logo

The Future Of Wireless Banking (pdf)

Today’s banking and trading institutions realize they must move and move quickly to capitalize on new business opportunities in wireless banking and trading. Resistance to the implementation of wireless banking can lead to major losses at the business and market share levels. Wireless service soon will be a necessity for the end-user. Although many technological barriers need to be overcome, it is imperative to embrace the change. Wireless banking and trading is only an extension of the product offerings for the financial institutions. It is not an extension of web technology, as often perceived. Online banking and online trading works from standard TCP/IP connection to...
The Future of Wireless Banking Implementation of Wireless Banking and Financial Systems Rod Ghani Senior Consultant IBM Global Services 03/15/2001 Introduction Have you seen change yet? Today’s banking and trading institutions realize they must move and move quickly to capitalize on new business opportunities in wireless banking and trading. Resistance to the implementation of wireless banking can lead to major losses at the business and market share levels. Wireless service soon will be a necessity for the end-user. Although many technological barriers need to be overcome, it is imperative to embrace the change. Wireless banking and trading is only an extension of the product offerings for the financial institutions. It is not an extension of web technology, as often perceived. Online banking and online trading works from standard TCP/IP connection to the Internet using a PC, while wireless applications present a much greater challenge. Today, wireless banking lacks leadership in enforcing one standard. There are several network standards, PDA standards, browsing standards, protocol standards…etc. In the wireless world, airwaves are the only vehicle to send and receive data. Depending on the physical location- inside or outside of a building, near or far from a tower, in a small town versus a metropolitan area- quality is highly variable. Did my order go through? Non-repudiation is one of the most contesting issues in wireless banking and trading. The user needs to have proof that the transaction has been executed and confirmed. Wireless banking is revolutionizing the makeup of every financial and banking institution. It is radically transforming the services, needs, and expectations of societies across continents, regardless of culture. In the next twenty-four months and beyond, massive changes will occur in the way we interact with banks and trading institutions regarding our business and personal finances. The revolution is driven by the client (end-user) demanding to have the information available conveniently anytime, anywhere. Immediate access is expected and required. Change at the institutional level is not an easy task. Adaptability and flexibility are needed when dealing with a variety of legacy systems, connectivity issues, protocol challenges, and a constant explosion on the market of new devices. Large institutions are handicapped by their size and have to become aggressive to keep up with the rapid times. Today, B2B, B2C, B2G and B2E are recognized to be vertical online markets. Wireless is going to sub- divide these markets, and new services will emerge targeting new user groups. Data managers and system developers are expected to offer more effective and efficient methods in data delivery, anytime, anywhere, using any device, regardless of platform, protocol, browser, service provider, financial institution, etc. The Future of Wireless Banking 2 Ron Ghani A snap shot of the future • The Gomez Research estimates that the number of people accessing personal account information online will grow from approximately 8 million in 1998 to nearly 40 million people in 2003. Given the numbers, banks and other financial providers must realize the opportunity inherent within Internet and wireless capabilities. • According to Jupiter Communications, approximately 100 million people in the U.S. will have wireless non-PC web access by the year 2003, versus 155 million landline access from PCs. This deduces that non-PC access will grow to 65% of the wireline PC access market within the next three to four years. • According to Forrester research, almost 120 million Europeans already use mobile phones, exchanging more than two billion wireless text messages each month. • By 2003, Forrester projects 219 million Europeans, or one-third of the population, will be on the wireless bandwagon. Of the 50 European e-commerce executives interviewed by Forrester, 90 percent plan to launch sites that will be accessible by mobile phones • Financial products and services provide an ideal setting for Internet delivery. M-Bank is well positioned to serve this industry with companies such as Wells Fargo and Co. (NYSE:WFC), Bank of America Corp. (NYSE:BAC), Providian Financial Corp. (NYSE:PVN), MBNA Corp (NYSE:KRB), and Capital One Financial Corp. (NYSE:COF). • A major bank reports that over 3 million online banking customers, representing more than 20% of its checking account customer base that it continues to sign up approximately 130,000 new online banking customers a month. Also, more than 