Anda di halaman 1dari 7

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/286591937

M-Payment systems: Technologies and business models

Conference Paper · November 2014


DOI: 10.1109/EMTC.2014.6996626

CITATIONS READS

3 946

2 authors, including:

Alessandro Vizzarri
University of Rome Tor Vergata
14 PUBLICATIONS   42 CITATIONS   

SEE PROFILE

Some of the authors of this publication are also working on these related projects:

QoS-QoE estimation for 4G-5G wireless networks View project

All content following this page was uploaded by Alessandro Vizzarri on 13 August 2016.

The user has requested enhancement of the downloaded file.


m-Payment Systems:
technologies and business models
Alessandro Vizzarri Francesco Vatalaro
Department of Enterprise Engineering Department of Enterprise Engineering
University of Rome Tor Vergata University of Rome Tor Vergata
Rome, Italy Rome, Italy
alessandro.vizzarri@uniroma2.it vatalaro@uniroma2.it

Abstract — In only a few ten years payment systems have debit card issuing company and/or other institutions operating
undergone an incredible evolution passing from a physical inside Internet (e.g., Paypal).
transfer of cash to transactions exchanging money as digital data. Severe security requirements must be imposed, in order to
Mobile Payment (m-payment) refers to one type of electronic ensure trust and avoid frauds, as well as interoperability and
payment, performed through mobile devices, such as mobile
privacy requirements. In addition, in this m-payment
phones, smartphones, and tablets. To ensure trust and avoid
frauds severe security requirements must be imposed. In environment speed of execution and ease-of-use are
addition, interoperability and privacy requirements, as well as mandatory requirements, too.
speed of execution and ease-of-use are mandatory requirements, In the context of new payment systems, mobile payment is
too. Several technical solutions have been proposed, associated to still one essentially unsolved challenge. Several technical
generally incompatible business models. From the end-users solutions have been proposed, more or less tightened to
point of view, the result of a m-payment transaction is just one various incompatible business models still competing among
transfer of money from customer to merchant. However, to get them. However, no one of this multitude of combined
this simple result, m-payments use a plethora of sophisticated technical-business solutions emerged on the market as the
technologies, including SMS, NFC, high-frequency sound waves,
winning choice, yet.
software apps. The heterogeneity of m-payment systems and
economic models is an important challenge for their diffusion in 1.1 Taxonomy
the next years. Having described the main requirements, From the end-users point of view (i.e. buyer and seller), the
technical characteristics and different business models of result of a Mobile Payment transaction is simply one transfer
m-payment, this paper underlines relationship of technological of money between the customer and the merchant, i.e. it is
and business approach to m-payment systems. very similar to the traditional payment. However, to get this
simple result, Mobile Payments use one or more sophisticated
Keywords: Mobile payment, NFC, Business models, Secure technologies, including SMS, Near Field Communication
Element, Virtual money. m-payment platforms. (NFC), Interactive Voice Response (IVR), Unstructured
Supplementary Service Data (USSD), Drop Call, Software
1. Introduction Development Kit (SDK) libraries, WAP protocols, i-mode
Payment systems have undergone an incredible evolution, in protocols, Wi-Fi, and JAVA applications. While the systems
only a few ten years, passing from a physical transfer of cash that provide the possibility to carry out m-payments are
for goods or services to transactions exchanging money as expanding, one main goal of many operators is to make these
digital data. Electronic Payment (e-payment) refers to any type forms of payment systems natural and intuitive for a daily use.
of electronic transaction, operated under financial regulation, We can provide a simple taxonomy for mobile payments
involving funds transfer from a buyer to a seller of goods or (Fig. 1).
services, completed through the Internet, or, more generally,
over an electronic network. More, specifically, the term
Mobile Payment (m-payment) refers to one type of e-payment,
performed through mobile device(s) (such as mobile phones,
smartphones, pads, tablets, etc.) for payments or money
transfers.
In modern m-payment systems the number of involved players
is increasing. In fact, from the traditional “buyer-seller”
