Question

Review the following scenario found in the Hands-On Project 9-3 on page 498 of the textbook:...

  1. Review the following scenario found in the Hands-On Project 9-3 on page 498 of the textbook:

iPhone and Android phones both offer some kind of mobile payment service, which allows you to use your smartphone to pay for merchandise or services at a retail checkout counter. iPhone has Apple Pay, and Android uses Google Pay. Mobile payment services rely on NFC (Near Field Communication) technology to exchange financial information between your phone and the reader at the checkout counter. You might want to pay with a credit card stored on your phone or get discounts with a store rewards account reported by your phone as you check out. But how secure is your sensitive financial information?

  1. Answer the following questions:
    • Research how mobile payment systems use NFC technology. How does NFC work? How can you activate NFC on an Android phone for making a payment with Google Pay? On an iPhone for making a payment with Apple Pay?
    • Find and read some articles online or watch videos that describe the details of storing financial information for mobile payment systems, accessing the information when needed, and transmitting the information securely. What security measures are in place? Where is the data actually stored? What information is actually transmitted at the point of transaction?
    • List three third-party mobile payment apps available either in Apple’s App Store or in Google’s Play Store. On which mobile OS versions will the apps work? What are advantages and disadvantages of each app? How much do the apps cost? What security measures do the apps use?
    • If you were to purchase one of these apps, which one would it be? Why?
0 0
Add a comment Improve this question Transcribed image text
Answer #1

How mobile payment system use NFC technology

The mobile payment system allowed the user to have pleasure of go-contactless payment. That was an initiative step from go-cashless. To understand this terminology lets have an example. You have an iPhone and the Apple Pay application. You save your credit card details onto your phone, and the application stores it . Later when you have to make a payment in a shop where the mobile payment readers are at register. Instead of using the credit card wallet you will use the Apple Pay application. There is a protocol which allows the transaction between the mobile and the Point-of-sale device when they are in a recognizable range. Some examples of NFC mobile payments are Apple Pay,Google Pay,Samsung Pay ,etc. The public transport card readers and touch payment terminals are daily life examples of NFC technology.

How does NFC work

NFC stands for Near Field Communication . NFC allows two nearby devices to communicate with each other when they are in close . It works on the principle of sending information with the use of radio waves.The older RFID technology serves as a base for NFC. In RFID electromagnetic induction was used to transmit information .

NFC uses a transmission frequency of 13.56 MHz. for data communication. The devices don't need to have physical contact. Just by hovering the smart phone or taping on it the communication can be made.The range of 2 inches or less is also needed . Within the specified frequency the NFC enabled reader and the smart phone will pass encrypted information to each other for the completion of the process.

NFC works in 3 modes peer to peer, read/write and card emulation.

How can you activate NFC on an Android phone for making a payment with Google Pay?

Download the Google Pay application.Give your phone number and sign in using your Google account.

Give the bank account details. Google may send a verification SMS with your permission. Enter the UPI PIN .

Send money to the person by finding them using name or phone number ,etc..

To activate NFC go to Settings , in Wireless and Network go to More . There we can find NFC option which can be activated. For this the O.S should be Kitkat 4.4 or higher.

On an iPhone for making a payment with Apple Pay?

Apple allows the NFC tags to be read and there is no native method yet. The iOS 11 allows iPhone7,8, and X to read the NFC tags. In the case of iPhone 6 and 6S , they can be used for NFC payments but can't read the tags.

What security measures are in place?

NFC payment protect financial data.

1. Proximity Protection ; since the devices will be closer while a transaction is taking place and NFC payments are really faster any other person won't be able to get the financial data

2.User Initiative            ; the user has to initiate the process. That's without user's permission transaction won't happen. In some application user is verified through finger print

3.Secured validation   ;the secure chip in the device/card ensure the security in transmitting data with digital signature

Add a comment
Know the answer?
Add Answer to:
Review the following scenario found in the Hands-On Project 9-3 on page 498 of the textbook:...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Read the case study "Google, Apple, and Facebook Struggle for Your Internet Experience" on page 255....

    Read the case study "Google, Apple, and Facebook Struggle for Your Internet Experience" on page 255. Then discuss the advantages and disadvantages for each company. BUSINESS PROBLEM-SOLVING CASE Google, Apple, and Facebook Battle for Your Internet Experience Apple has a legacy of innovation on its side. In Three Internet titans Google, Apple, and 2011, it unveiled the potentially market disrupting Facebook are in an epic struggle to dominate your Siri (Speech Interpretation and Recognition Internet experience, and caught in the...

  • Provide a short summary of the article (200-400 words) that includes/addresses the following: Why you selected...

