SlideShare ist ein Scribd-Unternehmen logo
1 von 29
Downloaden Sie, um offline zu lesen
The Future of Online Money
Creating Secure Payments Globally
Jonathan LeBlanc
Twitter: @jcleblanc
Book: http://bit.ly/iddatasecurity
10 Years ago, the iPhone
launched
2013: More cell phones than toilets (time.com)
7 billion people, 6.5 billion with cell phones, 4.5 billion
with access to toilets.
2014: More cell phones than people (independent.co.uk)
7.22 billion cell phones, 7.19-7.2 billion people.
2015: More people own a cell phone than a toothbrush (CTA)
3.7 billion people own a cell phone, 3.5 billion own a
toothbrush.
2020: More people with a phone than electricity (cnet.com)
5.4 billion people will own a cell, 5.3 billion will have
electricity, 3.5 billion with running water, 2.8 billion cars
on the road.
Mobile, by the Numbers...
3 Years: IoT vendor revenue could top $470 billion
for hardware, software, and solutions. - Bain
5 Years: Nearly $6 trillion will be spent on IoT
solutions. - BI Intelligence
10 Years: IoT market will grow from 15.4 billion
devices (2015) to 30.7 billion devices (2020), and
75.4 billion (2025). – IHS
15 Years: Investment is expected to top $60
trillion. - GE
The IoT Market by 2020 and beyond
We’ve Built a New
Generation of Inventors
Prototyping and Mainstreaming
Contextual Commerce
Removing Interaction Hurdles
Applications need to know
about you & what you want
How do we Secure Payments?
Securing Payments within
unsecure channels
Securing Channels: Asynchronous
& Synchronous Cryptography
Credit Card Tokenization
Credit Card Information
Address Information
Card Holder Name
...
7e29c5c48f44755598dec3549155
ad66f1af4671091353be4c4d7694
d71dc866
Apple / Android
pay tokenization
system
EMV payment
tokenisation
specification
Merchant register is
changed to hardware
transfer bridge
Network handles direct merchant
requests. Vault stores surrogate
to token lookup.
Secure Element
Host-based
Card Emulation
Context and Verification
What do we Need to Identify Someone?
33 bits of entropy to identify approximately
8 billion people uniquely.
What do we Need to Identify Someone?
ΔS = -log2 Pr(X=x)
ΔS: Reduction in entropy, measured in bits
Pr(X=x): Probability that the fact would be true
of a random person
Building up Bits of Entropy
Date of Birth
Birth Month: ΔS = -log2 Pr(MOB=December) = -log2 (1/12) = 3.58 bits
Birthday: ΔS = -log2 Pr(DOB=Dec 6th) = -log2 (1/365) = 8.51 bits
Location
ZIP code is 95123: ΔS = -log2 (65,276/7,503,205,943) = 16.81 bits
City is Santa Clara: ΔS = -log2 (122,192/7,503,205,943) = 15.90 bits
State is CA: ΔS = -log2 (39,140,000/7,503,205,943) = 7.58 bits
Browser Fingerprinting
https://panopticlick.eff.org/
Device Fingerprinting
//-------------
// Build Info: http://developer.android.com/reference/android/os/Build.html
//-------------
System.getProperty("os.version"); // OS version
android.os.Build.DEVICE // Device
android.os.Build.MODEL // Model
android.os.Build.VERSION.SDK_INT // SDK version of the framework
android.os.Build.SERIAL // Hardware serial number, if available
Retrieving Build Information for Android Device
Location Awareness
Purchase History
Ninety percent of individuals could be
uniquely identified using just four
pieces of information
- telegraph.co.uk
Getting Paired Devices
The Future of Secure Payments
Thank you!
https://www.slideshare.net/jcleblanc
Jonathan LeBlanc
Twitter: @jcleblanc
Book: http://bit.ly/iddatasecurity

Weitere ähnliche Inhalte

Was ist angesagt?

