
Card and Mobile Payment Threat Models
As a global safety science leader, UL Solutions helps companies to demonstrate safety, enhance sustainability, strengthen security, deliver quality, manage risk and achieve regulatory compliance.
See how we put safety science to work to help create a safer, more secure and sustainable world for you.
Explore our business intelligence-building digital tools and databases, search for help, review our business information, or share your concerns and questions.
Accelerate your planning process and learn the requirements needed to take your products to market worldwide.
A secure, online source for increased visibility into your UL Solutions project files, product information, documents, samples and services.
Access UL certification data on products, components and systems, identify alternatives and view guide information with Product iQ.
ULTRUS™ helps companies work smarter and win more with powerful software to manage regulatory, supply chain and sustainability challenges.
Explore threat models facing mobile wallets, including a review of card payments, mobile architectures, fraud statistics and mitigation techniques.
Mobile or digital wallets have recently overtaken credit cards as the most used payment method, raising the question of whether the existing threat models are accurate and applicable.
In this whitepaper you will learn the ways in which card-based payments work, and the differences between traditional payment cards and the mobile payment systems which are common today. From there, we will cover common architectures, threat models, and fraud and mitigating techniques relating to mobile payments.
Card and Mobile Payment Threat Models