SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Future of Secure Mobile Payments
From Zero-Effort-Payment to Mobile Trusted Module (MTM)

Amal Saha, Ph.D., C|CISO
Chief Application & Information Security Architect,
Mobile Finance Solutions, Mahindra Comviva
Profile: in.linkedin.com/pub/amal-saha-ph-d/b/57/364
email: amal.saha@mahindracomviva.com ,
Mobile: +91-9818004327

12-Nov-2013
1
Evolution of Secure Mobile Payment Method
Payment Method

Gen

Pros & Cons

USSD

1st

Limited by GSM network
security, app based encryption
possible, but not widely adopted

SMS-STK

2nd

closed

Mobile Browser

2nd

Small UI form factor and malware
are issues

Contactless
Mobile

3rd

Google Wallet, MC PayPass, Visa
PayWave – TSM as complex 3rd-pty
& Telecom carrier controlling SE &
NFC-enabled POS terminal
availability are issues

Cloud Wallet

3rd

Google Wallet, PayPal – online
payment

Encryption and other
crypto operations possible

2
[cont] Evolution of Secure Mobile Payment Method
Payment Method

Gen Pros & Cons

Zero-Effort-Payment
(ZEP)

3rd

prepaid closed-loop

Host Card Emulation
(HCE)

3rd

No SE needed for
proximity payment

in store - seamless customer
identification (SCI) thru BLE based
customer mobile device detection
and face recognition

one-time token or virtual-card from
issuer to the secure card-holder app
on mobile device

(cloud based SE)

Network connection issue.
Support by Visa, MC
critical for success
Could use trusted
computing for higher level
of security
3
[cont] Evolution of Secure Mobile Payment Method
Payment Method

Gen Pros & Cons

Mobile Trusted Module
(MTM)

4th

and Trusted Network Connect (NAC)
from TCG – hardware root-of-trust
thru a component in system-on-chip

Secure app free from
malware, ubiquitous
secure computing and
networking

4

Weitere ähnliche Inhalte

Andere mochten auch

vending machine
vending machinevending machine
vending machine
soham pal
 
446.гражданское право россии учебное пособие гриф рао
446.гражданское право россии учебное пособие гриф рао446.гражданское право россии учебное пособие гриф рао
446.гражданское право россии учебное пособие гриф рао
ivanov15548
 
454.лыжная подготовка в нефизкультурном вузе учебное пособие
454.лыжная подготовка в нефизкультурном вузе учебное пособие454.лыжная подготовка в нефизкультурном вузе учебное пособие
454.лыжная подготовка в нефизкультурном вузе учебное пособие
ivanov15548
 
588.гражданское право в схемах и таблицах общая часть вещное право право инте...
588.гражданское право в схемах и таблицах общая часть вещное право право инте...588.гражданское право в схемах и таблицах общая часть вещное право право инте...
588.гражданское право в схемах и таблицах общая часть вещное право право инте...
ivanov1566353422
 

Andere mochten auch (13)

vending machine
vending machinevending machine
vending machine
 
446.гражданское право россии учебное пособие гриф рао
446.гражданское право россии учебное пособие гриф рао446.гражданское право россии учебное пособие гриф рао
446.гражданское право россии учебное пособие гриф рао
 
Infrastruktura w e-Republice. Jak zapewnić bezpieczny system głosowania? Dośw...
Infrastruktura w e-Republice. Jak zapewnić bezpieczny system głosowania? Dośw...Infrastruktura w e-Republice. Jak zapewnić bezpieczny system głosowania? Dośw...
Infrastruktura w e-Republice. Jak zapewnić bezpieczny system głosowania? Dośw...
 
img-309135314
img-309135314img-309135314
img-309135314
 
J falconer: oer: challenges and benefits
J falconer: oer: challenges and benefitsJ falconer: oer: challenges and benefits
J falconer: oer: challenges and benefits
 
454.лыжная подготовка в нефизкультурном вузе учебное пособие
454.лыжная подготовка в нефизкультурном вузе учебное пособие454.лыжная подготовка в нефизкультурном вузе учебное пособие
454.лыжная подготовка в нефизкультурном вузе учебное пособие
 
J.D.Hill.RN
J.D.Hill.RNJ.D.Hill.RN
J.D.Hill.RN
 
Présentation Philips Lighting - Alain Minet
Présentation Philips Lighting - Alain MinetPrésentation Philips Lighting - Alain Minet
Présentation Philips Lighting - Alain Minet
 
Notorious 9 ciso platform moshe
Notorious 9 ciso platform  moshe Notorious 9 ciso platform  moshe
Notorious 9 ciso platform moshe
 
588.гражданское право в схемах и таблицах общая часть вещное право право инте...
588.гражданское право в схемах и таблицах общая часть вещное право право инте...588.гражданское право в схемах и таблицах общая часть вещное право право инте...
588.гражданское право в схемах и таблицах общая часть вещное право право инте...
 
5 Film Directing Tips For Beginners
5 Film Directing Tips For Beginners5 Film Directing Tips For Beginners
5 Film Directing Tips For Beginners
 
My film pitch
My film pitchMy film pitch
My film pitch
 
Genre Research
Genre ResearchGenre Research
Genre Research
 

Mehr von Priyanka Aash

Mehr von Priyanka Aash (20)

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdf
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdf
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdf
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdf
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
 
DPDP Act 2023.pdf
DPDP Act 2023.pdfDPDP Act 2023.pdf
DPDP Act 2023.pdf
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdf
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdf
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdf
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdf
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 Battlefield
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware Attacks
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

ciso-platform-annual-summit-2013-Future of secure mobile payments amal saha

  • 1. Future of Secure Mobile Payments From Zero-Effort-Payment to Mobile Trusted Module (MTM) Amal Saha, Ph.D., C|CISO Chief Application & Information Security Architect, Mobile Finance Solutions, Mahindra Comviva Profile: in.linkedin.com/pub/amal-saha-ph-d/b/57/364 email: amal.saha@mahindracomviva.com , Mobile: +91-9818004327 12-Nov-2013 1
  • 2. Evolution of Secure Mobile Payment Method Payment Method Gen Pros & Cons USSD 1st Limited by GSM network security, app based encryption possible, but not widely adopted SMS-STK 2nd closed Mobile Browser 2nd Small UI form factor and malware are issues Contactless Mobile 3rd Google Wallet, MC PayPass, Visa PayWave – TSM as complex 3rd-pty & Telecom carrier controlling SE & NFC-enabled POS terminal availability are issues Cloud Wallet 3rd Google Wallet, PayPal – online payment Encryption and other crypto operations possible 2
  • 3. [cont] Evolution of Secure Mobile Payment Method Payment Method Gen Pros & Cons Zero-Effort-Payment (ZEP) 3rd prepaid closed-loop Host Card Emulation (HCE) 3rd No SE needed for proximity payment in store - seamless customer identification (SCI) thru BLE based customer mobile device detection and face recognition one-time token or virtual-card from issuer to the secure card-holder app on mobile device (cloud based SE) Network connection issue. Support by Visa, MC critical for success Could use trusted computing for higher level of security 3
  • 4. [cont] Evolution of Secure Mobile Payment Method Payment Method Gen Pros & Cons Mobile Trusted Module (MTM) 4th and Trusted Network Connect (NAC) from TCG – hardware root-of-trust thru a component in system-on-chip Secure app free from malware, ubiquitous secure computing and networking 4