Mobile Banking Supported Operating Systems and Browsers

Total Page:16

File Type:pdf, Size:1020Kb

Mobile Banking Supported Operating Systems and Browsers Member FDIC Mobile Banking Equal Housing Lender Supported Operating Systems Suppo rted Opera tin g Sys tems and Br owse rs The following statements outline the scope of Mobiliti’s general device and operating system support. NOTE: Only major versions released directly by OEMs (Apple or any Android hardware manufacturer) are included. Any OS version updates or patch releases that are released by carriers are not included in the scope for certification. Operating System Minimum OS Maximum OS Hardware Browser Support Channel Version Version Requirements Support Support Support Android Android version 4.1 All later major version Remote Deposit Only the default installed Touch Browser (Jellybean) updates are supported; Capture support browser is supported. For for example 4.4, 5.0, 6.0 Android Application requires a camera of at the majority of devices least two mega-pixels this is the Android SMS in resolution. Browser Mobiliti does not For devices where support the use of the Chrome is the default Android “Developer browser, this will be options” settings supported. Beta versions of browsers, such as Chrome Beta, are not supported. The SMS channel is only supported for Android devices that have SMS capability. Member FDIC Mobile Banking Equal Housing Lender Supported Operating Systems Operating Systems Minimum OS Maximum OS Hardware Browser Support Channel Version Version Requirements Support Support Support iOS- iPhone iOS version 7.0 All later major version None Only the default installed Touch updates are supported; browser is supported . For Browser for example 8.0, 8.1, 9 all iPhone devices this is Beta releases of iOS the Safari Browser iPhone Application will not be supported Beta versions of all until they are publicly browsers, such as SMS released Chrome Beta, are not supported. BlackBerry BlackBerry OS BlackBerry OS None The browser channel is no SMS longer supported for non- version 4.2 (non- Version 5.1 Webkit capable BlackBerry touch screen devices devices) BlackBerry OS version 4.7 (touch screen devices) BlackBerry BlackBerry OS version 6 All later major version For touch browser Only the default installed Touch Browser updates are supported; support, devices must browser is supported for example 6.1, 7, 10 support Webkit SMS rendering (OS 6.0 and For all BlackBerry devices above) this is the BlackBerry browser Member FDIC Mobile Banking Equal Housing Lender Supported Operating Systems Operating Minimum OS Version Maximum OS Hardware Browser Support Channel Systems Support Version Requirements Support Support Windows Phone Windows Phone OS All later major version None Only the default installed Touch Browser version 8.0 updates are supported; browser is supported, third for example 8.1, 10.0 part browsers are explicitly SMS nor supported. For Windows Phone 8 devices, this is Internet Explorer 10 or above. For Windows Phone 7.5 devices, this is Internet Explorer 9. No Beta Versions are supported. All other operating N/A N/A None Only the default installed Touch Browser systems browser is supported SMS Devices that are specifically identified as not supporting Webkit compatible browsers are not supported. Where possible, devices will be directed to the Touch Browser Channel. Beta versions and third-party browsers, such as Opera, are explicitly excluded For all device types, only devices running an unmodified version of the manufacturer-supplied operating system are supported . .
Recommended publications
  • Mobile Customer Engagement and the Rise of the App-Based Banking
    MOBILE CUSTOMER ENGAGEMENT AND THE RISE OF THE APP-BASED BANKING LANDSCAPE APRIL 2019 | TATA COMMUNICATIONS © 2019 Tata Communications. All Rights Reserved. TATA COMMUNICATIONS and TATA are trademarks of Tata Sons Limited in certain countries. TRANSFORMATION: MOBILE MESSAGING EXCHANGE Contents A new golden age of mobile banking? ....................................................... 3 Creating the right service delivery channel ................................................ 4 What role will traditional SMS services have to play in a new banking landscape? ... 5 Finding a way forward ......................................................................... 6 Working with Tata Communications for Mobile Customer Engagement in the Banking Industry ................................................................................ 7 2 For more information, visit us at www.tatacommunications.com. © 2019 Tata Communications. All Rights Reserved. TATA COMMUNICATIONS Contact us Share and TATA are trademarks of Tata Sons Limited in certain countries. TRANSFORMATION: MOBILE MESSAGING EXCHANGE A NEW GOLDEN AGE OF MOBILE BANKING? The ubiquity of mobile phones has made them an ideal channel for mobile banking services. Research from Ovum indicates that retail bank investment into digital banking technology will achieve 5.2% CAGR (2018-2022) 1, It is to be assumed that a significant portion of this will target mobile banking applications and related services, and the growth rate is significantly higher than comparable investment in other IT areas, such as ATM, contact centre services or even fraud and security spending1. Emerging markets have proven particularly open to mobile banking services as the mobile infrastructures in these regions is often more advanced (and less expensive to deploy) than the fixed-line alternative. Traditionally SMS-based services have been the mainstay of mobile banking, but this has changed in developed markets with the advent of smartphones and the rise of the app economy.
