SlideShare a Scribd company logo
White Paper




Mobile Money:
Seven considerations
before you build
an app
January 2013




                 Share this White Paper
Contents

Introduction	3

1.	An app is not enough: understanding the mobile 	 4
    money ecosystem	

2.	Build or buy: the pros and cons of 	             6
	 off-the-peg apps	

3.	What your customers want: robust security 	     8
    plus ready access	

4.	The vault: understanding the secure element	     10

5.	What is a wallet? And is it what your 	          12
	 customers need?	

6.	From the app backwards: minimising 	             14
	 PCI exposure	

7.	How creativity can overcome 	                    16
	 standards conservatism	

Next steps	                                         17




2
Introduction


Money is inherently mobile, but it is only a recent innovation
that has seen money handled on a mobile phone. With the
rapid growth of the smartphone, it has become an obvious
advance for many companies to give their customers access
to services via their mobile device. From banking to bills,
purchasing to payments, apps are appearing to manage many
of the financial aspects of our daily lives.
Producing a successful, secure money application        This white paper provides a guide to seven of
is not a simple business. It’s not a feat that can be   the key areas of successful mobile money app
achieved by a simple app developer working in           development that Penrillian has come to
isolation. A successful mobile money app requires       understand through extensive experience in the
the input and support of multiple suppliers and         space. It’s not an exhaustive checklist, but address
stakeholders from across the mobile money               these key issues and you will be well on the way to
ecosystem. And it requires many different aspects       creating an application that is successful for your
of design and technology to be addressed.               business and appreciated by your customers.




                                                        ‘Producing a successful,
                                                         secure money application is
                                                         not a simple business. It’s not
                                                         a feat that can be achieved
                                                         by a simple app developer
                                                         working in isolation.’
3
1.	 App is not enough: understanding
   An
   the Mobile Money ecosystem
Think about the water that comes out of your tap. It has had a
pretty fantastic journey to get there. Just starting from the falling
raindrop, you have to consider a journey that takes in a river, a
reservoir, processing, pumping, miles of pipe and household
plumbing, plus the companies that own and operate these
various elements. Were it not for all this hidden effort, your tap
is going to deliver very little.

What is true for the tap is also true for mobile money   Some of the key parties and components to
apps. If anything the mobile money ecosystem is          consider include:
more complex than that which delivers fresh water.
                                                         •	  etwork operator – Carries the traffic two and
                                                            N
Building a successful mobile money application
                                                            from the phone, and usually has a primary billing
means navigating this ecosystem and ensuring
                                                            relationship with the phone owner
that all of the relevant parties work together. Or
having a partner who can do this on your behalf.         •	  IM provider – Controls the technology on
                                                            S
                                                            board the card that the operator uses to securely
                                                            govern access to the network
                                                         •	  ecure element – The location in which secure
                                                            S
                                                            payment data is stored on the device, be it part
                                                            of the handset, or the SIM, or a dedicated SD
                                                            card
                                                         •	  ayment cardlet (e.g. Mobile MasterCard
                                                            P
                                                            PayPass) – The underlying application logic
                                                            behind the making of a payment on the device
                                                         •	  rusted Service Manager (TSM) – A secure
                                                            T
                                                            delivery system connecting the Secure Element
                                                            to the service operator Card/Payment Provider
                                                            – the financial institution handling the
                                                            transactions and accounts
                                                         •	  ecurity Advisors and Authorities – A selection
                                                            S
                                                            of advisors and approvals will be required
                                                            before a mobile money service can be (safely)
                                                            launched




4
1. (Continued) An App is not enough:
understanding the Mobile Money ecosystem




In many cases while the interfaces between these         ‘When you can’t demand a
providers may be available in theory, in practice
much work is needed to make them communicate              complete rebuild of a partner’s
effectively. For example, one issue Penrillian has        infrastructure, you need to find
faced is that Application Programming Interfaces
(APIs) have often been constructed with the               ways to negotiate between
desktop web in mind.                                      different standards with the
The differences between the desktop environment           requisite level of performance
and mobile in terms of browser capabilities,
connection speeds and reliability means these are         and security.’
usually unsuitable for the mobile environment.
When you can’t demand a complete rebuild of a
partner’s infrastructure, you need to find ways to
negotiate between different standards with the
requisite level of performance and security.
This is where a partner like Penrillian can help, but
the key message here is this: no one partner in this
ecosystem can deliver a successful mobile
application on their own. All parties must collaborate
effectively to meet the customer’s expectations.




                                                         ‘In many cases while the
                                                          interfaces between these
                                                          providers may be available
                                                          in theory, in practice much
                                                          work is needed to make them
                                                          communicate effectively.’
5
2.	 uild or buy: the pros and cons of
   B
   off-the-peg apps
When shopping for a new suit, few people consider a tailor over
the high street these days. The upfront cost and production
time may be off-putting when set against the instant gratification
of an off-the-peg purchase.
But a tailored suit will always be a better fit to your    The next risk is security: a recent study by Leibniz
shape, can be adapted as that shape changes,               University in Hannover and Philipps University of
and will most likely be made from higher quality           Marburg found more than a thousand Android
materials. In the long term, the tailored suit can         applications with serious security flaws out of a
prove to be better value.                                  sample of 13,000. 17% of the apps that used the
                                                           secure socket layer (SSL) standard had it wrongly
The same rules apply when it comes to developing           implemented, leading to significant security risks.
new applications, particularly in the field of mobile
money. Off-the-peg applications are available,
provided by a third party with some elements of
the ecosystem already in place, and a skinnable
application that can have you up and running
quickly.
If your needs are fairly straightforward and match
the capabilities of the application available, then
this is a reasonable route forward. But it is not
without its risks: handing over this level of control to
a third party limits a number of your powers.
The first of these is the ability to make changes: if a
third party is catering for multiple customers on the
same platform, their development is always going
to be focused on the needs of the many, not your
needs specifically. Development can be slower
and more costly as a result.




                                                           ‘17% of Android apps that
                                                            use SSL have it wrongly
                                                            implemented, leading to
                                                            significant security risks.’
6
2. (Continued) Build or buy: the pros and cons of
off-the-peg apps




The final issue to consider is lock-in: if it is not just   While the mobile money ecosystem is complex, it
your app, but the entire supporting ecosystem that          is navigable. Off-the-peg solutions do have
is dependent on a third party, there is no opportunity      benefits but in the long term, a bespoke platform
to chop and change components, or connect to                can offer significant financial and operational
additional services without their say-so. As time           advantages.
passes, it’s possible that your requirements and
the service on offer will drift further and further
apart. And all the while, you will be paying the
licence costs on the intellectual property retained
by the solution provider.
Consider the alternative. For one of the major
European network operators Penrillian constructed
an entirely bespoke application and gateway to
interface with the payment partner’s systems. The
delivery time was comparable with an off-the-shelf
solution, and calculated over the first two years of
the service’s life, so were the costs. The operator
now has its own intellectual property, and an app
and gateway that it controls. It can switch payment
providers or add other partners into the system on
its timetable, rather than lobbying a third party to
deliver.




