You are on page 1of 7

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/44268441

Payments and banking with mobile personal devices

Article  in  Communications of the ACM · May 2003


DOI: 10.1145/769800.769801 · Source: OAI

CITATIONS READS
168 3,131

1 author:

Amir Herzberg
University of Connecticut
257 PUBLICATIONS   6,150 CITATIONS   

SEE PROFILE

Some of the authors of this publication are also working on these related projects:

Secure Inter-Domain Routing View project

Security of Cyber-Physical Systems View project

All content following this page was uploaded by Amir Herzberg on 29 May 2014.

The user has requested enhancement of the downloaded file.


B Y A M I R H E R Z B E RG

PAYMENTS AND
BANKING WITH
MOBILE PERSONAL DEVICES
MOBILE DEVICES ENABLE SECURE, CONVENIENT AUTHORIZATION OF
E-BANKING, RETAIL PAYMENT, BROKERAGE, AND
OTHER TYPES OF TRANSACTIONS.

T
he growth of mobile commerce
follows the increasingly popular
ownership and use of mobile per-
sonal, programmable communica-
tion devices, including mobile
phones and PDAs. These
devices are effective for autho-
rizing and managing payment and banking transac-
tions, offering security and convenience advantages
compared to online payment via PCs. Some of these
advantages are available in existing devices, others
require modest, inexpensive enhancements likely to be
available in new devices in the next few years. The use of
secure and convenient mobile personal devices could revo-
lutionize the payment, banking, and investment industries
worldwide. Here, I discuss some of the challenges and oppor-
tunities involved in their use for making secure payments and
authorizing banking transactions.
ILLUSTRATION BY TERRY MIURA

COMMUNICATIONS OF THE ACM May 2003/Vol. 46, No. 5 53


Security and convenience are the two main moti- rate additional mechanisms to ensure secure transac-
vations for using these devices for transactions. The tion authorization. These mechanisms help prevent
security is revolutionary. Existing means of electronic most fraud and allocate responsibility fairly for any
authorizations, including ATM transactions and remaining fraud. For users, their value far outweighs
card-not-present credit/debit card transactions, as their relatively modest cost.
well as online banking, are based
on account-holder authentica- Merchant's (Optional)
tion by the payment system. But Transaction
Provider
it can fail in multiple ways, Merchant
including through the compro-
mise of the bank’s computers Consumer
and, in online banking, of the Mobile
user’s computer, as well. Com- PIN Transaction
puters are generally vulnerable to Provider

compromise, especially the user’s


computer, which typically has
1. Identify 2. Request 3. Secure transaction
minimal security mechanisms consumer transaction
and processes. However, existing
systems do not always distinguish Figure 1. Modular
among fraud by the user, com- secure transaction Convenience is another reason people use mobile
promise of the user’s computer, architecture using
mobile personal
personal devices for transactions. Convenience can
and compromise of the bank’s devices. result from using their communication capabilities
computer. Assigning responsibil- when paying for goods and services, whether on foot or
ity for damages resulting from fraud and disputes is in cars, planes, or trains, and authorizing transactions at
therefore done through administrative and legal means remote servers of banks, brokerages, and merchants.
rather than through technical means. In most coun- A device’s user interface can also improve conve-
tries, credit card purchasing, ATM withdrawals, and nience; for example, the user can view balances and
electronically generated money transfers must be can- logs of transactions and retrieve receipts of payments.
celled if the user claims not to have authorized them It also makes it easy for a single mobile device to sup-
(and the bank cannot prove the user is cheating). port several applications, including banking, invest-
Online brokerage and banking operations are nor- ment, and retail payments, using multiple charge,
mally irreversible. Responsibility is not necessarily allo- micropayment (cash), and loyalty accounts, all sup-
cated fairly, and non-corrupted, genuinely innocent ported by a uniform user interface and consolidated
parties may find themselves responsible for damages management. To support the many possible scenarios
due to another party’s fraudulent activity or security and applications, these devices should incorporate
breach. Moreover, when using online banking and modular authorization architectures.
brokerage services, users are vulnerable to attacks on
their (insecure) computers, as are the bank’s comput- Transactions Architecture
ers. Note that using a smart card connected to the PC Figure 1 outlines a modular architecture for secure
does not ensure security, as a corrupted PC (possibly transactions using these devices. Components include
infected by a virus) may send incorrect information to at least the user, the device, and a mobile transaction
the smart card; a secure transaction device needs its provider, which may be a cellular operator, a bank, or
own I/O interface to the user [8]. The lack of a tech- a combination of operator and bank. In a payment
nical solution for preventing and resolving fraud cre- transaction, a merchant (a provider of services and/or
ates substantial risk and expense for users, merchants, goods) is also included; however, because the mer-
and operators (banks) alike. chant may work with a different transaction provider,
Mobile personal devices, usually with a built-in dis- the two providers have to be able to interoperate. The
play and keyboard, are well-positioned to provide a arrows represent long-term relationships; the broken
technical solution for reducing fraud and allowing the arrow represents a transaction-specific relationship.
fair allocation of responsibility for damages from Secure transactions consist of three independent
fraud. Some amount of security is already part of the processes:
authentication mechanism of existing cell phones as a
way to prevent call theft. Moreover, it is relatively easy Identification. The device identifies the user through
and inexpensive for device manufacturers to incorpo- physical possession (as with regular cell phones),

