Beruflich Dokumente
Kultur Dokumente
Group 1
1155040796 WANG,Yuhao
TABLE OF CONTENTS
3.3 Hardware……………………………………………………………35
REFERENCES………………………………………………………….74
1.1 Introduction
Epay is meaning for easy to pay, which is a mobile payment software linking
wearable device and smartphone to make payment more safe and convenient.
Users can just use wearable device – their smart watch to pay money and administrate
their credit cards and personal information on the smartphone. Fingerprint and retina
verification is a pre-step of any payment by watch that ensures the safety. And
payment by watch decreases the times of human-machine interaction that brings a lot
of convenience. For the software on smartphone, user can make registration,
add/delete credit cards, check payment history and do other necessary operations.
Epay allows users to choose which card is used to pay just like choose a credit card in
their wallet. So with this software, users can make payment using the cards without
carrying the credit cards in their wallet. This mobile payment software just provides a
new way to make payment and will not affect the interest of banks.
The software functions on watch and phone are different. The watch do the action for
payment and the phone is responsible for administrating credit cards and personal
information. For the watch version, the principle of design is simplification and ease
to use. So the watch only has the necessary functions to make payment. For the phone
version, there are comprehensive functions about the credit cards and payments. Users
can also set some personalization according to their own needs.
• Registration. When first use Epay on phone, user need to create an account. In
this step, the fingerprint and retina should be recorded.
The users of Epay have two things in common. One is they have the required devices
– a smartphone and a smart watch. The other is they can accept a new way of making
payment to make the process easier. Most of them may have the habit that buying
things using credit card instead of cash. With these characteristics, they are willing to
use Epay in their daily life.
Most smart watches do not have their own mobile network. So the main constraint of
Epay is that the synchronization of transaction record only update when the watch
connects to Wi-Fi or Bluetooth. So the data on smart phone maybe a little delay.
The main dependency for Epay is some specific requirement for smart watch. To
make the payment safe, we use human recognition for verification. So the smart watch
must have a camera to identify retina and the screen can record fingerprint.
• Bind an account
a) Introduction
When it is the first time to use Epay on watch, user must bind a registered
account. Account name, password, fingerprint and retina are required
information for bind step. When an account has been bind to a watch, there is
no need to input account name and password after that.
b) Input
Account name and password – To ensure that this is a registered account that
already has its corresponding fingerprint and retina in database.
Fingerprint – The first step of human recognition.
Retina – The second step of human recognition.
c) Processing
When account name and password are received, the system will check
whether the account has already existed in database. If it is, it will ask the user
for fingerprint verification. After read the fingerprint, the system then check
whether it is match to the security record in database. If yes, the fingerprint
will be saved in the watch for further use and ask for retina verification. When
the result of retina verification is passed, the retina will be saved and the bind
step is finished.
d) Output
• Unbind an account
a) Introduction
If the user does not want to use this account on his watch any more, he can
unbind the account.
b) Input
Unbind command – User press the unbind button on screen.
Fingerprint – The first step of human recognition.
Retina – The second step of human recognition.
c) Processing
The system receives the command and requests the user for fingerprint and
retina verification. When the user passed the double verification, the
command is effective. And the data of this account including account name,
password, fingerprint and retina are deleted.
d) Output
Unbind notification – A notification of unbind is shown on screen.
Bind interface – To use Epay, user needs to bind an account again.
• Fingerprint verification
a) Introduction
When user wants to use Epay on watch, he needs to pass fingerprint
verification first. Without fingerprint verification, a user cannot get access to
operation interface.
b) Input
8 Epay – Smart Offline Transaction App
Fingerprint – The screen will recognize the fingerprint and record it for
further process.
c) Processing
The system receives the image of fingerprint recorded by watch screen and
compares it with records in database. Then a result is generated.
d) Output
Verification result – Whether the user passed the fingerprint verification.
Operation interface – If the user passed the fingerprint verification, he has
access to Epay interface and can make normal payment.
