Design and Implementation for Card Holder Initiated Card Payment System Using the Mobile Devices
نویسندگان
چکیده
منابع مشابه
Taming The Wild Card for Mobile Payment
Mobile wallets promise to allow people to easily manage their accounts and to carry less cards. However, the slow adoption of contactless point of sales (POS) terminals by merchants limits the potential of Near-Field Communication (NFC) based payment devices. In this paper, we discuss Wild Card, a secure and backward compatible way to make mobile payment through conventional magnetic stripe bas...
متن کاملFormal analysis of card-based payment systems in mobile devices
To provide card holder authentication while they are conducting an electronic transaction using mobile devices, VISA and MasterCard independently proposed two electronic payment protocols: Visa 3D Secure and MasterCard Secure Code. The protocols use pre-registered passwords to provide card holder authentication and Secure Socket Layer/ Transport Layer Security (SSL/TLS) for data confidentiality...
متن کاملSmart Card based Mobile Payment Protocol
New mobile consumers are demanding access to a wider range of applications and services, convenient payment for digital content and physical goods, and integrated financial management services. As mobile devices evolve into ‘smart devices’, the primary requirements for realizing the digital contents providing services are to implement the compatibly secure payment protocol on m-commerce environ...
متن کاملBinarizing Business Card Images for Mobile Devices
Business card images are of multiple natures as these often contain graphics, pictures and texts of various fonts and sizes both in background and foreground. So, the conventional binarization techniques designed for document images can not be directly applied on mobile devices. In this paper, we have presented a fast binarization technique for camera captured business card images. A card image...
متن کاملSmart Card Authentication for Mobile Devices
While mobile handheld devices provide productivity benefits, they also pose new risks. User authentication is the best safeguard against the risk of unauthorized use and access to a device’s contents. This paper describes two novel types of smart card with unconventional form factors, designed to take advantage of common interfaces built into many current handheld devices.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of the Korea society of IT services
سال: 2014
ISSN: 1975-4256
DOI: 10.9716/kits.2014.13.4.245