Smart Card/Smart Mobile Internet The

Total Page:16

File Type:pdf, Size:1020Kb

Smart Card/Smart Mobile Internet The Smart Card/Smart Mobile Internet The SIM - a Secure Device Really Gets Smart by Klaus Vedder, Executive Vice-President and Head of the Telecommunications Division, Giesecke & Devrient Abstract Mobile Internet applications, such as on-line banking, are growing in importance in the Latin American market. GSM, although not yet an important factor in Latin America, promises to grow rapidly due to Brazils decision to allocate the frequency band used by GSM for new mobile services. In this context, the smart card chip, the SIM module, is sure to be widely used as a base for new GSM, security sensitve, applications in the region. In this article the history and development of the SIM module and its applications "toolkit," is traced. Since its conception 12 years ago the Subscriber Identity Module (SIM) has undergone continuous development extending its technical and functional capabilities. The SIM, a computer with memory on a chip, is normally found embedded in a plastic card, a Smart Card, similar to a standard credit card. The SIM microprocessor is what makes a Smart Card smart. Initially, the SIM was developed for use as a security module for the authentication of the subscriber/ user on the network used, for example, for credit card transaction and other security related functions. The SIMs limited memory contained private data about the user and about the network (a list of preferred networks and abbreviated dialing numbers). In the early days of GSM (Global System for Mobile Communication) mobile phones, smart cards were still in their infancy. The technological and market requirements of GSM and its need for a global solution have, from the very beginning, contributed enormously to the advancement of the smart card as such. Undoubtedly, GSM has been the driving force in the world of smart cards, influencing such developments as the plug-in SIM, the 3 Volt SIM, the increased technical performance of the chip and the very large increase in memory over the years. GSM was the first, and still is the only global application employing smart chip cards. It is also the application with the largest number of users. Though the primary use of the SIM is still as a security device, todays SIMs, by exploiting the microcomputer to its full extent, can be used as a platform for value added services. The original SIM chips had less than 10 Kbytes of memory, but SIM chips will soon have more than 100kBytes of memory making them suitable for a wide variety of applications. Co-operation between operators and manufacturers in standardisation bodies such as SMG9 has resulted in greater functionality for the SIM chip. The enhanced chips, together with SMG9s toolbox (referred to as SAT or STK) for developing specific applications, gives operators greater flexibility to tailor applications for their own markets and needs. Used in this way, each operator implementing his own applications and services, the SIM becomes an important tool for GSM operator differentiation. Although the idea of using the SIM as a Personal Computer for "wireless" information was first discussed as early as 1991, the time was not ripe for standardising such an approach. A number of GSM network operators developed the idea on their own and downloading data, over the air, to update the SIM became a reality. One such SIM application is a Directory service, whereby a requested telephone number is sent via Short Message Service to the SIM, announced to the subscriber in speech mode, and stored in the device future use. Transmitted data can now be used to remotely create new data-fields in SIMs to allowing them to support services that were not available when the SIM was originally programmed. There are too many issuer specific applications based on the SIM Application Toolkit to list. Among the applications developed for the SIM, Internet access, mobile banking and location dependant services are among the most popular. A SIM Internet browser provides the basis for mobile phone Internet communication. When using a SIM Internet browser, specific applications need not reside on the SIM chip but can be controlled by the contents of a web page and rely upon databases residing on the Internet. Thus, a wide variety of applications can be made available to the subscriber without modifying the basic application of the SIM itself. Up and running applications even include on-line brokerage - an application that requires a high level of security. WAP, the wireless access protocol, provides great computing power, especially in conjunction with facilities such as GPRS (General Packet Radio Service) that allow information to be efficiently sent and received across a mobile telephone network. The clear advantage of the SIM, however, is its inherent security. The SIM can store and handle subscriber specific security data and run the relevant security processes. The SIM is particularly important