SlideShare ist ein Scribd-Unternehmen logo
1 von 5
Downloaden Sie, um offline zu lesen
T r u s t t h e E x p e r t s
WHAT TO EXPECT FROM A
MOBILE BANKING SOLUTION
INTRODUCTION
Mobile Banking (M-Banking) involves using
mobile devices to gain access to financial
services.
A large number of mobile banking and
payment solutions are available in the market
catering to various needs of the financial
institutions. The key to successful
implementation is the selection of a software
vendor who would be responsible for
providing solutions to meet the organization’s
requirement and to ensure the key principles
of a good mobile banking solution.BASIC PRINCIPLES OF THE
PLATFORM
Interoperability
Inclusive Implementation
•Available to All
• Delivered to All
• Accessible by all
Security and Privacy
Openness
Flexibility and Scalability
Device Agnosticism
WHITE PAPER
T r u s t t h e E x p e r t s
FUNCTIONAL VIEW OF THE PLATFORM
Legend: NFC: Near Field Communication, SMS: Short Messaging Service, USSD: GSM’s Unstructured Supplementary
Services Data, IVR: Interactive Voice Response
UNIFIED COMMUNICATION MODULE
Unified Communication Module (UCM) acts as an
interface between the various channels and the rest of
the mobile banking platform. The UCM should
communicate with the Telco’s service agents, clients,
devices, applications and portals indicated at a* using
the protocols supported by the various applications.
UCM should be developed to also cater to any future
message-format, channel or device. Future proofing is of
paramount importance and the UCM should support at a
bare minimum, the protocols at b*, The UCM should
TGSLWP - WHITE PAPER 2
a*} SMSC: Short Message Service Center, SMS Aggregator, MMS: Multi
Messaging Service, IVR Server, ATM, Micro ATM, Smart Client application
and Mobile Web portal
b*} SMPP: Short Message Peer to Peer, UCP: Universal Computer Protocol
(a subset of which is EMI or External Machine Interface), HTTP: Hyper Text
Transfer Protocol, HTTPS: HTTP Secure protocol, ISO 8583 and Web
Services protocols such as SOAP: Simple Object Access Protocol and,
REST: Representational State Transfer
have minimum logic and should transfer the incoming
message to the appropriate mobile banking module
using a common interface protocol defined by the
applications. After verifying the data, the UCM may
interface with other modules for
verification/authentication of the message before
passing it on to the next module for further processing.
Similarly all the outgoing messages need to pass through
the UCM; with the UCM translating the message to the
appropriate format before sending it to the mobile device.
WHITE PAPER
TGSLWP - WHITE PAPER 3
INTEROPERABILITY IN SUPPORTED
CHANNELS
In supporting multiple channels it would be important to
ensure the following: -
• Support for Push SMS, Pull SMS, USSD, IVR, Mobile
Web, Smart Client, SIM/WIB based application, NFC,
Mobile as a POS, Outbound dialer (important in areas
where voice confirmation may be preferred over SMS
due to literacy issues), ATM and Mobile Point of Service
(Mobile POS)
• Seamless migration from one channel to another.
• Need for just one-time registration by the user,
irrespective of the channel used.
• Ability of the channel management & communication
module to recognize the transacting channel and
respond appropriately
SMS aggregation service is typically provided by the
SMS Aggregator; hence banks will need to enter into a
techno-commercial relationship with the SMS aggregator
to get a short/long code and also to provide service to
customers of all the telecom providers in the
region/country.
• The SMS based implementation is predominantly
used for pushing the information to the individual user
or business upon occurrence of certain events such as
a purchase, funds-transfer or deposit.
• Instead of opting for a short code (which works across
all the Telcos), a bank may opt for a long code from a
particular Telco.
USSD service requires direct connectivity with the
Telecom operator; hence banks need to have direct
techno-commercial technical relationship with the Telco.
SIM card based applications needs a relationship with
the telecom operator.
IVR & Outbound Dialer services could be implemented
independent of telecom relationship. The service
providers can provide and deploy a self managed
solution at the Bank’s premises. IVR also provides the
option of enabling solutions in local languages.
AUTHENTICATION/SECURITY
When it comes to authentication of the user and data
security, the Platform: -
• Needs to accept Static Passwords, One Time
Passwords, Biometrics, usernames/passwords and
additional profile questions depending on the type of
activity
• Should be able to accept the Mobile # or Device ID to
authenticate the user
• Should ensure authentication across multiple
channels
• Should be able to support HSM based AES, 3DES
encryption, 1024 bit or higher PKI implementation
(HSM: Hardware Security Module, aka Host Security
Module, AES: Advanced Encryption Standard), 3DES:
Triple Data Encryption Standard, PKI: Public
Key Infrastructure
• Should be able to store encrypted data with the ability
to decrypt it after authentication
• Should have adequate security features to securely
store the data in the device
T r u s t t h e E x p e r t s
• Ability to configure & manage one or more channels for
one or more services
ECO-SYSTEM DEPENDENCY IN
IMPLEMENTING
CHANNELS
In countries, with wide, reliable and
affordable data connectivity, banks are
recommended to use Smart Client or
Mobile Web (WAP and HTML5) as the
channel to implement mobile banking
services without having to depend on
the telecom operator.
ECO-SYSTEM DEPENDENCY IN MOBILE
DEVICES AND OPERATING SYSTEMS
Internationally, there are a large number of mobile devices
available. The features, functionality and operating
systems being supported varies from device to device.
Brand loyalty varies from country to country and within a
country from region to region with a direct impact on the
mobile banking system.
Some of the popular devices are:
Apple’s iPhone running iOS
Samsung, Sony, LG, MTS and Motorola phones
running the Android OS
RIM phones running the Blackberry OS.
Nokia phones running the Symbian OS
Smart phones running the Windows mobile OS
The solution needs to support the most popular device
families in the country. In other words, the bank needs to
make sure that their mobile banking application (smart
client apps) as well as Mobile Web (invoked from the
browser) are compatible with and are certified on the most
widely used mobile devices.
WHITE PAPER
TGSLWP - WHITE PAPER 4
In short the role of the MDM is extremely important in effective deployment of the mobile banking service to
employees, businesses and marquee customers
