Comments
Transcript
Dublin City University MSc. in Electronic Commerce
Dublin City University MSc. in Electronic Commerce Business School & School of Computing Practicum Report for FingerPal Biometric Payment System August 2009 Authors: Olga Bzdawka (MECB) 58212509 Zaneta Babko (MECB) 58210580 Francisco Canovas (MECT) 58211843 Supervisors: Howard Duncan School of Computing PJ Byrne Business School Chapter 1 Business Purpose Table of Content Acknowledgements............................................................................................................ 5 Executive Summary ............................................................................................................ 6 Introduction ....................................................................................................................... 7 Chapter 1 Business Purpose...........................................................................................8 1.1 FingerPal Description ................................................................................................... 8 1.2 The Structure of FingerPal Transaction........................................................................ 8 1.3 Value proposition ......................................................................................................... 9 1.4 Advantages of FingerPal............................................................................................. 10 1.5 Value Chain ................................................................................................................ 11 Chapter 2 Business Model .......................................................................................... 12 2.1 The structure of Business Model ............................................................................... 12 2.2 Revenue Model .......................................................................................................... 13 2.3 Facilitators .................................................................................................................. 14 2.4 Growth Strategy ......................................................................................................... 15 2.5 Key Milestones ........................................................................................................... 16 Chapter 3 Market Research ......................................................................................... 18 3.1 SWOT Analysis............................................................................................................ 18 3.2 Market Analysis and Trends ....................................................................................... 19 3.2.1 Industry Revenue Forecast by Sector ................................................................. 21 3.2.2 Applications......................................................................................................... 23 3.3 Future trends ............................................................................................................. 26 3.4 Growth Drivers ........................................................................................................... 27 3.5 Market segmentation ................................................................................................ 27 3.6 Promotion .................................................................................................................. 29 3.7 Pricing......................................................................................................................... 30 3.8 PEST Analysis .............................................................................................................. 30 3.9 Overview of end users ............................................................................................... 32 3.9.1 End-users: Survey analysis .................................................................................. 34 3.9.2 Feedback from the customers ............................................................................ 35 Chapter 4 Competitive Review .................................................................................... 36 4.1 Industry Forces ........................................................................................................... 36 4.2 Competitors Analysis ................................................................................................. 37 4.2.1 Competitive Advantage....................................................................................... 38 4.2.2 Competitors and their products.......................................................................... 38 4.3 Intellectual Property .................................................................................................. 39 Masters in eCommerce 2009 – Dublin City University 2 Chapter 1 Business Purpose Chapter 5 - Technology................................................................................................ 41 5.1 Technical Solution ...................................................................................................... 41 5.2 Technical overview and analysis ................................................................................ 41 5.2.1 Optical Scanner ................................................................................................... 42 5.2.2 Capacitance Scanner ........................................................................................... 43 5.2.3 Matching ............................................................................................................. 44 5.2.4 Bottom line.......................................................................................................... 45 5.3 Technology roadmap ................................................................................................. 46 5.4 Infrastructure ............................................................................................................. 48 5.4.1 Point of Sale ........................................................................................................ 48 5.4.2 Server side ........................................................................................................... 49 5.4.3 Web Service ........................................................................................................ 49 5.5 Process description .................................................................................................... 51 5.5.1 Enrol a customer in a Point of Sale ..................................................................... 51 5.5.2 Enrol a merchant into the system ....................................................................... 52 5.5.3 Enrol a customer using the online service .......................................................... 53 5.5.4 Perform a transaction ......................................................................................... 55 5.6 Technologies .............................................................................................................. 57 5.6.1 Client side ............................................................................................................ 57 5.6.2 Server side ........................................................................................................... 57 5.6.3 Point of Sale ........................................................................................................ 57 5.7 Security....................................................................................................................... 58 5.8 System Architecture ................................................................................................... 59 5.8.1 Application server ............................................................................................... 60 5.8.2 Web server .......................................................................................................... 60 5.8.3 Database server .................................................................................................. 61 5.8.4 Networks and Internets ...................................................................................... 61 5.8.5 Ecommerce server .............................................................................................. 61 Chapter 6 - Technical Solution ..................................................................................... 62 6.1 Prototype ................................................................................................................... 62 6.2 Description ................................................................................................................. 63 6.3 Database model ......................................................................................................... 64 6.4 Technologies used...................................................................................................... 65 Cascade Style Sheet ..................................................................................................... 65 HTML ............................................................................................................................ 65 MySQL 5 ....................................................................................................................... 65 Apache Tomcat 5.5 ...................................................................................................... 65 6.5 Testing ........................................................................................................................ 66 6.5.1 Functionality........................................................................................................ 66 6.5.2 Usability............................................................................................................... 67 Masters in eCommerce 2009 – Dublin City University 3 Chapter 1 Business Purpose 6.5.3 Server Side Interfaces: ........................................................................................ 68 6.5.4 Client Side Compatibility: .................................................................................... 68 6.5.5 Performance........................................................................................................ 69 6.5.6 Security................................................................................................................ 70 Chapter 7 Financial Projections ................................................................................... 71 7.1 Funding....................................................................................................................... 71 7.2 Sales Explanation ....................................................................................................... 72 7.3 Calculations ................................................................................................................ 73 7.4 Expenses..................................................................................................................... 74 7.5 Loss & Profit Projection.............................................................................................. 75 7.6 Cash Flow ................................................................................................................... 76 Chapter 8 Management Team ..................................................................................... 79 Appendixes ................................................................................................................. 80 Appendix 1 Competitive Analysis..................................................................................... 80 Appendix 2 Survey ........................................................................................................... 82 Appendix 3 Survey Results ............................................................................................... 85 Appendix 4 Legislation on Biometrical Information,European Directive : ...................... 88 Appendix 5 Potential Partners: Irish Merchant Banks (Acquirers) ................................. 89 Appendix 6 Historical Adoption Rates of Credit/Debit Cards .......................................... 90 Appendix 7 Merchant’s Terminal ..................................................................................... 91 Appendix 8 Individuals Contacted ................................................................................... 93 References .................................................................................................................. 94 Masters in eCommerce 2009 – Dublin City University 4 Chapter 1 Business Purpose Acknowledgements Out team would like to thank all the people who participated or supported us in conducting the project. We would like to appreciate the help of our supervisors, PJ Byrne and Howard Duncan who contributed to the completion of this report. Our group would like to thank also Prof. Alan Smeaton, Brian Stone and other members of School of Computing who guided us in technical issues of the report. We appreciate the help of practicum coordinator Cathal Gurrin and Maria Johnston from Invent for useful advice and support. We appreciate the support of companies who provided us with feedback. Moreover, we want to thank our friends and survey participants for their contribution to the market research. Many thanks to Niamh O'Neill from AIB, Mark McGoldrick from Bank of Ireland, Eddie Cullen from Ulster Bank, William Christie from Spar, Seamus Banim from Tesco and Natalie Danaher from Super Valu for their feedback. Many thanks also to our families for all the support received during these months. Masters in eCommerce 2009 – Dublin City University 5 Chapter 1 Business Purpose Executive Summary • The aim of this project is to examine the potential of fingerprint-based payment method on the Irish market. • The biometrics industry is experiencing a steady growth and is becoming more technologically advanced, the cost of fingerprint-enabled devices is dropping. • Studies show that consumers show acceptance to new methods of payment and that there is a need for new methods of payment and innovation. • The FingerPal system will be a new method of tokenless payment. • FingerPal has no exisitng competitors on the Irish market who provide similar solutions. • Biometric method of payment will provide security, faster throughput and convenience; the system will provide benefits for merchants, banks and the end users. • The process of retrieving fingerprint information is presented in the demo to prove it effectiveness. Masters in eCommerce 2009 – Dublin City University 6 Chapter 1 Business Purpose Introduction This project outlines the business and technical aspects related to the successful development and implementation of FingerPal solutions on the market. The report is based on the theoretical business knowledge as well as detailed technology description and its practical version. The first section of the report provides the description of the offering, including its originality, strenghts and value chain. It also outlines the business purpose of the product, mission statement and the process of transaction. The section focuses also on the competitive advantage and highlights the benefits of FingerPal for potential partners and end-users. Chapter 2 presents the business model with a detailed description of the transaction process. This section shows the value chain of FingerPal including partners and facilitators involved in the process. Finally, it presents the growth strategy of the comapny and crucial milestones to be achieved in the next three years. Chapter 3 is an extensive market research which gives an overview of the biometric industry and further provides details of the size of the financial sector of biometric market and its forecasts. What is more, the section provides the details of political, legal, economic and social factors that are present in the business environment as well as a WSOT analysis. The chapter gives also a description of the end user supported by data from surveys and interviews’ analysis. Chapter 4 looks at the companies who may be considered competitors to FingerPal or present a threat of developing similar solutions. This part of report involves the analysis of the industry forces. Chapter 5 provides a detailed description of the technological solution, including the technology roadmap, current stage of developmet, hardware requirements. Chapter 6 defines the prototpe and demo description. Chapter 7 is a detailed financial plan with cash flow and loss & profit analysis. Chapter 8 presents the management team. The list of appendixes presents research findings, surveys and other relevant information. Masters in eCommerce 2009 – Dublin City University 7 Chapter 1 Business Purpose Chapter 1 Business Purpose 1.1 FingerPal Description FingerPal is a new, innovative method of conducting financial transactions. It is a solution that allows consumers to pay for goods or services without the need of carrying a token, such as plastic card,, cash or cheque. Instead of traditional methods of payment, FingerPal will enable the users to use their biometric information, which is the fingerprint, to carry out transactions. The new biometric method of payment payment will be utilized in retail, petrol stations and restaurants. The merchants will benefit from faster transactions and greater customers’ satisfaction. Banks will benefit from fees involved in transactions, and, finally, the end users will be able to pay in a more secure, smarter and faster way. Our mission statement: “To deliver a new, innovative payment solution. To enhance the security of transactions and its throughput thanks to unique and unconventional technology solutions. To achieve recognition and nd wide acceptance as a new payment processing provider”. 1.2 The Structure of FingerPal Transaction The process of FingerPal’s transaction involves several steps that involve the merchants, banks, and end-users. users. The first step includes enrollment of merchant merchant and the end-user end to the system. Basically, the merchant registers with FingerPal online. The end-user end user of the system enrolls only once, either online from home (providing that their computer is equiped with a fingerprint scanner) or at merchant POS terminal. terminal. Since enrollment, the consumer can pay by fingerprint in any retail outlets that use FingerPal’s system. The Transaction Process can begin when both, the merchant and the consumer are registered with FingerPal. The transaction inloves the following stages: s Masters in eCommerce 2009 – Dublin City University 8 Chapter 1 Business Purpose 1. Transaction starts A customer buys products from the merchant 2. Payment processed The acquirer (merchant’s bank) receives the transaction. The acquirer subtracts the discount fee from the amount received and the final merchant’s transaction earning. 3. Submission The transaction is passed to the bank who provides the customer’s account. It is submitted first to FingerPal who determines the interchange fee and then directly to customer’s bank. 4. Payment received The customer’s bank pays the acquirer. The acquirer receives amount which is subtracted by the interchange fee. The interchange fee goes partially to the customer’s bank and to FingerPal. 5. Customer’s payment The customer’s bank account is charged by the sum of transaction. 