• Retina verification
a) Introduction
When the payment amount exceeds the upper limit, the user must pass
additional retina verification.
b) Input
Retina – The camera will recognize the fingerprint and record it for further
process.
c) Processing
The system receives the image of retina recorded by watch camera and
compares it with records in database. Then a result is generated.
d) Output
Verification result – Whether the user passed the retina verification. Upper
payment interface – If the user passed the fingerprint verification, he has
access to make an upper payment.
a) Introduction
• Make payment
a) Introduction
The cash register deals with payment by scanning the QR code on watch. b)
Input
Scanning signal – When the cash register scans the QR code to make a
payment, the signal is received and recorded by watch.
c) Processing
The system adds this transaction in its payment database.
d) Output
Payment notification – A notification of the payment is shown on screen.
• Registration
a) Introduction
To register a new account, user needs to create an account name and
password. Fingerprint and retina are also provided in this step. After all
a) Introduction
User can add their credit card on their smart phone using NFC technique.
b) Input
Credit card number – To add a new credit card, user should enter the card
number first.
NFC induction – User needs to put the card under their smartphone to ensure
the phone receive NFC induction of the card.
c) Processing
a) Introduction
User can delete registered card which he thinks unnecessary.
b) Input
Selected card – User chooses the card he wants to delete in credit card list.
c) Processing
System receives the command and deletes data of the selected card.
d) Output
Delete notification – A notification of the successful deleted card is shown on
screen.
a) Introduction
Upper limit is a personalization function of Epay. User can set an upper limit
to strengthen the security of his account. If a payment amount exceeds the
limit, additional retina verification is required.
b) Input
Upper limit value – The demarcation between normal pay and upper pay.
c) Processing
System receives the value and saved in account information.
a) Introduction
User can check all payment record on mobile phone.
b) Input
Check command – User press the button to check his payment history.
c) Processing
The system track user’s payment in database and generate a statement.
d) Output
Payment information – including date, shop, pay amount, credit card
• Payment calculation
a) Introduction
This is an extension function of check payment statement. User can enter an
specified data, and Epay can calculate the total amount of payment from that
date.
b) Input
Date – User input the date he wants to calculate.
c) Processing
System carries out the calculation and gets the total amount of payment in a
specified period.
d) Output
Total amount of payment – The total amount of payment is shown on screen.
• Performance
• Reliability
a) Maintenance: The software will not recover the deleted credit card and user
needs to add the card again.
b) Maximum bug rate: There will be a maximum of 1 bug/KLOC.
c) Maximum time to repair: In case of system outage, the cluster will be down
while the operating system boots up. This will take less than 3 minutes.
• Supportability
• Ease of use
a) Training time: A normal smart phone user can know how to use Epay in 10
minutes.
Payment method
Nowadays, building up a convenient and safe method to pay deal will appeal great
demand in the whole world. Most of the payment methods can’t satisfy both
convenient and safe features. Some of payment methods like Octopus or cash or credit
card with no password are easy and fast to pay but easy to loss as well as have little
interest of the fund; while some other payment products like electronic payment or
credit card with password have great security protection but not easy to use, what’s
worse, with more and more complex security verification, customers find it is a great
difficulty to find its back if they lost the cards or password. Thus, how to balance the
convenience and safety of payment method is very interesting theme.
Customers are willing to pay in an easy and safe way. In the market, no payment
method can solve the paradox of convenience and security. What’s worse, two-
dimensional code payment method has been pause by Chinese government. Thus,
available payment methods become less and less.
Epay can appeal to customers’ demand perfectly and completely suit for customers’
spending habits. The process of using Epay to pay is as follows. First, users open
Epay application in the watch. When users use finger to open the application, at the
same time, the watch screen can scan users’ fingerprint to guarantee the security of
payments; second, users select which card to pay the bill; third, after making sure the
card, users only need to use the watch to touch payment machine such as POS. Then,
the process of payment is finished. If customers want to set up some limits to pay,
they can start secondary security guarantee, retina should be scanned by the watch as
a safeguard to avoid some potential risks of payment. What’s more, customers can
apply for value-added service, such as heart rates, to guarantee risk control.
