Parasitic Authentication To Protect Your E-Wallet
نویسندگان
چکیده
T he electronic wallet (e-wallet) has received much attention lately. It promises to consolidate many of the personal items carried around by the modern individual: wallet, phone, pager, diary, and keys. In fact, Nokia's 9001 Communicator already combines the phone, pager, and diary into one unit. The question arises, however, of how to provide user authentication. Traditional protection mechanisms require users to enter a PIN or password every time they wish to perform a transaction. More sophisticated techniques include using a biometric device, such as a fingerprint scanner, which is integrated into the e-wallet. Both of these options, have disadvantages. Usability problems due to authentication are a significant barrier to the adoption of e-wallets. In this article, we present some novel uses of existing protocols whereby a concealable, wireless, and portable device can temporarily act as an authentica-tion proxy for the user. The e-wallet then becomes a parasite—feeding off the small device for required authentication and identification information. The traditional wallet provides four main functions for the user: It holds identification information such as a driver's license, facilitates two distinct payment systems (cash and credit), and acts as a repository for temporary tokens such as bus tickets. There is little doubt that cunningly engineered cryptographic protocols can efficiently perform these wallet type functions, but can they add value? Indeed, e-wallet and smart-card developers face a daunting hurdle in convincing consumers to adopt an electronic purse. From the consumer's point of view, the credit card is an extremely attractive payment mechanism. In most legal jurisdictions, the onus is on the merchant to prove that a disputed transaction was made, thus placing very little risk with the consumer. Cash is a highly reliable payment system that has worked for centuries. How can the e-wallet compete? The verification problem Users expect some mechanism to prevent a thief from using their e-wallet. 1 This has proven quite difficult to achieve. The most obvious solution requires the user to perform some kind of identification protocol with the e-wallet before each transaction. Traditionally, the user must divulge some secret such as a password or PIN. More recent innovations have used biometrics. Neither passwords nor PINs are an ideal solution: Not only are they a weak authentication measure, they are also frequently misused. 2,3 For example, banks sometimes tell their users to use a word as their PIN since an ATM keypad has letters associated with the …
منابع مشابه
Parasitic authentication to protect your E-wallet - Computer
T he electronic wallet (e-wallet) has received much attention lately. It promises to consolidate many of the personal items carried around by the modern individual: wallet, phone, pager, diary, and keys. In fact, Nokia’s 9001 Communicator already combines the phone, pager, and diary into one unit. The question arises, however, of how to provide user authentication. Traditional protection mechan...
متن کاملBeyond Parasitic Authentication
Parasitic authentication [Ebringer et al., 2000] is a novel approach for user authentication in electronic wallet systems which combines security and usability. We propose an extension to parasitic authentication that integrates it to payment protocols thus increasing the security of electronic wallets. The additional security comes at the expense of greater complexity in the secondary devices ...
متن کاملE-wallet Software Architecture with Decentralized Credentials
This paper reports on results from a Master thesis project undertaken to develop software architecture for decentralized credentials, a generalization of the concept of an electronic wallet system developed in the European research project CAFÉ [1]. Within this new model you can leave most of the content of your electronic wallet (credentials, keys and passwords) at the security of your residen...
متن کاملSurvey of Strong Authentication Approaches for Mobile Proximity and Remote Wallet Applications - Challenges and Evolution
Wallet may be described as container application used for configuring, accessing and analysing data from underlying payment application(s). There are two dominant types of digital wallet applications, proximity wallet and remote wallet. In the payment industry, one often hears about authentication approach for proximity or remote wallets or the underlying payment applications separately, but th...
متن کاملOn-Line E-Wallet System with Decentralized Credential Keepers
We propose a generalization of the architecture of an electronic wallet, as first developed in the seminal European research project CAFE. With this model you can leave most of the content of your electronic wallet at the security of your residential electronic keeper, while roaming with your favorite mobile terminals. Emerging mobile handsets with both short range Bluetooth and cellular GPRS c...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IEEE Computer
دوره 33 شماره
صفحات -
تاریخ انتشار 2000