Discuss about the Mobile Payments for Safety and Privacy of Apple Pay.
Mobile payment which is also known as mobile wallet, mobile money transfer, as well as mobile money, usually refer to transactions done under financial regulations and done via or from a mobile gadget (Rackley III, Porter, Rickman, and Cochran, Qualcomm Inc, 2013). There are several mobile money services that are currently available in existence, and the variances among them might get murky and confusing. Mobile payment services are growing every year and they are truly our future. This paper will look at Apple pay and Google pay, look at how each of them works and the persons who are legible to use them.
Apple Pay provides secure, confidential, and easy electronic transaction services using iPad, iPhone, Mac, and Apple Watch. Other than Apple gadgets, what is required in addition is the recent version of Apple’s Wallet app, MacOS or watchOS, iOs, as well as Apple ID engaged to iCloud. When one receives cash, it is directed to his/her Apple Pay money card that is found within the Wallet application (https://www.business.com). It is easy to start using money immediately after reception to purchase anything through Apple Pay in apps, in stores, as well as through online. Apple Pay money balance can as well be to the owner’s bank account (Chin, 2015). After purchasing anything using Apple Pay, receipts are stored in Wallet apps, however the transaction details are not kept elsewhere. Each transaction made through Mac, iPhone, and iPad requires authentication through passwords, Face IDs, or Touch IDs. Unique passcode is used to protect the Apple Watch.
User Authentication: The user is required to authenticate on the gadget to make a transaction (Chin, 2015). Authentication is done through the TouchID (fingerprint identification sensor) or through PIN number keying in a watch (AppleWatch).
Device Authentication: All Apple Pay transactions produce unique value, which make sure that the transactions are done through authorized devices (Chin, 2015). The unique identifier together with the cryptogram as well as the token applied to approve the transaction make sure that even when tokens are stolen it cannot be applied from a different gadget since the token should originate from the gadget it was authorized to.
When a transit, prepaid, credit, or debit card is added to the Apple Pay, data that entered on the gadget is encrypted as well as sent to the Apple servers.
When one make transaction, Apple Pay use device-specific numbers as well as unique transaction codes. Hence the card code is not stored on the Apple servers or on the gadget, and when payment is done, the card number is never shared with merchants by Apple. Keep customers transactions private. When payments are done with credit or debit cards, Apple Pay do not retain transaction details that might be held back to the customer (Abulafia, and Cohen, Jumio Inc, 2016). After transacting through Apple Pay Cash, transaction details is kept only for regulatory purposes, fraud prevention, as well as troubleshooting. Debit and credit cards as well as Apple Pay Cash are within the Wallet application together with rewards cards, tickets, and boarding passes. Apple Pay functions with most debit and credit cards from almost all banks in America. All it needed is to add a participating card to the Wallet and continue to receive all the benefits and rewards of the cards.
For online transactions, merchants only get information that the client approve to share for fulfilling his/her order including; shipping and billing addresses, customer’s name, and email address (Randazza, and Portal, National Payment Card Association, 2013). Applications using Apple Pay should have privacy policies that can be viewed, which keeps customer to be the controller of his/her data.
Google Pay integrates Google Chrome’s auto-fill feature. When using Google Pay app, it is easy for the user to utilize the payment details saved to the Google Account hence it is possible to speed thru checkout. Customers are able to add most gift, credit, and debit cards into the application (https://developers.google.com). All loyalty cards can be stored to help customers in maintaining reward points.
Google Pay employs NFC (Near Field Communication) technology, which allow customers to transmit the credit card details between the card reader and the customer’s mobile phone (Fisher, Blaze Mobile Inc, 2013). When the merchants accept Google Pay in their business and have matching card readers, customers simply hold their mobile phones near the card readers while their phones are open.
Google Pay app is the simple, fast, method to transact with Google web, and in stores. It is easy to start, a card is only added once from a bank that is participating. Online transaction is as fast as just a click. Each non-rooted Android gadget can access Google Pay. It is not a must that customers remember all their card information or fill endless documents on their phone. As an alternative, it transact with a number of clicks and use more time checking in, and less time checking out(Fisher, Blaze Mobile Inc, 2013). Missing out in terms reward chances is the contrary to the fun that is the reason why customer still receive all the similar protections and perks of his/her physical card when using Google Pay.
Like each and every Google product, Google Pay app have got strong security safeguards at its center to automatically and continuously safeguard customers’ accounts as well as personal information from safety threats. When a customers pay in stores, encrypted numbers are shared in place of customer’s real card information with the trader. It also means that, it’s got customers back so his/her real card information remain secure (Confidential). Instead of utilizing real credit card numbers as well as other personal details, Google Pay is expected to utilize a simulated account number that will make sure customers’ personal details are safe on their phone (Laracey, Paydiant Inc, 2013). If a customer lose his/her phone or it is stolen, he can lock his phone easily, construct a fresh password or fully wipe all transaction details until he recover the phone.
