Dramatic moves for smartphone integration ahead

September 10, 2012 // By Nick Flaherty
The real business value of smartphones is yet to come, with a massive disruptive effect on a much broader selection of secure services says a leading European consultancy.

“We have barely scratched the surface of what smartphones, Near Field Communications (NFC), and secure element technology can do for secure services," said Jon Edgcombe, leader of the application software technologies group at Cambridge Consultants , a well established design and products consultancy and part of the European Altran engineering group.
The established concepts of contactless payments, mobile wallets and moves towards fully mobile banking already signal a major change in the secure services that can be performed wirelessly or with a smartphone, but smartphones will start to replace everything from IDs and passports to website logins, anti-counterfeiting and as replacements for keys.
Mobile wallets and ticketing are just the jumping off point. The short and long-range wireless capabilities of smartphones are ripe to be exploited for a far greater range of secure applications – things like identity verification using face or voice biometrics, for example.
“We’re just at the point where the full potential of the technology for smartphones to be a central point in secure services is starting to be fulfilled," he said. "Although there are some technical challenges to overcome to get to this point, we firmly believe that smartphones will transform how consumers interact with a range of day-to-day secure items – not just your bank card and wallet but also your house and car keys, your travel tickets, loyalty schemes, healthcare devices, even corporate access and beyond.”
Not only is the device linked directly to an individual – and usually carried on their person at all times – but it offers a flexible user interface and processing platform. Moreover, increasingly the technology to secure the required connectivity, imaging or data processing capabilities is already embedded in the phone.
"The key limiting factor is access to the secure store of information on the device, and who controls this – the smartphone designer, the mobile network operator, a third-party ‘trusted service manager’ or the end user," he