M-Commerce Services: January 2003
M-Commerce Services: January 2003
net/publication/228851169
M-Commerce Services
CITATIONS READS
0 15,590
2 authors:
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Marjan Gusev on 02 June 2014.
1 Introduction
“any transaction with a monetary value that is conducted via a mobile telecommuni-
cation network” [25]
M-Commerce contributes the potential to deliver most of what the internet can of-
fer, plus the advantage of mobility. M-Commerce gives mobile communication de-
vices as mobile phones and personal digital assistants (PDA) the ability to pay for
goods and services.
2 M-Commerce Services
3 Market Segments
criterion is met ), hence monetary cost is not a constraint on B2C E-Commerce accep-
tance [27].
The M-Commerce framework divides into couple sub areas based on user’s distri-
bution criterion. Mobile E-Commerce addresses electronic commerce via mobile
devices, where the consumer is not in physical or eye contact with the goods that are
being purchased. On the contrary in M-Trade the consumer has eye contact with
offered products and services. In both cases the payment procedure is executed via
the mobile network [1, 5].
$
$
Bank
Merchant’s Accounts Receivab
1.Find Products 3.Send Bill 5.Payment 6.Report
10.Receive Product
9.Approve Shipment
Suppliers
Mobile Internet $
Bank
Device $
7.Receive Confirmation
1.Initiate Financial Message $
Fig. 2. M-Trade
18
In the M-Trade scenario presented in Fig. 2 the customer is in eye contact with the
merchant. The merchant initiates the first step and prepares a financial message with
predefined structure.
The digitally signed and encrypted message is sent to the FSP that decrypts and
validates the message. Then it is sent back to the customer to decrypt and validate the
message. His/hers role is to sign the message and return it back to FSP in encrypted
form. The signing is executed in digital manner with only one button click on the
mobile device. The next steps are the same as in the mobile E-Commerce scenario.
4 M-Payments Marketplace
Many mobile operators have started offering M-Payment services. These services
are in early stage and still in beta state. Several operators team up with banks while
others manage M-Payment on their own [10].
As presented in Table 1, there is a wide range of solutions concerning mobile pay-
ments services. The security implementation spreads from SMS messaging, PIN con-
firmation to financial message signing, encryption, use of tamper-resistant devices
and digital certificates. Main characteristic of all this solutions is that they could only
be used by limited number of users that fulfill the required technical specification.
6 Success Factors
There are six main actors involved in a Mobile Payment System(MPS) [18][19]:
Financial service providers (FSP), Payment service providers (PSP), Merchants, End-
users, Network service Providers (NSP) and Device Manufacturers. These are further
20
divided in users and system providers. There are different critical success factors and
requirements considering the involvement of different actors.
Factor Features
Ease of use few clicks, intuitive, flexibility, performance, installing
Security privacy, confidentiality, integrity, authentication, verification
/ non repudiation
Comprehensiveness transferability, divisibility, standardization.
Expenses set up fees, transaction fees, subscription fees
Technical Accept- integration effort, interoperability, scalability, remote access,
ability performance
The foundation and ideology Java 2 Micro Edition (J2ME) brings itself a reasonable
set of potentials of being a part in a MPS. There are several concrete arguments that
indicate why J2ME should be considered as an interesting supplement for M-
Payments:
Broad user experience: The J2ME™ API provides enhanced possibilities for pre-
senting GUI's like event handling and richer graphics [20, 21].
Comprehensiveness: The details of machine architecture, operating system, and
display environment are all handled transparently by the Java virtual machine (JVM).
The same MIDP M-Payment client can run on all MIDP-compliant devices [21, 22].
This allows M-Payment system providers to target a wider range of end-users.
Lower network and server load: J2ME based applications can operate when dis-
connected and only interacts with a server when necessary. J2ME has its own runtime
environment and the possibility of storing data in the mobile device.
Internet Enabled: Java is designed with a high focus on networking via HTTP or
HTTPS, and Java's multi-platform capability makes it a natural choice for applica-
tions transferring data to use on the WWW.
Constant storage: The official MIDP1.0 API provides facilities for persistent stor-
age (record store) of data [SuMIDP1]. The integrity of the record stores is kept
throughout the normal use of the platform, including reboots, battery changes, etc.
and is independent of any SIM/WIM [21].
There are two relevant aspects in relation to ease of use when considering the use
of MIDlets. These are downloading/installing and the overall usability to carry out the
transaction.A MIDlet is downloaded and installed in a single procedure. A MIDlet is
21
downloaded by requesting a URL directly to the specific MIDlet file (i.e. the .jad
file).
Compared to WAP and SAT, the MIDP 1.0 API provides enhanced GUI and UI
possibilities. Like in Java applets, MIDlets provides dynamic event handling and
possibilities for graphics and dynamic image drawings, which may enhance the us-
ability and user experience.
Apart from eventual expenditures imposed from the system providers, the only ex-
tra direct cost for the end-users is related to the airtime when downloading the MIDlet
and connecting to the PSP/FSP when initiating or carrying out the payment.Besides
connection fees and transfer speed, the download depends of the size of MIDlet and
number and types of connections depends on the actual design of the MIDlet.