    Provide a short summary of the article (200-400 words) that includes/addresses the following: Why you selected this article. Describe at least two things you learned from the article including how they add to your knowledge of Global Information Technology. iPhone 11 Article The iPhone 11 and iPhone 11 Pro will contain an Apple-designed chip called the U1. The U1 chip enables ultra-wideband (UWB) positioning, which means it’s designed to pinpoint the locations of nearby objects. Ultra-wideband used to be called...

  • Case Study 1: Apple Merging Technology, Business, and Entertainment Why are data, information, business intelligence, and...

    Case Study 1: Apple Merging Technology, Business, and Entertainment Why are data, information, business intelligence, and knowledge important to Apple? Give an example of each type in relation to the iPad. (1 Mark) Explain how Apple achieved business success through the use of information, information technology, and people. (1 Mark) Evaluate how Apple can gain business intelligence through the implementation of a customer relationship management system. (1 Mark) Case Study 1: Apple Merging Technology, Business, and Entertainment This might sound...

  • Square is a little device that magically transforms a smartphone into a credit/debit card machine. It’s...

    Square is a little device that magically transforms a smartphone into a credit/debit card machine. It’s changing the game for electronic payments and the way we traditionally send and receive money. Square allows you to buy, sell, and send money by using any Apple or Android mobile device. With three free mobile apps—Square Register, Square Wallet, and Square Cash—Square is designed to help small businesses and sole proprietorships accept credit card payments and help consumers transition to a cashless lifestyle....

  • CASE 8 Unlocking the Secrets of the Apple iPhone in the Name of access the male...

    CASE 8 Unlocking the Secrets of the Apple iPhone in the Name of access the male San Bernardino suspect's iPhone 5c. Cook stated: Antiterrorism We are challenging the FBI's demands with the deepes respect for American democracy and a love of our country. We believe it would be in the best interest of everyone to step back and consider the implications While we believe the FBI's intentions are good, if would be wrong for the w e nt to force...

  • Make notes about the article, such as it's main points, ideas and details that are difficult...

    Make notes about the article, such as it's main points, ideas and details that are difficult to understand, and details that you grasp and would like to know more about. Five years ago, Research in Motion, maker of the BlackBerry, was one of the most acclaimed technology companies in the world. The BlackBerry dominated the smartphone market, was a staple of the business world, and had helped make texting a mainstream practice. Terrifically profitable, the phone became a cultural touchstone—in...

  • Chapter 3 Information Systems, Organizations, and Strategy 103 INTERACTIVE SESSION: TECHNOLOGY IS...

    Chapter 3 Information Systems, Organizations, and Strategy 103 INTERACTIVE SESSION: TECHNOLOGY IS THE IPAD A DISRUPTIVE TECHNOLOGY? Tablet computers have come and gone several timesdistribution. Amazon has committed itself to offering before, but the iPad looks like it will be different It the lowest possible prices, but Apple has appealed has a gorgeous 10-inch color display, a persistent Wi publishers by announcing its intention to offer a Fi Internet connection, potential use of high-speed tiered pricing system, giving publishers the...

  • How does this article relate to the factors of productions in economics? From Music to Maps,...

    How does this article relate to the factors of productions in economics? From Music to Maps, How Apple’s iPhone Changed Business Ten years ago, hailing a cab meant waiving one's arm at passing traffic, consumers routinely purchased cameras, and a phone was something people made calls on. The iPhone, released a decade ago this month, changed all of that and more, sparking a business transformation as sweeping as the one triggered by the personal computer in the 1980s. Apple Inc.'s...

  • The world’s 3 billion-plus smartphones emit the kind of data that health authorities covet during outbreaks....

    The world’s 3 billion-plus smartphones emit the kind of data that health authorities covet during outbreaks. They show where individuals are, where they’ve been and who they might have talked to or even touched — potentially offering maps to find infected people and clues to stopping new ones. But gaining access to this data, even amid a global pandemic, is made complex by the legal and ethical issues surrounding government access to information that can reveal intimate details about citizens’...

  • In mid-2017, the once high-flying BlackBerry stock was trad¬ing for less than $7 a share, a...

    In mid-2017, the once high-flying BlackBerry stock was trad¬ing for less than $7 a share, a drop of more than 94 percent from $139 in 2008. The competi¬tive landscape had shifted in recent years, and BlackBerry lost its strong position in the mobile phone market. BlackBerry’s stock peaked at $230.52 in July of 2007 as celebrities and politicians all adopted the addictive phone design nicknamed “CrackBerry.” However, consumer needs and wants shifted in the following years, and BlackBerry lost its...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT