Hassan et al., 2021 - Google Patents
A secure multi factor user authentication framework for electronic payment systemHassan et al., 2021
View PDF- Document ID
- 8412177643966462666
- Author
- Hassan M
- Shukur Z
- Publication year
- Publication venue
- 2021 3rd International Cyber Resilience Conference (CRC)
External Links
Snippet
In the growth of financial industries, the electronic payments system is a newest topic, which is to be replaced in the near future by electronic or online transaction. With the advancement of the technology, there is a strong need to build and enforce safe authentication schemes to …
- 238000000034 method 0 abstract description 22
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4016—Transaction verification involving fraud or risk level assessment in transaction processing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3821—Electronic credentials
- G06Q20/38215—Use of certificates or encrypted proofs of transaction rights
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/409—Card specific authentication in transaction processing
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Hassan et al. | A secure multi factor user authentication framework for electronic payment system | |
| CN106575401B (en) | System and method for performing validation using data analysis | |
| US9577999B1 (en) | Enhanced security for registration of authentication devices | |
| Grosse et al. | Authentication at scale | |
| EP2652688B1 (en) | Authenticating transactions using a mobile device identifier | |
| CN106575416B (en) | System and method for authenticating a client to a device | |
| US9800574B2 (en) | Method and apparatus for providing client-side score-based authentication | |
| CN106575281B (en) | System and method for implementing hosted authentication services | |
| US12184798B2 (en) | Dynamic value appended to cookie data for fraud detection and step-up authentication | |
| WO2016044373A1 (en) | System and method for integrating an authentication service within a network architecture | |
| Hassan et al. | An improved time-based one time password authentication framework for electronic payments | |
| Manurung | Designing of user authentication based on multi-factor authentication on wireless networks | |
| Almadani et al. | Implementing a secure blockchain-based wallet system with multi-factor authentication | |
| Moepi et al. | Multi-factor authentication method for online banking services in South Africa | |
| Pampori et al. | Securely eradicating cellular dependency for e-banking applications | |
| Sarower et al. | SMFA: Strengthening Multi-Factor Authentication With Steganography for Enhanced Security | |
| Albahbooh et al. | A mobile phone device as a biometrics authentication method for an ATM terminal | |
| Abraham et al. | SPAQ: Secure PIN authentication using QR code | |
| Pavlovski et al. | Unified framework for multifactor authentication | |
| Szczygieł et al. | Two-factor authentication (2FA) comparison of methods and applications | |
| Hakami et al. | Secure Transaction Framework based on Encrypted One-time Password and Multi-factor | |
| Bhardwaj et al. | Wearable Security-Authentication using Smartwatches | |
| Sumanth | Securing atm transactions using qr code based secure pin authentication | |
| Kreshan | THREE-FACTOR AUTHENTICATION USING SMART PHONE | |
| Hammoudeh et al. | Enhancing Security Using E-Authentication |