SlideShare a Scribd company logo
BUILDING BULLET-PROOF PAYMENT APPLICATIONS FOR MOBILE AND CONSUMER ELECTRONICS DEVICES Hadi Nahari, Principal Security & Devices Architect PayPal Emerging Technologies
AGENDA Landscape Requirements Model {ToDo || !ToDo}; That’s the Q
LANDSCAPE: FACTS ABOUT MOBILE Internet access (all means) > 1 billion/day Cellular network access ~ 4 billion/day Mobile is the only digital system many people will ever encounter.
NEW USE CASES From Back Pocket to Front Pocket From Paper to Virtual Tickets From Paper to Virtual Coupons From Mass to Personalized From Pre-Sale to In-Store
MOBILE IDENTITY CRISIS Complex landscape Identity proliferation Many players  Neither trusts others Heterogeneous identity  environment Retailers Banks Card Associations Mobile Network Operators Regulators Chip  Vendors Trusted Service   Manager   Device  Manufacturers
MANY STANDARDIZATION BODIES Global Platform Smart Card infrastructure Open Mobile Terminal Platform (OMTP) Usability Economic security Open Mobile Alliance (OMA) Decoupling Interoperability Near Field Communication (NFC) Forum Proximity European Telecommunications Standards Institute (ETSI) Telecom integration
YEAH, AND THE NETWORK… The network is solated from other systems, such as the Internet. Design assumptions are fundamentally different. The application should know how the network operates.
WHAT’S A PLATFORM? Marc Andreessen A "platform" is a system that can be  programmed  and therefore  customized  by outside developers and in that way, adapted to  countless needs  and niches that the platform's original developers could not have possibly contemplated, much less had time to accommodate. By definition a platform is  open.  How open? the “ we decide for you ” model the “ don’t be evil”  model
AGENDA Landscape Requirements Model {ToDo || !ToDo}; That’s the Q
OPEN PLATFORM MODEL (OPM) Portal App. N\ App. 0 Development SDK. N SDK. 1 SDK. 0 App. 1 App. N\ App. N App. N\ App. N\ App. M Deployment Download Device App. N App. 0 App. 1
CLEARLY… OPM is a distributed  platform By definition it is  open Realizes abstraction Generic services Modularization Leaky abstractions? OPM generations
OPM SECURITY REQUIREMENTS Environment Autonomous governance of Key material Identities Secure isolation Cohabitation Well-defined interaction contracts Objects Authentication Asset protection At rest In transit Channel protection
AGENDA Landscape Requirements Model {ToDo || !ToDo}; That’s the Q
OBJECTS’ SECURITY MESH MNO Financial Portal App. N App. 0 App. 1 Retailer Regulator
ABSTRACT MODEL Cloud_m Cloud_n ID Claims Protection Declarations Enforcement Mechanisms Unforgeable, as in capability model Authorization Framework Claims Verification Authorization Framework Claims Verification
OBJECTS’ RESPONSIBILITIES Declares own security requirements Authenticates the environment Protects the key material  Claims Requirement And so on Protected by object itself Declaration is a security asset ID Claims Protection Declarations Enforcement Mechanisms
ENVIRONMENT’S MANDATE Authenticates objects Based on objects’ claims Authorizes interactions Among objects Between environments Authorization Framework Claims Verification
INTER-OBJECT COMMUNICATION Based on objects’ declarations   Environment facilitates  only if authorized ? Authorization Framework Claims Verification ID Claims Protection Declarations Enforcement Mechanisms ID Claims Protection Declarations Enforcement Mechanisms
INTER-ENVIRONMENT COMMUNICATION Based on mutually-agreed declarations Only if allowed by both environments Cloud_m Cloud_n ? ? ? Authorization Framework Claims Verification ID Claims Protection Declarations Enforcement Mechanisms Authorization Framework Claims Verification ? ID Claims Protection Declarations Enforcement Mechanisms
AGENDA Landscape Requirements Model {ToDo || !ToDo}; That’s the Q
{TODO || !TODO}; DECOUPLING The model decouples authorization decisions. Allows autonomy of environments Enables flexible business models Objects authenticate environments too. Execution is based on mutual agreement.
FURTHER WORK Conflict resolution Among objects In between environments Allowing the environment to modify objects declaration Temporarily Permanently Updating objects declarations  While in transit in between environments
CONCLUDING THOUGHTS Build solid security… … and a usable one ... Know your enemies Identify threats Use and reuse
MORE INFORMATION Cryptography is hard: don’t mess with it! Solid Vulnerability Assessment & Threat Analysis (VATA) pays off! Be mindful of various operating system versions in embedded.  Linux-based: Android, Chrome  iPhone Windows CE Symbian MultOS …
LEARN AND SHARE www.x.com Twitter: @paypalx www.facebook.com/paypalx Innovate 09 hashtag: #ppxi09 LEARN AND SHARE www.x.com Twitter: @paypalx www.facebook.com/paypalx Innovate 09 hashtag: # ppxi09 Proprietary