exchange we passed already to more complex transaction
models, including also network providers, finance companies
for money transactions management, generally a credit card or
Fig. 1: Taxonomy of Mobile Payments.
M-payments can be divided into three main groups: Mobile phones with integrated NFC device include an element
• Pay online: the user can pay for one good or service via of security hardware, called Secure Element (SE). Currently
the Internet; the SE consists of a form chip placed inside the smartphone,
• Pay in store: the user can pay via mobile terminal for one but the goal is to integrate it in the future in the SIM-card user.
good or service while in the store; The SE can accept new software only from a TSM (Trusted
• Money transfer: the user can pay for a good or service, or Services Manager) who possesses the private key to
deliver a sum, using this modality to exchange e-money. authenticate itself to the SE. [15]
The pay online modality can manifest itself as: To use the system off-line payment via NFC, the user must
• E-commerce, using all kind of electronic devices except install on their mobile phone software consists of two parts: a
portable ones (mobile phone, smartphone,…); midlet, which is managed by the operating system for your
• M-commerce, using mobile phone or smartphone, it may phone, and an applet, which is instead handled by the SE. The
have two operating modalities: protocol makes use of a public key infrastructure, PKI (Public
o Mobile web, using the HTTP protocol the user can Key Infrastructure), based on the X.509 standard to create
browse the Internet page of merchant, OTT (over- secure channels for both payments by voucher, the voucher is
the-top) or financial institution; to exchange between two users. The PKI allows the
o Mob Apps, the user can use pre-installed software verification of the signature and the original voucher in order
apps to choose goods or services, and then proceed to prevent the creation of fake vouchers. The protocol makes
with purchases or other economic transactions. use of a one-way hash algorithm, in particular the algorithm
The rest of this paper is organized as follows. In Section 2 we called Secure Hash Algorithm-1 (SHA-1), which produces as
introduce m-payment system terminal architecture, some main output a message digest (digest) of the fixed length of 160
system characteristics, and classification of services. In bits. This protocol supports the use of asymmetric
Section 3, first we introduce the main procedures for mobile cryptographic algorithm RSA (Rivest-Shamir-Adleman)
payments, then we deal with m-payment business models and algorithm and symmetric-key triple DES, 3DES (Triple Data
discuss drivers, as well as some main delaying effects. Having Encryption Standard). [16]
realized that fragmentation of systems and business models Since applications for off-line payment not involve the use of
are one main reason for the delay, in Section 4 we propose a a central server capable of tracking and verification of
concept for an m-payments Management Entity. Finally, transactions, their development requires particular attention to
Section 5 provides our main conclusions. the safety of data transferred, mainly to protect them from the
1.2 Classification risk of counterfeiting or unauthorized copying of digital
The main criteria for classifying systems of mobile payment vouchers. In this regard, it is designed a series of message
cover the following aspects: exchanges between the parties involved.
• type of involvement of the mobile operator, MNO (Mobile Payments in on-line mode, by contrast, involve connecting
Network Operator), which can be on-line or off-line; devices payer and paid with other entities, first of all the
mobile radio operator and the companies that authorize the
• distance of the mobile terminal which can be used to pay
transaction in cash, and then check the status of the payment
remotely or in the vicinity;
process . Compared to an off-line system, a payment system in
• amount of the transaction between the buyer and the seller;
online mode frees the user from the need to have in your cell
• credit management via software or via hardware.
phone a credit to be used for payments, since it can be
On line/off line payments accessed via the web bank account and use the phone as if it
Payments in off-line mode do not rely on a third party during
were a real credit card. In the following we will describe two
the transaction between buyer and seller and the exchange of
protocols for mobile payments in on-line mode.
data takes place directly between the devices and the payer
Remote / proximity payments
paid. This avoids the need to connect the device to the payer