Future of mobile payment and mobile commerce may 2013
Future of mobile payment and mobile commerce may 2013Future of mobile payment and mobile commerce may 2013
Future of mobile payment and mobile commerce may 2013Tarang Shah
 
What Do the Blockchain and AI Together Do?
What Do the Blockchain and AI Together Do?What Do the Blockchain and AI Together Do?
What Do the Blockchain and AI Together Do?celine anderson
 
Banking trends to watch out for in 2017
Banking trends to watch out for in 2017Banking trends to watch out for in 2017
Banking trends to watch out for in 2017talentsprintindia
 
HCE_and_SIM_Secure_Element
HCE_and_SIM_Secure_ElementHCE_and_SIM_Secure_Element
HCE_and_SIM_Secure_ElementNick Norman
 
Mobile money, a development tool for benin powerpoint
Mobile money, a development tool for benin powerpointMobile money, a development tool for benin powerpoint
Mobile money, a development tool for benin powerpointAJAVON Samuel
 
Mobile Payment Trends 2014
Mobile Payment Trends 2014Mobile Payment Trends 2014
Mobile Payment Trends 2014Martin Gutberlet
 

Was ist angesagt? (8)

web and mobile technology trend
web and mobile technology trendweb and mobile technology trend
web and mobile technology trend
 
Mobile payment technology 8.11.2014 final
Mobile payment technology 8.11.2014 finalMobile payment technology 8.11.2014 final
Mobile payment technology 8.11.2014 final
 
Future of mobile payment and mobile commerce may 2013
Future of mobile payment and mobile commerce may 2013Future of mobile payment and mobile commerce may 2013
Future of mobile payment and mobile commerce may 2013
 
What Do the Blockchain and AI Together Do?
What Do the Blockchain and AI Together Do?What Do the Blockchain and AI Together Do?
What Do the Blockchain and AI Together Do?
 
Banking trends to watch out for in 2017
Banking trends to watch out for in 2017Banking trends to watch out for in 2017
Banking trends to watch out for in 2017
 
HCE_and_SIM_Secure_Element
HCE_and_SIM_Secure_ElementHCE_and_SIM_Secure_Element
HCE_and_SIM_Secure_Element
 
Mobile money, a development tool for benin powerpoint
Mobile money, a development tool for benin powerpointMobile money, a development tool for benin powerpoint
Mobile money, a development tool for benin powerpoint
 
Mobile Payment Trends 2014
Mobile Payment Trends 2014Mobile Payment Trends 2014
Mobile Payment Trends 2014
 

Ähnlich wie The Future of Online Money: Creating Secure Payments Globally

Whitepaper blockchain for wearables
Whitepaper   blockchain for wearablesWhitepaper   blockchain for wearables
Whitepaper blockchain for wearablesMohd. Anas Rasheed
 
The Future of Technology
The Future of TechnologyThe Future of Technology
The Future of TechnologyNovida Global
 
Decentralize all the things
Decentralize all the thingsDecentralize all the things
Decentralize all the thingsStefan Adolf
 
The New Industrial Revolution(s)? Exploring blockchains and the future of val...
The New Industrial Revolution(s)? Exploring blockchains and the future of val...The New Industrial Revolution(s)? Exploring blockchains and the future of val...
The New Industrial Revolution(s)? Exploring blockchains and the future of val...Robin Teigland
 
Article on "internet of things"
Article on "internet of things"Article on "internet of things"
Article on "internet of things"Team Saral
 
7 Predictions & Future Trends of Blockchain Technology for 2021
7 Predictions & Future Trends of Blockchain Technology for 20217 Predictions & Future Trends of Blockchain Technology for 2021
7 Predictions & Future Trends of Blockchain Technology for 2021ArpitGautam20
 
Citi Digital Symposium: Future Insights
Citi Digital Symposium: Future InsightsCiti Digital Symposium: Future Insights
Citi Digital Symposium: Future Insightskelroyjames1
 