1.3 Value proposition Our product will provide more advantages over the conventional payment methods such as cash or plastic cards. s. We consider that our product will provide a multi-sided multi sided advantages for both, the customers, the merchants merchant and the banks. The members of FingerPal’s value chain are presented in the graph: Masters in eCommerce 2009 – Dublin City University 9 Chapter 1 Business Purpose 1.4 Advantages of FingerPal BioPay will provide benefits for the following entities: Consumers Convenience Customers will be able to pay for goods by fingerprint. Thus, there will be no need of carrying cash, plastic cards or cheques. Transactions will be performed in a quicker and more convenient way. The queuing time will be decreased and transaction performance enhanced. Security There will be an increased security of transactions as there will no longer be the risk of losing plastic card or cash. With a fingerprint, each individual will not have to worry about the possibility of losing financial resources. Lack of Charge Customers will not be charged for the transactions. Compared to some of the plastic card companies or banks who charge for each transactions, BioPay will be completely free for customers. Ease-of-use Customers will be required to enroll one time and their personal account will be created. There is no need for setting up a new bank account. Merchants: Increased earnings The merchants who will implement FingerPal method of payment will benefit from more frequent transactions. The conveniece for customers will be increased, thus, merchants will provide higher standards and meet the expectations of customers. These will result in increased transactions and greater cusotmers’ satisfaction. Quicker processing of transactions FingerPal does not require plastic cards or cash. Thus, the time spent in each transaction to insert plastic card or money will be eliminated. Consequently, the transactions will be performed quicker. Merchants will be able to increase customers’ satisfaction and convenience. Masters in eCommerce 2009 – Dublin City University 10 Chapter 1 Business Purpose 11 Convenience Customers satisfaction will be increased. Moreover, Moreover, the merchants who will provide the FingerPal methods will be perceived as more innovative and more attrcative for customers. Thus, the general image of merchants will be enhanced. Savings/Increased revenue FingerPal will provide competitive prices for each transaction processed. Thus, our product will be charged less than the standard charges for plastic card payments. Currently, the average plastic card transaction fees range from 1 % to 3%. FingerPal will decrease this amount by at least three times. Thus, merchants may benefit from savings. Banks: Increased Revenues Banks will benefit from a new way of conducting transactions through the interchange fees. This will provide banks with the opportunity to increase their revenues. 1.5 Value Chain The value chain of FingerPal will aim to deliver the best possible value to our customers and, at the same time, generate revenue that exceeds the cost of activities within the firm, and, therefore, results in a profit margin. The key aspects of the value chain chain are presented in the graph 1.5. Inbound Logistics: Equipment from Hardware Manufacturers Operations: Builiding Design & Operations Testing Transactions Processing Database Maintenance Marketing & Sales: Outbound Logistics: Distribution To Retailers Promotions Mix: Online /Offline Advertising Brochures Seminars/Trade Shows Firm Infrastructure: Management of Information Systems Technology Development:Innovation Innovation - R&D, Security Enhancements Human Resource Management: Recruitment, Training, Payroll Procurement: Components from Suppliers, Bank Agreements Masters in eCommerce 2009 – Dublin City University After Sales Service: Complaints Handling Customer Support Margin Chapter 2 Business Model Chapter 2 Business Model There are several aspects of our business model that make it successful. First of all, BioPay will allow for a new way of concluding transactions. It will rely on a network that will enable transactions on a global scale. Our product will provide the merchants and financial institutions with the opportunity to grow and deliver new methods of payments to the customers. Thus, our business model will be beneficial for customers, merchants and the banks. Customers will be able to make more secure and convenient payments without the need of carrying a “token” such as cash or plastic card. Merchants will improve their image, lower transaction costs and attract more customers whereas financial institutions will have the possibility to grow their revenues from transactions through a new method of payment. 2.1 The structure of Business Model FingerPal’s business model is determined by the so called interchange rate. It is a fee involved in processing a transaction between the merchant, merchant account provider (acquirer bank) and the customer account provider (any bank). The merchant bank is the bank who has an agreement with a merchant . It accepts the deposits from transactions. Interchange fees are paid to the customer’s bank account by the acquirer. Part of that fee will be charged by FingerPal. The rate will be determined by various factors, such as the type of merchant (shop, restaurant, etc.) or the volume of transactions. However, in the first years of activity we will focus on a flat fee for the retail sector. In order to proceed the transactions FingerPal will be required to sign an agreement with the bank that is the merchant’s acquirer and the bank that provides bank account to the customer. The agreement will authorize FingerPal to perform transactions between the banks. Moreover, the agreement will contain the rights , terms and condition, and rules with regard to the transaction process. The interchange fee will be determined by the type of industry, processing environment. Nevertheless, our transaction fees will be competitive compared to current plastic card networks such as VISA or Mastercard. The business model of FingerPal will be similar to plastic card associations such as VISA or Mastercard. As stated in the companies’ websites, both of the organizations generate high revenues through interchange fees. Both firms managed to earn $26 billion in 2004 from interchange fees. The revenue grew to $ 30.7 billion in 2005 which accounted for 85 percent of increase from 20011. 1 www.visa.com, www.mastercard.com Masters in eCommerce 2009 – Dublin City University 12 Chapter 2 Business Model 13 The interchange fee of FingerPal will be highly competitive compared to plastic card companies’ fees. Currently, the interchange fees are very complex and differ. There are about 270 types of interchange fees. For instance, VISA determines the interchange fee rate depending on where transaction takes place, whether it is an online transaction or over the phone. FingerPal will suggest the most beneficial fees for merchants and banks. Our pricing model will be more satisfactory for merchants as interchange fees will be set lower than common plastic card fees. We consider that the interchange fee cannot be too high so as to gain acceptance to FingerPal service. On the other hand, the interchange fees cannot be too low so as to retain the interest of customer’s bank to cooperate with FingerPal. Consequently, we will strive to provide the best and most convenient fees for both merchants and banks. 2.2 Revenue Model FingerPal will provide an interchange fee lower than the current plastic card transactions fees. The revenue will be based on the number of transactions within FingerPal network.The low cost of transaction process will offer competitve choice for merchants. The table presents current average interchange rates for VISA, MasterCard in Ireland compared to FingerPal transactions’ fees2. Card Type Chip & Pin MasterCard Electronic/ Consumer VISA Commercial Retail 0.80% 2.30% + 0.10 FingerPal 0.70% 2.20% + 0.10 2.10% + 0.10 Pay Pass 0.80% --------------- ------------- Enhanced Electronic 0.95% ----------------- -------------- 2 www.interchangefees.com/Compare.html, visa.com, mastercard.com Masters in eCommerce 2009 – Dublin City University Chapter 2 Business Model 2.3 Facilitators Banks FingerPal aims to form strategic partnerships with banks who will be involved in transactions processing. The company’s device will be purchased by merchants. This will allow FingerPal to connect retailers to our network. These includes Irish merchant’s banks and consumers’ banks3. Hardware manufacturers Secondly, FingerPal aims to form partnerships with biometrics hardware manufacturers who will provide devices for POS systems. We plan to cooperate with the following company: Biometric Access Company (BAC) - the company was established in 1996 and its main base is located in Round Rock in Texas. BAC provides various fingerprint technology solutions for lowering risks in organizations . The company’s products include hardware and software applications of biometric technologies. One of the BAC’s offering that can be competitive for FingerPal is SecureTouch Solutions. The product is based on a terminal SecureTouch Advanced Modular (STAm™)4.The device provides the opportunity of adding features that are neccessary for certain industries. For instance, the terminal can serve various purposes such as payroll check cashing, Credit/Debit Transaction Processing, Pharmacy Controlled Substance Tracking, Pharmacy Physical Access Control, Time & Attendance, Age Verification. The device can be extented depending on the customers needs. Options include a barcode scanner, printer, camera, document scanner, modem and finger imager. Thus, the customers can add extra features and utilize, among others, a biometric technology in concluding retail transactions.The scanner is built of an optical imager. It can be utilized as a ID verification, digital signature for authorization of transactions, electronic payment by means of a fingerprint, or cashier logon. The device is secure thanks to encryption that is provided when the data is transferred to the server. The advantages of the system is the fact that every seller can keep up with changes and easily adjust a simple plastic card processing device to changing businesses and customers requirements.Thus, the device can never become outdated. The other product offered by the company is Secure Payroll Check Cashing. The product provides the opportunity to verify the identity of customers and provides authorization of transactions by a fingerprint scanning process. A customer’s fingerprint image is enrolled and then utilized as a method of verification in check transactions. Such a way reduces the check losses and provides security for check fraud. The solution can be implemented in the exisitng 3 4 See Appendix 5 for details. See Appendix 7 for details Masters in eCommerce 2009 – Dublin City University 14 Chapter 2 Business Model POS systems or be utilized a s a separate application. This resuslts in no requirements for an ID in check transactions. The customers are only required to swipe their finger for authorization. ID card has to only be presented at enrollment. VeriFone – The company was founded in 1981 in Hawaii and provides point-of-sale devices. The company delivers their products to various industries, including financial, hospitality, petroleum, retail, helthcare. In 2005 Verifone merged with BAC to incorporate biometric solutions into their equipment. In particular, their devices can be added extra features such as a fingerprint scanner for processing payment transactions . 2.4 Growth Strategy The growth strategy of FingerPal involves several stages: Stage 1 Prototype development and Funds Raising This stage will focus mostly on developing the software for fingerprint recognition and image retrieval. The company will also gather funds neccessary for the technology improvements and the creation of the company. Once the software is completed we would like to have all patents filed so as to protect the IP rights of our product. Stage 2 Forming Strategic Partnerships Stage 2 will be performed concurrently with stage 1. FingerPal will form strategic partnerships with the members of its value chain, including banks, merchants and biometric hardware manufacturers. Stage 3 Market Penetration This phase will concentrate on market penetration, marketing and advertising. This phase is a crucial point in the growth strategy as it involves gaining recognition on the market and reaching customers. FingerPal will distribute its infrastructure in small retail chains such as spar and Centra. We aim to subsequently extend the value chain by supermarkets and other retail outlets. Next step will involve the penetration of restaurants and petrol stations in order to enhance the volume of transactions. Stage 4 Extension of Customerbase Once FingerPal position on the market is established, we will extend the scope of the business. FingerPal will allocate financial resources to research & devlopment of utilizing our service in online transactions. We will develop the infrastructure for making online transaction by fingerprint. Masters in eCommerce 2009 – Dublin City University 15 Chapter 2 Business Model 16 2.5 Key Milestones FingerPal aims to develop the business in several phases in the first years of operation. The key milestones include: 1. Patents filed by March 2010. 2. The financial resources for the start-up raised by the end of 2009. 3. Tested, approved, working software fully intergrated with hardware and the network by February 2010. 4. Agreements with the Irish banks and merchants signed by January 2010. 5. Partnerships withb hardware providers formed by the end of 2009. 6. February 2010 FingerPal transaction systems appear in the retail sector. 7. August 2010 FingerPal system appears in petrol stations. 8. February 2011 the implementation of the system in restaurants and canteens. 9. By the end of 2011 research and development for the online transactions. 10. Early 2012 implementation of the system in online transactions. Milestones Chart START DATE END DATE Business Plan Completed 20/05/2009 31/07/2009 Software/Applications Working 20/05/2009 31/12/2009 Start-up Financial Investment Raised 20/05/2009 20/01/2010 Patents Filed 31/11/2009 31/12/2009 Banks Agreements Signed 20/10/2009 01/01/2010 Partnerships with Merchants Formed 20/10/2009 01/03/2010 Masters in eCommerce 2009 – Dublin City University 17 Partnerships with Hardware Manufacturers Formed 20/10/2009 01/01/2010 First FingerPal Transactions in Retail 01/02/2010 n/a Implemenation of FingerPal in Restaurants, Petrol Stations 01/08/2010 n/a Research&Development Investment 01/05/2010 01/12/2010 FingerPal in Online Transactions 01/04/2011 n/a Masters in eCommerce 2009 – Dublin City University Chapter 3 Market Research 18 Chapter 3 Market Research 3.1 SWOT Analysis Internal Strengths Weaknesses Convenient and easy to use way of payment- no need for carrying cash, checks or plastic cards Reduction of queue times- quick and effective way of processing query Advanced technology for extraction of features from the fingerprint Convenient and safe way of signing for the service Reduction of identity fraud Lower cost per transaction for the merchant, compared to standard debit or charge card fees Enhanced merchant’s image Storage of the fingerprint template, not the actual image: Enhances security-compatible with law enforcement authorities’ systems Reduces the processing product price - less memory and processing power required Long term guarantee for accurate user authentication- fingerprints do not change over time (compared to other biometric methods) Free for customers External Possible forgery, the cryptographic keys are vulnerable to attack. Privacy and trust issues - people are very protective about their personal information Costs of implementing new system (new equipment, software, integration issues, staff education) Balance between the security of the system and acceptable error ratefingerprint is not an exact match only with certain probability. Denied access to the financial fingerprint is affected by cuts, dirt, chemical solution etc. Opportunities Threats Wide variety of possible applications across a range of vertical sectors Alternative way of payment or even replacement of plastic/smart cards payment Extensive scope for biometric devices manufacturers and software Resistance to accepting the new payment method by public Slow take off of the technology Intensive competition from different biometric solutions providers and non-biometric technologies providers (tokens, RFID, smart cards) Masters in eCommerce 2009 – Dublin City University Chapter 3 Market Research developers offered by the biometric market to improve the quality of service at affordable price for the mass market Beneficial state of biometric market rapidly growing rate of the biometric market and development of biometrics solutions No biometric payment methods implemented on the Irish market Worldwide trends in the financial and retail sectors and growing acceptance of new way of payment A threat that other biometric companies develop similar solutions Difficulties in demonstrating clear value proposition for biometric implementation – ROI for corporations; merchants run a risk that FingerPal will not acquire a beneficial number of users 3.2 Market Analysis and Trends Industry overview During the last two decades there is visible rapid development of the payment methods. The first approach to replace “real” money by their “virtual” equivalent is presented by Chaum (1985). He introduced the system that employs small card computer which are utilized by user to process all kinds of payment. Using this solution consumer does not need to carry cash any more, because all the transactions would be performed virtually through the card computer. Smart card based payment system was also implemented in Germany. User could upload money directly from personal bank account using the EC-Karte with inserted chip or magnetic stripe and then pay with the collected money at the POS terminal. Nowadays, the most attractive and innovative approach in payment systems includes the mobile payment and biometric payment. Mobile payment solution utilizes mobile phones as a payment instrument. The German provider of these services- Paybox, had to liquidate the business in 2003 though because the gained customers base was not sufficient in order to break even. The second solution implements biometry to manage the personal financial resources in the new and innovative way. The biometric payment system is described by Van der Ploeg (1999) as the example of the ATM that utilizes the voice recognition and the iris scanning to perform the user’s authentication process. Marshall (2003) reports discuss the supermarkets in United States that introduced the finger based payment solution. According to the report “Global Biometric Market - New Opportunities (2007-2010)” provided by leading market research company RNCOS, the growth of biometric market is expected to be at a CAGR of over 24% in the period from 2007 to 2010. Masters in eCommerce 2009 – Dublin City University 19 Chapter 3 Market Research Increasing concerns for personal and global security and appearance of innovative technologies will drive the remarkable growth of the biometric industry. Other growth factors are low ownership costs, comfortable and simple usage, and easy compatibility with existing networks infrastructure and internal systems, easy application of developed IT security solutions, rising engagement of established corporations. Biometrics solutions has been already implemented in several areas such as enterprisewide network security infrastructures, secure electronic banking and insurance, health and social services, low enforcement for security and privacy solutions. Percent of Biometric Market by Vertical Sector Figures from IBG’s Biometric Market and Industry Report 2006-2010 Several organizations like banks, security monitoring providers, driver licenses, passport programs, retail shops, petrol stations, restaurants, enterprise and government networks gaining already from applications of biometrics industry. The government and law enforcement sectors appear as major biometric industry users with the market share of approximately 37% and 25% respectively. The financial and health care sectors become increasingly important users with the rapid rate of biometric utilization. The growth represents CAGR at the level of around 45% and over 31% respectively from 2008 to 20125. 5 “Global Biometric Forecast to 2012”./sept 2008 Masters in eCommerce 2009 – Dublin City University 20 Chapter 3 Market Research The most popular among biometrics techniques are facial recognition, fingerprint, iris, AFIS and they are expected to constitute over 80% of the global biometric market by 20126. 3.2.1 Industry Revenue Forecast by Sector Figures from Development of a Bi-Modal Biometrics Business Solutions for Physical Access Control Report, Frost and Sullivan, March 2007 The most revenue ($81.5 million) for the non-AFIS fingerprint recognition comes from the financial sector fallowed by government sector ($58.7 million). According to the latest report from Frost & Sullivan the financial sector contributes to more than a third of the fingerprint biometric market revenues globally and is expected to grow for about $866.9 million achieving the revenue of $948.4 million in 2011 that accounts for CAGR of 63.37% during the period 2006 to 2011. The revenue from government sector is expected to grow from $58.7 in 2006 million to $434.5 million in 2011. The growth represents CAGR at the level of 49.23%. The healthcare biometric market is anticipated to growth at the most rapid growth rate with the CAGR of 67.89% increasing revenue from $14.5 million in 2006 to $193.4 million in 2011. Government The demand for fingerprint biometrics systems is stimulated by rising implementation of physical access control in government properties. The controlled access includes both entrance into the buildings and restricted access sites within buildings. 