SlideShare a Scribd company logo
1 of 36
The Future of Using Money

Jonathan LeBlanc (@jcleblanc)
Head of Developer Evangelism
PayPal North America
Physical Shopping
Bluetooth Low Energy (BLE)
Bluetooth vs. BLE
Maintaining the Connection
Continuous vs. Intermittent

Throughput
0.7–2.1 Mbit/s vs 0.27 Mbit/s

Power Consumption
1 mW vs. 0.01-0.5 mW
A Few Technical Specs
• Range: ~50 meters

• Latency to send data: 3ms
• Connections: >2 billion
• Channels: 40 (3 advertising / 37 data)
• Devices can support both bluetooth and
BLE (dual mode), or just one
Uses for BLE
Connecting the Internet of Things
Things have data, web services want data

State Exposure
• What temperature it currently is
• Your flight is now boarding
• A network connection is now available
Proximity Detection
You have entered a store
A BLE Device Will Connect For…
Sending signed data to a previously
bonded device
Advertising their presence to a device
wanting to connect
Reconnecting asynchronously due to a
local event
How the Technology Works
A transparent bridge from device to IP

Central
Device

Peripheral
Bridge

IP Address
Endpoint
A BLE Use Case

PayPal Beacon
http://paypal.com/beacon
Commerce Identification
Two Facets of Identification
Device and personal
Device

Identity

Personal Identity
Digital Commerce
Digital Device Identification
The Challenges of the Model
Chargebacks and fraud

Copyright owner concerns

Tracking buyers
Device Fingerprinting
https://panopticlick.eff.org/
Browser characteristic

Bits of identifying
information

1 in x browsers with
same characterists

User Agent

12.01

4117.11

Browser Plugin Detail

6.8

111.13

Time Zone

21.6+

3178409

Screen Size / Color Depth

4.56

23.58

System Fonts

21.6+

3178409

Cookies Enabled?

0.44

1.35

Limited Supercookie Test

0.98

1.97
Identity for Personalization
Identity as a Mobile Foundation

Social Login Systems
Lots and Lots of Fake Data
Two Current Auth Specifications
Moving Identity Forward

Using Identity to Remove Login
Identity to Remove Registration
Identity is Mobile Foundation

Personalization for User Shortcuts
23% of customers abandoned carts when
asked to register (Forrester)

…At five questions, the drop-off rate is 2
percent; at 10 questions, 4 percent, and
so on. Only at about question 35 does the
correlation end (Kevin Hale, Wufoo)
Optimists consider that up to a 30% of
ecommerce sales increase is thanks to
cross-selling recommended products
fikobservatory

Personalized Recommendations
Hardware Prototyping
Hardware Toolbox
Arduino
Arduino / Raspberry Pi / Leap Motion / etc.

Rasperry Pi

Leap Motion
Arduino Payments
The Sketch
#include <Bridge.h>
#include <Temboo.h>
#include "TembooAccount.h"
TembooChoreo AcceptPayPalPaymentChoreo;

//invoke temboo client
AcceptPayPalPaymentChoreo.begin();
//temboo account credentials
AcceptPayPalPaymentChoreo.setAccountName(
TEMBOO_ACCOUNT);
AcceptPayPalPaymentChoreo.setAppKeyName(
TEMBOO_APP_KEY_NAME);
AcceptPayPalPaymentChoreo.setAppKey(
TEMBOO_APP_KEY);
AcceptPayPalPaymentChoreo.addInput("ClientID",
"AXrysRDeQOaGFm5UxSgdS7f-b4QTA-nhFmMp");
AcceptPayPalPaymentChoreo.addInput("ClientSecret",
"EHMH6gxjTn9zBocpTnFJoulKaNFprCcc9q7eh");

AcceptPayPalPaymentChoreo.addInput("CancelURL",
"http://www.jcleblanc.com/cancel");
AcceptPayPalPaymentChoreo.addInput("Currency",
"USD");
AcceptPayPalPaymentChoreo.addInput("ReturnURL",
"http://www.jcleblanc.com/return");
AcceptPayPalPaymentChoreo.addInput("Total", "5");
//run payment choreo
AcceptPayPalPaymentChoreo.setChoreo("/Library/
PayPal/Payments/AcceptPayPalPayment");
//run choreo and print to serial
AcceptPayPalPaymentChoreo.run();
while(AcceptPayPalPaymentChoreo.available()){
char c = AcceptPayPalPaymentChoreo.read();
Serial.print(c);
}
AcceptPayPalPaymentChoreo.close();
The End Result
Leap Motion Auctions
Gesture Controlled Auctions
The Future of Commerce
Bluetooth Low Energy
Physical Shopping