The mobile payments from remote, RMP (Remote Mobile
and the amount paid to other entities, thus simplifying the
Payment), include the payments made through a mobile
management of security and encryption procedures. On the
device, in which the distance between the terminals is
other hand, this method requires that the payer's mobile phone
irrelevant, but which need to rule the connection with the
contains an electronic purse (electronic wallet) to be loaded in
mobile operator. These types of payments are based on the use
advance to be able to execute the transaction.
of the web browser or SMS. A practical example of the RMP
Usage of off-line transactions is made of a suitable protocol
is the purchase by a user of a software application (App) for
that involves the use of digital coupons (digital voucher) and
your smartphone. These payments remotely can be
cryptographic methods. The Protocol establishes the rules for
implemented using the existing infrastructure for payments
the secure exchange of information between two devices
using payment systems or closed-loop (ie, internal systems of
necessary for a transaction of money in off-line mode based
mobile payment companies created by the same vendor) in
on voucher allows you to manage two different situations:
which the buyer and seller create an account with a third party
• payment for the purchase of property by bringing the phone
or with a MPSP (Mobile Payment Service Provider). [17]
to a reader enabled;
The proximity mobile payments, PMP (Proximity Mobile
• transfer of money from one user to another, bringing the
Payment) instead involve the entire infrastructure of the
phone to that of the payer paid.
payment industry. A mobile phone equipped with NFC uses Therefore, the SE is a crucial system component due to the
for the payment process a specific app provided by the extreme importance of information stored inside it, such as,
financial institution of the buyer, which can exploit or not the e.g., the login credentials, credit card numbers, the
operator's data connection. Apps and related account transactions identification number. The SE is tamper-resistant
information necessary for the payment are encrypted and and is composed of sub-modules: Integrated Circuit on UICC
loaded inside a secure area of the phone. The phone uses the (Universal Integrated Circuit Card), Operating System (OS)
NFC technology which is fitted to communicate with the POS and application to store and manage user data, transactions,
(Point Of Sale) of the seller. The process of payment and the and operations.
balance paid by the buyer are the same as those of a payment Additional HW components useful to manage payments are
made through a traditional credit card or debit card. vocal synthesizer and recognizer, biometric devices and
Amount of transaction sensors, while other SW components are built in dedicated
Mobile Payment Systems can also be classified according to applications and widgets. The payment circuit module is in
the amount of the transaction. In fact, depending on the charge of connecting with financial institutes to accomplish
amount of the sum exchanged electronically between customer bank transfers, and transactions with credit/debit cards.
and merchant, we can identify pico payments, micro payments 2.2 Main characteristics
and finally macro payments, as summarized in Table 1. [18] A mobile payment system must fulfill important requirements,
such as:
Transaction amount [€] • simplicity and usability: effectiveness, efficiency and user
Payment type satisfaction in the execution of the transaction must be
From To
Pico payments Few cents 1 ensured;
Micro payments 1 30 • universality: any type of transactions must be allowed
Macro payments 30 Thousand between users, such as Consumer-to-Consumer, Business-
to-Consumer, and Business-to-Business, and they must
Fig. 3: classification of payments by transaction amount apply on all micro-payments and macro-payments;
• interoperability: system components must be based on
Credit management via SW/HD open standards and technologies, to allow transparent
Payment systems in mobility via software (software-based) interaction between multiple different systems;
require the use of tools generated digitally (such as bitcoin), • security, privacy and trust: the Mobile Payment provider
while those in hardware (hardware-based), also commonly must ensure high levels of data protection;
called card-based systems, are based on 'use of credit • cost: the benefit/cost ratio for the use of the mobile
preloaded on plastic card with a magnetic strip, both debit and payment system must be higher than, or at least equal to,
credit. traditional payment systems;