    [Show full text]
  • How to Download Mega Files for Free How to Download Mega Files for Free
    how to download mega files for free How to download mega files for free. MegaDownloader is a unique online tool that allows users to download files directly in their devices from Mega.nz. As we all know that Mega is quite popular for storing heavy files on its cloud storage space but unfortunately it’s quite hard to download files directly in any device due to certain limitations. You can avoid all this lengthy process by simply using our MegaDownloader that will automatically grab the relevant files for you. Steps to use Mega Downloader. It won’t take more than a minute to download any customized file using MegaDownloader, All you need to do is just follow these simple and easy steps in a proper sequence as described below. Open the Mega URL and go to Mega.nz from your web browser. Open the file location in the Mega Dashboard and then Copy the link to the clipboard. Now Paste the download link in our Megadownloader by D4down and wait for few seconds of the file download. After some time, the automated download process will be initiated in your browser. You’re Done and Downloaded file in your Folder. Why choose Downloader for Mega? These are the following basic reasons that you should also consider wisely while choosing any Downloader for Mega. It offers a Superfast download speed that will save a lot of your precious time. You can avoid all the restrictions such as download limit using our online MegaDownloader. It doesn’t require any account access while downloading directly from Mega requires an active Mega account otherwise you won’t be able to download it.
    [Show full text]
  • How Ios 7 Stacks Up:Smartphone OS User Experience Shootout
    How iOS 7 Stacks Up: Smartphone OS User Experience Shootout a Pfeiffer Report Benchmark Project www.pfeifferreport.com @pfeifferreport Introduction Why is it that the arrival of iOS 7 Whether we like it or not, We do not look at features, we do not smartphones have become a compare cutting-edge options and is necessarily a momentous software game. Take any recent gadgets, we only look at aspects event for the smartphone top-of-the-line smartphone, and you that have a direct impact on the are likely to get a well-designed, fast, day-to-day user experience of an market? Simple: Unlike any other pleasant to use bit of hardware: fluid average, non-technical user. operating system out there, it will operation, responsive interaction, fast The aspects we have surveyed and be in the hands of millions or tens graphics. The difference of user rated are the following: experience, therefore, stems of millions of users within a few cognitive load, efficiency, almost exclusively from the customization, as well as user days after its launch. operating system, the user interface experience friction. Based on And that will make it a force to be design, the application integration, the the results from these benchmarks overall coherence. we have then established an overall reckoned with. This report compares the five Mobile Operating System User major mobile operating systems Experience Index presented at the * The question is, of course: in use today: iOS 7, iOS 6, Android , end of this document. Windows Phone 8, and Blackberry 10, The benchmarks are based on the How good is it really? and rates them in terms of user Pfeiffer Consulting Methodology experience.
    [Show full text]
  • Secure Data Sharing in the Cloud
    Eivind Nordal Gran Secure data sharing in the cloud Eivind Nordal Gran Eivind Nordal Master’s thesis in Communication Technology Supervisor: Colin Alexander Boyd, Gareth Thomas Davies & Clementine Gritti June 2019 Master’s thesis Master’s Secure data sharing in the cloud data Secure NTNU Engineering Communication Technology Communication Department of Information Security and Department of Information Faculty of Information Technology and Electrical Technology of Information Faculty Norwegian University of Science and Technology of Science University Norwegian Eivind Nordal Gran Secure data sharing in the cloud Master’s thesis in Communication Technology Supervisor: Colin Alexander Boyd, Gareth Thomas Davies & Clementine Gritti June 2019 Norwegian University of Science and Technology Faculty of Information Technology and Electrical Engineering Department of Information Security and Communication Technology Problem description: Data sharing using cloud platforms has become increasingly more popular over the last few years. With the increase in use comes a heightened demand for security and privacy. This project will conduct a thorough study of a key transport proto- col developed at NTNU, which targets strong security as its preeminent property, including a form of forward secrecy. More specifically, it will investigate how this escalation in security level affects the performance and usability of the protocol. How will the new protocol designed with security as its primary concern compare against other already established schemes when it comes to efficiency and practicality? Abstract Cloud sharing security is an important topic in today’s society. The majority of the most common cloud sharing solutions require that the user trust the Cloud Service Provider (CSP) to protect and conceal uploaded data.