for financial transactions, or applications involving data privacy, since it is a secure device that positively identifies the individual subscriber. The question is not "Should it be a WAP or SIM application?" But How can WAP and the SIM Toolkit best work together? Location Dependent Services have a wide variety of uses. They can be used, for instance, to provide information about the films shown in the users vicinity. The SIM application requests area information from the local operator and then sends a short message asking the network to list the films shown in that area or to give the location of a film requested by the user. The communication between the user and the SIM, via the display and keyboard of the mobile equipment, is part of the interactive SIM Toolkit application. This service can be used not only to request information, but to simultaneously order and pay for the tickets as well using the same short message service. This way, there is no need to show up at the cinema hours in advance. Payment could be made via credit card or through an account administered by the network operator. Mobile Banking services have to be completely secure to be successful. SIMs provide a comprehensive security solution. Mobile Banking services typically allow the user to check the balance of his account and to transfer money from his account to any other. This is done by means of a short message set up by the SIM Toolkit application in an interactive, mobile equipment independent, session with the user. The SIM drives the display and captures the necessary information from the user. Money transfer requires a high level of security, so the access to the SIM application must be protected. This can be achieved using a separate banking PIN (personal identification number) which the user must key in order to access to the application. This, alone, is not enough to protect the transaction; the short messages containing the transaction information must also be protected. Typically, contents of all Mobile Banking transaction messages - in both directions - must also be encrypted using "triple DES," a method commonly used in the banking world to ensure message security. In order to guarantee end-to-end security between the SIM and the banks server, to protect against eavesdropping and criminal interference, a series of other security measures are also employed. The industry standardisation group, SMG9, has developed a common security standard as a guide to using the short message service with SIM applications in a secure manner. This standard also includes a method for downloading applications to the SIM. To make service enhancements easily available SIM, and mobile equipment supplier, independent tools and mechanisms needed to be standardised. The SMG9 group has been working since 1994 on such items as the specification for downloading data over the airwaves into the SIM and, as well, on making the SIM "pro-active" so that it can trigger events to be executed by the mobile equipment (ME). These functions formed the basis for a new standard for the SIM Application Toolkit (GSM 11.14). Less than a year and a half after the initial discussions within SMG9, the first version of the new SIM toolkit standard was approved. It defined the set of commands and procedures - additions to the basic SIM-ME interface for "normal" operational use - required for mobile-equipment-independent applications running on a SIM. In the course of developing this standard, the scope of the work had broadened significantly. A powerful toolbox full of aids were added to data-download and the pro-active SIM features originally considered. Examples of these tools include the provision of local information such as cell number and timing advance, the setting of timers in mobile equipment, interactions with a second card reader to, for example, load money over the air into an electronic purse card, the support of colour icons, call control and the sending of short messages to communicate with network applications. Conclusion This treatment of the mobile equipment and the SIM as separate entities has contributed greatly to the success of GSM. This split has given the issuer of the subscription complete control over all subscription and security related data by allowing issuer-specific security algorithms and provisions. The SIM has proven itself, in practice, to be a truly secure device and has thus greatly enhanced the security of the overall system. Furthermore, it allows the user to maintain his identity information when changing terminals or, to some extent, technology. The split between mobile equipment and SIM has had large impact on the terminal market. Since the terminal does not contain any subscriber data, the terminal market has moved from a local to a global one, providing a hitherto unknown economy of scale to the terminal manufacturers. As a result, competition has given consumers much greater choice - making GSM more and more attractive to an ever-increasing number of people.