Identity and Personalization
Digital Shopping

Hardware Hacks
New Shopping Hardware Tech
Thanks! Questions?
http://www.slideshare.net/jcleblanc

Jonathan LeBlanc (@jcleblanc)
Head of Developer Evangelism
PayPal North America

More Related Content

Viewers also liked

Viewers also liked (6)

Trust But Control: Managing Privileges without killing productivity
Trust But Control:  Managing Privileges without killing productivityTrust But Control:  Managing Privileges without killing productivity
Trust But Control: Managing Privileges without killing productivity
 
Creating a User-Centric Mobile Payment Architecture
Creating a User-Centric Mobile Payment ArchitectureCreating a User-Centric Mobile Payment Architecture
Creating a User-Centric Mobile Payment Architecture
 
ES6 at PayPal
ES6 at PayPalES6 at PayPal
ES6 at PayPal
 
Modern API Security with JSON Web Tokens
Modern API Security with JSON Web TokensModern API Security with JSON Web Tokens
Modern API Security with JSON Web Tokens
 
Hackathon winning pitch
Hackathon winning pitchHackathon winning pitch
Hackathon winning pitch
 
The Future of Mobile Payments
The Future of Mobile PaymentsThe Future of Mobile Payments
The Future of Mobile Payments
 

Similar to The Future of Using Money

Kavya racharla ndh-naropanth_fin
Kavya racharla ndh-naropanth_finKavya racharla ndh-naropanth_fin
Kavya racharla ndh-naropanth_fin
PacSecJP
 
Charles Verdon - Samedi SQL - Futur de l'intelligence d'affaire
Charles Verdon - Samedi SQL - Futur de l'intelligence d'affaire Charles Verdon - Samedi SQL - Futur de l'intelligence d'affaire
Charles Verdon - Samedi SQL - Futur de l'intelligence d'affaire
MSDEVMTL
 
How to Quantify the Value of Kafka in Your Organization
How to Quantify the Value of Kafka in Your Organization How to Quantify the Value of Kafka in Your Organization
How to Quantify the Value of Kafka in Your Organization
confluent
 
Ecommerce(3)
Ecommerce(3)Ecommerce(3)
Ecommerce(3)
ecommerce
 
Security For The People: End-User Authentication Security on the Internet by ...
Security For The People: End-User Authentication Security on the Internet by ...Security For The People: End-User Authentication Security on the Internet by ...
Security For The People: End-User Authentication Security on the Internet by ...
Duo Security
 

Similar to The Future of Using Money (20)

Kavya racharla ndh-naropanth_fin
Kavya racharla ndh-naropanth_finKavya racharla ndh-naropanth_fin
Kavya racharla ndh-naropanth_fin
 
JAM805 - Beyond the Device
JAM805 -  Beyond the DeviceJAM805 -  Beyond the Device
JAM805 - Beyond the Device
 
Are Bot Operators Eating Your Lunch?
Are Bot Operators Eating Your Lunch?Are Bot Operators Eating Your Lunch?
Are Bot Operators Eating Your Lunch?
 
Beacon, BLE, and the Future of Commerce
Beacon, BLE, and the Future of CommerceBeacon, BLE, and the Future of Commerce
Beacon, BLE, and the Future of Commerce
 
Charles Verdon - Samedi SQL - Futur de l'intelligence d'affaire
Charles Verdon - Samedi SQL - Futur de l'intelligence d'affaire Charles Verdon - Samedi SQL - Futur de l'intelligence d'affaire
Charles Verdon - Samedi SQL - Futur de l'intelligence d'affaire
 
Blockchain project: e-voting system based upon blockchain technology
Blockchain project: e-voting system based upon blockchain technologyBlockchain project: e-voting system based upon blockchain technology
Blockchain project: e-voting system based upon blockchain technology
 
The Hardware to Web Commerce Revolution
The Hardware to Web Commerce RevolutionThe Hardware to Web Commerce Revolution
The Hardware to Web Commerce Revolution
 
iPads on your network? Take Control with Unified Policy and Management
iPads on your network? Take Control with Unified Policy and ManagementiPads on your network? Take Control with Unified Policy and Management
iPads on your network? Take Control with Unified Policy and Management
 
