Risk
1/4/2011
11:19 AM
50%
50%

Google Prepping Retail Mobile Payment Service

The service, based on near-field communication, would allow consumers to wave smartphones to pay for goods, use discount codes, say reports.

Top 10 Google Stories Of 2010
(click image for larger view)
Slideshow: Top 10 Google Stories Of 2010
Google reportedly this year will debut a payment and advertising service for retail mobile payments.

Based on near-field communication (NFC) technology, the service would let consumers pay for items merely by waving or tapping their smartphones near a register at checkout, according to Bloomberg Businessweek, which cited two people familiar with the plans. Google's plans include a phone chip that would include a shopper's financial information, as well as any coupons or gift and store-loyalty cards, Businessweek said.

NFC wireless transmits and receives data from a distance of 4 inches.

"You'll be able to walk in a store and do commerce. You'd bump for everything and eventually replace credit cards," Eric Schmidt, Google CEO, said of NFC at the Web 2.0 Summit in November.

Google is not alone in targeting mobile payments, a market expected to be worth $1.13 trillion by 2014, according to IE Market Research. Visa, MasterCard, PayPal, Bank of America, AT&T, and Verizon also are vying for dominance in this arena. Online auction site eBay, parent company of PayPal, may launch its own commercial NFC service in the second half of 2011 and is open to partnering with companies like Google, Laura Chambers, senior director of PayPal Mobile, told Businessweek.

On November 16, Verizon Wireless, AT&T, and T-Mobile USA formed Isis, a national mobile commerce network.

"We plan to create a mobile wallet that ultimately eliminates the need for consumers to carry cash, credit and debit cards, reward cards, coupons, tickets, and transit passes," Michael Abbott, Isis CEO, said at the time.

In December, Visa approved DeviceFidelity's In2Pay MicroSD for smartphones such as some BlackBerry models, the iPhone, and the Samsung Vibrant Galaxy S.

"In addition to issuing plastic magnetic stripe or chip-enabled payment cards, financial institutions can now consider offering their account holders a new technology that enables them to transform their existing phones into fully functional mobile payment devices," said Bill Gajda, head of Visa Mobile.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-8917
Published: 2015-01-28
Multiple cross-site scripting (XSS) vulnerabilities in (1) dojox/form/resources/uploader.swf (aka upload.swf), (2) dojox/form/resources/fileuploader.swf (aka fileupload.swf), (3) dojox/av/resources/audio.swf, and (4) dojox/av/resources/video.swf in the IBM Dojo Toolkit, as used in IBM Social Media A...

CVE-2014-8920
Published: 2015-01-28
Buffer overflow in the Data Transfer Program in IBM i Access 5770-XE1 5R4, 6.1, and 7.1 on Windows allows local users to gain privileges via unspecified vectors.

CVE-2015-0235
Published: 2015-01-28
Heap-based buffer overflow in the __nss_hostname_digits_dots function in glibc 2.2, and other 2.x versions before 2.18, allows context-dependent attackers to execute arbitrary code via vectors related to the (1) gethostbyname or (2) gethostbyname2 function, aka "GHOST."

CVE-2015-0312
Published: 2015-01-28
Double free vulnerability in Adobe Flash Player before 13.0.0.264 and 14.x through 16.x before 16.0.0.296 on Windows and OS X and before 11.2.202.440 on Linux allows attackers to execute arbitrary code via unspecified vectors.

CVE-2015-0581
Published: 2015-01-28
The XML parser in Cisco Prime Service Catalog before 10.1 allows remote authenticated users to read arbitrary files or cause a denial of service (CPU and memory consumption) via an external entity declaration in conjunction with an entity reference, as demonstrated by reading private keys, related t...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
If youíre a security professional, youíve probably been asked many questions about the December attack on Sony. On Jan. 21 at 1pm eastern, you can join a special, one-hour Dark Reading Radio discussion devoted to the Sony hack and the issues that may arise from it.