On-Line E-Wallet System with Decentralized Credential Keepers
نویسندگان
چکیده
We propose a generalization of the architecture of an electronic wallet, as first developed in the seminal European research project CAFE. With this model you can leave most of the content of your electronic wallet at the security of your residential electronic keeper, while roaming with your favorite mobile terminals. Emerging mobile handsets with both short range Bluetooth and cellular GPRS communications provide a sufficient communication platform for this electronic wallet architecture. However, new security requirements must be addressed, and new threats of attack must be carefully analyzed and met with appropriate security protocols. The proposed approach is fundamentally distinct from the remote wallet proposals, in that it protects important user requirements and takes a multiparty security approach using a fully decentralized architecture. Technically, the user remains in control of the input/output and usage of his credentials, likely carried by smart cards. At the same time, the model provides a solution to the pressing practical problem of the multitude of special-branded cards the user has to carry and sort. Currently used magnetic stripe and chip cards with applications such as debit and credit transactions are easily included within the architecture with minor enhancement to these legacy systems and their functionality. We show in this paper how an account-based payment system can be solved with the proposed architecture. Our claim is that users achieve payment mobility and independence of both terminals and payment service providers while maintaining secure access to their payment authorization credentials.
منابع مشابه
E-wallet Software Architecture with Decentralized Credentials
This paper reports on results from a Master thesis project undertaken to develop software architecture for decentralized credentials, a generalization of the concept of an electronic wallet system developed in the European research project CAFÉ [1]. Within this new model you can leave most of the content of your electronic wallet (credentials, keys and passwords) at the security of your residen...
متن کاملDecentralized Anonymous Credentials
Anonymous credentials provide a powerful tool for making assertions about identity while maintaining privacy. However, a limitation of today’s anonymous credential systems is the need for a trusted credential issuer — which is both a single point of failure and a target for compromise. Furthermore, the need for such a trusted issuer can make it challenging to deploy credential systems in practi...
متن کاملBlueWallet: The Secure Bitcoin Wallet
With the increasing popularity of Bitcoin, a digital decentralized currency and payment system, the number of malicious third parties attempting to steal bitcoins has grown substantially. Attackers have stolen bitcoins worth millions of dollars from victims by using malware to gain access to the private keys stored on the victims’ computers or smart phones. In order to protect the Bitcoin priva...
متن کاملThe Horcrux Protocol: A Method for Decentralized Biometric-based Self-sovereign Identity
Most user authentication methods and identity proving systems rely on a centralized database. Such information storage presents a single point of compromise from a security perspective. If this system is compromised it poses a direct threat to users digital identities. This paper proposes a decentralized authentication method, called the Horcrux protocol, in which there is no such single point ...
متن کاملOpportunities and Challenges of CREDENTIAL
This paper summarizes the results of a workshop at the IFIP Summer School 2016 introducing the EU Horizon 2020 project credential, i.e., Secure Cloud Identity Wallet. The contribution of this document is three-fold. First, it gives an overview of the credential project, its use-cases, and core technologies. Second, it explains the challenges of the project’s approach and summarizes the results ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- MONET
دوره 8 شماره
صفحات -
تاریخ انتشار 2003