The highlight of Epay is that it enables the feasibility of dealing with different
banking cards through one single facility conveniently and with highly security. Epay
is daily-needed and targets several groups of people with long-term characteristic,
especially the youth (aged 18 to 35) who are highly addicted to smartphones and more
willing and easily to accept new things. That ensures us to get a sustainable income
stream.
Customers who are willing to try new things and enjoy the happiness of fashion;
The trend, “do things using one facility, in one place and at once” is growing,
especially in the IT field. Epay is such a safe product of highly aggregation of
banking-related function; our target customer should be with the following features:
This group of people is of high tech awareness and is the most willing ones to deal all
their daily issues through their smart facilities they have. They hold a view that the
smarter the way you choose, the more fashionable you are. Those people will use the
basic functions and are always open to experiencing IT new things. By using Epay,
once downloaded, they could experience that things become even easier.
Nowadays security problem is the top concern of all the cards owners. Since we
adopted the biological methods (the recognition of fingerprint, retina and even heart
rate), Epay reduces the fears of those problems like “what if someone else know my
password?”, ”what if I let out my password carelessly?”, “what if I lost my phone or
card” and ”what if someone stole my private information when I’m typing my
password”. The reason is simply because the biological information is something that
could hardly be stolen compared with numeric guard.
The third characteristic concerns mainly for busy people who want efficiency without
always being asked to input passwords and verify codes again and again. Instead of
these boring typing steps, Epay just takes a blink of an eye’s time to complete the
inputting steps. It’s obviously easy and quick without any worries of security.
● Download purchase
● Information pushing
This part of revenue mainly focuses on the partnership corporations’ discounting ads.
Epay will push some discounting digital posters of partnership corporations to users,
and we charge them for that kind of posters. As an Epay user, he will receive poster
messages like “up to 30% discount in Maxwell by using Epay”. Normally, the
partnership corporations consist of supermarkets (i.e. Maxwell, Vanguard,
PARKnSHOP etc.) and shopping centers (i.e. Festival Walk, Harbour City, New
Town Plaza etc.).
● Customized services
Another revenue channel is the featured services. We offer several featured services
such as information of daily exchange rate. Customers in need can choose to order
that information with a cost of US$0.1 per information. From security perspective, we
provide super service ----retina verification----to meet the need of considerably highly
security. This super function is charged US$0.2 per download.
As we talk in the revenue model phase, our revenue comes from download fee,
advertisement and value-added service charge. Our financial implications are
19 Epay – Smart Offline Transaction App
dependent on our revenue inflow and cost structure. And initial investment is $250000
U.S. Dollars. We will show details in the following part.
year 1st year 2nd year 3rd year 4th year 5th year
Administration
● Download fee
We decide to open our application free to customers in the first phase (first three years)
so that we can push Epay to the payment market as soon as possible. In the 4th year of
the production, we are preparing for receiving download fee. The price is set at $0.99
per time. The real revenue we get is 40% of the charge, 0.4 dollar per customer.
● Advertisement
● Value-added service
a) If you want insert more than five cards into the application, you should pay $5
dollar for one more cards;
b) If you want have higher security-guarantee for safety issues, you can purchase
heart rate verification, which can identify user’s identity by checking his/her heart
rate. Price: $10 dollar per year.
We estimate that we can earn $1.6 dollar per user in the first year to $5.5 dollar per
user in the 5th year.
year 1st year 2nd year 3rd year 4th year 5th year
0 0 0 60000 100000
Download
revenue
Profit
The largest cash flow gap is -203000 dollars and our initial investment is 250000
dollars that can completely cover the cash flow gap.
In the 5th year, initial investment ROI is as high as 120.90%. And in the starting 4th
year, our ROI will be turned into positive. So, the investment-return is just 3.1 year.
Search throughout the market, there are similar products that have been done. But
almost all of them are online transaction.