Recommended publications
  • NEURAL COMPUTING 17 Sailee Chitre – T.Y.B.Sc
    Our Vision is to establish a leading centre of imparting Quality Education in the field of Science, Commerce and Management with emphasis on: ensuring that students learn the fundamental concepts in various disciplines. motivating students to apply the Scientific & Technological knowledge to develop problem solving capabilities. making students aware of the societal and environmental needs with specific appreciation of the emerging global context. Our mission is to provide : an educational environment where students can reach their full potential in their chosen discipline and become responsible citizens without compromising in ethics a scholarly environment where the talents of both, the faculty members and students are nurtured and used to create knowledge and technology for the benefit of the society. 1 INDEX Sr. No. Topic Page No. 1. 3D PASSWORD FOR MORE SECURE AUTHENTICATION 3 Manisha Patel – T.Y.B.Sc IT 2. ARTIFICIAL INTELLIGENCE IN PROGRAMMING 5 Jay Bhosale – T.Y.B.Sc. IT 3. COMPUTER THAT YOU CAN WEAR 9 Shailendra Mane – T.Y.B.Sc. IT 4. ETHICAL HACKING 12 Manali Darandale – T.Y.B.Sc. IT 5. FOOT PRINTING 14 Bhavesh Naik – S.Y.B.Sc IT 6. NEURAL COMPUTING 17 Sailee Chitre – T.Y.B.Sc. IT 7. ORGANIC LIGHT EMITTING DIODE DISPLAY 20 Angad Anand – T.Y.B.Sc. IT 8. VERIZON 4G LTE NETWORK 23 Dhaval Jain – T.Y.B.Sc. IT 9. MEEGO 25 Nivedita Tikadar – T.Y.B.Sc IT 10. A CHANGE FROM IPv4 TO IPv6 33 Vivek Kapadia – S.Y.B.Sc.I.T 11. BLACKBERRY MESSENGER 36 Rahul Nayak – S.Y.B.Sc.I.T 12.
    [Show full text]
  • Mobile SIM-Based Medical Applications
    Mobile for Development mHealth Mobile SIM-based Medical Applications Michael J. Kleeman, Martin Harris and James Erasmus February 2015 Table of Contents Executive summary ............................................................................................................................................................................................................ 4 A SIM-based approach for medical applications ......................................................................................................................................................... 5 The benefits of SIM-based medical applications ........................................................................................................................................................ 6 Other related applications of SIM technology and current mHealth approaches ........................................................................................... 8 Comparison of existing mHealth applications .............................................................................................................................................................. 8 Comparative mobile communication channels ............................................................................................................................................................ 9 Roles of the various actors ...........................................................................................................................................................................................10
    [Show full text]
  • Assessment of Today's Mobile Banking Applications from the View
    Munich Personal RePEc Archive Assessment of Today’s Mobile Banking Applications from the View of Customer Requirements Pousttchi, Key and Schurig, Martin University of Augsburg 2004 Online at https://mpra.ub.uni-muenchen.de/2913/ MPRA Paper No. 2913, posted 25 Apr 2007 UTC Pousttchi, K.; Schurig, M.: Assessment of Today’s Mobile Banking Applications from the View of Customer Requirements. Copyright 2004 IEEE. Published in the Proceedings of the Hawai'i International Conference on System Sciences, January 5 – 8, 2004, Big Island, Hawaii. (Preprint) Assessment of Today’s Mobile Banking Applications from the View of Customer Requirements Key Pousttchi Martin Schurig University of Augsburg, Chair of Business Tecways AG Informatics and Systems Engineering (WI2) e-mail: [email protected] e-mail: [email protected] Abstract restraint affects notebooks and sub notebooks, which are easily transportable, but whose use is typically stationary. The typical connection for these mobile devices up to Mobile banking is a subset of electronic banking which now is realized through mobile communication. Most underlies not only the determinants of the banking busi- relevant is GSM/GPRS, also typical are comparable 2G ness but also the special conditions of mobile commerce. standards (e.g. IS-136, IS-95) and soon will be evolving This paper analyzes customer needs and expectations 3G-technologies (EDGE, CDMA-2000, UMTS). We do from the mobile applications’ view and from the banking not focus on WLAN scenarios. The use of a banking view in order to derive a defined set of requirements. application on a laptop computer with a WLAN connec- Based on these results, existing mobile banking applica- tion underlies the rules of electronic banking, not the tions are assessed.