                                                            ‘...Penrillian constructed an
                                                             entirely bespoke application
                                                             and gateway to interface
                                                             with the payment partner’s
                                                             systems. The delivery time
                                                             was comparable with an
                                                             off-the-shelf solution, and
                                                             calculated over the first
                                                             two years of the service’s
                                                             life, so were the costs.’
7
3.	 hat your customers want:
   W
   robust security plus ready access
When it comes to handling their money, consumers are rightly
concerned about security. But they will balance this concern
with usability: what good is mobile money if you can’t access it
when you need to? Striking this balance is a major challenge for
the app designer.
Consider the primary ways of paying before mobile        Mobile money applications need to offer users the
money: cash or card.                                     same gradations of security. For small transactions
                                                         we want the readiness of cash. For larger
For small transactions cash is very convenient.
                                                         transactions, the protected flexibility of a card. By
Grab a note or a handful of change and hand it over
                                                         tiering security features such as maximum
and you’re done. There’s always the risk that you
                                                         transaction values and PIN confirmations, to match
might lose that cash (or have it stolen) but the
                                                         the transaction value, it is possible to offer users a
convenience means that we all keep a small
                                                         well-structured balance between security and
amount to hand most of the time. And we can tailor
                                                         usability.
our level of risk by choosing how much cash to
carry.
The risks of the card are very different. If a card is
truly compromised the losses can be large but they
will usually be losses to the bank not us as
individuals. If cards are lost we can cancel them
remotely and fraudulent transactions can be
charged back. Cards are much more convenient
than large bundles of cash for larger transactions.




                                                         ‘The risks of the card are very
                                                          different. If a card is truly
                                                          compromised the losses can
                                                          be large but they will usually
                                                          be losses to the bank not us
                                                          as individuals.’
8
3. (Continued) What your customers want:
robust security plus ready access




There is another aspect to security to consider, and   ‘Cash is convenient, but cards are
it is one that very much concerns users: personal
data. By their very nature, mobile money                more secure for large transactions.’
applications collect a colossal amount of very
intimate detail about our personal lives. We don’t
just need to protect users’ money; we need to
protect the knowledge of how they spend it from
external access and improper use.
The GSM Association has produced guidelines on
privacy that address the issues associated with the
collection and retention of personal data by
applications, based on international data protection
law (http://www.gsma.com/publicpolicy/privacy-
design-guidelines-for-mobile-application-
development/). Under these guidelines financial
transaction data falls under the strictest level of
control, since it arguably touches every aspect of a
person’s life, including their health (an area of
particular sensitivity).
Ensuring compliance with these guidelines, and
providing the appropriate level of security and
usability, comes down to careful design of the
whole application and supporting infrastructure.




                                                       ‘The GSM Association has
                                                        produced guidelines on
                                                        privacy that address the issues
                                                        associated with the collection
                                                        and retention of personal
                                                        data by applications, based
                                                        on international data
                                                        protection law.’
9
4.	 he vault: understanding the
   T
   secure element
One opportunity for money applications on mobile devices is
the actual replacement of cash via Near Field Communication
(NFC)-enabled devices. There’s a great appeal in the simplicity
of swiping your phone over a terminal to pay for goods, and
managing the money available in your virtual wallet using the
phone’s interface.
For a start you would never need to go hunting for a     The Secure Element typically runs as a native
cash point again. But this simplicity of use needs to    application on a smartcard. These applications,
be balanced against security, and so the NFC             known as ‘Cardlets’, use the Java Card format
architecture defines a means for keeping the             designed for very low powered computing devices.
payment data secure.                                     The smartcard may be:
The ‘Secure Element’ is the smart vault on your          •	  uilt into a device – an approach that has been
                                                            B
mobile device that handles this task. A dedicated           taken by the likes of Samsung and Google with
chip designed for the purpose of storing encrypted          their recent phones.
card information and running secure applications,
                                                         •	  art of the SIM card – a relatively trusted
                                                            P
the Secure Element sits apart from the rest of the
                                                            environment in its own right – adopted by some
device, safe from the risks that users take with their
                                                            mobile operators.
smartphones every day: open social networks,
untrusted websites and dodgy applications.               •	  standalone plugin card for the device in the
                                                            A
                                                            common SD card format.




                                                         ‘The ‘Secure Element’ is the
                                                          smart vault on your mobile
                                                          device that handles this task.’
10
4. The vault:
understanding the secure element




The device interfaces with the Secure Element via           ‘Secure NFC payments could
 an API specific to the handset operating system,
 and each takes a slightly different approach to             mean the end for cash points.’
 security. Android has the SmartCard API for
 Android, secured via user permissions: an
 application can only access the Secure Element if
 the user explicitly gives it permission on installation.
 By contrast, RIM’s Blackberry requires all
 applications requiring smartcard access to be
‘signed’ with code keys requested from RIM by the
 developer.
The main thing to understand is that the smartcard
is distinct from the handset operating system, and
that access to it and the Cardlets running on it, is
protected. In this manner the Secure Element can
remain secure and trusted by the rest of the
payment ecosystem.




                                                            ‘The device interfaces with
                                                             the Secure Element via an
                                                             API specific to the handset
                                                             operating system, and each
                                                             takes a slightly different
                                                             approach to security.
                                                             Android has the SmartCard
                                                             API for Android, secured
                                                             via user permissions: an
                                                             application can only access
                                                             the Secure Element if
                                                             the user explicitly gives it
                                                             permission on installation.’
11
5.  hat is a wallet? and is it what your
   W
   customers need?
When a new technology begins to displace an old one, it’s
tempting to use the old terminology to help familiarise people
with the new. Hence the term ‘wallet’ has become rather popular
when referring to mobile money. But what is a ‘wallet’ in digital
terms, and what should it be?
Both O2 and Google have called their mobile money
applications ‘Wallet’ but the two applications are
very different.
•	  2’s wallet relies on you, the user, loading money
   O
   onto O2’s own payment platform – essentially a
   pre-pay card – before you can make payments.
   This is a wallet in the pure cash sense: you are
   effectively loading up your purse with cash from
   your account before going out shopping.
•	  oogle’s Wallet is much more like the one in
   G
   your back pocket: it contains all of your different
   accounts and cards, enabling you to select the
   right one for each purchase. But it achieves this
   through a little sleight of hand – all the
   transactions actually take place through a single
   MasterCard account created when you sign up
   for the wallet, and are then rebilled to the relevant
   card.




