Augmenting Internet-based Card Not Present Transactions with Trusted Computing
نویسندگان
چکیده
In this paper, we demonstrate how Trusted Computing technology can be used to enhance the security of Internet-based Card Not Present (CNP) transactions. We take a pragmatic approach, focusing here on exploiting features of Trusted Computing as it is being deployed today. Thus we rely only on the presence of client-side Trusted Platform Modules, rather than upon the “idealised” deployment in which Trusted Computing functionality is fully integrated with OS and CPU, and which still seems to be a distant prospect. In essence, our approach uses features of the Public Key Infrastructure that is inherent in Trusted Computing to build lightweight client-side enrollment and certification processes; public key certificates are then used to underpin authentication for CNP payments. Using this approach we demonstrate how Trusted Platform Module (TPM) enabled platforms can integrate with SSL and 3-D Secure. We discuss the threats to CNP transactions that remain even with our enhancements in place, focussing in particular on the threat of malware, and how it can be ameliorated.
منابع مشابه
Augmenting Internet-based Card Not Present Transactions with Trusted Computing: An Analysis
In this paper, we demonstrate how the staged roll out of Trusted Computing technology, beginning with ubiquitous client-side Trusted Platform Modules (TPMs), can be used to enhance the security of Internet-based Card Not Present (CNP) transactions. This approach can be seen as an alternative to the proposed mass deployment of unconnected card readers in the provision of CNP transaction authoris...
متن کاملAugmenting Internet-Based Card Not Present Transactions with Trusted Computing (Extended Abstract)
In this paper, we demonstrate how Trusted Computing technology can be used to enhance the security of Internet-based Card Not Present (CNP) transactions. We take a pragmatic approach, focusing here on exploiting features of Trusted Computing as it is being deployed today. Thus we rely only on the presence of client-side Trusted Platform Modules, rather than upon the “idealised” deployment in wh...
متن کاملe-EMV: Emulating EMV for Internet payments using Trusted Computing technology
The introduction of Static Data Authentication (SDA) compliant EMV cards with their improved cardholder verification and card authentication capabilities has resulted in a dramatic reduction in the levels of fraud seen at Point of Sale (POS) terminals. However, with this POS-based reduction has come a corresponding increase in the level of fraud associated with Internet-based Card Not Present (...
متن کاملBachelor Thesis Smart Card Based Solutions for Secure Internet Banking with a primitive reader or mobile phone
Internet Banking is performed in an insecure environment, that is, both the PC and the web browser may have viruses and spyware. Therefore the sensitive data such as client passwords and financial transactions can be eavesdropped and modified. This paper presents two smart card based solutions for Internet Banking. Unlike most of earlier approaches which handles all the sensitive data using the...
متن کاملBuilding Trust in E-Commerce - Internet Computing, IEEE
Most of us who have purchased items via the Internet have felt reluctant about the transaction at some point — usually when entering our credit card number or receiving unexpected goods. As customers, we need guarantees that the other party will not misuse confidential information, and merchants need guarantees that they will receive payment for the goods delivered. While security protocols suc...
متن کامل