The MIDP 1.0 API does not provide official classes or packages for cryptology.
There are two relevant JSRs (Java Specification Requests) in relation to cryptology
and secure M-Payments according to the Java Community process(SM) Program:
Mobile Information Device Profile (MIDP 2.0) and Security and Trust Services API
for J2ME (JSR 177).
Sun Microsystems have added an unofficial support for HTTPS (kSSL) as a part of
the MIDP 1.0.3 reference implementation and the J2ME Wireless Toolkit version
1.0.3 [23]. HTTPS is not required by the MIDP 1.0 specification but if device manu-
factures releases devices supporting HTTPS, they will in theory be able to carry out
secure transactions. In order to overcome the cryptographic gap a concrete initiative
called Bouncy Castle has released a lightweight API (BC-API) with cryptology and
certificate facilities, designed for J2ME. The BC-API provides a security toolbox
obtained from the original Java Cryptography Architecture (JCA) and the JAVA
Cryptography Extension (JCE) and has been boiled down to support the CDC and
CLDC devices [24].
Because MIDlets can run in any J2ME compatible device enlarges the potential
target audience and opens a whole new dimension in relation to M-Payments. M-
Payments with J2ME are not restricted to be carried out by mobile phones. A MIDlet
can run in standalone mode, which results in fewer users accessing servers at PSP at
any given time. This in turn improves performance and scalability for the payment
server, and reduces demand for network bandwidth. J2ME targets a broader range of
end-users via enhanced compatibility of networks and devices. These circumstances
also affect the possible targeting of a wider range of PSPs and FSPs.
Considering the above exposed features of J2ME we propose a new M-Payment pro-
tocol that has the HTTP protocol as bearer. Due to the fact that SSL is still not sup-
ported in MIDP specification, the encryption, signing and certificate verification is
managed at application level using the BC-API third party classes.
The protocol (Fig.3) is executed in the following manner:
1. The merchant’s computer issues a financial message that is encrypted and signed.
Over secure Internet connection, (over SSL) the FSP receives the message.
22
2. The FSP verifies the source, signs, encrypts and redirects the message to the des-
ignated mobile user.
3. The user receives the message and verifies the source. If the source is the FSP
gateway, the procedure continues otherwise it terminates. Afterwards the user en-
ters PIN (or password) which is used to decrypt the encrypted private key stored
in the persistent record store. Then the message is encrypted by asymmetric algo-
rithm with session secret and sent to the FSP.
4. The encrypted message is send to the FSP. It validates the message source.
5. The FSP validates the signature. Then a request is send to the bank’s information
server to begin transaction from customers to merchant’s account. In other scenar-
ios the transfer of funds is from one account to another in the mobile operator’s
network. These accounts could be prepaid or postpaid, that involves additional
procedures for validation and clearing.
6. The FSP is acknowledged after successful transfer of funds.
7. The merchant receives notification.
8. The user receives receipt in digital manner.
3. PIN
J 2 M E E n a b le d
D e v ic e
C ons um er
M e rc h a n t
8.R ec ept M e rc h a n t ’s
C om puter
4 . S ig n a n d re t u rn t o F S P
2.Send R eques t
1 . S e n d F in a n c ia l M e s s a g e
7 . R e p o rt
5 . R e q u e s t t ra n s f e r o f f u n d s
6 . A c k n o w le d g e
F SP Pay m ent
S e rv e r $
M ICRO SO F T CO RPO R AT I O N
I n t e rn e t
$ Bank
F in a n c ia l S e rv ic e P ro v id e r B a n k ’s I S
In order to lower the network load a new message system is introduced. The message
transferred by the Interactive Message System (iMS) is predefined and contains fi-
nancial and address data. The message represents a virtual envelope with enclosed
letter [1]. The Extendable Markup Language (XML) is used to define the structure of
the message [8].
23
The message is divided in three sections. The <type> section contains information
about the payment procedure. The <address> section contains the information about
the customer, the merchant. It also includes the signatures of the three parties in-
cluded in the procedure. The <data> section contains information about the payable
and receivable account, and about the amount of funds supposed to be transferred.
The Merchant fills the data for his/her identity, the customer's identity and the
amount of funds. Then he/she signs the message and sends it to the FSP. The FSP
fills the data for the accounts, signs and sends the message to the customer. The cus-
tomer signs the message and returns it back to the FSP. The <id> fields are flexible
and contain bank identification, personal identification or telephone number. It is
important that there are no ambiguities and that a clear distinction exists in the format
of the above mentioned identification numbers.
In accordance with the amount of money transferred, the data can be encrypted to
secure the privacy of every player in the procedure of payment. Also a public key
infrastructure is established [7]. The FSP stores the certificates with public keys of
every merchant and customer. It also minds its own private key in a secure manner.
The merchant stores its private key in a safe environment and uses it to sign the mes-
sages. It has the FSP's public key in order to encrypt the message. Only the FSP can
decrypt the messages received from the merchant, customer and bank. The aspect of
security procedures implemented depends on the amount of money transferred and is
considered in more details in [1].