• speed: the operations necessary for carrying on one
2. Mobile Payment Systems mobile payment do not require time perceptibly higher
2.1 Terminal architecture than that needed for traditional payment systems.
The general architecture of an m-payment system is composed Main benefits allowed by the adoption of a mobile payment
of four modules, as shown in Fig. 2 (a): a data transfer system should be:
module, one Security Element (SE), HW/SW components, • reduction of frauds: Mobile Payment systems (especially
and, finally, the payment circuit SW module. The data transfer those based on a microchip module) can bring benefits in
module is in charge of managing connections among terminal terms of security through the use of encryption carried on
devices in order to enable transactions. It can provide at several levels, such as the combination of double
proximity or on-line connections, using different technologies. password. By doing so, control of user credentials can be
The Secure Element (Fig. 2 (b)) is a platform in which to combined with other control information provided by the
store, customize and manage customer’s confidential data. Mobile Network Operator (MNO);
• reduction of costs: although the transition to the new
Mobile Payment context generally involves start-up costs,
over time it may reduce recurring costs, such as those
related to the physical realization of the payment cards, as
well as service management and maintenance (think also
of the reduction of costs related to frauds);
• flexibility of access to data: adoption of security
techniques, combined with the processing capabilities of
devices and networks, allows users to enable or disable
(a) (b) certain services in real-time; therefore, data protection can
Fig. 2: (a) Modules of a Mobile Payment system; (b) Alternative
be ensured allowing access only to authorized entities and
implementations of the Secure Element. only for the time necessary to perform a certain service;
• speed and efficiency: m-payment systems allow a greater 0) contractual agreement between the consumer and the
ease of use, in addition to shortening the purchase time. payment service provider;
2.3 Classification 1) at the time of purchase, consumer’s request to the
Two main criteria adopted to classify Mobile Payment merchant to pay with one mobile device (proximity mode
systems are based on: a) offline or online payments; b) remote or remote mode);
or proximity payments. 2) transit of the request from merchant to service provider;
a) Offline or online payments 3) authorization request of the service provider by a third-
In off-line payments the transaction between buyer and seller party trustee;
is direct, so data exchange exclusively takes place between 4) communication to the merchant of the consent received
their respective devices. Thus it is unnecessary to involve (the m-payment transaction is now activated);
third-party entities, and management of security and 5) service provision or goods supply – the subject of the
encryption procedures are local and simple. However, this
transaction – is effected from merchant to consumer;
method requires that the buyer’s device contain an electronic
6) communication to the consumer from the relevant third-
wallet which needs to be charged in advance before executing
party of transaction ready to be completed on the account;
any transaction. A proper protocol for off-line transactions
involves the use of “digital vouchers” and strong 7) consumer’s authorization to the third party (e.g., insertion
cryptographic methods. It establishes the rules for the secure of confirmation with PIN);
exchange of information between the pair of devices involved 8) remuneration fees for the service received from the
in the payment. payment service provider, shared between the service
On-line payments need the involvement of third-party entities, provider, third-party involved and merchant (if any).
such as MNO and companies that first authorize the money
transaction and then check the status of the whole payment
procedure. In contrast to off-line payments, in an on-line
payment the user does not need a pre-charged credit stored
into the phone, since she can directly access her bank account
via web and can functionally use the phone as a credit card.
b) Remote or proximity mobile payments
Remote Mobile Payments (RMPs) include those made via one
mobile device when the distance between seller and buyer
devices is immaterial for the transaction. As a consequence,
for such payments the MNO provides a data connection via
web browser or SMS. RMPs can be implemented using an
existing infrastructure for payments or using a closed-loop