MONEY, TOKENS, AND GAMES:Blockchain’s Next Billion Users and Trillions in Value
MONEY, TOKENS, AND GAMES:Blockchain’s Next Billion Users and Trillions in ValueMONEY, TOKENS, AND GAMES:Blockchain’s Next Billion Users and Trillions in Value
MONEY, TOKENS, AND GAMES:Blockchain’s Next Billion Users and Trillions in Valuedigitalinasia
 
The internet of everything
The internet of everythingThe internet of everything
The internet of everythingSergey Zhdanov
 
Blockchain in Business 2018
Blockchain in Business 2018Blockchain in Business 2018
Blockchain in Business 2018Christian Kameir
 
10 technology trends that will shape security industry 2018
10 technology trends that will shape security industry 201810 technology trends that will shape security industry 2018
10 technology trends that will shape security industry 2018Axis Communications
 
Understanding Digital Payments
Understanding Digital PaymentsUnderstanding Digital Payments
Understanding Digital PaymentsSantosh Potadar
 
IoT-Where is the Money? - Chandrashekar Raman, Engagement Manager, IoT Strate...
IoT-Where is the Money? - Chandrashekar Raman, Engagement Manager, IoT Strate...IoT-Where is the Money? - Chandrashekar Raman, Engagement Manager, IoT Strate...
IoT-Where is the Money? - Chandrashekar Raman, Engagement Manager, IoT Strate...Lounge47
 
smartcard-120830090352-phpapp02.pdf
smartcard-120830090352-phpapp02.pdfsmartcard-120830090352-phpapp02.pdf
smartcard-120830090352-phpapp02.pdfssuser5b47c8
 

Ähnlich wie The Future of Online Money: Creating Secure Payments Globally (20)

Whitepaper blockchain for wearables
Whitepaper   blockchain for wearablesWhitepaper   blockchain for wearables
Whitepaper blockchain for wearables
 
The Future of Technology
The Future of TechnologyThe Future of Technology
The Future of Technology
 
Decentralize all the things
Decentralize all the thingsDecentralize all the things
Decentralize all the things
 
7 compelling innovative IoT applications
7 compelling innovative IoT applications7 compelling innovative IoT applications
7 compelling innovative IoT applications
 
eInfochips IoT Infograph
eInfochips IoT InfographeInfochips IoT Infograph
eInfochips IoT Infograph
 
The New Industrial Revolution(s)? Exploring blockchains and the future of val...
The New Industrial Revolution(s)? Exploring blockchains and the future of val...The New Industrial Revolution(s)? Exploring blockchains and the future of val...
The New Industrial Revolution(s)? Exploring blockchains and the future of val...
 
Article on "internet of things"
Article on "internet of things"Article on "internet of things"
Article on "internet of things"
 
7 Predictions & Future Trends of Blockchain Technology for 2021
7 Predictions & Future Trends of Blockchain Technology for 20217 Predictions & Future Trends of Blockchain Technology for 2021
7 Predictions & Future Trends of Blockchain Technology for 2021
 
The blockchain disruption
The blockchain disruptionThe blockchain disruption
The blockchain disruption
 
The blockchain disruption
The blockchain disruptionThe blockchain disruption
The blockchain disruption
 
Citi Digital Symposium: Future Insights
Citi Digital Symposium: Future InsightsCiti Digital Symposium: Future Insights
Citi Digital Symposium: Future Insights
 
MONEY, TOKENS, AND GAMES:Blockchain’s Next Billion Users and Trillions in Value
MONEY, TOKENS, AND GAMES:Blockchain’s Next Billion Users and Trillions in ValueMONEY, TOKENS, AND GAMES:Blockchain’s Next Billion Users and Trillions in Value
MONEY, TOKENS, AND GAMES:Blockchain’s Next Billion Users and Trillions in Value
 
The internet of everything
The internet of everythingThe internet of everything
The internet of everything
 
Blockchain in Business 2018
Blockchain in Business 2018Blockchain in Business 2018
Blockchain in Business 2018
 