6 “Global Biometric Forecast to 2012”./sept 2008 Masters in eCommerce 2009 – Dublin City University 21 Chapter 3 Market Research The demand for face recognition is driven by execution of government programs such as the mandatory requirement of biometrically-enabled passports (e-passports) applicable for particular countries in Europe and Asia-Pacific. The revenue is also generated by meeting the requirements of more comprehensive government programs such as HSPD-12 introduced in North America that utilizes fingerprint biometrics for physical and logical access control. Financial The financial services become increasingly important target market for fingerprint recognition although civil identity and government sectors are the early adopters of biometrics. The trend appeared due to the undertaken activities to reduce identity fraud or identity theft. The financial institutions adopt biometric solutions to comply with the regulations of specific government programs in Europe and North America. The superior government programs include: o The 2005 Federal Financial Institutions Examination Council (FFIEC) guidelines o The Sarbanes-Oxley Act of 2002 (Section 404) o The Basel II Accord7. The requirements caused the increased demand for risk limitation, more precise employee audit processing and secure authentication of banking accounts. The ATM machines with embedded biometrics sensors are gaining popularity, in particular in the developing regions. The customers can withdraw money from personal bank account using only fingerprints instead of carrying an ATM card. The ATM’s with biometric sensors can also serve more unique purposes. The relief organisations such as WHO can use the biometricallyenabled kiosks and ATMs to expand the aid. The provided biometric systems guarantee the access to the funds only for the legitimate recipients. The demand is also driven by adoption of physical access control in financial institutions and to entry into secured data centers. The logical access control applicable for employees log on and online trading is stimulating further revenue generating opportunities. Healthcare The requirement for physical access control to enter the healthcare institutions such as the intensive care is stimulating the popularisation of biometrics solutions, especially fingerprint recognition. 7 Strong Growth for Biometrics in Financial Institutions Expected Globally, Frost & Sullivan May-30- 0 8. Press release: Findbiometrics, Global identity management Masters in eCommerce 2009 – Dublin City University 22 Chapter 3 Market Research The restricted access to the patient confidential records that can only be entered by authorized medical staff also stimulates the fingerprint systems implementation at the shared workstation in hospitals. The Health Insurance Portability and Accountability Act (HIPAA) have determined the need for enhanced security solutions in North America. 3.2.2 Applications Percent of biometric market by technology Figures from IBG’s Biometric Market and Industry Report 2006-2010 Fingerprint recognition Fingerprint recognition is the most popular biometric solution with the market share of 43.6%. It is also the most mature form of biometric identification. Wide scale implementation lowered the product price making the technology the lowest cost solution on the current market. It is deployed for physical access control, logical access control, civil identification, time and attendance and is also becoming increasingly utilized for customer identification. The vertical sectors that need to enhance security standards and comply with the legal regulations and such as government, financial services and healthcare sectors are the common users of fingerprint readers. Newly developed sensors allow deploying fingerprint readers even under difficult conditions. Masters in eCommerce 2009 – Dublin City University 23 Chapter 3 Market Research Face recognition Face recognition fallow fingerprint recognition biometrics as the second most popular solution with the 19% of the market share. New trend- 3D face recognition is successfully deployed in physical access control and time and attendance applications for verification. Law enforcement sector has utilized 2D face recognition systems for verification. Face recognition is suitable to apply in environment where employees have busy, dirty or greasy hands when entering or leaving buildings or where there is a high volume of traffic- for example transportation sector. The technique is also increasingly adoptable by the civil ID market. Hand geometry recognition Hand geometry is the longest utilized biometric modality. The technique is implemented in physical access control, time and attendance, and personal verification systems. It can be utilizes in very harsh environment. Hand geometry applications are able to process 1:1 verification though 1: N match capability development is currently in progress. This biometrics is does not have so wide-scale deployment as fingerprint that resulted in higher processing costs and lower level of accuracy. Iris recognition Iris recognition is also biometric solution at mature stage of development. This technology has the smallest scope of environments of all biometric solutions where it can not be used. Single enrollment is usually sufficient for a lifetime, because of the template longevity. Iris biometrics has been already implemented for access and border and immigration control systems. It is also considered for deployment in future e-passports and authentication onto mobile devices. Vein recognition Vein recognition solution is still an emerging technique. The prime target markets for vein biometrics are the healthcare and financial services sectors and also transportation sector shows interest. It is already deployed in high-risk facilities such as nuclear reactor and biohazard lab. The universities and casinos with their cash room security systems are also among the users. The technology can be utilized in a high volume of traffic environments and has low data storage requirements. Voice recognition Voice recognition biometrics is implemented in call centers and financial institutions’ systems for physical access entry and where the remote customer identification is required over a phone or online. The solution is not implemented in such a wide scale like the other biometrics modalities. Masters in eCommerce 2009 – Dublin City University 24 Chapter 3 Market Research Summary The fingerprint recognition biometrics is the most mature and developed technology with the market share. The economic scope lowered the prices for fingerprint recognition devices. The infrastructure and operation methods are well defined. This biometrics solution was already successfully implemented in few sectors in worldwide markets for payments or similar operations. As a result we decided that fingerprint recognition solution will be the most useful and convenient to implement for FingerPal business activity. There are different kinds of biometrics systems that have been applied in financial sector. The technologies include face, non-AFIS fingerprint, vein, voice, iris, hand geometry and signature recognition. The degree of acceptance varies among these technologies. The chart above illustrates the distribution and level of utilization across the most popular biometrics applications in financial services- Transaction authentication, logical access control, physical access control. Clearly the non-AFIS fingerprint recognition occupied a dominant position on the market in 2006. It is the most mature technology with the lowest cost and high accuracy as the key advantages. It is commonly used in physical access control and logical access control as well as in transactional authentication. The non-AFIS fingerprint technology is widely used across financial institutions to manage funds at the ATM machines, to access to the bank vaults, internal bank management or the business PC’s. Other biometric solutions that are gaining popularity are the voice verification and vein recognition. The voice verification technology was implemented in several banks in Europe for telephone banking purposes in order to allow for remote user’s authentication. Large-scale Masters in eCommerce 2009 – Dublin City University 25 Chapter 3 Market Research 26 commercial deployment of voice biometrics was made by the ABN-AMRO Group based in Netherlands in its contact centers for telephone-banking client verification in 2006. Vein recognition that consists of recognition of the vein patterns in the palm and finger commonly deployed in Japan and South Korea until 2005. In 2007 it has begun to appear as an increasingly important alternative to non-AFIS fingerprint recognition solution, in particular for biometrically-enabled ATM’s and gradually for physical access control. According to Hitachi by mid of 2007, vein recognition was utilized in about 85 percent of Japan’s ATM’s for customer’s authentication8. 3.3 Future trends According to the survey about the future perspectives of fingerprint based payment systems conducted by the German supermarket chain EDEKA respondents are quite optimistic. 35% have no doubts that the fingerprint solution will be prevalent in the future. 52% assign good chances to it and only 13% consider that the fingerprint payment systems will be rejected by the majority9. According to the survey from TNS, Market Research Company, 60% of respondents worldwide think that payment for the transaction just with the use of fingerprints will be possible by 2015. The survey (2008) from Unisys, the information technology consulting company, reveals that more than 70% of consumers will provide banks and government agencies with their personal biometric data for identity verification. Global Revenue Forecast of Fingerprint Technology Revenues ($) mlns 2500 2000 1500 non-AFIS 1000 500 0 2006 2008 2011 Years 8 Vein Recognition Use Grows, John Wagley, January 2008. A Case study on digiPROOF, a Fingerprint Based Payment System, M.Mayer, N.Bridgeman, L.Muller, NACCQ Conference 2006. 9 Masters in eCommerce 2009 – Dublin City University Chapter 3 Market Research The revenue of the non-AFIS fingerprint biometrics market is predicted to reach the level of $2.2 billion in 2011 from $178.0 million in 2006, which accounts for compound annual growth rate (CAGR) of 65.7 percent between 2006 and 201110. 3.4 Growth Drivers 1) National security concerns • Increased deployment of biometric solutions for citizens, employees and foreigners initiated by government • Further development of already implemented national security programs including (US-VISIT, EU-VIS/ Schengen VISA, Registered Traveler Program) 2) Identity management • Increased demand for biometric solutions that can provide identification, authentication and authorization of individuals to the secured resources 3) Identity theft concerns 4) Popularization of wireless devices to confirm the physical presence or/and access sensitive resources 5) Availability of the devices with increasing functionality at the decreasing prices- better value proposition 6) Standardization • Limited confidence in proprietary hardware and software • Improved interoperability across algorithms, devices and infrastructures 7) Enhanced manufacturers’ and developers’ equipment 8) Increased interest and involvement of well-known organizations (IT firms, electronics providers, system developers and integrators) 3.5 Market segmentation For the purpose of segmentation of the target market we have classified (retail providers), who are likely to adopt biometric payment in order to provide better service to the earlier described end users. The segmentation is based on the structure of the current retail market in 10 Development of a Bi-Modal Biometrics Business Solutions for Physical Access Control, Frost and Sullivan, March 2007 Masters in eCommerce 2009 – Dublin City University 27 Chapter 3 Market Research Ireland. Our research confirmed that retailers that use plastic card infrastructure for payment would implement another innovative and convenient alternative for finalizing the transactions to gain the competitive advantage and follow the trends on the market. We identified a distinctive group of retailers that represent FingerPal potential customers. Retail Sector FingerPal primer customers are the retail sector businesses in Ireland. FingerPal will target them in the first years of the business activity. The Irish retail sector may be divided into the following subsectors: 1 Supermarkets Our main customers will be the major supermarket chains in Ireland. These are the main customers for us because payments for consumer goods account for majority of transaction on the daily basis. Particulary, we would like to target Tesco (91 stores across Ireland), Dunnes Stores (123 stores), Superquinn (21 stores), Marks and Spencer, Aldi and Lidl11. The reduction of queue times and lower fee per transaction is of a great imporatnce to the supermarket chains considering the number of customers and card payment transactions conducting every day. Especially chains with cut-price brand image (Tesko, Aldi, Lidl) might be interested in fees reduction per transaction.We consider beneficial targetting the chains of stores as this will provide us with the access to a bigger number of consumers, and, consequently, higher revenues from transactions. 2 Convenience Stores and Newsagents We would also like to target smaller merchants including SuperValu (182 stores), Spar (430 stores), Londis, Centra (450 stores), Mace, XL Stop and Shop, CostCutter and Vivo. FingerPal system would be attractive to the convenience stores because of the opportunity of adding value to the customer service by introducing convenient and easy to use way of payment. The customers of these kinds of shops are usually interested in quick shopping, so the biometrics payment advantage would be also saving time for busy customers. FingerPal could gain access to the different type of customers. The grocery shops would be also important revenue stream for FingerPal, because the purchases include usually more expensive products (mostly beer, liquor, cigarettes) and the time of opening our is usually extended. 11 Retail in Ireland, in Global Oneness, August 10, 2006 Masters in eCommerce 2009 – Dublin City University 28 Chapter 3 Market Research 2.1 Petrol stations The subsection is also petrol stations that have alliances to provide convenience stores in the station area. Few brands fall into this category such as: Maxol stations and Mace, TOP stations with Londis outlets Esso stations with On the Run stores, Statoil with Fareplay stores. FingerPal payment system has the possibility to reduce the card payment fraud. It is the important advantage to increase customer confidence after a spate of card cloning cases. There is opportunity to retrieve electronic payment user and increase amount of users utilizing electronic payment. 4 Department/Clothing Stores We aim to also target clothing shops, in particular, the largest chains of shops in Ireland. These include Dunnes Stores (123 stores), Primark, Debenhams, River Island (17 stores), Clerys, Arnotts, Heatons (57 stores nationwide). The stores would be attracted to the alternative payment systems in order to add value for the customers. The clients of these shops are more likely to use electronic payment methods, because the value of the transaction is usually higher than for daily customer goods. 5 Shopping Centres The Square, Tallaght, Blanchardstown Centre, Liffey Valley Shopping Centre, and Dundrum Town Centre. This sector creates best- revenue generating opportunities. The shopping centers cumulate wide range of different types of stores that result in attracting large base of customers with various needs. Adoption of the fingerprint payment would be of great benefit for FingerPal especially at the early stage of launching on the market. The competition between the merchants is intensive, so there is possibility that they are most likely to adopt new alternative payment system to gain competitive advantage. The benefits of FingerPal system would reduce the queue times, offer convenient way of payment and lower the fees per transaction. The introduction of the fingerprint recognition biometrics in high standard, popular shopping centers could start the new, modern trend in payment methods. 3.6 Promotion For adoption of the fingerprint recognition payment by the end-users it is necessary to publicize the benefits that they can gain by utilizing FingerPal system such as time effectiveness, cost effectiveness, convenience in payment, security enhancement. The marketing campaigns should reduce customer fear of giving away their personal data highlighting that there are not actual hand graphics stored, but only templates and the law enforcement systems are not compatible with FingerPal system, so the data can not be used law authorities. Masters in eCommerce 2009 – Dublin City University 29 Chapter 3 Market Research Advertising through the promotion channels for example homepages of the wellestablished retail brands in order to gain customer trust and effectively build the brand awareness. We will also utilize industry media and public relations to well-establish FingerPal brand. The end-user impressions will enhance the product review in publications and direct mail to target groups. Few brands in each retail subsection will be approached at the beginning starting from most popular shopping centers. We also assume the demonstration of the prototype to retail brands and also at the trade shows to show working product and the same increase trust and increase brand awareness and also gain wider customer base. FingerPal will achieve the sales goals cooperating with biometrics devices providers. We might also utilize two ways promotion that can be beneficial for both sides and might help to attract customers from different sectors than firstly assumed. 3.7 Pricing The interchange fees should be lower for the first biometrics payment adopters to encourage FingerPal system implementation. The spillover effect will occur when more and more customers will sign for the service. Once value of the FingerPal product increases after gaining the critical mass market we will raise interchange fees for the late adopters. With biometrics, the ability of financial institutions to provide more value to their customers, while complying with regulations, can provide them with a competitive advantage. 