Security has been an issue of M-Commerce development right from the start of this
effort. Current infrastructures considering the limitations and enhancements, offer a
comfortable environment for secure mobile payment transactions.
Many challenges are involved in building an M-Commerce solution, and just as
many “solutions” available on the market. The comprehensive M-Payment suite com-
bines strategy and analysis with rapid, fully customized technical solution develop-
ment and implementation, resulting in a high return on the investments.
The above proposed models of mobile payments are easy to implement consider-
ing the available technology infrastructure. The models are simple, secure and scal-
able. The specific workflow implementation depends on user’s disposition in motion.
As a light motive, the enterprises with multi-channel infrastructure have to harmo-
nize the security level for M-Payment and web-based security architectures for e-
payment in order to protect their business and build future-proof architectures.
References
1. M. Gusev, Lj. Antovski, G. Armenski; Models of Mobile Payments; Proceedings 2nd
WSEAS International Conference on Multimedia, Internet and Video Technologies
(ICOMIV), Skiathos, (2002) pp.3581-3586
24
2. O. Pfaff, Identifying how WAP can be Used for Secure m-Business, Proceedings 3rd
Wireless m-business Security Forum, Barcelona, (2002)
3. D. Amor, The E-business Revolution, Hewlett Packard Books, New Jersey (2002)
4. Lj. Antovski, M. Gusev, Ebanking-developing Future with Advanced Technologies. Pro-
ceedings 2nd Conference on Informatics and IT, Skopje, (2001), 154-164
5. D. Bulbrook, WAP: A Beginner's Guide, Osborne/McGraw-Hill New York (2001)
6. M. Gusev, E-Commerce, a Big Step Towards e-Business. Proceedings 2nd SEETI Confer-
ence on Trade Initiative and Commerce, Skopje, (2000)
7. R. Rivest, A. Shamir, and L. Adleman, A Method for Obtaining Digital Signatures and
Public-key Cryptosystems. Communications of the ACM, 21(2):120-126 (1978)
8. W3C: http://www.w3.org (accessed 20.10.2002)
9. WAP-forum: http://www.wapforum.org (accessed 15.10.2002)
10. H. Knospe, S. Schwiderski - Grosche, Online Payment for Access to Heterogeneous Mo-
bile Networks, Proceedings of 2002 IST Mobile & Wireless Telecommunications Summit,
(2002), pp.745-752
11. S. Pantis, N. Morphis, E. Felt, B. Reufenheuser, A. Bohm, Service Scenarios and Business
Models for Mobile Commerce, Proceedings (2002) IST Mobile & Wireless Telecommuni-
cations Summi, (2002) 551-561
12. N. Mykkanen, Mobile Payments - a Report into the State of the Market, Commerce Net,
Scandinavia, (2001)
13. European Commission DGIS, Digital Content for Global Mobile Services Final Report,
Andersen, Europe (2002)
14. M. Ding, and C. Unnithan, Mobile Payments (mPayments) – an Exploratory Study of
Emerging Issues and Future Trends, School Working Papers Series, Deakin Univ. (2002)
15. Guthery Scott B., Cronin Mary j, Mobile Application Development with SMS and the SIM
Toolkit, McGraw-Hill (2002)
16. WMLScript Crypto API Library Specification, WAP-161-WML Script Crypto - 20010620-
a, Version 20-Jun-2001.
17. Wireless Application Protocol Forum Ltd, "Wireless Identity Module Specification, WAP-
260-WIM-20010412-1", Version 12-July-2001.
18. Shon T.W. and Swatman P.M.C., "Effectiveness Criteria for Internet Payment Systems",
Internet Research: Electronic Networking Applications and Policy, 8(3):202-218 (1998)
19. Heijden, Hans van der, "Factors Affecting the Successful Introduction of Mobile Payment
Systems", Vrije Universiteit Amsterdam, (2002)
20. Sun Microsystems, "Designing Wireless Enterprise Applications Using java. Technology,
HTTP://java.sun.com/blueprints/, (Jan. 2002)
21. Mobile Information Device Profile (MIDP) Specification ("Specification"), Ver.1.0, Copy-
right 2000 Sun Microsystems, Inc. (2000)
22. Sun Microsystems, Inc. "Connected, Limited Device Configuration (CLDC) Specification,
ver.1.0a", Sun Microsystems, Inc., (2000)
23. Mahmoud, Qusay H. "Secure Java MIDP programming using HTTPS with MIDP",
http://www.wireless.java.sun (2002)
24. Bouncy Castle, the Specification, HTTP://www.bouncycastle.org, v. 1.1.4, 2002
25. Lehman Brothers Moving in Mobile Media Mode (1995) p.8
26. Haddon, Communication on the Move: the Experience of Mobile Technology in the 1990s.
COST 248, European Commission, Sweden, Telia AB, (1997).
27. Bhattacherjee- Anol, Acceptance of E-Commerce Services: The Case of Electronic Bro-
kerage, Man and Cybernetics, (2000)