SlideShare a Scribd company logo
1 of 9
DIGITAL CASH OVERVIEW
Prepared by
Osama Mabrouk Khaled
PhD, Computer Science
WHAT IS DIGITAL CASH?
 How does it work?
There are a number of electronic cash protocols. To a
degree, all digital cash schemes operate in the following
manner. A user installs a "cyber wallet" onto computer.
Money can be put in the wallet by deciding how much is
needed and then sending an encrypted message to the
bank asking for this amount to be deducted from the user's
account. The bank reads the message with private key
decryption and verifies if it has been digitally signed in order
to identify the user. The bank then generates "serial
numbers", encrypts the message, signs it with its digital
signature and returns it. The user is now entitled to use the
message (coin or token) to spend it at merchant sites.
Merchants receive e-cash during a transaction and see that
it has been authorized by a bank. They then contact the
bank to make sure the coins have not been spent
somewhere else, and the amount is credited to the
merchant's account. [2],[3]
Essentially, digital cash mimics the functionality of paper cash. More
technically, digital cash is a payment message bearing a digital signature
which functions as a medium of exchange or store of value. [3]
[3]
OFFLINE DIGITAL CASH SOLUTION PROPERTIES
 Prone to Security
 Anonymity
 Portability
 Two-way Payments
 Offline Capability
 Divisibility
 Infinite Duration
 Wide Acceptability
 User Friendliness
 Unit of Value or Monetary freedom
References: [1], [2]
DISADVANTAGE OF DIGITAL CASH
 The unconditional anonymity that some of these systems
provide is much greater that what paper cash provides its
users today.
 There is also a pressing issue in regards to the technology
involved in digital cash. Power failures, loss of records, and
undependable software often cause a major setback in
promoting the technology.
 Double-Spending possibilities are high
References: [2], [3]
WHAT IS USER-CENTRIC DESIGN?
 is a design philosophy and a process in which the needs, wants, and
limitations of end users of a product are given extensive attention at each
stage of the design process.
 The major difference from other product design philosophies is that user-
centered design tries to optimize the product around how users can,
want, or need to use the product, rather than forcing the users to change
their behavior to accommodate the product.
 A user-centered design is focused around the rhetorical situation. The
rhetorical situation shapes the design of an information medium. There
are three elements to consider in a rhetorical situation: Audience,
Purpose, and Context.
 Audience: The audience is the people who will be using the solution. The designer
must consider their age, geographical location, ethnicity, gender, education, etc.
 Purpose: The purpose is what the solution is targeting to or what problem is the
solution trying to address.
 Context: The context is the circumstances surrounding the situation. The context
often answers the question: What situation has prompted the need for this solution?
Context also includes any social or cultural issues that may surround the situation.
Reference: [4]
WHY USING USER-CENTRIC WITH E-CASH MOBILE NFC?
 Benefits of User-Centric Design:
 Digital Cash are more efficient, effective, and safe.
 Assists in managing users’ expectations and levels of
satisfaction with the digital cash.
 Users develop a sense of ownership for the digital cash.
 Products require less redesign and integrate into the
environment more quickly.
 The collaborative process generated more creative
design solutions to problems.
References: [5]
WHAT IS MOBILE NFC?
 Near field communication (NFC) is a set of standards for smartphones
and similar devices to establish radio communication with each other by
touching them together or bringing them into close proximity, usually no
more than a few centimeters. Present and anticipated applications
include contactless transactions, data exchange, and simplified setup of
more complex communications such as Wi-Fi. Communication is also
possible between an NFC device and an unpowered NFC chip, called a
"tag".
 Usages of NFC:-
 Matching encrypted security code and transporting access key;
 Due to short transmission range, NFC-based transactions are possibly secure;
 Instant payments and coupon delivery using your handset, as we do with your credit
card or debit card;
 Exchange of information such as schedules, maps, business card and coupon
delivery in a few hundred milliseconds;
 Pay for items just by waving your phone over the NFC capable devices
 Transferring images, posters for displaying and printing
References: [6]
HOW CAN MOBILE NFC PROMPT E-CASH?
 Secured by nature due to short range.
 User Friendly in the communication process.
 If using NFC-enabled SIM, then digital cash will be
more secured and moveable.
 Digital cash on NFC mobile is similar to a normal
ticket that has a value.
 Double spending can be eliminated using peer-to-
peer e-cash money transfer.
 Anonymous with the presence of the money holder.
 NFC consumes less power, and is fast with small
data size packets.
REFERENCES
1. Isabelle Simplot-Ryl, Issa Traor´e, and Patricia Everaere. Distributed Architectures for
Electronic Cash Schemes: A Survey. The International Journal of Parallel, Emergent
and Distributed Systems. August 29, 2008.
2. Damodar Nagapuram. Digital Cash Survey.
http://www.cs.washington.edu/education/courses/csep590/06wi/finalprojects/nagapura
m.doc.
3. Amit, Hiren, Kevin, Kai. Digital Cash Survey.
http://www.cs.bham.ac.uk/~mdr/teaching/modules03/security/students/SS4/DigitalCash
.doc (2004)
4. User-Centered Design. http://en.wikipedia.org/wiki/User-centered_design.
5. Chadia Abras, Diane Maloney-Krichmar, Jenny Preece. User-Centered Design.
http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.94.381&rep=rep1&type=pdf
6. Near field communication. http://en.wikipedia.org/wiki/Near_field_communication