3.8 PEST Analysis Political/legal FingerPal has to take into consideration political and legal issues that are related to their services. Due to the fact that the company will make use and control personal data, certain legislative issues have to be met. In the fingerpal database we will store fingerpirnt images togehter with the personal information such as the name, adress or bank account number of a given person. Thus, the system has to provide high level of security and fraud prevention.The company has to comply with certain privacy and data protection regulations. These include Data Protection Acts, in this case with Irish law Data Protection Act 1998 amended by Data Protection Act 2003. Moreover, the company has to comply with the regulations contained in Eprivacy Regulations 2003 (S.I.535) that cover the data protection for, among others, Internet use. European directive covers all the aspects related to biometric data protection. (For details, see appendix 4). Masters in eCommerce 2009 – Dublin City University 30 Chapter 3 Market Research Economic factors The current economic situation may be infavourable for FingerPal. Almost every industry faces problems at the moment, thus, retailers may be reluctant to implement new systems in their stores. The biometric market experienced a drop of 10 % in revenues, as of year 2008 Nevertheless, according to Loni Prinsloo, one of the biometric companies, Ideco, is reported to experience increase in business despite of economic downturn12. Apparently, there are concerns related to the criminal activities that may increase due to the economic situation. Consequently, the employers have become concerned about potential fraud. Thus, the company finds customers who appreciate utilizing biometric technologies in their organizations. What is more, as stated by Matia Grossi in Frost & Sullivan Report the adoption of biometric is expected to increase almost three times between the years 2008 and 2012 13. In particular, the importance of Biometric technologies is growing in the fields of government security, passports, identification of new-comers in airports, or preventing the theft of identity. The biometric solutions are becoming more and more prevalent in many areas of the market, including retail, educational, financial or healthcare sector. The more popular biometrics include iris scanning, hand shape recognition, vein scanning of palm, retina scanning, face recognition. According to the research, the economic slowdown opens new possibilities for the European biometric market. The biometric systems offer more secure options for identification of individuals, such as unique features. Thus, the identity measures are more secure and meet the security concerns in a more effective way than the standard solutions. As stated in the report, the number of transaction fraud is growing, which, consequently, triggers the need for a more advanced and precise identification. What is more, the biometric sector in Europe is being supported by government, banks and other commercial activities. There is an increase in the production of biometric solutions for financial, retail, educational and healthcare fields of the market. What is more, given the statistics related to the contiuous growth in credit card transactions14, FingerPal may have similar opportunities with a new payment system. 12 Prinsloo R. , Biometric systems firm experiences surge in business despite economic slowdown. 2009 13 Frost & Sullivan: Advances in Biometrics Remedy the Need for Increased Security March 2009, Newswire. 14 See Appendix 6 for details Masters in eCommerce 2009 – Dublin City University 31 Chapter 3 Market Research Sociocultural factors The sociocultural factors include the adoption rate of the customers. The number of enrolled customers and the volume of transactions will determine the success of the company. Thus, it is an important aspect to break the barrier of social acceptance and prejudices towards the new method of payment. Customers may be reluctant to new way of processing transactions as they were to plastic cards. Thus, it is necessary for the company to promote the brand as a secure way of payment and attract as many users as possible. The attitudes to new products vary. In particular, depending on the age, the users may be more or less willing to use Fingerpal’s services. Technological Factors The maturity of technology and development funds are crucial for the success of FingerPal. Thus, in the first years the company has to make substantial investments in the development of the platform and outpacing the potential competition. The technology solutions offered by our company will provide better quality and standards of point-of-sale transactions. The technology can provide benefits for both customers and merchants. Merchants may benefit from implementing our technology thanks to faster transactions processing, greater customer experience and convenience. The merchants who will utilize Fingerpal will be perceived as more innovative and up-to-date in the eyes of the customers. 3.9 Overview of end users The end users of FigerPal are crucial for the success of the company. Due to the fact that FingerPal’s success requires a high volume of transactions, our business is highly dependant on the end users of the system. We reckon that it is complicated to fully define the potential enduser of FingerPal, due to the fact that it is a scalable product and anyone can become its user. Nevertheless, there are certain criteria that, in our opinion, which can determine the end users of FingerPal. First of all, our targeted end-users will be located in Ireland. As the business will grow, we plan to expand internationally. Moreover, one of the characteristics of FingerPal’s technology is the fact that it is very innovative. This will influence the first potential users of the system. Thus, it can be said that the end users will be young, more open to novel technological solutions. Another aspect crucial when defining the end users is the social acceptance. The success of our company is highly dependant on overcoming the problems with negative attitudes towards providing biometric information by individuals and the security of the system. However, according to statistics from 2002, the fingerprint based system could be successfully implemented on the market. The research showed that the potential users may come from the groups using digital methods of payment instead of cash. The research in the existing methods of payment identifies several key factors that influenced the success of these methods. The Masters in eCommerce 2009 – Dublin City University 32 Chapter 3 Market Research customers choose methods of payments influenced by their cost, convenience, security and privacy. According to questionnaires related to method of payments utilizing biometric systems, the users who already used plastic cards were observed to show an interest in fingerprint-based method of payment. In contrast, the users who prefer to pay by cash were not willing to become the users of a bometric or other electronic method of payment. The customers who prefered cash stated that the benefit of this method of payment is a better overview of spendings. Moreover, the research states that 72% of respondents considered fingerprint-based payment will be popular in the future, whereas only 17 % said they cannot see a good prospect for this system. Finally, according to the research, most respondents claimed that security is the crucial point in such a system, followed by data protection, diffusion of the system and accuracy. On the other hand, the respondents pointed that the advantages of using the system would be convenience, ease-of-use, speed, tokenlessness, practicality.15 According to statistics, biometrics market does not resemble the typical path of disruptive innovations adoption. In contrast, the end users adopt biometric technologies over a longer period of time. The development of biometric technology is incremental and there are improvements of such technologies to provide advanced capabilities. The researchers claim that the adoption of biometric technologies will resemble the pace of growth of ATMs which obtained almost 70% of adoption over a period of 20 years16. The biometric market has been developing for the last 10 years. At the moment , the technical advancements in biometric technology, lowering prices of biometric scanner-enabled devices and more positve social attitudes suggest a strong market expansion. Currently, the technology adoption is reaching the point to gain early majority of users. This provides a great opportunity for FingerPal as it is predicted that biometric market will evolve and gain more users in the coming years 17. 15 Mayer M., Bridgeman N., Muller L., A Case study on digiPROOF, a Fingerprint Based Payment System. NACCQ Conference 2006. 16 Acuity Market Intelligence. Current State of Biometric Market. 17 C. Maxine Most, The Current Biometrics Marketplace, Acuity Market Intelligence, Digital Money Forum, March 31, 2009, London. Masters in eCommerce 2009 – Dublin City University 33 Chapter 3 Market Research 3.9.1 End-users: Survey analysis In order to measure the social acceptance, interest and opinion about fingerprint-based transaction method, we conducted a survey among random respondents. The survey was send by email to 60 respondents in Ireland, Poland and Spain and distributed and collected as a document to 20 people in Ireland. The purpose of the analysis of the data collected was to determine the current state of social attitude towards biometric method of payment. Survey results18: About 68 % described the product as good, 56% said it appears to be of a high quality. There was a tendency that respondents liked the convenience, innovativeness and practicality of the product whereas they liked the least the possibility of others getting access to their biometric information and using it in an undesirable way. Other negative attitudes included accuracy of the system, data protection, speed of performance and lack of willingness to register with another method of payment (as the exisitng ones are enough). Respondents considered security the most important aspect of the system, followed by accuracy and speed on performance. Almost 70% of respondents heard about the term biometrics before, whereas only 15 percent have a fingerprint scanner build in their laptop. 65% of respondents said they are somewhat willing to provide their biometric information whereas only 24% said they are not willing at all. 73% see the potential of biometric technologies in financial transactions. The opinions were not heavily influenced by male or female respondents. However, the age was significant, most respondents at the age of 20-29 were more positive about the technology, whereas most negative opinions came from the group over 40 years old. 18 See Appendix 2 and 3 for details Masters in eCommerce 2009 – Dublin City University 34 Chapter 3 Market Research 3.9.2 Feedback from the customers We conducted several questionnaires and interviews with potential customers of FingerPal, including Spar, Tesco, Centra, Londis, Dunnes Stores shops managers. Most of the feedback was positive, with 80% of managers interviewed willing to implement such systems in their stores. In additon, we contacted several banks who may be potential partners. The responses were postive, with most of the banks stating that they see the potenital in biometric transactions and willing to pursue agreements with FingerPal in the future. The banks and merchants were asked to evaluate the potential of FingerPal. They were also asked to indicate the negative and success factors and their opinion with regard to overcoming the existing and strong competition from plastic cards, checque and cash payment methods. Masters in eCommerce 2009 – Dublin City University 35 Chapter 4 Competitive Review Chapter 4 Competitive Review 4.1 Industry Forces Supplier Power: There is a high power of supplier. FingerPal provides the software, database and maintanence of customer information. However, our company is currently not able to manufacture the equippment, thus, relies highly on the facilitators and their requirements. Thus, it is neccessary to rely on the suppliers of fingerprint biometric hardware for sale transactions. There is a large number of suppliers of biometric devices, thus, in that case their power is low as FingerPal may choose the best possible price and technology that will fulfil company’s requirements. Nevertheless, there is threat that the suppliers may become potential competitiors. FingerPal will also exert influence on suppliers as the more successful the company is, the greater the benefits for suppliers. Suppliers power is also high due to the fact that FingerPal is dependant on other facilitators, including banks. Buyer Power: There is a high power of buyers. The primary customers are retail merchants who will have to accept the system and implement it in their stores. The second group that FingerPal highly relies on are end users. They will exert a strong influence, due to the company’s dependance on volume of transactions. Thus, their power is high as the more users of FingerPal, the more attractive systems will be for merchants. Nevertheless, as at the moment there are no direct competitors of FingerPal on the market, once the system is implemented in stores it makes it expensive to replace it with a different one. Thus, high switching costs will provide the advantage of retaining the customers. Competitive Rivalry: The power of competition is low as there are no direct competitiors. At the moment, there is no company providing a similar services as FingerPal. However, there is a risk that the biometric companies who manufacture fingerprint scanning devices may become the competitors and offer equally attractive prodcuts or services. solutions. The potential competitiors may utilize existing software that recognizes fingerpritns and supply it to other companies. Threat of New Entry: The power of new entrants is very high as there are numerous companies who develop bimoteric technologies, have access to hardware and neccessery software. There is a possibility that the biometrics in retail become increasingly popular and that biometrics solutions providers may invest in this sector. However, FingerPal would create lock-in barrier by being the first provider of such solutions on the market. The main task will be to retain customers and provide high satisfaction at a competitive price. What is more, there are economies of scale as biometric technologies may be developed and Masters in eCommerce 2009 – Dublin City University 36 Chapter 4 Competitive Review 37 implemented in almost every place where point-of-sale point sale transactions take place. place Thus, new entrants may quickly enter the market and weaken FingerPal’s position. position. In order to preserve the position, FingerPal will aim to protect the technology and service by IP rights. rights. The Power of New Entrants economies of scale specialist knowledge exisitng technologies - low time and cost of entry the power of buyer competitivve rivalry The power of suppliers large number of potenital customers no exisitng competitiors large number of suppliers competiive advantage of being first mover low swithich costs of suppliers hgih influence of customers low swithich cost threat of substiution high threat of subtituions suppliers may become competitiors Figure 1 Industry Forces 4.2 Competitors Analysis At the moment, there are several indirect competitors of FingerPal on the market. It can be observed that there is an increasing prevalence of firms who develop biometric technologies for various purposes. Currently, Currently there are about 71 companies directly or indirectly involved in biometric technologie s 19. These companies deal with various functions that can be fulfilled by a fingerprint scanner, inlcuding check cashing, point-of-sale point sale transactions, online shopping, employee monitoring.. Fingerpal’s aim is to establish cooperation and partnerships with one of the companies who provide biometric scanners for palms and fingerprints. We feel that one of the strenghts of FingerPal is the fact that there are no competitors on the Irish market marke who provide the same solutions as ours. 19 Based on www.biometric.org Masters in eCommerce 2009 – Dublin City University Chapter 4 Competitive Review 4.2.1 Competitive Advantage We reckon that FingerPal has a competitive advantage for several reasons. First of all, at the moment there is no similar service offered by any other company. Thus, FingerPal will be the first mover on the market and has the advantage of gaining customers first. Thus, we will have the opportunity to create a strong brand and retain customers, even if the competition will appear on the market. A strong brand will also make it hard for the potential competitors to enter the market. First of all, we analyzed our direct competition whose products and technology solutions serve similar purposes or have similar features to our offering. FingerPal’s competitors can be divided into direct and indirect competition20. 4.2.2 Competitors and their products Biometric Software and Hardware Manufacturers - Potential Partners/Competitors This companies are regarded as potential partners or competitors. Given the fact that these companies develop both hardware and software for fingerprint transactions, there is a threat that they will pursue similar to Fingerpal’s business activity. Dermalog - A company founded in Germany in 1984 which develops hardware and software for identification purposes. The company claims to have the largest number of patents in the field of biometry. The company offers a wide range of products, including hardware and software for various industries. FingerPal considers Dermalog to be a potential partner. Nevertheless, there is a threat that Dermalog will enter the market as a competitor. One of Dermalog’s products, is a terminal for fingerprint-based transactions. Direct Competitors Kimaldi Electronics - A company based in Spain with headquarters in Portuagal and Mexico, specializes in developing products for identification of people. The organization manufactures fingerprint readers and terminals, radio frequency readers, access control devices, card readers, printers and other devices related to identification. Kimaldi is the supplier of other manufacturers of card readers, figerprint sensors, ID management devices such as Uniform Industrial corporation, Nigen Co., Evolis Card printers, MagiCard and other. We consider Kimaldi one of the most threatening competitors, due to the fact that the company offers digital fingerprint payment for restaurants. This products helps catering institutions to manage payment services. In brief, the user registers with the service and then 20 See Appendix 1 for details Masters in eCommerce 2009 – Dublin City University 38 Chapter 4 Competitive Review customers places their finger on a scanner which automatically displays the menu and users options. Customers can choose to pay by cash, ticket or a plastic card. The reader is connected with point-of-sale computer. The amount is either automatically charged from customer’s bank account or by the waiter, depending on the payment choice. Indirect Competitors We consider that our company may also face indirect competiton, namely, from wellestablished and professional plastic card companies who provide online transactions and opportunity to pay by plastic card in any sales points.These include major plastic card companies, such as: • VISA Ltd. – Founded in 1970 in the USA, Visa is one of the largest player in the field of credit and debit card processing. Since it was established Visa managed to gain acceptance towards electronic methods of payment. In 2006, Visa reached 44% of the plastic card market share and 48% of the debit card market share in the USA.21 Visa provides payment systems for merchants, large financial institutions, governemtns and consumers. In 2008 Visa generated US$ 6.263 billion of revenue.22 Visa issues debit, credit and prepaid cards. I also operated an automated teller machine network and EFTPOS point-of-sale network. The business model is based on interchange fees and interests rates coming from transactions processed through Visa’s network. Visa’s products include Visa Buxx, Visa Debit, Visa Electron. • MasterCard – Established in 1966 in the USA, Mastecard is the second largest player in the field of plastic card payments. Mastercard is reported to hold 22% of the US debit card market share in 200923. Their revenues for 2008 were estimated at US $5 billion.24Mastercard processes payments between the banks, merchants and customers. There are about 25000 financial institutions which issues Mastercard cards. 4.3 Intellectual Property We would like to protect the IP rights of components of the company. We are in the process of identifying our IP and defining the scope of ideas and invention we can lay claim to. This wil reduce the risk of out potential competitiors entering the market with similar solutions. IP rights will block the new entrants and secure our position on the market. At the moment, we searched for similar patents in Espacenent database. There are two US companies who have their patents approved in 2007 for using biometrics in financial transactions. Nevertheless, they are no longer in operation. We contacted Tomkins who is a 21 22 23 24 How Visa operates, Forbes, February 25, 2008 . Security Exchange Commission, http://idea.sec.gov/Archives Hugh Son,m MasterCard Said to Lose Users After JPMorgan Shift, May 2009 http://en.wikipedia.org/wiki/MasterCard Masters in eCommerce 2009 – Dublin City University 39 Chapter 4 Competitive Review specialist in patenting and IP protection. The company would assess our product idea and the potential to file for a patent. They will also provide us with the information related to the current patents and overcoming this issue. Masters in eCommerce 2009 – Dublin City University 40 Chapter 5 - Technology Chapter 5 - Technology In the following chapter we will proceed to describe in detail the technical solution purposed as well as its future projections based on how it will be deployed in the market and the security threads identified and properly mitigated. 