Risk
1/4/2011
11:19 AM
Connect Directly
RSS
E-Mail
50%
50%
Repost This

Google Prepping Retail Mobile Payment Service

The service, based on near-field communication, would allow consumers to wave smartphones to pay for goods, use discount codes, say reports.

Top 10 Google Stories Of 2010
(click image for larger view)
Slideshow: Top 10 Google Stories Of 2010
Google reportedly this year will debut a payment and advertising service for retail mobile payments.

Based on near-field communication (NFC) technology, the service would let consumers pay for items merely by waving or tapping their smartphones near a register at checkout, according to Bloomberg Businessweek, which cited two people familiar with the plans. Google's plans include a phone chip that would include a shopper's financial information, as well as any coupons or gift and store-loyalty cards, Businessweek said.

NFC wireless transmits and receives data from a distance of 4 inches.

"You'll be able to walk in a store and do commerce. You'd bump for everything and eventually replace credit cards," Eric Schmidt, Google CEO, said of NFC at the Web 2.0 Summit in November.

Google is not alone in targeting mobile payments, a market expected to be worth $1.13 trillion by 2014, according to IE Market Research. Visa, MasterCard, PayPal, Bank of America, AT&T, and Verizon also are vying for dominance in this arena. Online auction site eBay, parent company of PayPal, may launch its own commercial NFC service in the second half of 2011 and is open to partnering with companies like Google, Laura Chambers, senior director of PayPal Mobile, told Businessweek.

On November 16, Verizon Wireless, AT&T, and T-Mobile USA formed Isis, a national mobile commerce network.

"We plan to create a mobile wallet that ultimately eliminates the need for consumers to carry cash, credit and debit cards, reward cards, coupons, tickets, and transit passes," Michael Abbott, Isis CEO, said at the time.

In December, Visa approved DeviceFidelity's In2Pay MicroSD for smartphones such as some BlackBerry models, the iPhone, and the Samsung Vibrant Galaxy S.

"In addition to issuing plastic magnetic stripe or chip-enabled payment cards, financial institutions can now consider offering their account holders a new technology that enables them to transform their existing phones into fully functional mobile payment devices," said Bill Gajda, head of Visa Mobile.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-3946
Published: 2014-04-24
Cisco IOS before 15.3(2)S allows remote attackers to bypass interface ACL restrictions in opportunistic circumstances by sending IPv6 packets in an unspecified scenario in which expected packet drops do not occur for "a small percentage" of the packets, aka Bug ID CSCty73682.

CVE-2012-5723
Published: 2014-04-24
Cisco ASR 1000 devices with software before 3.8S, when BDI routing is enabled, allow remote attackers to cause a denial of service (device reload) via crafted (1) broadcast or (2) multicast ICMP packets with fragmentation, aka Bug ID CSCub55948.

CVE-2013-6738
Published: 2014-04-24
Cross-site scripting (XSS) vulnerability in IBM SmartCloud Analytics Log Analysis 1.1 and 1.2 before 1.2.0.0-CSI-SCALA-IF0003 allows remote attackers to inject arbitrary web script or HTML via an invalid query parameter in a response from an OAuth authorization endpoint.

CVE-2014-2391
Published: 2014-04-24
The password recovery service in Open-Xchange AppSuite before 7.2.2-rev20, 7.4.1 before 7.4.1-rev11, and 7.4.2 before 7.4.2-rev13 makes an improper decision about the sensitivity of a string representing a previously used but currently invalid password, which allows remote attackers to obtain potent...

CVE-2014-2392
Published: 2014-04-24
The E-Mail autoconfiguration feature in Open-Xchange AppSuite before 7.2.2-rev20, 7.4.1 before 7.4.1-rev11, and 7.4.2 before 7.4.2-rev13 places a password in a GET request, which allows remote attackers to obtain sensitive information by reading (1) web-server access logs, (2) web-server Referer log...

Best of the Web