AuthenLink: A User-Centred Authentication System for a Secure Mobile Commerce
نویسندگان
چکیده
We envision an environment where humans communicate directly with computers without additional authentication inputs like passwords, passphrases, PINs (Personal Identification Numbers), biometrics, or other existent authentication systems; and where humans network (intercommunicate) continually with wireless (mobile) devices. In this paper, we propose a new mobile authentication system, not yet implemented, called “AuthenLink”, coupled with a new approach to distinguishing characteristics to authenticate people (authentication factor): something you CONVEY. The utmost purpose of this paper is to provide an ease, user-centred and acceptable security authentication system against fraud, counterfeit, and theft for the mobile commerce (m-Commerce) domain, more specifically for mobile devices. Our authentication system achieves its goal through a microprocessor chip (ChipTag) computer implanted under human skin. This ChipTag is able to authenticate user’s access to systems, connect them wirelessly, through the Radio Frequency Identification (RFID) technology, and enable mobile devices perform mobile transactions, access files, or shop online.
منابع مشابه
ASEMC: Authentication for a SEcure M-Commerce
We envision an environment where humans communicate directly with computers without additional authentication inputs like passwords, passphrases, PINs (Personal Identification Numbers), biometrics, or other existent authentication systems; and where humans network (intercommunicate) continually with wireless (mobile) devices. In this paper, we propose a new mobile authentication system, not yet...
متن کاملA Robust Biometric Authentication and PIN Distribution Technique for Secure Mobile Commerce Applications
In a mobile emerging world, user authentication, service provider authentication and security is very important in mobile commerce. User authentication is performed by using fingerprint based biometric methodology. Existing system used for Mobile purchasing/payment services in handheld devices does not analyze fingerprint matching and feature extraction techniques in an efficient way. Also the ...
متن کاملThe Presentation of an Ideal Safe SMS based model in mobile Electronic commerce using Encryption hybrid algorithms AES and ECC
Mobile commerce is whatever electronic transfer or transaction via a mobile modem through a mobile net in which the true value or advance payment is done for goods, services or information. A mobile payment system should be beneficial for all related persons. For a payment system to be a Successful system, End-user, seller, exporter and operators should see a additional value in it. End-user ...
متن کاملSecure user authentication based on the trusted platform for mobile devices
In recent years, the use of mobile devices including smartphones has increased significantly all over the world, and e-commerce using smartphones has also greatly increased. Furthermore, many people are using their smartphones to carry out certain aspects of their work according to the BYOD trend. Therefore, it is extremely important that mobile device users are authenticated securely by remote...
متن کاملA Remote User Authentication Scheme with Anonymity for Mobile Devices
With the rapid growth of information technologies, mobile devices have been utilized in a variety of services such as e‐commerce. When a remote server provides such e‐commerce services to a user, it must verify the legitimacy of the user over an insecure communication channel. Therefore, remote user authentication has been widely deployed to verify the legitimacy of re...
متن کامل