HOME





SMS Banking
SMS banking is a form of mobile banking. It is a facility used by some banks or other financial institutions to send messages (also called notifications or alerts) to customers' mobile phones using SMS messaging, or a service provided by them which enables customers to perform some financial transactions using SMS. Push and pull messages SMS banking services may use either push or pull messages. Push messages are those that a bank sends out to a customer's mobile phone, without the customer initiating a request for the information. Typically, a push message could be a mobile marketing message or an alert of an event happening in the customer's bank account, such as a large withdrawal of funds from an ATM or a large payment involving the customer's credit card, etc. It may also be an alert that some payment is due, an amount has been credited to the customer's account or that an e-statement is ready to be downloaded. Another type of push message is one-time password (OTPs). O ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

SMS Banking Mobile Phone Screenshot
Short Message Service, commonly abbreviated as SMS, is a text messaging service component of most telephone, Internet and mobile device systems. It uses standardized communication protocols that let mobile phones exchange short text messages, typically transmitted over cellular networks. Developed as part of the GSM standards, and based on the SS7 signalling protocol, SMS rolled out on digital cellular networks starting in 1993 and was originally intended for customers to receive alerts from their carrier/operator. The service allows users to send and receive text messages of up to 160 characters, originally to and from GSM phones and later also CDMA and Digital AMPS; it has since been defined and supported on newer networks, including present-day 5G ones. Using SMS gateways, messages can be transmitted over the Internet through an SMSC, allowing communication to computers, fixed landlines, and satellite. MMS was later introduced as an upgrade to SMS with "picture messaging" ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Cheque
A cheque (or check in American English) is a document that orders a bank, building society, or credit union, to pay a specific amount of money from a person's account to the person in whose name the cheque has been issued. The person writing the cheque, known as the ''drawer'', has a transaction banking account (often called a current, cheque, chequing, checking, or share draft account) where the money is held. The drawer writes various details including the monetary amount, date, and a payee on the cheque, and signs it, ordering their bank, known as the ''drawee'', to pay the amount of money stated to the payee. Although forms of cheques have been in use since ancient times and at least since the 9th century, they became a highly popular non-cash method for making payments during the 20th century and usage of cheques peaked. By the second half of the 20th century, as cheque processing became automated, billions of cheques were issued annually; these volumes peaked in or a ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Front And Back Ends
In software development, frontend refers to the presentation layer that users interact with, while backend involves the data management and processing behind the scenes, and full-stack development refers to mastering both. In the client–server model, the client is usually considered the frontend, handling user-facing tasks, and the server is the backend, managing data and logic. Some presentation tasks may also be performed by the server. Introduction In software architecture, there may be many layers between the hardware and end user. The ''front'' is an abstraction, simplifying the underlying component by providing a user-friendly interface, while the ''back'' usually handles data storage and business logic. Examples E-commerce Website: The ''frontend'' is the user interface (e.g., product pages, search bar), while the ''backend'' processes payments and updates inventory. Banking App: The ''frontend'' displays account balances, while the ''backend'' handles secure tra ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Encryption
In Cryptography law, cryptography, encryption (more specifically, Code, encoding) is the process of transforming information in a way that, ideally, only authorized parties can decode. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Despite its goal, encryption does not itself prevent interference but denies the intelligible content to a would-be interceptor. For technical reasons, an encryption scheme usually uses a pseudo-random encryption Key (cryptography), key generated by an algorithm. It is possible to decrypt the message without possessing the key but, for a well-designed encryption scheme, considerable computational resources and skills are required. An authorized recipient can easily decrypt the message with the key provided by the originator to recipients but not to unauthorized users. Historically, various forms of encryption have been used to aid in cryptography. Early encryption ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Information Systems
An information system (IS) is a formal, sociotechnical, organizational system designed to collect, process, store, and distribute information. From a sociotechnical perspective, information systems comprise four components: task, people, structure (or roles), and technology. Information systems can be defined as an integration of components for collection, storage and processing of data, comprising digital products that process data to facilitate decision making and the data being used to provide information and contribute to knowledge. A computer information system is a system, which consists of people and computers that process or interpret information. The term is also sometimes used to simply refer to a computer system with software installed. "Information systems" is also an academic field of study about systems with a specific reference to information and the complementary networks of computer hardware and software that people and organizations use to collect, filter, p ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Telephone Banking
Telephone banking is a service provided by a bank or other financial institution that enables customers to perform over the telephone a range of financial transactions that do not involve cash or financial instruments (such as checks) without the need to visit a bank branch or ATM. History Telephone banking became commercially available in the 1980s, first introduced by Girobank in the United Kingdom, which established a dedicated telephone banking service in 1984. Telephone banking saw growth during the 1980s and early 1990s and was heavily used by the first generation of direct banks. However, the development of online banking in the early 2000s started a long-term decline in the use of telephone banking in favor of internet banking. The advent of mobile banking further eroded the use of telephone banking in the 2010s. Operation To use a financial institution's telephone banking facility, a customer must first register with the institution for the service. They would ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Information Security
Information security is the practice of protecting information by mitigating information risks. It is part of information risk management. It typically involves preventing or reducing the probability of unauthorized or inappropriate access to data or the unlawful use, Data breach, disclosure, disruption, deletion, corruption, modification, inspection, recording, or devaluation of information. It also involves actions intended to reduce the adverse impacts of such incidents. Protected information may take any form, e.g., electronic or physical, tangible (e.g., Document, paperwork), or intangible (e.g., knowledge). Information security's primary focus is the balanced protection of data confidentiality, data integrity, integrity, and data availability, availability (also known as the 'CIA' triad) while maintaining a focus on efficient policy implementation, all without hampering organization productivity. This is largely achieved through a structured risk management process. To stand ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Service Level Agreement
A service-level agreement (SLA) is an agreement between a service provider and a customer. Particular aspects of the service – quality, availability, responsibilities – are agreed between the service provider and the service user. The most common component of an SLA is that the services should be provided to the customer as agreed upon in the contract. As an example, Internet service providers and telcos will commonly include service level agreements within the terms of their contracts with customers to define the level(s) of service being sold in plain language terms. In this case, the SLA will typically have a technical definition of '' mean time between failures'' (MTBF), '' mean time to repair'' or '' mean time to recovery'' (MTTR); identifying which party is responsible for reporting faults or paying fees; responsibility for various data rates; throughput; jitter; or similar measurable details. Overview A service-level agreement is an agreement between two or m ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




