One-Time Code Cardholder Verification Method in Electronic Funds Transfer Transactions

نویسنده

  • Albert Sitek
چکیده

Card payments are getting more and more popular across the world. The dominant standard used for Electronic Funds Transfer transaction is EMV. It is widely used across Europe and Canada, and currently it is being introduced in the USA. The most frequently used Cardholder Veri cation Method in EMV transaction is PIN, which requires from the payment terminal to be equipped with pinpad which increases the cost of the whole payment device. In this article I present an alternative Cardholder Veri cation Method (CVM) that can be used instead of traditional PIN. The key advantage of the presented mechanism is that it can be easily implemented in currently utilized authorization protocols, it does not a ect rules of EMV speci cation and may decrease time of transaction processing.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

One-Time Code Cardholder Veri cation Method in Electronic Funds Transfer Transactions

Card payments are getting more and more popular across the world. The dominant standard used for Electronic Funds Transfer transaction is EMV. It is widely used across Europe and Canada, and currently it is being introduced in the USA. The most frequently used Cardholder Veri cation Method in EMV transaction is PIN, which requires from the payment terminal to be equipped with pinpad which incre...

متن کامل

A Technique for Behavior Testing of SET Payment Based on Petri Nets

By secure electronic transaction (SET) protocol, business and customers can construct different electronic commerce models on the Internet. In this paper, we propose a method based on Petri net models and techniques of software engineering to detect unusual electronic commerce transactions. Users can construct all electronic commerce transactions of business and customers by SET. Because of fea...

متن کامل

Formal Verification of Payment protocol using AVISPA

Emerging e-commerce activity is giving scope for the design of many new protocols, and to gain confidence, these protocol need to be verified for its designed properties. Specifically protocol used in ecommerce transactions needs to be verified for their security properties. Verification of these protocols is done using the formal verification tools. AVISPA is one of the evolving tools used mai...

متن کامل

Transaction Privacy in Wireless Networks

An electronic transaction involves the exchange or transfer of information, services, or funds between two or more parties by digital means. We consider privacy protection of such transactions in wireless untrusted networks and propose a solution for integrating existing schemes of data, source and destination, location, and time privacy. The solution is based on strong encryption, the Non-Disc...

متن کامل

Identity verification based on certificateless public key cryptography

Verification of claimed identity becomes a problem of growing significance nowadays, as the number of e-commerce transactions grows rapidly and new information distribution channels are created by companies and institutions of all kinds. As most of them rely or make a use of a public network, such as the Internet, security of transferred data and information in most cases requires authorization...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Annales UMCS, Informatica

دوره 14  شماره 

صفحات  -

تاریخ انتشار 2014