54 May 2003/Vol. 46, No. 5 COMMUNICATIONS OF THE ACM


E XISTING SYSTEMS DO NOT ALWAYS DISTINGUISH
AMONG FRAUD BY THE USER, COMPROMISE OF
THE USER’S COMPUTER, AND COMPROMISE OF
THE BANK’S COMPUTER.
passwords, or biometrics (such as voice recognition); provider states the public key and the algorithm. To
Authentication. The mobile provider authenticates the reduce hardware costs, designers may prefer public-key
transaction request from the device via either sub- signature algorithms (such as the Digital Signature
scriber identification (as with existing phones) or Algorithm, or DSA [7]), so most of the computations
cryptographic mechanisms (such as digital signa- are done offline, and online signing is efficient.
tures or secure protocols, like the Wireless Trans- The device displays the transaction details to the
port Layer Security Specification) [10]; and user and asks his or her consent for each transaction
Secure performance. The transaction is performed by request. The device should ensure the user is aware of
the mobile transaction provider, possibly with the the entire request, possibly by limiting the request for-
help of the merchant and/or other transaction mat; for example, payment transactions may display
provider(s) and may the amount and other
involve secure payment details (such as merchant
protocols (such as Inter- Receive: markup, sign, parms and product identifica-
net Keyed tion).
Payments/Secure Elec- no
For flexibility, the
tronic Transactions, or markup signed by trusted entity? device might allow the
iKP/SET) [1, 5]; the yes signing of markup docu-
mobile transaction Present markup(parms) to user ments using markup lan-
provider is independent guage (such as a subset of
of the communication no HTML [3]) with fixed,
protocol in the mobile User approves? well-defined rendering. As
device. For additional yes a further precaution
modularity, it may use s=Signpriv(markup, sign, parms) against misleading docu-
mobile gateway(s) to ments, the device should
support multiple com- present to the user and
munication and autho- Return s Return no! sign upon approval only
rization mechanisms. markup approved or pro-
vided by an authority or
This modular design pro- Figure 2. Secure provider trusted by the user, that is, accompanied by
transaction request by
vides inexpensive and personal mobile device. an appropriate signature (and, optionally, by the sign-
flexible support for secure er’s certificate chain); this allows secure inclusion of
transactions. identifications and certifications in textual or graphical
(trademark) form.
Transaction Request Mechanisms Validating signatures can be computationally inten-
Mobile personal devices should incorporate mecha- sive (with DSA even more than with the RSA signa-
nisms to securely authenticate transaction requests that ture-only algorithm). However, most applications
can be used by (preferably) multiple transactions and need few document templates; a single signed template
scenarios. To allocate responsibility, transaction can be used for many transactions with unsigned val-
requests should be digitally signed by the device using ues for parameters (such as date, amount, and payee)
a private key (not known to the providers) kept in the that differ from transaction to transaction; by caching
device. The user does not have to obtain a public-key the (validated) templates, the device can save on both
certificate from a trusted certificate authority; it suf- communication and computation overhead. Separat-
fices that the agreement between the user and the ing the parameters from the template also simplifies

