Analysis of Applicability of ISO 9564 PIN based Authentication to Closed-Loop Mobile Payment Systems

نویسندگان

  • Amal Saha
  • Sugata Sanyal
چکیده

-------------------------------------------------------------------ABSTRACT-------------------------------------------------------------------Payment transactions initiated through a mobile device are growing and security concerns must be addressed. People coming from payment card industry often talk passionately about porting ISO 9564 PIN standard based authentication in open-loop card payment to closed-loop mobile financial transactions and certification of closed-loop payment product or solution against this standard. In reality, so far this standard has not been adopted in closed-loop mobile payment authentication and applicability of this ISO standard must be studied carefully before adoption. The authors do a critical analysis of the applicability of this ISO specification and make categorical statement about relevance of compliance to closed-loop mobile payment. Security requirements for authentication in closed-loop mobile payment systems are not standardised through ISO 9564 standard, Common Criteria [3], etc. Since closed-loop mobile payment is a relatively new field, the authors make a case for Common Criteria Recognition Agreement (CCRA) or other standards organization to push for publication of a mobile device-agnostic Protection Profile or standard for it, incorporating the suggested authentication approaches.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Effects of integrating physical and financial flows through a closed-loop supply chain network under uncertain demand and return

The impact of financial challenges on the profit of a supply chain, have caused the researcher to model the supply chain network by considering the operational and financial dimensions. Also, the establishment of a closed loop supply chain (CLSC) network has a high effect on economic profit. So, the purpose of this study is to design a stochastic closed loop supply chain network by considering ...

متن کامل

Dynamic Load Carrying Capacity of Mobile-Base Flexible-Link Manipulators: Feedback Linearization Control Approach

This paper focuses on the effects of closed- control on the calculation of the dynamic load carrying capacity (DLCC) for mobile-base flexible-link manipulators. In previously proposed methods in the literature of DLCC calculation in flexible robots, an open-loop control scheme is assumed, whereas in reality, robot control is achieved via closed loop approaches which could render the calculated ...

متن کامل

A joint pricing-network design model for a resilient closed-loop supply chain under quantity discount

In this paper, a novel resilient multi-echelon closed-loop location-allocation-inventory problem (RMCLIP) is addressed that optimizes strategic and tactical decisions simultaneously. In order to represent the purchasing cost of raw material from the supplier, a pricing model under quantity discounts is employed in the closed-loop supply chain (CLSC). Considering the capability of returning the ...

متن کامل

An Integrated Closed-loop Supply Chain Configuration Model and Supplier Selection based on Offered Discount Policies

In this paper, a mathematical programming model is presented for integrated problem of closed loop supply chain network design and supplier selection. The suppliers  propose discount policy based on purchase amount and loyalty of buyers which are both taken from the elements of RFM (Recency, Frequency and Monetary) technique. The main objective of this paper which is formulated by a mixed-integ...

متن کامل

Secure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines

Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer’s data confidentiality and integrity but also breach in the verification of user’s authentication. Several challenges are associated with the use of ATM smart card such as: card clo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1411.2939  شماره 

صفحات  -

تاریخ انتشار 2014