• Title/Summary/Keyword: Credit-Based Payment Scheme

Search Result 7, Processing Time 0.022 seconds

A Secure Credit Card Transaction Method Based on Kerberos

  • Kim, Jung-Eun;Kim, Yoo-Hwan
    • Journal of Computing Science and Engineering
    • /
    • v.5 no.1
    • /
    • pp.51-70
    • /
    • 2011
  • This paper introduces a new credit card payment scheme called No Number Credit Card that can significantly reduce the possibility of credit card fraud. The proposed payment system is loosely based on Kerberos, a cryptographic framework that has stood the test of time. In No Number Credit Card, instead of card numbers, only payment tokens are exchanged between the customers and merchants. The tokens are generated based on the payment amount, payment type, client information, and merchant information. However, it does not contain the credit card number, so the merchant or a database hacker cannot acquire and illegally use any credit card numbers. The No Number Credit Card system is ideal for online e-commerce transactions and can be used with any credit card that users possess. It can be used with minor modifications to the current card payment system. We provide the principles of its operation through scenario analysis, a sample implementation, and a security analysis

Public Key based Virtual Credit Card Number Payment System for Efficient Authentication in Card Present Transaction (대면거래환경에서 효율적인 인증을 위한 공개키 기반의 가상카드번호 결제 기법)

  • Park, Chan-ho;Park, Chang-seop
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.5
    • /
    • pp.1175-1186
    • /
    • 2015
  • Financial fraud has been increasing along with credit card usage. Magnetic stripe cards have vulnerabilities in that credit card information is exposed in plaintext and cardholder verification is untrustworthy. So they have been replaced by a smart card scheme to provide enhanced security. Furthermore, the FinTech that combines the IT with Financial product is being prevalent. For that reason, many mobile device based payment schemes have been proposed for card present transaction. In this paper, we propose a virtual credit card number payment scheme based on public key system for efficient authentication in card present transaction. Our proposed scheme is able to authenticate efficiently in card present transaction by pre-registering virtual credit card number based on cardholder's public key without PKI. And we compare and analyze our proposed scheme with EMV.

A Study of Response and Plan to Decrease Damage of ISP Secure Payment (ISP 안전결제 서비스 피해를 최소화하기 ISP 대응방안 연구)

  • Kim, Byung-Man;Ma, Sangjun
    • Journal of Convergence Society for SMB
    • /
    • v.5 no.2
    • /
    • pp.33-38
    • /
    • 2015
  • The damage to the security is increasing as public key-based ISP secure payment service is used in online banking payment system. Security technology aspect to ISP secure payment security has no special problems. But, security damage that occurs due to the simplicity of the payment system is a problem. In this paper, we propose response and plan for ISP secure payment service to minimize the damage that occurs due to the simplicity of a security settlement system. Proposed scheme is applicable to various billing systems such as secure payments, online payment, mobile payment, credit card. Proposed scheme is characterized in that can stably support the capabilities of the new billing system. Also, proposed scheme is to analyze the various security threats arising from the payment of the financial services and to describe response and plan technology.

  • PDF

Enhanced Mutual Authentication Scheme based on Chaotic Map for PCM in NFC Service Environment

  • Park, Sung-Wook;Lee, Im-Yeong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.2
    • /
    • pp.1180-1200
    • /
    • 2017
  • Currently, automated payment services provide intuitive user interfaces by adapting various wireless communication devices with mobile services. For example, companies like Samsung, Google, and Apple have selected the NFC payment method to service payments of existing credit cards. An electronic payment standard has been released for NFC activation within Korea and will strengthen the safety of payment service communications. However, there are various security risks regarding the NFC-based electronic payment method. In particular, the NFC payment service using the recently released lightweight devices cannot provide the cryptographic strength that is supported by many financial transaction services. This is largely due to its computational complexity and large storage resource requirements. The chaotic map introduced in this study can generate a highly complicated code as it is sensitive to the initial conditions. As the lightweight study using the chaotic map has been actively carried out in recent years, associated authentication techniques of the lightweight environment have been released. If applied with a chaotic map, a high level of cryptographic strength can be achieved that can provide more functions than simple XOR operations or HASH functions. Further, this technique can be used by financial transaction services. This study proposes a mutual authentication technique for NFC-PCM to support an NFC payment service environment based on the chaotic map.

