mobile commerce

Post on 25-Jan-2016

5 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

DESCRIPTION

Mobile commerce

TRANSCRIPT

MOBILE COMMERCE

•BUSHAN KOTIAN-22•SANTOSH NEMAN-31•ASHWIN NORONHA-32•SIDDHARTH ULMEK-49•SAVIO MISQUITTA-57

HISTORY OF M- COMMERCE.•FIRST GLOBAL MOBILE

COMMERCE WAS FORMED IN THE YEAR 1997.•THE EXECUT.CHRAIRMAN WAS KEVIN DUFFEY AND THIS HISTORIC DAY WAS 10TH NOVEMBER 1997•THE FIRST MOBILE COMMERCE WAS DONE BY COCA COLA VIA SMS.•THIS COMMERCE WON AN AWARD IN THE YEAR 1998 FROM FINANCIAL TIMES.•JAPAN AND OTHER COUNTRIES PLAYED AN IMPORTANT PART.

HOW IT IS AN ADVANTAGE

WAP GW/Proxy

SSL tunnel

MeP

GSM Security

SMS-C

User

Browsing (negotiation)

Merchant

Mobile Wallet

CC/Bank

IPP•SAVE TIME AND MONEY•FLEXIBILITY TO USE DIFFERENT Ios WHICH HELPS IN THE FASTER DEVELOPMENT AND VARIETY.•DOSENT REQUIRE APPROVALS FROM THE APP STORES.•PORTABILITY.

PAYMENT VIA INTEGRATED PAYMENT SERVER

WAP GW/Proxy

ISO8583 BasedCP

Mobile CommerceServer

GSM Security

SMS-C

User

Browsing (negotiation)

CC/Bank

Merchant

Mobile Wallet

Voice PrePaid

VPP IF

SSL tunnel

FUTURE OF M-COMMERCE.

•THE FUTURE IS BRIGHT BECAUSE THIS GENERATION IS MORE OF A TECHNOLOGY BASED GENRE•AND WITH THE UPCOMING NEW SOFTWARES AND OPERATING SYSTEMS IT HAS BEEN A BIG JOURNEY FROM RAGS TO RICHES.

SERVICES OFFERED BY M-COMMERCE

•MOBILE MONEY TANSFER.•MOBILE ATM•MOBILE TICKETING.•MOBILE VOUCHERS AND CARDS•CONENT PURCHASES.•MOBILE BANKING .•INFORMATIONB SERVICES.•AUCTIONS•MOBILE SHOPPING.

Security in M-Commerce: Environment

Operator centric model

CA

Bank (FI)

Merchant

ContentAggregati

onInternet

SAT GW

WAP GW

MobileNetwork

Mobile Bank

WAP1.1(+SIM where avail.)

WAP1.2(WIM)

(SIM)

Security andPayment

Mobile e-CommerceServer

Mobile IPService

ProviderNetwork

New Security Risksin M-Commerce

• Abuse of cooperative nature of ad-hoc networks• An adversary that compromises one

node can disseminate false routing information.

• Malicious domains• A single malicious domain can

compromise devices by downloading malicious code

• Roaming (are you going to the bad guys ?)• Users roam among non-trustworthy

domains

New Security Risks (cont)

• Launching attacks from mobile devices• With mobility, it is difficult to identify attackers

• Loss or theft of device• More private information than desktop computers

• Security keys might have been saved on the device

• Access to corporate systems

• Bluetooth provides security at the lower layers only: a stolen device can still be trusted

New Privacy Risks

• Monitoring user’s private information

• Offline telemarketing

• Who is going to read the “legal jargon”

• Value added services based on location awareness (Location-Based Services)

THANK YOU AND HAVE A NICE DAY.

THANK YOU AND HAVE A NICE DAY.

top related