Mobile Payments For Safety And Privacy: A Look At Apple Pay And Google Pay

Apple Pay

Discuss about the Mobile Payments for Safety and Privacy of Apple Pay.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Mobile payment which is also known as mobile wallet, mobile money transfer, as well as mobile money, usually refer to transactions done under financial regulations and done via or from a mobile gadget (Rackley III, Porter, Rickman, and Cochran, Qualcomm Inc, 2013). There are several mobile money services that are currently available in existence, and the variances among them might get murky and confusing. Mobile payment services are growing every year and they are truly our future. This paper will look at Apple pay and Google pay, look at how each of them works and the persons who are legible to use them. 

Apple Pay provides secure, confidential, and easy electronic transaction services using iPad, iPhone, Mac, and Apple Watch. Other than Apple gadgets, what is required in addition is the recent version of Apple’s Wallet app, MacOS or watchOS, iOs, as well as Apple ID engaged to iCloud. When one receives cash, it is directed to his/her Apple Pay money card that is found within the Wallet application (https://www.business.com). It is easy to start using money immediately after reception to purchase anything through Apple Pay in apps, in stores, as well as through online. Apple Pay money balance can as well be to the owner’s bank account (Chin, 2015). After purchasing anything using Apple Pay, receipts are stored in Wallet apps, however the transaction details are not kept elsewhere. Each transaction made through Mac, iPhone, and iPad requires authentication through passwords, Face IDs, or Touch IDs.  Unique passcode is used to protect the Apple Watch.

User Authentication: The user is required to authenticate on the gadget to make a transaction (Chin, 2015). Authentication is done through the TouchID (fingerprint identification sensor) or through PIN number keying in a watch (AppleWatch).

Device Authentication: All Apple Pay transactions produce unique value, which make sure that the transactions are done through authorized devices (Chin, 2015). The unique identifier together with the cryptogram as well as the token applied to approve the transaction make sure that even when tokens are stolen it cannot be applied from a different gadget since the token should originate from the gadget it was authorized to.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

When a transit, prepaid, credit, or debit card is added to the Apple Pay, data that entered on the gadget is encrypted as well as sent to the Apple servers.  

Authentication

When one make transaction, Apple Pay use device-specific numbers as well as unique transaction codes. Hence the card code is not stored on the Apple servers or on the gadget, and when payment is done, the card number is never shared with merchants by Apple. Keep customers transactions private. When payments are done with credit or debit cards, Apple Pay do not retain transaction details that might be held back to the customer (Abulafia, and Cohen, Jumio Inc, 2016). After transacting through Apple Pay Cash, transaction details is kept only for regulatory purposes, fraud prevention, as well as troubleshooting. Debit and credit cards as well as Apple Pay Cash are within the Wallet application together with rewards cards, tickets, and boarding passes. Apple Pay functions with most debit and credit cards from almost all banks in America. All it needed is to add a participating card to the Wallet and continue to receive all the benefits and rewards of the cards.

For online transactions, merchants only get information that the client approve to share for fulfilling his/her order including; shipping and billing addresses, customer’s name, and email address (Randazza, and Portal, National Payment Card Association, 2013). Applications using Apple Pay should have privacy policies that can be viewed, which keeps customer to be the controller of his/her data.

  1. The device is placed near the NFC paying terminal by the user. When card is selected its DAN number (token number) is added into the Secure Element (SE).
  2. Information is sent to the bank which is the acquirer.
  3. DAN number is received by the acquirer, however not informed if it is a token or valid PAN.
  4.  The payment system will sense it is a DAN and not real PAN, then the number will be forwarded to the Token Service Provider (TSP) sending the real PAN to issuers.
  5.  The issuer will authorise or deny the transaction is authorized or denied by the issuer and notification will be sent to the acquirer, and then back to the merchant 

Google Pay integrates Google Chrome’s auto-fill feature. When using Google Pay app, it is easy for the user to utilize the payment details saved to the Google Account hence it is possible to speed thru checkout. Customers are able to add most gift, credit, and debit cards into the application (https://developers.google.com). All loyalty cards can be stored to help customers in maintaining reward points.

Google Pay employs NFC (Near Field Communication) technology, which allow customers to transmit the credit card details between the card reader and the customer’s mobile phone (Fisher, Blaze Mobile Inc, 2013). When the merchants accept Google Pay in their business and have matching card readers, customers simply hold their mobile phones near the card readers while their phones are open.

