabovsky a.t.kearney telco-form_08.06.11
 
Gemalto NFC
Gemalto NFCGemalto NFC
Gemalto NFC
 
Teknologi Pita Lebar 4G LTE
Teknologi Pita Lebar 4G LTETeknologi Pita Lebar 4G LTE
Teknologi Pita Lebar 4G LTE
 
IoTcloud-cybersecurity-securityofthings
IoTcloud-cybersecurity-securityofthingsIoTcloud-cybersecurity-securityofthings
IoTcloud-cybersecurity-securityofthings
 
Secure mobile payment
Secure mobile paymentSecure mobile payment
Secure mobile payment
 

Ähnlich wie Accessing pay buy mobile model

Temenos_Connect_Mobile_Banking_Overview
Temenos_Connect_Mobile_Banking_OverviewTemenos_Connect_Mobile_Banking_Overview
Temenos_Connect_Mobile_Banking_Overview
David Courtney
 
Consumer behavior of gsm users in telecom industry
Consumer behavior of gsm users in  telecom industryConsumer behavior of gsm users in  telecom industry
Consumer behavior of gsm users in telecom industry
Verma Pramod
 
Impact Of It On Financial Sector
Impact Of It On Financial SectorImpact Of It On Financial Sector
Impact Of It On Financial Sector
tanesh kothari
 

Ähnlich wie Accessing pay buy mobile model (20)

Understanding and assessing opportunities in pay buy mobile model
Understanding and assessing opportunities in pay buy mobile model Understanding and assessing opportunities in pay buy mobile model
Understanding and assessing opportunities in pay buy mobile model
 
New Banking to the Unbanked
New Banking to the UnbankedNew Banking to the Unbanked
New Banking to the Unbanked
 
What to Expect from a Mobile Banking Solution? (Whitepaper)
What to Expect from a Mobile Banking Solution? (Whitepaper)What to Expect from a Mobile Banking Solution? (Whitepaper)
What to Expect from a Mobile Banking Solution? (Whitepaper)
 
MobiWeb - OTP SMS Two Factor Authentication
MobiWeb - OTP SMS Two Factor AuthenticationMobiWeb - OTP SMS Two Factor Authentication
MobiWeb - OTP SMS Two Factor Authentication
 
M commerce
M commerceM commerce
M commerce
 
otp-sms-two-factor-authentication
otp-sms-two-factor-authenticationotp-sms-two-factor-authentication
otp-sms-two-factor-authentication
 
IRJET- Issues & Challenges in Mobile Banking in Pune: A Customers’ Perspective
IRJET- Issues & Challenges in Mobile Banking in Pune: A Customers’ PerspectiveIRJET- Issues & Challenges in Mobile Banking in Pune: A Customers’ Perspective
IRJET- Issues & Challenges in Mobile Banking in Pune: A Customers’ Perspective
 
Temenos_Connect_Mobile_Banking_Overview
Temenos_Connect_Mobile_Banking_OverviewTemenos_Connect_Mobile_Banking_Overview
Temenos_Connect_Mobile_Banking_Overview
 
International Remittance And Mobile Banking
International Remittance And Mobile BankingInternational Remittance And Mobile Banking
International Remittance And Mobile Banking
 
pPOS Project Presentation_v1
pPOS  Project Presentation_v1pPOS  Project Presentation_v1
pPOS Project Presentation_v1
 
Mobile commerce
Mobile commerceMobile commerce
Mobile commerce
 
FUTURE OF MOBILE
FUTURE OF MOBILEFUTURE OF MOBILE
FUTURE OF MOBILE
 
Mobile Payment Solution For Sk Bup Ters
Mobile Payment Solution For Sk Bup TersMobile Payment Solution For Sk Bup Ters
Mobile Payment Solution For Sk Bup Ters
 
Mobile Payments in the US
Mobile Payments in the USMobile Payments in the US
Mobile Payments in the US
 
Mobile Financial Services
Mobile Financial ServicesMobile Financial Services
Mobile Financial Services
 
Consumer behavior of gsm users in telecom industry
Consumer behavior of gsm users in  telecom industryConsumer behavior of gsm users in  telecom industry
Consumer behavior of gsm users in telecom industry
 
M commerce in retail
M commerce in retailM commerce in retail
M commerce in retail
 
M Commerce
M CommerceM Commerce
M Commerce
 
Mobile payment systems and services
Mobile payment systems and servicesMobile payment systems and services
Mobile payment systems and services
 