More Related Content

What's hot

SmartCard Forum 2009 - New trends in smart-cards technology
SmartCard Forum 2009 - New trends in smart-cards technologySmartCard Forum 2009 - New trends in smart-cards technology
SmartCard Forum 2009 - New trends in smart-cards technologyOKsystem
 
An Efficient implementation of PKI architecture based Digital Signature using...
An Efficient implementation of PKI architecture based Digital Signature using...An Efficient implementation of PKI architecture based Digital Signature using...
An Efficient implementation of PKI architecture based Digital Signature using...IOSR Journals
 
Context-aware Mobile Computing - a Literature Review
Context-aware Mobile Computing - a Literature ReviewContext-aware Mobile Computing - a Literature Review
Context-aware Mobile Computing - a Literature ReviewThiwanka Makumburage
 
IT Trends on Islamic Finance
IT Trends on Islamic Finance IT Trends on Islamic Finance
IT Trends on Islamic Finance Ahmed Buhazza
 
Mobile Agents: An Intelligent Multi-Agent System for Mobile Phones
Mobile Agents: An Intelligent Multi-Agent System for  Mobile PhonesMobile Agents: An Intelligent Multi-Agent System for  Mobile Phones
Mobile Agents: An Intelligent Multi-Agent System for Mobile PhonesIOSR Journals
 
OSC2012: Identity Analytics: Exploiting Digital Breadcrumbs
OSC2012: Identity Analytics: Exploiting Digital BreadcrumbsOSC2012: Identity Analytics: Exploiting Digital Breadcrumbs
OSC2012: Identity Analytics: Exploiting Digital BreadcrumbsAccenture the Netherlands
 
Mobile Authentication on the Internet
Mobile Authentication on the InternetMobile Authentication on the Internet
Mobile Authentication on the Internetevidos
 
Context-Aware Computing
Context-Aware ComputingContext-Aware Computing
Context-Aware Computinglogus2k
 
SBVLC: Secure Barcode-based Visible Light Communication for Smart phones
SBVLC: Secure Barcode-based Visible Light Communication for Smart phonesSBVLC: Secure Barcode-based Visible Light Communication for Smart phones
SBVLC: Secure Barcode-based Visible Light Communication for Smart phonesKamal Spring
 
CONNECTED OBJECTS - how NFC technology enables a more environmentally-friendl...
CONNECTED OBJECTS - how NFC technology enables a more environmentally-friendl...CONNECTED OBJECTS - how NFC technology enables a more environmentally-friendl...
CONNECTED OBJECTS - how NFC technology enables a more environmentally-friendl...Pierre Metivier
 
context aware computing
context aware computingcontext aware computing
context aware computingswati sonawane
 
IOT - Design Principles of Connected Devices
IOT - Design Principles of Connected DevicesIOT - Design Principles of Connected Devices
IOT - Design Principles of Connected DevicesDevyani Vasistha
 

What's hot (20)

SmartCard Forum 2009 - New trends in smart-cards technology
SmartCard Forum 2009 - New trends in smart-cards technologySmartCard Forum 2009 - New trends in smart-cards technology
SmartCard Forum 2009 - New trends in smart-cards technology
 
An Efficient implementation of PKI architecture based Digital Signature using...
An Efficient implementation of PKI architecture based Digital Signature using...An Efficient implementation of PKI architecture based Digital Signature using...
An Efficient implementation of PKI architecture based Digital Signature using...
 
