Cidway Securing POS Transactions

50 %
50 %
Information about Cidway Securing POS Transactions

Published on July 22, 2009

Author: lfilliat

Source: slideshare.net

Description

Securing POS transaction using mobile phone

DISCOVER CIDWAY Securing POS Transactions 2009

Secure PoS transaction using Cidway Online @ PoS Send Instructions Send Confirmation Cidway Systems Open MobileCard Input PIN Code is Displayed on the Phone Input on the PoSteminal (after swiping the Card): Code (displayed on the phone) Payment Processor / Issuer / Acquirer Offline @ PoS POS includes Cidway Systems SPA Authenticate Transaction Open MobileCard Input PIN Code is Displayed on the Phone Input on the PoSteminal (after swiping the Card): Code (displayed on the phone)

Value Added User Convenience No waiting time for smsEasy & simple to UseCan be used for other channels (ATM, mBanking, etc.)Security Strong authentication of transactions (based on time-based OTP)Patented PIN Protection on the Mobile (prevents cloning, hacking, etc.)Return on Investment No cost of sms Lower the cost of acquisition & maintenanceLower transactions’ cost & dispute supportImprove customer acquisition & retentionEnable innovative & revenue generating servicesEase of Deployment Mobile carrier independentHandset independentOnline scenario can use what has been modified for the smsotp

No waiting time for sms

Easy & simple to Use

Can be used for other channels (ATM, mBanking, etc.)

Strong authentication of transactions (based on time-based OTP)

Patented PIN Protection on the Mobile (prevents cloning, hacking, etc.)

Lower the cost of acquisition & maintenance

Lower transactions’ cost & dispute support

Improve customer acquisition & retention

Enable innovative & revenue generating services

Mobile carrier independent

Handset independent

Online scenario can use what has been modified for the smsotp

Add a comment

Related pages

Making Retail Transactions More Secure

This infographic illustrates how Intel® Data Protection Technology for Transactions is making retail transactions more secure on any device, every time.
Read more

Mobile Point of Sale | MasterCard - MasterCard | A World ...

Securing Mobile POS Payment Applications; Securing Transaction Data Captured by a Mobile POS Card Reader Accessory; Securing Personal Account Numbers (PANs)
Read more

MASTERCARD BEST PRACTICES FOR MOBILE POINT OF SALE ACCEPTANCE

Mobile Point-of-Sale Solutions ADVANCING INNOVATION ADVANCING COMMERCE 6 2. Securing Transaction Data Captured by a Mobile POS Card Reader Accessory
Read more

Securing Your High Valued Transactions | Simon Phillips ...

Securing Your High Valued Transactions Simon Phillips. Silicon Valley represents an entirely new political category Gregory Ferenstein. Office Heavens ...
Read more

Secure Internet Transactions - HowStuffWorks

Secure Internet transactions can prevent identity theft. Learn about secure Internet transactions and how to judge which transactions are safe.
Read more

Transactions in REST? - Stack Overflow

POST /transaction This returns a transaction ID, ... Best Practices for securing a REST API / web service. 628 Representational state transfer ...
Read more

Set up permissions and operations [AX 2012]

The loyalty request can be performed at any point during the transaction. Retail POS ... Dynamics AX 2012 R3 is installed. Minimize pos ...
Read more

Securing IP Rights in M&A Transactions | Sarin ...

Securing IP Rights in M&A Transactions Sarin Kouyoumdjian -... Daily Pulse: China Spooks Markets, Twitter Loses All Gains since IPO, Are Boards Too Old?
Read more