Posted
Comments None

Recently, Apple launched Apple Pay (Apple to pay) at the press conference, Apple CEO Cook pointed out that according to the survey data analysis, annual credit card spending was $ 12 billion, credit transfers up to $ 200 million a day, but the credit card payment process is very tedious, such as: security authentication, data delivery and synchronization, etc. NFC-based Apple Pay with just one “press” to the terminal reader, you can easily complete the payment process. Meanwhile Cook said all payment information of Apple Pay is stored encrypted.

This is the first OS-level platform for payment services, more unique is that it is compatible with the current mainstream method of payment. This article is to interpret Apple Pay works and the changes brought to the developers from a developer’s view.

Network-Level Tokenization:
The primary thing is to understand the concept of a tokenization. Currently payment networks (Visa, MasterCard, Amex, etc.) have established a very busy token connection. Traditional token is worked on gateway side or trading platform end, network-level tokens can be said to be a new attempt.
E-commerce developers should be very familiar with the concept of a credit card key, the mode is to return a token based on a user encoded information for authentication. These key information usually comes from the electricity supplier payment gateway, but also used for credit card user’s archive information. We called this as a gateway tokenization. The characterized of this token is it only worked on a single merchant, the advantage is when a credit card records to be archived, the terminal don’t need information security review for a large load of user.

The following is the gateway token work flow chart:

Author

Posted
Comments None

A router is a smart type of Ethernet hub, one that helps make decisions regarding where information goes and offers protection from the wiles of the Internet for computers on a local area network. My advice is to use a router even if you have only one computer connected to a broadband modem.

As a bonus, consider getting a router with firewall protection. That fixes two problems with one solution. There are many such routers. I personally use the NETGEAR line.

Routers are often configured by accessing the router’s Web page. (Yes, it has its own Web page.) From the Web page, you can further configure the router or assist in its automatic configuration. You want to tell the router to block unwanted incoming traffic while still allowing the computers on your local network to access
and use each other’s resources.

Also direct the router to assign local IP addresses to each computer on the network. (Refer to Chapter 16 for information on IP addresses.) It’s usually done via a feature named DHCP. That’s a good thing! Take note of the router’s own IP address. You want to enter it in each PC’s network setup window, by entering the router’s IP address as the gateway for your network. If you have difficulty with this part, call your ISP’s tech support line, and someone there can help you. (After all, you pay the ISP for this type of support.)

Most of what a router does is technical, so don’t let it bother you if you can’t understand half the options. Most of the time, the default or standard setup is best.

Author

Posted
Comments None

Firefox 32 has implemented a feature known as certificate key pinning.

Mozilla has added a defense in its latest version of Firefox that would help prevent hackers from intercepting data intended for major online services.

Textpattern icon

The feature, known as certificate key pinning, allows online services to specify which SSL/TLS (Secure Sockets Layer/Transport Security Layer) certificates are valid for their services. The certificates are used to verify a site is legitimate and to encrypt data traffic.

The idea is to prevent attacks such as one that affected Google in 2011, targeting Gmail users. A Dutch certificate authority (CA), Diginotar, was either tricked or hacked and issued a valid SSL certificate that would work for a Google domain.

In theory, that allowed the hackers to set up a fake website that looked like Gmail and didn’t trigger a browser warning of an invalid SSL certificate. Security experts have long warned that attacks targeting certificate authorities are a threat.

Certificate pinning would have halted that kind of attack, as Firefox would have known Diginotar shouldn’t have issued a certificate for Google.

In Firefox 32, “if any certificate in the verified certificate chain corresponds to one of the known good (pinned) certificates, Firefox displays the lock icon as normal,” wrote Sid Stamm, senior manager of security and privacy engineering at Mozilla, on a company blog.

Hit here and get the full article by Jeremy Kirk. Besides that, be careful when you install some popular apps, freeware, etc as some may include additional option to change your current browser settings, even install more other totally unwanted sponsorware to your system!

Author

Posted
Comments None

Google recently issued invitations to everyone to attend its conference which will be held on September 15 in India, according to the conference venue, the analysts pointed out that this conference may introduce the long-awaited Android One smartphone. One view of the importance of Android, Sundar Pichai or will attend the conference.

Google I / O Conference in June this year publish the Android One for the first time, this market-oriented Android joint India’s multiple vendors at the beginning, such as Karbonn, Micromax and Spice, and now there may be more vendors will join in this Android.

Why Google launched Android One? On one hand, Google is going to build low-cost smart phones servicing potential users of nearly 1 billion in the emerging market, on the other hand, Google hopes to regain the control of the primary users that the Android ecosystem.

Google’s Android, Chrome and Sundar Pichai, the senior vice president of applications told medias that Google will not reduce Android One’s hardware, on the contrary, Sundar Pichai hopes to keep the total cost through the sharing of resources between Google and the OEM manufacturers.

The project of Android One is designed to launch low-end machines which ordinary users can afford, so that Google can regain the control in the primary user sector. Development of low-end machines needs to control costs at the source, Google will provide inexpensive hardware and systems for the equipment manufacturers, in order to offset the burden of the consumers.

Given the importance of Android One project, it is widely believed, Sundar Pichai will attend the conference on September 15 in India. In addition, Android One is around the corner, when is the coming date of Android L?

Author

Posted
Comments None


According to a report released by market research firm Gartner, til the end of this year, Chromebook worldwide sales will reach to 5.2 million units which is an increase of 79% over last year; Chromebook worldwide sales will grow nearly two times til 2017, approaching 14.2 million units. Currently, Chromebook market is dominated by Samsung and Acer.

2011, Samsung and Acer firstly launched Chromebook, Currently these two companies is the market leader of Chromebook, Samsung’s market share in 2013 was 64.9%, Acer’s share was 21.4%.

At present, there are more OEM manufacturers began producing and selling Chromebook, such as Acer today launched a Chromebook equipped with Nvidia Tegra K1 processor. The Windows camp is pitching in, like Hewlett-Packard and Toshiba,they had announced that will launch Windows laptops priced at 199 dollars and 249 dollars to the education market , wanting to start a price war directly with the Chromebook.

Due to the lack of applications and features over-reliance on the network, Chromebook‘ development speed is not fast. However, with the continuous improvement of its functionality and low price reasons, more and more consumers are interested in this type of equipment, especially in education and business fields. Such as in 2013, nearly 85 percent of the Chromebook devices are sold to the school, about 82 percent of the Chromebook sales in North America.

In this regard, Gartner offers some advice to OEM manufacturers producing Chromebook: In order to get more users, Chromebook’s OEM manufacturers need to provide users with faster network connections, memory access speed, more powerful solid-state drives as well provide technical support and real convenience for the education and business users.

Author

← Older Newer →