750,000 online banking customers have signed up for the bank's electronic billing and payment service, says the institution, and the total dollar value of payments processed grew 36% last year. Over 3.1 million EBPP were made, totaling more than $1 billion. • "It took us over 10 years to reach two million online banking customers and only nine months to add one million more," says Jeanine Brown, Interactive Banking executive. • GartnerGroup predicts that by 2004, 80 percent of new applications for consumer use will permit access from mobile device clients (Source: GartnerGroup conference 1999). • GartnerGroup research estimates there are more than 60 million employees worldwide working outside the traditional office setting. The Gartner study also says that the number will grow to 108 million by 2002. Users Interest in Phones with E-Mail Current Potential Users Users Definitely Interested 8.3% 13% Probably Interested 8.0% 13% Maybe Interested 13.3% 23% Probably Not Interested 25% 26% Definitely Not Interested 45% 25% Source: The Strategis Group The Future of Wireless Banking 3 Ron Ghani Little G History 1G is the first generation in mobile technology. Started in the late 1970s until the late 1980s. 2G began in the 1990s and it is still being used today, such as CDPD, CDMA, and GSM. 3G is the third-generation of wireless. It is expected to reach maturity between the years 2003 and 2005. 3G is expected to delver enhanced voice and data and even video. It is bandwidth can be as high as 2 Mbps and will operate at 2 GHz. Will Wireless banking play a major role in new markets? P2P (Person to Person), and P2A (Person to Anyone) will play a major role in the financial world. We will witness an abundant in money transfers. A user can make a payment, have it automatically deducted from the appropriate account, and deposited into the recipient account, with an email acknowledgement. It’s about time Time is the essence. Wireless banking and trading advantages are increasing by the day due to a rapid advancement in technology, rapid growth in wireless coverage, cost reduction in networking, and improvement in handheld devices, and bandwidth efficiency. Today, we can accomplish far more in wireless services, where it was not cost justifiable a year ago. With that in mind, WSP (Wireless Service Providers), corporations, and financial institutions can bank on the growth and take advantage of these opportunities. The winners in today’s wireless world are those who keep up with the change, cope with the challenges, and utilize the products and services offered. Financial institutions must drive to enhance the systems delivery to create layers of an open system environment. Those who will use standard protocols will expand and thrive. Successful wireless implementation is delivered when the end-user can interact with the data easily, securely, and independent of a network operator or handheld device. The Future of Wireless Banking 4 Ron Ghani What are the components of a wireless system? • Handheld devices • Connectivity, Coverage, and Gateways • Middleware processing engine • Transcoding • API connection • Data System Backend system TCP/IP to WEB server Registration Wireless Application Interface CDMA/CDPD WEB Server TCP/IP WebSphere Application WebSphere Transcoding Pub Gateway ALLTEL L Wireless O Application Server A D Device ID TCP/IP B DB A Radio tower L request processor Gateway A Sprint N C GSM I Local Data N Screen template Storag XSL processor G processor e TCP/IP Radio tower Gateway ARDIS Screen Templates XSL Stylesheets Radio tower The Future of Wireless Banking 5 Ron Ghani 1- Handheld Devices 1. Thin Client devices, Palm, Workpad, Ipaq.. 2. Two Way paging devices, like RIM 3. Smart-Phones, WAP phones 4. Others 5. Operating systems is a software program that manages the basic operations of a computer system. a. Windows CE: This is a light version of windows, developed by Microsoft. It is Installed on many of the PDA devices. b. Palm OS: It is developed by 3COM, proprietary platform. It is the most popular OS on the handheld due to the large market share that the Palm Pilot owns today. It supports some Java applications. c. Linux: It is very promising for growth, open source base, Java friendly , very efficient, and it can be installed on many PDA devices and even on smart-phones d. EPOC: Symbian consortium drove the development of this operating system mostly for smart- phone devices used by Ericsson and Nokia. EPOC is one of the major operating systems in this market. Each one of these handheld devices will require certain ways of communicating; they require their own Gateways to communicate to the application servers. Various sizes of screens create different data and screen layouts. Different keyboards generate different navigational options and different keys. The challenge is for the application server to sort out these devices, and send the data in the correct format to each handheld device. 