Assora et al., 2007 - Google Patents
A web transaction security scheme based on disposable credit card numbersAssora et al., 2007
- Document ID
- 7645084318046943717
- Author
- Assora M
- Kadirire J
- Shirvani A
- Publication year
- Publication venue
- International Journal of Electronic Security and Digital Forensics
External Links
Snippet
Today, an e-commerce transaction is performed by sending the client's credit card details over a SSL/TLS connection. This form of transaction raises many security threats. The most important one is the client authentication. Because the client normally does not have a …
- 238000000034 method 0 abstract description 13
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/409—Card specific authentication in transaction processing
- G06Q20/4097—Mutual authentication between card and transaction partners
- G06Q20/40975—Use of encryption for mutual authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4018—Transaction verification using the card verification value [CVV] associated with the card
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3821—Electronic credentials
- G06Q20/38215—Use of certificates or encrypted proofs of transaction rights
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3823—Payment protocols; Details thereof insuring higher security of transaction combining multiple encryption tools for a transaction
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP4603252B2 (en) | Security framework and protocol for universal general transactions | |
US7039809B1 (en) | Asymmetric encrypted pin | |
AU723946B2 (en) | Key replacement in a public key cryptosystem | |
US20010056409A1 (en) | Offline one time credit card numbers for secure e-commerce | |
US20100153273A1 (en) | Systems for performing transactions at a point-of-sale terminal using mutating identifiers | |
US10089627B2 (en) | Cryptographic authentication and identification method using real-time encryption | |
Gupta et al. | Role of multiple encryption in secure electronic transaction | |
WO2015195978A1 (en) | Efficient methods for authenticated communication | |
GB2434724A (en) | Secure transactions using authentication tokens based on a device "fingerprint" derived from its physical parameters | |
Kungpisdan et al. | A limited-used key generation scheme for internet transactions | |
Dandash et al. | Fraudulent Internet Banking Payments Prevention using Dynamic Key. | |
Sun et al. | The mobile payment based on public-key security technology | |
Nashwan et al. | Mutual chain authentication protocol for SPAN transactions in Saudi Arabian banking | |
Assora et al. | A web transaction security scheme based on disposable credit card numbers | |
Milburn et al. | FassKey: A secure and convenient authentication system | |
Khu-Smith et al. | Using GSM to enhance e-commerce security | |
Sekhar et al. | A complete secure customer centric anonymous payment in a digital ecosystem | |
Tayan et al. | E-Payment system to reduce use of paper money for daily transactions | |
Dalai | Cryptography & Network Security | |
KR100638265B1 (en) | Security Methods for Electronic Document Exchange on the Internet | |
Chahal et al. | Security for Digital Payments: An Update | |
KR20010096036A (en) | Method for constructing domain-verifiable signcryption | |
Rad et al. | A simple and highly secure protocol for POS terminal | |
Nanang et al. | How Important is Security Authentication in the Mobile Payment System | |
Amarasiri et al. | Techniques for Secure Electronic Transactions |