Mobile Money: Seven considerations before you build an app

Transcription

Mobile Money: Seven considerations before you build an app
White Paper
Mobile Money:
Seven considerations
before you build
an app
January 2013
Share this White Paper
Contents
Introduction3
1.An app is not enough: understanding the mobile 4
money ecosystem
2.Build or buy: the pros and cons of off-the-peg apps
6
3.What your customers want: robust security plus ready access
8
4.The vault: understanding the secure element
10
5.What is a wallet? And is it what your customers need?
12
6.From the app backwards: minimising PCI exposure
14
7.How creativity can overcome standards conservatism
16
Next steps
17
2
Introduction
Money is inherently mobile, but it is only a recent innovation
that has seen money handled on a mobile phone. With the
rapid growth of the smartphone, it has become an obvious
advance for many companies to give their customers access
to services via their mobile device. From banking to bills,
purchasing to payments, apps are appearing to manage many
of the financial aspects of our daily lives.
Producing a successful, secure money application
is not a simple business. It’s not a feat that can be
achieved by a simple app developer working in
isolation. A successful mobile money app requires
the input and support of multiple suppliers and
stakeholders from across the mobile money
ecosystem. And it requires many different aspects
of design and technology to be addressed.
This white paper provides a guide to seven of
the key areas of successful mobile money app
development that Penrillian has come to
understand through extensive experience in the
space. It’s not an exhaustive checklist, but address
these key issues and you will be well on the way to
creating an application that is successful for your
business and appreciated by your customers.
‘Producing a successful,
secure money application is
not a simple business. It’s not
a feat that can be achieved
by a simple app developer
working in isolation.’
3
1.An App is not enough: understanding
the Mobile Money ecosystem
Think about the water that comes out of your tap. It has had a
pretty fantastic journey to get there. Just starting from the falling
raindrop, you have to consider a journey that takes in a river, a
reservoir, processing, pumping, miles of pipe and household
plumbing, plus the companies that own and operate these
various elements. Were it not for all this hidden effort, your tap
is going to deliver very little.
What is true for the tap is also true for mobile money
apps. If anything the mobile money ecosystem is
more complex than that which delivers fresh water.
Building a successful mobile money application
means navigating this ecosystem and ensuring
that all of the relevant parties work together. Or
having a partner who can do this on your behalf.
Some of the key parties and components to
consider include:
• N
etwork operator – Carries the traffic two and
from the phone, and usually has a primary billing
relationship with the phone owner
• S
IM provider – Controls the technology on
board the card that the operator uses to securely
govern access to the network
• S
ecure element – The location in which secure
payment data is stored on the device, be it part
of the handset, or the SIM, or a dedicated SD
card
• P
ayment cardlet (e.g. Mobile MasterCard
PayPass) – The underlying application logic
behind the making of a payment on the device
• T
rusted Service Manager (TSM) – A secure
delivery system connecting the Secure Element
to the service operator Card/Payment Provider
– the financial institution handling the
transactions and accounts
• S
ecurity Advisors and Authorities – A selection
of advisors and approvals will be required
before a mobile money service can be (safely)
launched
4
1. (Continued) An App is not enough:
understanding the Mobile Money ecosystem
In many cases while the interfaces between these
providers may be available in theory, in practice
much work is needed to make them communicate
effectively. For example, one issue Penrillian has
faced is that Application Programming Interfaces
(APIs) have often been constructed with the
desktop web in mind.
The differences between the desktop environment
and mobile in terms of browser capabilities,
connection speeds and reliability means these are
usually unsuitable for the mobile environment.
When you can’t demand a complete rebuild of a
partner’s infrastructure, you need to find ways to
negotiate between different standards with the
requisite level of performance and security.
‘When you can’t demand a
complete rebuild of a partner’s
infrastructure, you need to find
ways to negotiate between
different standards with the
requisite level of performance
and security.’
This is where a partner like Penrillian can help, but
the key message here is this: no one partner in this
ecosystem can deliver a successful mobile
application on their own. All parties must collaborate
effectively to meet the customer’s expectations.
‘In many cases while the
interfaces between these
providers may be available
in theory, in practice much
work is needed to make them
communicate effectively.’
5
2.Build or buy: the pros and cons of
off-the-peg apps
When shopping for a new suit, few people consider a tailor over
the high street these days. The upfront cost and production
time may be off-putting when set against the instant gratification
of an off-the-peg purchase.
But a tailored suit will always be a better fit to your
shape, can be adapted as that shape changes,
and will most likely be made from higher quality
materials. In the long term, the tailored suit can
prove to be better value.
The same rules apply when it comes to developing
new applications, particularly in the field of mobile
money. Off-the-peg applications are available,
provided by a third party with some elements of
the ecosystem already in place, and a skinnable
application that can have you up and running
quickly.