5.1 Technical Solution As described in previous chapters, we intend to present a revolutionary system to provide users the ability to perform biometric payments in their everyday life. Such an easy and secure system, will allow consumers to identify themselves and make purchases in the most common transaction points. Recent studies show that the non-stopping news about data thefts, credit card fraud and other information security threads reduce substantially customer trust, ending in a reduced use of such technologies. We think that by offering users a secure and easy system of fingerprint scan authentication will help users to rebuild their confidence in safe transactions and to boost e-business. The system would work as a set of fingerprint scanners located in the endpoints, linked to a centralized server which would perform the authentication process and the transactions. Therefore FingerPal will work as an intermediate entity between credit card companies and customers so that they can use their biometric data to carry out electronic transactions. 5.2 Technical overview and analysis Fingerprint scanners have been considered quite an exotic and bizarre technology over the last decades, but real thing is that such a technology can help to achieve high-level security and protect data using high-profile biometrics. A fingerprint from [binario.net.ve] A fingerprint is like a built-in easily accessible identity card which indentifies uniquely each individual. They are tiny ridges of skin located on humans’ fingers and mainly they make it easier for the hands to grip things. These ridges are determined based on both genetic and environmental factors. As we know, the genetic code in DNA determines the general features on the way skin should be Masters in eCommerce 2009 – Dublin City University 41 Chapter 5 - Technology formed, but real thing is that the final result depends on a set of random events. These factors can include the exact position of the fetus in the womb and the characteristics of the amniotic fluid. Therefore, in addition to all genetic factors involving the way fingers will be formed there is also countless environmental factors which determine the final shape. Thus, fingerprints are a unique identifier for a person, and although two fingerprints may look the same, we can use an advance piece of software to pick out significant differences. The main aim of a fingerprint scanner is to collect a print sample and store it for future use or to collect a fingerprint in order to mach it against other samples stored into a database. There are two methods to capture someone’s fingerprint: Optical Scanning (OS) and Capacitance Scanning (CS). 5.2.1 Optical Scanner The internals of an optical fingerprint scanner are based on a Charge Coupled Device (CDD), which is an array of light-sensitive diodes which generate an electrical signal when exposed to light. Each diode, also known as photosite, records a pixel, which is the minimum unit to represent the light in one spot. Once all the data has been captured we need an analogto-digital converter so that we can transfer all the information gathered into a digital representation of the image. The scanner typically generates an inverted image, which means that the darker areas represent more reflected light while lighter areas represent less reflected light. From www.tradetosuccess.com Once the fingerprint has been captured and before it is matched against the fingerprint repository, the scanner makes sure that the image captured is a clear one. In order to determine if it is a valid image it checks the average pixel brightness and darkness and discards the image in case it is too bright or too dark. The device may also adjust the exposure time in order to capture more or less light in the next attempt. Once the brightness test is successful the scanner checks the image definition by tracing lines perpendicular to the ridges and looking for alternate sections of dark and light segments. Masters in eCommerce 2009 – Dublin City University 42 Chapter 5 - Technology 5.2.2 Capacitance Scanner Like optical scanners, capacitance scanners come up with an image representation of the ridges and valleys of human fingerprints. They differ in the method used to generate such images, while one uses a light source to detect variations on the skin, the other one uses electrical current. from www.superwarehouse.com The above figure shows how a capacitive sensor works. It is formed by semiconductor chips containing an array of cells. Each one of these cells contains two conductor plates, covered by an insulating film. From www.authentec.com This sensor in connected to an integrator, which is an electrical circuit built around an inverting amplifier. This amplifier is a semiconductor formed by a number of transistors, resistors and capacitors, and basically alters one current into another current. The alteration value comes from two inputs, the inverting terminal and the non-inverting terminal. The noninverting terminal is connected to ground while the inverting terminal is connected to a sample voltage and a feedback loop. The feedback loop contents the two conductor plates. In order to store current charge, the two conductor plates form a capacitor. Masters in eCommerce 2009 – Dublin City University 43 Chapter 5 - Technology When the user places the finger on the surface, it works like a third capacitor separated by the insulating layers. When the finger is placed on the surface there will be some zones in contact with the skin (ridges) and some air pockets (valleys). This way, the capacitor in a cell under a ridge will have more charge than another one placed under a valley. To perform the fingerprint scan, all cells are reset. Once the finger is placed on the device and the circuit is opened, all the cells and the capacitors charge up depending on the contact with the skin. This way, a finger ridge will result in a different voltage output than a finger valley. Once the whole surface has been scanned and the voltage stored in the capacitors the scanner processes every cell to determine if it was a ridge or a valley. The scanner can picture a whole image of the fingerprint by combining the voltages of all the cells in a similar way as an optical scanner does. The main advantage of CS versus OS is that it requires a real fingerprint shape rather than a light-based pattern which makes the impression of a fingerprint. Also, these types of devices tend to be smaller and lighter than optical scanners as they don’t require a CCD unit. 5.2.3 Matching When two images need to be compared, we need to extract specific features so that they can be matched using a reasonable processing power. Matching by picture overlay isn’t a reasonable approach despite what most people believe, when scanning a fingerprint we will never get the exact sample every time, there will be differences. Therefore, we need to extract certain features from the fingerprint that doesn’t rely solely on the image shape. These features are known as minutiae. from www.pagesperso-orange.fr As we can see in the figure above the process consist on identifying certain anomalies or distinctive features on the ridge lines of the fingerprint. The minutiae are of the following types: Masters in eCommerce 2009 – Dublin City University 44 Chapter 5 - Technology from www.gisdevelopment.net The matching process basically consists on measuring and locating the different minutiae both in the sample and the stored image and look for coincident points. Typically the scanner will compute the relative positions of the minutiae and draw straight lines between them. Then, if will compare the shape of those lines between the sample and the stored fingerprint. This process will never match all the minutiae and shapes from both fingerprints, finding only a sufficient number will be enough to get a match. The exact number of coincident minutiae required to get a match depend on the implementation of each scanner. 5.2.4 Bottom line Biometric data is much more difficult to fake than credit cards. Also, a fingerprint pattern is much more difficult to guess than a credit card number or a PIN. Biometric data cannot be misplaced or forgotten, like credit cards or passwords. Optical scanners cannot always distinguish between a picture of a finger and a finger itself, and capacitive scanners can be fooled with a mold of a person’s finger. However, these issues can be overcome by adding extra security measures like pulse, heart and heat sensors. Another way to enhance security is to combine biometrics with conventional means of identification, such as passwords or PINs. Fingerprint scanners and biometric systems are excellent methods for identification and authentication, and in the near future they will become a common device in our everyday life, just like credit cards and passwords are nowadays. Masters in eCommerce 2009 – Dublin City University 45 Chapter 5 - Technology 46 5.3 Technology roadmap Biometrics and Credit Cards - The beginning Debit Cards are introduced into the market RSA encryption algorithm presented for encryption in multi-user envirenment FBI fingerprint archives have grown up to 200 million samples The Automated Fingerprint Identification System (AFIS) is adopted by the FBI FBI has 100 million fingerprints samples in manually maintained archives First working ATM installed in New York 1945 1950 1955 1960 1965 First American Express and Bank of America (later Visa) Credit Cards issued 1970 1975 1980 1985 The International Association for Identification founds world's first certification program for fingerprint experts First Credit Card issued by Diner's Club National Society of Fingerprint Officers is founded in UK by the Fingerprint Boureau The concept of "virtual money" based on small card computers first appears Masters in eCommerce 2009 – Dublin City University 1990 Chapter 5 - Technology 47 Biometrics and Credit Cards - Curent trends Online banking becomes popular Credit Card fraud affects 22 million people arround the world Credit Card fraud cost businesses US 9 Billion Paper-based payments represented 60% of transactions Paper-based payments represented 81% of transactions 1990 1992 1994 Identity theft rises 21% in 2008 1996 1998 2000 2002 Biometrics are used in ATM's for cusmers authentication FBI's most wanted hacker Kevin Mitnick is arrested in February of 1995 2004 2008 INTERPOL's AFIS repository exceeds 50,000 sets fingerprints for important international criminal records from 184 member countries. Biometrics used for Customer Relationship Management Masters in eCommerce 2009 – Dublin City University 2006 The largest AFIS repository in America is operated by the Department of Homeland Security's US Visit Program, containing over 100 million persons' fingerprints Chapter 5 - Technology 5.4 Infrastructure In the following section we will describe the infrastructure needed to support a fingerprint based payment system. 5.4.1 Point of Sale FingerPal will provide the Points of Sale with electronic devices to carry out fingerprint-based electronic transactions. These devices are very similar to current credit card terminals, but instead of having a magnetic reader, they will have a fingerprint reader. Such devices will consist on fingerprint readers provided with a modem and a printer. In order to enhance security, the fingerprint reader will also include other biometric sensors, like heart beat and human temperature detection. Users will introduce their account identifier and place their finger on the biometric reader. The device will then record the fingerprint. We will use user’s email as unique and account identifier. The device will send the identifier to the database to get the fingerprint sample stored for this user. Afterwards, the device will match the two samples. Performing the matching process at the Point of Sale we will reduce drastically the overload of the main servers. Once the device recognizes the fingerprint as a valid one it will send to the server the whole transaction batch so the payment can be carried out. If during the scanning process something went wrong the device will ask for a new scan, the device will allow only 3 scanning per transactions. Before sending the user’s identifier to the server to get the potential biometric match, the scanner will check that the sample recorded is suitable to be matched. The information interchanged with the server will be encoded and transmitted over a secure gateway. To enhance security, the email will be hashed and then encrypted together with the transaction information and sent over the phone line. The server will receive a new request and will perform a search into the in real time. When the server receives confirmation from the endpoint to place the transaction, it will subtract the amount from the customer’s credit card using the financial details provided. If no errors where prompted from the banking side, the server will acknowledge the operation to the endpoint so both parties (merchant and customer) have confirmation of the transaction. In case something fails during the process the terminal will notify the parties the reason and the transaction will be automatically cancelled. We will allow certain degree of disparity between the minutiae of the fingerprint to retrieve a match. This measure is to overcome the issue that we will never get the same instance of a fingerprint twice, we must allow certain disparity. Once a candidate fingerprint has been found we Masters in eCommerce 2009 – Dublin City University 48 Chapter 5 - Technology will check if the associated PIN number to that account is the same as the PIN provided. If we get a match we will charge the customer’s account with the corresponding amount of money and then we will acknowledge the transaction to the merchant via the FingerPal terminal. 5.4.2 Server side In order to cope with demand, FingerPal will provide high reliability servers to manage all the transactions in real time. When the server receives a request, it decrypts the information and performs a search through the repository in the database. We will allow certain degree of disparity between the minutiae of the fingerprint to retrieve a match. This measure is to overcome the issue that we will never get the same instance of a fingerprint twice, we must allow certain disparity. Once the endpoint clears the transaction means that the biometric reading matched the stored sample. Then, the system will charge the customer’s account with the corresponding amount of money and then it will acknowledge the transaction to the merchant via the FingerPal terminal. To improve running time, we will maintain a centralized relational database system. The technologies associated to the server side are deeply explained in following sections. 5.4.3 Web Service We will provide users the ability to sign up to our service via Web. Users will be able to connect with FingerPal trough a Web portal and easily enrol to our service. User will type in our URL and go to the sign-up section, after filling in their personal information they will receive an e-mail confirmation with the detail of the new account. In order to use our service, users will need to provide with a valid credit card. To prevent fraud all new accounts will be initially set as “limited”, meaning that FingerPal needs to check if the credit card information provided is correct. It also means that the company needs to authenticate the users; otherwise we would leave the door open to credit card fraud and identity theft. At this point, users are able to login to our website and manage their account. Masters in eCommerce 2009 – Dublin City University 49 Chapter 5 - Technology The next step is to unlock the account in order to be able to use the service. To prevent identity theft and credit card fraud we will use a very simple method. At the moment of registration, users will be given a 4 digit number generated at random by the server. However, to be able to use FingerPal, users will have to introduce in their limited account an 8 digits number. How do users get the remaining 4 digits? At the moment of registration, the server will automatically generate 2 random numbers 4 digits each, and will only give one of them to the user, keeping the second one secret at this point. Within 24 hours FingerPal will charge the user’s credit card provided with the symbolic amount of 1 euro, the remaining 4 digits will be included as part of the statement of that transaction. This way, the other 4 digits number can be checked by the user via their internet banking service or simply going to their bank and asking for a receipt of recent transactions. By doing this, we will ensure that for that particular account, the fingerprint and the credit card linked to it belong to the same person. Once the user has the complete 8 digits registration number, they can proceed to login to their online FingerPal account and unlock their account. After logging in, user may introduce the registration number and server will check that the value provided matches the value stored in memory. Then, if the values match, the account’s status will automatically be changed. However, if the information provided turns out to be wrong, there will be only a reduced number of attempts (5) to provide the correct one. The process is explained in following sections using diagrams to facilitate understanding. Masters in eCommerce 2009 – Dublin City University 50 Chapter 5 - Technology 5.5 Process description In the following section we will describe the data flows that will take place in the main processes of the system. The following representation follow a set of standards such as red globes for initial and final states, blue boxes for actions and green rhombus for choices. Next, we will proceed to describe the interaction of data between client machines and server machines during the enrolment and the transaction process. 