The MDM Platform needs to take care of the following scenarios at the bare minimum
• Lost Device.
• Unauthorized access to device or application.
• Inappropriate use of the device or application.
• Change in the employee/business/agency status (transfer, termination, change of
responsibility within department etc).
• Changes in the procedures and regulations.
The high level system flow and role of MDM is shown below
The features of MDM should be implemented to: -
• Uniquely identify the device assigned to an employee,
consumer or business.
• Assign business functions and data access based on
the delegation model.
• Encrypt the information stored in the device even
during transit.
• Provide secure access to the application.
• Remotely locate the device.
• Identify abnormal use of the application.
• Prevent use by unauthorized persons - by way of
secure access, location control, usage control etc.
• Remotely erase the data from the device in case of
‘lost device’ or inappropriate or suspicious usage of
the device or application.
• Remotely lock the application/device from any use.
• Ensure a comprehensive anti-virus policy
The conditions relating to data-access and
data-modification will need to be implemented by the
individual departments by providing appropriate
Application Programme Interfaces (APIs), user level
data-access controls and logging/auditing mechanisms.
T r u s t t h e E x p e r t s
MOBILE DEVICE MANAGEMENT (MDM)
The MDM software secures monitors, manages and
supports mobile devices deployed across mobile
operators, service providers and enterprises. MDM
functionality typically includes over-the-air distribution of
applications, data and configuration settings for all types of
mobile devices, including mobile phones, Smartphones,
Tablet computers, ruggedized mobile computers, mobile
printers, mobile POS devices, etc. This applies to both
company-owned and employee-owned (BYOD) devices
across the enterprise or mobile devices owned by
consumers.
By controlling and protecting the data and configuration
settings for all mobile devices in the network, MDM can
reduce support costs and business risks. The intent of
MDM is to optimize the functionality and security of a
mobile communications network while minimizing cost and
downtime.
Unified
Communication Layer
Transaction
Management
Security Management
Check user credentials
Device Management
Check Device profile, user role, and
permissions (location, time restrictions)
WHITE PAPER
TGSLWP - WHITE PAPER 5
B2C (Retail Banking)
• Informational Banking (mini statement, stop cheque,
account balance, activity on account)
• Payment – bill payment, P2P transfer (inter and
intra bank)
• Credit card payment, loading prepaid card with
additional currency/funds
• Time Deposit/Fixed Deposit facility on mobile
• ATM Locator – GPS & Map integration
• Branch Locator – GPS & Map Integration
• Apply for Demand Draft/Traveler’s
Cheque/Manager’s Cheque
• Various Statement in PDF, SMS or other formats
supported on mobile channels
• In application / Out of application notifications or alerts
SERVICES (Features and Functions)
Disclaimer: All the documentation and other material contained herein is the property of Thinksoft Global Services and all intellectual
property rights in and to the same are owned by Thinksoft Global Services. You shall not, unless previously authorized by Thinksoft
Global Services in writing, copy, reproduce, market, license, lease or in any other way, dispose of, or utilize for profit, or exercise any
ownership rights over the same. In no event, unless required by applicable law or agreed to in writing, shall Thinksoft Global Services,
or any person be liable for any loss, expense or damage, of any type or nature arising out of the use of, or inability to use any material
contained herein. Any such material is provided “as is”, without warranty of any type or nature, either express or implied. All names,
logos are used for identification purposes only and are trademarks or registered trademarks of their respective companies.
For more details visit, www.thinksoftglobal.com
T r u s t t h e E x p e r t s
PAYMENT SUPPORT
The platform should integrate with core banking, the
card management system and the prepaid system of the
bank to enable all possible payment and banking options
to customers.
INTEGRATION SUPPORT
The mobile banking platform should have a well defined
integration layer for the platform to enroll more
merchants (billers, over the counter merchants, other
banking systems etc). The platform should have been
developed using an open standard. A well defined Web
Services API needs to be enabled for ease of integration
and faster deployment.
T r u s t t h e E x p e r t s
FRAUD MANAGEMENT
Detecting and preventing fraudulent activities is a key
component of the mobile services platform. The platform
should have the ability to integrate with existing fraud
engines, define fraud rules, generate alerts and have the
ability to either automatically block or provide the process
for administrators to review and block any type of
activity/users from transacting on the system. Detailed and
summarized reporting of the suspicious activities, reporting
of improvements due to implementation of various rules
and the analysis of patterns based on various parameters
are integral part of the fraud management module.
Key features –
• Fraud Prevention – Customer Education, Product
Security (PIN, OTP, BIOMETRIC, Additional Factors –
like profile questions, Device Characteristics mapping,
M# verification)
• Activity alerting – in-apps/out-of-apps (SMS / Call center
call to verify activity)
• Detection of Fraud – transaction (txn) pattern (value or #
of txns, specific type of txn) - look for anomalous
behavior
• Resolution of Fraud– Customer Support, Channel
Specific Fraud & fixing issues specific to channel, legal
mechanism (zero-liability, breach of security due to s/w
mal-function, inadequacies)
USABILITY
• Device specific rendering
• Detection of device modes (portrait Vs landscape or
vertical or horizontal mode), Touch Vs Non-touch device
• Use of device features – for example use of GPS to
locate ATM locator in the GPS enabled devices
• Ability to inherit display characteristics of the device
• Personalization to configure alerts/ notifications,
configure service list
• Support for QR code based activity
• QR code on website or in the email, mailer indicating
download URL for apps
• QR code with bill information when scanned can
pre-fill the bill payment information for the customer
• Advanced Market Information
• Allow Securities transactions
B2B (Bank to other businesses)
• Payment to businesses
• Account Details
• Approval – within bank or approval by businesses
(including approval hierarchy support)
WHITE PAPER