Context-aware Mobile Computing - a Literature Review
Context-aware Mobile Computing - a Literature ReviewContext-aware Mobile Computing - a Literature Review
Context-aware Mobile Computing - a Literature Review
 
IT Trends on Islamic Finance
IT Trends on Islamic Finance IT Trends on Islamic Finance
IT Trends on Islamic Finance
 
The use cases of blockchain technology
The use cases of blockchain technologyThe use cases of blockchain technology
The use cases of blockchain technology
 
Identity and Mobility in a Digital World
Identity and Mobility in a Digital WorldIdentity and Mobility in a Digital World
Identity and Mobility in a Digital World
 
Mobile Agents: An Intelligent Multi-Agent System for Mobile Phones
Mobile Agents: An Intelligent Multi-Agent System for  Mobile PhonesMobile Agents: An Intelligent Multi-Agent System for  Mobile Phones
Mobile Agents: An Intelligent Multi-Agent System for Mobile Phones
 
White Paper NFC Security
White Paper NFC SecurityWhite Paper NFC Security
White Paper NFC Security
 
Report
ReportReport
Report
 
2012 Accumulate Mobile Everywhere Introduction
2012 Accumulate Mobile Everywhere Introduction2012 Accumulate Mobile Everywhere Introduction
2012 Accumulate Mobile Everywhere Introduction
 
Secure mobile payment
Secure mobile paymentSecure mobile payment
Secure mobile payment
 
OSC2012: Identity Analytics: Exploiting Digital Breadcrumbs
OSC2012: Identity Analytics: Exploiting Digital BreadcrumbsOSC2012: Identity Analytics: Exploiting Digital Breadcrumbs
OSC2012: Identity Analytics: Exploiting Digital Breadcrumbs
 
Mobile Authentication on the Internet
Mobile Authentication on the InternetMobile Authentication on the Internet
Mobile Authentication on the Internet
 
Context-Aware Computing
Context-Aware ComputingContext-Aware Computing
Context-Aware Computing
 
SBVLC: Secure Barcode-based Visible Light Communication for Smart phones
SBVLC: Secure Barcode-based Visible Light Communication for Smart phonesSBVLC: Secure Barcode-based Visible Light Communication for Smart phones
SBVLC: Secure Barcode-based Visible Light Communication for Smart phones
 
CONNECTED OBJECTS - how NFC technology enables a more environmentally-friendl...
CONNECTED OBJECTS - how NFC technology enables a more environmentally-friendl...CONNECTED OBJECTS - how NFC technology enables a more environmentally-friendl...
CONNECTED OBJECTS - how NFC technology enables a more environmentally-friendl...
 
E signature-signyourdoc
E signature-signyourdocE signature-signyourdoc
E signature-signyourdoc
 
context aware computing
context aware computingcontext aware computing
context aware computing
 
IOT - Design Principles of Connected Devices
IOT - Design Principles of Connected DevicesIOT - Design Principles of Connected Devices
IOT - Design Principles of Connected Devices
 
eSignature Project Presentation
eSignature Project PresentationeSignature Project Presentation
eSignature Project Presentation
 

Similar to DIGITAL CASH MOBILE NFC

Digital wallet (e-wallet)
Digital wallet  (e-wallet)Digital wallet  (e-wallet)
Digital wallet (e-wallet)Krishna Kumar
 
Future of Digital Wallets_ What are its advantages.pdf
Future of Digital Wallets_ What are its advantages.pdfFuture of Digital Wallets_ What are its advantages.pdf
Future of Digital Wallets_ What are its advantages.pdfsmithlindsay766
 
Digital cash, near feild communication and ultra cash
Digital cash, near feild communication and ultra cashDigital cash, near feild communication and ultra cash
Digital cash, near feild communication and ultra cashRohit Singh
 
Electronic Payment Systems (EPS)
Electronic Payment Systems (EPS)Electronic Payment Systems (EPS)
Electronic Payment Systems (EPS)Sahan Walpitagamage
 