Generally the similar applications belong to two categories: mobile apps and websites.
And all of the applications use the typing approach to get verification information.
Rationally the security level of these applications is lower, because it totally depends
on the technical capability of the platforms themselves. As for mobile apps, there’s an
irreparable security problem that if only you lost your mobile phone, which means
you’ve offered an open access to someone else to steal all your information and
money easily.
Mobile Apps
Paypal 4 4 YES NO
Wallet Alibaba
3 3 YES NO Ping An of
1qianbao China
Websites
Epay 5 5 NO YES
Table IV
Comparison
Solutions
Security Convenience
3 average, average
4 high easy
In designing the Epay application and its corresponding business model, our team has
anticipated following major challenges and determined potential solutions for address
these risks.
Our strategy is free to open basic service to customers. Free will attract customers to
have a try about the new payment method. After customers have developed the
payment method into a habit, then we take a further consideration about how to make
money from our customers.
This is quite a tough problem, but we have to face with. This is also the biggest
challenge to us. The reason banks have to cooperate with us is quite obvious, we can
help banks fight against with on-line payment method, such as Paypal and other two-
dimensional code payment methods. In fact, Paypal have serious influenced banks’
traditional business. However, with the help of Epay, UnionPay have the capability to
compete with two-dimensional code payment methods.
Thus, we are confident that banks are willing to cooperate with Epay. With the help of
bank, we believe our product promotion will be successful in the market。
Security 5 2 4 3
Convenience 4 5 2 2
Preservation 5 0 4 1
Flexibility 4 2 4 3
Fashion 5 0 3 2
Track 5 1 4 3
Volume Limit 5 5 2 4
Definition of Terms:
a) Security: Security means that whether the payment method is safe. If thief stole
the method, whether he can use the method to pay.
b) Convenience: Whether the payment method is convenient to customers, how
many steps or how long the process of the payment by this method.
c) Preservation: Whether the payment cash flow can preserve the value of the asset.
d) Flexibility: Whether the payment method can support different kinds of payment,
such as different currencies, different stores.
When evaluating a operating system, a list of acceptance criteria for these two target
system should be considered. Some requirements and their corresponding importance
weight are listed in table 7 in which evaluating metric 5 is the most important and 0 is
the least.
Definition of Terms
a) System Reliability
Reliability indicates how consistently the device runs the application and service. It
concerns with disk written and the integrity of data stored in memory.
b) Standard OS Version
A standard and widely accepted OS could ensure UE and lower the development and
maintenance cost to the uttermost.
d) Development Security
Security indicates the capability of the system to protect itself from attack.
f) UE & Sensitivity
These characteristics describe user’s perceptions and attitudes towards OS.
Marketization & App Distribution
Mature application distribution channels provide decent platform for mobile
applications, which is good for both system designer and customers.
IOS
IOS is the mobile operating system designed and distributed by Apple Inc. It has been
utilized in various Apple portable devices such as iPhone, iPad and iPod. Unlike
Windows Phone and Android, IOS is just available in Apple devices. The software
development kit (SDK) released by Apple allows developers to make applications for
Apple portable devices, and USD 99 is charged for development program per year. Its
development environment, Xcode, is based on Objective-C.
Android
Android is an operating system based on Linux kernel. Its source code is released
under Apache, thus allows free modification and distribution of software and mobile
applications. It is programmed in C (core), C++ and Java.
Android is an open source system. A survey shows that Android is the most used
platform among developers by 2013: it is used by 71% of the mobile developers
population.
System Reliability 5 4 3
Standard OS Version 5 4 3
Main Task Support 4 3 5
Development Security 4 3 2
App Version Control 4 4 3
UE & Sensitivity 3 4 3 Marketization & 3 4 3
App Distribution
From above table, IOS outperforms android by 104 to 89. However, considering huge
market share of android smartphone, it is necessary to take both these two OS into
consideration.
3.3 Hardware
Mobile device platform is the supporter of mobile application and operating system. It
has huge influence on UE and system reliability. A list of requirements is as follows.