                                                           ‘Not everyone is going to like
                                                            the idea of creating yet
                                                            another account, and
                                                            certainly not all of the major
                                                            card issuers are happy
                                                            at the prospect of being a
                                                            further step removed from
                                                            the transaction.’
12
5. (Continued) What is a wallet?
And is it what your customers need?




Not everyone is going to like the idea of creating yet   ‘A true mobile wallet enables the
another account, and certainly not all of the major
card issuers are happy at the prospect of being a         user to choose the right payment
further step removed from the transaction. It would       card for each transaction.’
seem like the ideal wallet is one that securely
manages the various payment options at the user’s
disposal but allows each to natively make the
payment when it is selected. This adds convenience
and security, and unifies access to the underlying
hardware required to make NFC payments happen.
In technical terms this means controlling the
download and installation of new payment
applications and their associated Cardlets on the
Secure Element.
One example of such a wallet is the ISIS scheme in
the US (http://www.paywithisis.com).
 It is this type of wallet that needs to be taken into
 consideration when planning your mobile money
 application. Consumers will continue to use
 multiple methods of payment, and will expect their
 payment applications to make it easy for them to
 choose the right option at the right time. Your
 application needs to be designed today to be
 discoverable and manageable by a standardised
‘Wallet’. As standards for mobile wallets emerge,
you will need to keep pace by updating your app.




                                                         ‘...the term ‘wallet’ has
                                                          become rather popular when
                                                          referring to mobile money. But
                                                          what is a ‘wallet’ in digital
                                                          terms, and what should it be?’
13
6.	 rom the app backwards:
   F
   minimising PCI exposure
The payment industry is understandably strict about securing
the movement of money. The card schemes enforce control on
almost every aspect of the mobile money ecosystem, and part
of that control comes in the form of the Payment Card Industry
Data Security Standard or PCI DSS.
These six letters strike fear into the hearts of many   Fundamentally, complying with PCI DSS means
application developers. Horror stories of long,         avoiding the loss of account data – be it names,
expensive testing and approval processes and            addresses, numbers, or PIN codes – at any point.
worse, failures, abound. But PCI DSS does not           So the more you can avoid the need to accept,
need to be burdensome. In fact its impact on a new      store and transmit account data, the less you will
mobile money application can be minimised,              need to do in order to achieve compliance.
without compromising security.
To understand how, you need to understand in
basic terms what the standard is setting out to
avoid. The PCI Security Council defines three key
objectives with regards to securing mobile money
applications:
•	  bjective 1: Prevent account data from being
   O
   intercepted when entered into a mobile device
•	 Objective 2: Prevent account data from
    compromise while processed or stored within
    the mobile device
•	  bjective 3: Prevent account data from
   O
   interception upon transmission out of the
   mobile device




                                                        ‘...PCI DSS does not need to
                                                         be burdensome. In fact its
                                                         impact on a new mobile
                                                         money application can be
                                                         minimised, without
                                                         compromising security.’
14
6. (Continued) From the app backwards:
minimising PCI exposure




With regards to storing data, the Secure Element          Careful design can pare back the requirements for
provides much of the answer here. This highly             data entry and transmission to a minimum, limiting
secure vault on the phone should contain every            the opportunity for interception and capture. But
piece of account data that we need to complete a          there is one more source of data that needs to be
transaction. Everything else that is stored should        addressed when protecting a mobile money
exist behind the walls of the web service with which      application, and it is one that is rarely considered:
the application interacts – often already tested and      error messages and error logs. Detailed error
approved. So our focus needs to be on minimising          messages explaining why an interaction with the
the entry and transmission of data.                       application, or the web services behind it, has
                                                          failed, are useful in development. But they are also
This focus fits very well with the goals for any mobile
                                                          useful to those trying to crack the system.
application: nobody wants to enter reams of data
                                                          Restricting these error messages and logs to a
on a small screen. And moving large amounts of
                                                          bare minimum further reduces the opportunity for
data back and forth over the airwaves is slow and
                                                          attack.
expensive. So ensuring that data entry and
transmission is minimised not only adds to the            Keep the flow and storage of data across the
security of the application, it adds to its efficiency    application and its back end to an absolute
and performance.                                          minimum, and you can also minimise the pain of
                                                          PCI compliance.




                                                          ‘Detailed error messages
                                                           explaining why an interaction
                                                           with the application, or the
                                                           web services behind it, has
                                                           failed, are useful in development.
                                                           But they are also useful to
                                                           those trying to crack the
                                                           system. Restricting these error
                                                           messages and logs to a bare
                                                           minimum further reduces the
                                                           opportunity for attack.’
15
7.	
   How creativity can overcome
   standards conservatism
Unless you are an investment banker, it’s natural to be a little
conservative when dealing with other people’s money. That
natural conservatism can lead to very procedural thinking. If
there are standards: follow them. If something has been done
before that worked: do it again.
The problem with this approach is that while it is         On this basis, standards need to be treated rather
‘safe’ it is likely to lead to unremarkable results. And   like the rules of football. They have to be obeyed
 in a fresh, new, but already competitive market like      but they leave plenty of opportunity for flair play, for
 mobile money, remarkable is exactly what you              those that are capable.
 need to be. To be anything else is far from safe.




                                                           ‘... in a fresh, new, but already
                                                            competitive market like mobile
                                                            money, remarkable is exactly
                                                            what you need to be.’
16
Next steps


The smartphone will replace the physical wallet. As more
payment options and other smartcards for loyalty points and
travel move over to the mobile, the physical wallet will become
redundant. This presents an opportunity for companies to
establish patterns of consumer behaviour, as people choose
their new preferred payment options.
There are barriers to entering the market today but     About Penrillian
as we have aimed to show with this paper, they are
                                                        Founded in 2000, Penrillian is now one of the
far from insurmountable. And working with a
                                                        most experienced specialist mobile software
partner like Penrillian that knows the market space
                                                        development companies in the world.
intimately, it’s possible to overcome them rapidly at
reasonable cost.                                        We develop bespoke software solutions and over
                                                        the years we have developed an impressive range
Not only that: there is room for innovation. Few of
                                                        of applications and software for some of the
the true opportunities for mobile money have yet
                                                        leading brands in mobile. For example:
been explored. Standards do not have to be seen
as restrictions: rather they just define the rules      If you’ve ever used a Vodafone data dongle,
within which creativity can take place. Off the peg     purchased goods using your phone, bought 2-for-1
applications may tick the box today but they leave      cinema tickets on Orange Wednesdays from a
little room for competitive advantage in the longer     BlackBerry, or managed a T-Mobile account from
term.                                                   a phone, chances are we created the software.
                                                        Nowadays, we are helping our customers remain
                                                        at the forefront of technology by creating the next
                                                        generation of secure mobile services and payment
                                                        apps for operators, banking, payment providers,
                                                        and financial services. Working with clients across
                                                        multiple business sectors, our software is helping
                                                        to engage users and drive revenue and retention.




