Wednesday, 15 April 2015

E-banking, mobile security and beyond



    The mind map



1. What is e-banking?

A system allowing individuals to perform banking activities at home, via the internet.
         The common features fall broadly into several categories:

-A bank customer can perform non-transactional tasks through online banking-Bank customers can transact banking tasks through online banking-Financial institution administration-Management of multiple users having varying levels of authority-Transaction approval process-The process of banking has become much faster. Classification:
  • Telephone Banking (The Oldest & Poorest one) 
  • Internet Banking (or Online Banking) 
  • Mobile Banking (Including SMS Banking)

 
2.What is the client certificates?


A server or client certificate is a digital credential that identifies the server or client application that uses the certificate for secure communications. Server or client certificates contain identifying information about the organization that owns the application, such as the system's distinguished name. The certificate also contains the system's public key. A server must have a digital certificate to use the Secure Sockets Layer (SSL) for secure communications. Applications that support digital certificates can examine a server's certificate to verify the identity of the server when the client accesses the server. The application can then use the authentication of the certificate as the basis for initiating an SSL-encrypted session between the client and the server. You can manage these types of certificates from the *SYSTEM certificate store only.


3.Wearables – examples

http://futurethinking.ee.co.uk/the-5-most-important-wearable-tech-trends/


1. Wearable headsets

Workers in the digital age have become reliant on regularly checking their handheld devices to satisfy an insatiable appetite for information. Yet a new wave of technical innovation is likely to push knowledge right in front of faces. The most media-hyped example of wearable technology, Google Glass  provides information on a head-mounted display and communicates with the internet through natural voice commands. Glass can perform many of the tasks of a smartphone: it can take pictures, record videogive directions and send messages. A wide-scale consumer launch is expected later this year. Yet Glass is not the only smart headset in town. ABI Research expects more than two million smart glasses will be shipped in 2014.

2. Smart watches


Computer-enabled wristwatches are not inherently new. Seiko and Casio developed data entry watches through the 1980s and IBM worked with Citizen to develop a Linux-powered device at the start of the 21st century. What is new, however, is the ability to combine cheaper and smaller components in powerful and internet-enabled devices. That has led a raft of technology companies to release watch-style devices, including Sony, Samsung and Qualcomm. A notable absentee from that list is Apple, whose ‘iWatch’ device remains hotly anticipated but firmly under wraps.Rumours suggest Apple is dedicating resources and patents to smart-watch developments. Information concerning potential release dates remains sketchy, but Apple’s lateness to the party is not necessarily a problem. Reviews for the first tranche of feature-light smart watches are mixed. Estimates suggest Samsung might have sold as few as 50,000 of its Galaxy Gear smart watches. The most successful launch so far is probably the Kickstarter-funded Pebble, whose customisable face and long battery life has helped push its popularity.

3. Fitness devices


Wearable technology has proved a popular adjunct to fitness regimes – and it is not hard to see why. The potential to track and trace progress towards set fitness goals means individuals are prepared to invest money in technology that will provide real-time data. Nike’s FuelBand, for example, is a smart pedometer that tracks steps, and provides motivational reminders and social connectivity. Other rivals on the market include Fitbit, which offers a range of fitness tracking devices, and the minimalist Jawbone Up, which keeps interactivity to a minimum and does away with a screen.As with smart watches, reviews for fitness devices are mixed. Features on devices are limited, costs are relatively high and connectivity with other technologies can be a concern, particularly when it comes to older or less popular smartphones. The market, then, remains in a nascent state. It is worth paying close attention to the Kickstarter scene, where entrepreneurs could benefit from the low point of entry and the lack of a dominant market player.

4. Healthcare monitoring


Developments in smart healthcare technology are closely related to developments in smart watches and fitness devices. Some of the companies pioneering developments in those areas already offer tools to monitor healthcare. Other firms are keen to gain a slice of a fast-growing sector. Gaming specialist Nintendo recently announced its aim to target the healthcare market to help turn around its own economic fortunes. And continued innovation from technology companies is likely to provide solutions to some of healthcare’s most significant challenges.


5. Tailored technology

Google Glass might be seen as the ultimate symbol of geek chic but some firms are now creating bespoke designs that push wearable technology to a new level of high fashion. London-based CuteCircuit ran a fashion show recently where models customised their outfits as they walked down the catwalk. A Bluetooth-controlled app allowed the models to use an app to change the colour of their clothes and play video.


4. Authentication methods for e-banking

-Password and PIN based authentication


Working principle: Using password or Personal Identification Number (PIN) to login is the most common knowledge-based (something you know) authentication method. 