Weitere ähnliche Inhalte

Was ist angesagt?

Ec2009 ch08 mobile commerce and pervasive computing
Ec2009 ch08 mobile commerce and pervasive computingEc2009 ch08 mobile commerce and pervasive computing
Ec2009 ch08 mobile commerce and pervasive computingNuth Otanasap
 
Mobile technology-Unit 1
Mobile technology-Unit 1Mobile technology-Unit 1
Mobile technology-Unit 1Swapnali Pawar
 
Gemalto Le Mobile 2.0 Edition 2009
Gemalto Le Mobile 2.0 Edition 2009Gemalto Le Mobile 2.0 Edition 2009
Gemalto Le Mobile 2.0 Edition 2009servicesmobiles.fr
 
What UICC Means for NFC & Security
What UICC Means for NFC & SecurityWhat UICC Means for NFC & Security
What UICC Means for NFC & SecurityForgeRock
 
Intel_Intelligent Solutions for Military and Aerospace
Intel_Intelligent Solutions for Military and AerospaceIntel_Intelligent Solutions for Military and Aerospace
Intel_Intelligent Solutions for Military and AerospaceIşınsu Akçetin
 
CIO Guide To Mobile Recording
CIO Guide To Mobile RecordingCIO Guide To Mobile Recording
CIO Guide To Mobile RecordingEddie Steede
 
Mtel Cash Mobile Commerce Suite
Mtel Cash Mobile Commerce SuiteMtel Cash Mobile Commerce Suite
Mtel Cash Mobile Commerce Suitewatsongallery
 
Retail Banking: Making other Channels mobile
Retail Banking: Making other Channels mobileRetail Banking: Making other Channels mobile
Retail Banking: Making other Channels mobileInfosys Finacle
 
Mobile Financial Services
Mobile Financial ServicesMobile Financial Services
Mobile Financial Servicesmgopik
 
Next Generation Networks for Contactless and Mobile Ticketing
Next Generation Networks for Contactless and Mobile TicketingNext Generation Networks for Contactless and Mobile Ticketing
Next Generation Networks for Contactless and Mobile TicketingFujitsu Network Communications
 
Voxeo Summit Day 2 - Securing customer interactions
Voxeo Summit Day 2 - Securing customer interactionsVoxeo Summit Day 2 - Securing customer interactions
Voxeo Summit Day 2 - Securing customer interactionsVoxeo Corp
 
M2M Stategy of the Open Mobile Alliance - Fraunhofer FUSECO Forum 2011
M2M Stategy of the Open Mobile Alliance - Fraunhofer FUSECO Forum 2011M2M Stategy of the Open Mobile Alliance - Fraunhofer FUSECO Forum 2011
M2M Stategy of the Open Mobile Alliance - Fraunhofer FUSECO Forum 2011Musa Unmehopa
 
Cidway Bank Finance 01 2009 2 Fa Tr
Cidway Bank Finance 01 2009 2 Fa TrCidway Bank Finance 01 2009 2 Fa Tr
Cidway Bank Finance 01 2009 2 Fa Trlfilliat
 
Accessing pay buy mobile model
Accessing pay buy mobile modelAccessing pay buy mobile model
Accessing pay buy mobile modelArief Gunawan
 
Mobile based authentication and payment
Mobile based authentication and paymentMobile based authentication and payment
Mobile based authentication and paymentJosef Noll
 
MRV Leaflet English
MRV Leaflet EnglishMRV Leaflet English
MRV Leaflet EnglishSkeye
 
mobile payment in india operative guidelines for
mobile payment in india   operative guidelines formobile payment in india   operative guidelines for
mobile payment in india operative guidelines forAshish Barapatre
 

Was ist angesagt? (20)

Ec2009 ch08 mobile commerce and pervasive computing
Ec2009 ch08 mobile commerce and pervasive computingEc2009 ch08 mobile commerce and pervasive computing
Ec2009 ch08 mobile commerce and pervasive computing
 
Mobile technology-Unit 1
Mobile technology-Unit 1Mobile technology-Unit 1
Mobile technology-Unit 1
 
Gemalto Le Mobile 2.0 Edition 2009
Gemalto Le Mobile 2.0 Edition 2009Gemalto Le Mobile 2.0 Edition 2009
Gemalto Le Mobile 2.0 Edition 2009
 
What UICC Means for NFC & Security
What UICC Means for NFC & SecurityWhat UICC Means for NFC & Security
What UICC Means for NFC & Security
 
Intel_Intelligent Solutions for Military and Aerospace
Intel_Intelligent Solutions for Military and AerospaceIntel_Intelligent Solutions for Military and Aerospace
Intel_Intelligent Solutions for Military and Aerospace
 
