[go: up one dir, main page]

Hassan et al., 2021 - Google Patents

A secure multi factor user authentication framework for electronic payment system

Hassan et al., 2021

View PDF
Document ID
8412177643966462666
Author
Hassan M
Shukur Z
Publication year
Publication venue
2021 3rd International Cyber Resilience Conference (CRC)

External Links

Snippet

In the growth of financial industries, the electronic payments system is a newest topic, which is to be replaced in the near future by electronic or online transaction. With the advancement of the technology, there is a strong need to build and enforce safe authentication schemes to …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3821Electronic credentials
    • G06Q20/38215Use of certificates or encrypted proofs of transaction rights
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/409Card specific authentication in transaction processing

Similar Documents

Publication Publication Date Title
Hassan et al. A secure multi factor user authentication framework for electronic payment system
CN106575401B (en) System and method for performing validation using data analysis
US9577999B1 (en) Enhanced security for registration of authentication devices
Grosse et al. Authentication at scale
EP2652688B1 (en) Authenticating transactions using a mobile device identifier
CN106575416B (en) System and method for authenticating a client to a device
US9800574B2 (en) Method and apparatus for providing client-side score-based authentication
CN106575281B (en) System and method for implementing hosted authentication services
US12184798B2 (en) Dynamic value appended to cookie data for fraud detection and step-up authentication
WO2016044373A1 (en) System and method for integrating an authentication service within a network architecture
Hassan et al. An improved time-based one time password authentication framework for electronic payments
Manurung Designing of user authentication based on multi-factor authentication on wireless networks
Almadani et al. Implementing a secure blockchain-based wallet system with multi-factor authentication
Moepi et al. Multi-factor authentication method for online banking services in South Africa
Pampori et al. Securely eradicating cellular dependency for e-banking applications
Sarower et al. SMFA: Strengthening Multi-Factor Authentication With Steganography for Enhanced Security
Albahbooh et al. A mobile phone device as a biometrics authentication method for an ATM terminal
Abraham et al. SPAQ: Secure PIN authentication using QR code
Pavlovski et al. Unified framework for multifactor authentication
Szczygieł et al. Two-factor authentication (2FA) comparison of methods and applications
Hakami et al. Secure Transaction Framework based on Encrypted One-time Password and Multi-factor
Bhardwaj et al. Wearable Security-Authentication using Smartwatches
Sumanth Securing atm transactions using qr code based secure pin authentication
Kreshan THREE-FACTOR AUTHENTICATION USING SMART PHONE
Hammoudeh et al. Enhancing Security Using E-Authentication