Requirements Importance
NFC (Phone only) 5
Feature Extraction 5
Processor 4
Screen Size & Resolution 3
Wireless Network 2
Storage Size 1
Definition of Terms
c) Processor
Processor indicates the standards of CPU of target device. It reflects ability of
device’s to handle the task and process.
e) Wireless Network
Any type of computer network is used to connect network nodes. Implemented and
administered by radio communication, wireless network is developed including cell
phone network, Wi-Fi local network and terrestrial microwave network.
f) Storage Size
Storage size indicates ability to retain digital data. In some devices, like Samsung
Galaxy series, storage size is expandable.
To compare the optimal performance of IOS and android system, we choose the
newest and most outstanding phone, iPhone5S and Samsung Galaxy S5, operating in
these two OS respectively for comparison.
(E.g. fingerprint)
Processor 1.3 GHz dual-core 2.5GHz octa-core
Screen Size & Resolution 4 inches 5.1 inches
640*1136 pixels 1080*1920 pixels
Smartwatch Comparison
To be the same with smartphone comparison, we choose iWatch and Samsung Gear 2
for contrast. Considering iWatch is not available so far, we select some reasonable
guess about its technical parameters for comparison.
By combining two tables above together, we can evaluate IOS and Android roughly.
The below table summarize and score these two OS.
IOS Android
Feature Extraction 5 4 4
(E.g. fingerprint)
Processor 4 3 5
Screen Size & Resolution 3 3 4
Wireless Network 2 3 4
Storage Size (internal) 1 3 3
Table 12 comparison of hardware evaluation for IOS and android
From above table, android outperforms IOS by 88 to 55. However, considering IOS
marketing strategy is the best performance in software rather than hardware, and this
strategy is widely accepted by the users, we couldn’t ignore the development of IOS.
Mobile applications could be recognized as native app, web app or their combination,
hybrid app. All of them could achieve decent performance in a degree. The
characteristics of these three types of applications are analyzed as follows.
Widely accepted applications like Microsoft Office run the local application directly
on the smart phone and the computer. Local applications are specifically developed
some type of operating system (such as IOS, Android, BlackBerry, etc.) and can run
on mobile devices themselves.
Advantages:
● Be able to access all the features of the phone (GPS, camera, etc.)
● Better speed, performance and overall user experience
● Support offline work (because it is running on the device rather than the Web)
● Support rich graphics and animation
● Can be found easily on app store and the home screen application icons
● Need to pay to download an application (App Store retain 20% - 30% of
revenue)
Disadvantages:
Yellow Pages Group is a typical example for native app, which was developed for
local application on different platforms so that we can apply to different local
application store.
Web applications are basically designed for the site, and it also applies to mobile
browsers. Developers are working to develop a common Web programming language
that can run simultaneously in the mobile Web browser.
Advantages:
Disadvantages:
● Poorer and slower performance experience (most of the need to link the
Internet)
● Poor user experience
● Poor graphics and animation support
● No abundant profitable opportunities
● Need to link the Internet
● Restrict user access to functions (such as camera, GPS, etc.)
Besides that, with the popularity of HTML5, functions in Web applications have been
improved very well. However, they still can’t be better than native applications.
Typical examples of Web applications is Financial Times (FT), they want to compare
local applications prefer to develop mobile Web applications. Although users must be
Hybrid application, just as its name, is a mix of local application and web application.
Advantages:
Disadvantages:
3.5.1 XML
b) Web services
Web service initially is used to pass non-HTML messages over HTTP. Now it
becomes the fundamental access to fields via Ajax for the Web site, serving as a
service-oriented architecture (SOA) to add interactivity and a complex message-based
application. XML Web service is an integral part. Web services in all major methods,
such as SOAP, REST or XML-RPC, are based on the XML.
