Téllez et al., 2017 - Google Patents
Security in mobile payment systemsTéllez et al., 2017
- Document ID
- 1245010126120861966
- Author
- Téllez J
- Zeadally S
- Publication year
- Publication venue
- Mobile Payment Systems: Secure Network Architectures and Protocols
External Links
Snippet
Without the assurance that the information exchanged during a payment transaction is secure, the entities involved in a mobile payment system will not trust mobile commerce. This chapter presents a brief review of some of the most commonly used cryptography …
- 238000000034 method 0 description 16
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/409—Card specific authentication in transaction processing
- G06Q20/4097—Mutual authentication between card and transaction partners
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices
- G06Q20/36—Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
- G06Q20/367—Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes involving intelligent token, e.g. electronic purse
- G06Q20/3674—Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes involving intelligent token, e.g. electronic purse involving authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3823—Payment protocols; Details thereof insuring higher security of transaction combining multiple encryption tools for a transaction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3821—Electronic credentials
- G06Q20/38215—Use of certificates or encrypted proofs of transaction rights
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108292402B (en) | Determination of a common secret and hierarchical deterministic keys for the secure exchange of information | |
US20240356730A1 (en) | Computer-implemented system and method for highly secure, high speed encryption and transmission of data | |
Mangipudi et al. | A secure identification and key agreement protocol with user anonymity (SIKA) | |
US11528127B2 (en) | Computer-implemented system and method for highly secure, high speed encryption and transmission of data | |
Singh et al. | Blockchain-enabled end-to-end encryption for instant messaging applications | |
Schillinger et al. | End-to-end encryption schemes for online social networks | |
Tsai et al. | An ECC‐based blind signcryption scheme for multiple digital documents | |
Puthiyidam et al. | Enhanced authentication security for IoT client nodes through T-ECDSA integrated into MQTT broker | |
Ashraf et al. | Lightweight and authentic symmetric session key cryptosystem for client–server mobile communication | |
Khatun et al. | Cryptography algorithms to prevent different security attacks | |
Aravind et al. | Combined digital signature with sha hashing technique-based secure system: An application of blockchain using iot | |
Téllez et al. | Security in mobile payment systems | |
Heydari et al. | An Improved Authentication Scheme for Electronic Payment Systems in Global Mobility Networks | |
Hlaing et al. | Secure One Time Password OTP Generation for user Authentication in Cloud Environment | |
Kalbhor et al. | A survey on digital signature | |
Surya et al. | Single sign on mechanism using attribute based encryption in distributed computer networks | |
Prakasha et al. | Enhanced authentication and key agreement mechanism using PKI | |
Malina et al. | Light‐weight group signatures with time‐bound membership | |
Islam et al. | Improved remote login scheme based on ECC | |
Syed et al. | On the pivotal role of digital signatures: A review of conception, mensuration, and applications | |
Benifa et al. | Modified Chebyshev polynomial-based access control mechanism for secured data access in cloud computing environment | |
Jain et al. | Mitigating man-in-the-middle attack in digital signature | |
Attia et al. | E-mail systems in cloud computing environment privacy, trust and security challenges | |
Wu et al. | A Robust Two Factor Authentication Scheme with Fine Grained Biometrics Verification | |
Satya Bhavani et al. | A Proficient Digital Signature Scheme Using Lightweight Cryptography |