[go: up one dir, main page]

Téllez et al., 2017 - Google Patents

Security in mobile payment systems

Téllez et al., 2017

Document ID
1245010126120861966
Author
Téllez J
Zeadally S
Publication year
Publication venue
Mobile Payment Systems: Secure Network Architectures and Protocols

External Links

Snippet

Without the assurance that the information exchanged during a payment transaction is secure, the entities involved in a mobile payment system will not trust mobile commerce. This chapter presents a brief review of some of the most commonly used cryptography …
Continue reading at link.springer.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/409Card specific authentication in transaction processing
    • G06Q20/4097Mutual authentication between card and transaction partners
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices
    • G06Q20/36Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
    • G06Q20/367Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes involving intelligent token, e.g. electronic purse
    • G06Q20/3674Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes involving intelligent token, e.g. electronic purse involving authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3823Payment protocols; Details thereof insuring higher security of transaction combining multiple encryption tools for a transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3821Electronic credentials
    • G06Q20/38215Use of certificates or encrypted proofs of transaction rights

Similar Documents

Publication Publication Date Title
CN108292402B (en) Determination of a common secret and hierarchical deterministic keys for the secure exchange of information
US20240356730A1 (en) Computer-implemented system and method for highly secure, high speed encryption and transmission of data
Mangipudi et al. A secure identification and key agreement protocol with user anonymity (SIKA)
US11528127B2 (en) Computer-implemented system and method for highly secure, high speed encryption and transmission of data
Singh et al. Blockchain-enabled end-to-end encryption for instant messaging applications
Schillinger et al. End-to-end encryption schemes for online social networks
Tsai et al. An ECC‐based blind signcryption scheme for multiple digital documents
Puthiyidam et al. Enhanced authentication security for IoT client nodes through T-ECDSA integrated into MQTT broker
Ashraf et al. Lightweight and authentic symmetric session key cryptosystem for client–server mobile communication
Khatun et al. Cryptography algorithms to prevent different security attacks
Aravind et al. Combined digital signature with sha hashing technique-based secure system: An application of blockchain using iot
Téllez et al. Security in mobile payment systems
Heydari et al. An Improved Authentication Scheme for Electronic Payment Systems in Global Mobility Networks
Hlaing et al. Secure One Time Password OTP Generation for user Authentication in Cloud Environment
Kalbhor et al. A survey on digital signature
Surya et al. Single sign on mechanism using attribute based encryption in distributed computer networks
Prakasha et al. Enhanced authentication and key agreement mechanism using PKI
Malina et al. Light‐weight group signatures with time‐bound membership
Islam et al. Improved remote login scheme based on ECC
Syed et al. On the pivotal role of digital signatures: A review of conception, mensuration, and applications
Benifa et al. Modified Chebyshev polynomial-based access control mechanism for secured data access in cloud computing environment
Jain et al. Mitigating man-in-the-middle attack in digital signature
Attia et al. E-mail systems in cloud computing environment privacy, trust and security challenges
Wu et al. A Robust Two Factor Authentication Scheme with Fine Grained Biometrics Verification
Satya Bhavani et al. A Proficient Digital Signature Scheme Using Lightweight Cryptography