Impact Of It On Financial Sector
Impact Of It On Financial SectorImpact Of It On Financial Sector
Impact Of It On Financial Sector
 

Mehr von Arief Gunawan

Tutorial on Network Management and Security in Wireless Communications (Bandu...
Tutorial on Network Management and Security in Wireless Communications (Bandu...Tutorial on Network Management and Security in Wireless Communications (Bandu...
Tutorial on Network Management and Security in Wireless Communications (Bandu...
Arief Gunawan
 
Day one ofdma and mimo
Day one ofdma and mimoDay one ofdma and mimo
Day one ofdma and mimo
Arief Gunawan
 
Day two 10 november 2012
Day two 10 november 2012Day two 10 november 2012
Day two 10 november 2012
Arief Gunawan
 
Day one 09 november 2012
Day one 09 november 2012Day one 09 november 2012
Day one 09 november 2012
Arief Gunawan
 
Mobile Cloud @ Binus
Mobile Cloud @ BinusMobile Cloud @ Binus
Mobile Cloud @ Binus
Arief Gunawan
 
Small Cell @ IT Telkom
Small Cell @ IT TelkomSmall Cell @ IT Telkom
Small Cell @ IT Telkom
Arief Gunawan
 
03 Beginning Android Application Development
03 Beginning Android Application Development03 Beginning Android Application Development
03 Beginning Android Application Development
Arief Gunawan
 

Mehr von Arief Gunawan (20)

Metaverse - Let's learn to understand when business becomes virtual and when ...
Metaverse - Let's learn to understand when business becomes virtual and when ...Metaverse - Let's learn to understand when business becomes virtual and when ...
Metaverse - Let's learn to understand when business becomes virtual and when ...
 
Technology Disruptions
Technology DisruptionsTechnology Disruptions
Technology Disruptions
 
Tutorial on Network Management and Security in Wireless Communications (Bandu...
Tutorial on Network Management and Security in Wireless Communications (Bandu...Tutorial on Network Management and Security in Wireless Communications (Bandu...
Tutorial on Network Management and Security in Wireless Communications (Bandu...
 
APWiMob 2014 (Bali, 28-30 August 2014) CFP
APWiMob 2014 (Bali, 28-30 August 2014) CFPAPWiMob 2014 (Bali, 28-30 August 2014) CFP
APWiMob 2014 (Bali, 28-30 August 2014) CFP
 
Prof Ekram Hossain on DLT 2013 in Indonesia
Prof Ekram Hossain on DLT 2013 in IndonesiaProf Ekram Hossain on DLT 2013 in Indonesia
Prof Ekram Hossain on DLT 2013 in Indonesia
 
M2M Day Two
M2M Day TwoM2M Day Two
M2M Day Two
 
M2M Day One
M2M Day OneM2M Day One
M2M Day One
 
Day two planning
Day two planningDay two planning
Day two planning
 
Day one ofdma and mimo
Day one ofdma and mimoDay one ofdma and mimo
Day one ofdma and mimo
 
Day two 10 november 2012
Day two 10 november 2012Day two 10 november 2012
Day two 10 november 2012
 
Day one 09 november 2012
Day one 09 november 2012Day one 09 november 2012
Day one 09 november 2012
 
Cloud Architecture
Cloud ArchitectureCloud Architecture
Cloud Architecture
 
Cloud Ecosystem
Cloud EcosystemCloud Ecosystem
Cloud Ecosystem
 
IEEE Background presentation
IEEE Background  presentationIEEE Background  presentation
IEEE Background presentation
 
Cloud and Ubiquitous Computing in Today's Era of Tera
Cloud and Ubiquitous Computing in Today's Era of TeraCloud and Ubiquitous Computing in Today's Era of Tera
Cloud and Ubiquitous Computing in Today's Era of Tera
 
Cloud Computing: Peluang Bisnis dan Tantangan Regulasi
Cloud Computing: Peluang Bisnis dan Tantangan RegulasiCloud Computing: Peluang Bisnis dan Tantangan Regulasi
Cloud Computing: Peluang Bisnis dan Tantangan Regulasi
 
Mobile Cloud @ Binus
Mobile Cloud @ BinusMobile Cloud @ Binus
Mobile Cloud @ Binus
 
