Skip to main content

Contactless Payment

 

A contactless payment is a wireless financial transaction in which the customer authorizes monetary compensation for a purchase by moving a security token in close proximity to the vendor's point of sale (PoS) reader. Popular security tokens for contactless payment include chip-enabled bank cards and smartphone digital wallet apps. Contactless payments may also be referred to as touch-free, tap-and-go or proximity payments. When goods or services are purchased through a contactless payment, the process may then be referred to as a frictionless checkout.  

Contactless payments are known for being secure because the customer does not share billing or payment information directly with the vendor. Instead, all communication is encrypted and each purchase is tokenized with a one-time transaction number. Should a wireless transmission be intercepted, the only information the attacker will get is the one-time code that was used to identify a particular transaction.

The adoption of contactless payment has been accelerated by COVID-19 and a desire for consumers to avoid person-to-person contact when making in-store purchases. The U.S. Payments Forum and EMV (Europay, Mastercard and Visa) are responsible for setting the technical standards for smart payment cards, as well as for the PoS readers that accept them.

Standards that support contactless payments

Frictionless checkouts are supported by the Near Field Communication (NFC), Radio Frequency Identification (RFID), Magnetic secure transmission (MST) and quick response code (QR code) standards. According to the National Retail Federation, two-thirds of retailers in the United States now accept some form of contactless payment. Visa, Mastercard and American Express offer contactless-enabled bank cards, while Apple Pay, Google Pay, Samsung Pay and Venmo are among the most popular digital and mobile wallet apps for smartphones.

How do contactless payments work?

Contactless payment cards and authorized mobile devices have an embedded RFID microchip, transponder and an antenna. To make a purchase, the customer must be in close proximity to the vendor's reader. Neither Apple Pay nor Google Pay process or authorize transactions. Instead, they tokenize the shopper's payment card and simply pass that information on to the appropriate credit card network.

The microchips used in contactless payments generate new verification values each time a card or authorized device is used in a transaction. This approach is very different from how magnetic stripe cards transmit data. When a traditional magnetic card is swiped, the customer's billing information is transmitted to the card reader each time the card is swiped. That information can be intercepted and used by another person, or perhaps sold on the dark web. When a transaction is conducted wirelessly, however, the only information that can be intercepted is the unique authentication code that identifies that specific transaction has occurred.

Because a new code is generated each time a chip card is used, it is very difficult for thieves to clone the card and try to make purchases. The dynamic authentication technology is simply not capable of being duplicated in a manner that will return the same dynamic codes as those that would be returned by a valid chip card. In addition, smartphones will have added security methods for before initiating contactless payments -- for example, requiring the user to authenticate their identity via a method such as FaceID.

Besides security, what other benefits do contactless payments offer?

Contactless payments take somewhere between 30-50% less time than standard credit card payments and are over 60% faster than cash transactions. This makes them a good fit for micropayments and other low-dollar-value purchases. Contactless payment methods are popularly used to increase throughput for public transportation turnstiles, parking garage checkout terminals and road tolls. Although the actual amount of time saved per transaction may be less than a minute, the minutes saved can add up and significantly reduce the time customers spend waiting in lines.

As the technology gains acceptance, non-traditional banking institutions and third-party payment providers such as PayPal have begun to experiment with ways to improve frictionless checkout. For example, some payment providers are exploring ways that GPS technology can be added to help mobile customers locate financial services, such as ATMs, or opt in to loyalty promotions conducted through targeted geofenced campaigns.

 

Comments

Popular posts from this blog

Understanding the Evolution: AI, ML, Deep Learning, and Gen AI

In the ever-evolving landscape of artificial intelligence (AI) and machine learning (ML), one of the most intriguing advancements is the emergence of General AI (Gen AI). To grasp its significance, it's essential to first distinguish between these interconnected but distinct technologies. AI, ML, and Deep Learning: The Building Blocks Artificial Intelligence refers to the simulation of human intelligence in machines that are programmed to think like humans and mimic their actions. Machine Learning, a subset of AI, empowers machines to learn from data and improve over time without explicit programming. Deep Learning, a specialized subset of ML, involves neural networks with many layers (hence "deep"), capable of learning intricate patterns from vast amounts of data. Enter General AI (Gen AI): Unraveling the Next Frontier Unlike traditional AI systems that excel in specific tasks (narrow AI), General AI aims to replicate human cognitive abilities across various domains. I...

Normalization of Database

Database Normalisation is a technique of organizing the data in the database. Normalization is a systematic approach of decomposing tables to eliminate data redundancy and undesirable characteristics like Insertion, Update and Deletion Anamolies. It is a multi-step process that puts data into tabular form by removing duplicated data from the relation tables. Normalization is used for mainly two purpose, Eliminating reduntant(useless) data. Ensuring data dependencies make sense i.e data is logically stored. Problem Without Normalization Without Normalization, it becomes difficult to handle and update the database, without facing data loss. Insertion, Updation and Deletion Anamolies are very frequent if Database is not Normalized. To understand these anomalies let us take an example of  Student  table. S_id S_Name S_Address Subject_opted 401 Adam Noida Bio 402 Alex Panipat Maths 403 Stuart Jammu Maths 404 Adam Noida Physics Updation Anamoly :  To upda...

How to deal with a toxic working environment

Handling a toxic working environment can be challenging, but there are steps you can take to address the situation and improve your experience at work: Recognize the Signs : Identify the specific behaviors or situations that contribute to the toxicity in your workplace. This could include bullying, harassment, micromanagement, negativity, or lack of support from management. Maintain Boundaries : Set boundaries to protect your mental and emotional well-being. This may involve limiting interactions with toxic individuals, avoiding gossip or negative conversations, and prioritizing self-care outside of work. Seek Support : Reach out to trusted colleagues, friends, or family members for support and advice. Sharing your experiences with others can help you feel less isolated and provide perspective on the situation. Document Incidents : Keep a record of any incidents or behaviors that contribute to the toxic environment, including dates, times, and specific details. This documentation may b...