2- Connectivity, Coverage, and Gateways In this section, we are going to explore the basic components of the wireless network architecture. Starting from the end user, the handheld device can be any device that is used to access a local cell tower. A cell tower is responsible for delivering local geographical coverage in a certain region. The coverage is divided into hexagonal boundaries. The cell tower then sends the data to a Base Station. The data is then transferred to a switching center. The mobile switching center connects all Base Stations. The mobile network system will record, and identify all of the users information by Home Location Register (HLR), if the user is in the geographical network. If not, then the Visitor Location Register (VLR) will be tracking the call. This is when you pay VLR WEB APPLICATION SERVER WebSphere Content Application Repository A engine P Rules and Logic Logic I HLR transform Engine Alert ation and additional Services services Data Mining and ESN/MIN Business Intelligence User Application User ID and Device ID and Security Info Click Stream Gateways Capability Server Logs Information Login History Data Profile The Future of Wireless Banking 6 Ron Ghani the big bucks for roaming. Once the call is initiated, the device will send its identity via its electronic Serial number (ESN) and Mobile Identity Number (MIN). This information is vital to have so the gateway can authenticate the user. This is where the application server can prepare the data to send back to the appropriate unit to be displayed. A packet is a collection of data prepared in a specific way for transmission. There are two types of transmissions, circuit switched and packet switched. Circuit Switched is a dedicated circuit for communication between two dedicated devices. Its duration is for the entire call. Packet switching does not require a dedicated line between the sender and the recipient. This method enables the data to be divided into a number of packets and to be sent in different paths for its intended destination. The connectivity will vary from one device to another, and from one service provider to another. The most challenging issue about the wireless systems is coverage. As end users sign up with WSP (Wireless Service Providers), they quickly come to realize that the packages offered are not so perfect. Due to the limited coverage areas, it seems as if it’s always the right plan at the wrong place. Wireless service plans will vary in options as well as in cost. Some of the common protocols that the WSP support are GSM, (not so big in the US yet), CDPD, CDMA, Ardis…etc. All of which are trying to make it big. Wireless Service Providers are all jockeying for the position to be the global provider. Existing Service Networks / Application Server APIs System Wireless Devices Providers Protocols Web Sphere WEB APPLICATION SERVER Web Sphere CDPD External Financial Logic CDPD CDMA transforma Component System tion and Gateway additional s GSM services System HTTP Ardis Applicatio processing XML n engine Update OFX CDMA GPRS MQ Gateway DB2 Mobite Notification Device JAVA Ardis x ID Services Gateway C++ TDMA VB User Alert Content Client Server Profile Services Feed GSM Gateway 3- Wireless Middleware (Application server engine) Wireless application is the focal point of the wireless system. This is where the flow of data is controlled, rules are set, and configuration files are executed. The application software should be an open system, easy to connect to and talk to other systems. One of the most common methods of communicating with backend systems is using XML API as the data delivery tool. XML is used to extract and deliver data; XSL can perform the transformations, using the DTD files to execute the functions agreed on in the integration and design stage. Different handheld devices will have different screen templates. The Application server should be tracking the users sign-in by the device being used, in order for data to be presented correctly. The screen templates can be XML documents which conform to DTD files. The screen templates are used only to define the layouts of the screen. They are device specific. The Future of Wireless Banking 7 Ron Ghani 4- Trans-coding, is it magic? Transforming is the process of formatting the content (data) XML Content according to the handheld device request using XML, XSL style-sheets and DTD files. This method will enable the end-user to access data universally regardless of the device type. XSL Processor Once a request from a handheld WML/XSLT Stylesheet HTML device is initiated, the application server will intercept the request to identify the device type and capture the content. Using several logical processes, the application server engine will process the data into an XML document, which can be communicated with the backend WML Browser system via the API connection. The XML Content Processing HTML Browser result of the requested data will be transformed (processed) using XSL style-sheets and then reformatted for the handheld device that made the request initially. This process can become complex very quickly, depending on the number of the handheld devices supported and the type of services offered by the financial institute. Therefore, products like IBM’s WebSphere can be valuable tools to build a robust financial system in a short time. The WebSphere application server will handle the data dynamically and adapt it to the handheld device. Also it can run multiple applications and requests, and can be easily integrated to the backend