Apple Inc has patents mobile payment method with secure element so as to protect account info. With Apple touch ID implemented in Iphone 5S Company is going towards the high stages of security. The patent which Apple has made is for the whole “touchless “phone based payment mode.
Apple Inc has used two diverse types of wireless communication
- To send signal from iPhone to a receiver that is nearby so that the payment can be initiated.Signal transfer can be done with the assistance of NFC that is being described in the patent.
- Wireless interface is being used so that communication can take place of data from the point of sale to the point of actual payment.
The above image is much technical but easy enough to understand the two methods describe above.
There is an in built security method designed by Apple Inc in order to save user data. It’s known as “secure enclave” that is implemented in Iphone 5s for hiding the finger print data.
To make a payment, an alias is made so that the backend process can recognise it and when the user take an action to pay the amount the alias is then securliy transferred and sent along with a cryptographic code.
What is cryptographic code?
Cryptographic is a method for securing your data over the network. The code is sent with cryptographic and then it’s being decrypted by the backend after the code is being decrypted alias is being compared and thus this is how the overall payment patent is being formed by Apple Inc.
To verify the crypto and alias data a secret is being shared by the purchase device and server. A random value that is being generated secretly and it is being shared in order to maintain high level of security.
The image shown would make your understanding for payment more clear and with perfect security being used by Apple at the loopholes of payment system.
Let’s take an example here.
A transaction of purchase is being initiated with a POS device using a method of close proximity wireless protocol. The phone is now connected to server backend with the help of wireless protocol and it is now sending an alias of credit card and also a generation of crypto key is being made from shared secret. On your phone all this elements are being stored. Over the end of server again a crypto key is generated on the shared secret key and compares it with the data provided by the phone.
If all the keys equal then transaction is a BINGO!
Apple Inc has being successful in providing security with Touch ID, so if Apple Inc would apply the above described scenario then the payment transaction would be more rapid and thus SECURE.
It’s interesting to know how Apple is innovative behind the security but the question when would Apple Inc implement this system in real world.
It’s Apple it’s Secure.
Author : Aakar Gupte Source : AppleInsider