scholarly journals Identity Authentication Security Management in Mobile Payment Systems

2020 ◽  
Vol 28 (1) ◽  
pp. 189-203
Author(s):  
Feng Wang ◽  
Ge Bao Shan ◽  
Yong Chen ◽  
Xianrong Zheng ◽  
Hong Wang ◽  
...  

Mobile payment is a new payment method offering users mobility, reachability, compatibility, and convenience. But mobile payment involves great uncertainty and risk given its electronic and wireless nature. Therefore, biometric authentication has been adopted widely in mobile payment in recent years. However, although technology requirements for secure mobile payment have been met, standards and consistent requirements of user authentication in mobile payment are not available. The flow management of user authentication in mobile payment is still at its early stage. Accordingly, this paper proposes an anonymous authentication and management flow for mobile payment to support secure transaction to prevent the disclosure of users' information and to reduce identity theft. The proposed management flow integrates transaction key generation, encryption and decryption, and matching to process users' personal information and biometric characteristics based on mobile equipment authentication carrier.

Author(s):  
Feng Wang ◽  
Ge Bao Shan ◽  
Yong Chen ◽  
Xianrong Zheng ◽  
Hong Wang ◽  
...  

Mobile payment is a new payment method offering users mobility, reachability, compatibility, and convenience. But mobile payment involves great uncertainty and risk given its electronic and wireless nature. Therefore, biometric authentication has been adopted widely in mobile payment in recent years. However, although technology requirements for secure mobile payment have been met, standards and consistent requirements of user authentication in mobile payment are not available. The flow management of user authentication in mobile payment is still at its early stage. Accordingly, this paper proposes an anonymous authentication and management flow for mobile payment to support secure transaction to prevent the disclosure of users' information and to reduce identity theft. The proposed management flow integrates transaction key generation, encryption and decryption, and matching to process users' personal information and biometric characteristics based on mobile equipment authentication carrier.


2018 ◽  
Vol 44 (2) ◽  
pp. 35-40
Author(s):  
Tanya jabor ◽  
Hiba Taresh ◽  
Alaa Raheema

All the important information is exchanged between facilities using the internet and networks, all these data should besecret and secured probably, the personal information of person in each of these institutions day by day need to organized secretlyand the need of the cryptography systems is raised which can easily encrypt the personal and critical data and it can be shared withother centers via internet without and concerns about privacy. Chaotic performance is added to different phases of AES but very few apply it on key generation and choosing ChebyshevPolynomial will provide a chaotic map which will led to random strong key. our system based on modified advanced encryptionstandard (AES) , with encryption and decryption in real time taking to consideration the criticality of data images that beenencrypted the main encryption algorithm is the same the modification is done by replacing the key generation algorithm byChebyshev Polynomial to generate key with the required key size.


Aadhaar database is the world's largest biometric database system. The security of Aadhaar database plays a major role. In order to secure such huge database, an encryption and decryption algorithm has been proposed in this paper. Elliptic Curve Cryptography (ECC) is a public key cryptography which is used to provide high security to those databases. The Aadhaar database contains individual personal information as well as their biometric identities. ECC is widely used for providing security to all kinds of data. ECC has smaller key size, fast computation, high throughput compared to other cryptographic algorithms. The data’s present in database are converted into their corresponding Pixel or ASCII values. After that the encryption process is done with the help of public key, private key, generation points and plain text. After the encryption process, the encrypted coordinates can be mapped with the generated points and from that corresponding ASCII value for text, pixel value for image can be retrieved. Then, the alphabet which is corresponding to ASCII will be displayed so that the cipher text can be viewed. This encrypted data is stored in the database. In order to retrieve the original data decryption process using ECC is carried out. In decryption process, receiver’s private key and cipher coordinates which is retrieved from encryption process are used. Therefore, the personal details of an individual can be retrieved with the presence of that particular person who only knows that private key. So, the hackers will not be able to retrieve the database of any individual just by knowing their Aadhaar ID. The proposed work is implemented in the MATLAB software. The Performance metrics like PSNR, Similarity, Correlation Coefficient, NPCR and UACI has been done for analysis.