                                                        If you are considering an
                                                        entry into the mobile
                                                        money market, talk to
                                                        Penrillian today on
                                                        44 (0) 1768 214400
17
Penrillian
Clint Mill
Cornmarket
Penrith
CA11 7HW
United Kingdom
Email: enquires@penrillian.com
Tel: 44 (0) 1768 214400
Web: www.penrillian.com
© 2013 Penrillian mobile phone software developers - All rights reserved.




                                                                            Follow us

More Related Content

What's hot

SmartCard Forum 2011 - Evolution of authentication market
SmartCard Forum 2011 - Evolution of authentication marketSmartCard Forum 2011 - Evolution of authentication market
SmartCard Forum 2011 - Evolution of authentication market
OKsystem
 
Nguyen nielsenkim palmvein
Nguyen nielsenkim palmveinNguyen nielsenkim palmvein
Nguyen nielsenkim palmvein
Nikhila07
 
Security White Paper
Security White PaperSecurity White Paper
Security White PaperMobiWee
 
Sxsw ppt voice-1
Sxsw ppt voice-1Sxsw ppt voice-1
Sxsw ppt voice-1
Dan Miller
 
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM USUdløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
IBM Danmark
 
RSA 2012 Presentation: Information Protection
RSA 2012 Presentation: Information ProtectionRSA 2012 Presentation: Information Protection
RSA 2012 Presentation: Information Protection
Symantec
 
Praxistipp workat home orchestrierung von räumlich verteilten arbeitsplätzen
Praxistipp workat home   orchestrierung von räumlich verteilten arbeitsplätzenPraxistipp workat home   orchestrierung von räumlich verteilten arbeitsplätzen
Praxistipp workat home orchestrierung von räumlich verteilten arbeitsplätzen
Thomas Dehler
 
SmartCard Forum 2010 - Enterprise authentication
SmartCard Forum 2010 - Enterprise authenticationSmartCard Forum 2010 - Enterprise authentication
SmartCard Forum 2010 - Enterprise authentication
OKsystem
 
Case Study Indatex Insurance Eur
Case Study Indatex   Insurance EurCase Study Indatex   Insurance Eur
Case Study Indatex Insurance Eur
Jorrik
 
Agilis Insurance Mobility Suite
Agilis Insurance Mobility SuiteAgilis Insurance Mobility Suite
Agilis Insurance Mobility Suite
Agile Financial Technologies
 
Enterprise Apps Future State
Enterprise Apps Future StateEnterprise Apps Future State
Enterprise Apps Future State
Bruce MacVarish
 
Hp software strategy
Hp software strategyHp software strategy
Hp software strategy
Lilian Schaffer
 
Seizing the BYOD Opportunity
Seizing the BYOD OpportunitySeizing the BYOD Opportunity
Seizing the BYOD Opportunity
Juniper Networks
 
fn_sun_readiminds
fn_sun_readimindsfn_sun_readiminds
fn_sun_readiminds
Nagesh KP
 
NetAuthority Brochure
NetAuthority BrochureNetAuthority Brochure
NetAuthority Brochure
Vivastream
 
Hp Fortify Cloud Application Security
Hp Fortify Cloud Application SecurityHp Fortify Cloud Application Security
Hp Fortify Cloud Application Security
Ed Wong
 
Polk County Sheriffs Office Success Story
Polk County Sheriffs Office Success StoryPolk County Sheriffs Office Success Story
Polk County Sheriffs Office Success Story
Imprivata
 
Enrique Castro Leon Virtual Service Oriented Grids
Enrique  Castro Leon    Virtual  Service Oriented GridsEnrique  Castro Leon    Virtual  Service Oriented Grids
Enrique Castro Leon Virtual Service Oriented Grids
SOA Symposium
 
Learning & Talent In The Cloud
Learning & Talent In The CloudLearning & Talent In The Cloud
Learning & Talent In The Cloud
David Wilson
 
Hawaii Pacific GIS Conference 2012: Disaster Management and Emergency Reponse...
Hawaii Pacific GIS Conference 2012: Disaster Management and Emergency Reponse...Hawaii Pacific GIS Conference 2012: Disaster Management and Emergency Reponse...
Hawaii Pacific GIS Conference 2012: Disaster Management and Emergency Reponse...
Hawaii Geographic Information Coordinating Council
 

What's hot (20)

SmartCard Forum 2011 - Evolution of authentication market
SmartCard Forum 2011 - Evolution of authentication marketSmartCard Forum 2011 - Evolution of authentication market
SmartCard Forum 2011 - Evolution of authentication market
 
Nguyen nielsenkim palmvein
Nguyen nielsenkim palmveinNguyen nielsenkim palmvein
Nguyen nielsenkim palmvein
 
Security White Paper
Security White PaperSecurity White Paper
Security White Paper
 
Sxsw ppt voice-1
Sxsw ppt voice-1Sxsw ppt voice-1
Sxsw ppt voice-1
 
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM USUdløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
 
RSA 2012 Presentation: Information Protection
RSA 2012 Presentation: Information ProtectionRSA 2012 Presentation: Information Protection
RSA 2012 Presentation: Information Protection
 
Praxistipp workat home orchestrierung von räumlich verteilten arbeitsplätzen
Praxistipp workat home   orchestrierung von räumlich verteilten arbeitsplätzenPraxistipp workat home   orchestrierung von räumlich verteilten arbeitsplätzen
Praxistipp workat home orchestrierung von räumlich verteilten arbeitsplätzen
 
SmartCard Forum 2010 - Enterprise authentication
SmartCard Forum 2010 - Enterprise authenticationSmartCard Forum 2010 - Enterprise authentication
SmartCard Forum 2010 - Enterprise authentication
 
Case Study Indatex Insurance Eur
Case Study Indatex   Insurance EurCase Study Indatex   Insurance Eur
Case Study Indatex Insurance Eur
 
Agilis Insurance Mobility Suite
Agilis Insurance Mobility SuiteAgilis Insurance Mobility Suite
Agilis Insurance Mobility Suite
 
Enterprise Apps Future State
Enterprise Apps Future StateEnterprise Apps Future State
Enterprise Apps Future State
 
Hp software strategy
Hp software strategyHp software strategy
Hp software strategy
 
Seizing the BYOD Opportunity
Seizing the BYOD OpportunitySeizing the BYOD Opportunity
Seizing the BYOD Opportunity
 
fn_sun_readiminds
fn_sun_readimindsfn_sun_readiminds
fn_sun_readiminds
 
NetAuthority Brochure
NetAuthority BrochureNetAuthority Brochure
NetAuthority Brochure
 