    [Show full text]
  • A Survey Onmobile Operating System and Mobile Networks
    A SURVEY ONMOBILE OPERATING SYSTEM AND MOBILE NETWORKS Vignesh Kumar K1, Nagarajan R2 (1Departmen of Computer Science, PhD Research Scholar, Sri Ramakrishna College of Arts And Science, India) (2Department of Computer Science, Assistant Professor, Sri Ramakrishna College Of Arts And Science, India) ABSTRACT The use of smartphones is growing at an unprecedented rate and is projected to soon passlaptops as consumers’ mobile platform of choice. The proliferation of these devices hascreated new opportunities for mobile researchers; however, when faced with hundreds ofdevices across nearly a dozen development platforms, selecting the ideal platform is often met with unanswered questions. This paper considers desirable characteristics of mobileplatforms necessary for mobile networks research. Key words:smart phones,platforms, mobile networks,mobileplatforms. I.INTRODUCTION In a mobile network, position of MNs has been changing due todynamic nature. The dynamic movements of MNs are tracked regularlyby MM. To meet the QoS in mobile networks, the various issuesconsidered such as MM, handoff methods, call dropping, call blockingmethods, network throughput, routing overhead and PDR are discussed. In this paper I analyse the five most popular smartphone platforms: Android (Linux), BlackBerry, IPhone, Symbian, and Windows Mobile. Each has its own set of strengths and weaknesses; some platforms trade off security for openness, code portability for stability, and limit APIs for robustness. This analysis focuses on the APIs that platforms expose to applications; however in practice, smartphones are manufactured with different physical functionality. Therefore certain platform APIs may not be available on all smartphones. II.MOBILITY MANAGEMENT IP mobility management protocols proposed by Alnasouri et al (2007), Dell'Uomo and Scarrone (2002) and He and Cheng (2011) are compared in terms of handoff latency and packet loss during HM.
    [Show full text]
  • Mobile Banking Authentication Secures Your App Security Platform While Eliminating the Need for Hardware Tokens Or One-Time Passwords
    Account Entersekt Protection solutionsMobile 2015 Banking authentication The Entersekt Entersekt’s solution for mobile banking authentication secures your app security platform while eliminating the need for hardware tokens or one-time passwords. Our product, Transakt, lies at the center of all of our solutions. Transakt uses industry-standard digital certificates to deliver the strongest possible device identification. These can be combined with a PIN, password, or fingerprint scan to identify the user and enable easy yet secure access to your mobile banking app. Transakt also creates a secure communication channel between your financial institution and your customers’ mobile devices. This enables you to send real-time requests to your users to authenticate sensitive transactions. Their responses are digitally signed, supporting nonre- pudiation, then encrypted and returned. Because the Transakt channel is truly out of band, Transakt counters all phishing attacks, man-in-the- middle exploits, and other kinds of digital fraud. Your institution retains complete control over user registration, which is independent of mobile networks and SIM cards. If a user’s phone is stolen, the certificate is revoked, immediately rendering the application unusable. What makes Transakt deploys a unique X.509 digital certificate to each mobile device. This robustly Transakt unique? identifies the device and creates a secure, mutually authenticated connection between it and the Transakt Secure Gateway – a FIPS 140-2 Level 3 hardware appliance installed behind the bank’s firewall. Typical implementation Mobile device A security token is retrieved from the Transakt Secure Gateway via a completely out-of-band channel. This token is used to Mobile banking app App server authenticate transaction requests originat- Application request and token ing from the mobile banking app.