Small Cell @ UI
Small Cell @ UISmall Cell @ UI
Small Cell @ UI
 
Small Cell @ IT Telkom
Small Cell @ IT TelkomSmall Cell @ IT Telkom
Small Cell @ IT Telkom
 
03 Beginning Android Application Development
03 Beginning Android Application Development03 Beginning Android Application Development
03 Beginning Android Application Development
 

Kürzlich hochgeladen

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Kürzlich hochgeladen (20)

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

Accessing pay buy mobile model

  • 1. Accessing Pay Buy Mobile Model by: Muhammad Ary Murti (ITTelkom) Arief Hamdani Gunawan (Telkom Indonesia)
  • 2. The Core Business As of June 30, 2009 :
  • 3. Penetration in Telco Industry As of June 30, 2009 :
  • 4. AGENDA Accessing Pay Buy Mobile Model • NFC M-Payment services • Proposition • Ecosystem and Value chain • Pay-Buy-Mobile Business Models • Mobile NFC Technical Guidelines
  • 6. Telekomunikasi Seluler Indonesia : T-Cash Merchant Category % Retail 94.0% Features : Fashion/ Life style 1.2% Bill Payment 0.1% 1.Cash in Education & University 0.4% 2.Purchase Food and beverage 0.8% Insurance 0.0% 3.Online Purchase Portal 0.1% 4.Bill Payment Cellular Shop 0.5% 5.P2P Transfer Telkomsel Channel 1.1% 6.Cash Out Others 1.6% Number of partners : over 150 companies
  • 8. Telekomunikasi Seluler Indonesia : T-Cash Telkomsel Cash User (t-cash) 630,287 800,000 728,171 604,754 600,000 482,236 503,267 531,557 400,000 348,587 513,511 112,076 200,000 103,709 108,898 104,935 -
  • 9. Pay-Buy-Mobile is a Mobile Network Operator (MNO)-led, GSMA initiative, for using mobile phones to make fast, secure payments in a retail environment using Near Field Communications (NFC)/ contactless technology.
  • 10. Contactless smart card technology • is typically used  transport, building access applications, as well as holding medical data. • Several varieties of contactless technology exist today: of most interest  NFC technology. • NFC is designed to operate over very short distances, typically less than 4 Cm • Contactless technology provides an intuitive and easy method for users to access services, as demonstrated by the rapid deployment of contactless public transport systems globally with many users. • The technology has also been identified as a key sector for payment solutions.
  • 11. Mobile NFC • the combination of contactless services based on NFC technology with mobile telephony, • offers substantial advantages over basic contactless smart card technology, including: – peer-to-peer communications; – high-speed two-way communications; and – access to facilities on the mobile phone, such as the screen, communications link, keyboard, memory and processing power. • This opens up the possibility of more complex and interactive applications, as well as the ability to modify applications on the phone via the communications link, for example, to download software or disable functionality.
  • 12. Pay-Buy-Mobile initiative • 34 of the world’s largest MNOs (KTF, AT&T, China Mobile Communications Corporation, Chunghwa Telecom, Far EasTone, Kall, KPN, Maxis, MCI, Meteor, Mobilkom Austria, Mobitel d.d., MTN, NTT DoCoMo, O2, Orange, Pelephone, Partner/Orange, Rogers, SFR, Singtel, SK Telecom, SMART, Softbank, Starhub, Telenor, TeliaSonera, Telecom Italia, Telstra, Turkcell, Vimpelcom, Vodafone, Wind) • serving more than 1.3 billion customers, have been working together on the Pay- Buy-Mobile initiative, to create and define a global approach to enable NFC payment services on mobile phones. • which is key to enabling the development of a new market and to prevent market fragmentation.
  • 13. NFC M-Payment services • Among a wide range of contactless services, NFC M- Payment services are the most eagerly anticipated. – Customer feedback from usage of contactless mobile payment services, and trials and surveys conducted throughout the world, show that there is a strong desire for mobile phone users to enhance the capabilities of their mobile phone to perform more than just voice/multi-media communication. – MasterCard found that ‘…more than 25% of participants who used their PayPass card 2 to 3 times a month prior to the trial program increased their frequency of usage to more than 3 times a month. – According to contactless card trials carried out by Visa, merchants have seen an increase in spending, and customers on the trials enjoyed the speed and convenience of not having to sign for purchases and to simply swipe their phone to make their purchase.