CIO Guide To Mobile Recording
CIO Guide To Mobile RecordingCIO Guide To Mobile Recording
CIO Guide To Mobile Recording
 
Mobile banking
Mobile bankingMobile banking
Mobile banking
 
Mtel Cash Mobile Commerce Suite
Mtel Cash Mobile Commerce SuiteMtel Cash Mobile Commerce Suite
Mtel Cash Mobile Commerce Suite
 
Retail Banking: Making other Channels mobile
Retail Banking: Making other Channels mobileRetail Banking: Making other Channels mobile
Retail Banking: Making other Channels mobile
 
Mobile Financial Services
Mobile Financial ServicesMobile Financial Services
Mobile Financial Services
 
Next Generation Networks for Contactless and Mobile Ticketing
Next Generation Networks for Contactless and Mobile TicketingNext Generation Networks for Contactless and Mobile Ticketing
Next Generation Networks for Contactless and Mobile Ticketing
 
Rcs ts.com 14 8-2012
Rcs ts.com 14 8-2012Rcs ts.com 14 8-2012
Rcs ts.com 14 8-2012
 
Voxeo Summit Day 2 - Securing customer interactions
Voxeo Summit Day 2 - Securing customer interactionsVoxeo Summit Day 2 - Securing customer interactions
Voxeo Summit Day 2 - Securing customer interactions
 
M2M Stategy of the Open Mobile Alliance - Fraunhofer FUSECO Forum 2011
M2M Stategy of the Open Mobile Alliance - Fraunhofer FUSECO Forum 2011M2M Stategy of the Open Mobile Alliance - Fraunhofer FUSECO Forum 2011
M2M Stategy of the Open Mobile Alliance - Fraunhofer FUSECO Forum 2011
 
Antique_Bank_Smart_Systems__PPT
Antique_Bank_Smart_Systems__PPTAntique_Bank_Smart_Systems__PPT
Antique_Bank_Smart_Systems__PPT
 
Cidway Bank Finance 01 2009 2 Fa Tr
Cidway Bank Finance 01 2009 2 Fa TrCidway Bank Finance 01 2009 2 Fa Tr
Cidway Bank Finance 01 2009 2 Fa Tr
 
Accessing pay buy mobile model
Accessing pay buy mobile modelAccessing pay buy mobile model
Accessing pay buy mobile model
 
Mobile based authentication and payment
Mobile based authentication and paymentMobile based authentication and payment
Mobile based authentication and payment
 
MRV Leaflet English
MRV Leaflet EnglishMRV Leaflet English
MRV Leaflet English
 
mobile payment in india operative guidelines for
mobile payment in india   operative guidelines formobile payment in india   operative guidelines for
mobile payment in india operative guidelines for
 

Andere mochten auch

Why Outsource? HHJR Consulting
Why Outsource? HHJR ConsultingWhy Outsource? HHJR Consulting
Why Outsource? HHJR ConsultingHamish Sinclair
 
Directional Advertising - ©2013 Best Media
Directional Advertising - ©2013 Best MediaDirectional Advertising - ©2013 Best Media
Directional Advertising - ©2013 Best Mediayourbestmedia
 
インプリハック・リベンジハック
インプリハック・リベンジハックインプリハック・リベンジハック
インプリハック・リベンジハックsonycsl
 
Communications Solutions Pubblica Amministrazione
Communications Solutions Pubblica AmministrazioneCommunications Solutions Pubblica Amministrazione
Communications Solutions Pubblica AmministrazioneOpen Solution srl
 
Meghaduta - Thinksoft Newsletter (October'13)
Meghaduta - Thinksoft Newsletter (October'13)Meghaduta - Thinksoft Newsletter (October'13)
Meghaduta - Thinksoft Newsletter (October'13)Thinksoft Global
 
ハッカソンてなに?
ハッカソンてなに?ハッカソンてなに?
ハッカソンてなに?sonycsl
 

Andere mochten auch (8)

Why Outsource? HHJR Consulting
Why Outsource? HHJR ConsultingWhy Outsource? HHJR Consulting
Why Outsource? HHJR Consulting
 
Directional Advertising - ©2013 Best Media
Directional Advertising - ©2013 Best MediaDirectional Advertising - ©2013 Best Media
Directional Advertising - ©2013 Best Media
 
インプリハック・リベンジハック
インプリハック・リベンジハックインプリハック・リベンジハック
インプリハック・リベンジハック
 
Presentation1
Presentation1Presentation1
Presentation1
 
Communications Solutions Pubblica Amministrazione
Communications Solutions Pubblica AmministrazioneCommunications Solutions Pubblica Amministrazione
Communications Solutions Pubblica Amministrazione
 
Meghaduta - Thinksoft Newsletter (October'13)
Meghaduta - Thinksoft Newsletter (October'13)Meghaduta - Thinksoft Newsletter (October'13)
Meghaduta - Thinksoft Newsletter (October'13)
 
ハッカソンてなに?
ハッカソンてなに?ハッカソンてなに?
ハッカソンてなに?
 