    [Show full text]
  • Sailfish OS Interview Questions and Answers Guide
    Sailfish OS Interview Questions And Answers Guide. Global Guideline. https://www.globalguideline.com/ Sailfish OS Interview Questions And Answers Global Guideline . COM Sailfish OS Job Interview Preparation Guide. Question # 1 Tell us what you know about Sailfish OS? Answer:- Sailfish is a Linux-based mobile operating system developed by Jolla in cooperation with the Mer project and supported by the Sailfish Alliance. It is to be used in upcoming smartphones by Jolla and other licencees. Although it is primarily targeted at mobile phones, it is also intended to support other categories of devices. Read More Answers. Question # 2 Explain Sailfish OS Components? Answer:- Jolla has revealed its plans to use the following technologies in Sailfish OS: The Mer software distribution core A custom built user interface HTML5 QML and Qt Read More Answers. Question # 3 Do you know about Sailfish OS software availability? Answer:- Sailfish will be able to run most applications that were originally developed for MeeGo and Android, in addition to native Sailfish applications. This will give it a large catalogue of available apps on launch. Considering upon Jolla's declarations that Sailfish OS is be able to use software from following platforms Sailfish (natively created + ported like from Qt, Symbian, MeeGo - developers have reported that porting a Qt written software with Sailfish SDK takes a few hours only) Android applications are directly running in Sailfish OS. They are compatible as they are in third-party Android stores, with no needed modification (in most cases). MeeGo (because of backward compatibility thanks to MeeGo code legacy included in the Mer core) Unix and Linux (as Sailfish is Linux then using such a software is possible, especially RPM packages, either in terminal/console mode or with limitations implying from using Sailfish UI, if not ported and adjusted) HTML5 Read More Answers.
    [Show full text]
  • Is Cloud Storage Secure? What Do the Providers Offer Concerning Security
    Step 3 Step 4 Check Your Provider's Stance on Privacy Audit Your Files and Remove or Encrypt and Encryption Sensitive Data Is Cloud Storage If there's anything you'd hate to lose, or any- Secure? Next, do a little digging to see how your thing you're worried an overzealous algo- cloud storage service handles privacy, and rithm may close your account over, it's time how committed they are to protecting your to either remove it from the cloud and store data. We touched on this a while ago for it locally, or encrypt it. some of the most popular services, but not Encrypting those files and archives with a all of them. password may make it more of a hassle to Check what access your provider gives itself access on other devices, especially on your to your data. Review the security they claim smartphone or tablet, but it's a huge security to offer as well. Some companies encrypt boost, especially if you use your cloud ser- your data at rest on their servers, and note vice for things like financial documents, that even they have no idea what you're stor- contracts, or...anything else. ing with them. Others reserve the right to access your data Step 5 whenever they choose, and use vague, hand- Consider Diversifying with Privacy- and wavy terms like "bank level security" when Security-Conscious Services they talk about encryption. Those are all bad signs, and generally mean Spread out your critical data to different ser- that they either don't take security seriously, vices so if one of them gets hacked, loses or don't think you're smart enough to.
    [Show full text]
  • Cloud Storage Augmentation with Multi User Repudiation and Data De-Duplication 1J.K
    J.K. Periasamy et al., International Journal of Advanced Engineering Technology E-ISSN 0976-3945 Research Paper CLOUD STORAGE AUGMENTATION WITH MULTI USER REPUDIATION AND DATA DE-DUPLICATION 1J.K. Periasamy, 2B. Latha Address for Correspondence 1Research Scholar, Information and Communication Engineering, Anna University, Chennai & Computer Science and Engineering, Sri Sairam Engineering College, Chennai, Tamilnadu, India. 2Professor and Head, Computer Science and Engineering, Sri Sairam Engineering College, Chennai,Tamilnadu, India. ABSTRACT One of the major applications of Cloud computing is “Cloud Storage” where data is stored in virtual cloud servers provided by numerous third parties. De-duplication is a technique established in cloud storage for eliminating duplicate copies of repeated data. The storage space is reduced and the capacity of bandwidth is increased in the server using Data De- duplication. It is related to intelligent data compression and single-instance data storage.To take the complexity out of managing the Information Technology infrastructure, the storage outsourcing has become the popular option. The latest techniques to solve the complications of protective and efficient public auditing for dynamic and shared data are still not secure against the collusion that is, the illegal agreement of the cloud storage server and the multiple user repudiation in workable cloud storage. Hence, to prevent the collusion attack in the existing system and to provide an effective global auditing and data integrity, the group user repudiation is performed based on ordered sequence of values commit and group signature is generated with secure hash algorithm. The group user data is encrypted using block ciphers and bilinear transformation. This work also introduces a new approach in which each user holds an independent master key for encryption using convergent keys technique and out sourcing them to the cloud.
