Featured Research

from universities, journals, and other organizations

Making payments via cell phones

Date:
January 2, 2010
Source:
University of Oxford
Summary:
New security technology allows people to make payments via mobile phones. The technology is designed to work in almost all situations: person to person, in a shop or restaurant, at a vending machine, online, or as part of a telephone conversation.

New security technology allows people to make payments via cell phones. The technology is designed to work in almost all situations: person to person, in a shop or restaurant, at a vending machine, online, or as part of a telephone conversation.
Credit: iStockphoto/Hillary Fox

The announcement on 16 December by the board of the UK Payments Council that cheques are to be phased out by 2018 has heightened the need for secure replacement payment systems.

New security technology developed at Oxford University by Professor Bill Roscoe and his team that allows people to make payments via mobile phones, offers a solution.

The technology is designed to work in almost all situations: person to person, in a shop or restaurant, at a vending machine, online, or as part of a telephone conversation.

Isis Innovation, the University of Oxford's technology transfer company, is working with Professor Roscoe to commercialise the technology.

'A key requirement of new payment systems will be the ability to make payments from person to person, such as paying a builder or a friend,' said Professor Roscoe of Oxford University's Computing Laboratory.

'What we have is technology which enables anyone to easily create a secure connection between two devices: it can work via Bluetooth, WiFi, the internet or across ordinary telephone or SMS connections.

'The core of our technology is a new security protocol that enables strong cryptographic keys to be created with the least possible work. The key to the protocol is that it prevents anyone from doing any searching to break into the transaction.'

The Oxford technology uses a system in which the payer checks whether a short numeric code (4-8 digits for most applications) generated within their own phone is the same as the one generated by the payee. This number is random and does not have to be kept secret. This ensures that the customer's mobile is connected to the correct store, or to the mobile of the person they wish to pay. Payment then occurs without the exchange of sensitive details such as credit card numbers or PIN.

It is expected that no hardware modifications to the phones will be needed, and the Oxford team have built demonstration systems to show a variety of uses. The payment itself could be made in a number of ways: using electronic cash or credit stored on a mobile phone, via authorisation of a credit card payment, or by instructing a bank to pay a merchant or another person a certain amount.

'The technology is designed to put the payer in charge of the connection and let him or her have direct control over how much is paid and to whom -- very much like a cheque,' said Professor Roscoe.

'It is clear that banks will be looking for innovative solutions to avoid the limitations of current technology and that the ability to pay using mobile phones in the same way that you do now using a cheque will need to be phased in over the next eight years. The beauty of this system is that it can be used for many different methods of payment.'

Consider the following scenarios:

  • Emma chooses a ticket online on her PC and pays with her phone. Her phone and the agency connect by telephony. She enters the code and confirms the payment, perhaps by entering her PIN.
  • Jim wants to make a low-value payment, say for a bus ticket. His phone makes a Bluetooth connection with the bus, and he confirms that the codes displayed on his phone and the ticket machine are equal by buying the ticket of this choice.
  • A child has run out of credit. He rings his mother, who transfers money without fuss: she has previously created a permanent key between their phones that allows her to transfer credit without the child needing to take any action.
  • Jim has just finished replacing a tap for Liz. Liz pays Jim phone to phone: they simply make contact by telephone and ensure that two codes calculated by their phones agree.

In each case the comparison of the codes makes it pointless for a "man-in-the-middle" to attempt to break the payment, particularly since the payee will transfer details such as a name, logo or photograph that is then checked by the payer and included in the electronic payment instruction that automatically goes to the bank.

The next steps are for further demonstrators of the technology to be built and for these to be taken through industry testing. Standards will need to be developed for how the protocols are to be used and how to prevent unauthorised use of the payment features on phones. Isis welcomes inquiries from commercial partners interested in being involved in further development.


Story Source:

The above story is based on materials provided by University of Oxford. Note: Materials may be edited for content and length.


Cite This Page:

University of Oxford. "Making payments via cell phones." ScienceDaily. ScienceDaily, 2 January 2010. <www.sciencedaily.com/releases/2009/12/091231165825.htm>.
University of Oxford. (2010, January 2). Making payments via cell phones. ScienceDaily. Retrieved July 29, 2014 from www.sciencedaily.com/releases/2009/12/091231165825.htm
University of Oxford. "Making payments via cell phones." ScienceDaily. www.sciencedaily.com/releases/2009/12/091231165825.htm (accessed July 29, 2014).

Share This




More Computers & Math News

Tuesday, July 29, 2014

Featured Research

from universities, journals, and other organizations


Featured Videos

from AP, Reuters, AFP, and other news services

Teen's Phone Ignites Under Her Pillow; How Real Is The Risk?

Teen's Phone Ignites Under Her Pillow; How Real Is The Risk?

Newsy (July 28, 2014) — A Texas teen's Samsung phone apparently ignited while she slept, but what was the real problem here? Video provided by Newsy
Powered by NewsLook.com
Google's Next Frontier: The Human Body

Google's Next Frontier: The Human Body

Newsy (July 27, 2014) — Google is collecting genetic and molecular information to paint a picture of the perfectly healthy human. Video provided by Newsy
Powered by NewsLook.com
Cellphone Unlocking Bill Clears U.S. House, Heads to Obama

Cellphone Unlocking Bill Clears U.S. House, Heads to Obama

Reuters - US Online Video (July 27, 2014) — Congress gets rid of pesky law that made it illegal to "unlock" mobile phones without permission, giving consumers the option to use the same phone on a competitor's wireless network. Mana Rabiee reports. Video provided by Reuters
Powered by NewsLook.com
Congress OKs Unlocking Phones From Carriers

Congress OKs Unlocking Phones From Carriers

Newsy (July 26, 2014) — A bill legalizing "unlocking," or untethering a phone from its default wireless carrier, has passed Congress and is expected to be signed into law. Video provided by Newsy
Powered by NewsLook.com

Search ScienceDaily

Number of stories in archives: 140,361

Find with keyword(s):
 
Enter a keyword or phrase to search ScienceDaily for related topics and research stories.

Save/Print:
Share:  

Breaking News:
from the past week

In Other News

... from NewsDaily.com

Science News

Health News

Environment News

Technology News



Save/Print:
Share:  

Free Subscriptions


Get the latest science news with ScienceDaily's free email newsletters, updated daily and weekly. Or view hourly updated newsfeeds in your RSS reader:

Get Social & Mobile


Keep up to date with the latest news from ScienceDaily via social networks and mobile apps:

Have Feedback?


Tell us what you think of ScienceDaily -- we welcome both positive and negative comments. Have any problems using the site? Questions?
Mobile iPhone Android Web
Follow Facebook Twitter Google+
Subscribe RSS Feeds Email Newsletters
Latest Headlines Health & Medicine Mind & Brain Space & Time Matter & Energy Computers & Math Plants & Animals Earth & Climate Fossils & Ruins