  • 15. NFC M-Payment customer experience • A customer can request his/her mobile phone be enabled by a variety of methods including the Internet, call centre or directly with their CIB. • He/she enters a shop with the phone that has subsequently had its UICC • After the goods/products are selected, the customer goes to the checkout counter to pay. • The customer takes mobile phone, selects the appropriate application (if multi-equipped) and “touches” it against the POS- terminal. • He/she may then be required to enter their PIN (either into the phone or the POS terminal), and potentially touch it a second time against the terminal. The infrastructure completes the transaction, largely using existing contactless infrastructure and transaction processes, if applicable, other transactions (like loyalty points) are processed. • The details of the transaction process will vary from implementation to implementation.
  • 16. Japan: NTT Docomo Osaifu Keitai • Mobile phones equipped with contactless IC card • Launched in 2004 and now exceeded 30M subscribers as of Jul 2008. Accepted at over 640,000 stores • Reduce payment times for merchants and allow payments to link to value added services such as loyalty program and targeted marketing
  • 18. A mobile wallet for loyalty cards
  • 19. A mobile wallet for loyalty cards
  • 20. A mobile wallet for loyalty cards
  • 21. A mobile wallet for loyalty cards
  • 22. A mobile wallet for loyalty cards
  • 23. Business drivers The main drivers for Pay-Buy-Mobile are: • Speed and convenience leading to higher transaction volumes (B,M) • Higher data traffic (O) • Value Added Services (B,M,O) • Access to customers (B,M) • Reduced service delivery (C)
  • 24. Creation of New Pay-Buy-Mobile value
  • 26. (Business) Ecosystem The Pay-Buy-Mobile ecosystem builds on the traditional payment infrastructure with an expanded value chain incorporating the following players: • Customer • Merchant • Acquirer • Card Issuing Bank (CIB) • Payment solution company • Mobile Network Operator • Trusted Service Manager • Mobile Handset Manufacturer • UICC Manufacturer • Terminal/Reader Manufacturer • NFC chip manufacturer
  • 27. Existing credit card ecosystem
  • 30. Key success factors (1/3) In order for Pay-Buy-Mobile to be successful the following factors need to be addressed: • Value for all ecosystem members: Pay-Buy-Mobile will be successful provided that the ecosystem is steady, provides value for all members, and is efficient. • Large customer base: Pay-Buy-Mobile will only take off if Banks are able to reach a large customer base. • Customer trust: will be built on the existing relationships between a client and his bank (payment) and a client and his MNO (mobile services).
  • 31. Key success factors (2/3) • Avoid fragmentation: differing and incompatible technical solutions would lead to fragmentation, and so there is a need to ensure as much commonality between implementations whilst, after the universal credit card service, allow the banking industry to continue to make individual commercial decisions. Therefore: – Inter-operability: appropriate standardization is essential in order to provide convenient and cost-effective mobile NFC services, thereby achieving economy of scale and global interoperability. The Pay-Buy-Mobile applications and hardware need, therefore, to be standardized to ensure that, wherever possible, they are able to function anywhere around the world. – Backwards compatibility: the technical solution proposed by the MNO community is predicated on using the existing contactless infrastructure in the merchants’ premises, which should minimize changes to the systems.
  • 32. Key success factors (3/3) • Partnership: Cooperation between all ecosystem entities (e.g. Banks, MNOs, Trusted Services Managers and manufacturers etc) will be essential for the success of Pay-Buy-Mobile. – Pay-Buy-Mobile will generate new business opportunities and value, and does not challenge existing card transactions business. • Certification: the Pay-Buy-Mobile technical solution has been carefully designed to satisfy all of the known requirements of the financial services industry. – Banks, and MNOs, payment scheme companies and vendors need to work together to build trust in the solution and achieve certification of the solution, where required, to allow use as a live service, and ensure that the UICC solution can be demonstrated to have security comparable to existing payment card products.
  • 33. Pay-Buy-Mobile Business Models • The TSM is introduced to the Pay-Buy-Mobile ecosystem as a link between the CIB and the MNO. • It not only links a single CIB and a single MNO, but should be an integrated point of linkage between multiple CIBs and multiple MNOs. Depending on the placement of this role, various types of Pay-Buy-Mobile business models are possible, to enable an efficient ecosystem.
  • 35. TSM business models Four principal TSM business models have been identified, namely: 1. The MNO-centric model 2. The Independent entity model 3. The CIB-centric model 4. The Combination model
  • 36. MNO-centric model in which the MNO performs the TSM role
  • 37. Independent Entity Model in which a trusted third party performs the TSM role
  • 38. CIB-Centric Model in which the CIB performs the TSM role
  • 39. Combination Model a combination of two or three of the above models, depending on the domestic market environment
  • 40. Mobile NFC Technical Guidelines
  • 41. UICC (Universal Integrated Circuit Card) • The secure element recommended by the GSMA for the payment application in the mobile phone is the UICC, commonly known as the SIM card. • The UICC can be divided into security domains thus allowing third-party service providers the ability to manage and operate the services independent of the MNO. • The UICC securely stores the subscriber identity. • UICCs have rapidly become ever more sophisticated, containing enhanced processing power, much increased memory and extended security management functionality.
  • 42. UICC Solution The UICC offers an ideal environment, therefore, into which the Pay-Buy-Mobile application could be installed: – Security – Universal deployment – Portability – Remote management – Standards based solution – Long operational lifecycle
  • 43. UICC Security Domains • Advancements in Integrated Chip (IC) technology permit the partitioning of the UICC into several security domains (SD). • hosting applications provided by multiple 3rd parties, e.g. various CIBs, where the UICC space is securely shared between them. • This allows the MNO, as well as 3rd parties such as Card Issuing Banks, to maintain the needed confidentiality of their data and applications and protect them from access by other 3rd parties. • Each application is stored in its own SD, with neither the MNO nor the CIBs having the possibility to access each other’s application and data.
  • 45. Issuer Security Domain (ISD) • The Issuer Security Domain (ISD) is the first application installed on a UICC, and establishes supplementary security domains for service providers. • It is assumed that the keys to each SD will be forwarded to the 3rd parties (i.e. TSMs or CIBs respectively) and can then be subsequently reset by the 3rd party to establish privacy.
  • 46. Selection of the secure element in a multiple SE architecture Security Domain On card entity providing support for the control, security and communication requirement of an off-card entity, supporting services such as key handling, encryption, decryption, digital signature generation and verification for their provider’s application.
  • 47. Selection of the secure element in a multiple SE architecture
  • 48. Selection of the secure element in a multiple SE architecture
  • 51. Mobile NFC device architecture overview
  • 52. Mobile NFC Device Architecture • A Mobile NFC device provides a combination of NFC services with mobile telephony services. With this definition, a mobile phone employing a UICC as the Secure Element and an NFC controller can provide an ideal platform for NFC service applications. • Within this context, the UICC hosts and manages the NFC service files and applications, while the NFC controller manages the NFC interface (i.e. to the contactless reader)
  • 53. Mobile NFC Device Architecture Security Issues: Handset • Secure display on the screen and secure entry on the keyboard • User Interface Authentication NFC services • Enhancing security by employing handset connectivity • NFC Application Approval
  • 54.
  • 55. The standard was developed by the Working Group 8 of Subcommittee 17 in ISO's/IEC's Joint Technical Committee 1
  • 56. Four Tag Types to be operable with NFC Device • The backbone of interoperability between deferent NFC tag provider and NFC device manufacturers (existing) • modulation methods, coding schemes, protocol initialization procedures and transmission protocol
  • 57. Type 1 Tag • Based on ISO/IEC 14443A • Tags are read and re-write capable • Users can configure the tag to become read only • Memory availability is 96 byte (expandable to 2kbyte • Communication speed is 106 kbit/s
  • 58. Type 2 Tag • Based on ISO/IEC 14443A • Tags are read and re-write capable • Users can configure the tag to become read only • Memory availability is 48 byte (expandable to 2kbyte • Communication speed is 106 kbit/s
  • 59. Type 3 Tag • Based on Japanese Industrial Standard (JIS) X 6319-4 • know as FeliCa • Tags are pre-configured at manufacture to be either read and re-writeable, or read only • Memory availability is variable, theoretical memory limit is 1MByte per service • Communication speed is 212 kbit/s or 424kbit/s
  • 60. Type 4 Tag • Fully compatible with the ISO/IEC 14443 standard series. • Tags are pre-configured at manufacture to be either read and re-writeable, or read only • Memory availability is variable, up to 32 KByte per service • Communication interface is either Type A or Type B compliant and its speed is up to 424 kbit/s
  • 61. Thanks You m_ary_murti@ieee.org