River island
River islandRiver island
River island
 

Ähnlich wie What to Expect from a Mobile Banking Solution? (Whitepaper)

Inter connect2015 ame-3495
Inter connect2015 ame-3495Inter connect2015 ame-3495
Inter connect2015 ame-3495Phil Coxhead
 
ISACA Mobile Payments Forum presentation
ISACA Mobile Payments Forum presentationISACA Mobile Payments Forum presentation
ISACA Mobile Payments Forum presentationMarc Vael
 
MobiWeb - OTP SMS Two Factor Authentication
MobiWeb - OTP SMS Two Factor AuthenticationMobiWeb - OTP SMS Two Factor Authentication
MobiWeb - OTP SMS Two Factor AuthenticationMobiWeb
 
Mobile Money Business Track: understanding the Model and Market
Mobile Money Business Track: understanding the Model and MarketMobile Money Business Track: understanding the Model and Market
Mobile Money Business Track: understanding the Model and MarketArief Gunawan
 
MobiWeb - SMS Banking
MobiWeb - SMS BankingMobiWeb - SMS Banking
MobiWeb - SMS BankingMobiWeb
 
Introduction to IBM MessageSight - IMPACT 2014
Introduction to IBM MessageSight - IMPACT 2014Introduction to IBM MessageSight - IMPACT 2014
Introduction to IBM MessageSight - IMPACT 2014Arnaud Mathieu
 
Introduction to IBM MessageSight
Introduction to IBM MessageSightIntroduction to IBM MessageSight
Introduction to IBM MessageSightAndrew Schofield
 
Temenos_Connect_Mobile_Banking_Overview
Temenos_Connect_Mobile_Banking_OverviewTemenos_Connect_Mobile_Banking_Overview
Temenos_Connect_Mobile_Banking_OverviewDavid Courtney
 
Introduction to MessageSight - gateway to the internet of things and mobile m...
Introduction to MessageSight - gateway to the internet of things and mobile m...Introduction to MessageSight - gateway to the internet of things and mobile m...
Introduction to MessageSight - gateway to the internet of things and mobile m...Bernard Kufluk
 
Changing Your Enterprise Architecture - Mobile is Not an Add-On
Changing Your Enterprise Architecture - Mobile is Not an Add-OnChanging Your Enterprise Architecture - Mobile is Not an Add-On
Changing Your Enterprise Architecture - Mobile is Not an Add-OnWheatstone
 
Managing & Securing the Online and Mobile banking - Chew Chee Seng
Managing & Securing the Online and Mobile banking - Chew Chee SengManaging & Securing the Online and Mobile banking - Chew Chee Seng
Managing & Securing the Online and Mobile banking - Chew Chee SengKnowledge Group
 
Future of m commerce
Future of m commerceFuture of m commerce
Future of m commerceAlok Gupta
 

Ähnlich wie What to Expect from a Mobile Banking Solution? (Whitepaper) (20)

Ultimate company
Ultimate companyUltimate company
Ultimate company
 
Inter connect2015 ame-3495
Inter connect2015 ame-3495Inter connect2015 ame-3495
Inter connect2015 ame-3495
 
ISACA Mobile Payments Forum presentation
ISACA Mobile Payments Forum presentationISACA Mobile Payments Forum presentation
ISACA Mobile Payments Forum presentation
 
MobiWeb - OTP SMS Two Factor Authentication
MobiWeb - OTP SMS Two Factor AuthenticationMobiWeb - OTP SMS Two Factor Authentication
MobiWeb - OTP SMS Two Factor Authentication
 
Mobile Money Business Track: understanding the Model and Market
Mobile Money Business Track: understanding the Model and MarketMobile Money Business Track: understanding the Model and Market
Mobile Money Business Track: understanding the Model and Market
 
MobiWeb - SMS Banking
MobiWeb - SMS BankingMobiWeb - SMS Banking
MobiWeb - SMS Banking
 
otp-sms-two-factor-authentication
otp-sms-two-factor-authenticationotp-sms-two-factor-authentication
otp-sms-two-factor-authentication
 
New Banking to the Unbanked
New Banking to the UnbankedNew Banking to the Unbanked
New Banking to the Unbanked
 
Introduction to IBM MessageSight - IMPACT 2014
Introduction to IBM MessageSight - IMPACT 2014Introduction to IBM MessageSight - IMPACT 2014
Introduction to IBM MessageSight - IMPACT 2014
 
Introduction to IBM MessageSight
Introduction to IBM MessageSightIntroduction to IBM MessageSight
Introduction to IBM MessageSight
 
M commerce
M commerceM commerce
M commerce
 
Temenos_Connect_Mobile_Banking_Overview
Temenos_Connect_Mobile_Banking_OverviewTemenos_Connect_Mobile_Banking_Overview
Temenos_Connect_Mobile_Banking_Overview
 
Final ppt
Final pptFinal ppt
Final ppt
 
Introduction to MessageSight - gateway to the internet of things and mobile m...
Introduction to MessageSight - gateway to the internet of things and mobile m...Introduction to MessageSight - gateway to the internet of things and mobile m...
Introduction to MessageSight - gateway to the internet of things and mobile m...
 