    [Show full text]
  • Overcoming Channel Bandwidth Constraints in Secure Sim Applications
    OVERCOMING CHANNEL BANDWIDTH CONSTRAINTS IN SECURE SIM APPLICATIONS John A. ~ac~onald',William sirett2 and Chris J. itch ell' '~nformationSecurity Croup, Royal Holloway, University of London, Egham, Surrey TW20 OEX, UK; '~rnartCard Centre, Information Security Croup, Royal Holloway, University oj London, Egham, Surrey TW20 OEX, UK. Abstract: In this paper we present an architecture based on a Java (J2SE, J2EE, J2ME and Java Card) platform supporting a secure channel from a Mobile Operator to the SIM card. This channel offers the possibility of end to end security for delivery of large data files to a GSM SIM card. Such a secure channel could be used for delivery of high value content that requires a high bandwidth channel - perhaps either rendered for user infotainment, or processed in the client Mobile Station (device and SIM card) for remote device management. Our methodology overcomes the bandwidth constraints of the SIM Toolkit Security scheme described in GSM standard 03.48. To validate our proposal we have developed code to create DRM and Web Service test scenarios utilising readily available J2ME, Java Card, J2SE and J2EE platforms, Web Services tools from Apache, the KToolBar emulator from Sun, and a Gemplus Java Card. Keywords: J2ME, Java Card, SAT Security, SIM card, Web Service Security, DRM. 1. INTRODUCTION Since its inception in September 1994, the SIM Application Toolkit (SAT) (3GPP TS 3 1.1 11,2004; GSM 11.14, 2001) and SIM Toolkit Security (3GPP TS 03.48, 2001) have been used extensively. They are primarily used to securely transfer device and network management information and simple 540 John A.
    [Show full text]
  • SIM Application Toolkit
    SIM Application Toolkit For the Following Multi-Tech Products External Wireless MultiModem® EDGE (MTCBA-E) External Wireless MultiModem® EDGE with USB (MTCBA-E-U) External Wireless MultiModem® EDGE with Bluetooth Interface (MTCBA-E-B) External Wireless MultiModem® EDGE with Ethernet Interface (MTCBA-E-EN) External Wireless MultiModem® EDGE with GPS Functionality (MTCBA-E-GP) Embedded Wireless SocketModem® EDGE (MTSMC-E) AT Commands Reference Guide Copyright and Technical Support SIM Toolkit AT Command Reference Guide For the Following Multi-Tech Products External Wireless MultiModem® EDGE (MTCBA-E) External Wireless MultiModem® EDGE with USB (MTCBA-E-U) External Wireless MultiModem® EDGE with Bluetooth Interface (MTCBA-E-B) External Wireless MultiModem® EDGE with Ethernet Interface (MTCBA-E-EN) External Wireless MultiModem® EDGE with GPS Functionality (MTCBA-E-GP) Embedded Wireless SocketModem® EDGE (MTSMC-E) S000391C, Revision C Copyright This publication may not be reproduced, in whole or in part, without prior expressed written permission from Multi- Tech Systems, Inc. All rights reserved. Copyright © 2005-7 by Multi-Tech Systems, Inc. Multi-Tech Systems, Inc. makes no representations or warranty with respect to the contents hereof and specifically disclaims any implied warranties of merchantability or fitness for any particular purpose. Furthermore, Multi-Tech Systems, Inc. reserves the right to revise this publication and to make changes from time to time in the content hereof without obligation of Multi-Tech Systems, Inc. to notify any person or organization of such revisions or changes. Record of Revisions Revision Date Description A 10/14/05 Initial release. B 01/04/06 Added list of products that use these commands.
    [Show full text]
  • HUAWEI S7 Tablet Product Description 1
    HUAWEI S7 Tablet Product Description 1 Product Overview HUAWEI S7 Tablet (hereinafter referred to as the S7) is an information terminal developed by HUAWEI. It integrates the applications and services such as local applications, mobile broadband network services and home network services. With the AndroidTM open source operating system and embedded 3G module, the S7 expands various user applications besides the basic 3G communication services, and supports classification and dragging of the home screen elements. Providing convenient and quality services such as picture, audio, video, network, and information services, the S7 serves as good assistant and partner of your daily life. The S7 has a stylish appearance and a portable design. With a full touchscreen, an ultra-thin design, and a silver metal rim, the S7 presents a stylish and technically appealing appearance. The figures are provided only for reference. For details, see the actual product. Features Seven-inch TFT full touch screen Mobile network technology: GSM/WCDMA/Wi-Fi HUAWEI specific home screen Web Browsing with Chrome Lite High definition video playback GoogleTM Android 2.1 Google Applications 2 Hardware Specifications Dimensions (L × W × H) About 209 mm × 108 mm × 15.5 mm Weight About 500 g (including the battery) Touchscreen Resistive touchscreen by default and customizable capacitive touchscreen, with a gravity sensor Display z Type: TFT z Size: 7 inches z Colors: 262 k z Resolution: WVGA (800 × 480 pixels) SIM/USIM card interface Standard six-pin SIM card interface that
    [Show full text]
  • The SIM: the Key to Better Healthcare?
    GSMA: Mobile Health The SIM: The Key to Better Healthcare? Concept paper The SIM: The Key to Better Healthcare? Identity Authentication Individual health records November 2011 Version 1.0 GSMA: Mobile Health The SIM: The Key to Better Healthcare? 1 Executive summary More than five billion devices around the world are authenticated on mobile networks using an embedded SIM (an application running on a Universal Integrated Circuit Card or UICC), which stores and presents a unique identifier for each customer to their mobile operator. SIM-style solutions could provide increased security for, and access to, healthcare providers’ information and communications technology (ICT) systems, which can readily harness the strong identity management capabilities of a UICC. In most countries, healthcare ICT systems lack a widely-deployed identity management technology, so there is a clear opportunity to satisfy a critical market need. This paper uses clear examples and case studies to explain how the UICC and other key components of the GSM ecosystem can enable the smooth and cost-effective deployment and enhancement of electronic healthcare solutions. Secure application and transaction enablement – parallels with mobile money Offering a high level of security and flexibility, the UICC underpins a growing number of services that enable people to complete transactions at point of sale or send and receive money using their mobile phone. To enable these services, the UICC is typically partitioned so that an individual’s financial information is stored in a secure domain that can’t be accessed by other applications running on the card. Partitioning can also be used to securely store healthcare information, such as a patient ID or National Insurance number, on a UICC.
    [Show full text]
  • The Hardware End, the Nanopi R1 Packs an Allwinner H3 Soc with a Quad-Core Arm Cortex-A7, up to 1Gb of DDR3 RAM, and Optional 8Gb of Emmc
