Showing posts with label Advanced Encryption Standard. Show all posts
Showing posts with label Advanced Encryption Standard. Show all posts

Wednesday, May 9, 2012

Monday, March 15, 2010

MoBeePay(TM) Officially Announces a Revolutionary Mobile eCommerce App.



MoBeePay(TM) Officially Announces a Revolutionary Mobile eCommerce Application





CHICAGO, March 15 /PRNewswire/ -- The MoBeePay iPhone application (other versions coming soon) allows buyers and sellers to connect and transact business in seconds without having to go through a time-consuming, risky payment process. Unlike PayPal, MoBeePay removes the need for a web based store and moves the transaction anywhere a merchant or consumer desires whether in the digital or the physical world.



Sellers register their products with MoBeePay and receive MoBeeTags (data matricies) and or MoBeeCodes (product codes) from MoBeePay, which are stored in the MoBeeHive (cloud). Buyers merely point their iPhone camera at the MoBeeTag in a magazine, on a billboard, or any print ad. Once the MoBeeTag is captured by the app the data is securely sent to the MoBeeHive. The MoBeeTag is compared, verified, and then the purchase is completed instantly if the user has signed in to their MoBeePay account.



If a user has not signed in they will be prompted to either sign in or sign up for an account directly in the MoBeePay app. The seller is notified of a successful purchase and the merchandise is shipped directly to the consumer from the manufacturer or retailer to the address on file, or in the physical world, handed to the buyer. Buyers who are unable to capture an accurate image are also able to enter a MoBeeCode as an alternative. This MoBeeCode or MoBeeTag can also be sent via SMS or MMS to the MoBeeHive if the user does not have an app compatible phone.



Like Square™ or VeriFone's PAYware™, MoBeePay will soon be offering a MoBeeMerchant application with hardware (MoBeeSwipe) that will enable mobile merchants or small retailers to accept credit and debit purchases at card present rates by plugging the MoBeeSwipe into an earjack.



Utilizing the same MoBeeTags with MoBeeMerchant, merchants can avoid the need for costly POS systems while still enjoying the benefits of an electronic transaction and inventory management system at competitive merchant discount rates.



MoBeePay was developed by Kent Mages and Kenneth Mages and has multiple patents pending. All MoBee terms herein are trademarked.



To see a demo visit www.mobeepay.com and let us know that you're interested.



About MobeePay:



MobeePay is the world's first mobile commerce application that allows anyone with a cell phone to complete purchases anywhere anytime and/or instantly open a merchant account on the web or in the physical world for free.



SOURCE MoBeePay Back to top RELATED LINKS

http://www.mobeepay.com





































Ever see an ad in a magazine for something you really want only to forget what the item was hours later? Ever walk by a store after it’s closed and see something you would love to buy in the window, but forget what it was the next day? With MoBeePay you can satisfy that need to buy with just a snap of your camera.



It’s 2010, why should you need to remember an ad, repeatedly enter your card number for different retailers, waste time filing out forms or speaking with sales people? Just log in to your MoBeePay account once and you’re done. We handle the billing and shipping so you don’t have to. Snap one of our MoBeeTags and that brand new piece of merchandise will be billed and shipped in the blink of an eye, or rather the snap of a shutter.



Use anywhere you see a MoBeeTag and pass on that cool new product to friends via social networking sites like twitter or Facebook. Check back soon to learn more and to sign up for you own MoBeePay account. Just leave your email address and you’ll be the first to know when we go live.



Would you like to know more?
Sign up for our newsletter.




Friday, February 13, 2009

HomeATM Uses E2EE...But What is End-to-End-Encryption?

In the wake of what might be the biggest breach ever, Heartland founder and CEO said that if there was end-to-end encryption (E2EE), the breach would not have occurred.

End-to-end encryption (E2EE) encrypts clear (red) data at source with knowledge of the intended recipient, allowing the encrypted (black) data to travel safely through vulnerable channels to its recipient where it can be decrypted (assuming the destination shares the necessary key-variables and algorithms).

Since January of '07 every transaction HomeATM has processed was encrypted from the beginning to the end, thus preventing any data from ever being in the clear.

So, whereas Heartland is calling for E2EE after the fact, HomeATM has done it that way for well over a year now.  What exactly is encryption and what exactly is E2EE?  Here's a basic primer:

First, lets define encryption, which is the method of encoding information using a password, in order to hide the real information from others. The technique is used for transferring data between computers and wireless networks.

Encryption occurs through mathematical algorithms, which interpret the information to be hidden and create the encrypted data. Encryption is very common in both the computer security field and some everyday technologies. It plays an important role in assuring that data remains confidential.

Numerous methods of encryption exist for different purposes, and some of the more common algorithms include RSA, DES (HomeATM uses Triple DES) and AES. The strength of encryption is based on the size of the key used in the algorithm. Most algorithms rely on a 128-bit key, which is the standard for most algorithms approved by the Government. The use of longer keys, such as a 256-bit key, creates a stronger security level for encryption.

Virtual Private Network (VPN)
VPNs are used to create secure connections between a remote host and a network. These are typically used when telecommuters working from home connect to an office network to do work. VPNs use secure channels to transfer data, which is encrypted between the remote computer and network to protect private information.

Secure Socket Layer (SSL)
SSL is an encryption method used for secure Internet communication. SSL is used for shopping websites, online banking, and any other secure login or credit card processing websites. The use of SSL on websites ensures that the transferred information cannot be captured by packet sniffers.  Or at least it used to.

Sensitive data that travels over a network are securely encrypted from the point of data entry to the point where the data is processed. Sensitive data may be user name, password, credit card number, etc. The network can be the Internet, wireless, WAN and local LAN. Data are normally entered via the browser or a client application and the data will need to reach the application server to be processed or stored in the database.


So, doesn't HTTPS performs data encryption from one point to another? Well, in most cases, only partially.

In a multi-tier architecture, it is usually the dedicated Web Server that is handling the HTTPS. The link from the Web Server to the Application server or the Database server is most likely in the clear. If the Web Server is compromised, a simple net-sniffing will reveal all the data that is posted.


In closing, Dark Reading has an article regarding encryption today.  Here's a snippet:

A group of vendors have proposed a new industry standard designed to simplify the implementation and management of encryption technology across large enterprises.

Brocade, HP, IBM, LSI, RSA, Seagate, and Thales (formerly nCipher) today announced the creation of the Key Management Interoperability Protocol (KMIP), a jointly developed specification for enterprise key management. KMIP is designed to provide a single protocol for communication between enterprise key management services and encryption systems, the companies say.


The seven vendors plan to submit the specification to the Organization for the Advancement of Structured Information Standards (OASIS) as an industry standard.


The problem with encryption, particularly in large enterprises, is that there are so many products and methods of doing it, observers say. Companies often deploy separate encryption systems for different business uses, such as laptops, storage, databases, and applications. And each encryption product typically has a different method of generating, distributing, storing, expiring, and rotating encryption "keys" -- the technologies that code and decode the data.


The concept of "key management" -- the practices associated with generating and storing encryption keys across an enterprise -- has been debated for decades. But vendors and cryptographers have never been able to agree on the best way to do it, leaving enterprise security managers stuck with the largely manual process of managing keys separately for each vendor or product. This administrative issue has made enterprises slow to roll out encryption on a broad scale.


continue "darkreading"


Reblog this post [with Zemanta]

Disqus for ePayment News