5.5.1 Enrol a customer in a Point of Sale This process will take place when a customer proceeds to enrol into the system through a Point of sale. First step is to provide to the merchant with their credit card and personal details so the merchant can check and submit all the necessary information to the server. In case the merchant detects a fraud attempt should abort the process and notify the authorities. Usually the customer will provide means to authenticate himself to the merchant such as driving license, passport or ID national card. Once the identity of the customer has been proved correct and checked against their credit card information, merchant will submit all the information to the server and the account will be created. When the information is submitted to the server, the machine will check that the biometric data provided is not already in the database, as it will be used as unique identifier for the user. In case the system finds another instance of the biometric data into the system, the enrolment process will be aborted. If the information was successfully inserted we will notify the merchant and the customer and the system will wait for confirmation to activate the account. The biometric information will be re-read and sent back to the server for comparison and for matching refine. The account has been successfully created. Masters in eCommerce 2009 – Dublin City University 51 Chapter 5 - Technology 5.5.2 Enrol a merchant into the system This operation will be carried out for system administrators only. The data flow is very similar to a customer enrolment in a Point of Sale, only this time the information is matched and proved correct by a FingerPal’s operative. The process starts when the merchant provides the operative with their financial information. The operative will carefully examine the identity and the authenticity of the information provided before authorizing the creation of the new account. Once the operative has checked that the information provided is legitimate, they will send the data to the server for further checking. The server will check that the merchant’s biometric data is not already into the system so it can be used as merchant’s unique identifier. If the biometric data results to be already into the database, the enrolment process will have to be denied for this user. If everything turned out correct the account is created and the merchant is added to the system. The server waits for authorisation to activate the account and merchant’s biometric information is reread and transmitted back to the server. At this point the merchant’s account has been successfully created. Masters in eCommerce 2009 – Dublin City University 52 Chapter 5 - Technology 5.5.3 Enrol a customer using the online service This process turns out to be a little bit more complex than other enrolment processes as we need to provide the system with means to prove customer’s identity online. Masters in eCommerce 2009 – Dublin City University 53 Chapter 5 - Technology The process starts in a very similar way to the previous ones, with the customer providing their personal and financial details and submitting it to the server. This time, user will use an online form to fill in all the necessary information to successfully create a FingerPal’s account. Once the online form has been filled, the online application will ask for a biometric reading of the finger, so that the biometrics can be uploaded to the server together with the personal details. When the information reaches the server, the biometric reading will be matched against the repository to check for duplicities. In case the server finds an instance of the biometric data the join will be denied and the user notified. If no other biometric instance of the customer is found, the system will create a new limited account with all the information provided. As described above and in order to avoid fraud we will force users to prove their identity by accessing their financial information. We will assume that online banking is secure and that nobody can access the customer’s bank account, as this is out of FingerPal’s boundaries. When the server creates the new account, it will generate an 8 digits number and store it into the customer’s account. Once the account has been created the system will wait for customer final confirmation and will re-read the biometrics for a final scan and comparison. Once this information is submitted to the server the user will receive 4 registration digits. The system will charge 1 euro to the credit card provided and provide the bank with the remaining 4 digits necessary to unlock the account. In order to be able to unlock FingerPal’s account customer will have to access their online banking service or check with their bank the remaining 4 digits. Customer will log in online to their account and click on “unlock my account” section, immediately the application will ask for the 8 digits. Once the 8 digits number has been introduced the application will check that the number introduced is the same as the one generated by the server at the moment of registration. If the numbers don’t match, customer will be informed that the number introduced is incorrect and they will also be informed of the remaining attempts to unlock the account. Customers will have initially 5 attempts to introduce the correct number, being decreased by one every time they introduce the wrong number. If they use up all the attempts the account will be voided and the enrolment denied. Once the user manages to get the 8 digits correctly, the account will be successfully unlocked and customer will be welcomed to use the service. Masters in eCommerce 2009 – Dublin City University 54 Chapter 5 - Technology 5.5.4 Perform a transaction Masters in eCommerce 2009 – Dublin City University 55 Chapter 5 - Technology The transaction process will start when the merchant introduces the amount of the transaction. Then, customers will insert their e-mail address and provide a biometric reading of their fingerprint. This information, together with merchant’s information, will be sent to the server to search for potential matches. The server will retrieve from the central database customer’s information and will send the biometric sample stored back to the Point of Sale terminal for further checking. The biometric reading provided by the customer will then be checked against the sample stored into the database to prove customer’s identity. The biometric matching will be carried out in the scanner device, today these devices provide the ability of matching fingerprints in real time and this way we don’t overload the system with unnecessary operations. If the two samples match, the transaction is authorized and all the information is sent to the server. The server receives then the transaction, consumer and merchant information and proceeds to carry out the operation. Next step is to confirm that the transaction can be made using consumer’s financial details provided (Credit Card), once the server has received confirmation that the transaction was cleared and the payment made a conformation is sent to the terminal to notify both consumer and vendor. The device will print two recipes, one for the vendor and another one for the consumer as confirmation of the transaction. The transaction can be rejected in 3 stages of the process. First, if the e-mail address introduced doesn’t retrieve any matches, the server will deny the transaction and send cancellation notification to both merchant and consumer. Second, in case the provided biometric doesn’t match the fingerprint recovered from the consumer’s account in the database the scanner will notify both parties that the transaction couldn’t be performed. Third, if the eCommerce server doesn’t authorize the consumer to perform the transaction for any reason (out of credit, credit card blocked...) we will cancel the transaction and inform both parties. If the operation is successfully carried out, the transaction’s amount is subtracted from the customer’s available credit and stored into merchant’s batch for further collection. Masters in eCommerce 2009 – Dublin City University 56 Chapter 5 - Technology 5.6 Technologies In this section we will give an overall description of the necessary technologies to implement such a system as FingerPal. We will go over more detail on the server side technologies when we describe the systems architecture in the following sections. 5.6.1 Client side Referring to the customers, they don’t need any special software or hardware to run the system. Customers will be able to enrol to our service online, so a standard web browser would be sufficient. However, FingerPal strongly recommends that the customer’s machine used to create/manage their account, meets the security standards required to perform safe transactions over the Net. These measures gather up-to-date Antivirus, Firewall, and Web Browser. 5.6.2 Server side There will be two important features to cover on the server side. First, the web page and the online enrolling process. Second, the online fingerprint payment service. We will have dedicated web servers which will offer high availability and reliability for our online service. Also, we will allocate dedicated servers to manage the fingerprint-based transactions in real time. As we will describe in the following sections we won’t go into much detail In this point of the infrastructure, security will become a key factor as all the servers will be holding high-sensitive personal information. Our initial approach to the necessary technologies on the server side will comprise Open Source solutions. Open source is an approach to the design, development and distribution of software, offering practical accessibility to software’s source code. The term gained popularity thanks to the rise of the Internet, which provided access to diverse production models, communication paths and interactive communities. Mainly these solutions will consist on open source operating systems throughout all the servers (Linux), Apache Tomcat to manage the Java Servlets in the application server, Squid to implement the transparent proxy server, Apache in the web server and MySQL in the Database server. This way, we will install. In the application server we will install Tomcat 5.6.3 Point of Sale Points of Sale will be equipped with the FingerPal terminals. Regarding the necessary software for those machines will be a simple interface to be able to enrol new customers and process the transactions. The software in the endpoints will also provide the necessary security measures that performing electronic transactions require and will act also as the network application to send the data over the phone. These devices will also be provided with means to perform real-time biometric matching. We will recommend use capacitance scanners instead of optical scanners as they turned out to be more precise and reliable for fingerprint matching. The software installed on the device will be able also to Masters in eCommerce 2009 – Dublin City University 57 Chapter 5 - Technology manage other biometric readings such as heart beat sensor and human temperature detector. These extra biometric readings will be embodied to improve security measured. 5.7 Security Our main goal by implementing FingerPal is to enhance security in electronic transactions. It is well known that credit card fraud and identity theft costs billions to the ecommerce sector. Recent studies show that biometric readings are the most reliable system to prevent identity theft and fraud. With the current system a credit card can be easily lost or stolen and there is a lack of means to prevent fraud once the card has been stolen. FingerPal not only reduces the risk of losing our payment means, it also improves the authentication process by adding biometric parameters. By blocking access to the service we also provide higher confidentiality and integrity of data. Another main advantage is that the technology non-invasive. Usually people are reluctant to use retina scanners or other means which imply a higher contact or exposure. The specific security measures adopted are explained in every section. We have focused on adopting measures to counter identity theft and increase security in the authentication process. The best example is the process presented to prevent an attacker to supplant a credit card owner by providing their biometrics. We have proven that this is not possible assuming the attacker cannot access banking information. Our objective is to protect the privacy and build customer’s confidence. In order for a customer to be able to log in and access FingerPal online service, the consumer will be required to enter sensitive/confidential information and register their details, such as name, credit card details, etc. FingerPal will use Verisign technology over Secure Socket Layer (SSL) to protect of the online transactions. Using Verisign technologies we ensure high security as it is the leading SSL Certification Authority. To achieve that, the Certification Authority issues a public key (used to encrypt information) and a private key (used to decrypt information). Therefore, when a user accesses FingerPal Online the client and the server interchange session keys and agree the encryption protocol using an SSL handshake. In case the information doesn’t match or the certificate has expired the browser shows an error message. These techniques allow customers to begin a secure session that guarantees privacy, integrity, and non-repudiation. Masters in eCommerce 2009 – Dublin City University 58 Chapter 5 - Technology 5.8 System Architecture In this section we will describe the overall architecture of the system so we can have a clearer idea of the parts implicated in the process as well as the infrastructure needed to support such a system. Electronic transactions will be carried out in the Point of Sale and the information will be transmitted securely over the phone. Customers will be able to use the terminals in the Points of Sale to enrol to the system. Users will also be able to create and manage their account details via Web using secure connections. The transactions will be processed with the bank through a secure gateway. In the diagram above, there is a representation of the parts involved in the system and an overall description of the infrastructure required. Fingerprint scanners located at the Points of Sale will be used as terminals to transmit the biometric readings to the server for matching and also to Masters in eCommerce 2009 – Dublin City University 59 Chapter 5 - Technology transmit information on the current transaction. The communication with the server will take place over the phone and will connect through secure gateways with the application server. The application server plays a very important role in the system’s architecture, as it will isolate the database server and, therefore, the sensitive information from possible attacks. Once the application server has confirmed the identity of the customer performing the transaction, it will forward the operation to the e-commerce server to connect with the customer’s bank and confirm the transaction. When the e-commerce server receives confirmation of the bank to perform the transaction, it forwards the information to the application server and this one sends confirmation to the Point of Sale so that both merchant and customer are informed of the successful transaction. As we described in previous sections, FingerPal intends to install open source-based technologies all throughout the machines on the server side. The predominant operating system in all servers will be Linux, now we will describe thoroughly the technologies in each and every part involved in the system. 5.8.1 Application server The application server will hold the business logic for the operation of the system, so everything will have to go through this server. This will isolate the database and will provide a DMZ (demilitarized zone) to securely hold the user data. This server will then interact with the Web server for the online requests and with the Point of Sales for the electronic transactions. This server will operate under Apache-Tomcat software. It is a Servlet container developed by the Apache Software Foundation (ASF) which implements the Java Servlet and the Java Server Pages (JSP) specifications from Sun Microsystems. Therefore, it provides a pure Java HTTP Web server for Java code to run and includes tools for configuration and management. It is sometimes confused with the Apache Web server, but actually the last one is a C implementation of an HTTP Web server. This will allow us to generate code to control the logic for the operation of the system using Java technologies. 5.8.2 Web server The Web server will host the web page and provide the necessary means to manage the accounts via web. This server will also be connected with the database through the application server. Users will connect to the Web server and after interchanging season keys they will open a secure connection over the HTTPS protocol to access their accounts. We will never allow sending sensitive information over a non-encrypted or nonsecure channel. This part of the system will be implemented using an Apache HTTP Server; this is a Web server notable for playing a key role in the initial grown of the WWW. It is the main alternative to the Sun Java System Web Server. Commonly machines using Apache HTTP run over Linux OS, despite has win32 distributions and have shown to perform really well. This way, it is distributed also for UNIX, Masters in eCommerce 2009 – Dublin City University 60 Chapter 5 - Technology GNU, Solaris, Novell, NetWare, MacOS, MS Windows, and many more. In 2009 it has been accounted to surpass the 100 million web site milestone. It is free and open source software. 5.8.3 Database server This server will hold user’s information and will be under the FingerPal’s DMZ. It will contain the most sensitive information so access to this server will be allowed only through the Application server. It is the core of the system as all the transactions have to be validated against the information contained in FingerPal’s database. We believe that the idea of performing the live fingerprint matching in the endpoints will reduce significantly the workload of the server. Therefore, the Database server will implement the database and will provide the tools to manage and access the data. To achieve the desired operation, MySQL (My Structured Query Language) will be deployed in FingerPal’s database servers. It is a relational database management system which has more than 6M installations. Basically, the program runs as a server providing multi-user access to a number of databases. The source code is under the GNU General Public License and also under several proprietary agreements. If is suitable for free software projects which require a full featured database management system, but it is also used in big WWW projects such as Google or Facebook. 5.8.4 Networks and Internets Intrusive or invasive attacks will be blocked by firewalls and proxies and even though an attacker manages to pass through they would never access the real data as it would be secured by the application server. We will install routers and firewalls to block possible intrusions, as well as a transparent Proxy server. To implement the Proxy server we will suggest Squid as a proxy server and web cache daemon. We believe this is a powerful method to speed up the web server and to control the dataflow from and to the Internet. It is also an interesting system to add lockups to the shared network resources and aid security by filtering traffic. It is mainly used for HTTP and FTP, but it also includes support for other protocols such as TLS, SSL and HTTPS. Squid is primarily designed to run on UNIX systems but it also runs on MS Windows-based systems. It is released under the GNU General Public License and it is free software. 