digital wallet alberto almonte (cpe) miles curiotto (cpe) michael stross (ee) the new, compact,...

14
Digital Wallet Alberto Almonte (CPE) Miles Curiotto (CPE) Michael Stross (EE) The new, compact, secure and efficient way to carry all your credit and debit cards in one digital location. We pledge our honor that we have abided by the Stevens Honor System

Upload: willis-nicholson

Post on 17-Dec-2015

218 views

Category:

Documents


0 download

TRANSCRIPT

Digital WalletAlberto Almonte (CPE)Miles Curiotto (CPE)Michael Stross (EE)

The new, compact, secure and efficient way to carry all your credit and debit cards in one digital location.

We pledge our honor that we have abided by the Stevens Honor System

Agenda

•Problem•Statistics•Solution•Designs•Components

▫Touchscreen▫RFID▫Fingerprint scanner

•Challenges

Problem

•Increasing amount of Credit/Debit Cards•More and more people using electronic

forms of payment•People are carrying more cards leading to

a higher risk of loss, theft, and damage

Statistics

•There are 960 million credit/debit cards in the US on top of the 48.9 million American Express Cards

•The average card holder has 3.5 cards.•Every year in the USA there are 11.1

million fraud cases•Lost of stolen wallets made up 43% of all

ID theft incidents•There are 45 million and counting

smartphones in the USA

Solution

•An electronic device that… ▫Safely stores multiple credit/debit cards▫Allows for credit/debit card transactions to

be made wirelessly▫Uses high security protocols to encrypt

data

DesignsComplete Standalone Device

Peripheral for Smartphone

• More security (fingerprint scanner + PIN)

• More control of resources (battery, memory etc.)

• RFID transmissions require authentication

• Innovative application which integrates user information with a secure payment process

• Additional features:▫ Rewriteable spare card▫ Swiping mechanism▫ Storage for cash

• One less device for the user to carry around

• Universal compatibility for the most popular smartphones

• PIN required to authenticate transactions

Best DesignComplete Standalone Device

Peripheral for Smartphone

• More security (fingerprint scanner + PIN)

• More control of resources (battery, memory etc.)

• RFID transmissions require authentication

• Innovative application which integrates user information with a secure payment process

• Additional features:▫ Rewriteable spare card▫ Swiping mechanism▫ Storage for cash

• One less device for the user to carry around

• Universal compatibility for the most popular smartphones

• PIN required to authenticate transactions

Winner

Components

•RFID▫Transmit card data to the receiver▫Obtain and store card data

•Touchscreen Display▫Select which card they want to use▫Allow for human interface through device

•Fingerprint reader▫Verifies user identity▫Secures device to intruders

RFID• A microchip (tag) that can be accessed

by radio frequency waves from an RFID reader wirelessly

• The digital wallet will contain a rewriteable tag that can be read by nearby readers with approval

• Provides an easy, contactless method for payment transactions

• Data transmitted is securely encrypted• Variety of RFID tags that can be

implemented into this project

Touchscreen• Through use of a touch screen we can

streamline the design to be simple, clean and efficient.

• The user will feel more secure that buttons are not accidently being pressed while the device is in his/her pocket.

• The touch screen is a very modern and stylish technology that will make the device more attractive to a large consumer audience.

• Densitron 84-0042-003T Touch screen Display▫ 2.8in LCD resistive touch screen

Fingerprint Reader

•Provide a secure way for the user to access the digital wallet

•If someone has a general idea about your likes and dislikes with enough time they can figure out your password.

•With a fingerprint reader, only the person with that fingerprint will ever be able to access it.

Challenges

•Having a device that has all your vital information in one location is a lot to ask of a consumer.

•Finding the balance between security and ease of use.

•Securing RFID tag from being read by hackers without permission.

Questions

References

•http://www.creditcards.com/•www.Densitron.com •www.integratedbiometrics.com