More Related Content

PPTX
Controlling Smart Objects from Web Applications using the webinos Platform
PDF
Mobile app services - Mobiloitte
PDF
Web development Services - Mobiloitte
PDF
Digital Signage Strategies for communication impact
PPTX
Gustavo.it - IdeaTre60
PPT
mopay - portfolio of an industry leader
PPT
Cmsc666 Mc
PDF
Lords Profile
Controlling Smart Objects from Web Applications using the webinos Platform
Mobile app services - Mobiloitte
Web development Services - Mobiloitte
Digital Signage Strategies for communication impact
Gustavo.it - IdeaTre60
mopay - portfolio of an industry leader
Cmsc666 Mc
Lords Profile

Similar to Developing Bullet-Proof Payment Applications for Mobile and Consumer Electronic Devices (20)

PDF
Blockhain Ecosystem Development
PDF
Market Study on Mobile Authentication
PDF
Kura M2M IoT Gateway
PPTX
Cloud security for financial services
PDF
Decentralized Finance (DeFi) and the Rise of dApps.pdf
PDF
Lessons from a real-life blockchain project (P2P energy), OW2con'18, June 7-8...
 
PDF
YURY_CHEMERKIN_DeepIntel_2013_Conference.pdf
PDF
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
PDF
YURY_CHEMERKIN_IntelligenceSec_2013_Conf.pdf
PPTX
Identity privacy and data protection in the cloud – what is being done is it ...
PPTX
Hypori Performance Webinar
PDF
YURY_CHEMERKIN_ITA_2013_Conference .pdf
PDF
YURY_CHEMERKIN_ITA_2013_conference .pdf
PDF
Understanding the Basics of Decentralized Applications (dApps)
PPT
htcia-5-2015
PDF
Combating Mobile Device Theft with Blockchain
PDF
RISE OF THE MACHINES: IRM IN AN IOT WORLD
PPT
2010.10.07. Le Cloud Computing pour les N...ouveaux - Loic Simon - Club Allia...
PPT
Cloud expo cloud-enabled testing services (wide)_v1.0
PDF
General discussion paper for airports
Blockhain Ecosystem Development
Market Study on Mobile Authentication
Kura M2M IoT Gateway
Cloud security for financial services
Decentralized Finance (DeFi) and the Rise of dApps.pdf
Lessons from a real-life blockchain project (P2P energy), OW2con'18, June 7-8...
 
YURY_CHEMERKIN_DeepIntel_2013_Conference.pdf
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
YURY_CHEMERKIN_IntelligenceSec_2013_Conf.pdf
Identity privacy and data protection in the cloud – what is being done is it ...
Hypori Performance Webinar
YURY_CHEMERKIN_ITA_2013_Conference .pdf
YURY_CHEMERKIN_ITA_2013_conference .pdf
Understanding the Basics of Decentralized Applications (dApps)
htcia-5-2015
Combating Mobile Device Theft with Blockchain
RISE OF THE MACHINES: IRM IN AN IOT WORLD
2010.10.07. Le Cloud Computing pour les N...ouveaux - Loic Simon - Club Allia...
Cloud expo cloud-enabled testing services (wide)_v1.0
General discussion paper for airports
Ad

More from PayPalX Developer Network (20)