payment system (i.e. an internal mobile payment system Fig.3: Mobile Payment system workflow.
created ad hoc by the same vendor) in which buyer and seller A payment service provider is the subject involved in
create an account with a trusted third-party or with a Mobile processing the fee. This can be done by a bank institution, an
Payment Service Provider (MPSP). institute of payment, or an electronic money institution. Both
Proximity Mobile Payments (PMPs) include payments that the institute of payment and the electronic money institution
need buyer and seller located physically close. Proximity may be hybrid subjects and not necessarily a bank, provided
connections are based on protocols, such as RFID, NFC or that their business activities are not in conflict of interest with
high-frequency sound waves. the emitter of electronic money.
One NFC-embedded smartphone uses a dedicated software
(generally an app) provided by the user’s financial institution 4. Enabled business models
to complete the payment process. Depending on the At present, the rate of increase of m-payment seems to slow
implementation, the application can or cannot require one data down. This is due to several reasons [1], [2]. For a long time
connection. the different players involved in the new system (MNOs,
The application and the account information needed to set-up banks, credit card institutions, HW and SW manufacturers,...)
and complete the payment process are encrypted and stored in defended different and not convergent positions. This had
a safe area of the phone. Thus mobile phones use the NFC- impacts both on choice of technical solutions and on
embedded technology to communicate with the Point Of Sale promotion of business models.
(POS). The whole payment process and the costs incurred by From a technical point of view, the location of the SE
the buyer are equivalent to those underlying a traditional credit identifies the economic player that owns the control of the
card or debit card transaction. system. MNOs and mobile terminal vendors took some time to
agree on how to implement the SE into the mobile terminal.
3. Mobile Payment Procedure The agreed solution was inserting the SE inside the phone’s
In general terms, an m-payment transaction operates according SIM card (more precisely, the UICC). One more reason for
to the following generic procedure (see Fig. 3): slow-down is the selection of the NFC as the preferred MNOs
technology. In fact, on customer’s side, use of NFC requires Users who receive the payments, often commercial
acquisition of more expensive mobile terminals, and, on intermediaries, are not generally customers of the same
merchant’s side, adoption of a special POS infrastructure [3]. debtor’s bank. So, it is necessary to establish a compensation
Among the reasons for slowdown some are related to business system among banks. The partner banks of this compensation
models uncertainty. This is mainly related to the definition of system must also match the payments to one or more MNOs
a sustainable economic model, agreed among different players associated with the transaction. The solutions adopted by
who should manage transactions and distribute property rights several banks, including e.g. Poste Italiane, the Post Office in
among several different business partners. Italy, belong to this model.
There are three main models: a) MNO-based model; b) Bank- c) Trusted Third Party – based model
based model; c) Trusted Third Party (TTP)-based model. In this model (Fig. 6) a third party is involved, with role
a) Mobile Network Operator – based model different from financial agents or MNO companies. In fact,
In the MNO-based model the MNO provides the technology, this new player is an intermediary among banks, operators,
manages the operations and rewards all involved players, as retailers and customers. It takes on itself all the organization
shown in Fig. 4. In this case, the potential for development, and operational functions. In this model, neither the banks nor
however, depends on the importance of the initial costs of the MNOs are in charge to manage the SE, but the TTP
setting up the infrastructure. Some examples are: (i) Isis operates as an independent intermediary between them.
Wallet, a joint venture between Verizon and AT&T, which
allows to make financial transactions through the operator’s
SIM connected to a traditional circuit of payment (bank or
credit card); (ii) M-Pesa, a Safaricom (Vodafone subsidiary)
project in Kenya, replicated in some other African and Asian
countries, enabling citizens to perform payments via their
mobile phone, to transfer money between two users using
encrypted SMS, and to recharge their SIM card with cash.