system. The WebSphere engine will select the correct screen template, format the data for the handheld device, and deliver the data requested. XSL is used for data transformation definitions, where the API will exchange the messages between the backend system and the application server. XSL and XSLT style sheets are mainly used to manage the presentation of the data, whereas the XML is handling the data. Managing Data: The application server can use common device characteristics to display the data. Using these standards can help in the development productivity. User IDs and handheld device IDs are stored in the database at the application server level. The application server will access the database once a login request is received. The middleware database is used to prepare and format the data for the device requesting the login. The application server will also compare the registered device ID to the user ID for additional security verification. The application server communicates with the gateway server for the specific device that initiates the request. The gateway will push the information to the handheld device according to the connectivity platforms like CDPD,SMS, Mobitex, and CDMA. The application server must accommodate for the different handheld platforms such as, thin client devices (IP based device), two-way paging, SMS messaging, and smart phones. It must then deliver the formatted data for that specific device data accordingly, end to end, in a reliable and secure manner. The Future of Wireless Banking 8 Ron Ghani WebSphere Application Server TRANSCODER SERVLET Requested Data Application HTTP Servlet Transcoder Gateway Radio tower User Authentication PIX fire wall Authorization Check Device ID send to API call End No Yes and User Profile Existing XML,OFX system User Device ID Profile Data Transcoder Data Formatted according to user's handheld device Source XML/HTML/WML Pushing or Pulling data? Pull technology is when the handheld device initiates the communication using it’s gateway, requesting data. Then data is pulled from the application server down to the handheld device. Push technology is when the application server is in more control over the handheld device. The application server will make decisions for the basic content and push data to the handheld device without waiting for the client’s request. In either, method authentication must take place first. The gateway transfers the handheld’s request to the application server (middleware). The application server will then know the device type by it’s identifier. The information will be sent to the backend system of the financial institute, using the API between the application server and the backend system. The application server will receive the information from the backend system to report it to the handheld unit. At this time, the data will be formatted into appropriate screens for the device that requested the data. The data will be passed back to the wireless server provider gateway, and then back to the handheld device. Wireless application Server must be device and network independent: The wireless application server must be able to work with any of the networks offered by the Wireless Application Providers. The Application server should be: • Easy to install, configure and add new services: • The client application must be easy to install, customize, and add new handheld devices. • Easy to Integrate with other servers and Back-End systems: • Integration is one of the key steps for a successful implementation of the wireless project. The API of the existing financial institute’s system must be reliable, and secure. Open System: The application server also must be an open system, using standard protocol to make it easier to add or change services, devices, and apply any customizations needed. The Future of Wireless Banking 9 Ron Ghani What about Screen Scrapping? Screen scrapping is one method I would not recommend to use as a final solution. It’s not a stable solution, due to maintenance required to keep updating the macro reader when fields are changed in the source document (Website). This method can leave more room for error. Screen scrapping is quick to implement, which can be a good tool for data presentation in the proof of concept stage. The Wireless Application Server is not an Internet server nor an extension to the Internet: The explosion of the wireless application industry in the last year or so has resulted in a common misconception. That is the wireless world is simply an extension to the Internet. While some wireless- enabling companies do use web-scraping (screen-scraping), a technique that captures screen content and transfers it to a wireless device. This technique tends to produce poor performance and unreliable wireless service. It’s also more manual and maintenance intensive. The most effective way to build a wireless application system is to connect into the back-end system, regardless of type. It could be a mainframe, client server, or a even Web-based system, using a direct connection via API. WEB APPLICATION SERVER Web Sphere Logic transformati External on and Components Financial Gateway additional API Existing services System system XML Application processing OFX engine Update MQ Notification Device ID Services User Alert Profile Content Feed Services News, Stock markert The Future of Wireless Banking 10 Ron Ghani Security and Wireless Banking and Trading Security is probably one of the most important issues in wireless banking, if not the most important. A recent study on wireless banking security uncovered the main challenge facing both wireless banking innovators and online banking establishments; nearly 85 percent of respondents are worried about online security transactions, including credit card purchases. More than 90 percent expressed concern about revealing personal information online, such as social security numbers. Over 90 percent of proprietary cryptography has been broken. Cell phone systems have been hacked. Wireless banking and trading is more vulnerable to attacks by hackers than many other wireless services. When data is flowing across a vulnerable environment, many of the available operating systems for phones and handheld devices offer little or no security. Most security violations occur within the institution or the service providers. Customizing wireless security is extremely difficult, especially when computing power on the handheld devices is very limited. Service Networks / Wireless Devices Providers Protocols Application Provider CDPD CDMA GSM Ardis Financial Facility Application GPRS Server Mobite x TDMA Financial System Dual secure key method Authentication Double key secure authentication is one of the protection methods used to verify access across different systems. Double key secure is where the user will authenticate two systems, the application server (at the Hosting service provider) and the financial institute. The transaction will be granted access, only when both locations agree. Secure network architecture is achieved when all interaction points and data paths traveled, are implemented by using double secure keys. It’s proven this method of security can drastically reduce violations and system hacking internally and externally, because all three parties must agree. One of the more common securities used is PKI (Public Key Infrastructure), an encryption used for PDAs and Smart-phones security. PKI consists of two keys, a public key and a private key, used to authenticate the user and encrypt the data. In addition, the financial institute should utilize the system to monitor access logs and flag questionable connections that can be done on the application server. Encryption is a trade off between speed and security. A good rule of thumb is to encrypt on a 32-bit CPU at the rate of ten CPU clock cycles per byte. Look for the most compact software. It should run under 5,000 bytes of memory. Encryption can vary form one device to another, depending on the platform and the operating system. For additional protection, authentication can be implemented through user ID and password. The Future of Wireless Banking 11 Ron Ghani The Challenge Wireless banking implementation is demanding. There are constantly changing standards for APIs, gateways, security methods, screens, operating systems, and browsers. There are also variable computing powers on the handheld devices and different bandwidth requirements. Wireless banking can be risky, lengthy, and complicated to develop. APIs (interfaces) must be designed to connect to the existing backend system. The application server must be able to accommodate to all protocols and all devices. You never know which device the end user is going to use. The application server must be able to communicate with all gateways, like WAP, GSM, two way paging, etc… A product like Web Sphere can reduce development time drastically. Transcoding tested templates can make the developer’s life much easier. The end result is a robust solution. Consulting companies promise a lot, but only few can deliver. Since wireless banking is still at it’s evolutionary stage, we must keep up with new technological advances, products, and development tools to help ease the transition. The wireless network must be device and network independent. Most handheld devices have their own standards to deliver data across the data channels. The end user should be able to easily customize screens, alerts, notifications, and messaging request services. The system should be able to notify users regardless of the device type. Scalability is a major issue. Selecting the right platform to run the application server will dictate the available tools to work with. The wireless banking system must be an open system that can easily and reliably be integrated with new gateways to the backend system. This is a challenge not many banking institutions should undertake on their own. The next best thing is out sourcing the development of the project, the implementation, and the hosting. Using a third party to administer and host the system is an option I would choose. Selecting the right application vendor: The vendor must have developed and installed a wireless financial system and must have a wide range of experience. Look for the following: 1. A trusted name and the longevity of the vendor is important 2. The vendor must have tested and used the product in a field specifically related to your field. For example, Wireless Trading is more demanding than