PPTX
Payments Anywhere with PayPal
PPTX
Trends in social commerce
PPTX
Online Payments For Developers
PPTX
Monetizing with PayPal on Mobile
KEY
Fueling the Wallet.Next
PPTX
Monetizing your Applications with PayPal X Payments Platform
PPTX
Social Media Metrics
PPT
In Search of your Wallet ?
PPT
Fowa University Session Monetizing in any ecosystem
PPTX
Sm Metrics from Social Media Week
PPTX
Monetization with PayPal Payments Platform
PPT
Accept PayPal in 5 Minutes or Less Using Button Manager and Button Manager API
PPT
PPT
One Gateway for All Kinds of Payments—the Payflow Integration
PPT
Cool New Advances in PayPal Express Checkout
PPT
Maximizing PayPal's New Identity Services to Create Seamless and Safe User Ex...
PPT
Developing Secure Applications and Defending Against Common Attacks
PPT
Opening Our Platform to Developers: PayPal's New Application Model and Develo...
PPT
Adaptive Payments: Changing How We Pay with PIN, Pre-approved and Split Payments
PPT
Streamline Your User Experience and Increase Conversion with Adaptive Accounts
Payments Anywhere with PayPal
Trends in social commerce
Online Payments For Developers
Monetizing with PayPal on Mobile
Fueling the Wallet.Next
Monetizing your Applications with PayPal X Payments Platform
Social Media Metrics
In Search of your Wallet ?
Fowa University Session Monetizing in any ecosystem
Sm Metrics from Social Media Week
Monetization with PayPal Payments Platform
Accept PayPal in 5 Minutes or Less Using Button Manager and Button Manager API
One Gateway for All Kinds of Payments—the Payflow Integration
Cool New Advances in PayPal Express Checkout
Maximizing PayPal's New Identity Services to Create Seamless and Safe User Ex...
Developing Secure Applications and Defending Against Common Attacks
Opening Our Platform to Developers: PayPal's New Application Model and Develo...
Adaptive Payments: Changing How We Pay with PIN, Pre-approved and Split Payments
Streamline Your User Experience and Increase Conversion with Adaptive Accounts
Ad

Recently uploaded (20)

PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PPTX
observCloud-Native Containerability and monitoring.pptx
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
Enhancing emotion recognition model for a student engagement use case through...
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PDF
Hybrid model detection and classification of lung cancer
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PDF
Web App vs Mobile App What Should You Build First.pdf
PDF
Architecture types and enterprise applications.pdf
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PPT
What is a Computer? Input Devices /output devices
PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
STKI Israel Market Study 2025 version august
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
observCloud-Native Containerability and monitoring.pptx
Univ-Connecticut-ChatGPT-Presentaion.pdf
NewMind AI Weekly Chronicles - August'25-Week II
A comparative study of natural language inference in Swahili using monolingua...
Enhancing emotion recognition model for a student engagement use case through...
Final SEM Unit 1 for mit wpu at pune .pptx
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
Hybrid model detection and classification of lung cancer
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
NewMind AI Weekly Chronicles – August ’25 Week III
Web App vs Mobile App What Should You Build First.pdf
Architecture types and enterprise applications.pdf
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
gpt5_lecture_notes_comprehensive_20250812015547.pdf
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
What is a Computer? Input Devices /output devices
Getting started with AI Agents and Multi-Agent Systems
STKI Israel Market Study 2025 version august

Developing Bullet-Proof Payment Applications for Mobile and Consumer Electronic Devices

