Visa pushes NFC operator bypass on French

iPhone gets proximity payments in France


Visa is planning trials of microSD-based NFC chips in Nice, working with French bank Groupe BPCE to put payments into the pockets of punters without reference to the network operators.

The trial will use iPhone cases containing the NFC radio and antenna, as well as the microSD slot for the secure element, according to NFC Times. It also notes that the Samsung Galaxy S and a pair of BlackBerrys will also be used in the trials.

The technology comes from Device Fidelity; the company's microSD solution packs a secure element and NFC radio into the chip, although all the devices in the trial need an additional antenna to get the signal out of the box (contained in the iPhone case, or stuck to the inside of the Samsung and BlackBerry battery covers). The lack of NFC devices makes such bodging necessary.

Device Fidelity and Visa have an interest in promoting the microSD as the ideal location for the secure element, which will otherwise rest in the SIM (controlled by the network operator) or the handset (controlled by the manufacturer).

In Visa's perfect world, the secure element goes on a microSD supplied by Visa, and when the customer changes network and/or handset the microSD card comes with them.

That means proving to the industry, and the users, that the technology works which is the motivation behind the trials, which follow tests in the USA.

Tests of the same technology in Australia have been less successful, with ZDNet reporting that ANZ Bank has shelved its own trials with Visa.

According to the bank, customers want proximity payments, but not using microSD – which is a shame as the additional case/antenna probably put them off, rather than the cards themselves.

Those cases and antennas are supposed to be temporary: once handsets have in-built support for NFC, then Device Fidelity plans to reduce its chips to contain just the secure element.

Ideally that would come with OS-level support, though that is not strictly necessary depending on the OS. However, it does need devices that have both a microSD slot and an NFC capability, which is a shame when Google's Nexus S seems to have dumped the former to make space for the latter. ®

Similar topics


Other stories you might like

  • Heart FM's borkfast show – a fine way to start your day

    Jamie and Amanda have a new co-presenter to contend with

    There can be few things worse than Microsoft Windows elbowing itself into a presenting partnership, as seen in this digital signage for the Heart breakfast show.

    For those unfamiliar with the station, Heart is a UK national broadcaster with Global as its parent. It currently consists of a dozen or so regional stations with a number of shows broadcast nationally. Including a perky breakfast show featuring former Live and Kicking presenter Jamie Theakston and Britain's Got Talent judge, Amanda Holden.

    Continue reading
  • Think your phone is snooping on you? Hold my beer, says basic physics

    Information wants to be free, and it's making its escape

    Opinion Forget the Singularity. That modern myth where AI learns to improve itself in an exponential feedback loop towards evil godhood ain't gonna happen. Spacetime itself sets hard limits on how fast information can be gathered and processed, no matter how clever you are.

    What we should expect in its place is the robot panopticon, a relatively dumb system with near-divine powers of perception. That's something the same laws of physics that prevent the Godbot practically guarantee. The latest foreshadowing of mankind's fate? The Ethernet cable.

    By itself, last week's story of a researcher picking up and decoding the unintended wireless emissions of an Ethernet cable is mildly interesting. It was the most labby of lab-based demos, with every possible tweak applied to maximise the chances of it working. It's not even as if it's a new discovery. The effect and its security implications have been known since the Second World War, when Bell Labs demonstrated to the US Army that a wired teleprinter encoder called SIGTOT was vulnerable. It could be monitored at a distance and the unencrypted messages extracted by the radio pulses it gave off in operation.

    Continue reading
  • What do you mean you gave the boss THAT version of the report? Oh, ****ing ****balls

    Say what you mean

    NSFW Who, Me? Ever written that angry email and accidentally hit send instead of delete? Take a trip back to the 1990s equivalent with a slightly NSFW Who, Me?

    Our story, from "Matt", flings us back the best part of 30 years to an era when mobile telephones were the preserve of the young, upwardly mobile professionals and fixed lines ruled the roost for more than just your senior relatives.

    Back then, Matt was working for a UK-based fixed-line telephone operator. He was dealing with a telephone exchange which served a relatively large town. "I ran a reasonably ordinary, read-only command to interrogate a specific setting," he told us.

    Continue reading

Biting the hand that feeds IT © 1998–2021