Wireless banking. Wireless trading is time sensitive. Stocks, options, mutual funds, and bonds are all different services requiring different tools to process orders. The system must be able to deliver the data flawlessly and quickly to any handheld device. Wireless trading requires research capabilities. Wireless trading is much more active delivering user alerts, such as watch lists, quotes, charts, reports, notifications, summaries, and portfolio statuses. The wireless trading could be using external systems to gather data. The point is to be specific when dealing with application vendors; not all financial services are the same. 3. The testing and quality assurance stage must take place as early as possible to certify the systems. The application or applications must integrate fully to the backend system or systems, regardless of device type or platform. Management of all users definitions, events, requests, updates, changes, and requirements must be tested thoroughly. 4. Application servers must include monitoring tools and protocol management of all requests. 5. A turn key solution is an end-to-end solution. It goes from the backend system, where the data source resides, to the API connection, to the application server, to the WSP gateways, and then to the handheld units. The Future of Wireless Banking 12 Ron Ghani 6. The vendor must have widely available resources and experienced programmers, systems architects and project managers. Additional manpower must be available immediately if needed. 7. References and physical site visits are key to comprehend the consulting, development, and hosting environment. The consulting company will be an extension of your business. This is the life link between you (your system) and your customers using the services. 8. Backup and catastrophe planning must be in place. 9. The wireless application system must be network and device independent. The application should be fully configurable with customizable screens, using standard API’s. The wireless application server must be an open, modular architecture, to provide the user with the maximum flexibility and extensibility to make the development and deployment easier. 10. Development tools to enable you to make changes, add services, or deploy applications are crucial. 11. Products like IBM Web Sphere are End-to-End Solution for the wireless banking and trading enterprise. The IBM Web Sphere solution and Web Sphere Everyplace Suite are highly scalable server software, and have development tools for connecting millions of wireless devices to the Web. Java is capable to transcode, encapsulate the application logic, access XML documents, XSLT style sheets, and define the presentation. The Web Sphere architecture will help the programmer to focus on providing high quality. Web Sphere can handle the presentation and data management without getting involved in dynamic content generation. Views and screens can be developed for different devices easily and quickly using the same application logic. The road to a successful implementation: Remember, wireless users will not be able to multitask using the handheld devices; therefore, easier navigation will play a major role in the success of the project. It’s crucial to test all users’ functionality thoroughly, no matter how tight the schedule is for implementation. Depending on the type of network to be implemented, number of markup languages, and handheld devices to be supported. Testing can be cumbersome and complex. It is always a good idea to use multiple software development tools to test for the real world users. The financial institute should make use of the following steps for implementation and testing: 1. Documentation, Documentation, Documentation!! (in this order). Document all rules, procedures, and specifications. 2. Setup the application network environment as early as possible. Start with high-level conceptual and visual design. 3. Run traffic studies on bandwidth required to communicate between the backend system and the middleware system (application server), the gateways. 4. List all users functions and requirements. 5. Perform user analysis. 6. Perform technical assessment. 7. Hold users group meetings. 8. List business requirements. 9. Define functional requirements. 10. Definition of performance requirements hardware and software. 11. Use a standard API like MQ, or OFX (common in the banks industry), or develop XML API, which is becoming more popular. 12. Design business performance and process requirements. 13. Develop delivery plan. 14. Build a proof of concept to test all systems functions and requirements. Test APIs and architectural designs of the applications. Integrate with the data source (existing system) directly. 15. Start with a pilot (limited users). 16. Fix bugs, and fine tune systems performance. 