Mobile paymentA mobile payment, also referred to as mobile money, mobile money transfer and mobile wallet, is any of various payment processing services operated under financial regulations and performed from or via a mobile device, as the cardinal class of digital wallet. Instead of paying with cash, cheque, or credit cards, a consumer can use a payment app on a mobile device to pay for a wide range of services and digital or hard goods.
Security tokenA security token is a peripheral device used to gain access to an electronically restricted resource. The token is used in addition to, or in place of, a password. It acts like an electronic key to access something. Examples of security tokens include wireless keycards used to open locked doors, or a banking token used as a digital authenticator for signing in to online banking, or signing a transaction such as a wire transfer.
Digital enhanced cordless telecommunicationsDigital Enhanced Cordless Telecommunications, usually known by the acronym DECT, is a standard primarily used for creating cordless telephone systems. It originated in Europe, where it is the common standard, replacing earlier cordless phone standards, such as 900 MHz CT1 and CT2. Beyond Europe, it has been adopted by Australia and most countries in Asia and South America. North American adoption was delayed by United States radio-frequency regulations. This forced development of a variation of DECT called DECT 6.
Contactless smart cardA contactless smart card is a contactless credential whose dimensions are credit-card size. Its embedded integrated circuits can store (and sometimes process) data and communicate with a terminal via NFC. Commonplace uses include transit tickets, bank cards and passports. There are two broad categories of contactless smart cards. Memory cards contain non-volatile memory storage components, and perhaps some specific security logic.
Tor (network)Tor, short for The Onion Router, is free and open-source software for enabling anonymous communication. It directs Internet traffic via a free, worldwide, volunteer overlay network that consists of more than seven thousand relays. Using Tor makes it more difficult to trace a user's Internet activity. Tor protects personal privacy by concealing a user's location and usage from anyone performing network surveillance or traffic analysis. It protects the user's freedom and ability to communicate confidentially through IP address anonymity using Tor exit nodes.
PaymentA payment is the voluntary tender of money or its equivalent or of things of value by one party (such as a person or company) to another in exchange for goods or services provided by them, or to fulfill a legal obligation/philanthropy desire. The party making the payment is commonly called the payer, while the payee is the party receiving the payment. Payments can be effected in a number of ways, for example: the use of money, cheque, or debit, credit, or bank transfers, whether through mobile payment or otherwise the transfer of anything of value, such as stock, or using barter, or personal data, the exchange of one good or service for another.