Changing Your Enterprise Architecture - Mobile is Not an Add-On
Changing Your Enterprise Architecture - Mobile is Not an Add-OnChanging Your Enterprise Architecture - Mobile is Not an Add-On
Changing Your Enterprise Architecture - Mobile is Not an Add-On
 
MIS 11 M-Commerce
MIS 11 M-CommerceMIS 11 M-Commerce
MIS 11 M-Commerce
 
Cmsc666 Mc
Cmsc666 McCmsc666 Mc
Cmsc666 Mc
 
Managing & Securing the Online and Mobile banking - Chew Chee Seng
Managing & Securing the Online and Mobile banking - Chew Chee SengManaging & Securing the Online and Mobile banking - Chew Chee Seng
Managing & Securing the Online and Mobile banking - Chew Chee Seng
 
Future of m commerce
Future of m commerceFuture of m commerce
Future of m commerce
 
hSenid - Company Presentation 2009
hSenid - Company Presentation 2009hSenid - Company Presentation 2009
hSenid - Company Presentation 2009
 

Mehr von Thinksoft Global

Faximmé - Financial Transaction Simulator
Faximmé - Financial Transaction SimulatorFaximmé - Financial Transaction Simulator
Faximmé - Financial Transaction SimulatorThinksoft Global
 
Mobile payments test automation
Mobile payments test automationMobile payments test automation
Mobile payments test automationThinksoft Global
 
Payments Testing @ Thinksoft
Payments Testing @ ThinksoftPayments Testing @ Thinksoft
Payments Testing @ ThinksoftThinksoft Global
 
Case Study Atom Revitilization
Case Study Atom RevitilizationCase Study Atom Revitilization
Case Study Atom RevitilizationThinksoft Global
 
Integration of supply chain management_Gulf Sabah Bank
Integration of supply chain management_Gulf Sabah BankIntegration of supply chain management_Gulf Sabah Bank
Integration of supply chain management_Gulf Sabah BankThinksoft Global
 
No Choice But to Comply - FATCA
 No Choice But to Comply - FATCA No Choice But to Comply - FATCA
No Choice But to Comply - FATCAThinksoft Global
 
UAT for a Major US Banking Conglomerate
UAT for a Major US Banking ConglomerateUAT for a Major US Banking Conglomerate
UAT for a Major US Banking ConglomerateThinksoft Global
 
Cards Performance Testing (Whitepaper)
Cards Performance Testing (Whitepaper)Cards Performance Testing (Whitepaper)
Cards Performance Testing (Whitepaper)Thinksoft Global
 
ATM Outsourcing in India and Global Trends (Whitepaper)
ATM Outsourcing in India and Global Trends (Whitepaper)ATM Outsourcing in India and Global Trends (Whitepaper)
ATM Outsourcing in India and Global Trends (Whitepaper)Thinksoft Global
 
UAT - Cards Migration (Whitepaper)
UAT - Cards Migration (Whitepaper)UAT - Cards Migration (Whitepaper)
UAT - Cards Migration (Whitepaper)Thinksoft Global
 
Global Insurance (Case Study)
Global Insurance (Case Study)Global Insurance (Case Study)
Global Insurance (Case Study)Thinksoft Global
 

Mehr von Thinksoft Global (20)

Faximmé - Financial Transaction Simulator
Faximmé - Financial Transaction SimulatorFaximmé - Financial Transaction Simulator
Faximmé - Financial Transaction Simulator
 
Mobile payments test automation
Mobile payments test automationMobile payments test automation
Mobile payments test automation
 
Banking on Thinksoft
Banking on ThinksoftBanking on Thinksoft
Banking on Thinksoft
 
Funds Transfer Pricing
Funds Transfer PricingFunds Transfer Pricing
Funds Transfer Pricing
 
Payments Testing @ Thinksoft
Payments Testing @ ThinksoftPayments Testing @ Thinksoft
Payments Testing @ Thinksoft
 
Case Study Atom Revitilization
Case Study Atom RevitilizationCase Study Atom Revitilization
Case Study Atom Revitilization
 
Integration of supply chain management_Gulf Sabah Bank
Integration of supply chain management_Gulf Sabah BankIntegration of supply chain management_Gulf Sabah Bank
Integration of supply chain management_Gulf Sabah Bank
 
No Choice But to Comply - FATCA
 No Choice But to Comply - FATCA No Choice But to Comply - FATCA
No Choice But to Comply - FATCA
 
Capital Markets
Capital MarketsCapital Markets
Capital Markets
 
UAT for a Major US Banking Conglomerate
UAT for a Major US Banking ConglomerateUAT for a Major US Banking Conglomerate
UAT for a Major US Banking Conglomerate
 
Cards Performance Testing (Whitepaper)
Cards Performance Testing (Whitepaper)Cards Performance Testing (Whitepaper)
Cards Performance Testing (Whitepaper)
 
ATM Outsourcing in India and Global Trends (Whitepaper)
ATM Outsourcing in India and Global Trends (Whitepaper)ATM Outsourcing in India and Global Trends (Whitepaper)
ATM Outsourcing in India and Global Trends (Whitepaper)
 
UAT - Cards Migration (Whitepaper)
UAT - Cards Migration (Whitepaper)UAT - Cards Migration (Whitepaper)
UAT - Cards Migration (Whitepaper)
 
Solvency II Offering
Solvency II Offering Solvency II Offering
Solvency II Offering
 
Secure your Treasures
Secure your Treasures Secure your Treasures
Secure your Treasures
 
Performance Testing
Performance Testing Performance Testing
Performance Testing
 
General Insurance
General InsuranceGeneral Insurance
General Insurance
 
Casualty Insurance
Casualty Insurance Casualty Insurance
Casualty Insurance
 
Global Insurance
Global Insurance Global Insurance
Global Insurance
 
Global Insurance (Case Study)
Global Insurance (Case Study)Global Insurance (Case Study)
Global Insurance (Case Study)
 

Kürzlich hochgeladen

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 

Kürzlich hochgeladen (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 

What to Expect from a Mobile Banking Solution? (Whitepaper)