The next risk is security: a recent study by Leibniz
University in Hannover and Philipps University of
Marburg found more than a thousand Android
applications with serious security flaws out of a
sample of 13,000. 17% of the apps that used the
secure socket layer (SSL) standard had it wrongly
implemented, leading to significant security risks.
If your needs are fairly straightforward and match
the capabilities of the application available, then
this is a reasonable route forward. But it is not
without its risks: handing over this level of control to
a third party limits a number of your powers.
The first of these is the ability to make changes: if a
third party is catering for multiple customers on the
same platform, their development is always going
to be focused on the needs of the many, not your
needs specifically. Development can be slower
and more costly as a result.
‘17% of Android apps that
use SSL have it wrongly
implemented, leading to
significant security risks.’
6
2. (Continued) Build or buy: the pros and cons of
off-the-peg apps
The final issue to consider is lock-in: if it is not just
your app, but the entire supporting ecosystem that
is dependent on a third party, there is no opportunity
to chop and change components, or connect to
additional services without their say-so. As time
passes, it’s possible that your requirements and
the service on offer will drift further and further
apart. And all the while, you will be paying the
licence costs on the intellectual property retained
by the solution provider.
While the mobile money ecosystem is complex, it
is navigable. Off-the-peg solutions do have
benefits but in the long term, a bespoke platform
can offer significant financial and operational
advantages.
Consider the alternative. For one of the major
European network operators Penrillian constructed
an entirely bespoke application and gateway to
interface with the payment partner’s systems. The
delivery time was comparable with an off-the-shelf
solution, and calculated over the first two years of
the service’s life, so were the costs. The operator
now has its own intellectual property, and an app
and gateway that it controls. It can switch payment
providers or add other partners into the system on
its timetable, rather than lobbying a third party to
deliver.
‘...Penrillian constructed an
entirely bespoke application
and gateway to interface
with the payment partner’s
systems. The delivery time
was comparable with an
off-the-shelf solution, and
calculated over the first
two years of the service’s
life, so were the costs.’
7
3.What your customers want:
robust security plus ready access
When it comes to handling their money, consumers are rightly
concerned about security. But they will balance this concern
with usability: what good is mobile money if you can’t access it
when you need to? Striking this balance is a major challenge for
the app designer.
Consider the primary ways of paying before mobile
money: cash or card.
For small transactions cash is very convenient.
Grab a note or a handful of change and hand it over
and you’re done. There’s always the risk that you
might lose that cash (or have it stolen) but the
convenience means that we all keep a small
amount to hand most of the time. And we can tailor
our level of risk by choosing how much cash to
carry.
Mobile money applications need to offer users the
same gradations of security. For small transactions
we want the readiness of cash. For larger
transactions, the protected flexibility of a card. By
tiering security features such as maximum
transaction values and PIN confirmations, to match
the transaction value, it is possible to offer users a
well-structured balance between security and
usability.
The risks of the card are very different. If a card is
truly compromised the losses can be large but they
will usually be losses to the bank not us as
individuals. If cards are lost we can cancel them
remotely and fraudulent transactions can be
charged back. Cards are much more convenient
than large bundles of cash for larger transactions.
‘The risks of the card are very
different. If a card is truly
compromised the losses can
be large but they will usually
be losses to the bank not us
as individuals.’
8
3. (Continued) What your customers want:
robust security plus ready access
There is another aspect to security to consider, and
it is one that very much concerns users: personal
data. By their very nature, mobile money
applications collect a colossal amount of very
intimate detail about our personal lives. We don’t
just need to protect users’ money; we need to
protect the knowledge of how they spend it from
external access and improper use.
‘Cash is convenient, but cards are
more secure for large transactions.’
The GSM Association has produced guidelines on
privacy that address the issues associated with the
collection and retention of personal data by
applications, based on international data protection
law (http://www.gsma.com/publicpolicy/privacydesign-guidelines-for-mobile-applicationdevelopment/). Under these guidelines financial
transaction data falls under the strictest level of
control, since it arguably touches every aspect of a
person’s life, including their health (an area of
particular sensitivity).
Ensuring compliance with these guidelines, and
providing the appropriate level of security and
usability, comes down to careful design of the
whole application and supporting infrastructure.
‘The GSM Association has
produced guidelines on
privacy that address the issues
associated with the collection
and retention of personal
data by applications, based
on international data
protection law.’
9
4.The vault: understanding the
secure element
One opportunity for money applications on mobile devices is
the actual replacement of cash via Near Field Communication
(NFC)-enabled devices. There’s a great appeal in the simplicity
of swiping your phone over a terminal to pay for goods, and
managing the money available in your virtual wallet using the
phone’s interface.