10 technology trends that will shape security industry 2018
10 technology trends that will shape security industry 201810 technology trends that will shape security industry 2018
10 technology trends that will shape security industry 2018
 
IOTA
IOTAIOTA
IOTA
 
Understanding Digital Payments
Understanding Digital PaymentsUnderstanding Digital Payments
Understanding Digital Payments
 
IoT-Where is the Money? - Chandrashekar Raman, Engagement Manager, IoT Strate...
IoT-Where is the Money? - Chandrashekar Raman, Engagement Manager, IoT Strate...IoT-Where is the Money? - Chandrashekar Raman, Engagement Manager, IoT Strate...
IoT-Where is the Money? - Chandrashekar Raman, Engagement Manager, IoT Strate...
 
smartcard-120830090352-phpapp02.pdf
smartcard-120830090352-phpapp02.pdfsmartcard-120830090352-phpapp02.pdf
smartcard-120830090352-phpapp02.pdf
 
AI+Blockchain+IoT Convergence AT A Glance
AI+Blockchain+IoT Convergence AT A GlanceAI+Blockchain+IoT Convergence AT A Glance
AI+Blockchain+IoT Convergence AT A Glance
 

Mehr von Jonathan LeBlanc

JavaScript App Security: Auth and Identity on the Client
JavaScript App Security: Auth and Identity on the ClientJavaScript App Security: Auth and Identity on the Client
JavaScript App Security: Auth and Identity on the ClientJonathan LeBlanc
 
Improving Developer Onboarding Through Intelligent Data Insights
Improving Developer Onboarding Through Intelligent Data InsightsImproving Developer Onboarding Through Intelligent Data Insights
Improving Developer Onboarding Through Intelligent Data InsightsJonathan LeBlanc
 
Better Data with Machine Learning and Serverless
Better Data with Machine Learning and ServerlessBetter Data with Machine Learning and Serverless
Better Data with Machine Learning and ServerlessJonathan LeBlanc
 
Best Practices for Application Development with Box
Best Practices for Application Development with BoxBest Practices for Application Development with Box
Best Practices for Application Development with BoxJonathan LeBlanc
 
Box Platform Developer Workshop
Box Platform Developer WorkshopBox Platform Developer Workshop
Box Platform Developer WorkshopJonathan LeBlanc
 
Modern Cloud Data Security Practices
Modern Cloud Data Security PracticesModern Cloud Data Security Practices
Modern Cloud Data Security PracticesJonathan LeBlanc
 
Understanding Box UI Elements
Understanding Box UI ElementsUnderstanding Box UI Elements
Understanding Box UI ElementsJonathan LeBlanc
 
Understanding Box applications, tokens, and scoping
Understanding Box applications, tokens, and scopingUnderstanding Box applications, tokens, and scoping
Understanding Box applications, tokens, and scopingJonathan LeBlanc
 
Modern API Security with JSON Web Tokens
Modern API Security with JSON Web TokensModern API Security with JSON Web Tokens
Modern API Security with JSON Web TokensJonathan LeBlanc
 
Creating an In-Aisle Purchasing System from Scratch
Creating an In-Aisle Purchasing System from ScratchCreating an In-Aisle Purchasing System from Scratch
Creating an In-Aisle Purchasing System from ScratchJonathan LeBlanc
 
Secure Payments Over Mixed Communication Media
Secure Payments Over Mixed Communication MediaSecure Payments Over Mixed Communication Media
Secure Payments Over Mixed Communication MediaJonathan LeBlanc
 
Protecting the Future of Mobile Payments
Protecting the Future of Mobile PaymentsProtecting the Future of Mobile Payments
Protecting the Future of Mobile PaymentsJonathan LeBlanc
 
Node.js Authentication and Data Security
Node.js Authentication and Data SecurityNode.js Authentication and Data Security
Node.js Authentication and Data SecurityJonathan LeBlanc
 
PHP Identity and Data Security
PHP Identity and Data SecurityPHP Identity and Data Security
PHP Identity and Data SecurityJonathan LeBlanc
 