Google Wallet safeguards payment identifications by keeping user information on safe servers as well as encrypting all transaction details with company-standard secure socket layer (SSL technology).
Google Pay has several options of authenticating users before payments. Google Pay takes fingerprint verification (not supported by default), pattern, PIN code, or password to authenticate transactions.
Transaction tokens are added on the gadget in advance, prior to the transaction. Tokens are occasionally recovered from Google server if connectivity is accessible.
Since HCE presumes that every information kept on a gadget is susceptible (like if the device is compromised by malware or stolen) it keeps the card crucial information on databases held in a safe cloud environment. Preventing unauthorized accessibility to HCE is influenced by the following four safety pillars: tokenization, limited use of security keys, gadget fingerprinting, as well as transaction risk study.
Threats as well as Vulnerabilities
Mobile Payment Apps Users Threats
Through mobile phones personal as well as corporate usage are mixed. More information is gathered by Mobiles phones from customers, which could assist to execute sophisticated attacks. The attacks target users through phishing emails as well as social engineering via different communication networks (like email, phone, SMS) and information concerning the user present within the public territory (like search engines and social media).
Installation of rootkits11/malware can be enabled by drive, through downloading attacks leveraging like WebKit to roots level accessing, or through side-load of malware along semi legitimate or legitimate applications taken from some stores.
Differences
https://developers.google.com/android/reference/com/google/ android/gms/wallet/PaymentsClient
https://www.business.com/articles/google-pay-vs-apple-pay-vs-samsung-pay/
Laracey, K., Paydiant Inc, 2013. Mobile phone payment processing methods and systems. U.S. Patent 8,380,177.
Fisher, M., Blaze Mobile Inc, 2013. Conducting an online payment transaction using an NFC enabled mobile communication device. U.S. Patent 8,352,323.
Randazza, J.R. and Portal, D., National Payment Card Association, 2013. Payment system and methods. U.S. Patent 8,490,865.
Abulafia, D. and Cohen, E., Jumio Inc, 2016. Mobile phone payment system using integrated camera credit card reader. U.S. Patent 9,269,010.
Chin, D.H., 2015. Gesture based authentication for wireless payment by a mobile electronic device. U.S. Patent 9,082,117.
Rackley III, B.L., Porter, W.D., Rickman, G.M. and Cochran, K.L., Qualcomm Inc, 2013. Methods and systems for managing payment sources in a mobile environment. U.S. Patent 8,467,766.
We provide professional writing services to help you score straight A’s by submitting custom written assignments that mirror your guidelines.
Get result-oriented writing and never worry about grades anymore. We follow the highest quality standards to make sure that you get perfect assignments.
Our writers have experience in dealing with papers of every educational level. You can surely rely on the expertise of our qualified professionals.
Your deadline is our threshold for success and we take it very seriously. We make sure you receive your papers before your predefined time.
Someone from our customer support team is always here to respond to your questions. So, hit us up if you have got any ambiguity or concern.
Sit back and relax while we help you out with writing your papers. We have an ultimate policy for keeping your personal and order-related details a secret.
We assure you that your document will be thoroughly checked for plagiarism and grammatical errors as we use highly authentic and licit sources.
Still reluctant about placing an order? Our 100% Moneyback Guarantee backs you up on rare occasions where you aren’t satisfied with the writing.
You don’t have to wait for an update for hours; you can track the progress of your order any time you want. We share the status after each step.
Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.
Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.
From brainstorming your paper's outline to perfecting its grammar, we perform every step carefully to make your paper worthy of A grade.
Hire your preferred writer anytime. Simply specify if you want your preferred expert to write your paper and we’ll make that happen.
Get an elaborate and authentic grammar check report with your work to have the grammar goodness sealed in your document.
You can purchase this feature if you want our writers to sum up your paper in the form of a concise and well-articulated summary.
You don’t have to worry about plagiarism anymore. Get a plagiarism report to certify the uniqueness of your work.
Join us for the best experience while seeking writing assistance in your college life. A good grade is all you need to boost up your academic excellence and we are all about it.
We create perfect papers according to the guidelines.
We seamlessly edit out errors from your papers.
We thoroughly read your final draft to identify errors.
Work with ultimate peace of mind because we ensure that your academic work is our responsibility and your grades are a top concern for us!
Dedication. Quality. Commitment. Punctuality
Here is what we have achieved so far. These numbers are evidence that we go the extra mile to make your college journey successful.
We have the most intuitive and minimalistic process so that you can easily place an order. Just follow a few steps to unlock success.
We understand your guidelines first before delivering any writing service. You can discuss your writing needs and we will have them evaluated by our dedicated team.
We write your papers in a standardized way. We complete your work in such a way that it turns out to be a perfect description of your guidelines.
We promise you excellent grades and academic excellence that you always longed for. Our writers stay in touch with you via email.