3.5.2 JSON
JSON, which is short for JavaScript Object Notation, is a lightweight data interchange
format that is convenient to read and write, also easy for machines to parse and
Through sending and receiving information, we can choose plain text and XML as the
data format in asynchronous applications. For example, Web information during data
transmission via a GET request is sent using a simple name/value pairs in text format,
and JSON data format is more suitable for use in Ajax web application than plain text
type. Data format is described as follows:
<request>
<firstName>Brett</firstName>
<lastName>McLaughlin</lastName>
<email>brett@newInstance.com</email></request>
When expressing a data structure, a set of data should be stored together as a whole or
for the transmission. Under that circumstance, JSON and XML both could be used.
JSON is a lightweight data interchange format. It is easier to read, parse and generate
in machine. Most importantly, without having to learn a new API, JSON can be
parsed by JavaScript in eval () function, which is obtained through formatted data.
3.6.1 J2EE
J2EE is built with scalability, flexibility and ease of maintenance of the business
system. It offers a good mechanism that is equipped with following features:
b) Efficient development
J2EE allows companies to put some generic and tedious task to an intermediate server
vendor. So developers can focus on how to create business logic, and correspondingly
shorten development time. Services that senior middleware vendors provide are as
follows.
● State Management Service
● Continuous service
It allows developers not to encode the data access. Logic can produce
applications that can generate more compact, and such applications are easier
to develop and maintain.
● Distributed shared data objects CACHE service
It allows developers to develop high-performance systems, greatly improving
the overall deployment flexibility.
d) Scalability
Enterprises must choose a server platform that should be able to provide excellent
scalability to meet a large number of new customers who operate on their business
systems. Based on J2EE platform, applications can be deployed on a variety of
operating systems.
e) Stable availability
A server-side platform must be able to operate around the clock to meet the needs of
our customers and partners. Unplanned downtime could result in disastrous
consequences. J2EE deploys a reliable operating environment, which supports the
RDBMS is short for Relational Database Management System. Relational data models
are used to store data and co-work with other applications. MS SQL Server, MS
Access, Oracle Database, MySQL and IBM DB2 are all typical and widely accepted
RDBMS. Considering the popularity and performance among these RDBMS, SQL
Server, Oracle and MySQL are selected for further analysis. Requirements and
relevant importance and ratings are listed and explained as follows.
Rating
Requirement Importance
SQL Server Oracle MySQL
Price 5 3 2 5
Performance efficiency 4 5 5 4
Platform integration 3 4 5 5
Language support 3 4 4 4
Tools integration 3 5 4 1
High availability 4 2 5 1
Interface operation 4 5 3 3
Security 5 3 4 4
Definition of Terms
a) Price
Oracle has the highest cost. It’s charging based on CPU. For an 8-core CPU, the cost
will be 8 * price. But for SQL Server CPU pricing, if a CPU has 8 cores, it will be 8 *
0.5 * price. And about MySQL, we always thought it was free, but in business
practices, certain amount of fees should be paid. The highest version of [MySQL
Cluster Carrier Grade Edition Subscription (5 + socket server)] will charge USD
20,000. In fact, at the beginning of the goods import, Oracle and SQL Server have
free version, which also can be used commercially. Although there will be some of the
feature limits, future upgrades will be very easy.
b) Performance
Comparing three databases, according to TPC's (Transaction Processing Performance
Council) analysis, in fact, Oracle is the fastest in processing performance. In terms of
trading volume and price, SQL Server is the most effective, and MySQL also has a
good performance.
c) Platform integration
SQL Server can only be used in the Windows platform, and on this platform it is the
best and fastest on the operation, while the other two databases can be used in cross-
platform, and in the Unix and Linux have very high level of stability and performance,
so the choice of platform for subsequent database also has a very large impact on the
association.
e) Tools integration
After installing Microsoft SQL Server actually we have a lot of tools and applications
contained. This is the reason why many people like SQL Server. No matter it’s the
report, or data conversion (ETL), or Business Intelligence (BI), etc., they are free to
use. And the integrity and function of the tools contained are quite similar with many
commercial software. For example, Reporting Service is a major feature. Generally
what we hear very often is the usage of Crystal Reports, but the price of this software
is very expensive. So it often produces software-licensing cost on the project, thereby
affecting the willingness of customers to purchase.
