Mobile Payment

Author(s):  
Gyõzõ Gódor ◽  
Zoltán Faigl ◽  
Máté Szalay

The widespread usage of new telecommunication technologies implies the demand on payment via Internet since the ’90s. First, these solutions were applied only by pioneer users, while average men still chose traditional payment methods such as payment by cash, cheque, or bank transfer. In the latest decade, the notable improvement of mobile communications allowed the provision of customized services. A new payment method has appeared which is called mobilepayment. Consequently, increasing number of banks provide access to their services via mobile equipment. Reliable network security is an essential prerequisite for the expansion of the rapidly growing world of electronic payment. Public key infrastructure (PKI) offers the capabilities needed to provide this security. Establishing trust in a wireless public key infrastructure (WPKI) is crucial for the success of applications that will exploit the opportunities created by handheld wireless devices. This trust is based on the reliability of the technology but also on a carefully implemented system of laws, policies, standards, and procedures. The development of trusted electronic transactions is motivated by legislation. The EU adopted a legislative framework to guarantee the security and acceptance of electronic signatures in 1999. The U.S. adopted legislation for the recognition of electronic signatures in national and global trade in June 2000 (Sievers, 2000). This article deals with mobile payment and mobile banking services and focuses particularly on the mobile side of the system. First, we introduce the technological background necessary for developing m-services, and we define the m-payment reference model. After that, the differences between chip-card and software based implementations will be presented. Finally, we conclude the article and summarize the main terms used in the article.

Author(s):  
Ludwig Slusky ◽  
Parviz Partow-Navid

All branches of federal government are required to change their business practices to a paperless operation. Privacy and information security are critical for the protection of information shared over networks internally between the U.S. government agencies and externally with nonfederal organizations (businesses; state, local, and foreign governments; academia; etc.) or individuals. The public-key infrastructure (PKI) is the simplest, most widely used architecture for secure data exchange over unsecured networks. It integrates computer hardware and software, cryptography, information and network security, and policies and procedures to facilitate trust in distributed electronic transactions and mitigate the associated risks. Federal PKI (FPKI) is PKI designed for implementation and use by government agencies. Federal PKI research was under way since 1991, and by the end of 2005, the federal PKI included 13 cross-certified federal entities, three approved shared service providers (SSPs; Verisign, Cyber- Trust, National Finance Center/U.S. Department of Agriculture [USDA]), one state, and three foreign countries (Canada, UK, and Australia; Alterman, 2005). Initially envisioned as an interoperability mechanism for federal organizations exclusively, the federal PKI is now positioned for trust interoperability and cross-certification internally among federal agencies and externally with other organizations.


Author(s):  
Swante Adi Krisna ◽  
Hari Purwadi

Notary's concept as Registration Authority has been facilitated by Indonesian law, for example Law Number 2 Year 2014 About Amendment to Law Number 30 Year 2004 Concerning Notary Public, which explains that "other authorities regulated in legislation", the authority to certify electronic transactions (Cyber notary), make a Deed of pledge of waqf, and mortgage of aircraft. In addition to Law Number 2 Year 2014 on Amendment to Law Number 30 of 2004 concerning Notary Public, Notary's role as Registration Authority is also described in Government Regulation Number 82 Year 2012 Concerning the Implementation of Electronic Transaction System and Transaction, especially in the explanation Article 59 Paragraph (5) explaining that the Ministerial Regulation contains, among other things, arrangements on the procedure of applying for electronic certification which can be submitted through a notary. In contrast to the notary role concept as the Registration Authority, the notary role concept as a subordinate certification authority is not possible because of various obstacles.


2008 ◽  
Vol 7 (2) ◽  
pp. 214-231 ◽  
Author(s):  
Marko Hassinen ◽  
Konstantin Hyppönen ◽  
Elena Trichina

Sign in / Sign up

Export Citation Format

Share Document