5.8.5 Ecommerce server We will have a dedicated server to perform the electronic transactions and also to provide confirmation of the electronic payment. This server will receive the customer’s credit card information from the application server once customer’s biometric data has been confirmed. Then, the details of the transaction will be sent to the bank and the server will wait for confirmation of the payment. If any errors occurred, the server would report to the application server and the last one would forward the information to the terminal in the Point of Sale. Masters in eCommerce 2009 – Dublin City University 61 Chapter 6 - Technical Solution Chapter 6 - Technical Solution In this section we will introduce the prototype developed. Our main goal with the prototype is provide readers a clearer idea of what we intend to do and how FingerPal will work. 6.1 Prototype The prototype presented covers the online part. We have set up a first prototype of FingerPal’s corporate website where users can find information about the company, services offered, promotions, and also manage their account details. Masters in eCommerce 2009 – Dublin City University 62 Chapter 6 - Technical Solution 6.2 Description The structure of the website is a standard corporate template; the upper part shows the company’s logotype, the search engine and the navigation bar. The website’s body has been split into two parts; on the right side we show the login panel and some relevant links for the user while the wider left part we will show promotional offers, marketing campaigns and relevant news. The structure of the Home page is as shown above. We will show relevant marketing information within the body as well as provide space for advertising. The structure of the other sections is the same as the main page, the information displayed varies though. The Consumer’s page will show information relevant to consumers. They can use this section to login but mainly consumer users will be redirected to this section when they log in from the main page. After logging in, this section will show their personal information, options to manage the account and recent transactions. The Vendor’s page will work similarly to the consumer’s one. Vendors will log in from the main page and redirected to this section to display full information of their account. If not logged in, this page will show offers and information relevant for vendors. The Products & Services section will show detailed information about what does FingerPal have to offer. The Support page will show information about FingerPal’s benefits, technology, rates and frequently asked questions. In the last section, About us, we will display information about the company itself, how to contact, terms and conditions and privacy policy. This intends to fulfil the requirements exposed in the eCommerce Directive 2002 for regulating the eCommerce within the European Union. We have used a public CSS template to develop our website. After generating the HTML documents, we focused on the back-end programming. We installed Tomcat 5.5 in our machine together with MySQL 5. Our idea is to use Java Servlets to implement the server side and access the database. Our main aim has been facilitate access to user’s accounts from the web page. This way, users will be able to view their profiles, change personal information, and access their recent transactions. For that to happen, we have implemented scripts to generate users and have a real repository in our database. Masters in eCommerce 2009 – Dublin City University 63 Chapter 6 - Technical Solution 6.3 Database model This is the description of the database implemented. There are 4 tables initially, but the database can be scalable to a more complex system. There are attributes in the tables which can be generalized to tables such as addresses, countries, credit card providers. However, the scope of our prototype is not that wide. Therefore, we have inserted 4 tables (Consumer, Vendor, Bank, and Transaction) and 4 relations. The attributes which describe each table are displayed in the figure above. Vendors and consumers are associated with banks. We will also keep a record of all the transactions and link them with the source and destination. This database will allow us to manage the online application. Users will be able to log in and manage their accounts. They will be also able to view recent transactions and access to the full historical. We will also keep banking and financial information. Masters in eCommerce 2009 – Dublin City University 64 Chapter 6 - Technical Solution 6.4 Technologies used Cascade Style Sheet Cascading Style Sheets is a style sheet language used to describe the presentation of a document written in a markup language. Commonly, we use CSS to style HTML and XHTML pages but it can also be used with any type of XML file. The main feature is to enable the separation between content and presentation. This separation includes colors, fonts and layout. CSS improves accessibility and flexibility when specifying the presentation characteristics. This way, it allows multiple pages to share formatting and reduce complexity and redundancy. CSS specifies a priority scheme to determine which style rules apply if more than on rule matches against a particular element. The Cascading Style Sheet specifications are maintained by the W3C (World Wide Web Consortium). HTML Hypertext Markup Language is the main language for describing web pages. It allows creating structured documents by denoting structural semantics for text such as headings, paragraphs, lists, html images, and many more. It allows images and objects to be embedded and used to create interactive forms. HTML is not a language itself; it is a markup language, which is a set of markup tags. These markup tags are used by HTML to describe web pages. These tags are surrounded by angle brackets like <html> and normally come in pairs like <b> and </b>. The basic structures for HTML markup are elements. Elements have two basic properties: attributes and content. These elements affect the behavior of Web browsers and CSSs to define the appearance and layout of text and other material. It is encouraged to use CSS in addition to HTML for explicit presentational specification. MySQL 5 As mentioned in previous sections, MySQL is a relational database management system which has more than 6M installations. Basically, the program runs as a server providing multi-user access to a number of databases. The source code is under the GNU General Public License and also under several proprietary agreements. If is suitable for free software projects which require a full featured database management system, but it is also used in big WWW projects such as Google or Facebook. Apache Tomcat 5.5 Apache Tomcat 5.5 is an open source software implementation of the Java Servlet and Java Server Pages technologies. Masters in eCommerce 2009 – Dublin City University 65 Chapter 6 - Technical Solution 6.5 Testing The following guideline has been used to check the proper performance of the application: 6.5.1 Functionality 6.5.1.1 Links Objective is to check for all the links in the website. All Internal Links All External Links All mail to links Check for orphan Pages Check for Broken Links 6.5.1.2 Forms Test for the integrity of submission of all forms. All Field Level Checks All Field Level Validations. Functionality of Create, Modify, Delete & View. Handling of Wrong inputs (Both client & Server) Default Values if any Optional versus Mandatory fields. 6.5.1.3 Cookies Check for the cookies that has to be enabled and how it has to be expired. 6.5.1.4 Web Indexing Depending on how the site is designed using Meta tags, frames, HTML syntax, dynamically created pages, passwords or different languages, our site will be searchable in different ways. Meta Tags Frames HTML syntax. Masters in eCommerce 2009 – Dublin City University 66 Chapter 6 - Technical Solution 6.5.1.5 Database Two types of errors that may occur in Web applications: Data Integrity: Missing or wrong data in table. Output Error: Errors in writing, editing or reading operations in the tables. The issue is to test the functionality of the database, not the content and the focus here is therefore on output errors. Verify that queries, writing, retrieving or editing in the database is performed in a correct way. 6.5.2 Usability 6.5.2.1 Navigation Navigation describes the way users navigate within a page, between different user interface controls (buttons, boxes, lists, windows etc.), or between pages via e.g. links. Application navigation is proper through tab Navigation through Mouse Main features accessible from the main/home page. Any hot keys, control keys to access menus. 6.5.2.2 Content Correctness is whether the information is truthful or contains misinformation. The accuracy of the information is whether it is without grammatical or spelling errors. Remove irrelevant information from your site. This may otherwise cause misunderstandings or confusion. Spellings and Grammars Updated information General Appearance Page appearance Colour, font and size Frames Consistent design Masters in eCommerce 2009 – Dublin City University 67 Chapter 6 - Technical Solution 6.5.3 Server Side Interfaces: 6.5.3.1 Server Interface Verify that communication is done correctly, Web server-application server, application server-database server and vice versa. Compatibility of server software, hardware, network connections. Database compatibility (SQL, Oracle etc.) 6.5.3.2 External Interface (if any) 6.5.4 Client Side Compatibility: 6.5.4.1 Platform Check for the compatibility of Windows (95, 98, 2000, NT) Unix (different sets) Macintosh (If applicable) Linux Solaris (If applicable) 6.5.4.2 Browsers Check for the various combinations: Internet Explorer (3.X 4.X, 5.X) Mozilla Firefox (3.X 4.X 5.X) Netscape Navigator (3.X, 4.X, 6.X) Browser settings (security settings, graphics, Java etc.) Frames and Cascade Style sheets HTML specifications. Graphics: Loading of images, graphics, etc., Masters in eCommerce 2009 – Dublin City University 68 Chapter 6 - Technical Solution 6.5.4.3 Printing Despite the paperless society the web was to introduce, printing is done more than ever. Verify that pages are printable with considerations on: Text and image alignment Colours of text, foreground and background Scalability to fit paper size Tables and borders 6.5.5 Performance 6.5.5.1 Connection speed Try with Connection speed: 14.4, 28.8, 33.6, 56.6, ISDN, cable, DSL, T1, T3 Time-out 6.5.5.2 Load Check/Measure the following: What is the estimated number of users per time period and how will it be divided over the period? Will there be peak loads and how will the system react? Can your site handle a large amount of users requesting a certain page? Large amount of data from users. 6.5.5.3 Stress Stress testing is done in order to actually break a site or a certain feature to determine how the system reacts. Stress tests are designed to push and test system limitations and determine whether the system recovers gracefully from crashes. Hackers often stress systems by providing loads of wrong in-data until it crash and then gain access to it during start-up. Typical areas to test are forms, logins or other information transaction components. Performance of memory, CPU, file handling etc. Error in software, hardware, memory errors (leakage, overwrite or pointers) Masters in eCommerce 2009 – Dublin City University 69 Chapter 6 - Technical Solution 6.5.5.4 Continuous use Is the application or certain features going to be used only during certain periods of time or will it be used continuously 24 hours a day 7 days a week? Will downtime be allowed or is that out of the question? Verify that the application is able to meet the requirements and does not run out of memory or disk space. 6.5.6 Security 6.5.6.1 Valid and Invalid Login 6.5.6.2 Limit defined for the number of tries. 6.5.6.3 Can it be bypassed by typing URL to a page inside directly in the browser? 6.5.6.4 Verify Log files are maintained to store the information for traceability. 6.5.6.5 Verify encryption is done correctly if SSL is used (If applicable) 6.5.6.6 No access to edit scripts on the server without authorization.25 25 For more information on that Checklist visit: http://geekswithblogs.net/ppothuraju/archive/2004/12/22/18319.aspx Masters in eCommerce 2009 – Dublin City University 70 Chapter 7 Financial Projections Chapter 7 Financial Projections 7.1 Funding The sources of funding for FingerPal will come from Enterprise Ireland program for High Potential Start-ups. Enterprise Ireland is fostering high-tech, innovative ideas to build next generation companies. The institution provides financial resources to help develop products, services and processes and support the process of entering the market. Enterprise Ireland determines the funding based on the potential level of exports and job creation. For start-ups at an early stage EI provides funding for: • Completing R&D development • Expansion of Beta Model • Support in obtaining a patent for a new technology Enterprise Ireland invests in the company by becoming its stakeholder (acquires up to 10% of shares). The funding come in a form of grant, usually on a 50/50 basis 26. IP Property Fund Enterprise Ireland provides funds to help protect the Intellectual Property Rights. There are three sections of funding: Stage of Protection: 1 – up to €7,000 to support initial patent protection 2 – up to €20,000 for renewal of patent 3 – support for later stages of development. There are several main expenses involved in starting-up the FingerPal company: 1. Expenditure related to IP protection – expenses to cover filing all patents. 2. R&D development – expenses related to software development. 3. Expenses for hardware – computers, servers. 4. Expenses for renting an office in Dublin. 26 www.enterprise-ireland.com Masters in eCommerce 2009 – Dublin City University 71 Chapter 7 Financial Projections 72 5. Expenses for advertising and promotion. We estimated our predictable expenses for the first three years. The net profit after the first year of operations will be negative. Nevertheless, we aim to collect funds to cover start-up expenses and initial operational costs. We plan to raise the capital from the partnership with Enterprise Ireland. The capital will cover expenses related to patent completion and expenses in the first year of operations. Half of the required capital will come from EI whereas the rest of capital will either come from bank loans or additional private investment. According to our estimations, in year two the company will reach a positive net profit. In the first months of year one the company will be working on R&D to develop the technology. Thus, there will be no revenue. Nevertheless, the company will raise the initial funding of EUR 80,000 from EI and bank loan. 7.2 Sales Explanation As mentioned earlier, FingerPal aims to set competitive interchange fees that will be beneficial for both, the merchants and the banks. Our team calculated the optimal interchange fee and estimated the potential revenue from POS transactions. The estimation was based on the assessement of potential revenues for merchants, banks and FingerPal and competitive advantage with regard to exisitng plastic card interchange fees. The current interchange fees for plastic card retail transactions vary from 0.8% to 3.0%. FingerPal will offer a flat rate of 0.7% from each transaction. Around 0.3% will be divided up between merchants’ acquirer and customers’ bank. FingerPal will charge 0.4 % from each transaction. Our assumptions are based on the number and value of card payments in Ireland in 2007. Card payments with cards issued in Ireland (except cards with an e-money function) (millions; total for the period) 300 250 200 150 100 50 Year 0 Number of Transactions 2003 2004 2005 2006 2007 142 151 176 205 263 Based on ECB Payment Statistics November 2008 Masters in eCommerce 2009 – Dublin City University Chapter 7 Financial Projections 73 Value of card payments with cards issued in the country (except cards with an e-money function) (EURO billions; total for the period) 25 20 15 10 5 Year 0 2003 2004 2005 2006 2007 12 14 16 19 24 Value of Transactions Based on ECB Payment Statistics November 2008 7.3 Calculations Given the number of transactions and the value of transactions in 2007, we calculated: the average value of card transactions: Eur 24,000,000,000/263,000,000= Eur 91.3 number of monthly transactions in 2007: 263,000,000/12=21916666.7 Providing that FingerPal will reach 0.1% of total transactions in Ireland: number of monthly transactions by FingerPal: 21916666.7*0.001= 21916.666 Revenue from interchange fee: Eur 91.3*0.004= Eur 0.364 Year 1 monthly revenue Eur 0.364*21916.666=EUR 7977.666424 Year 2 Growth strategy is to reach 0.2% of total number of transactions. number of transactions in year 2: 21916666.7*0.002=43833.332 monthly revenue: Masters in eCommerce 2009 – Dublin City University Chapter 7 Financial Projections Eur0.364*43833.332=Eur15955.3328 Year 3 Growth strategy is to reach 0.3% of total transactions number of transactions in year 3: 21916666.7*0.003=65749.998 monthly revenue: Eur 0.364*65749.998 =Eur 23932.99993 The above are predictions for a low number of transactions and negative scenario, FingerPal aims to acquire more users month after month. 7.4 Expenses • Wages Each employee (3 executives) will earn 24 000 annually. In year 3 we plan to raise the wages and employ more personnel. • Equipment/Office Furniture/Supply Equipment costs will include the cost of computers, servers, domain fee, software development costs. • Phone/Internet Bills The costs of bill for each executive will be 30 euro a month which gives eur 90.In addition the Internet bill cost, which will be approximately eur 30. • Legal Fees These fees will involve filing the patents and other contracts and agreements fees. • Rent We will first rent a small office at the cost of eur400. In year 3 FingerPal will move in to a bigger office. • Advertising and Promotion We decided to allocate around eur 1000 for the first year on promotions and advertising. Masters in eCommerce 2009 – Dublin City University 74 Chapter 7 Financial Projections 75 7.5 Loss & Profit Projection Three Year Profit Projection FingerPal year 1 Sales % year 2 % €71,793.00 100.00% € 191,460.00 100.00% year 3 % € 287,184.00 100.00% Operating € 112,640.00 156.90% € 81,140.00 42.38% € 150,500.00 52.41% Gross Profit VAT 21% -€ 39,820.00 8362.00 -55.47% 11.65% € 110,320.00 € 23,167.00 57.62% 12.10% € 136,684.00 € 28,703.00 47.59% 9.99% Net Profit After Tax -€ 48,182.00 Masters in eCommerce 2009 – Dublin City University € 87,153.00 € 107,981.00 Chapter 7 Financial Projections 76 7.6 Cash Flow Twelve-month cash flow Oct 09 Nov 09 FingerPal De c 09 Jan 10 2009/2010 Fe b 10 M ar 10 Apr 10 M ay 10 Jun 10 Jul 10 Aug 10 Se p 10 Oct 10 Cas h on Hand (beginning of month) 80,000 40,180 33,560 26,940 20,320 21,677 23,034 24,391 25,748 27,105 28,462 29,819 31,176 EI Funds 40,000 0 0 0 0 0 0 0 0 0 0 0 0 Bank loan 40,000 0 0 0 0 0 0 0 0 0 0 0 0 INCOME FROM TRANSACTIONS Sales TOTAL Sale s Total Cas h Available (bef ore cash out) 0 0 0 0 7,977 7,977 7,977 7,977 7,977 7,977 7,977 7,977 7,977 0 0 0 0 7,977 7,977 7,977 7,977 7,977 7,977 7,977 7,977 7,977 80,000 40,180 33,560 26,940 28,297 29,654 31,011 32,368 33,725 35,082 36,439 37,796 39,153 EXPENSES 400 400 400 400 400 400 400 400 400 400 400 400 400 Legal Fees 10,000 0 0 0 0 0 0 0 0 0 0 0 0 Computers & Servers 20,000 0 0 0 0 0 0 0 0 0 0 0 0 Offi ce Suppl i es and Furni ture 1,500 0 0 0 0 0 0 0 0 0 0 0 0 Adverti si ng & Promoti on 1,000 0 0 0 0 0 0 0 0 0 0 0 0 El ectri ci ty 100 100 100 100 100 100 100 100 100 100 100 100 100 Tel ephone/Internet 120 120 120 120 120 120 120 120 120 120 120 120 120 Insurance 700 0 0 0 0 0 0 0 0 0 0 0 0 6,000 6,000 6,000 6,000 6,000 6,000 6,000 6,000 6,000 6,000 6,000 6,000 6,000 SUBTOTAL 39,820 6,620 6,620 6,620 6,620 6,620 6,620 6,620 6,620 6,620 6,620 6,620 6,620 TOTAL EXPENSES 39,820 6,620 6,620 6,620 6,620 6,620 6,620 6,620 6,620 6,620 6,620 6,620 6,620 Cas h Pos ition (end of month) 40,180 33,560 26,940 20,320 21,677 23,034 24,391 25,748 27,105 28,462 29,819 31,176 32,533 Rent Sal ari es Masters in eCommerce 2009 – Dublin City University Chapter 7 Financial Projections Twelve-month cash flow Nov 10 Dec 10 77 FingerPal Jan 11 2010/2011 Feb 11 Mar 11 Apr 11 M ay 11 Jun 11 Jul 11 Aug 11 Sep 11 Oct 11 Nov 11 Cash on Hand (beginning of month) 32,533 40,168 49,503 58,838 68,173 77,508 86,843 96,178 105,513 114,848 124,183 133,518 142,853 EI Funds 40,000 0 0 0 0 0 0 0 0 0 0 0 0 Bank loan 40,000 0 0 0 0 0 0 0 0 0 0 0 0 15,955 15,955 15,955 15,955 15,955 15,955 15,955 15,955 15,955 15,955 15,955 15,955 15,955 TOTAL Sales 15,955 15,955 15,955 15,955 15,955 15,955 15,955 15,955 15,955 15,955 15,955 15,955 15,955 Total Cash Available (bef ore cash out) 48,488 56,123 65,458 74,793 84,128 93,463 102,798 112,133 121,468 130,803 140,138 149,473 158,808 400 400 400 400 400 400 400 400 400 400 400 400 400 Legal Fees 0 0 0 0 0 0 0 0 0 0 0 0 0 Computers & Servers 0 0 0 0 0 0 0 0 0 0 0 0 0 Office Supplies and Furniture 0 0 0 0 0 0 0 0 0 0 0 0 0 1,000 0 0 0 0 0 0 0 0 0 0 0 0 Electricity 100 100 100 100 100 100 100 100 100 100 100 100 100 Telephone/Internet 120 120 120 120 120 120 120 120 120 120 120 120 120 Insurance 700 0 0 0 0 0 0 0 0 0 0 0 0 Salaries 6,000 6,000 6,000 6,000 6,000 6,000 6,000 6,000 6,000 6,000 6,000 6,000 6,000 SUBTOTAL 8,320 6,620 6,620 6,620 6,620 6,620 6,620 6,620 6,620 6,620 6,620 6,620 6,620 INCOME FROM TRANSACTIONS Sales EXPENSES Rent Advertising & Promotion TOTAL EXPENSES Cash Pos ition (end of month) 8,320 6,620 6,620 6,620 6,620 6,620 6,620 6,620 6,620 6,620 6,620 6,620 6,620 40,168 49,503 58,838 68,173 77,508 86,843 96,178 105,513 114,848 124,183 133,518 142,853 152,188 Masters in eCommerce 2009 – Dublin City University Chapter 7 Financial Projections Twelve-month cash flow Dec 11 Cash on Hand (beginning of month) Jan 12 78 FingerPal Fe b 12 2011/2012 Mar 12 Apr 12 M ay 12 Jun 12 Jul 12 Aug 12 Se p 12 Oct 12 Nov 12 De c 12 152,188 148,200 155,912 163,624 171,336 179,048 186,760 194,472 202,184 209,896 217,608 225,320 233,032 23,932 23,932 23,932 23,932 23,932 23,932 23,932 23,932 23,932 23,932 23,932 23,932 23,932 23,932 23,932 23,932 23,932 23,932 23,932 23,932 23,932 23,932 23,932 23,932 23,932 23,932 176,120 172,132 179,844 187,556 195,268 202,980 210,692 218,404 226,116 233,828 241,540 249,252 256,964 1,000 1,000 1,000 1,000 1,000 1,000 1,000 1,000 1,000 1,000 1,000 1,000 1,000 INCOME FROM TRANSACTIONS Sales TOTAL Sales Total Cash Available (bef ore cash out) EXPENSES Rent Legal Fees Computers & Servers 0 0 0 0 0 0 0 0 0 0 0 0 0 10,000 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1,000 0 0 0 0 0 0 0 0 0 0 0 0 Electri city 100 100 100 100 100 100 100 100 100 100 100 100 100 Telephone/Internet 120 120 120 120 120 120 120 120 120 120 120 120 120 Insurance 700 0 0 0 0 0 0 0 0 0 0 0 0 Office Suppli es and Furniture Advertising & Promotion Sal aries 15,000 15,000 15,000 15,000 15,000 15,000 15,000 15,000 15,000 15,000 15,000 15,000 15,000 SUBTOTAL 27,920 16,220 16,220 16,220 16,220 16,220 16,220 16,220 16,220 16,220 16,220 16,220 16,220 TOTAL EXPENSES Cash Position (end of month) 27,920 16,220 16,220 16,220 16,220 16,220 16,220 16,220 16,220 16,220 16,220 16,220 16,220 148,200 155,912 163,624 171,336 