About cookies on this site Our websites require some cookies to function properly (required). In addition, other cookies may be used with your consent to analyze site usage, improve the user experience and for advertising. For more information, please review your options. By visiting our website, you agree to our processing of information as described in IBM’sprivacy statement. To provide a smooth navigation, your cookie preferences will be shared across the IBM web domains listed here.
Publication
IEEE Security and Privacy
Review
A Review of Technical Approaches to Realizing Near-Field Communication Mobile Payments
Abstract
This article describes and compares four approaches to storing payment keys and executing payment applications on mobile phones via near-field communication at the point of sale. Even though the comparison hinges on security - specifically, how well the keys and payment application are protected against misuse - other criteria such as hardware requirements, availability, management complexity, and performance are also identified and discussed.