COMMUNICATIONS OF THE ACM May 2003/Vol. 46, No. 5 55


the automated processing of signed transaction ing and mobile commerce solutions.
requests once they reach the transaction provider. The More complex payment transactions typically
device signs both the markup and the parameters; to involve at least one additional party: the merchant. In
prove the identity of the template approver, this signa- the simplest case, the merchant receives payment from
ture may also be included in the data signed by the some arbitrary, external payment/transaction provider
device (see Figure 2). (Extensions, including those for (such as a bank or credit card company); the mobile
validating the fairness of lotteries and gambling ser- transaction provider authorizes the transaction.
vices, are beyond the scope of this article.) An important payment application is using charge
The security of this design depends on the secure cards to pay remote merchants for, say, goods bought
operation of the mobile online or on the tele-
personal device, including User Device Provider Merchant Meter phone. Since the mer-
its user identification. 1. Park chant and the consumer
Some current mobile 2. Location are in separate locations,
devices, including phones, 3. Offer bwml 3. Offer html the merchant cannot
use only simple, prepro- 4. Display compare the customer’s
grammed processors, and 5. Approve signature to the signature
therefore can be trusted to 6. PayReq on the charge card. A per-
operate securely. However, 7. PayOk sonal mobile device (such
some devices support as a cell phone) is an alter-
downloaded, general-pur- 9. Receipt bwml 8. Receipt html 8'. Receipt native means of validating
mac
pose applications and may, 10. Display the customer’s consent to
11. Receipt mac
like computers, be vulner- the transaction via
able, as with viruses. authenticated communi-
Secure transaction Figure 3. Example of cation with the mobile transaction provider. The
authorization may, there- location-based payments communication may be initiated by the consumer
using a mobile device.
fore, involve a secure co- using the mobile device or by the merchant commu-
processor, used only to authorize transactions (and nicating with mobile transaction providers; for exam-
possibly to view confidential data). There should be ple, in the PayBox system, a merchant (such as a Web
visible indication when the display and keyboard are site) contacts PayBox, which operates as a mobile
controlled (only) by the secure co-processor, allowing transaction provider, and PayBox then contacts the
the user to securely identify (such as by password) and cell phone of the consumer, relying on subscriber
authorize transactions. The co-processor is invoked by identification to trust the reply (approving or reject-
the main processor to authorize transactions, provid- ing payment). Payment is not guaranteed, since the
ing the raw request in shared memory; if authorized, consumer may dispute the identification. By using
the co-processor returns the signed transaction request secure signature from the consumer’s device, instead
in the shared memory. of subscriber identification, the payment provider or
external arbiter can allocate responsibility for fraud, as
Applications and Scenarios well as resolve disputes and guarantee payment.
The modular secure transaction architecture using In some scenarios, mobile devices play an addi-
mobile personal devices in Figure 1 can be used for tional role beyond authorizing the transaction.
multiple applications and scenarios. The simplest Devices used for browsing the Web represent a natural
involves only the user, the device, and a single transac- means for paying for goods and services bought
tions provider (such as a bank, brokerage, or insurance through merchants’ Web sites. Similarly, mobile
company). The user identifies to the mobile device, devices can initiate location-dependent payments. Fig-
possibly through secure identification mechanisms ure 3 outlines how a mobile device can be used to pay
(such as a PIN, voice identification, or fingerprint); a parking meter. Imagine the user instructs the device
the device then authorizes a transaction to the provider to contact the parking merchant (flow 1). The device
(such as money transfers and investments). Authoriza- then sends its location via the provider to the mer-
tion is preferably through some secure public-key sig- chant, initiating the parking transaction (flow 2). The
nature process, allowing precise allocation of merchant returns the offer; the provider often converts
responsibility for fraud (disputed transactions). How- (transcodes) from, say, HTML to binary Wireless
ever, less secure forms of authorization (such as relying Markup Language (WML) the offer to fit the particu-
on subscriber identification and/or encrypted pass- lar mobile device. The offer may contain details rele-
words) may suffice for some applications, as in e-bank- vant to the purchase (such as the “per-fee link syntax”