17. Implement the full-scale rollout. The Future of Wireless Banking 13 Ron Ghani Conclusion We must react to the new world economy quickly and offer what the clients are looking for!!. The future of wireless banking is massive and aggressive in terms of requirements, demands, and support. The good news is, it’s great for financial business, but we must be cautious in implementation and execution to deliver a reliable service. Wireless media is challenging. Many variables are not under control yet. Coverage is a big hindrance. Legacy systems with different topologies and different platforms make things even tougher. There will be more streamline markets demanding new ways of conducting transactions. The future of wireless banking and trading has promising magnitudes of growth. Jupiter Research expects 18 million more people in the United States will become wireless subscribers in 2001, increasing the total number to 128 million. Moreover, the percentage of subscribers with Internet-ready wireless handsets will quadruple during this year. Despite millions of new users, the wireless market can expect some real challenges in the near future. "While penetration of wireless data services will gain momentum in 2001, a lack of substantial new technology deployments in the United States will stifle true innovation. Location-based services, high-speed networks, and highly sophisticated handsets will remain elusive in 2001." Wireless banking is sensitive to security, and is essential to finding the right balance between speed and encryption. Accuracy, consistent availability, and reliability of the services are key to a successful implementation and survivability of the financial institute. Geographical coverage is imperative to successful implementation. It must be clearly defined and understood. The confirmation of transactions is key to show the level of commitment and accuracy to your customers. Wireless banking is greatly dependant on the efficiency of the bandwidth. The more efficient the bandwidth, the faster the content is downloaded. End-users requirements are driving a demand for faster transmission and higher bandwidth capacity. In order to offer an enterprise wireless solution, major consortiums of the industry must break all political barriers and agree to a global format of communication. The consortiums must arrive at solution that can access all platforms across all networks regardless of device type, much like the Internet. The financial institutions are between a rock and a hard place. They would like to extend their services to the wireless world, but they lack the resources and the expertise to implement and deliver to their customers in a timely manner. Therefore, out-sourcing can be a vital option for the following reasons: 1. The financial institute can focus on their core business. 2. Extend the product offering in a timely manner, and get to the wireless market place sooner. 3. Outsourcing will help predict cost better, and forecast more accurate budgeting. 4. Use of the latest in technology. The Future of Wireless Banking 14 Ron Ghani Benefits of WebSphere middleware application server: • The financial institute can extend the reach of its product to new markets in a much shorter time. • Communicate with handheld devices seamlessly to access data and applications. • Enhance data transfer using the load balancing function, which can detect bandwidth capability and optimized data streams. • Reliable systems processing, and commanding encryption. • Sophisticated monitoring tools. • Reduces development time greatly. • Scalable open architecture using XML and XSL standards. • Integrates easily to backend systems, such as Mainframes and Client servers. • Unmatched product support. • End to end solution. Wireless banking and trading must be a virtual and global solution. Competitive forces will shape the wireless banking industry and help deliver the offerings desired to the end users. Wireless banking must reach a global standard before it can be unleashed to it’s greatest potential. The Future of Wireless Banking 15 Ron Ghani API Application Programming Interface CC/PP Composite Capability/ Preferences Profiles CDMA Code Division Multiple Access CGI Common Gateway Interface CPI Capability and Preference Information DCS Digital Communications System DTMF Dual Tone Multi-Frequency FDD Frequency Division Duplex GPRS Global System for Mobile Communications GSM Global System for Mobile Communication HTML Hyper- Text Mark-up Language HTTP Hyper-Text Transport Protocol JDBC Java Database Connectivity JSP Java Server Pages PCS Personal Communications System PDA Personal Digital Assistant PDC Personal Digital Cellular PeMS Personalized e-Messaging Server PICS Protocol Implementation Conformance Statement PKI Public Key Infrastructure RDF Resource Description Framework SMS Short Message Service SSL Secure Sockets Layer TDD Time Division Duplex TLS Transport Layer Security UDP User Datagram Protocol URI Uniform Resource Identifier URL Uniform Resource Locator WAE Wireless Application Environment WAP Wireless Application Protocol WBXML WAP Binary XML WCMP Wireless Control Message Protocol Wireless WML Wireless Markup Language WSP Wireless Session Protocol WTA Wireless Telephony Application WTAI Wireless Telephony Applications Interface WTLS Wireless Transport Layer Security XHTML Extensible HyperText Markup Language XML Extensible Markup Language XSLT Extensible Stylesheet Language Transformation WTA Wireless Telephony Application WTAI Wireless Telephony Applications Interface WTLS Wireless Transport Layer Security The Future of Wireless Banking 16 Ron Ghani
DMCA.com Protection Status Copyright by webtailieu.net