For a start you would never need to go hunting for a
cash point again. But this simplicity of use needs to
be balanced against security, and so the NFC
architecture defines a means for keeping the
payment data secure.
The Secure Element typically runs as a native
application on a smartcard. These applications,
known as ‘Cardlets’, use the Java Card format
designed for very low powered computing devices.
The smartcard may be:
The ‘Secure Element’ is the smart vault on your
mobile device that handles this task. A dedicated
chip designed for the purpose of storing encrypted
card information and running secure applications,
the Secure Element sits apart from the rest of the
device, safe from the risks that users take with their
smartphones every day: open social networks,
untrusted websites and dodgy applications.
• B
uilt into a device – an approach that has been
taken by the likes of Samsung and Google with
their recent phones.
• Part of the SIM card – a relatively trusted
environment in its own right – adopted by some
mobile operators.
• A
standalone plugin card for the device in the
common SD card format.
‘The ‘Secure Element’ is the
smart vault on your mobile
device that handles this task.’
10
4. The vault:
understanding the secure element
The device interfaces with the Secure Element via
an API specific to the handset operating system,
and each takes a slightly different approach to
security. Android has the SmartCard API for
Android, secured via user permissions: an
application can only access the Secure Element if
the user explicitly gives it permission on installation.
By contrast, RIM’s Blackberry requires all
applications requiring smartcard access to be
‘signed’ with code keys requested from RIM by the
developer.
‘Secure NFC payments could
mean the end for cash points.’
The main thing to understand is that the smartcard
is distinct from the handset operating system, and
that access to it and the Cardlets running on it, is
protected. In this manner the Secure Element can
remain secure and trusted by the rest of the
payment ecosystem.
‘The device interfaces with
the Secure Element via an
API specific to the handset
operating system, and each
takes a slightly different
approach to security.
Android has the SmartCard
API for Android, secured
via user permissions: an
application can only access
the Secure Element if
the user explicitly gives it
permission on installation.’
11
5. What is a wallet? and is it what your
customers need?
When a new technology begins to displace an old one, it’s
tempting to use the old terminology to help familiarise people
with the new. Hence the term ‘wallet’ has become rather popular
when referring to mobile money. But what is a ‘wallet’ in digital
terms, and what should it be?
Both O2 and Google have called their mobile money
applications ‘Wallet’ but the two applications are
very different.
• O
2’s wallet relies on you, the user, loading money
onto O2’s own payment platform – essentially a
pre-pay card – before you can make payments.
This is a wallet in the pure cash sense: you are
effectively loading up your purse with cash from
your account before going out shopping.
• G
oogle’s Wallet is much more like the one in
your back pocket: it contains all of your different
accounts and cards, enabling you to select the
right one for each purchase. But it achieves this
through a little sleight of hand – all the
transactions actually take place through a single
MasterCard account created when you sign up
for the wallet, and are then rebilled to the relevant
card.
‘Not everyone is going to like
the idea of creating yet
another account, and
certainly not all of the major
card issuers are happy
at the prospect of being a
further step removed from
the transaction.’
12
5. (Continued) What is a wallet?
And is it what your customers need?
Not everyone is going to like the idea of creating yet
another account, and certainly not all of the major
card issuers are happy at the prospect of being a
further step removed from the transaction. It would
seem like the ideal wallet is one that securely
manages the various payment options at the user’s
disposal but allows each to natively make the
payment when it is selected. This adds convenience
and security, and unifies access to the underlying
hardware required to make NFC payments happen.
In technical terms this means controlling the
download and installation of new payment
applications and their associated Cardlets on the
Secure Element.
‘A true mobile wallet enables the
user to choose the right payment
card for each transaction.’
One example of such a wallet is the ISIS scheme in
the US (http://www.paywithisis.com).
It is this type of wallet that needs to be taken into
consideration when planning your mobile money
application. Consumers will continue to use
multiple methods of payment, and will expect their
payment applications to make it easy for them to
choose the right option at the right time. Your
application needs to be designed today to be
discoverable and manageable by a standardised
‘Wallet’. As standards for mobile wallets emerge,
you will need to keep pace by updating your app.
‘...the term ‘wallet’ has
become rather popular when
referring to mobile money. But
what is a ‘wallet’ in digital
terms, and what should it be?’
13
6.From the app backwards:
minimising PCI exposure
The payment industry is understandably strict about securing
the movement of money. The card schemes enforce control on
almost every aspect of the mobile money ecosystem, and part
of that control comes in the form of the Payment Card Industry
Data Security Standard or PCI DSS.
These six letters strike fear into the hearts of many
application developers. Horror stories of long,
expensive testing and approval processes and
worse, failures, abound. But PCI DSS does not
need to be burdensome. In fact its impact on a new
mobile money application can be minimised,
without compromising security.