AUTOMATED EMBEDDED PAYMENT SYSTEMS
AUTOMATED EMBEDDED PAYMENT SYSTEMSAUTOMATED EMBEDDED PAYMENT SYSTEMS
AUTOMATED EMBEDDED PAYMENT SYSTEMSijesajournal
 
Creating a Digital Banking Strategy - 01.23.15
Creating a Digital Banking Strategy - 01.23.15Creating a Digital Banking Strategy - 01.23.15
Creating a Digital Banking Strategy - 01.23.15Calvin Turner
 
Money pad future wallet
Money pad future walletMoney pad future wallet
Money pad future walletrmangal
 
Money pad future wallet report
Money pad future wallet reportMoney pad future wallet report
Money pad future wallet reportrmangal
 
Money pad future wallet report
Money pad future wallet reportMoney pad future wallet report
Money pad future wallet reportrmangal
 
Digital Wallet App Development Guide 2023.pdf
Digital Wallet App Development Guide 2023.pdfDigital Wallet App Development Guide 2023.pdf
Digital Wallet App Development Guide 2023.pdfSuccessiveDigital
 
15 9247 nfc based digital innovation (edit ari)
15 9247 nfc based digital innovation (edit ari)15 9247 nfc based digital innovation (edit ari)
15 9247 nfc based digital innovation (edit ari)IAESIJEECS
 
Pay-Cloak:Biometric
Pay-Cloak:BiometricPay-Cloak:Biometric
Pay-Cloak:Biometricijtsrd
 

Similar to DIGITAL CASH MOBILE NFC (20)

Digital wallet (e-wallet)
Digital wallet  (e-wallet)Digital wallet  (e-wallet)
Digital wallet (e-wallet)
 
E wallet
E wallet E wallet
E wallet
 
E walllet / Digital Wallet
E walllet / Digital WalletE walllet / Digital Wallet
E walllet / Digital Wallet
 
Future of Digital Wallets_ What are its advantages.pdf
Future of Digital Wallets_ What are its advantages.pdfFuture of Digital Wallets_ What are its advantages.pdf
Future of Digital Wallets_ What are its advantages.pdf
 
Digital cash, near feild communication and ultra cash
Digital cash, near feild communication and ultra cashDigital cash, near feild communication and ultra cash
Digital cash, near feild communication and ultra cash
 
Digital wallet
Digital walletDigital wallet
Digital wallet
 
Digitalwallet or e-wallet
Digitalwallet or e-walletDigitalwallet or e-wallet
Digitalwallet or e-wallet
 
Mobile Payment A Review.pdf
Mobile Payment A Review.pdfMobile Payment A Review.pdf
Mobile Payment A Review.pdf
 
Electronic Payment Systems (EPS)
Electronic Payment Systems (EPS)Electronic Payment Systems (EPS)
Electronic Payment Systems (EPS)
 
Digital wallet
Digital walletDigital wallet
Digital wallet
 
AUTOMATED EMBEDDED PAYMENT SYSTEMS
AUTOMATED EMBEDDED PAYMENT SYSTEMSAUTOMATED EMBEDDED PAYMENT SYSTEMS
AUTOMATED EMBEDDED PAYMENT SYSTEMS
 
Creating a Digital Banking Strategy - 01.23.15
Creating a Digital Banking Strategy - 01.23.15Creating a Digital Banking Strategy - 01.23.15
Creating a Digital Banking Strategy - 01.23.15
 
Money pad future wallet
Money pad future walletMoney pad future wallet
Money pad future wallet
 
Money pad future wallet report
Money pad future wallet reportMoney pad future wallet report
Money pad future wallet report
 
Money pad future wallet report
Money pad future wallet reportMoney pad future wallet report
Money pad future wallet report
 
Digital Wallet App Development Guide 2023.pdf
Digital Wallet App Development Guide 2023.pdfDigital Wallet App Development Guide 2023.pdf
Digital Wallet App Development Guide 2023.pdf
 
15 9247 nfc based digital innovation (edit ari)
15 9247 nfc based digital innovation (edit ari)15 9247 nfc based digital innovation (edit ari)
15 9247 nfc based digital innovation (edit ari)
 