-SMS based authentication

Working principle: SMS is used as a delivery channel for a one-time password (OTP) generated by an information system. User receives a password through the message shown in the cell phone, and enters the password to complete the authentication.
        -Symmetric-key authentication
Working principle: In symmetric key authentication, user shares a unique, secret key with an authentication server. The user may be required to send a randomly generated message (the challenge) encrypted by the secret key to the authentication server. If the server can match the received encrypted message (the response) using its shared secret key, the user is authenticated. A slight variation of this approach is the use of OTP tokens, which generate the OTP on user side for matching with that generated on server side.
         -Public-key authentication
Working principle: Public-key cryptography provides an authentication method that uses a private and public key pair. A private key is kept secretly by the user, while the corresponding public key is commonly embedded in a certificate digitally signed by a certification authority. The certificate is made available to others.
-Biometric authentication 
Working principle: Biometrics is a method by which a person's authentication information is generated by digitizing measurements ( encoded value ) of a physiological or behavioral characteristic. Biometric authentication verifies user's claimed identity by comparing an encoded value with a stored value of the concerned biometric characteristic. 

5.Authentication methods for e-banking

Augmented reality (AR) is a live direct or indirect view of a physical, real-world environment whose elements are augmented (or supplemented) by computer-generated sensory input such as sound, video, graphics or GPS data. It is related to a more general concept called mediated reality, in which a view of reality is modified (possibly even diminished rather than augmented) by a computer. As a result, the technology functions by enhancing one’s current perception of reality. By contrast, virtual reality replaces the real world with a simulated one.


Hardware

Hardware components for augmented reality are: processor, display, sensors and input devices. Modern mobile computing devices like smartphones and tablet computers contain these elements which often include a camera and MEMS sensors such as accelerometer, GPS, and solid state compass, making them suitable AR platforms.

Display
Various technologies are used in Augmented Reality rendering including optical projection systems, monitors, hand held devices, and display systems worn on one's person.

Head-mounted
head-mounted display (HMD) is a display device paired to a headset such as a harness or helmet. HMDs place images of both the physical world and virtual objects over the user's field of view. Modern HMDs often employ sensors for six degrees of freedom monitoring that allow the system to align virtual information to the physical world and adjust accordingly with the user's head movements. HMDs can provide users immersive, mobile and collaborative AR experiences.

Eyeglasses
AR displays can be rendered on devices resembling eyeglasses. Versions include eyewear that employ cameras to intercept the real world view and re-display its augmented view through the eye pieces and devices in which the AR imagery is projected through or reflected off the surfaces of the eyewear lens pieces.

Input devices
Techniques include speech recognition systems that translate a user's spoken words into computer instructions and gesture recognition systems that can interpret a user's body movements by visual detection or from sensors embedded in a peripheral device such as a wand, stylus, pointer, glove or other body wear.

Computer
The computer analyzes the sensed visual and other data to synthesize and position augmentations.

Software and algorithms

A key measure of AR systems is how realistically they integrate augmentations with the real world. The software must derive real world coordinates, independent from the camera, from camera images. That process is called image registration which uses different methods of computer vision, mostly related to video tracking. Many computer vision methods of augmented reality are inherited from visual odometry. Usually those methods consist of two parts.
First detect interest points, or fiducial markers, or optical flow in the camera images. First stage can use feature detection methods like corner detectionblob detectionedge detection or thresholding and/or other image processing methods. The second stage restores a real world coordinate system from the data obtained in the first stage. Some methods assume objects with known geometry (or fiducial markers) present in the scene. In some of those cases the scene 3D structure should be precalculated beforehand. If part of the scene is unknown simultaneous localization and mapping (SLAM) can map relative positions. If no information about scene geometry is available, structure from motion methods like bundle adjustment are used. Mathematical methods used in the second stage include projective (epipolar) geometry, geometric algebrarotation representation with exponential mapkalman and particle filters, nonlinear optimizationrobust statistics.


Comments

So, this post shows you what is the e-banking, mobile security and beyond. Explains you how they work and how they help people. In this case, I can summarize some fact about this topic.
E-banking is a fully automatic service for traditionally banking customer’s products based on information technology platforms. E-banking services provide customer access to accounts, the ability to move their money between different accounts or making payments via e-channels.The advantages generated by this services have determined an accelerate developing of this industry over the entire world. This paper examines some of the advantages of electronic banking products together with the characteristic management issues generated by the implementation of this new channel for financial services delivery. But despite on such many advantages, there are some negative aspects like :

  • Not all online transactions are immediate;
  • Customer service can be below the quality that you're used to. Some people simply take comfort in being able to talk to another human being face-to-face if they experience a problem;
  • Before using a banking site that you aren't familiar with, check to make sure that their deposits are FDIC-insured. If not, you could possibly lose all of your deposits if the bank goes under, or its major shareholders decide to take an extended vacation in Switzerland.Yes, online banking is generally secure, but it certainly isn't always secure. Identity theft is running rampant, and banks are by no means immune. And once your information is compromised, it can take months or even years to correct the damage, not to mention possibly costing you thousands of dollars, as well.
In this article everyone can find some interesting and useful information about e-banking and mobile security.Thanks to our Mind Map a long list of monotonous information converts into a colorful, memorable and highly organized diagram that's really easy to understand and fix it in our readers' mind.








No comments:

Post a Comment