SlideShare une entreprise Scribd logo
1  sur  20
A 2D Barcode-Based Mobile Payment System
Presented by
Project scope
 This system uses one standard 2D Barcode (Data Matrix) as
an example to demonstrate how to deal with underlying 2D
barcode-based mobile payment workflow, mobile
transactions and involved security mechanisms.
 Unlike other existing mobile payment systems, the
proposed payment solution provides distinct advantages to
support buy-and-sale products and services based on 2D
Barcodes. This system uses one standard 2D Barcode (Data
Matrix) as an example to demonstrate how to deal with
underlying mobile business workflow, mobile transactions
and security issues. The paper discusses system
architecture, design and implementation of the proposed
mobile payment solution, as well as 2D barcode based
security solutions.
User classes & characteristics
System Infrastructure and Framework Architectures
• Client Layer – This layer includes mobile user interface and online client
interface. The online client interface is designed support end customers
and merchants to perform user account and membership management.
The mobile payment client software supports mobile user interactions for
mobile payment.
The mobile payment client is supported by J2ME (with Netbeans IDE,
CLDC 1.1. MIDP 2.1), Bouncy Castle Light Weight Crypto APIs, JSON
utility, and the 2Dbarcode framework Middle Layer –the components in
the middle layer. They include wireless internet server (Tomcat server) and
other Java related middleware, such as Java 2 (J2SE), Bouncy Castle
Crypto Library, JSON utility, Java DB connectivity and Java Servlet
technology.
• Application Layer – This is the mobile payment server, which supports the
2D barcode-based mobile payment process and related transactions .
• Data Store Layer – This includes a database server, which stores,
maintains, and processes the customer account and membership data,
transaction data, and user digital wallet as well as necessary security data,
such as PIN and session records.
Operating environment
This application is developed in java platform and will be hosted by a
system using Java JDK and tomcat server. The system will
primarily be developed and tested on Windows Operating Systems.
But our goal is to make it a platform independent solution. The target
platforms are:
Linux
Microsoft Windows &
Solaris.
Design and Implementation
Constraints
All designing and coding will be done on Java
Platform. However application can be
implemented in C#.NET.
Assumptions and Dependencies
Since the application is based on Java platform. Hence we assume that user
system must installed JVM to run this application.
SYSTEM FEATURE
Functional requirements
Hard disk 80 GB
RAM 1GB
Processor Intel Pentium IV
Technology Java
Tools Net beans
Operating System Windows
EXTERNAL INTERFACE REQUIREMENTS
User Interfaces: The application is accessible through web browser. It will interact
with its users with web components interface. There are two types of user for this
system retail manager or analyst and customer each can interact with the system with
the following UIs.
Main screen: On this interface there are some options shown as per the user type
For the analysts there are some options related to what type of analysis they want to
do.
Method wise analysis
Decision tree analysis
KNN classifier analysis
For each of the above analysis there is separate new screen showing advanced
options for that analysis that is something like stated below:
There are buttons for ‘In which format output should be displayed Graphical formats
like pie charts , Bar graphs, Tabular format.
Output screen:
On this screen output will be produced in graphical format with proper description
and some options like save result for further use or compare it with old results or
you may discard it if it is of no use.
Software Interfaces
 Name: Java
Version Number: Version 6.0
 Name: Mysql
Version Number: Version 7.0.1
The system must use My SQL server as its database
 Name: NetBeans
Version Number: Version 6 onward
Communications Interfaces
The system will use Apache/tomcat server as the main
communication protocol trough internet/network.
NON-FUNCTIONAL REQUIREMENTS
Performance Requirements
• System can produce results faster on 4GB RAM.
• It may take more time for peak loads at main node
• The system will be available 100% of the time. Once
there is a fatal error, the system will provide
understandable feedback to the user.
Safety and Security Requirements
• All data will be backed-up everyday automatically and also the
system administrator can back- up the data as a function for
him.
• The system is designed in modules where errors can be
detected and fixed easily. This makes it easier to install and
updates new functionality if required.
Software Quality Attributes
 Usability : The application seem to user friendly since the GUI is
interactive.
 Maintainability : This application is maintained for long period of
time since it will be implemented under java platform .
 Reusability : The application can be reusable by expanding it to the
new modules. Performance: The application seems to be
performing faster under 4 GB of RAM. However, the basic
requirement to run the application is 1GB.
 Security: Since the application is developed on JAVA .It is much
more secure than the other environment.
Use case
Data flow diagram
UML Activity diagram
UML State transition diagram
UML Sequence diagram
TECHNICAL SPECIFICATION
ADVANTAGES
 The application is platform independent since it is
developed in JAVA.
 The behavior of the application is user friendly since the
GUI is compatible with all operating environment.
Disadvantage
 Since the application performs several task at same
time, It seems to generate output at long interval of time.
Applications
 Mobile E-commerce
 Mobile banking
 Mobile Transactions
 E-Wallet