Hp Fortify Cloud Application Security
Hp Fortify Cloud Application SecurityHp Fortify Cloud Application Security
Hp Fortify Cloud Application Security
 
Polk County Sheriffs Office Success Story
Polk County Sheriffs Office Success StoryPolk County Sheriffs Office Success Story
Polk County Sheriffs Office Success Story
 
Enrique Castro Leon Virtual Service Oriented Grids
Enrique  Castro Leon    Virtual  Service Oriented GridsEnrique  Castro Leon    Virtual  Service Oriented Grids
Enrique Castro Leon Virtual Service Oriented Grids
 
Learning & Talent In The Cloud
Learning & Talent In The CloudLearning & Talent In The Cloud
Learning & Talent In The Cloud
 
Hawaii Pacific GIS Conference 2012: Disaster Management and Emergency Reponse...
Hawaii Pacific GIS Conference 2012: Disaster Management and Emergency Reponse...Hawaii Pacific GIS Conference 2012: Disaster Management and Emergency Reponse...
Hawaii Pacific GIS Conference 2012: Disaster Management and Emergency Reponse...
 

Viewers also liked

VLE intro
VLE introVLE intro
VLE intro
vlegsa
 
VLE GSA - How to complete a PeerMark assignment
VLE GSA - How to complete a PeerMark assignmentVLE GSA - How to complete a PeerMark assignment
VLE GSA - How to complete a PeerMark assignment
vlegsa
 
Collaboration Tools
Collaboration ToolsCollaboration Tools
Collaboration Tools
vlegsa
 
VLE GSA - How to create a Turnitin submission
VLE GSA - How to create a Turnitin submissionVLE GSA - How to create a Turnitin submission
VLE GSA - How to create a Turnitin submission
vlegsa
 
VLE intro
VLE introVLE intro
VLE intro
vlegsa
 
VLE GSA - How to interpret a Turnitin Originality Report
VLE GSA - How to interpret a Turnitin Originality ReportVLE GSA - How to interpret a Turnitin Originality Report
VLE GSA - How to interpret a Turnitin Originality Report
vlegsa
 

Viewers also liked (6)

VLE intro
VLE introVLE intro
VLE intro
 
VLE GSA - How to complete a PeerMark assignment
VLE GSA - How to complete a PeerMark assignmentVLE GSA - How to complete a PeerMark assignment
VLE GSA - How to complete a PeerMark assignment
 
Collaboration Tools
Collaboration ToolsCollaboration Tools
Collaboration Tools
 
VLE GSA - How to create a Turnitin submission
VLE GSA - How to create a Turnitin submissionVLE GSA - How to create a Turnitin submission
VLE GSA - How to create a Turnitin submission
 
VLE intro
VLE introVLE intro
VLE intro
 
VLE GSA - How to interpret a Turnitin Originality Report
VLE GSA - How to interpret a Turnitin Originality ReportVLE GSA - How to interpret a Turnitin Originality Report
VLE GSA - How to interpret a Turnitin Originality Report
 

Similar to Penrillian.com - Mobile Money

SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015
Francisco Anes
 
How to build a highly secure fin tech application
How to build a highly secure fin tech applicationHow to build a highly secure fin tech application
How to build a highly secure fin tech application
nimbleappgenie
 
Taking Corporate Banking Mobile
Taking Corporate Banking MobileTaking Corporate Banking Mobile
Taking Corporate Banking Mobile
ACI Worldwide
 
Enterprise mobility and cloud
Enterprise mobility and cloudEnterprise mobility and cloud
Enterprise mobility and cloud
Kamesh Pemmaraju
 
2018 01 smart city symposium - db
2018 01 smart city symposium - db2018 01 smart city symposium - db
2018 01 smart city symposium - db
David Bressler
 
Managed Mobility Load Off Customer Wp
Managed Mobility Load Off Customer WpManaged Mobility Load Off Customer Wp
Managed Mobility Load Off Customer Wp
raghuvamsiuriti
 
Miwp mobile capture-firststep_2013
Miwp mobile capture-firststep_2013Miwp mobile capture-firststep_2013
Miwp mobile capture-firststep_2013
Liberteks
 
Executive thinking on payments: disconnects and opportunities
Executive thinking on payments: disconnects and opportunitiesExecutive thinking on payments: disconnects and opportunities
Executive thinking on payments: disconnects and opportunities
NAFCU Services Corporation
 
Mobilising business
Mobilising  businessMobilising  business
Mobilising business
Sno Jutt
 
Mobile app
Mobile appMobile app
Mobile app
Ashish Gujrathi
 
Mobile Banking Security: Challenges, Solutions
Mobile Banking Security: Challenges, SolutionsMobile Banking Security: Challenges, Solutions
Mobile Banking Security: Challenges, Solutions
Cognizant
 
Ask mom money manager final nm lr
Ask mom money manager final nm lrAsk mom money manager final nm lr
Ask mom money manager final nm lr
Nadia Millington
 
Harnessing the Power of the Mobile Cloud
Harnessing the Power of the Mobile CloudHarnessing the Power of the Mobile Cloud
Harnessing the Power of the Mobile Cloud
Antenna Software
 
Mobile First As A Reality
Mobile First As A Reality  Mobile First As A Reality
Mobile First As A Reality
SceneDoc
 
Tablet Access to Business Applications
Tablet Access to Business ApplicationsTablet Access to Business Applications
Tablet Access to Business Applications
Array Networks
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
Symantec
 
Top 5 digital wallet app.pdf
Top 5 digital wallet app.pdfTop 5 digital wallet app.pdf
Top 5 digital wallet app.pdf
VLink Inc
 
Securing Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good DynamicsSecuring Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good Dynamics
Herve Danzelaud
 
How to build an online payment app development like pay pal
How to build an online payment app development like pay palHow to build an online payment app development like pay pal
How to build an online payment app development like pay pal
Noman Shaikh
 
Three Keys to Building a Secure Mobile Infrastructure in Government Environments
Three Keys to Building a Secure Mobile Infrastructure in Government EnvironmentsThree Keys to Building a Secure Mobile Infrastructure in Government Environments
Three Keys to Building a Secure Mobile Infrastructure in Government Environments
VMware
 

Similar to Penrillian.com - Mobile Money (20)

SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015
 
How to build a highly secure fin tech application
How to build a highly secure fin tech applicationHow to build a highly secure fin tech application
How to build a highly secure fin tech application
 
Taking Corporate Banking Mobile
Taking Corporate Banking MobileTaking Corporate Banking Mobile
Taking Corporate Banking Mobile
 
Enterprise mobility and cloud
Enterprise mobility and cloudEnterprise mobility and cloud
Enterprise mobility and cloud
 
