Login

Mobile Payments

Mobile Payments Image
The mobile phone is now a familiar object carried by the vast majority of the world’s population. From being a device used to make and receive phone calls on the move, it has increasingly become a device to view rich and access high value services. Now service providers are looking for other imaginative business models that to couple with these powerful, portable platforms. 
Mobile Payments encompass a wide range of scenarios where money can be accessed and transferred. Imagine a scenario where a user can pass a poster that advertizes a particular film release. The user can direct his phone at the poster and purchase the movie for immediate access on all his devices. At the heart of making this system work is strong authentication of both the user and his devices to ensure the purchase was intended, money is exchanged and access rights are given.  
 
 


Stakeholders in internet and retail Point-of-Sale transactions all benefit from strong authentication, since it lowers the inherent risk in accepting a payment. A difficult challenge to overcome is a trustworthy user authentication, most commonly something a user knows such as a PIN or password. As devices become increasingly more open, the risk of authenticating users with PINs or passwords can increase and so does the storage of payment credentials. Today’s offline transaction systems rely on tamper resistant devices and mobiles payment capable phones may need to be fitted with similar technology.

Beyond replacing payment cards with a mobile phone, handsets have the chance to evolve into Personal Point-of-Sales terminals that will enable users to bring their preferred payment network to any Point-of-Sale. Points-of-sale could become user location-aware, or as simple and low cost as a smart label. Payments will become truly Mobile!


ARM® TrustZone is a System-on-Chip (SoC) security concept that can protect payment subsystems from unauthorized use by software and hardware. TrustZone enables a system designer to isolate security critical hardware from an open and flexible main system. When combined with a TrustZone enabled processor, a hardware isolated run-time environment dedicated to security critical services can use the same high performance processor core as its host OS. Through isolation of both software and hardware a secure subsystem can be more easily evaluated for security and gain a security certification for much lower cost. Attempting this with a full SoC and Rich OS would take a considerable amount of time and effort. It might never be achieved since SoCs become increasingly complex with multiple bus-masters and OS updates are a frequent occurrence.

SecurCore integrates a number of features to assist manufacturers in creating tamper resistant secure devices capable of defending against advanced laboratory attacks. SecurCore processor cores are typically integrated within SIM cards, PayTV conditional access systems and other smart card applications.


Maximise


Cookies

We use cookies to give you the best experience on our website. By continuing to use our site you consent to our cookies.

Change Settings

Find out more about the cookies we set