2022 ◽  
Vol 2022 ◽  
pp. 1-10
Author(s):  
Hyun Park ◽  
TaeGuen Kim

As the Internet has been developed, various online services such as social media services are introduced and widely used by many people. Traditionally, many online services utilize self-certification methods that are made using public certificates or resident registration numbers, but it is found that the existing methods pose the risk of recent personal information leakage accidents. The most popular authentication method to compensate for these problems is biometric authentication technology. The biometric authentication techniques are considered relatively safe from risks like personal information theft, forgery, etc. Among many biometric-based methods, we studied the speaker recognition method, which is considered suitable to be used as a user authentication method of the social media service usually accessed in the smartphone environment. In this paper, we first propose a speaker recognition-based authentication method that identifies and authenticates individual voice patterns, and we also present a synthesis speech detection method that is used to prevent a masquerading attack using synthetic voices.


2016 ◽  
Author(s):  
Jennifer Urban

*Abstract: *Payment systems that allow people to pay using their mobile phones are promised to reduce transaction fees, increase convenience, and enhance payment security. New mobile payment systems also are likely to make it easier for businesses to identify consumers, to collect more information about consumers, and to share more information about consumers’ purchases among more businesses. While many studies have reported security concerns as a barrier to adoption of mobile payment technologies, the privacy implications of these technologies have been under examined. To better understand Americans’ attitudes towards privacy in new transaction systems, we commissioned a nationwide, telephonic (wireline and wireless) survey of 1,200 households, focusing upon the ways that mobile payment systems are likely to share information about consumers’ purchases.We found that Americans overwhelmingly oppose the revelation of contact information (phone number, email address, and home address) to merchants when making purchases with mobile payment systems. Furthermore, an even higher level of opposition exists to systems that track consumers’ movements through their mobile phones.We explain some advantages of mobile payment systems, some challenges to their adoption in the United States, and then turn to our main finding: Americans overwhelming reject mobile payment systems that track their movements or share identification information with retailers. We then suggest a possible remedy for such information sharing: adapting provisions of California’s Song-Beverly Credit Card Act, which prohibits merchants from requesting personal information at the register when a consumer pays with a credit card, to mobile payments systems. Our survey results suggest that consumers would support limitations on information collection and transfer. Song-Beverly could be adopted to accommodate those who wish to share their transaction data.Available at SSRN: http://ssrn.com/abstract=2045580


2020 ◽  
Vol 3 (2) ◽  
pp. 45-50
Author(s):  
Artur Borcuch

Payments are an inherent element of economic activity (León and Ortega 2018). However, the evolution of payment instruments and the way individuals and businesses make daily payments has undergone enormous change in human history, particularly due to main innovations in payment systems in last decades (Gandhi 2016). The last innovation in payment system concerns mobile payment. The development of mobile payments market can have a positive impact on economic growth (Leon and Rodriguez 2012). Although the Polish market of mobile payments is in the initial phase of development, it is one of the pioneering and leading in Europe and globally. The main purpose of this article is to analyze, which feature (convenience, speed, availability, ease of use, safety) of mobile payments could be the most important for users from Poland.


2021 ◽  
Author(s):  
Yen-Chang Chen ◽  
Yen-Yuan Chen

UNSTRUCTURED While health care and public health workers are working on measures to mitigate the COVID-19 pandemic, there is an unprecedentedly large number of people spending much more time indoors, and relying heavily on the Internet as their lifeline. What has been overlooked is the influence of the increasing online activities on public health issues. In this article, we pointed out how a large-scale online activity called cyber manhunt may threaten to offset the efficacy of contact tracing investigation, a public health intervention considered highly effective in limiting further transmission in the early stage of a highly contagious disease outbreak such as the COVID-19 pandemic. In the first section, we presented a case to show how personal information obtained from contact investigation and disclosed in part on the media provoked a vehement cyber manhunt. We then discussed the possible reasons why netizens collaborate to reveal anonymized personal information about contact investigation, and specify, from the perspective of public health and public health ethics, four problems of cyber manhunt, including the lack of legitimate public health goals, the concerns about privacy breach, the impact of misinformation, and social inequality. Based on our analysis, we concluded that more moral weight may be given to protecting one's confidentiality, especially in an era with the rapid advance of digital and information technologies.


2019 ◽  
Vol 146 ◽  
pp. 931-944 ◽  
Author(s):  
Iviane Ramos de Luna ◽  
Francisco Liébana-Cabanillas ◽  
Juan Sánchez-Fernández ◽  
Francisco Muñoz-Leiva

Sign in / Sign up

Export Citation Format

Share Document