O ine Micropayments without Trusted Hardware

نویسندگان

  • Matt Blaze
  • John Ioannidis
  • Angelos D. Keromytis
چکیده

We introduce a new micropayment scheme, suitable for certain kinds of transactions, that requires neither online transactions nor trusted hardware for either the payer or payee. Each payer is periodically issued certi ed credentials that encode the type of transactions and circumstances under which payment can be guaranteed. A risk management strategy, taking into account the payers' history, and other factors, can be used to generate these credentials in a way that limits the aggregated risk of uncollectable or fraudulent transactions to an acceptable level. These credentials can also permit or restrict types of purchases. We show a practical architecture for such a system that uses a Trust Management System to encode the credentials and policies. We describe a prototype implementation of the system in which vending machine purchases are made using consumer PDAs.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Offline Micropayments without Trusted Hardware

We introduce a new micropayment scheme, suitable for certain kinds of transactions, that requires neither online transactions nor trusted hardware for either the payer or payee. Each payer is periodically issued certified credentials that encode the type of transactions and circumstances under which payment can be guaranteed. A risk management strategy, taking into account the payers’ history, ...

متن کامل

Prepaid-Payment-Solutions for Micropayments from a Technical Point of View

This document describes aspects of the processing of micropayments. The customer payment procedure is considered with regard to the charge-back problem. Further on a concept is presented which provides an easy implementation for the merchant and a simple but secure access for the customer. The function of a micropayment proxy server and the transaction sequence of the entire payment procedure a...

متن کامل

Side Effects Are Not Sufficient to Authenticate Software

Kennell and Jamieson [KJ03] recently introduced the Genuinity system for authenticating trusted software on a remote machine without using trusted hardware. Genuinity relies on machine-specific computations, incorporating side effects that cannot be simulated quickly. The system is vulnerable to a novel attack, which we call a substitution attack. We implement a successful attack on Genuinity, ...

متن کامل

An Efficient PIR Construction Using Trusted Hardware

For a private information retrieval (PIR) scheme to be deployed in practice, low communication complexity and low computation complexity are two fundamental requirements it must meet. Most existing PIR schemes only focus on the communication complexity. The reduction on the computational complexity did not receive the due treatment mainly because of its O(n) lower bound. By using the trusted ha...

متن کامل

Multiparty micropayments for ad hoc networks

The majority of ad hoc networks and their associated applications have been designed with closed user groups in mind. In such scenarios all the nodes in the network usually belong to a single authority and are configured to cooperate in the relaying of packets within the network. In recent years however, ad hoc networks have also found their way into everyday networking environments, where mobi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2001