Google Pay app is the simple, fast, method to transact with Google web, and in stores. It is easy to start, a card is only added once from a bank that is participating. Online transaction is as fast as just a click.  Each non-rooted Android gadget can access Google Pay. It is not a must that customers remember all their card information or fill endless documents on their phone. As an alternative, it transact with a number of clicks and use more time checking in, and less time checking out(Fisher, Blaze Mobile Inc, 2013).  Missing out in terms reward chances is the contrary to the fun that is the reason why customer still receive all the similar protections and perks of his/her physical card when using Google Pay.

Encryption

Like each and every Google product, Google Pay app have got strong security safeguards at its center to automatically and continuously safeguard customers’ accounts as well as personal information from safety threats. When a customers pay in stores, encrypted numbers are shared in place of customer’s real card information with the trader. It also means that, it’s got customers back so his/her real card information remain secure (Confidential). Instead of utilizing real credit card numbers as well as other personal details, Google Pay is expected to utilize a simulated account number that will make sure customers’ personal details are safe on their phone (Laracey, Paydiant Inc, 2013). If a customer lose his/her phone or it is stolen, he can lock his phone easily, construct a fresh password or fully wipe all transaction details until he recover the phone.

Google Wallet safeguards payment identifications by keeping user information on safe servers as well as encrypting all transaction details with company-standard secure socket layer (SSL technology).

Google Pay has several options of authenticating users before payments. Google Pay takes fingerprint verification (not supported by default), pattern, PIN code, or password to authenticate transactions. 

Transaction tokens are added on the gadget in advance, prior to the transaction. Tokens are occasionally recovered from Google server if connectivity is accessible.

Since HCE presumes that every information kept on a gadget is susceptible (like if the device is compromised by malware or stolen) it keeps the card crucial information on databases held in a safe cloud environment. Preventing unauthorized accessibility to HCE is influenced by the following four safety pillars: tokenization, limited use of security keys, gadget fingerprinting, as well as transaction risk study.

Threats as well as Vulnerabilities

Mobile Payment Apps Users Threats

Through mobile phones personal as well as corporate usage are mixed. More information is gathered by Mobiles phones from customers, which could assist to execute sophisticated attacks. The attacks target users through phishing emails as well as social engineering via different communication networks (like email, phone, SMS) and information concerning the user present within the public territory (like search engines and social media).

Installation of rootkits11/malware can be enabled by drive, through downloading attacks leveraging like WebKit to roots level accessing, or through side-load of malware along semi legitimate or legitimate applications taken from some stores.

  1. The device is placed near to the NFC POS
  2. Information is sent to the bank which is the acquirer.
  3.  The acquirer obtains the cryptogram as well as the token and transfer to the right issuer through the payment system that acts like a bridge between the issuer and the acquirer.
  4. The real PAN will be requested by payment network from the Token Service Provider (TSP) and transfer it to the issuer for to the issuer for authorization.
  5. The issuer should deny or authorize the payment and then send the details to acquirer, then back to the merchant. Which will in turn send it back to the merchant. 
  • In both methods of payment, customers simply need to download apps on their smartphone.
  • Apple Pay and Google Pay are becoming progressively popular and they are compatible with several trader card readers, banks and credit cards.
  • In both cases customers can also keep all of their loyalty cards, helping them to retain reward points

Differences

  • In case of Apple Pay, the recent version of Apple’s Wallet app, MacOS or watchOS, iOs, as well as Apple ID engaged to iCloud is all that is needed. Google Pay employs NFC (near field communication technology).
  • When the merchants accept Google Pay in their business and have matching card readers, customers simply hold their mobile phones near the card readers while their phones are open. In case of Apple pay all transactions are made on the Mac, iPhone, or iPad requires authentication using Touch ID, Face ID, or the passcode (Laracey, Paydiant Inc, 2013). 

https://developers.google.com/android/reference/com/google/ android/gms/wallet/PaymentsClient

https://www.business.com/articles/google-pay-vs-apple-pay-vs-samsung-pay/

Laracey, K., Paydiant Inc, 2013. Mobile phone payment processing methods and systems. U.S. Patent 8,380,177.

Fisher, M., Blaze Mobile Inc, 2013. Conducting an online payment transaction using an NFC enabled mobile communication device. U.S. Patent 8,352,323.

Randazza, J.R. and Portal, D., National Payment Card Association, 2013. Payment system and methods. U.S. Patent 8,490,865.

Abulafia, D. and Cohen, E., Jumio Inc, 2016. Mobile phone payment system using integrated camera credit card reader. U.S. Patent 9,269,010.

Chin, D.H., 2015. Gesture based authentication for wireless payment by a mobile electronic device. U.S. Patent 9,082,117.