2018 01 smart city symposium - db
2018 01 smart city symposium - db2018 01 smart city symposium - db
2018 01 smart city symposium - db
 
Managed Mobility Load Off Customer Wp
Managed Mobility Load Off Customer WpManaged Mobility Load Off Customer Wp
Managed Mobility Load Off Customer Wp
 
Miwp mobile capture-firststep_2013
Miwp mobile capture-firststep_2013Miwp mobile capture-firststep_2013
Miwp mobile capture-firststep_2013
 
Executive thinking on payments: disconnects and opportunities
Executive thinking on payments: disconnects and opportunitiesExecutive thinking on payments: disconnects and opportunities
Executive thinking on payments: disconnects and opportunities
 
Mobilising business
Mobilising  businessMobilising  business
Mobilising business
 
Mobile app
Mobile appMobile app
Mobile app
 
Mobile Banking Security: Challenges, Solutions
Mobile Banking Security: Challenges, SolutionsMobile Banking Security: Challenges, Solutions
Mobile Banking Security: Challenges, Solutions
 
Ask mom money manager final nm lr
Ask mom money manager final nm lrAsk mom money manager final nm lr
Ask mom money manager final nm lr
 
Harnessing the Power of the Mobile Cloud
Harnessing the Power of the Mobile CloudHarnessing the Power of the Mobile Cloud
Harnessing the Power of the Mobile Cloud
 
Mobile First As A Reality
Mobile First As A Reality  Mobile First As A Reality
Mobile First As A Reality
 
Tablet Access to Business Applications
Tablet Access to Business ApplicationsTablet Access to Business Applications
Tablet Access to Business Applications
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Top 5 digital wallet app.pdf
Top 5 digital wallet app.pdfTop 5 digital wallet app.pdf
Top 5 digital wallet app.pdf
 
Securing Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good DynamicsSecuring Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good Dynamics
 
How to build an online payment app development like pay pal
How to build an online payment app development like pay palHow to build an online payment app development like pay pal
How to build an online payment app development like pay pal
 
Three Keys to Building a Secure Mobile Infrastructure in Government Environments
Three Keys to Building a Secure Mobile Infrastructure in Government EnvironmentsThree Keys to Building a Secure Mobile Infrastructure in Government Environments
Three Keys to Building a Secure Mobile Infrastructure in Government Environments
 