SMS Gateway
An SMS gateway or MMS gateway allows a computer (also known as a Server) to send or receive text messages in the form of Short Message Service (SMS) or Multimedia Messaging Service (MMS) transmissions between local and/or international telecommunications networks. In most cases, SMS and MMS are eventually routed to a mobile phone through a wireless carrier. SMS gateways are commonly used as a method for person-to-person to device-to-person (also known as application-to-person) communications. Many SMS gateways support content and media conversions from email, push, voice, and other formats. Gateway types Several mobile telephone network operators have true fixed-wire SMS services. These are based on extensions to the European Telecommunications Standards Institute (ETSI) Global System for Mobile Communications (GSM) SMS standards and allow messaging between any mix of fixed and mobile equipment. These use frequency-shift keying to transfer the message between the terminal an ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Personal Identification Number
A personal identification number (PIN; sometimes RAS syndrome, redundantly a PIN code or PIN number) is a numeric (sometimes alpha-numeric) passcode used in the process of authenticating a user accessing a system. The PIN has been the key to facilitating the private data exchange between different data-processing centers in computer networks for financial institutions, governments, and enterprises. PINs may be used to authenticate banking systems with cardholders, governments with citizens, enterprises with employees, and computers with users, among other uses. In common usage, PINs are used in ATM or PO transactions, secure access control (e.g. computer access, door access, car access), internet transactions, or to log into a restricted website. History The PIN originated with the introduction of the automated teller machine (ATM) in 1967, as an efficient way for banks to dispense cash to their customers. The first ATM system was that of Barclays in London, in 1967; it accepted ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


ATM Card
An ATM card is a dedicated payment card card issued by a financial institution (i.e. a bank) which enables a customer to access their financial accounts via its and others' automated teller machines (ATMs) and, in some countries, to make approved point of purchase retail transactions. ATM cards are not credit cards or debit cards, however most credit and debit cards can also act as ATM cards and that is the most common way that banks issue cards since the 2010s. ATM cards are payment card size and style plastic cards with a magnetic stripe and/or a plastic smart card with a chip that contains a unique card number and some security information such as an expiration date or CVVC (CVV). ATM cards are known by a variety of names such as bank card, MAC (money access card), client card, key card or cash card, among others. Other payment cards, such as debit cards and credit cards can also function as ATM cards. Charge and proprietary cards cannot be used as ATM cards. The use of a ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Electronic Bill Payment
Electronic bill payment is a feature of online, mobile and telephone banking, similar in its effect to a giro, allowing a customer of a financial institution to transfer money from their transaction or credit card account to a creditor or vendor such as a public utility, department store or an individual to be credited against a specific account. These payments are typically executed electronically as a direct deposit through a national payment system, operated by the banks or in conjunction with the government. Payment is typically initiated by the payer but can also be set up as a direct debit. In addition to the bill payment facility, most banks will also offer various features with their electronic bill payment systems. These include the ability to schedule payments in advance to be made on a specified date (convenient for installments such as mortgage and support payments), to save the biller information for reuse at a future time and various options for searching th ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]