Contenu connexe

Tendances

54024405 project-report-banking-management-system
54024405 project-report-banking-management-system54024405 project-report-banking-management-system
54024405 project-report-banking-management-system
nancs
 
Library management system project
Library management system project Library management system project
Library management system project
Jaya Manchanda
 
3 Tier Architecture
3  Tier Architecture3  Tier Architecture
3 Tier Architecture
Webx
 
Client server based computing
Client server based computingClient server based computing
Client server based computing
Mohammad Affan
 
Group Expense Tracker 07
Group Expense Tracker 07Group Expense Tracker 07
Group Expense Tracker 07
Renuka Deshmukh
 
Software Requirements Specification Final
Software Requirements Specification FinalSoftware Requirements Specification Final
Software Requirements Specification Final
jangjong
 
Client Server models in JAVA
Client Server models in JAVAClient Server models in JAVA
Client Server models in JAVA
Tech_MX
 

Tendances (19)

U mobile
U mobileU mobile
U mobile
 
bank transaction system
bank transaction systembank transaction system
bank transaction system
 
54024405 project-report-banking-management-system
54024405 project-report-banking-management-system54024405 project-report-banking-management-system
54024405 project-report-banking-management-system
 
Project copy
Project   copyProject   copy
Project copy
 
Hotel management present
Hotel management presentHotel management present
Hotel management present
 
Library management system project
Library management system project Library management system project
Library management system project
 
online book sale srs Apeksha
online book sale srs Apekshaonline book sale srs Apeksha
online book sale srs Apeksha
 
Online examination system project ppt
Online examination system project pptOnline examination system project ppt
Online examination system project ppt
 
Banking system (final)
Banking system (final)Banking system (final)
Banking system (final)
 
Logistics Managment Automobile VB6
 Logistics Managment Automobile VB6 Logistics Managment Automobile VB6
Logistics Managment Automobile VB6
 
3 Tier Architecture
3  Tier Architecture3  Tier Architecture
3 Tier Architecture
 
Foodies- An e-Food inventory Management Portal
Foodies- An e-Food inventory Management PortalFoodies- An e-Food inventory Management Portal
Foodies- An e-Food inventory Management Portal
 
Project report
Project reportProject report
Project report
 
05_system architecture
05_system architecture05_system architecture
05_system architecture
 
Client server based computing
Client server based computingClient server based computing
Client server based computing
 
Group Expense Tracker 07
Group Expense Tracker 07Group Expense Tracker 07
Group Expense Tracker 07
 
Full accesspolicyconsolidation for event processing systems
Full accesspolicyconsolidation for event processing systemsFull accesspolicyconsolidation for event processing systems
Full accesspolicyconsolidation for event processing systems
 
Software Requirements Specification Final
Software Requirements Specification FinalSoftware Requirements Specification Final
Software Requirements Specification Final
 
Client Server models in JAVA
Client Server models in JAVAClient Server models in JAVA
Client Server models in JAVA
 