How to Quantify the Value of Kafka in Your Organization
How to Quantify the Value of Kafka in Your Organization How to Quantify the Value of Kafka in Your Organization
How to Quantify the Value of Kafka in Your Organization
 
Mobile Banking webinar, December 15, 2010 by Jouk Pleiter
Mobile Banking webinar, December 15, 2010 by Jouk PleiterMobile Banking webinar, December 15, 2010 by Jouk Pleiter
Mobile Banking webinar, December 15, 2010 by Jouk Pleiter
 
Io t consumerlogo
Io t consumerlogoIo t consumerlogo
Io t consumerlogo
 
Streaming real time data with Vibe Data Stream
Streaming real time data with Vibe Data StreamStreaming real time data with Vibe Data Stream
Streaming real time data with Vibe Data Stream
 
How To Protect Your Website From Bot Attacks
How To Protect Your Website From Bot AttacksHow To Protect Your Website From Bot Attacks
How To Protect Your Website From Bot Attacks
 
Utilisation du cloud dans les systèmes intelligent
Utilisation du cloud dans les systèmes intelligentUtilisation du cloud dans les systèmes intelligent
Utilisation du cloud dans les systèmes intelligent
 
Hyperledger Blockchain
Hyperledger BlockchainHyperledger Blockchain
Hyperledger Blockchain
 
Digital trends
Digital trendsDigital trends
Digital trends
 
How to use Online Marketing Technology to Improve Campaign Performance - Lowe...
How to use Online Marketing Technology to Improve Campaign Performance - Lowe...How to use Online Marketing Technology to Improve Campaign Performance - Lowe...
How to use Online Marketing Technology to Improve Campaign Performance - Lowe...
 
Ecommerce(3)
Ecommerce(3)Ecommerce(3)
Ecommerce(3)
 
Information System Security Benchmark Dashboards
Information System Security Benchmark DashboardsInformation System Security Benchmark Dashboards
Information System Security Benchmark Dashboards
 
Security For The People: End-User Authentication Security on the Internet by ...
Security For The People: End-User Authentication Security on the Internet by ...Security For The People: End-User Authentication Security on the Internet by ...
Security For The People: End-User Authentication Security on the Internet by ...
 

More from Jonathan LeBlanc

More from Jonathan LeBlanc (20)

JavaScript App Security: Auth and Identity on the Client
JavaScript App Security: Auth and Identity on the ClientJavaScript App Security: Auth and Identity on the Client
JavaScript App Security: Auth and Identity on the Client
 
Improving Developer Onboarding Through Intelligent Data Insights
Improving Developer Onboarding Through Intelligent Data InsightsImproving Developer Onboarding Through Intelligent Data Insights
Improving Developer Onboarding Through Intelligent Data Insights
 
Better Data with Machine Learning and Serverless
Better Data with Machine Learning and ServerlessBetter Data with Machine Learning and Serverless
Better Data with Machine Learning and Serverless
 
Best Practices for Application Development with Box
Best Practices for Application Development with BoxBest Practices for Application Development with Box
Best Practices for Application Development with Box
 
Box Platform Overview
Box Platform OverviewBox Platform Overview
Box Platform Overview
 
Box Platform Developer Workshop
Box Platform Developer WorkshopBox Platform Developer Workshop
Box Platform Developer Workshop
 
Modern Cloud Data Security Practices
Modern Cloud Data Security PracticesModern Cloud Data Security Practices
Modern Cloud Data Security Practices
 
Box Authentication Types
Box Authentication TypesBox Authentication Types
Box Authentication Types
 
Understanding Box UI Elements
Understanding Box UI ElementsUnderstanding Box UI Elements
Understanding Box UI Elements
 
Understanding Box applications, tokens, and scoping
Understanding Box applications, tokens, and scopingUnderstanding Box applications, tokens, and scoping
Understanding Box applications, tokens, and scoping
 
The Future of Online Money: Creating Secure Payments Globally
The Future of Online Money: Creating Secure Payments GloballyThe Future of Online Money: Creating Secure Payments Globally
The Future of Online Money: Creating Secure Payments Globally
 
Creating an In-Aisle Purchasing System from Scratch
Creating an In-Aisle Purchasing System from ScratchCreating an In-Aisle Purchasing System from Scratch
Creating an In-Aisle Purchasing System from Scratch
 
Secure Payments Over Mixed Communication Media
Secure Payments Over Mixed Communication MediaSecure Payments Over Mixed Communication Media
Secure Payments Over Mixed Communication Media
 
Protecting the Future of Mobile Payments
Protecting the Future of Mobile PaymentsProtecting the Future of Mobile Payments
Protecting the Future of Mobile Payments
 
Node.js Authentication and Data Security
Node.js Authentication and Data SecurityNode.js Authentication and Data Security
Node.js Authentication and Data Security
 
PHP Identity and Data Security
PHP Identity and Data SecurityPHP Identity and Data Security
PHP Identity and Data Security
 
Secure Payments Over Mixed Communication Media
Secure Payments Over Mixed Communication MediaSecure Payments Over Mixed Communication Media
Secure Payments Over Mixed Communication Media
 
Protecting the Future of Mobile Payments
Protecting the Future of Mobile PaymentsProtecting the Future of Mobile Payments
Protecting the Future of Mobile Payments
 
Kill All Passwords
Kill All PasswordsKill All Passwords
Kill All Passwords
 
BattleHack Los Angeles
BattleHack Los Angeles BattleHack Los Angeles
BattleHack Los Angeles
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 

The Future of Using Money

Editor's Notes

  1. Uses BlueTooth Low Energy or card reader
  2. - Bluetooth opens up and maintains a connection, sniff mode allows sleeping a device for decrease battery use- Data throughput is not meaningful for BLE since it doesn&apos;t support streamingBLE has a data transfer rate of 1Mbpsboth devices can go to sleep in between transactions
  3. State Exposure:what temperature it currently is,Gate 6a boarding now,Network availableEnable proximity detection (when I&apos;m in the office, car, etc.) and perform some action. For us we determine proximity and check you in to a store
  4. - used for connecting the devices we carry with us (phone, pedometer, body sensors, car to car wheels / tires within a system)- the device works as a transparent pipe from a device (cell phone, etc.) and an ip address- both devices can go to sleep in between transactions
  5. - Person enters store with a BLE enabled device, and they are checked in automatically (if it&apos;s the first visit the app will ask them to check in. If ignored or declined, shop will not get any information about you)- Beacon sends out advertising beacons on a regular basis with a service UUID as well as a few bytes of advertising data.- If the phone understands the UUID (via PP app) it can establish a connection- Beacon maintains an attribute dictionary of requests / responses, and forwards requests it can&apos;t handle to PayPal (as a bridge). This allows it to handle sophisticated queries like getting location data, checking in, whether to auto-check in in the future- When a person comes in range of Beacon, the PP app wakes up, connects to beacon, and requests a beacon token. Beacon selects an unused token from its cache, and sends back a cryptographic nonce &amp; signature, and some metadata- Phone verifies the signature with a public key embedded in the app, and makes a check-in decision based on the metadata- The app encrypts some data for beacon to forward on, uninterpreted, to PP servers. Server decrypts the data and checks in consumer- The server then returns back encrypted message back to beacon, which forwards it back to the app. - App decrypts and verified the response and disconnects from Beacon- Beacon still works in places where cell phones have no network / wireless coverage, because it is in itself a wireless network bridge
  6. Digital Commerce
  7. I started out working at Y! with a lot of auth systems, you might know them better as these things (show buttons)
  8. I started realizing when I would build applications that besides a username, the rest of the info from these people was garbage, because of this… (show picture of a royalfetus profile)We’re in an age where are children have a social footprint before they are ever born…and that’s a much different world than the one I grew up in.
  9. It comes down to the difference between concrete user identity and socialized (curated) identity
  10. Removing the registration form
  11. Personalization allows you to take shortcuts for your users (signups, checkouts, etc.)
  12. Reduce dropoff ratesI’ve seen numbers as high as 71% during registration: http://www.optimizationtoday.com/web-analytics/what-is-abandonment-rate/23% of customers abandoned carts when asked to register (Forrester)…At five questions, the drop-off rate is 2 percent; at 10 questions, 4 percent, and so on. Only at about question 35 does the correlation end (Kevin Hale, Wufoo)
  13. Based onBrowsing habits,Time on page / time of year,LocationRecommendations + targeted advertising
  14. Hand movement up and down controls the bid price