Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Identity Authentication Security Management in Mobile Payment Systems

View through CrossRef
Mobile payment is a new payment method offering users mobility, reachability, compatibility, and convenience. But mobile payment involves great uncertainty and risk given its electronic and wireless nature. Therefore, biometric authentication has been adopted widely in mobile payment in recent years. However, although technology requirements for secure mobile payment have been met, standards and consistent requirements of user authentication in mobile payment are not available. The flow management of user authentication in mobile payment is still at its early stage. Accordingly, this paper proposes an anonymous authentication and management flow for mobile payment to support secure transaction to prevent the disclosure of users' information and to reduce identity theft. The proposed management flow integrates transaction key generation, encryption and decryption, and matching to process users' personal information and biometric characteristics based on mobile equipment authentication carrier.
Title: Identity Authentication Security Management in Mobile Payment Systems
Description:
Mobile payment is a new payment method offering users mobility, reachability, compatibility, and convenience.
But mobile payment involves great uncertainty and risk given its electronic and wireless nature.
Therefore, biometric authentication has been adopted widely in mobile payment in recent years.
However, although technology requirements for secure mobile payment have been met, standards and consistent requirements of user authentication in mobile payment are not available.
The flow management of user authentication in mobile payment is still at its early stage.
Accordingly, this paper proposes an anonymous authentication and management flow for mobile payment to support secure transaction to prevent the disclosure of users' information and to reduce identity theft.
The proposed management flow integrates transaction key generation, encryption and decryption, and matching to process users' personal information and biometric characteristics based on mobile equipment authentication carrier.

Related Results

Identity Authentication Security Management in Mobile Payment Systems
Identity Authentication Security Management in Mobile Payment Systems
Mobile payment is a new payment method offering users mobility, reachability, compatibility, and convenience. But mobile payment involves great uncertainty and risk given its elect...
DIGITAL PAYMENT SYSTEMS: A FUTURE OUTLOOK
DIGITAL PAYMENT SYSTEMS: A FUTURE OUTLOOK
Purpose- This study examines the development of digital payment systems with the evolution of communication technologies, financial institutions and fintech companies. Also, this s...
Role of Authentication Factors in Fin-Tech Mobile Transaction Security
Role of Authentication Factors in Fin-Tech Mobile Transaction Security
Abstract Fin-Tech is the merging of finance and technology to be considered a key term for technology-based financial operations and money transactions as far as Fin-Tech i...
An Authentication and Key Agreement Scheme Based on Roadside Unit Cache for VANET
An Authentication and Key Agreement Scheme Based on Roadside Unit Cache for VANET
Vehicular Ad Hoc Network (VANET) is a wireless Mobile Ad Hoc Network that is used for communication between vehicles, vehicles and fixed access points, and vehicles and pedestrians...
An Integrated Mobile Phone Payment System Based on 3G Network
An Integrated Mobile Phone Payment System Based on 3G Network
Along with globally approaching of the 3G era, the progress of mobile communication technology and the development of mobile terminal devices will rapidly promote the mobilization ...
SECURITY REQUIREMENTS VALIDATION FOR MOBILE APPS: A SYSTEMATIC LITERATURE REVIEW
SECURITY REQUIREMENTS VALIDATION FOR MOBILE APPS: A SYSTEMATIC LITERATURE REVIEW
Security requirements are important to increase the confidence of mobile users to perform many online transactions, such as banking, booking and payment via mobile devices.  Object...
An Efficient Blockchain-Based Verification Scheme with Transferable Authentication Authority
An Efficient Blockchain-Based Verification Scheme with Transferable Authentication Authority
Abstract In some situations, the transfer of authentication authority is necessary for user authentication. In traditional authentication, a trust mechanism based on a trus...
Blockchain-Based Anonymous Authentication in Edge Computing Environment
Blockchain-Based Anonymous Authentication in Edge Computing Environment
Authentication is an important requirement for the security of edge computing applications. The existing authentication schemes either frequently rely on third-party trusted author...

Back to Top