Ewallet
EwalletEwallet
Ewallet
 
Mobile wallet
Mobile walletMobile wallet
Mobile wallet
 
Pay-Cloak:Biometric
Pay-Cloak:BiometricPay-Cloak:Biometric
Pay-Cloak:Biometric
 

More from Osama M. Khaled

A SIMULATION APPROACH TO PREDICATE THE RELIABILITY OF A PERVASIVE SOFTWARE SY...
A SIMULATION APPROACH TO PREDICATE THE RELIABILITY OF A PERVASIVE SOFTWARE SY...A SIMULATION APPROACH TO PREDICATE THE RELIABILITY OF A PERVASIVE SOFTWARE SY...
A SIMULATION APPROACH TO PREDICATE THE RELIABILITY OF A PERVASIVE SOFTWARE SY...Osama M. Khaled
 
A Statistical Approach to Resolve Conflicting Requirements in Pervasive Compu...
A Statistical Approach to Resolve Conflicting Requirements in Pervasive Compu...A Statistical Approach to Resolve Conflicting Requirements in Pervasive Compu...
A Statistical Approach to Resolve Conflicting Requirements in Pervasive Compu...Osama M. Khaled
 
Static Enabler: A Response Enhancer for Dynamic Web Applications
Static Enabler: A Response Enhancer for Dynamic Web ApplicationsStatic Enabler: A Response Enhancer for Dynamic Web Applications
Static Enabler: A Response Enhancer for Dynamic Web ApplicationsOsama M. Khaled
 
A Survey of Building Robust Business Models in Pervasive Computing
A Survey of Building Robust Business Models in Pervasive ComputingA Survey of Building Robust Business Models in Pervasive Computing
A Survey of Building Robust Business Models in Pervasive ComputingOsama M. Khaled
 
Improving our Approach Towards Capturing Value in Requirements
Improving our Approach Towards Capturing Value in RequirementsImproving our Approach Towards Capturing Value in Requirements
Improving our Approach Towards Capturing Value in RequirementsOsama M. Khaled
 
Pervasive Computing Reference Architecture from a Software Engineering Perspe...
Pervasive Computing Reference Architecture from a Software Engineering Perspe...Pervasive Computing Reference Architecture from a Software Engineering Perspe...
Pervasive Computing Reference Architecture from a Software Engineering Perspe...Osama M. Khaled
 
Internet of Things (IoT) from a business Perspective
Internet of Things (IoT) from a business PerspectiveInternet of Things (IoT) from a business Perspective
Internet of Things (IoT) from a business PerspectiveOsama M. Khaled
 

More from Osama M. Khaled (8)

A SIMULATION APPROACH TO PREDICATE THE RELIABILITY OF A PERVASIVE SOFTWARE SY...
A SIMULATION APPROACH TO PREDICATE THE RELIABILITY OF A PERVASIVE SOFTWARE SY...A SIMULATION APPROACH TO PREDICATE THE RELIABILITY OF A PERVASIVE SOFTWARE SY...
A SIMULATION APPROACH TO PREDICATE THE RELIABILITY OF A PERVASIVE SOFTWARE SY...
 
A Statistical Approach to Resolve Conflicting Requirements in Pervasive Compu...
A Statistical Approach to Resolve Conflicting Requirements in Pervasive Compu...A Statistical Approach to Resolve Conflicting Requirements in Pervasive Compu...
A Statistical Approach to Resolve Conflicting Requirements in Pervasive Compu...
 
Static Enabler: A Response Enhancer for Dynamic Web Applications
Static Enabler: A Response Enhancer for Dynamic Web ApplicationsStatic Enabler: A Response Enhancer for Dynamic Web Applications
Static Enabler: A Response Enhancer for Dynamic Web Applications
 
A Survey of Building Robust Business Models in Pervasive Computing
A Survey of Building Robust Business Models in Pervasive ComputingA Survey of Building Robust Business Models in Pervasive Computing
A Survey of Building Robust Business Models in Pervasive Computing
 
SQL Statement Template
SQL Statement TemplateSQL Statement Template
SQL Statement Template
 
Improving our Approach Towards Capturing Value in Requirements
Improving our Approach Towards Capturing Value in RequirementsImproving our Approach Towards Capturing Value in Requirements
Improving our Approach Towards Capturing Value in Requirements
 
Pervasive Computing Reference Architecture from a Software Engineering Perspe...
Pervasive Computing Reference Architecture from a Software Engineering Perspe...Pervasive Computing Reference Architecture from a Software Engineering Perspe...
Pervasive Computing Reference Architecture from a Software Engineering Perspe...
 