179,048 186,760 194,472 202,184 209,896 217,608 225,320 233,032 240,744 Masters in eCommerce 2009 – Dublin City University Chapter 8 Management Team 79 Chapter 8 Management Team Chief Executive Officer, Chief Financial Officer Olga Bzdawka Chief Information Officer, Director of Marketing and Sales Zaneta Babko B A in Linguistics and Accounting, MSc in eCommerce (B) Olga has over three years of experience in Finance and Business. She was employed in a mobile phone company on a managerial position, which provided her with insights into running a big organisation. Her management skills, accounting and finance knowledge were utilized in making strategic business decisions related to FingerPal success. MA in International Relations, MSc in eCommerce (B) Zaneta has a vast experience in International Relations, Foreign Trade, Journalism and Communications. She was employed in a Radio Eska in Poland where she was responsible for Marketing and Advertising. Thus, she is an expert of FingerPal’s communications services, marketing and sales. Her great analytical thinking skills were utilized in analyzing the market trends. Chief Technology Officer Francisco Canovas BSc in Information Technology, MSc in Software Engineering, MSc in eCommerce (Technical) Francisco is an expert in Information Technology. He concluded a Computer Engineering degree in Spain. Moreover, he attended a 1-year internship in Sweden where he worked on a Computer Engineering Thesis. He also pursued a student exchange project in London. He has an extensive knowledge in many fields of IT, including programming languages, artificial intelligence, databases, language processors, data structures, computer graphics, networking and security. Francisco utilized his vast skills and knowledge in developing the prototype of FingerPal system. Masters in eCommerce 2009 – Dublin City University Appendixes 80 Appendixes Appendix 1 Competitive Analysis Table 1: FACTOR Competitor A Competitor B Competitor C Products Kimaldi Electronics VISA MasterCard Price Not found Interchange fees for transactions range from 0.8% to 2.3 % Interchange fees for transactions range from 0.8% to 2.3 % Quality high high high • • • • Strengths • 27 28 Biometric technology specialist Wide range of products and applications Cooperates with large biometrics manufacturers • • • Well-established and dominant player in payment processing on the market Manages payments across various financial instituions, businesses and consumers Obtained international dominance Overcame the barriers of social acceptance towards payments by plastic cards In 2006, Visa reached 44% of the plastic card market share and 48% of the debit card market share in the US.27[ "How Visa operates", in Forbes, February 25, 2008 Hugh Son ,MasterCard Said to Lose Users After JPMorgan Shift , May 2009 Masters in eCommerce 2009 – Dublin City University • • • • Internationally known, wellfounded company Mastercard is reported to hold 22% of the US debit card market share28 The second largest plastic card payments player Obtained international markets Appendixes Table 1: FACTOR Competitor A • • • Weaknesses • • 29 Provides fingerprint authentication only for catering area The system is designed for small locations The system is closed and connects only with a local POS computer Lack of posibility of payments in any POS Lack of provision whether the software is capable of handling a large number of fingerprints Competitor B • • • • 81 Competitor C • High interchnage rates The need of carrying a plastic card Fraud and security risks High level of online fraud • • • High interchnage rates The need of carrying a plastic card Fraud and security risks High level of online fraud in the UK in 2004 the cost of plastic card fraud reached almost £500 million29 Reliability high high high Stability Founded in 1998, exeprienced And well-established Stable, well-established with high recognition on the market Well-founded and recognized on the market Expertise High level of expertise in processing biometric information and users authentication Extensive and deep knowledge of managing financial transactions Extensive and deep knowledge of managing financial transactions Company Reputation Good reputation, large number of partners High reputation, 2100 financial instituions cooperated in 2008 with VISA There are about 25000 financial institutions which issues Mastercard cards Location Barcelona, Spain Mexico Portugal San Francisco, the USA New York, the USA Advertising website TV, radio, print ads, online advertising, sports sponsorships TV, radio, print ads, online advertising, sports sponsorships Plastic fraud loss on UK-issued cards 2004/2005. Cardwatch.org.uk. retrieved 7 July, 2006 Masters in eCommerce 2009 – Dublin City University Appendixes 82 Appendix 2 Survey FingerPal Biometrics in Financial Transactions Name of Institution E-mail Phone Agent Name Market Research Survey Dublin 10/07/2009 This survey is to measure the interest of banks in biometric payments processing. To help us, please complete this survey and return it to us at your convenience. We will appreciate your opinions and thoughts regarding the above mentioned system. Thank you! Description: Biometrics is a discipline that makes use of the unique features of every individual. These features are either physical or behavioral and include fingerprint, iris, DNA, vein, retina, voice, walk, palm geometry and typing patterns recognition. The biometric industry is growing rapidly and is currently deployed in many areas of everyday life. This survey is to measure the acceptance of fingerprint recognition in point-of-sale transactions. A fingerprint would be a new method of payment in addition to plastic cards, cash and cheque. A customer would simply swipe their finger through a terminal, enter a security code and money from their account would be transferred directly to the merchant. ID 1 Question What is your overall perception of the product described above? Selection Poor Average Good Masters in eCommerce 2009 – Dublin City University Comments/Response Appendixes 83 Excellent 2 What do you like most about this product? 3 What do you like least about the product? 4 How would you rate the quality of this product? Low Average High 5 How important are these features as being a part of this product? • • • • 6 Not Important Security Accuracy Speed of Performance Convenience Neutral Important Very Important Security __ Please rate the importance of each feature from one to four. Accuracy __ Speed of Performance __ Convenience __ 7 Have you heard about the term biometrics before? Familiar with the concept I heard something about it I hadn't heard about it 8 Biometric information of individuals (fingerprints) is kept in a highly secure database. Would you be willing to provide your fingerprint image to be maintained in such a database? Very willing Somewhat willing Not willing at all Masters in eCommerce 2009 – Dublin City University Appendixes 9 Have you ever encountered biometric technology in any of the following areas? Door Access Clock-in/clockout Airports Financial transactions – cash checking None 10 Do you have a fingerprint scanner build in your laptop (or external peripheral)? Yes No 11 Do you reckon that fingerprint biometrics would be successful in financial transactions? Yes No Yes, it sounds specific enough to work 12 Are you: Male Female 13 What is your age range? 10-19 20-29 30-39 40-49 over 50 14 In what country do you live? Masters in eCommerce 2009 – Dublin City University 84 Appendixes 85 Appendix 3 Survey Results 1. What is your overall perception of the product described above? Good Average Excellent Poor 2. What do you like most about this product? Most common answers: - “It is convenient” - “I like its innovativeness” - “It is practical, I don’t have to carry cash” - “I can lose a plastic card but I can’t lose my finger” 3. What do you like least about the product? Most common answers: - “may not be secure” - “Someone may copy my fingerprint and use my money” - “data protection issues” - “it may not be accurate” - “hackers can access biometric biome information” -“I “I don’t need another payment method” -“It “It is too dangerous to use a fingerprint in financial transactions” 4. How would you rate te the quality of this product? High Poor Good 0 10 20 30 40 Masters in eCommerce 2009 – Dublin City University 50 60 Appendixes 86 5. How important are these features as being a part of this product? • • • • Security Accuracy Speed of Performance Convenience neutral important very important not important 0 10 20 30 40 50 60 70 80 90 100 70 80 90 6. Please rate the importance of each feature from one to four? speed of performance convenience security accuracy 0 10 20 30 40 50 60 7. Have you heard about the term biometrics before? Familiar with the concept 20% I heard something about it 69% I hadn't heard about it 10% 8. Biometric information of individuals (fingerprints) is kept in a highly secure database. Would you be willing to provide your fingerprint image to be maintained in such a database? Masters in eCommerce 2009 – Dublin City University Appendixes 87 Not willing at all Somewhat willing Very willing 0 10 20 30 40 50 60 70 9. Have you ever encountered biometric technology in any of the following areas? Access Control 27% Clock-in/clock-out 44% Airports 16% Financial transactions – cash checking 3% None 10% 10. Do you have a fingerprint scanner build in your laptop (or external peripheral)? 15% yes 85% no 11. Do you reckon that fingerprint biometrics would be successful in financial transactions? yes, it sounds specific enough to work no yes 0 10 20 Masters in eCommerce 2009 – Dublin City University 30 40 50 60 70 Appendixes Appendix 4 Legislation on Biometrical Information,European Directive 30: • biometrical information must be collected for specified, explicit and legitimate purposes and not further processed in a way incompatible with those purposes • before processing any biometrical information the supervisory body has to be notified of the purposes of the processing • biometrics should be collected and processed fairly and lawfully; the processing of biometrical data • revealing racial or ethnic origin, political opinions, religious or philosophical beliefs, trade-union membership and the processing of data concerning health of sex life should be prohibited as a rule • the collection and processing must be adequate, relevant and not excessive in relation to the declared purposes (art. 6°1c); • biometrical images have to be accurate and, where necessary, kept up to date or erased • biometrical data may not be disclosed to third persons if this doesn't follow out of the declared purpose (art. • The biometrical data subject has a right to know about the processing and the use of the processed biometrics 6°1b); b. • (all biometrical data subjects are endowed with a right of access to the biometrical data and to obtain rectification, erasure or blocking of data when the processing violates the provisions (e.g. incomplete or inaccurate nature of the data). In some cases these rights are restricted to safeguard national security, defence, public security, prevention and criminal investigation, economic or financial interests of states, rights and freedoms of others (art. 13); art. 18); c. • every biometrical data subject has a right not to be subject to a decision which is based solely on automated processing of data intended to evaluate certain personal aspects relating to him, such as his performance at work, credit-worthiness, reliability, conduct, etc (art. 15); (art. 8); • there has to be a responsible controller to ensure data protection rights and duties. 30 Based on Paul de Hert “Biometrics: legal issues and implications”, Background paper for the Institute of Prospective Technological, Studies, DG JRC – Sevilla, European Commission accessed at: Masters in eCommerce 2009 – Dublin City University 88 Appendixes Appendix 5 Potential Partners: Irish Merchant Banks (Acquirers) AIB -Ireland, UK, Europe, US and Asia Bank of Ireland -Ireland, UK and Europe RaboDirect - online bank Permanent tsb -Ireland and UK Ulster Bank - Ireland Anglo Irish Bank -Ireland, UK and Europe ACCBank -Ireland and Rabobank Worldwide National Irish Bank IIB Bank -Ireland and KBC Worldwide Bank of Scotland Ireland Irish Nationwide -Ireland, UK Masters in eCommerce 2009 – Dublin City University 89 Appendixes Appendix 6 Historical Adoption Rates of Credit/Debit Cards Debit Plastic card Transaction volume Growth 2000-2006 2000 Credit/Debit ard Groth in Purchases 1987 - 2008 Masters in eCommerce 2009 – Dublin City University 90 Appendixes Appendix 7 Merchant’s Terminal Biometric Accesss Corporation Secure Touch Modular (STAm) with various applications such as payrol check cashing, creidt/debit card transaction processing, paharmacy controlled substance tracking, pharmacy physical access control, time&attendance. Web: www.biometricaccess.com Email: [email protected] Masters in eCommerce 2009 – Dublin City University 91 SPECIFICATIONS (From Company’s Website) Display: High contrast, backlit LCD with 128 x 64 graphics, 8 lines x 21 characters text and a soft function key display line Keypad: 20 keys, including 4 screen-addressable function keys External Ports: 1 10/100 Ethernet port, 2 USB 2.0 host ports, 1 USB 2.0 On the Go port (host or device mode) and 3 RS232 serial ports MagCard Reader: Tracks 1, 2, 3 standard, high coercivity, bi-directional External Slots: 2 SD Card Slots for memory and peripheral expansion Internal Slot: SD Card Slot for memory expansion Processor: Blackfin DSP, 600 MOPS, 1200 MMACS Memory: 32 Mbytes SDRAM, 8 Mbytes non-volatile Flash Security: DES, 3DES, DUKPT secure encryption controller with intrusion detection Power: AC: 100 - 240 V, 47 - 63 Hz / DC: 12 V, 2.1 A (base terminal) or 12 V, 5 A (terminal with printer) Environmental: 2° to 40° C (35° to 104° F) operating temperature range / 10% to 85% relative humidity, non-condensing Physical: Dimensions: 8.8 in x 6.3 in x 1.9 in / 22.4 cm x 16.0 cm x 4.8 cm / Weight: 1 lb 10 oz / 0.68 kg Reliability: Keypad - 500,000 keystrokes / MagCard Reader - 400,000 reads / MTBF - 100,000 hours (all calculated) Barcode Scanner Document Scanner Finger Imager Camera Modem (alternative to Ethernet) Reads standard 1D & 2D barcodes (RSS, PDF417, microPDF, MaxiCode, Data Matrix, QR Code, UCC, UPC/EAN, Postals, Aztec) accommodation of 2¼ in. wide by 85 ft. long Optical imager offering 700 DPI, 8-bit gray Biometric ID verification and digital signature for transaction authorization, electronic payment and cashier logon OCR scanner up to 600 DPI, 24-bit color for MICR lines and text (scan field is 4 in. wide by variable length) Appendixes Appendix 8 Individuals Contacted Tesco - Communications Manager: Seamus Banim, Tel. 00 353 1 2152938, email: [email protected] Spar - Manager William Christie Manager Tel 01224 691589 SupreQuinn – ManagerLorcon O Hanlon Tel. 01 4964270 email: [email protected] SUPERVALU INC - Public Affairs Manager Natalie Danaher, tel. 952-828-4356 email: [email protected] AIB - BBLS Executive Niamh O'Neill Phone: +353 1 6670233 email: niamh.m.o'[email protected] Ulster Bank - Head of Corporate Banking Eddie Cullen, Tel: + 353 1 608 4111. email: eddie.cullen@ulsterenquiries Masters in eCommerce 2009 – Dublin City University 93 References References List of references consulted apart from the ones already specified in the footnotes. These references were consulted mainly to achieve background required to develop the project, either for technology development or market research. [1] De Hert Paul, Biometrics: legal issues and implications, Background paper for the Institute of Prospective Technological, Studies, DG JRC – Sevilla, European Commission Available at: http://cybersecurity.jrc.ec.europa.eu/docs/LIBE%20Biometrics%20March%2005/LegalI mplications_Paul_de_Hert. [2] The Biometrics Advantage, Bioscrypt Inc. Nov 2007. Available at: http://www.browderelectronics.com/biometric_advantage_wp.pdfECB Payment Statistics, November 2008, Number of card transactions in Ireland. Availavble at: http://sdw.ecb.europa.eu/reports.do?node=1000001156 [3] Biometrics Review: 2008/2009 Biometric Technology Today January 2009 Biometrics– Ending the Identity Crisis, Retailspeak Magazine, October 13, 2004, available at: http://www.microsoft.com/industry/retail/businessvalue/rsbiometricsarticle.mspx [4] Accesses via DCU Library, Science Direct database ECB Payment Statistics November 2008, Value of card transactions in Ireland. Available at: http://sdw.ecb.europa.eu/reports.do?node=1000001157pdf [5] Enterprise Ireland supports for High Potential Start-Ups – LIT. Available at: www.lit.ie/EAC/EnterpriseIreland.pps [6] Financial success for biometrics? Biometric Technology Today, April 2005. Accesses via DCU Library, Science Direct database. [7] Frost and Sullivan Report (Preview), Development of a Bi-Modal Biometrics Business Solutions for Physical Access Control, March 2007. Available at: http://www.itrportal.com/absolutenm/templates/articlebiometrics.aspx?articleid=5608&zoneid=50 [8] Frost & Sullivan: Advances in Biometrics Remedy the Need for Increased Security (Preview). NewsWire. LONDON, March 19 2009. Available at: http://news.prnewswire.com/DisplayReleaseContent.aspx?ACCT=ind_focus.story&STO RY=/www/story/03-19-2009/0004991263 [9] Frost & Sullivan, Strong Growth for Biometrics in Financial Institutions Expected Globally, May-30-08. Press release: Findbiometrics, Global identity management. Available at: http://www.findbiometrics.com/interviews/i/6455/ [10] Frost and Sullivan, Development of a Bi-Modal Biometrics Business Solutions for Physical Access Control, March 2007. Availabe at: http://www.simpletechnology.com/newslettertemplate/SimplySecureaug/bioscrypt_b i-modal_biometrics_whitepaper.pdf Masters in eCommerce 2009 – Dublin City University 94 References [11] Global Biometric Industry to Witness Remarkable Growth, PRLog Free Press Release Nov 02, 2007. Available at: http://www.prlog.org/10036466-global-biometric-industryto-witness-remarkable-growth.html [12] Global Biometric Forecast to 2012, September 2008. Available at: http://www.bharatbook.com/Market-Research-Reports/Global-Biometric-Forecast-to2012.html [12] How Visa operates, Forbes, February 25, 2008 Available at: http://www.forbes.com/feeds/afx/2008/02/25/afx4694434.html [13] Jung Marcia Y. Biometric Market and Industry Overview International Biometric Group. 8.12.2005. Available at: http://www.wcoomd.org/files/2.%20Event%20files/PDFs/Biometrics/17-Jung.pdf [14] Mayer M., Bridgeman N., Muller L., A Case study on digiPROOF, a Fingerprint Based Payment System. NACCQ Conference 2006. Available at: bitweb.tekotago.ac.nz/staticdata/papers06/.../197.pdf [15] Most M., The Current Biometrics Marketplace. Acuity Market Intelligence, Digital Money Forum, March 31, 2009, London. Available at: www.digitalmoneyforum.com/.../Maxine_Most.pdf [16] Patrick S. Andrew, Fingerprint Concerns: Performance, Usability, and Acceptance of Fingerprint Biometric Systems, National Research Council of Canada, July 2, 2008. Available at: http://www.andrewpatrick.ca/essays/fingerprint-concerns-performanceusability-and-acceptance-of-fingerprint-biometric-systems [17] Plastic fraud loss on UK-issued cards 2004/2005. Cardwatch.org.uk. Retrieved 7 July, 2006. [18] Prinsloo R. , Biometric systems firm experiences surge in business despite economic slowdown. MiningWeekly May, 2009. Available at: http://www.miningweekly.com/article/company-experiencing-growth-despite-globaleconomic-downturn[19] Retail in Ireland, in Global Oneness, August 10, 2006. Available at: http://www.experiencefestival.com/stillorgan [20] SearchSecurity.com 08/22/2006, available at: http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci1211831,00.html [21] Son Hugh, MasterCard Said to Lose Users After JPMorgan Shift , May 2009 http://www.bloomberg.com/apps/news?pid=20601087&sid=aOb_UtZIhyMc [22] Wagley John, Vein Recognition Use Grows, January 2008. Available at: http://www.securitymanagement.com/article/vein-recognition-use-grows Masters in eCommerce 2009 – Dublin City University 95 References List of websites also consulted: [23] Visa Inc. Available at: www.visa.com [24] Master Card Inc. Available at: www.mastercard.com [25] Interchange fees. Available at: www.interchangefees.com [26] Biometric Org. Available at: www.biometric.org [27] Biometric Access. Available at: www.biometricaccess.com [28] Enterprise Ireland. Available at: www.enterprise-ireland.com Masters in eCommerce 2009 – Dublin City University 96