56 May 2003/Vol. 46, No. 5 COMMUNICATIONS OF THE ACM


in HTML [6]). The provider also creates markup to of payment the consumer presents to a third party or
display the offer to the user and secure the user’s autho- device. Applications include:
rization of the transaction request; for the sake of effi-
ciency, this step may be combined with the conversion • Presenting the e-receipt to a validating/dispensing
(transcoding) process. device to prove payment and receive service or mer-
Using a mobile device with a mechanism for secure chandise; the validation device (such as the parking
transaction requests, the provider sends the offer (flow meter in Figure 3) need not communicate directly
3) in signed markup. The device (usually using its with the payment transaction provider or merchant’s
secure co-processor) displays the offer to the user, server, so long as it is able to validate the e-receipt;
receives approval, and returns (flow 6) a signed trans- • Presenting the e-receipt to a third party (such as the
action request, as in Figure 2. Internal Revenue Service for tax purposes or an
Employing mobile devices (such as phones) without employer for expense reimbursement);
mechanisms for secure transaction requests, the autho- • Providing “proof of purchase” for warranty service,
rization function has to rely on the security of the com- returns, exchanges, and rebates; and
munication between the device and the provider. The • Using the e-receipt as an e-ticket, the mobile device
provider incorporates the offer details (such as holds the receipt (the ticket), presenting it upon
amount) into the display markup sent to the device inspection at, say, an airport for claiming tickets.
and shown to the user; if the user’s response, sent to the
provider, is positive (say the user clicks on the link In each of these applications, except the first, the
identifying the product and price), the provider views e-receipt should be a digital signature from the pay-
it as transaction authorization. This process requires ment transaction provider or the merchant, thus allow-
the provider to link between the offer sent to the ing validation at arbitrary times by any party.
mobile device (flow 3) and the payment transaction
request received from the mobile device (flow 6). To Payments via Mobile Transaction Provider
avoid maintaining state in the provider, the payment The mobile transaction provider may also be involved
request may contain the state information, possibly in in the actual payment to the merchant. (Charging by
a cookie or as parameters of the URL. To prevent mobile operators for communication and value-added
forgery or replay, the state includes a Message Authen- services is a special case.) In today’s mobile phones,
tication Code (MAC) using a key known only to the authorization is via subscriber identification mecha-
provider and computed over the state and time. nisms, which do not provide non-repudiation. How-
Upon receiving an authenticated payment transac- ever, in the future, mobile consumers might also use a
tion request (flow 6), the provider confirms payment secure mobile signing device, as in Figure 2, to avoid
to the merchant (flow 7) by sending a signed or disputes. This device may allow high-value transac-
authenticated message. The merchant sends a receipt tions, as well as paying mobile operators who are not
confirming payment was received; if the meter is con- completely trusted (such as when roaming). Mobile
nected to the merchant’s server, it may be sent directly communication mechanisms (such as the Global Sys-
to the meter (flow 8’). More often, the meter has min- tem for Mobile communication, or GSM) allow the
imal communication capabilities (such as infra-red), foreign (visited) network to authenticate the user with
and the receipt is sent via the provider and device information from the home network. Charging
(flows 8, 9, 11); the user may even have to manually requires prior agreements between the visited and the
type the receipt into the meter using a keypad. The home networks. Designers of the Universal Mobile
receipt may have multiple formats as well; the parking Telecommunications System (UMTS) recognized the
meter itself may use a concise receipt format for effi- difficulty of establishing agreements in advance among
cient communication and processing. Moreover, to visited networks and all home networks [4]; thus,
allow a low-cost parking meter with limited computa- UMTS includes mechanisms for dynamic negotiation
tional resources to validate the receipt, the receipt sentand setup of roaming agreements between a visited
to the meter (flow 11 or 8’) uses an efficient MAC network and a home network [4]. Roaming agree-
with a shared key between the meter and the mer- ments seek to establish fees and ensure operator trust-
chant’s server. worthiness. Operators are trusted to deliver payments
in time; foreign (remote) operators are also trusted to
Electronic Receipts and Tickets not overcharge visiting customers.
Additional applications involving this modular trans- A secure signing mobile device can prevent fraud
action architecture, as in Figure 1, can also provide and (overcharging) by foreign network providers, thereby
use secure electronic receipts, or e-receipts, or a proof allowing more automated and variable roaming agree-