Similaire à 2 d barcode based mobile payment system

A two stage feature selection method for text categorization
A two stage feature selection method for text categorizationA two stage feature selection method for text categorization
A two stage feature selection method for text categorization
Parag Tamhane
 
ProjectPDF_pagenumber.docx project documentation
ProjectPDF_pagenumber.docx project documentationProjectPDF_pagenumber.docx project documentation
ProjectPDF_pagenumber.docx project documentation
komkar98230
 
Graphical Password Authenticationimp.docx2
Graphical Password Authenticationimp.docx2Graphical Password Authenticationimp.docx2
Graphical Password Authenticationimp.docx2
Raghu Vamsy Sirasala
 
ProjectPDF_pagenumber.pdf documentation report
ProjectPDF_pagenumber.pdf documentation reportProjectPDF_pagenumber.pdf documentation report
ProjectPDF_pagenumber.pdf documentation report
komkar98230
 
127801976 mobile-shop-management-system-documentation
127801976 mobile-shop-management-system-documentation127801976 mobile-shop-management-system-documentation
127801976 mobile-shop-management-system-documentation
Nitesh Kumar
 
Nx ray etisalatnigeria
Nx ray etisalatnigeriaNx ray etisalatnigeria
Nx ray etisalatnigeria
Owoeye Opeyemi
 
ProjectPDF.pdf project documentation pdf
ProjectPDF.pdf project documentation pdfProjectPDF.pdf project documentation pdf
ProjectPDF.pdf project documentation pdf
komkar98230
 

Similaire à 2 d barcode based mobile payment system (20)

A two stage feature selection method for text categorization
A two stage feature selection method for text categorizationA two stage feature selection method for text categorization
A two stage feature selection method for text categorization
 
Online Examination System in .NET & DB2
Online Examination System in .NET & DB2Online Examination System in .NET & DB2
Online Examination System in .NET & DB2
 
E farming
E farmingE farming
E farming
 
KaranDeepSinghCV
KaranDeepSinghCVKaranDeepSinghCV
KaranDeepSinghCV
 
IRJET- Conversational Commerce (ESTILO)
IRJET- Conversational Commerce (ESTILO)IRJET- Conversational Commerce (ESTILO)
IRJET- Conversational Commerce (ESTILO)
 
IRJET- Design of Closed Loop PI Controller Based Hybrid Z-Source DC-DC Conver...
IRJET- Design of Closed Loop PI Controller Based Hybrid Z-Source DC-DC Conver...IRJET- Design of Closed Loop PI Controller Based Hybrid Z-Source DC-DC Conver...
IRJET- Design of Closed Loop PI Controller Based Hybrid Z-Source DC-DC Conver...
 
ProjectPDF_pagenumber.docx project documentation
ProjectPDF_pagenumber.docx project documentationProjectPDF_pagenumber.docx project documentation
ProjectPDF_pagenumber.docx project documentation
 
Cyber bidding gateway report on ASP .net
Cyber bidding gateway report on ASP .netCyber bidding gateway report on ASP .net
Cyber bidding gateway report on ASP .net
 
Presentaion final
Presentaion finalPresentaion final
Presentaion final
 
DIGITAL TOLL TAX SYSTEM
DIGITAL TOLL TAX SYSTEMDIGITAL TOLL TAX SYSTEM
DIGITAL TOLL TAX SYSTEM
 
Mobile iOS Application Architectures
Mobile iOS Application ArchitecturesMobile iOS Application Architectures
Mobile iOS Application Architectures
 
Graphical Password Authenticationimp.docx2
Graphical Password Authenticationimp.docx2Graphical Password Authenticationimp.docx2
Graphical Password Authenticationimp.docx2
 
J2ME mobile app development
J2ME mobile app developmentJ2ME mobile app development
J2ME mobile app development
 
Synopsis on online shopping by sudeep singh
Synopsis on online shopping by  sudeep singhSynopsis on online shopping by  sudeep singh
Synopsis on online shopping by sudeep singh
 
Railway Reservation System - Software Engineering
Railway Reservation System - Software EngineeringRailway Reservation System - Software Engineering
Railway Reservation System - Software Engineering
 
