>

Infographic of the Day: Mobile Wallets and Payments

January 11th, 2013
in econ_news, syndication

66% of Smartphone Users Do Not Password Protect Their Phone, Remaining Vulnerable to Security Threats. The weakest link in the mobile payments security chain may not be in the technology or the hardware, but rather, in the consumer.

Follow up:

Per a Boston Fed Press Release today:

Mobile Payments Solutions Found Secure; Consumer Security Adoption Concerns

66% of Smartphone Users Do Not Password Protect Their Phone, Remaining Vulnerable to Security Threats

BOSTON – The weakest link in the mobile payments security chain may not be in the technology or the hardware, but rather, in the consumer.

Mobile Phone Technology: ‘Smarter Than We Thought,’” a paper recently released by the Federal Reserve Bank of Boston, finds that the ultimate broad adoption of mobile payments will be largely correlated with the security of each mobile platform; consumer education and stakeholder collaboration will be equally crucial to promoting widespread adoption. Where consumers tend to apply the minimum protections, security providers need to anticipate problems and incorporate risk mitigation tools where feasible.

According to a recent report, almost 66% of smartphone owners do not password protect their phone.[1] Poor user security practices, such as saving log-on credentials, increase potential risk when credentials are authorized to access payment applications.

“While the efforts to secure mobile payments are ongoing, many consumers neglect to take basic precautions,” said Marianne Crowe, VP of Payment Strategies at the Federal Reserve Bank of Boston. ”Consumer education is essential to increase the adoption of mobile payments, because there are many benefits to mobile payments being done right.”

The paper examines the primary security differences between the mobile wallet vs. a digital wallet. The mobile wallet accesses payment credentials in a trusted environment known as the “secure element” within the mobile phone: an encrypted chip with keys that can only be opened through using a password through point of production to point of sale. With the secure element in place, the consumer must physically wave the phone over the terminal at the retail location in order for the transaction to be approved. The financial information on the secure element is separate from application data, meaning that phone providers have the ability to wipe out only financial information should the phone be lost or stolen.

The digital wallet stores the payment information on “the cloud,” a secure remote server. Using cellular or wi-fi service, cloud-based mobile solutions send tokens or authorizations to the smartphone to initiate and authorize the payment at the point of sale.

“Vendors are making great efforts to protect payment information behind the scenes,” said Elisa Tavilla, Payments Strategies Industry Specialist at the Federal Reserve Bank of Boston. “For example, some new cloud wallets utilize geo-location technology to locate customers using the GPS function, which further prompts the customer’s name and photo to automatically appear on the merchant terminal.”

While the culprit of mobile and digital wallet security risks may be the consumer, not the technology, payments stakeholders are still on the hook for staying ahead of threats. The paper finds that collaboration amongst stakeholders is essential to identify potential vulnerabilities, share applicable data, conduct security analysis of weak points in the mobile process, and determine who is responsible for fixing such weak points. The authors advise mobile payment stakeholders to share responsibility and work cooperatively to enhance mobile payment security and protect consumer privacy.

The report was authored by Marianne Crowe and Elisa Tavilla of the Federal Reserve Bank of Boston. It is available on the Bank’s website, (www.bostonfed.org) found at the following link: http://www.bostonfed.org/bankinfo/payment-strategies/publications/2012/mobile-phone-technology.htm

[1] “2012 Identity Fraud Identity Report: Social Media and Mobile Forming the New Fraud Frontier,” Javelin Strategy & Research, February 2012.

 

key-facts-about-mobile-payments
You will find more statistics at Statista

 









Make a Comment

Econintersect wants your comments, data and opinion on the articles posted.  As the internet is a "war zone" of trolls, hackers and spammers - Econintersect must balance its defences against ease of commenting.  We have joined with Livefyre to manage our comment streams.

To comment, just click the "Sign In" button at the top-left corner of the comment box below. You can create a commenting account using your favorite social network such as Twitter, Facebook, Google+, LinkedIn or Open ID - or open a Livefyre account using your email address.















Proud contributor to:


Finance Blogs
blog

Econintersect Website Search:

Free PageRank Checker Active Search Results Google+

This Web Page by Steven Hansen ---- Copyright 2010 - 2015 Econintersect LLC - all rights reserved