  • 1. T r u s t t h e E x p e r t s WHAT TO EXPECT FROM A MOBILE BANKING SOLUTION INTRODUCTION Mobile Banking (M-Banking) involves using mobile devices to gain access to financial services. A large number of mobile banking and payment solutions are available in the market catering to various needs of the financial institutions. The key to successful implementation is the selection of a software vendor who would be responsible for providing solutions to meet the organization’s requirement and to ensure the key principles of a good mobile banking solution.BASIC PRINCIPLES OF THE PLATFORM Interoperability Inclusive Implementation •Available to All • Delivered to All • Accessible by all Security and Privacy Openness Flexibility and Scalability Device Agnosticism WHITE PAPER
  • 2. T r u s t t h e E x p e r t s FUNCTIONAL VIEW OF THE PLATFORM Legend: NFC: Near Field Communication, SMS: Short Messaging Service, USSD: GSM’s Unstructured Supplementary Services Data, IVR: Interactive Voice Response UNIFIED COMMUNICATION MODULE Unified Communication Module (UCM) acts as an interface between the various channels and the rest of the mobile banking platform. The UCM should communicate with the Telco’s service agents, clients, devices, applications and portals indicated at a* using the protocols supported by the various applications. UCM should be developed to also cater to any future message-format, channel or device. Future proofing is of paramount importance and the UCM should support at a bare minimum, the protocols at b*, The UCM should TGSLWP - WHITE PAPER 2 a*} SMSC: Short Message Service Center, SMS Aggregator, MMS: Multi Messaging Service, IVR Server, ATM, Micro ATM, Smart Client application and Mobile Web portal b*} SMPP: Short Message Peer to Peer, UCP: Universal Computer Protocol (a subset of which is EMI or External Machine Interface), HTTP: Hyper Text Transfer Protocol, HTTPS: HTTP Secure protocol, ISO 8583 and Web Services protocols such as SOAP: Simple Object Access Protocol and, REST: Representational State Transfer have minimum logic and should transfer the incoming message to the appropriate mobile banking module using a common interface protocol defined by the applications. After verifying the data, the UCM may interface with other modules for verification/authentication of the message before passing it on to the next module for further processing. Similarly all the outgoing messages need to pass through the UCM; with the UCM translating the message to the appropriate format before sending it to the mobile device. WHITE PAPER
  • 3. TGSLWP - WHITE PAPER 3 INTEROPERABILITY IN SUPPORTED CHANNELS In supporting multiple channels it would be important to ensure the following: - • Support for Push SMS, Pull SMS, USSD, IVR, Mobile Web, Smart Client, SIM/WIB based application, NFC, Mobile as a POS, Outbound dialer (important in areas where voice confirmation may be preferred over SMS due to literacy issues), ATM and Mobile Point of Service (Mobile POS) • Seamless migration from one channel to another. • Need for just one-time registration by the user, irrespective of the channel used. • Ability of the channel management & communication module to recognize the transacting channel and respond appropriately SMS aggregation service is typically provided by the SMS Aggregator; hence banks will need to enter into a techno-commercial relationship with the SMS aggregator to get a short/long code and also to provide service to customers of all the telecom providers in the region/country. • The SMS based implementation is predominantly used for pushing the information to the individual user or business upon occurrence of certain events such as a purchase, funds-transfer or deposit. • Instead of opting for a short code (which works across all the Telcos), a bank may opt for a long code from a particular Telco. USSD service requires direct connectivity with the Telecom operator; hence banks need to have direct techno-commercial technical relationship with the Telco. SIM card based applications needs a relationship with the telecom operator. IVR & Outbound Dialer services could be implemented independent of telecom relationship. The service providers can provide and deploy a self managed solution at the Bank’s premises. IVR also provides the option of enabling solutions in local languages. AUTHENTICATION/SECURITY When it comes to authentication of the user and data security, the Platform: - • Needs to accept Static Passwords, One Time Passwords, Biometrics, usernames/passwords and additional profile questions depending on the type of activity • Should be able to accept the Mobile # or Device ID to authenticate the user • Should ensure authentication across multiple channels • Should be able to support HSM based AES, 3DES encryption, 1024 bit or higher PKI implementation (HSM: Hardware Security Module, aka Host Security Module, AES: Advanced Encryption Standard), 3DES: Triple Data Encryption Standard, PKI: Public Key Infrastructure • Should be able to store encrypted data with the ability to decrypt it after authentication • Should have adequate security features to securely store the data in the device T r u s t t h e E x p e r t s • Ability to configure & manage one or more channels for one or more services ECO-SYSTEM DEPENDENCY IN IMPLEMENTING CHANNELS In countries, with wide, reliable and affordable data connectivity, banks are recommended to use Smart Client or Mobile Web (WAP and HTML5) as the channel to implement mobile banking services without having to depend on the telecom operator. ECO-SYSTEM DEPENDENCY IN MOBILE DEVICES AND OPERATING SYSTEMS Internationally, there are a large number of mobile devices available. The features, functionality and operating systems being supported varies from device to device. Brand loyalty varies from country to country and within a country from region to region with a direct impact on the mobile banking system. Some of the popular devices are: Apple’s iPhone running iOS Samsung, Sony, LG, MTS and Motorola phones running the Android OS RIM phones running the Blackberry OS. Nokia phones running the Symbian OS Smart phones running the Windows mobile OS The solution needs to support the most popular device families in the country. In other words, the bank needs to make sure that their mobile banking application (smart client apps) as well as Mobile Web (invoked from the browser) are compatible with and are certified on the most widely used mobile devices. WHITE PAPER
  • 4. TGSLWP - WHITE PAPER 4 In short the role of the MDM is extremely important in effective deployment of the mobile banking service to employees, businesses and marquee customers The MDM Platform needs to take care of the following scenarios at the bare minimum • Lost Device. • Unauthorized access to device or application. • Inappropriate use of the device or application. • Change in the employee/business/agency status (transfer, termination, change of responsibility within department etc). • Changes in the procedures and regulations. The high level system flow and role of MDM is shown below The features of MDM should be implemented to: - • Uniquely identify the device assigned to an employee, consumer or business. • Assign business functions and data access based on the delegation model. • Encrypt the information stored in the device even during transit. • Provide secure access to the application. • Remotely locate the device. • Identify abnormal use of the application. • Prevent use by unauthorized persons - by way of secure access, location control, usage control etc. • Remotely erase the data from the device in case of ‘lost device’ or inappropriate or suspicious usage of the device or application. • Remotely lock the application/device from any use. • Ensure a comprehensive anti-virus policy The conditions relating to data-access and data-modification will need to be implemented by the individual departments by providing appropriate Application Programme Interfaces (APIs), user level data-access controls and logging/auditing mechanisms. T r u s t t h e E x p e r t s MOBILE DEVICE MANAGEMENT (MDM) The MDM software secures monitors, manages and supports mobile devices deployed across mobile operators, service providers and enterprises. MDM functionality typically includes over-the-air distribution of applications, data and configuration settings for all types of mobile devices, including mobile phones, Smartphones, Tablet computers, ruggedized mobile computers, mobile printers, mobile POS devices, etc. This applies to both company-owned and employee-owned (BYOD) devices across the enterprise or mobile devices owned by consumers. By controlling and protecting the data and configuration settings for all mobile devices in the network, MDM can reduce support costs and business risks. The intent of MDM is to optimize the functionality and security of a mobile communications network while minimizing cost and downtime. Unified Communication Layer Transaction Management Security Management Check user credentials Device Management Check Device profile, user role, and permissions (location, time restrictions) WHITE PAPER
  • 5. TGSLWP - WHITE PAPER 5 B2C (Retail Banking) • Informational Banking (mini statement, stop cheque, account balance, activity on account) • Payment – bill payment, P2P transfer (inter and intra bank) • Credit card payment, loading prepaid card with additional currency/funds • Time Deposit/Fixed Deposit facility on mobile • ATM Locator – GPS & Map integration • Branch Locator – GPS & Map Integration • Apply for Demand Draft/Traveler’s Cheque/Manager’s Cheque • Various Statement in PDF, SMS or other formats supported on mobile channels • In application / Out of application notifications or alerts SERVICES (Features and Functions) Disclaimer: All the documentation and other material contained herein is the property of Thinksoft Global Services and all intellectual property rights in and to the same are owned by Thinksoft Global Services. You shall not, unless previously authorized by Thinksoft Global Services in writing, copy, reproduce, market, license, lease or in any other way, dispose of, or utilize for profit, or exercise any ownership rights over the same. In no event, unless required by applicable law or agreed to in writing, shall Thinksoft Global Services, or any person be liable for any loss, expense or damage, of any type or nature arising out of the use of, or inability to use any material contained herein. Any such material is provided “as is”, without warranty of any type or nature, either express or implied. All names, logos are used for identification purposes only and are trademarks or registered trademarks of their respective companies. For more details visit, www.thinksoftglobal.com T r u s t t h e E x p e r t s PAYMENT SUPPORT The platform should integrate with core banking, the card management system and the prepaid system of the bank to enable all possible payment and banking options to customers. INTEGRATION SUPPORT The mobile banking platform should have a well defined integration layer for the platform to enroll more merchants (billers, over the counter merchants, other banking systems etc). The platform should have been developed using an open standard. A well defined Web Services API needs to be enabled for ease of integration and faster deployment. T r u s t t h e E x p e r t s FRAUD MANAGEMENT Detecting and preventing fraudulent activities is a key component of the mobile services platform. The platform should have the ability to integrate with existing fraud engines, define fraud rules, generate alerts and have the ability to either automatically block or provide the process for administrators to review and block any type of activity/users from transacting on the system. Detailed and summarized reporting of the suspicious activities, reporting of improvements due to implementation of various rules and the analysis of patterns based on various parameters are integral part of the fraud management module. Key features – • Fraud Prevention – Customer Education, Product Security (PIN, OTP, BIOMETRIC, Additional Factors – like profile questions, Device Characteristics mapping, M# verification) • Activity alerting – in-apps/out-of-apps (SMS / Call center call to verify activity) • Detection of Fraud – transaction (txn) pattern (value or # of txns, specific type of txn) - look for anomalous behavior • Resolution of Fraud– Customer Support, Channel Specific Fraud & fixing issues specific to channel, legal mechanism (zero-liability, breach of security due to s/w mal-function, inadequacies) USABILITY • Device specific rendering • Detection of device modes (portrait Vs landscape or vertical or horizontal mode), Touch Vs Non-touch device • Use of device features – for example use of GPS to locate ATM locator in the GPS enabled devices • Ability to inherit display characteristics of the device • Personalization to configure alerts/ notifications, configure service list • Support for QR code based activity • QR code on website or in the email, mailer indicating download URL for apps • QR code with bill information when scanned can pre-fill the bill payment information for the customer • Advanced Market Information • Allow Securities transactions B2B (Bank to other businesses) • Payment to businesses • Account Details • Approval – within bank or approval by businesses (including approval hierarchy support) WHITE PAPER