ProjectPDF_pagenumber.pdf documentation report
ProjectPDF_pagenumber.pdf documentation reportProjectPDF_pagenumber.pdf documentation report
ProjectPDF_pagenumber.pdf documentation report
 
127801976 mobile-shop-management-system-documentation
127801976 mobile-shop-management-system-documentation127801976 mobile-shop-management-system-documentation
127801976 mobile-shop-management-system-documentation
 
Nx ray etisalatnigeria
Nx ray etisalatnigeriaNx ray etisalatnigeria
Nx ray etisalatnigeria
 
java Project report online banking system
java Project report online banking systemjava Project report online banking system
java Project report online banking system
 
ProjectPDF.pdf project documentation pdf
ProjectPDF.pdf project documentation pdfProjectPDF.pdf project documentation pdf
ProjectPDF.pdf project documentation pdf
 

Plus de Parag Tamhane

Outlier detection for high dimensional data
Outlier detection for high dimensional dataOutlier detection for high dimensional data
Outlier detection for high dimensional data
Parag Tamhane
 
Detection and identification of cheaters in (t, n) secret
Detection and identification of cheaters in (t, n) secretDetection and identification of cheaters in (t, n) secret
Detection and identification of cheaters in (t, n) secret
Parag Tamhane
 
3 d antiphishing based cryptography
3 d antiphishing based cryptography3 d antiphishing based cryptography
3 d antiphishing based cryptography
Parag Tamhane
 
Mpeg 7 video signature tools for content recognition
Mpeg 7 video signature tools for content recognitionMpeg 7 video signature tools for content recognition
Mpeg 7 video signature tools for content recognition
Parag Tamhane
 
Integration of sound signature in graphical password
Integration of sound signature in graphical passwordIntegration of sound signature in graphical password
Integration of sound signature in graphical password
Parag Tamhane
 
Multi biometric cryptosystems based on feature-level fusion
Multi biometric cryptosystems based on feature-level fusionMulti biometric cryptosystems based on feature-level fusion
Multi biometric cryptosystems based on feature-level fusion
Parag Tamhane
 

Plus de Parag Tamhane (6)

Outlier detection for high dimensional data
Outlier detection for high dimensional dataOutlier detection for high dimensional data
Outlier detection for high dimensional data
 
Detection and identification of cheaters in (t, n) secret
Detection and identification of cheaters in (t, n) secretDetection and identification of cheaters in (t, n) secret
Detection and identification of cheaters in (t, n) secret
 
3 d antiphishing based cryptography
3 d antiphishing based cryptography3 d antiphishing based cryptography
3 d antiphishing based cryptography
 
Mpeg 7 video signature tools for content recognition
Mpeg 7 video signature tools for content recognitionMpeg 7 video signature tools for content recognition
Mpeg 7 video signature tools for content recognition
 
Integration of sound signature in graphical password
Integration of sound signature in graphical passwordIntegration of sound signature in graphical password
Integration of sound signature in graphical password
 
Multi biometric cryptosystems based on feature-level fusion
Multi biometric cryptosystems based on feature-level fusionMulti biometric cryptosystems based on feature-level fusion
Multi biometric cryptosystems based on feature-level fusion
 

Dernier

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Dernier (20)