Penrillian.com - Mobile Money

  • 1. White Paper Mobile Money: Seven considerations before you build an app January 2013 Share this White Paper
  • 2. Contents Introduction 3 1. An app is not enough: understanding the mobile 4 money ecosystem 2. Build or buy: the pros and cons of 6 off-the-peg apps 3. What your customers want: robust security 8 plus ready access 4. The vault: understanding the secure element 10 5. What is a wallet? And is it what your 12 customers need? 6. From the app backwards: minimising 14 PCI exposure 7. How creativity can overcome 16 standards conservatism Next steps 17 2
  • 3. Introduction Money is inherently mobile, but it is only a recent innovation that has seen money handled on a mobile phone. With the rapid growth of the smartphone, it has become an obvious advance for many companies to give their customers access to services via their mobile device. From banking to bills, purchasing to payments, apps are appearing to manage many of the financial aspects of our daily lives. Producing a successful, secure money application This white paper provides a guide to seven of is not a simple business. It’s not a feat that can be the key areas of successful mobile money app achieved by a simple app developer working in development that Penrillian has come to isolation. A successful mobile money app requires understand through extensive experience in the the input and support of multiple suppliers and space. It’s not an exhaustive checklist, but address stakeholders from across the mobile money these key issues and you will be well on the way to ecosystem. And it requires many different aspects creating an application that is successful for your of design and technology to be addressed. business and appreciated by your customers. ‘Producing a successful, secure money application is not a simple business. It’s not a feat that can be achieved by a simple app developer working in isolation.’ 3
  • 4. 1. App is not enough: understanding An the Mobile Money ecosystem Think about the water that comes out of your tap. It has had a pretty fantastic journey to get there. Just starting from the falling raindrop, you have to consider a journey that takes in a river, a reservoir, processing, pumping, miles of pipe and household plumbing, plus the companies that own and operate these various elements. Were it not for all this hidden effort, your tap is going to deliver very little. What is true for the tap is also true for mobile money Some of the key parties and components to apps. If anything the mobile money ecosystem is consider include: more complex than that which delivers fresh water. • etwork operator – Carries the traffic two and N Building a successful mobile money application from the phone, and usually has a primary billing means navigating this ecosystem and ensuring relationship with the phone owner that all of the relevant parties work together. Or having a partner who can do this on your behalf. • IM provider – Controls the technology on S board the card that the operator uses to securely govern access to the network • ecure element – The location in which secure S payment data is stored on the device, be it part of the handset, or the SIM, or a dedicated SD card • ayment cardlet (e.g. Mobile MasterCard P PayPass) – The underlying application logic behind the making of a payment on the device • rusted Service Manager (TSM) – A secure T delivery system connecting the Secure Element to the service operator Card/Payment Provider – the financial institution handling the transactions and accounts • ecurity Advisors and Authorities – A selection S of advisors and approvals will be required before a mobile money service can be (safely) launched 4
  • 5. 1. (Continued) An App is not enough: understanding the Mobile Money ecosystem In many cases while the interfaces between these ‘When you can’t demand a providers may be available in theory, in practice much work is needed to make them communicate complete rebuild of a partner’s effectively. For example, one issue Penrillian has infrastructure, you need to find faced is that Application Programming Interfaces (APIs) have often been constructed with the ways to negotiate between desktop web in mind. different standards with the The differences between the desktop environment requisite level of performance and mobile in terms of browser capabilities, connection speeds and reliability means these are and security.’ usually unsuitable for the mobile environment. When you can’t demand a complete rebuild of a partner’s infrastructure, you need to find ways to negotiate between different standards with the requisite level of performance and security. This is where a partner like Penrillian can help, but the key message here is this: no one partner in this ecosystem can deliver a successful mobile application on their own. All parties must collaborate effectively to meet the customer’s expectations. ‘In many cases while the interfaces between these providers may be available in theory, in practice much work is needed to make them communicate effectively.’ 5
  • 6. 2. uild or buy: the pros and cons of B off-the-peg apps When shopping for a new suit, few people consider a tailor over the high street these days. The upfront cost and production time may be off-putting when set against the instant gratification of an off-the-peg purchase. But a tailored suit will always be a better fit to your The next risk is security: a recent study by Leibniz shape, can be adapted as that shape changes, University in Hannover and Philipps University of and will most likely be made from higher quality Marburg found more than a thousand Android materials. In the long term, the tailored suit can applications with serious security flaws out of a prove to be better value. sample of 13,000. 17% of the apps that used the secure socket layer (SSL) standard had it wrongly The same rules apply when it comes to developing implemented, leading to significant security risks. new applications, particularly in the field of mobile money. Off-the-peg applications are available, provided by a third party with some elements of the ecosystem already in place, and a skinnable application that can have you up and running quickly. If your needs are fairly straightforward and match the capabilities of the application available, then this is a reasonable route forward. But it is not without its risks: handing over this level of control to a third party limits a number of your powers. The first of these is the ability to make changes: if a third party is catering for multiple customers on the same platform, their development is always going to be focused on the needs of the many, not your needs specifically. Development can be slower and more costly as a result. ‘17% of Android apps that use SSL have it wrongly implemented, leading to significant security risks.’ 6
  • 7. 2. (Continued) Build or buy: the pros and cons of off-the-peg apps The final issue to consider is lock-in: if it is not just While the mobile money ecosystem is complex, it your app, but the entire supporting ecosystem that is navigable. Off-the-peg solutions do have is dependent on a third party, there is no opportunity benefits but in the long term, a bespoke platform to chop and change components, or connect to can offer significant financial and operational additional services without their say-so. As time advantages. passes, it’s possible that your requirements and the service on offer will drift further and further apart. And all the while, you will be paying the licence costs on the intellectual property retained by the solution provider. Consider the alternative. For one of the major European network operators Penrillian constructed an entirely bespoke application and gateway to interface with the payment partner’s systems. The delivery time was comparable with an off-the-shelf solution, and calculated over the first two years of the service’s life, so were the costs. The operator now has its own intellectual property, and an app and gateway that it controls. It can switch payment providers or add other partners into the system on its timetable, rather than lobbying a third party to deliver. ‘...Penrillian constructed an entirely bespoke application and gateway to interface with the payment partner’s systems. The delivery time was comparable with an off-the-shelf solution, and calculated over the first two years of the service’s life, so were the costs.’ 7
  • 8. 3. hat your customers want: W robust security plus ready access When it comes to handling their money, consumers are rightly concerned about security. But they will balance this concern with usability: what good is mobile money if you can’t access it when you need to? Striking this balance is a major challenge for the app designer. Consider the primary ways of paying before mobile Mobile money applications need to offer users the money: cash or card. same gradations of security. For small transactions we want the readiness of cash. For larger For small transactions cash is very convenient. transactions, the protected flexibility of a card. By Grab a note or a handful of change and hand it over tiering security features such as maximum and you’re done. There’s always the risk that you transaction values and PIN confirmations, to match might lose that cash (or have it stolen) but the the transaction value, it is possible to offer users a convenience means that we all keep a small well-structured balance between security and amount to hand most of the time. And we can tailor usability. our level of risk by choosing how much cash to carry. The risks of the card are very different. If a card is truly compromised the losses can be large but they will usually be losses to the bank not us as individuals. If cards are lost we can cancel them remotely and fraudulent transactions can be charged back. Cards are much more convenient than large bundles of cash for larger transactions. ‘The risks of the card are very different. If a card is truly compromised the losses can be large but they will usually be losses to the bank not us as individuals.’ 8
  • 9. 3. (Continued) What your customers want: robust security plus ready access There is another aspect to security to consider, and ‘Cash is convenient, but cards are it is one that very much concerns users: personal data. By their very nature, mobile money more secure for large transactions.’ applications collect a colossal amount of very intimate detail about our personal lives. We don’t just need to protect users’ money; we need to protect the knowledge of how they spend it from external access and improper use. The GSM Association has produced guidelines on privacy that address the issues associated with the collection and retention of personal data by applications, based on international data protection law (http://www.gsma.com/publicpolicy/privacy- design-guidelines-for-mobile-application- development/). Under these guidelines financial transaction data falls under the strictest level of control, since it arguably touches every aspect of a person’s life, including their health (an area of particular sensitivity). Ensuring compliance with these guidelines, and providing the appropriate level of security and usability, comes down to careful design of the whole application and supporting infrastructure. ‘The GSM Association has produced guidelines on privacy that address the issues associated with the collection and retention of personal data by applications, based on international data protection law.’ 9