    [Show full text]
  • Internet Self Service Faqs
    Internet Self Service FAQs General Questions .............................................................................................................................................. 2 What is Mobile Banking? 2 Is Mobile Banking secure? 3 Is my personal or financial information stored on my phone? 3 Are there fees to use Mobile Banking? 3 Which accounts can I access in Mobile Banking? 3 How current is the account and transaction information? 3 Can I add more than one mobile phone? 3 What if my phone number changes? 3 What if my phone is lost or stolen? 3 Which phones can I use for Mobile Banking? 4 Which mobile service carriers support Mobile Banking? 4 I have a prepaid plan. Can I use Mobile Banking? 4 How do I stop using Mobile Banking on my phone? 4 Registration Questions ..................................................................................................................................... 4 How do I get started with Mobile Banking? 4 Do I have to agree to the Terms and Conditions to use Mobile Banking? 4 Can I register multiple users to the same phone? 4 I received my activation code but never used it—what do I do now? 4 I haven’t received the activation code on my mobile phone. What should I do? 4 Alert Questions .................................................................................................................................................... 6 What are alerts? 6 What is the difference between the text messaging service and the alerts service? 6 How do I stop receiving alerts? 6 Text Messaging Service
    [Show full text]
  • Mobile Payments
    Mobile Payments - A study of the emerging payments ecosystem and its inhabitants while building a business case. By: Cherian Abraham Principal Analyst – Mobile Commerce & Payments Practice / Co-Founder - DROP Labs Twitter @ http://twitter.com/cherian abraham LinkedIn @ http://www.linkedin.com/in/cherianabraham For more information on this study and associated research, contact me at EXECUTIVE SUMMARY: The advent of the ubiquitous smart phone has along with it brought dramatic shifts in customer behavior and payment modalities. Banks are finding themselves in an unenviable position of choosing to wait until a secure and safe standard emerges for "Digital", or take the plunge in to these murky payment waters. There is a battle waging for the customer mind-share and emerging revenue streams, between traditional and non-traditional players - who are ever more emboldened by advances in technology and disappearing barriers to entry. The objective of this study is to build a business case for banks evaluating the opportunities and challenges present in building out mobile payment solutions, including direct and indirect revenue generation. This study paints a roadmap of current mobile payment initiatives undertaken by Financial institutions, MNO's and technology upstarts, and to highlight the risks of building payment solutions which are not centered on the payment context. This study summarizes the challenges ahead for mobile payments, including a lack of interoperability, consumer apathy and a general lack of understanding of its merits. It is targeted at financial institutions that may be making first steps, by building out their own mobile wallet initiatives or partnering with others, and seeks clarity.
    [Show full text]
  • A Comparative Analysis of Mobile Operating Systems Rina
    International Journal of Computer Sciences and Engineering Open Access Research Paper Vol.-6, Issue-12, Dec 2018 E-ISSN: 2347-2693 A Comparative Analysis of mobile Operating Systems Rina Dept of IT, GGDSD College, Chandigarh ,India *Corresponding Author: [email protected] Available online at: www.ijcseonline.org Accepted: 09/Dec/2018, Published: 31/Dec/2018 Abstract: The paper is based on the review of several research studies carried out on different mobile operating systems. A mobile operating system (or mobile OS) is an operating system for phones, tablets, smart watches, or other mobile devices which acts as an interface between users and mobiles. The use of mobile devices in our life is ever increasing. Nowadays everyone is using mobile phones from a lay man to businessmen to fulfill their basic requirements of life. We cannot even imagine our life without mobile phones. Therefore, it becomes very difficult for the mobile industries to provide best features and easy to use interface to its customer. Due to rapid advancement of the technology, the mobile industry is also continuously growing. The paper attempts to give a comparative study of operating systems used in mobile phones on the basis of their features, user interface and many more factors. Keywords: Mobile Operating system, iOS, Android, Smartphone, Windows. I. INTRUDUCTION concludes research work with future use of mobile technology. Mobile operating system is the interface between user and mobile phones to communicate and it provides many more II. HISTORY features which is essential to run mobile devices. It manages all the resources to be used in an efficient way and provides The term smart phone was first described by the company a user friendly interface to the users.
    [Show full text]