  • 1. BUILDING BULLET-PROOF PAYMENT APPLICATIONS FOR MOBILE AND CONSUMER ELECTRONICS DEVICES Hadi Nahari, Principal Security & Devices Architect PayPal Emerging Technologies
  • 2. AGENDA Landscape Requirements Model {ToDo || !ToDo}; That’s the Q
  • 3. LANDSCAPE: FACTS ABOUT MOBILE Internet access (all means) > 1 billion/day Cellular network access ~ 4 billion/day Mobile is the only digital system many people will ever encounter.
  • 4. NEW USE CASES From Back Pocket to Front Pocket From Paper to Virtual Tickets From Paper to Virtual Coupons From Mass to Personalized From Pre-Sale to In-Store
  • 5. MOBILE IDENTITY CRISIS Complex landscape Identity proliferation Many players Neither trusts others Heterogeneous identity environment Retailers Banks Card Associations Mobile Network Operators Regulators Chip Vendors Trusted Service Manager Device Manufacturers
  • 6. MANY STANDARDIZATION BODIES Global Platform Smart Card infrastructure Open Mobile Terminal Platform (OMTP) Usability Economic security Open Mobile Alliance (OMA) Decoupling Interoperability Near Field Communication (NFC) Forum Proximity European Telecommunications Standards Institute (ETSI) Telecom integration
  • 7. YEAH, AND THE NETWORK… The network is solated from other systems, such as the Internet. Design assumptions are fundamentally different. The application should know how the network operates.
  • 8. WHAT’S A PLATFORM? Marc Andreessen A "platform" is a system that can be programmed and therefore customized by outside developers and in that way, adapted to countless needs and niches that the platform's original developers could not have possibly contemplated, much less had time to accommodate. By definition a platform is open. How open? the “ we decide for you ” model the “ don’t be evil” model
  • 9. AGENDA Landscape Requirements Model {ToDo || !ToDo}; That’s the Q
  • 10. OPEN PLATFORM MODEL (OPM) Portal App. N\ App. 0 Development SDK. N SDK. 1 SDK. 0 App. 1 App. N\ App. N App. N\ App. N\ App. M Deployment Download Device App. N App. 0 App. 1
  • 11. CLEARLY… OPM is a distributed platform By definition it is open Realizes abstraction Generic services Modularization Leaky abstractions? OPM generations
  • 12. OPM SECURITY REQUIREMENTS Environment Autonomous governance of Key material Identities Secure isolation Cohabitation Well-defined interaction contracts Objects Authentication Asset protection At rest In transit Channel protection
  • 13. AGENDA Landscape Requirements Model {ToDo || !ToDo}; That’s the Q
  • 14. OBJECTS’ SECURITY MESH MNO Financial Portal App. N App. 0 App. 1 Retailer Regulator
  • 15. ABSTRACT MODEL Cloud_m Cloud_n ID Claims Protection Declarations Enforcement Mechanisms Unforgeable, as in capability model Authorization Framework Claims Verification Authorization Framework Claims Verification
  • 16. OBJECTS’ RESPONSIBILITIES Declares own security requirements Authenticates the environment Protects the key material Claims Requirement And so on Protected by object itself Declaration is a security asset ID Claims Protection Declarations Enforcement Mechanisms
  • 17. ENVIRONMENT’S MANDATE Authenticates objects Based on objects’ claims Authorizes interactions Among objects Between environments Authorization Framework Claims Verification
  • 18. INTER-OBJECT COMMUNICATION Based on objects’ declarations Environment facilitates only if authorized ? Authorization Framework Claims Verification ID Claims Protection Declarations Enforcement Mechanisms ID Claims Protection Declarations Enforcement Mechanisms
  • 19. INTER-ENVIRONMENT COMMUNICATION Based on mutually-agreed declarations Only if allowed by both environments Cloud_m Cloud_n ? ? ? Authorization Framework Claims Verification ID Claims Protection Declarations Enforcement Mechanisms Authorization Framework Claims Verification ? ID Claims Protection Declarations Enforcement Mechanisms
  • 20. AGENDA Landscape Requirements Model {ToDo || !ToDo}; That’s the Q
  • 21. {TODO || !TODO}; DECOUPLING The model decouples authorization decisions. Allows autonomy of environments Enables flexible business models Objects authenticate environments too. Execution is based on mutual agreement.
  • 22. FURTHER WORK Conflict resolution Among objects In between environments Allowing the environment to modify objects declaration Temporarily Permanently Updating objects declarations While in transit in between environments
  • 23. CONCLUDING THOUGHTS Build solid security… … and a usable one ... Know your enemies Identify threats Use and reuse
  • 24. MORE INFORMATION Cryptography is hard: don’t mess with it! Solid Vulnerability Assessment & Threat Analysis (VATA) pays off! Be mindful of various operating system versions in embedded. Linux-based: Android, Chrome iPhone Windows CE Symbian MultOS …
  • 25. LEARN AND SHARE www.x.com Twitter: @paypalx www.facebook.com/paypalx Innovate 09 hashtag: #ppxi09 LEARN AND SHARE www.x.com Twitter: @paypalx www.facebook.com/paypalx Innovate 09 hashtag: # ppxi09 Proprietary