  • 10. 4. he vault: understanding the T secure element One opportunity for money applications on mobile devices is the actual replacement of cash via Near Field Communication (NFC)-enabled devices. There’s a great appeal in the simplicity of swiping your phone over a terminal to pay for goods, and managing the money available in your virtual wallet using the phone’s interface. For a start you would never need to go hunting for a The Secure Element typically runs as a native cash point again. But this simplicity of use needs to application on a smartcard. These applications, be balanced against security, and so the NFC known as ‘Cardlets’, use the Java Card format architecture defines a means for keeping the designed for very low powered computing devices. payment data secure. The smartcard may be: The ‘Secure Element’ is the smart vault on your • uilt into a device – an approach that has been B mobile device that handles this task. A dedicated taken by the likes of Samsung and Google with chip designed for the purpose of storing encrypted their recent phones. card information and running secure applications, • art of the SIM card – a relatively trusted P the Secure Element sits apart from the rest of the environment in its own right – adopted by some device, safe from the risks that users take with their mobile operators. smartphones every day: open social networks, untrusted websites and dodgy applications. • standalone plugin card for the device in the A common SD card format. ‘The ‘Secure Element’ is the smart vault on your mobile device that handles this task.’ 10
  • 11. 4. The vault: understanding the secure element The device interfaces with the Secure Element via ‘Secure NFC payments could an API specific to the handset operating system, and each takes a slightly different approach to mean the end for cash points.’ security. Android has the SmartCard API for Android, secured via user permissions: an application can only access the Secure Element if the user explicitly gives it permission on installation. By contrast, RIM’s Blackberry requires all applications requiring smartcard access to be ‘signed’ with code keys requested from RIM by the developer. The main thing to understand is that the smartcard is distinct from the handset operating system, and that access to it and the Cardlets running on it, is protected. In this manner the Secure Element can remain secure and trusted by the rest of the payment ecosystem. ‘The device interfaces with the Secure Element via an API specific to the handset operating system, and each takes a slightly different approach to security. Android has the SmartCard API for Android, secured via user permissions: an application can only access the Secure Element if the user explicitly gives it permission on installation.’ 11
  • 12. 5. hat is a wallet? and is it what your W customers need? When a new technology begins to displace an old one, it’s tempting to use the old terminology to help familiarise people with the new. Hence the term ‘wallet’ has become rather popular when referring to mobile money. But what is a ‘wallet’ in digital terms, and what should it be? Both O2 and Google have called their mobile money applications ‘Wallet’ but the two applications are very different. • 2’s wallet relies on you, the user, loading money O onto O2’s own payment platform – essentially a pre-pay card – before you can make payments. This is a wallet in the pure cash sense: you are effectively loading up your purse with cash from your account before going out shopping. • oogle’s Wallet is much more like the one in G your back pocket: it contains all of your different accounts and cards, enabling you to select the right one for each purchase. But it achieves this through a little sleight of hand – all the transactions actually take place through a single MasterCard account created when you sign up for the wallet, and are then rebilled to the relevant card. ‘Not everyone is going to like the idea of creating yet another account, and certainly not all of the major card issuers are happy at the prospect of being a further step removed from the transaction.’ 12
  • 13. 5. (Continued) What is a wallet? And is it what your customers need? Not everyone is going to like the idea of creating yet ‘A true mobile wallet enables the another account, and certainly not all of the major card issuers are happy at the prospect of being a user to choose the right payment further step removed from the transaction. It would card for each transaction.’ seem like the ideal wallet is one that securely manages the various payment options at the user’s disposal but allows each to natively make the payment when it is selected. This adds convenience and security, and unifies access to the underlying hardware required to make NFC payments happen. In technical terms this means controlling the download and installation of new payment applications and their associated Cardlets on the Secure Element. One example of such a wallet is the ISIS scheme in the US (http://www.paywithisis.com). It is this type of wallet that needs to be taken into consideration when planning your mobile money application. Consumers will continue to use multiple methods of payment, and will expect their payment applications to make it easy for them to choose the right option at the right time. Your application needs to be designed today to be discoverable and manageable by a standardised ‘Wallet’. As standards for mobile wallets emerge, you will need to keep pace by updating your app. ‘...the term ‘wallet’ has become rather popular when referring to mobile money. But what is a ‘wallet’ in digital terms, and what should it be?’ 13
  • 14. 6. rom the app backwards: F minimising PCI exposure The payment industry is understandably strict about securing the movement of money. The card schemes enforce control on almost every aspect of the mobile money ecosystem, and part of that control comes in the form of the Payment Card Industry Data Security Standard or PCI DSS. These six letters strike fear into the hearts of many Fundamentally, complying with PCI DSS means application developers. Horror stories of long, avoiding the loss of account data – be it names, expensive testing and approval processes and addresses, numbers, or PIN codes – at any point. worse, failures, abound. But PCI DSS does not So the more you can avoid the need to accept, need to be burdensome. In fact its impact on a new store and transmit account data, the less you will mobile money application can be minimised, need to do in order to achieve compliance. without compromising security. To understand how, you need to understand in basic terms what the standard is setting out to avoid. The PCI Security Council defines three key objectives with regards to securing mobile money applications: • bjective 1: Prevent account data from being O intercepted when entered into a mobile device • Objective 2: Prevent account data from compromise while processed or stored within the mobile device • bjective 3: Prevent account data from O interception upon transmission out of the mobile device ‘...PCI DSS does not need to be burdensome. In fact its impact on a new mobile money application can be minimised, without compromising security.’ 14
  • 15. 6. (Continued) From the app backwards: minimising PCI exposure With regards to storing data, the Secure Element Careful design can pare back the requirements for provides much of the answer here. This highly data entry and transmission to a minimum, limiting secure vault on the phone should contain every the opportunity for interception and capture. But piece of account data that we need to complete a there is one more source of data that needs to be transaction. Everything else that is stored should addressed when protecting a mobile money exist behind the walls of the web service with which application, and it is one that is rarely considered: the application interacts – often already tested and error messages and error logs. Detailed error approved. So our focus needs to be on minimising messages explaining why an interaction with the the entry and transmission of data. application, or the web services behind it, has failed, are useful in development. But they are also This focus fits very well with the goals for any mobile useful to those trying to crack the system. application: nobody wants to enter reams of data Restricting these error messages and logs to a on a small screen. And moving large amounts of bare minimum further reduces the opportunity for data back and forth over the airwaves is slow and attack. expensive. So ensuring that data entry and transmission is minimised not only adds to the Keep the flow and storage of data across the security of the application, it adds to its efficiency application and its back end to an absolute and performance. minimum, and you can also minimise the pain of PCI compliance. ‘Detailed error messages explaining why an interaction with the application, or the web services behind it, has failed, are useful in development. But they are also useful to those trying to crack the system. Restricting these error messages and logs to a bare minimum further reduces the opportunity for attack.’ 15
  • 16. 7. How creativity can overcome standards conservatism Unless you are an investment banker, it’s natural to be a little conservative when dealing with other people’s money. That natural conservatism can lead to very procedural thinking. If there are standards: follow them. If something has been done before that worked: do it again. The problem with this approach is that while it is On this basis, standards need to be treated rather ‘safe’ it is likely to lead to unremarkable results. And like the rules of football. They have to be obeyed in a fresh, new, but already competitive market like but they leave plenty of opportunity for flair play, for mobile money, remarkable is exactly what you those that are capable. need to be. To be anything else is far from safe. ‘... in a fresh, new, but already competitive market like mobile money, remarkable is exactly what you need to be.’ 16
  • 17. Next steps The smartphone will replace the physical wallet. As more payment options and other smartcards for loyalty points and travel move over to the mobile, the physical wallet will become redundant. This presents an opportunity for companies to establish patterns of consumer behaviour, as people choose their new preferred payment options. There are barriers to entering the market today but About Penrillian as we have aimed to show with this paper, they are Founded in 2000, Penrillian is now one of the far from insurmountable. And working with a most experienced specialist mobile software partner like Penrillian that knows the market space development companies in the world. intimately, it’s possible to overcome them rapidly at reasonable cost. We develop bespoke software solutions and over the years we have developed an impressive range Not only that: there is room for innovation. Few of of applications and software for some of the the true opportunities for mobile money have yet leading brands in mobile. For example: been explored. Standards do not have to be seen as restrictions: rather they just define the rules If you’ve ever used a Vodafone data dongle, within which creativity can take place. Off the peg purchased goods using your phone, bought 2-for-1 applications may tick the box today but they leave cinema tickets on Orange Wednesdays from a little room for competitive advantage in the longer BlackBerry, or managed a T-Mobile account from term. a phone, chances are we created the software. Nowadays, we are helping our customers remain at the forefront of technology by creating the next generation of secure mobile services and payment apps for operators, banking, payment providers, and financial services. Working with clients across multiple business sectors, our software is helping to engage users and drive revenue and retention. If you are considering an entry into the mobile money market, talk to Penrillian today on 44 (0) 1768 214400 17
  • 18. Penrillian Clint Mill Cornmarket Penrith CA11 7HW United Kingdom Email: enquires@penrillian.com Tel: 44 (0) 1768 214400 Web: www.penrillian.com © 2013 Penrillian mobile phone software developers - All rights reserved. Follow us