    The , HACKer s HARDWARE TOOLKit 2nd Edition 175 GADGETS 8 CATEGORIES Yago Hansen The HACKer,s HARDWARE TOOLKit 177 GADGETS 8 CATEGORIES Yago Hansen Copyright: Copyright © 2019 Yago Hansen. All rights reserved. Profile: linkedin.com/in/radiusdoc Title: Subtitle: Best gadgets for Red Team hackers E-book download link: https://github.com/yadox666/The-Hackers-Hardware-Toolkit Edition: 2nd English edition August, 2019 Level: Medium Paperback format: 182 pages Paperback editor: Amazon KDP Paperback Paperback ISBN: 9781099209468 Language: English Design: Claudia Hui License: Free for e-book distribution, but not for commercial use Mini computers Boards, palmtops RF SDR, cars, garages, satellite, GSM, LTE Wi-Fi Wi-Fi cards, antennas RFID & NFC Physical access, cards, magnetic stripe, cars HID & Keylog Rubberducky, mouse injection, wireless keyboards Network Routers, modems, VLAN, NAC BUS HW hacking, JTAG, cars, motorbikes Accessories Storage, powerbanks, batteries, chargers, GPS DISCLAIMMER If you like any of the devices shown here DO NOT HESITATE to take a picture of the related page! OCR codes shown here are not malicious! Prices shown here are only estimated Feel free to choose your PREFERRED shop Mini computers Boards, palmtops GPD micro PC 6-inch Handheld Industry Laptop Small handheld computer, ideal for carrying the best hacking software tools, and to handle all the external hardware hacking tools. The previous release supported Kali Linux. This version will probably support it too, since it supports Ubuntu Mate. Specifications Screen
    [Show full text]
  • TOOLKIT #5: CREATE OWN MOBILE BANKING CHANNEL HOW to SUCCEED in YOUR DIGITAL JOURNEY: I a SERIES of TOOLKITS for FINANCIAL SERVICE PROVIDERS
    HOW TO SUCCEED IN YOUR DIGITAL JOURNEY: A SERIES OF TOOLKITS FOR FINANCIAL SERVICE PROVIDERS TOOLKIT #5: CREATE OWN MOBILE BANKING CHANNEL HOW TO SUCCEED IN YOUR DIGITAL JOURNEY: i A SERIES OF TOOLKITS FOR FINANCIAL SERVICE PROVIDERS TOOLKIT #5: CREATE OWN MOBILE BANKING CHANNEL PART 1: BUSINESS MODEL DESCRIPTION By PHB ACADEMY and MICROLEAD Mobile banking agent at UOB Rwanda Courtesy of PHB Development MM4P MOBILE MONEY FOR THE POOR HOW TO SUCCEED IN YOUR DIGITAL JOURNEY: A SERIES OF TOOLKITS FOR FINANCIAL SERVICE PROVIDERS TOOLKIT #5: CREATE OWN MOBILE BANKING CHANNEL ii ACKNOWLEDGEMENTS We would like to thank the management and staff of Accion Microfinance Bank in Nigeria, Equity Bank in the United Republic of Tanzania, Fidelity Bank in Ghana, Mwanga Community Bank in the United Republic of Tan- zania and Urwego Opportunity Bank in Rwanda for contributing to this business model and accompanying case studies. We thank them for their time and for sharing their information, lessons learned and recommendations, to enable other financial service providers to succeed on their digital path. We would like to thank in particular the following individuals for their time and effort in preparing this toolkit: • Oladapo Famuyide from Accion Microfinance Bank in Nigeria • Andrew Tushabe from Urwego Opportunity Bank in Rwanda • Joseph Iha, Stephen Mwaniki and Mwita Rhobi from Equity Bank in the United Republic of Tanzania • Hamisi Chimwaga from Mwanga Community Bank in the United Republic of Tanzania • Daniel Amankwah-Aboagye and Merene Botsio from Fidelity Bank in Ghana AUTHORS PHB Development: Chris Statham, Aurélie Wildt Dagneaux and Isabelle Musat United Nations Capital Development Fund – MicroLead: Pamela Eser, Hermann Messan and Ivana Damjanov REVIEW COMMITTEE United Nations Capital Development Fund – MicroLead: Sachin Bansal and Alejandro González Caro PHB Development: Aurélie Wildt Dagneaux Mastercard Foundation: Ruth Dueck-Mbeba and Amos Odero EDITOR Chela Cea October 2017.
