[go: up one dir, main page]

Assora et al., 2007 - Google Patents

A web transaction security scheme based on disposable credit card numbers

Assora et al., 2007

Document ID
7645084318046943717
Author
Assora M
Kadirire J
Shirvani A
Publication year
Publication venue
International Journal of Electronic Security and Digital Forensics

External Links

Snippet

Today, an e-commerce transaction is performed by sending the client's credit card details over a SSL/TLS connection. This form of transaction raises many security threats. The most important one is the client authentication. Because the client normally does not have a …
Continue reading at www.inderscienceonline.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/409Card specific authentication in transaction processing
    • G06Q20/4097Mutual authentication between card and transaction partners
    • G06Q20/40975Use of encryption for mutual authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4018Transaction verification using the card verification value [CVV] associated with the card
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3821Electronic credentials
    • G06Q20/38215Use of certificates or encrypted proofs of transaction rights
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3823Payment protocols; Details thereof insuring higher security of transaction combining multiple encryption tools for a transaction

Similar Documents

Publication Publication Date Title
JP4603252B2 (en) Security framework and protocol for universal general transactions
US7039809B1 (en) Asymmetric encrypted pin
AU723946B2 (en) Key replacement in a public key cryptosystem
US20010056409A1 (en) Offline one time credit card numbers for secure e-commerce
US20100153273A1 (en) Systems for performing transactions at a point-of-sale terminal using mutating identifiers
US10089627B2 (en) Cryptographic authentication and identification method using real-time encryption
Gupta et al. Role of multiple encryption in secure electronic transaction
WO2015195978A1 (en) Efficient methods for authenticated communication
GB2434724A (en) Secure transactions using authentication tokens based on a device "fingerprint" derived from its physical parameters
Kungpisdan et al. A limited-used key generation scheme for internet transactions
Dandash et al. Fraudulent Internet Banking Payments Prevention using Dynamic Key.
Sun et al. The mobile payment based on public-key security technology
Nashwan et al. Mutual chain authentication protocol for SPAN transactions in Saudi Arabian banking
Assora et al. A web transaction security scheme based on disposable credit card numbers
Milburn et al. FassKey: A secure and convenient authentication system
Khu-Smith et al. Using GSM to enhance e-commerce security
Sekhar et al. A complete secure customer centric anonymous payment in a digital ecosystem
Tayan et al. E-Payment system to reduce use of paper money for daily transactions
Dalai Cryptography & Network Security
KR100638265B1 (en) Security Methods for Electronic Document Exchange on the Internet
Chahal et al. Security for Digital Payments: An Update
KR20010096036A (en) Method for constructing domain-verifiable signcryption
Rad et al. A simple and highly secure protocol for POS terminal
Nanang et al. How Important is Security Authentication in the Mobile Payment System
Amarasiri et al. Techniques for Secure Electronic Transactions