| |
| |
Foreword | |
| |
| |
Acknowledgments | |
| |
| |
Introduction | |
| |
| |
| |
mCommerce Overview | |
| |
| |
Scope and Definition of mCommerce | |
| |
| |
Opportunities | |
| |
| |
Categories | |
| |
| |
Sources of mCommerce Revenue | |
| |
| |
The Battle for Customer Ownership? | |
| |
| |
The Emerging mCommerce Lifestyle | |
| |
| |
The Fundamental Functional Platform of mCommerce Applications | |
| |
| |
Messaging Services | |
| |
| |
Web Access Services | |
| |
| |
Voice Activated Services | |
| |
| |
Location-Based Services | |
| |
| |
Digital Content Services | |
| |
| |
What's Next? | |
| |
| |
| |
mCommerce Applications and Services Landscape | |
| |
| |
The Value Chain Supporting mCommerce Transactions | |
| |
| |
Key Challenges Facing the mCommerce World | |
| |
| |
Building Blocks for mCommerce Applications | |
| |
| |
Services and Applications in Horizontal and Vertical Markets | |
| |
| |
Personal Organizers | |
| |
| |
E-commerce Applications | |
| |
| |
Location-Based Services and Applications | |
| |
| |
mCommerce Portals | |
| |
| |
Communications and Messaging | |
| |
| |
mCommerce Data Synchronization | |
| |
| |
mCommerce Voice Portals | |
| |
| |
Digital Secretaries | |
| |
| |
Travel | |
| |
| |
Financial | |
| |
| |
Retail | |
| |
| |
Education | |
| |
| |
Defense and Military | |
| |
| |
Automotive | |
| |
| |
mCommerce Gaming Services | |
| |
| |
Distribution | |
| |
| |
Public Sector | |
| |
| |
Agriculture | |
| |
| |
Manufacturing and Mining | |
| |
| |
Utilities | |
| |
| |
Healthcare | |
| |
| |
Electronic News Communication | |
| |
| |
Hospitality Industry | |
| |
| |
What's Next? | |
| |
| |
| |
Mobile Security Overview | |
| |
| |
What Is Public Key Infrastructure (PKI)? | |
| |
| |
How PKI Eases Consumers' Fears | |
| |
| |
Strategies in Wireless Internet Security | |
| |
| |
WAP Specifications and Security | |
| |
| |
Wireless Transport Layer Security (WTLS) | |
| |
| |
Wireless Markup Language (WML) Script Sign Text | |
| |
| |
Wireless Gateways | |
| |
| |
Security Issues in WTLS | |
| |
| |
Weak Crypto Ciphers | |
| |
| |
Null Cipher Acceptance | |
| |
| |
Sequence Number Weaknesses | |
| |
| |
False Alert Messages | |
| |
| |
WTLS Fixes | |
| |
| |
WAP Versus SIM Toolkit | |
| |
| |
Components of Wireless PKI | |
| |
| |
Challenges to Wireless Internet PKI | |
| |
| |
Control of Revocation of Certificates | |
| |
| |
The Hand-off Between SSL and WTLS | |
| |
| |
Message for the IT Manager | |
| |
| |
Implementation Issues | |
| |
| |
Security Issues | |
| |
| |
| |
Mobile Versus Wired Security | |
| |
| |
Mobile Device Constraints | |
| |
| |
Memory | |
| |
| |
Computational Processing | |
| |
| |
Form Factor | |
| |
| |
Bandwidth | |
| |
| |
Security Model | |
| |
| |
Client | |
| |
| |
Client Network | |
| |
| |
Internet | |
| |
| |
Merchant Network | |
| |
| |
Server | |
| |
| |
Privacy Issues | |
| |
| |
Location-Based Technology Overview | |
| |
| |
Risks of Location-Based Service | |
| |
| |
Policy Control | |
| |
| |
Building on the Fundamentals | |
| |
| |
Message for the IT Manager | |
| |
| |
| |
Overview of Wireless Networks | |
| |
| |
How Does a Mobile System Work? | |
| |
| |
Evolution and Migration of Mobile Networks | |
| |
| |
Mobile Packet Data Standards | |
| |
| |
General Packet Radio Services (GPRS) | |
| |
| |
Cellular Digital Packet Data (CDPD) | |
| |
| |
Mobitex | |
| |
| |
DataTAC | |
| |
| |
I-Mode | |
| |
| |
3G Wireless Standards | |
| |
| |
Highlights of 3G | |
| |
| |
Applications for 3G | |
| |
| |
Short-range Mobile Networks | |
| |
| |
Bluetooth | |
| |
| |
Wireless LANs | |
| |
| |
Preferred Wireless System for Mobile Applications | |
| |
| |
| |
The Horizontals Part 1: Mobile Security in Commerce Applications | |
| |
| |
Mobile and Wireless Advertising | |
| |
| |
Wireless Affiliate Advertising Network | |
| |
| |
Mobile and Wireless Banking | |
| |
| |
Security Implications for Mobile Banking | |
| |
| |
Mobile and Wireless Trading | |
| |
| |
The Security Behind Popular Mobile Trading Software Platforms | |
| |
| |
Mobile eWallets | |
| |
| |
meWallet Security | |
| |
| |
Secure Mobile Payment Transaction Processing and Credit Card Authentication | |
| |
| |
Customer Security in a Mobile Payment Processing System | |
| |
| |
Merchant Security in a Mobile Payment Processing System | |
| |
| |
Ticketing | |
| |
| |
Message for the IT Manager | |
| |
| |
| |
The Horizontals, Part 2: Mobile Security in Information Applications | |