Secure Payments Over Mixed Communication Media
Secure Payments Over Mixed Communication MediaSecure Payments Over Mixed Communication Media
Secure Payments Over Mixed Communication MediaJonathan LeBlanc
 
Protecting the Future of Mobile Payments
Protecting the Future of Mobile PaymentsProtecting the Future of Mobile Payments
Protecting the Future of Mobile PaymentsJonathan LeBlanc
 
Future of Identity, Data, and Wearable Security
Future of Identity, Data, and Wearable SecurityFuture of Identity, Data, and Wearable Security
Future of Identity, Data, and Wearable SecurityJonathan LeBlanc
 

Mehr von Jonathan LeBlanc (20)

JavaScript App Security: Auth and Identity on the Client
JavaScript App Security: Auth and Identity on the ClientJavaScript App Security: Auth and Identity on the Client
JavaScript App Security: Auth and Identity on the Client
 
Improving Developer Onboarding Through Intelligent Data Insights
Improving Developer Onboarding Through Intelligent Data InsightsImproving Developer Onboarding Through Intelligent Data Insights
Improving Developer Onboarding Through Intelligent Data Insights
 
Better Data with Machine Learning and Serverless
Better Data with Machine Learning and ServerlessBetter Data with Machine Learning and Serverless
Better Data with Machine Learning and Serverless
 
Best Practices for Application Development with Box
Best Practices for Application Development with BoxBest Practices for Application Development with Box
Best Practices for Application Development with Box
 
Box Platform Overview
Box Platform OverviewBox Platform Overview
Box Platform Overview
 
Box Platform Developer Workshop
Box Platform Developer WorkshopBox Platform Developer Workshop
Box Platform Developer Workshop
 
Modern Cloud Data Security Practices
Modern Cloud Data Security PracticesModern Cloud Data Security Practices
Modern Cloud Data Security Practices
 
Box Authentication Types
Box Authentication TypesBox Authentication Types
Box Authentication Types
 
Understanding Box UI Elements
Understanding Box UI ElementsUnderstanding Box UI Elements
Understanding Box UI Elements
 
Understanding Box applications, tokens, and scoping
Understanding Box applications, tokens, and scopingUnderstanding Box applications, tokens, and scoping
Understanding Box applications, tokens, and scoping
 
Modern API Security with JSON Web Tokens
Modern API Security with JSON Web TokensModern API Security with JSON Web Tokens
Modern API Security with JSON Web Tokens
 
Creating an In-Aisle Purchasing System from Scratch
Creating an In-Aisle Purchasing System from ScratchCreating an In-Aisle Purchasing System from Scratch
Creating an In-Aisle Purchasing System from Scratch
 
Secure Payments Over Mixed Communication Media
Secure Payments Over Mixed Communication MediaSecure Payments Over Mixed Communication Media
Secure Payments Over Mixed Communication Media
 
Protecting the Future of Mobile Payments
Protecting the Future of Mobile PaymentsProtecting the Future of Mobile Payments
Protecting the Future of Mobile Payments
 
Node.js Authentication and Data Security
Node.js Authentication and Data SecurityNode.js Authentication and Data Security
Node.js Authentication and Data Security
 
PHP Identity and Data Security
PHP Identity and Data SecurityPHP Identity and Data Security
PHP Identity and Data Security
 
Secure Payments Over Mixed Communication Media
Secure Payments Over Mixed Communication MediaSecure Payments Over Mixed Communication Media
Secure Payments Over Mixed Communication Media
 
Protecting the Future of Mobile Payments
Protecting the Future of Mobile PaymentsProtecting the Future of Mobile Payments
Protecting the Future of Mobile Payments
 
Future of Identity, Data, and Wearable Security
Future of Identity, Data, and Wearable SecurityFuture of Identity, Data, and Wearable Security
Future of Identity, Data, and Wearable Security
 