Oracle has TOAD to manage the interface. Of course, the cost is also very high. But
Oracle supports most third-party softwares, so this is one reason why most
manufacturers recommend. The initial tools in MySQL itself should be considered the
least, and also limited by the scale of support for third-party softwares. So it really is a
big test of the ability of the DBA.
f) High availability
In fact, the three databases all completely support for high availability. But Oracle has
architecture supporting RAC at Load Balance ( see below), so it seems to be slightly
better. While the other two in the database load balance part, are all completing
through the mechanism of replication. MySQL architecture is shown below. But
another reminder is that the current MySQL Proxy is still in the testing phase.
g) Interface interoperability
Among the three database softwares, Microsoft SQL Server interface is the easiest to
use and does not require much operation after setup. All SQL design, or management
h) Security
In this part of the comparison, basically all these three are similar, wherever in
account management, data transfer, backup, encryption, etc.. They all have very good
performance. But Microsoft officials for security part has mentioned, their updates are
relatively less compared to other databases. Frankly this may be related to update size,
speed of error correction and other issues.
4.1.1 Phone:
There are 6 major use cases in the phone part: Registration, Add Cards, Delete Cards,
Check Statement, Set Upper Limit and Delete Account.
There are 4 major use cases in the watch part: Bind, Unbind, Normal Pay and Upper
Pay.
4.2.1 Phone:
Registration
Scenario: Registration
Add Cards
Use Case Name: Add Cards
Actor(s): Customer
Scenario: Add Cards
This scenario describes the process on how a customer adds
cards.
Description:
References:
Pre-condition: The customer has
already registered an account.
Actor Action
Step1: The customer enters the
log in ID and password.
System response
Step2: The system checks if
the password is correct. If yes,
Step3: The customer chooses returns a menu.
"Add Cards" and sends a request
to the system.
Delete Cards
Use Case Name: Delete Cards
Actor(s): Customer
Scenario: Delete Cards
This scenario describes the process on how a customer deletes
cards.
Description:
References:
Check Statement
Use Case Name: Check Statement
Actor(s): Customer
Scenario: Check Statement
This scenario describes the process on how a customer checks
the statement.
Description:
References:
Pre-condition: The customer has
already made some transactions.
Actor Action
Step1: The customer enters the
log in ID and password.
System response
Step2: The system checks if
Typical Course the password is correct. If yes,
of Events returns a menu.
Step3: The customer chooses
"Check Statement" and sends a
request to the system.
Actor(s): Customer
References:
Delete Account
Use Case Name: Delete Account
Actor(s): Customer
References:
System response
Step2: The system returns the
deleting window and
requests the password of the
account.
4.2.2 Watch:
Bind
Use Case Name: Bind
Actor(s): Customer
Scenario: Bind
References:
System response
Step2: The system checks if
the account is exist. If yes,
check if the password is
Typical Course correct. If yes, returns a
of Events request for fingerprint.
Step3: The customer set the
fingerprint by putting his/her
finger above the screen.
Unbind
Use Case Name: Unbind
Actor(s): Customer
Scenario: Unbind
References:
System response
Step2: The system checks if
the fingerprint is correct. If
yes, returns a menu.
Normal Pay
Use Case Name: Normal Pay
Actor(s): Customer
References:
Upper Pay
4.3.1 Phone:
4.3.2 Watch:
4.4.1 Phone:
Registration
Add Cards
*requestNFC( ): open the NFC function. When the customer put a card near the
phone, the system can identify the card.
Delete Cards
Check Statement
4.4.2 Watch:
Bind
*deleteSecurity( ): delete the fingerprint and the retina which stored in the Security.
Normal Pay
[1] CNNIC: China's Smartphone Mobile Internet Users Reach 330 Mln CNNIC,
5/22/13;
[2] Bank Marketing Strategy, Jim Marous,
1155040796 WANG,Yuhao