Internet of Things (IoT) from a business Perspective
Internet of Things (IoT) from a business PerspectiveInternet of Things (IoT) from a business Perspective
Internet of Things (IoT) from a business Perspective
 

Recently uploaded

MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based projectAnoyGreter
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Velvetech LLC
 
Cyber security and its impact on E commerce
Cyber security and its impact on E commerceCyber security and its impact on E commerce
Cyber security and its impact on E commercemanigoyal112
 
Large Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and RepairLarge Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and RepairLionel Briand
 
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company OdishaBalasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odishasmiwainfosol
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)jennyeacort
 
A healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfA healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfMarharyta Nedzelska
 
Xen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfXen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfStefano Stabellini
 
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...Akihiro Suda
 
SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtimeandrehoraa
 
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsSensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsChristian Birchler
 
Sending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdfSending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdf31events.com
 
Real-time Tracking and Monitoring with Cargo Cloud Solutions.pptx
Real-time Tracking and Monitoring with Cargo Cloud Solutions.pptxReal-time Tracking and Monitoring with Cargo Cloud Solutions.pptx
Real-time Tracking and Monitoring with Cargo Cloud Solutions.pptxRTS corp
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...OnePlan Solutions
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesPhilip Schwarz
 
Understanding Flamingo - DeepMind's VLM Architecture
Understanding Flamingo - DeepMind's VLM ArchitectureUnderstanding Flamingo - DeepMind's VLM Architecture
Understanding Flamingo - DeepMind's VLM Architecturerahul_net
 
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanyChristoph Pohl
 

Recently uploaded (20)

MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based project
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...
 
Cyber security and its impact on E commerce
Cyber security and its impact on E commerceCyber security and its impact on E commerce
Cyber security and its impact on E commerce
 
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort ServiceHot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
 
Large Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and RepairLarge Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and Repair
 
Advantages of Odoo ERP 17 for Your Business
Advantages of Odoo ERP 17 for Your BusinessAdvantages of Odoo ERP 17 for Your Business
Advantages of Odoo ERP 17 for Your Business
 
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company OdishaBalasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
 
2.pdf Ejercicios de programación competitiva
2.pdf Ejercicios de programación competitiva2.pdf Ejercicios de programación competitiva
2.pdf Ejercicios de programación competitiva
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
 
A healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfA healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdf
 
Xen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfXen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdf
 
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...
 
SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtime
 
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsSensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
 
Sending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdfSending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdf
 
Real-time Tracking and Monitoring with Cargo Cloud Solutions.pptx
Real-time Tracking and Monitoring with Cargo Cloud Solutions.pptxReal-time Tracking and Monitoring with Cargo Cloud Solutions.pptx
Real-time Tracking and Monitoring with Cargo Cloud Solutions.pptx
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a series
 
Understanding Flamingo - DeepMind's VLM Architecture
Understanding Flamingo - DeepMind's VLM ArchitectureUnderstanding Flamingo - DeepMind's VLM Architecture
Understanding Flamingo - DeepMind's VLM Architecture
 