Kill All Passwords
Kill All PasswordsKill All Passwords
Kill All Passwords
 

Kürzlich hochgeladen

Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfAarwolf Industries LLC
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessWSO2
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...BookNet Canada
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Karmanjay Verma
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Nikki Chapple
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...amber724300
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFMichael Gough
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Jeffrey Haguewood
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sectoritnewsafrica
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxAna-Maria Mihalceanu
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 

Kürzlich hochgeladen (20)

Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdf
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with Platformless
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDF
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance Toolbox
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 

The Future of Online Money: Creating Secure Payments Globally

Hinweis der Redaktion

  1. A little over 10 years ago, the iPhone was launched - https://static.pexels.com/photos/40011/iphone-smartphone-apps-apple-inc-40011.jpeg
  2. http://newsfeed.time.com/2013/03/25/more-people-have-cell-phones-than-toilets-u-n-study-shows/ (2013) 7 billion people, 6.5 billion with access to cell phones, 4.5 billion with access to toilets http://www.independent.co.uk/life-style/gadgets-and-tech/news/there-are-officially-more-mobile-devices-than-people-in-the-world-9780518.html (2014) More mobile devices than people (7.22 billion devices vs 7.19 to 7.2 billion people) http://www.contentfac.com/more-people-own-cell-phone-than-toothbrush-10-crazy-social-media-statistics/ (2015) More people in the world own a cell phone than a toothbrush (3.7 billion people own mobile phones, but only around 3.5 billion own toothbrushes.) https://www.cnet.com/news/by-2020-more-people-will-own-a-phone-than-have-electricity/ (2020 - Cisco's annual report on mobile traffic growth) By 2020, 5.4 billion people around the world will have a phone (5.3 billion people will have electricity, 3.5 billion will have running water and 2.8 billion cars will be on the road)
  3. Growth of iot solutions https://www.forbes.com/sites/louiscolumbus/2016/11/27/roundup-of-internet-of-things-forecasts-and-market-estimates-2016/#6968a12b292d Bain predicts that by 2020 annual revenues could exceed $470B for the IoT vendors selling the hardware, software and comprehensive solutions. McKinsey estimates the total IoT market size in 2015 was up to $900M, growing to $3.7B in 2020 attaining a 32.6% CAGR. General Electric predicts investment in the Industrial Internet of Things (IIoT) is expected to top $60 trillion during the next 15 years. IHS forecasts that the IoT market will grow from an installed base of 15.4 billion devices in 2015 to 30.7 billion devices in 2020 and 75.4 billion in 2025 http://www.businessinsider.com/how-the-internet-of-things-market-will-grow-2014-10 34 billion devices connected to the internet by 2020, up from 10 billion in 2015 Nearly $6 trillion will be spent on IoT solutions over the next five years
  4. We have built out a generation of inventors Before, the barrier to entry was too high (story about hackathons & fridge hardware)
  5. Video of bot – running into walls and making a payment for busting up your house
  6. Contextual commerce removes hurdles from purchases / interactions. Providing 1-click payments
  7. Applications need to know enough about users to provide service without input
  8. How do we secure payments in this new realm? Where are payments and commerce moving to?
  9. Talk about Amazon Echo voice payments
  10. What we’ll model our breakdown around EMV payment tokenisation specification Apple / Android pay tokenization system
  11. How the apple / android pay system works (diagram)
  12. How our modified system will work
  13. Secure element functionality on the phone vs HCE
  14. https://www.eff.org/deeplinks/2010/01/primer-information-theory-and-privacy
  15. http://www.telegraph.co.uk/finance/newsbysector/banksandfinance/11378443/You-can-be-identified-from-just-four-purchases-on-your-credit-card-bill-study-finds.html Ninety percent of individuals could be uniquely identified using just four pieces of information, such as where they bought coffee one day or where they purchased a new jumper or pair of shoes.
  16. http://developer.android.com/guide/topics/connectivity/bluetooth.html#QueryingPairedDevices
  17. Vein recognition biometrics