    [Show full text]
  • SIM Cards for Cellular Networks an Introduction to SIM Card Application Development
    Mid Sweden University The Department of Information Technology and Media (ITM) Author: Peter Edsbäcker E-mail address: [email protected] Study program: B. Sc. in engineering, computer engineering, 180 ECTS Examiner: Åke Malmberg, Mid Sweden University, [email protected] Tutor: Örjan Sterner, Mid Sweden University, [email protected] Scope: 31699 words inclusive of appendices Date: 2010-06-12 B. Sc. Thesis within Computer Engineering C, 15 ECTS SIM cards for cellular networks An introduction to SIM card application development. Peter Edsbäcker SIM cards for cellular networks An introduction to SIM card application development Abstract Peter Edsbäcker 2011-06-12 Abstract A SIM, Subscriber Identity Module, is the removable circuit board found in a modern cellular phone. It carries the network identity information and is a type of smart card which can also be found on payment cards (EMV), ID cards and so on. A smart card is basically a small computer, providing a safe and controlled execution environment. Historically smart card software was very hardware dependent and mostly developed by the manufacturers themselves. With the introduction of the open Java Card standard created by Sun Microsystems (Oracle) this was meant to change. However, information still remains scattered and is hard to obtain. This paper is meant to serve both as an introduction to the field and also as a good foundation for future studies. It begins with a theoretical discussion about smart card hardware and software architectures, network standards in the context of SIM cards, typical applications, coming trends and technologies and ends off with an overview of the Java Card standard.
    [Show full text]
  • ETSI TS 131 111 V3.4.0 (2001-03) Technical Specification
    ETSI TS 131 111 V3.4.0 (2001-03) Technical Specification Universal Mobile Telecommunications System (UMTS); USIM Application Toolkit (USAT) (3GPP TS 31.111 version 3.4.0 Release 1999) 3GPP TS 31.111 version 3.4.0 Release 1999 1 ETSI TS 131 111 V3.4.0 (2001-03) Reference RTS/TSGT-0331111UR4 Keywords UMTS ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.:+33492944200 Fax:+33493654716 Siret N° 348 623 562 00017 - NAF 742 C Association à but non lucratif enregistrée à la Sous-Préfecture de Grasse (06) N° 7803/88 Important notice Individual copies of the present document can be downloaded from: http://www.etsi.org The present document may be made available in more than one electronic version or in print. In any case of existing or perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF). In case of dispute, the reference shall be the printing on ETSI printers of the PDF version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at http://www.etsi.org/tb/status/ If you find errors in the present document, send your comment to: [email protected] Copyright Notification No part may be reproduced except as authorized by written permission. The copyright and the foregoing restriction extend to reproduction in all media. © European Telecommunications Standards Institute 2001.
    [Show full text]
  • Mobile Money As an Enabler for Entrepreneurship: Case Eastern Africa
    Mobile Money as an Enabler for Entrepreneurship: Case Eastern Africa Entrepreneurship Master's thesis Aarno Jussila 2015 Department of Management Studies Aalto University School of Business Powered by TCPDF (www.tcpdf.org) Mobile Money as an Enabler for Entrepreneurship: Case Eastern Africa Entrepreneurship Master's Thesis Aarno Jussila 2014 Department of Management Studies School of Business Aalto University Author Aarno Jussila Title of thesis Mobile Money as an Enabler for Entrepreneurship: Case Eastern Africa Degree Master’s Degree Degree programme Entrepreneurship Thesis advisor Professor Arto Lahti Year of approval 2015 Number of pages 90 Language English Abstract Over the last 10 years, availability of mobile phones has increased dramatically, especially in the developing markets. At the same time, majority of the population living in developing countries are still lacking the access to official financial services. This gap has enabled an opportunity to mobile network operators and financial service providers to introduce mobile money transfer services that are addressing this need. In developed countries, many attempts have been made to introduce mobile payment into the lives of people, however, the most successful efforts to create sustainable ecosystems operating with mobile money has taken place in few developed countries. This thesis work is studying what is mobile payment, the success factors of the most successful mobile money implementation M-PESA in Kenya and making the comparison to competing systems. In addition, the impact and importance of mobile money services is studied for businesses using the service, as well as what type of customer base is using the mobile money. Finally, a review is conducted over the recent and emerging business opportunities enabled by the mobile money, and innovations around it.
    [Show full text]