COMMUNICATIONS OF THE ACM May 2003/Vol. 46, No. 5 57


ments. Operators can also use the Final Payments pro- of payment protocols, ranging from the complex (such
tocol discussed in [2] to extend pairwise trust relation- as iKP/SET) to the simple (such as SSL/TLS trans-
ships into global trust relationships, allowing mission of credit card numbers). The mobile provider
automated, secure, low-cost universal roaming. may securely inform the credit-card-issuing bank of
Other payment scenarios involve mobile transac- any pending transaction, allowing the issuer to reject
tion providers participating in the payment transac- fraudulent transactions; a one-time or limited (to pay-
tion itself, not just in its authorization. One ments via mobile provider) card number may be used
motivation is to establish new payment networks, pos- for added security.
sibly involving mobile operators and financial institu-
tions as providers of mobile payment services. Conclusion
Motivations for establishing new payment networks Mobile personal devices are beginning to be used to per-
include the exploitation of business opportunities form secure banking, payment, and other transactions.
inherent in the billing, customer-service, and technical Cell phones, PDAs, and other mobile personal devices
relationships among mobile users (and devices) and are a convenient means for authorizing transactions. In
mobile operators. Another is support for low-value the future, they are likely to incorporate low-cost
payments (micropayments) and final (irreversible) enhancements providing secure, signed transaction
payments, each possibly yielding additional mobile requests, providing third-party verifiable proof of the
communication services. Micropayments and final consumer’s agreement to each transaction. This support
payments using mobile devices may enable the pur- will be flexible enough to support multiple applications,
chase of content and services delivered via the net- scenarios, and providers. New payment networks are
work, as well as person-to-person payments and likely to take advantage of the new capabilities, offering
money transfers; the latter represents a substantial such services as micropayments and final payments pre-
opportunity, especially in light of the millions of over- viously impossible or impractical. Mobile personal
seas employees worldwide. Moreover, due to their abil- devices will play an increasingly important role in pay-
ity to allocate responsibility for fraud, these new ments, banking, investing, and other transaction-based
payment networks may lower the cost of transactions and security-sensitive applications. c
(as a percentage of the transaction) for large-value
payments and money transfers. References
A major challenge for any new payment system is 1. Bellare, M., Garay, J., Hauser, R., Herzberg, A., Krawczyk, H., Steiner,
M., Van Herrenweghen, E., and Waidner, M. Design, implementation,
how to achieve a critical mass of merchants, buyers, and deployment of the iKP Secure Electronic Payment System. J. Select.
and transactions needed to justify investment by each Areas Commun. 18, 4 (Apr. 2000), 611–627.
2. Herzberg, A. Micropayments. In Advances in Payment Technology for E-
of them and ensure a proper level of acceptability; for commerce. Weidong Kou, Ed. Springer-Verlag (LNCS series), 2003.
example, a customer of any mobile provider should be 3. Herzberg, A. and Naor, D. Surf‘N’Sign: Client signatures on Web docu-
able to buy from any merchant that maintains ments. IBM Syst. J. 37, 1 (Jan. 1998), 61–71.
4. Horn, G. and Preneel, B. Authentication and payment in future mobile
accounts with most payment transaction providers. systems. In Proceedings of the European Symposium on Research in Com-
One solution for payment transaction providers is to puter Security (ESORICS’98) Lecture Notes in Computer Science (Louvain-
la-Neuve, Belgium, Sept. 6–8). Springer Verlag, 1998, 277–293.
use the Final Payments protocol, allowing interoper- 5. MacGregor, R., Ezvan, C, and Liquori, L., Eds. Secure Electronic Trans-
ability among any provider connected by the transitive actions: Credit Card Payment on the Web in Theory and Practice. SG24-
closure of all pairwise, provider-to-provider trust and 4978-00 Redbook, IBM, International Technical Support Organization,
Raleigh, NC, July 2, 1997; see www.redbooks.ibm.com/.
interoperability agreements. For instance, interoper- 6. Michel, T., Ed. Common Markup for Micropayment Per-Fee Links. W3C
ability among mobile payment providers is a feature Working Draft, Aug. 25, 1999; see www.w3.org/TR/Micropayment-
Markup.
cited by Fundamo, Inc. (www.fundamo.com) in its 7. National Institute of Standards and Technology (NIST). Digital Signature
payment systems product. Standard (DSS). Federal Information Processing Standards Publication
In other cases, the mobile transaction provider is FIPS 186. U.S. Department of Commerce, Washington, DC, May 1994.
8. Pfitzmann, A., Pfitzmann, B., Schunter, M., and Waidner, M. Trustwor-
part of an existing payment network, as in a credit card thy user devices. In Multilateral Security in Communications, G. Muller
network. The involvement of the mobile provider in a and K. Rannenberg, Eds. Addison-Wesley, 1999, 137–156.
credit card transaction could be as simple as transmis- 9. Rescorla, E. SSL and TLS: Designing and Building Secure Systems. Addi-
son-Wesley, 2000.
sion via the Secure Sockets Layer/Transport Layer 10. The WAP Forum. WAP-199, Wireless Transport Layer Security Specifica-
Security (SSL/TLS) protocol of credit card details or as tion; see WAP-199-WTLS-20000218-a.pdf.
complex as a purchase via the iKP/SET protocols [1,
5]. In either case, the mobile provider acts on behalf of Amir Herzberg (amir@herzberg.name) is an associate professor in
the Computer Science Department at Bar-Ilan University, Ramat Gan,
the user as a wallet server, as it is located along the Israel.
route between mobile device and merchant. The
mobile transaction provider may implement a variety © 2003 ACM 0002-0782/03/0500 $5.00

58 May 2003/Vol. 46, No. 5 COMMUNICATIONS OF THE ACM

View publication stats

You might also like