Fundamentally, complying with PCI DSS means
avoiding the loss of account data – be it names,
addresses, numbers, or PIN codes – at any point.
So the more you can avoid the need to accept,
store and transmit account data, the less you will
need to do in order to achieve compliance.
To understand how, you need to understand in
basic terms what the standard is setting out to
avoid. The PCI Security Council defines three key
objectives with regards to securing mobile money
applications:
• Objective 1: Prevent account data from being
intercepted when entered into a mobile device
• Objective 2: Prevent account data from
compromise while processed or stored within
the mobile device
• Objective 3: Prevent account data from
interception upon transmission out of the
mobile device
‘...PCI DSS does not need to
be burdensome. In fact its
impact on a new mobile
money application can be
minimised, without
compromising security.’
14
6. (Continued) From the app backwards:
minimising PCI exposure
With regards to storing data, the Secure Element
provides much of the answer here. This highly
secure vault on the phone should contain every
piece of account data that we need to complete a
transaction. Everything else that is stored should
exist behind the walls of the web service with which
the application interacts – often already tested and
approved. So our focus needs to be on minimising
the entry and transmission of data.
This focus fits very well with the goals for any mobile
application: nobody wants to enter reams of data
on a small screen. And moving large amounts of
data back and forth over the airwaves is slow and
expensive. So ensuring that data entry and
transmission is minimised not only adds to the
security of the application, it adds to its efficiency
and performance.
Careful design can pare back the requirements for
data entry and transmission to a minimum, limiting
the opportunity for interception and capture. But
there is one more source of data that needs to be
addressed when protecting a mobile money
application, and it is one that is rarely considered:
error messages and error logs. Detailed error
messages explaining why an interaction with the
application, or the web services behind it, has
failed, are useful in development. But they are also
useful to those trying to crack the system.
Restricting these error messages and logs to a
bare minimum further reduces the opportunity for
attack.
Keep the flow and storage of data across the
application and its back end to an absolute
minimum, and you can also minimise the pain of
PCI compliance.
‘Detailed error messages
explaining why an interaction
with the application, or the
web services behind it, has
failed, are useful in development.
But they are also useful to
those trying to crack the
system. Restricting these error
messages and logs to a bare
minimum further reduces the
opportunity for attack.’
15
7.How creativity can overcome
standards conservatism
Unless you are an investment banker, it’s natural to be a little
conservative when dealing with other people’s money. That
natural conservatism can lead to very procedural thinking. If
there are standards: follow them. If something has been done
before that worked: do it again.
The problem with this approach is that while it is
‘safe’ it is likely to lead to unremarkable results. And
in a fresh, new, but already competitive market like
mobile money, remarkable is exactly what you
need to be. To be anything else is far from safe.
On this basis, standards need to be treated rather
like the rules of football. They have to be obeyed
but they leave plenty of opportunity for flair play, for
those that are capable.
‘... in a fresh, new, but already
competitive market like mobile
money, remarkable is exactly
what you need to be.’
16
Next steps
The smartphone will replace the physical wallet. As more
payment options and other smartcards for loyalty points and
travel move over to the mobile, the physical wallet will become
redundant. This presents an opportunity for companies to
establish patterns of consumer behaviour, as people choose
their new preferred payment options.
There are barriers to entering the market today but
as we have aimed to show with this paper, they are
far from insurmountable. And working with a
partner like Penrillian that knows the market space
intimately, it’s possible to overcome them rapidly at
reasonable cost.
Not only that: there is room for innovation. Few of
the true opportunities for mobile money have yet
been explored. Standards do not have to be seen
as restrictions: rather they just define the rules
within which creativity can take place. Off the peg
applications may tick the box today but they leave
little room for competitive advantage in the longer
term.
About Penrillian
Founded in 2000, Penrillian is now one of the
most experienced specialist mobile software
development companies in the world.
We develop bespoke software solutions and over
the years we have developed an impressive range
of applications and software for some of the
leading brands in mobile. For example:
If you’ve ever used a Vodafone data dongle,
purchased goods using your phone, bought 2-for-1
cinema tickets on Orange Wednesdays from a
BlackBerry, or managed a T-Mobile account from
a phone, chances are we created the software.
Nowadays, we are helping our customers remain
at the forefront of technology by creating the next
generation of secure mobile services and payment
apps for operators, banking, payment providers,
and financial services. Working with clients across
multiple business sectors, our software is helping
to engage users and drive revenue and retention.
If you are considering an
entry into the mobile
money market, talk to
Penrillian today on
44 (0) 1768 214400
17
Penrillian
Clint Mill
Cornmarket
Penrith
CA11 7HW
United Kingdom
Email: [email protected]
Tel: 44 (0) 1768 214400
Web: www.penrillian.com
© 2013 Penrillian mobile phone software developers - All rights reserved.
Follow us