Monday, October 31, 2011

Week 8- Summary


Final Summary IST 195 review :


In these last eight weeks I have learned a lot from social networking to databases and hardware. This project has really come full circle for me and I am now able to see how it could really play out as a mix of Google wallet and of the Starbucks scan and go card. I really believe that with a little bit more time and concentration that the ‘electronic credit card’ and Google could mix together and become one massive security system for credit card holders everywhere.
This summery is not going to break down each and every week and each and every step taken to come to this final conclusion but it is going to be an analysis of how I came to my discoveries and the challenges I foresee. Every good project or idea has to have some faults, mine are as follows:

1. Networking:
I foresee the network connections becoming a problem for users who like to do online banking solely on their phone instead of through an app or gadget.  When too many outlets are used for one product or system that tends to cause mix up’s ad data to be hacked easily. Mind you the entire goal of this project was to create a safer and more reliable way of banking, and making purchases while out and about.

2. Organization:

Initially I talked about organizing user’s information through Excel and have codes for each person so that no two codes would ever mix up or match. However, now that I have learned more about this project and that I see that there are easier ways to store the date, I feel as though it will be completely necessary to have a solid database to transfer data files, systems, and private information from bank to bank.

3. Hardware:

I am still not completely sure what kind of hardware other than what I mentioned before which was lots of memory, serves, RFID chips, and minor other things you would need for such a large scale, I did not find any reviews on other material or hardware that will make the building project any easier. The best bet is to go with nanotechnology and have scientists build the most powerful nano- chip out there.

In conclusion,
I have learned that as technology constantly changes, I am not the only one who is thinking of things. You just have to find the right people who will help your ideas come true. This project was very helpful, I learned a lot about time management and organization and how every good idea is a process, it requires lots of research and analyzing before you can just write down anything.

Thank you to everyone who read this blog and was interested in how I figured it out….

The Answer:

After completely my professional blog review, I became really interested in have a personal lock or password entry spot on one credit card that links multiple cards, accounts, and deposits together to allow for people to have the physical form of a credit card. This would also take away from RFID problems or scanners picking up false items and charging the wrong people. The only new thing I would add to the credit card would be a time out lock like many cell phones have now, if someone is trying to hack the card, there should be a time out password that the user sets up when they get the card, this would help to ensure the protection of the user  and the cards, if the users loses theirs.

 Below this are my three comments I have made on my peers blogs.

Thank you once again,

Rachel 

 Comment 1:

Comment 2:

Comment 3:


Week 7- Databases

Databases are probably the most important aspect to this project because with multiple persons linked to multiple accounts and multiple places it is only necessary to have multiple "levels" or organization in order to maintain the proper systems and coding for everything.
I have noticed that many banks have extensive amounts of organization just within a branch. I am sure that the cel phone companies and internet providers have something similar in their databases.
When creating a database I will need to make sure that I do not overlap or rename things too many times because then the database will run into a system error when searching for something or trying to file something away.
This will cause the system to stop completely and then interrupt business.
In order to avoid problems and such, one will need to really create a database schema that will list and categorize each bank a person has, each account a person has in that bank, and whether it's a checking or savings account, then which card is used in what places.
This can be done by first creating a well organized schema, because my idea is very similar to google waller, I would bet that using their schema as an initial base would really be beneficial, then we can create a database with such tables as mentioned above that would then be categorized into attributes which will then be broken down to primary keys and then for foreign keys which will not only protect the users but keep everything organized as well.

Week 6 - Networking

Networking is a large part of communicating with people. This week in lab we talked about how people connect networks and how networks are responsible for transferring information from one person or system to another.
This will be very useful in my project because the phone company network will need to communicate with each different bank and maintain a stable network system. Cell Phones already have built in antennas that allow for signals to be received and sent out to towers/ receivers that then transfer the information to the appropriate receivers so that the correct person or place will have the message.
Networking between the immediate user and the bank will need to be maintained constantly so that banks security system's can monitor activity from each transaction and immediately notify the owner or activity that may or may not be fraudulent.
This will be incorporated to my project by using SSL or FTP. SSL stands for Secure Sockets Layer, which will insure that files that are encrypted are secure and transferred in a timely manner. In other words, when someone transfers large amounts of money, or makes a large transaction the details of that will be protected. An FTP stands for File transfer Protocol, which basically ensures that before any file is transferred if must match all requirements and follow a procedure to make sure it is secure.

Week 5- Professional Review

The review I decided to do was of a short video blog called 'HowStuffWorks.' This blog website allows for inventors to post 'how to' videos and demo clips. I viewed
Invention Of the NEW Credit Card

This short video really allowed me to see how I can improve my 'electronic card.' I am now thinking that having a physical card over attaching the card to someones phone might be safer, however for the intentions of this project I will continue with the same idea that a cell phone is safe.
This video showed me that I am on the right path with having multiple passwords to entire and use any one account, this can prove to be very secure as long as the right coding system is used to monitor the codes of the accounts. What I mean is that each cell phone company will need to link into one coding system so that each account is interchangeable and managed on a more convent level.

Week 4- Hardware + Privacy

In weeks lecture I learned that the motherboard is what holds all of the major important parts to a computer or output device. For the intentions of this project the motherboard is going to be useful in Cell Phones.
The Cell phone companies will need to incorporate a larger memory space so that each account from a person can be stored physically on the phone; much like a person can "backup" their phone numbers to a secure database, they will be able to backup any new information a person enters into their cell phone, like tracking new purchases, payments, or deposits. 
Again that idea of a password comes into mind, this password/ "security code" will consist of a secure link password that only the user knows. This will only allow access into files and memory data by the user to ensure that if the phone is stolen from the user and is able to unlock the initial password that they will not be able to unlock the account to steal money. 
I will do this by incorporating an ALU processor which with compare the password characters to the correct one and either open the account or hide the accounts into a secure file in the phone and notify the bank of potential harm.