| |
| |
The Basics | |
| |
| |
Integrity | |
| |
| |
Authentication | |
| |
| |
Liability | |
| |
| |
Security of Wireless Information Delivery Models | |
| |
| |
Types of Models | |
| |
| |
Mobile Servers Security Flaws | |
| |
| |
Administrator Weaknesses | |
| |
| |
Database Access | |
| |
| |
Applications | |
| |
| |
Stock Quotes | |
| |
| |
Security Implications | |
| |
| |
News Headlines | |
| |
| |
Navigation and Traffic Updates | |
| |
| |
Supporting Technology Overview | |
| |
| |
Security Implications for Location-Based Technologies | |
| |
| |
| |
The Horizontals, Part 3: Mobile Security in Communications Applications | |
| |
| |
Mobile Customer Relationship Management (mCRM) | |
| |
| |
Mobile CRM Security Techniques | |
| |
| |
Best Practices | |
| |
| |
Mobile Sales Force Automation (SFA) | |
| |
| |
Mobile SFA Application Service Providers (ASP) | |
| |
| |
Messaging | |
| |
| |
Instant Messaging (IM) Security | |
| |
| |
Wireless Short Messaging Service (SMS) | |
| |
| |
Information Services | |
| |
| |
Other Messaging Issues | |
| |
| |
Message for the IT Manager | |
| |
| |
| |
The Verticals, Part 1: mCommerce Security in the Service Sector | |
| |
| |
Retail | |
| |
| |
Players and Examples | |
| |
| |
Banking and Finance | |
| |
| |
Travel | |
| |
| |
Manufacturing | |
| |
| |
Distribution | |
| |
| |
Message for the IT Manager | |
| |
| |
| |
The Verticals, Part 2: mCommerce Security in Healthcare, Public Services, and Hospitality | |
| |
| |
Healthcare | |
| |
| |
HIPAA | |
| |
| |
Biometrics | |
| |
| |
Equipment and Personnel Tracking | |
| |
| |
Patient Data Access and Maintenance | |
| |
| |
Alerts and Notification | |
| |
| |
Wireless Voice Access to the Phone Network | |
| |
| |
Public Services | |
| |
| |
Hospitality | |
| |
| |
Message for the IT Manager | |
| |
| |
Healthcare | |
| |
| |
Public Sector | |
| |
| |
Hospitality Industry | |
| |
| |
| |
The Verticals, Part 3: mCommerce Security in Entertainment and the Military | |
| |
| |
Entertainment | |
| |
| |
Privacy Rights | |
| |
| |
Convergent Gaming | |
| |
| |
Embedded Gaming | |
| |
| |
Code Breaker | |
| |
| |
Defense and Military | |
| |
| |
Mobile Hawks | |
| |
| |
Yes, They Are Listening | |
| |
| |
Soldier-to-Soldier Messaging | |
| |
| |
Secure Group Computing | |
| |
| |
Scotty, Beam Me My Orders! | |
| |
| |
Message for the IT Manager | |
| |
| |
Entertaining Lessons | |
| |
| |
Corporal Corporate | |
| |
| |
| |
Security Considerations in Other mCommerce Applications | |
| |
| |
802.11b Wireless Applications and Security | |
| |
| |
Wi-Fi Architecture Overview | |
| |
| |
Wi-Fi Issues | |
| |
| |
Environmental Monitoring and Energy Management | |
| |
| |
Agriculture | |
| |
| |
Energy Meter Reading | |
| |
| |
Energy Management in the Hotel Industry | |
| |
| |
Vending | |
| |
| |
Payments for Vending Machines | |
| |
| |
Remote Device Control Architecture | |
| |
| |
Message for the IT Manager | |
| |
| |
| |
Bluetooth | |
| |
| |
Architecture Overview | |
| |
| |
Bluetooth Core Components | |
| |
| |
Network Topology | |
| |
| |
Security Overview | |
| |
| |
Link Keys | |
| |
| |
Security Modes | |
| |
| |
Security Manager | |
| |
| |
WAP in Bluetooth | |
| |
| |
Discovery of Services | |
| |
| |
Connection Methods | |
| |
| |
Wireless Datagram Protocol (WDP) Stack Implementation | |
| |
| |
Security Weaknesses | |
| |
| |
PIN Weakness | |
| |
| |
Impersonation | |
| |
| |
Replay Attacks | |
| |
| |
Man in the Middle | |
| |
| |
Hopping | |
| |
| |
Location Attack | |
| |
| |
Denial of Service | |
| |
| |
Bluetooth Compatibility | |
| |
| |
Bluetooth vs. Wi-Fi | |
| |
| |
Alternatives to Bluetooth | |
| |
| |
3G vs. Bluetooth | |
| |
| |
The Tooth Fairy | |
| |
| |
Message for the IT Manager | |
| |
| |
| |
Tomorrow and Beyond | |
| |
| |
3G/4G Networks | |
| |
| |
Always on Means Always Paranoid | |
| |
| |
4G Networks | |
| |
| |
Wearable Computing | |
| |
| |
Wireless Local Area Networks (WLANs) | |
| |
| |
WASPs | |
| |
| |
Biometrics | |
| |
| |
Public Key Infrastructure (PKI) | |
| |
| |
Mobile Transactions | |
| |
| |
Payment Strategies | |
| |
| |
Smartcard Roles in the Future | |
| |
| |
Barcode Transactions | |
| |
| |
Mini-servers | |
| |
| |
IDS | |
| |
| |
Renting Software | |
| |
| |
Message for the IT Manager | |
| |
| |
3G/4G Networks | |
| |
| |
Biometrics | |
| |
| |
WLANs | |
| |
| |
Wearable Computers | |
| |
| |
WASPs | |
| |
| |
PKI | |
| |
| |
Meta-Glossary of Terms | |
| |
| |
Index | |