(a)

Fig. 4: M-payment interactions in an MNO-based model.

b) Bank–based model
Bank-based model can be considered an evolution of the credit
card model (Fig. 5). Users are associated with their bank that
provides them with the payment method via mobile terminal.

(b)
Fig. 6: M-payment interactions in a TTP-based model: (a) OTT as
TTP; (b) Merchant as TTP.

The independent TTP manages the payment service, as well as


the sharing and distribution of property rights with all parties
involved. Internet over-the-top companies are ideal candidates
to act as a TTP, due to their solid experience with the
organization of e-commerce production chains and, in
particular, with money transfer. In addition to OTTs, this
Fig. 5: M-payment interactions in a bank-based model.
model is suitable to be used also by large retail distribution e) Governmental policies against use of paper money
chains (merchants), directly acting as trusted parties. In several countries, in order to reduce room for tax evasion,
This model has been already adopted in several initiatives usage of electronic payment means are being incentivized by
related both to OTTs (Fig.6(a)) and merchants (Fig.6(b)). the law, so that transparency of transactions can be more
Different OTT companies have already implemented payment easily ensured.
systems, based on m-commerce solutions, both with Mobile 5.2 Last trends: technical approach vs business approach
Web and with Mob Apps. Google and PayPal are among the In the last period of the m-payment market has been
Internet players to which this model is most frequently increasingly characterized by fragmentation of the
associated. Google Wallet is one example. technological solutions adopted and applied by the various
Some merchants also took initiatives directly addressing their players involved. [5] In fact, if it is true that the traditional
customer base. Similar to the OTT-TTP model, therefore, can classification is based on a technological approach
be one variant in which the merchant itself, when it holds a characterized by functional mode (remote or proximity), last
large chain of points of sale (e.g. Starbucks/Target, having approaches are focused on business. So four different business
overall more than ten thousand shops in the U.S.) provides the models (MNO-based, Bank-based OTT-based and Merchant-
customers with m-payment systems, generally associated to based) are defined, each of which is strictly related to involved
fidelity programs. Starbucks allows the user to pay via an technologies and related security levels [7]. Figure 6 shows
appropriate card charged using cash or traditional payment the mapping of both approaches.
circuits. Data transfers are performed both in remote and in Technological
proximity connection (via NFC or barcode labels). Business approach
approach
Technology Business Model
5. Market trends Proximity Mobile
MNO- Bank- Merchant-
5.1 Mobile payment drivers Payment (NFC, -
based based based
RFID, Bluetooth)
Among several reasons that will presumably promote
Remote Mobile Bank- OTT- Merchant-
m-payment we can mention the following ones. -
Payment based based based
a) Smartphone penetration
Fig. 6: Technical approach and business approach
Smartphone owners in the U.S. are already today more than
60% over all mobile terminals, while penetration is 75%
among 18-to-24 years old people (source: Nielsen, 2013). In 6. Conclusions
Europe, smartphone penetration forecasts in 2017 are 80.9 % This paper presented different characteristics and
in UK, 80 % in Germany, 77.5 % in France, 73.1 % in Spain, implementation criteria of Mobile Payment systems. This kind
and 68 % in Italy. In China penetration in the same year will of payment is not yet very diffuse due to fragmented technical
reach 49 % (Source: eMarketer, 2013). These figures represent approaches and business models, in addition to lack of
a solid basis for estimating significant progress over the next sufficient awareness by end-users, especially in terms of
five years for m-payment technologies and services. transaction security and fraud prevention. The relationship
b) Machine-to-machine communications between a technological and business approach is very strong.
Progress in M2M technologies and application to many varied Only taking in account right end users, right payment circuit,
fields will continue steadily. Usage of wireless technologies in technology factors and business models can produce a
many daily operations will bring with it in several cases the successful m-payment solution. The cooperation of other
need to complete micropayments in a fast and simple way. players is very crucial and it needs to be managed through
right compensations fees.
c) Innovations in vending machines
References
Vending machines are more and more becoming complex [1] Gartner group, “Forecast: Mobile Payment, Worldwide,
network interfaces able to gather and store vast amounts of 2013 Update”, May 2013.
data in the cloud. They will be able to profile customers, to [2] L. Chaix, D Torre, “Which economic model for mobile
extract out of the cloud data on past purchases and payments?”, 23rd Europ. Regional Conf. of the Int.
preferences. They will be enabled to identity the voice, face, Telecommunic. Society, Vienna, Austria, 1-4 July 2012.
or gestures of the customer, who will be able, once [3] V. Coskun, K. Ok, B. Ozdenizci, Near Field Communi-
recognized, to avoid to take the smartphone out of the pocket cation (NFC): from Theory to Practice, Wiley, 2012.
to make the payment. [4] [4] J. Lumetta, “Vending Machines Undergo a Complete
d) Increased use of virtual currencies Overhaul”, Design News, 3/2013.
Several forms of virtual or digital money (e.g. Bitcoin or, [5] ECB, “Virtual currency schemes”, Oct. 2012.
more generally, freecoin) will proliferate inside the Internet, [6] L. Abedi, M. Nematbakhsh , A. Abdolmaleki “A Model
generally in use within a specific community. They can be for Context Aware Mobile Payment”, J. of Th. and Appl.
convertible or not convertible with real economy money. In all Electronic Commerce Res., Dec. 2012, pp. 1-10.
cases these currencies will bring along the convenience to [7] A. Vizzarri, M. Vari, F. Vatalaro, “Security in Mobile
fully carry on every aspects of a transaction digitally. [5] Payments”, AEIT Congress 2013

View publication stats

Anda mungkin juga menyukai