Rackley III, B.L., Porter, W.D., Rickman, G.M. and Cochran, K.L., Qualcomm Inc, 2013. Methods and systems for managing payment sources in a mobile environment. U.S. Patent 8,467,766.

What Will You Get?

We provide professional writing services to help you score straight A’s by submitting custom written assignments that mirror your guidelines.

Premium Quality

Get result-oriented writing and never worry about grades anymore. We follow the highest quality standards to make sure that you get perfect assignments.

Experienced Writers

Our writers have experience in dealing with papers of every educational level. You can surely rely on the expertise of our qualified professionals.

On-Time Delivery

Your deadline is our threshold for success and we take it very seriously. We make sure you receive your papers before your predefined time.

24/7 Customer Support

Someone from our customer support team is always here to respond to your questions. So, hit us up if you have got any ambiguity or concern.

Complete Confidentiality

Sit back and relax while we help you out with writing your papers. We have an ultimate policy for keeping your personal and order-related details a secret.

Authentic Sources

We assure you that your document will be thoroughly checked for plagiarism and grammatical errors as we use highly authentic and licit sources.

Moneyback Guarantee

Still reluctant about placing an order? Our 100% Moneyback Guarantee backs you up on rare occasions where you aren’t satisfied with the writing.

Order Tracking

You don’t have to wait for an update for hours; you can track the progress of your order any time you want. We share the status after each step.

image

Areas of Expertise

Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.

Areas of Expertise

Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.

image

Trusted Partner of 9650+ Students for Writing

From brainstorming your paper's outline to perfecting its grammar, we perform every step carefully to make your paper worthy of A grade.

Preferred Writer

Hire your preferred writer anytime. Simply specify if you want your preferred expert to write your paper and we’ll make that happen.

Grammar Check Report

Get an elaborate and authentic grammar check report with your work to have the grammar goodness sealed in your document.

One Page Summary

You can purchase this feature if you want our writers to sum up your paper in the form of a concise and well-articulated summary.

Plagiarism Report

You don’t have to worry about plagiarism anymore. Get a plagiarism report to certify the uniqueness of your work.

Free Features $66FREE

  • Most Qualified Writer $10FREE
  • Plagiarism Scan Report $10FREE
  • Unlimited Revisions $08FREE
  • Paper Formatting $05FREE
  • Cover Page $05FREE
  • Referencing & Bibliography $10FREE
  • Dedicated User Area $08FREE
  • 24/7 Order Tracking $05FREE
  • Periodic Email Alerts $05FREE
image

Services offered

Join us for the best experience while seeking writing assistance in your college life. A good grade is all you need to boost up your academic excellence and we are all about it.

  • On-time Delivery
  • 24/7 Order Tracking
  • Access to Authentic Sources
Academic Writing

We create perfect papers according to the guidelines.

Professional Editing

We seamlessly edit out errors from your papers.

Thorough Proofreading

We thoroughly read your final draft to identify errors.

image

Delegate Your Challenging Writing Tasks to Experienced Professionals

Work with ultimate peace of mind because we ensure that your academic work is our responsibility and your grades are a top concern for us!

Check Out Our Sample Work

Dedication. Quality. Commitment. Punctuality

Categories
All samples
Essay (any type)
Essay (any type)
The Value of a Nursing Degree
Undergrad. (yrs 3-4)
Nursing
2
View this sample

It May Not Be Much, but It’s Honest Work!

Here is what we have achieved so far. These numbers are evidence that we go the extra mile to make your college journey successful.

0+

Happy Clients

0+

Words Written This Week

0+

Ongoing Orders

0%

Customer Satisfaction Rate
image

Process as Fine as Brewed Coffee

We have the most intuitive and minimalistic process so that you can easily place an order. Just follow a few steps to unlock success.

See How We Helped 9000+ Students Achieve Success

image

We Analyze Your Problem and Offer Customized Writing

We understand your guidelines first before delivering any writing service. You can discuss your writing needs and we will have them evaluated by our dedicated team.

  • Clear elicitation of your requirements.
  • Customized writing as per your needs.

We Mirror Your Guidelines to Deliver Quality Services

We write your papers in a standardized way. We complete your work in such a way that it turns out to be a perfect description of your guidelines.

  • Proactive analysis of your writing.
  • Active communication to understand requirements.
image
image

We Handle Your Writing Tasks to Ensure Excellent Grades

We promise you excellent grades and academic excellence that you always longed for. Our writers stay in touch with you via email.

  • Thorough research and analysis for every order.
  • Deliverance of reliable writing service to improve your grades.
Place an Order Start Chat Now
image

Order your essay today and save 30% with the discount code ESSAYHELP