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
 

DIGITAL CASH MOBILE NFC

  • 1. DIGITAL CASH OVERVIEW Prepared by Osama Mabrouk Khaled PhD, Computer Science
  • 2. WHAT IS DIGITAL CASH?  How does it work? There are a number of electronic cash protocols. To a degree, all digital cash schemes operate in the following manner. A user installs a "cyber wallet" onto computer. Money can be put in the wallet by deciding how much is needed and then sending an encrypted message to the bank asking for this amount to be deducted from the user's account. The bank reads the message with private key decryption and verifies if it has been digitally signed in order to identify the user. The bank then generates "serial numbers", encrypts the message, signs it with its digital signature and returns it. The user is now entitled to use the message (coin or token) to spend it at merchant sites. Merchants receive e-cash during a transaction and see that it has been authorized by a bank. They then contact the bank to make sure the coins have not been spent somewhere else, and the amount is credited to the merchant's account. [2],[3] Essentially, digital cash mimics the functionality of paper cash. More technically, digital cash is a payment message bearing a digital signature which functions as a medium of exchange or store of value. [3] [3]
  • 3. OFFLINE DIGITAL CASH SOLUTION PROPERTIES  Prone to Security  Anonymity  Portability  Two-way Payments  Offline Capability  Divisibility  Infinite Duration  Wide Acceptability  User Friendliness  Unit of Value or Monetary freedom References: [1], [2]
  • 4. DISADVANTAGE OF DIGITAL CASH  The unconditional anonymity that some of these systems provide is much greater that what paper cash provides its users today.  There is also a pressing issue in regards to the technology involved in digital cash. Power failures, loss of records, and undependable software often cause a major setback in promoting the technology.  Double-Spending possibilities are high References: [2], [3]
  • 5. WHAT IS USER-CENTRIC DESIGN?  is a design philosophy and a process in which the needs, wants, and limitations of end users of a product are given extensive attention at each stage of the design process.  The major difference from other product design philosophies is that user- centered design tries to optimize the product around how users can, want, or need to use the product, rather than forcing the users to change their behavior to accommodate the product.  A user-centered design is focused around the rhetorical situation. The rhetorical situation shapes the design of an information medium. There are three elements to consider in a rhetorical situation: Audience, Purpose, and Context.  Audience: The audience is the people who will be using the solution. The designer must consider their age, geographical location, ethnicity, gender, education, etc.  Purpose: The purpose is what the solution is targeting to or what problem is the solution trying to address.  Context: The context is the circumstances surrounding the situation. The context often answers the question: What situation has prompted the need for this solution? Context also includes any social or cultural issues that may surround the situation. Reference: [4]
  • 6. WHY USING USER-CENTRIC WITH E-CASH MOBILE NFC?  Benefits of User-Centric Design:  Digital Cash are more efficient, effective, and safe.  Assists in managing users’ expectations and levels of satisfaction with the digital cash.  Users develop a sense of ownership for the digital cash.  Products require less redesign and integrate into the environment more quickly.  The collaborative process generated more creative design solutions to problems. References: [5]
  • 7. WHAT IS MOBILE NFC?  Near field communication (NFC) is a set of standards for smartphones and similar devices to establish radio communication with each other by touching them together or bringing them into close proximity, usually no more than a few centimeters. Present and anticipated applications include contactless transactions, data exchange, and simplified setup of more complex communications such as Wi-Fi. Communication is also possible between an NFC device and an unpowered NFC chip, called a "tag".  Usages of NFC:-  Matching encrypted security code and transporting access key;  Due to short transmission range, NFC-based transactions are possibly secure;  Instant payments and coupon delivery using your handset, as we do with your credit card or debit card;  Exchange of information such as schedules, maps, business card and coupon delivery in a few hundred milliseconds;  Pay for items just by waving your phone over the NFC capable devices  Transferring images, posters for displaying and printing References: [6]
  • 8. HOW CAN MOBILE NFC PROMPT E-CASH?  Secured by nature due to short range.  User Friendly in the communication process.  If using NFC-enabled SIM, then digital cash will be more secured and moveable.  Digital cash on NFC mobile is similar to a normal ticket that has a value.  Double spending can be eliminated using peer-to- peer e-cash money transfer.  Anonymous with the presence of the money holder.  NFC consumes less power, and is fast with small data size packets.
  • 9. REFERENCES 1. Isabelle Simplot-Ryl, Issa Traor´e, and Patricia Everaere. Distributed Architectures for Electronic Cash Schemes: A Survey. The International Journal of Parallel, Emergent and Distributed Systems. August 29, 2008. 2. Damodar Nagapuram. Digital Cash Survey. http://www.cs.washington.edu/education/courses/csep590/06wi/finalprojects/nagapura m.doc. 3. Amit, Hiren, Kevin, Kai. Digital Cash Survey. http://www.cs.bham.ac.uk/~mdr/teaching/modules03/security/students/SS4/DigitalCash .doc (2004) 4. User-Centered Design. http://en.wikipedia.org/wiki/User-centered_design. 5. Chadia Abras, Diane Maloney-Krichmar, Jenny Preece. User-Centered Design. http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.94.381&rep=rep1&type=pdf 6. Near field communication. http://en.wikipedia.org/wiki/Near_field_communication