One-Time Code Cardholder Veri cation Method in Electronic Funds Transfer Transactions

نویسنده

  • Albert Sitek
چکیده

Card payments are getting more and more popular across the world. The dominant standard used for Electronic Funds Transfer transaction is EMV. It is widely used across Europe and Canada, and currently it is being introduced in the USA. The most frequently used Cardholder Veri cation Method in EMV transaction is PIN, which requires from the payment terminal to be equipped with pinpad which increases the cost of the whole payment device. In this article I present an alternative Cardholder Veri cation Method (CVM) that can be used instead of traditional PIN. The key advantage of the presented mechanism is that it can be easily implemented in currently utilized authorization protocols, it does not a ect rules of EMV speci cation and may decrease time of transaction processing.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

One-Time Code Cardholder Verification Method in Electronic Funds Transfer Transactions

Card payments are getting more and more popular across the world. The dominant standard used for Electronic Funds Transfer transaction is EMV. It is widely used across Europe and Canada, and currently it is being introduced in the USA. The most frequently used Cardholder Veri cation Method in EMV transaction is PIN, which requires from the payment terminal to be equipped with pinpad which incre...

متن کامل

A Secure-Cookie Recipe for Electronic Transactions

Since there is no concept of a session in HTTP, Web servers and browsers use cookies to capture information for subsequent communications on the Web, thus providing continuity and state across HTTP connections. Technically, cookies can be used to support electronic transactions on the Web, holding users' credit card information. However, it is insecure to store and transmit sensitive informatio...

متن کامل

Design for Veri cation at the Register Transfer Level

In this paper we introduce a novel concept that can be used for augmenting simulation based veri cation at the Register Transfer Level (RTL). In this technique the designer of an RTL circuit introduces some well understood extra behavior (through some extra circuitry) into the circuit under veri cation. This can be termed as design for veri cation. During RTL simulation this extra behavior is u...

متن کامل

Veri cation Codes

Most work in low-density parity-check codes focuses on bit-level errors. In this paper, we introduce and analyze veri cation codes, which are simple low-density parity-check codes speci cally designed to manipulate data in packet-sized units. Veri cation codes require only linear time for both encoding and decoding and succeed with high probability under random errors. We describe how to utiliz...

متن کامل

Continuous Veri cation by Discrete Reasoning

Two semantics are commonly used for the behavior of real-time and hybrid systems: a discrete semantics, in which the temporal evolution is represented as a sequence of snapshots describing the state of the system at certain times, and a continuous semantics, in which the temporal evolution is represented by a series of time intervals, and therefore corresponds more closely to the physical reali...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014