One-Time Code Cardholder Verification Method in Electronic Funds Transfer Transactions
نویسنده
چکیده
Card payments are getting more and more popular across the world. The dominant standard used for Electronic Funds Transfer transaction is EMV. It is widely used across Europe and Canada, and currently it is being introduced in the USA. The most frequently used Cardholder Veri cation Method in EMV transaction is PIN, which requires from the payment terminal to be equipped with pinpad which increases the cost of the whole payment device. In this article I present an alternative Cardholder Veri cation Method (CVM) that can be used instead of traditional PIN. The key advantage of the presented mechanism is that it can be easily implemented in currently utilized authorization protocols, it does not a ect rules of EMV speci cation and may decrease time of transaction processing.
منابع مشابه
One-Time Code Cardholder Veri cation Method in Electronic Funds Transfer Transactions
Card payments are getting more and more popular across the world. The dominant standard used for Electronic Funds Transfer transaction is EMV. It is widely used across Europe and Canada, and currently it is being introduced in the USA. The most frequently used Cardholder Veri cation Method in EMV transaction is PIN, which requires from the payment terminal to be equipped with pinpad which incre...
متن کاملA Technique for Behavior Testing of SET Payment Based on Petri Nets
By secure electronic transaction (SET) protocol, business and customers can construct different electronic commerce models on the Internet. In this paper, we propose a method based on Petri net models and techniques of software engineering to detect unusual electronic commerce transactions. Users can construct all electronic commerce transactions of business and customers by SET. Because of fea...
متن کاملFormal Verification of Payment protocol using AVISPA
Emerging e-commerce activity is giving scope for the design of many new protocols, and to gain confidence, these protocol need to be verified for its designed properties. Specifically protocol used in ecommerce transactions needs to be verified for their security properties. Verification of these protocols is done using the formal verification tools. AVISPA is one of the evolving tools used mai...
متن کاملTransaction Privacy in Wireless Networks
An electronic transaction involves the exchange or transfer of information, services, or funds between two or more parties by digital means. We consider privacy protection of such transactions in wireless untrusted networks and propose a solution for integrating existing schemes of data, source and destination, location, and time privacy. The solution is based on strong encryption, the Non-Disc...
متن کاملIdentity verification based on certificateless public key cryptography
Verification of claimed identity becomes a problem of growing significance nowadays, as the number of e-commerce transactions grows rapidly and new information distribution channels are created by companies and institutions of all kinds. As most of them rely or make a use of a public network, such as the Internet, security of transferred data and information in most cases requires authorization...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Annales UMCS, Informatica
دوره 14 شماره
صفحات -
تاریخ انتشار 2014