Cryptographically-Generated Virtual Credit Card Number for Secure Card-Not-Present Transactions

  • Park, Chan-Ho;Park, Chang-Seop
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.4
    • /
    • pp.1864-1876
    • /
    • 2016
  • Card-Not-Present (CNP) transactions taking place remotely over the Internet are becoming more prevalent. Cardholder authentication should be provided to prevent the CNP fraud resulting from the theft of stored credit card numbers. To address the security problems associated with CNP transactions, the use of a virtual card number derived from the transaction details for the payment has been proposed, instead of the real card number. Since all of the virtual card number schemes proposed so far are based on a password shared between the cardholder and card issuer, transaction disputes due to the malicious behavior of one of the parties involved in the transaction cannot be resolved. In this paper, a new virtual card number scheme is proposed, which is associated with the cardholder's public key for signature verification. It provides strong cardholder authentication and non-repudiation of the transaction without deploying a public-key infrastructure, so that the transaction dispute can be easily resolved. The proposed scheme is analyzed in terms of its security and usability, and compared with the previously proposed schemes.

Load-Balancing and Fairness Support Mechanisms in Mobile Ad Hoc Networks (이동 애드혹 네트워크에서의 부하 균등화 및 공평성 지원 방법)

  • Ahn Sanghyun;Yoo Younghwan;Lim Yujin
    • The KIPS Transactions:PartC
    • /
    • v.11C no.7 s.96
    • /
    • pp.889-894
    • /
    • 2004
  • Most ad-hoc routing protocols such as AODV(Ad Hoc On-Demand Distance Vector) and DSR(Dynamic Source Routing) do not try to search for new routes if the network topology does not change. Hence, with low node mobility, traffic may be concentrated on several nodes, which results in long end-to-end delay due to congestion at the nodes. Furthermore, since some specific nodes are continuously used for long duration, their battery power may be rapidly exhausted. Expiration of nodes causes connections traversing the nodes to be disrupted and makes many routing requests be generated at the same time. Therefore, we propose a load balancing approach called Simple Load-balancing Approach (SLA), which resolves the traffic concentration problem by allowing each node to drop RREQ (Route Request Packet) or to give up packet forwarding depending on its own traffic load. Meanwhile, mobile nodes nay deliberately give up forwarding packets to save their own energy. To make nodes volunteer in packet forwarding. we also suggest a payment scheme called Protocol-Independent Fairness Algorithm (PIEA) for packet forwarding. To evaluate the performance of SLA, we compare two cases where AODV employs SLA or not. Simulation results show that SLA can distribute traffic load well and improve performance of entire ad-hoc networks.

MAKING AGRICULTURAL INSURANCE IN INDIA FARMER-FRIENDLY AND CLIMATE RESILIENT

  • Kumar, K. Nirmal Ravi
    • Agribusiness and Information Management
    • /
    • v.11 no.1
    • /
    • pp.27-39
    • /
    • 2019
  • Agricultural risks are exacerbated by a variety of factors ranging from climatevariability and change, frequent natural disasters, uncertainties in yields and prices, weakrural infrastructure, imperfect markets and lack of financial services including limited spanand design of risk mitigation instruments such as credit and insurance. Indian agriculture has little more than half (53%) of its area still rainfed and this makes it highly sensitive to vagaries of climate causing unstable output. Besides adverse climatic factors, there are man-made disasters such as fire, sale of spurious seeds, adulteration of pesticides and fertilizers etc., and all these severely affect farmers through loss in production and farm income, and are beyond the control of farmers. Hence, crop insurance' is considered to be the promising tool to insulate the farmers from risks faced by them and to sustain them in the agri-business. This paper critically evaluates the performance of recent crop insurance scheme viz., Pradhan Mantri Fasal Bhima Yojana (PMFBY) and its comparative performance with earlier agricultural insurance schemes implemented in the country. It is heartening that, the comparative performance of PMFBY with earlier schemes revealed that, the Government has definitely taken a leap forward in covering more number of farmers and bringing more area under crop insurance with the execution of this new scheme and on this front, it deserves the appreciation in fulfilling the objective for bringing more number of farmers under insurance cover. The use of mobile based technology, reduced number of Crop Cutting Experiments (CCEs) and smart CCEs, digitization of land record and linking them to farmers' account for faster assessment/settlement of claims are some of the steps that contributed for effective implementation of this new crop insurance scheme. However, inadequate claim payments, errors in loss/yield assessment, delayed claim payment, no direct linkage between insurance companies and farmers are the major shortcomings of this scheme. This calls for revamping the crop insurance program in India from time to time in tune with the dynamic changes in climatic factors on one hand and to provide a safety-net for farmers to mitigate losses arising from climatic shocks on the other. The future research avenues include: insuring the revenue of the farmer (Price × Yield) as in USA and more and more tenant farmers should be brought under insurance by doling out discounts for group coverage of farmers like in Philippines where 20 per cent discount in premium is given for a group of 5-10 farmers, 30 per cent for a group of 10-20 and 40 per cent for a group of >20 farmers.