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 

2 d barcode based mobile payment system

  • 1. A 2D Barcode-Based Mobile Payment System Presented by
  • 2. Project scope  This system uses one standard 2D Barcode (Data Matrix) as an example to demonstrate how to deal with underlying 2D barcode-based mobile payment workflow, mobile transactions and involved security mechanisms.  Unlike other existing mobile payment systems, the proposed payment solution provides distinct advantages to support buy-and-sale products and services based on 2D Barcodes. This system uses one standard 2D Barcode (Data Matrix) as an example to demonstrate how to deal with underlying mobile business workflow, mobile transactions and security issues. The paper discusses system architecture, design and implementation of the proposed mobile payment solution, as well as 2D barcode based security solutions.
  • 3. User classes & characteristics System Infrastructure and Framework Architectures • Client Layer – This layer includes mobile user interface and online client interface. The online client interface is designed support end customers and merchants to perform user account and membership management. The mobile payment client software supports mobile user interactions for mobile payment. The mobile payment client is supported by J2ME (with Netbeans IDE, CLDC 1.1. MIDP 2.1), Bouncy Castle Light Weight Crypto APIs, JSON utility, and the 2Dbarcode framework Middle Layer –the components in the middle layer. They include wireless internet server (Tomcat server) and other Java related middleware, such as Java 2 (J2SE), Bouncy Castle Crypto Library, JSON utility, Java DB connectivity and Java Servlet technology. • Application Layer – This is the mobile payment server, which supports the 2D barcode-based mobile payment process and related transactions . • Data Store Layer – This includes a database server, which stores, maintains, and processes the customer account and membership data, transaction data, and user digital wallet as well as necessary security data, such as PIN and session records.
  • 4. Operating environment This application is developed in java platform and will be hosted by a system using Java JDK and tomcat server. The system will primarily be developed and tested on Windows Operating Systems. But our goal is to make it a platform independent solution. The target platforms are: Linux Microsoft Windows & Solaris.
  • 5. Design and Implementation Constraints All designing and coding will be done on Java Platform. However application can be implemented in C#.NET.
  • 6. Assumptions and Dependencies Since the application is based on Java platform. Hence we assume that user system must installed JVM to run this application.
  • 7. SYSTEM FEATURE Functional requirements Hard disk 80 GB RAM 1GB Processor Intel Pentium IV Technology Java Tools Net beans Operating System Windows
  • 8. EXTERNAL INTERFACE REQUIREMENTS User Interfaces: The application is accessible through web browser. It will interact with its users with web components interface. There are two types of user for this system retail manager or analyst and customer each can interact with the system with the following UIs. Main screen: On this interface there are some options shown as per the user type For the analysts there are some options related to what type of analysis they want to do. Method wise analysis Decision tree analysis KNN classifier analysis For each of the above analysis there is separate new screen showing advanced options for that analysis that is something like stated below: There are buttons for ‘In which format output should be displayed Graphical formats like pie charts , Bar graphs, Tabular format. Output screen: On this screen output will be produced in graphical format with proper description and some options like save result for further use or compare it with old results or you may discard it if it is of no use.
  • 9. Software Interfaces  Name: Java Version Number: Version 6.0  Name: Mysql Version Number: Version 7.0.1 The system must use My SQL server as its database  Name: NetBeans Version Number: Version 6 onward
  • 10. Communications Interfaces The system will use Apache/tomcat server as the main communication protocol trough internet/network.
  • 11. NON-FUNCTIONAL REQUIREMENTS Performance Requirements • System can produce results faster on 4GB RAM. • It may take more time for peak loads at main node • The system will be available 100% of the time. Once there is a fatal error, the system will provide understandable feedback to the user.
  • 12. Safety and Security Requirements • All data will be backed-up everyday automatically and also the system administrator can back- up the data as a function for him. • The system is designed in modules where errors can be detected and fixed easily. This makes it easier to install and updates new functionality if required.
  • 13. Software Quality Attributes  Usability : The application seem to user friendly since the GUI is interactive.  Maintainability : This application is maintained for long period of time since it will be implemented under java platform .  Reusability : The application can be reusable by expanding it to the new modules. Performance: The application seems to be performing faster under 4 GB of RAM. However, the basic requirement to run the application is 1GB.  Security: Since the application is developed on JAVA .It is much more secure than the other environment.
  • 19. TECHNICAL SPECIFICATION ADVANTAGES  The application is platform independent since it is developed in JAVA.  The behavior of the application is user friendly since the GUI is compatible with all operating environment. Disadvantage  Since the application performs several task at same time, It seems to generate output at long interval of time.
  • 20. Applications  Mobile E-commerce  Mobile banking  Mobile Transactions  E-Wallet