Limits...
A secure operational model for mobile payments.

Chang TK - ScientificWorldJournal (2014)

Bottom Line: A customer uses his/her mobile device to get authorization from a remote server and generate a two-dimensional barcode as the payment certificate.This payment certificate has a time limit and can be used once only.The system also provides the ability to remotely lock and disable the mobile payment service.

View Article: PubMed Central - PubMed

Affiliation: Department of Computer Science and Information Engineering, National Dong Hwa University, Hualien 97401, Taiwan.

ABSTRACT
Instead of paying by cash, check, or credit cards, customers can now also use their mobile devices to pay for a wide range of services and both digital and physical goods. However, customers' security concerns are a major barrier to the broad adoption and use of mobile payments. In this paper we present the design of a secure operational model for mobile payments in which access control is based on a service-oriented architecture. A customer uses his/her mobile device to get authorization from a remote server and generate a two-dimensional barcode as the payment certificate. This payment certificate has a time limit and can be used once only. The system also provides the ability to remotely lock and disable the mobile payment service.

Show MeSH
An example of encrypted data in a purchase.
© Copyright Policy - open-access
Related In: Results  -  Collection


getmorefigures.php?uid=PMC4217240&req=5

alg4: An example of encrypted data in a purchase.

Mentions: After a customer has finished a transaction, the details of the transaction are formatted in XML and some important data are encrypted. Algorithm 4 shows an example of the encrypted data of a purchase. In this case only the authorization number is encrypted, and the encryption key is encrypted by the public key of the bank.


A secure operational model for mobile payments.

Chang TK - ScientificWorldJournal (2014)

An example of encrypted data in a purchase.
© Copyright Policy - open-access
Related In: Results  -  Collection

Show All Figures
getmorefigures.php?uid=PMC4217240&req=5

alg4: An example of encrypted data in a purchase.
Mentions: After a customer has finished a transaction, the details of the transaction are formatted in XML and some important data are encrypted. Algorithm 4 shows an example of the encrypted data of a purchase. In this case only the authorization number is encrypted, and the encryption key is encrypted by the public key of the bank.

Bottom Line: A customer uses his/her mobile device to get authorization from a remote server and generate a two-dimensional barcode as the payment certificate.This payment certificate has a time limit and can be used once only.The system also provides the ability to remotely lock and disable the mobile payment service.

View Article: PubMed Central - PubMed

Affiliation: Department of Computer Science and Information Engineering, National Dong Hwa University, Hualien 97401, Taiwan.

ABSTRACT
Instead of paying by cash, check, or credit cards, customers can now also use their mobile devices to pay for a wide range of services and both digital and physical goods. However, customers' security concerns are a major barrier to the broad adoption and use of mobile payments. In this paper we present the design of a secure operational model for mobile payments in which access control is based on a service-oriented architecture. A customer uses his/her mobile device to get authorization from a remote server and generate a two-dimensional barcode as the payment certificate. This payment certificate has a time limit and can be used once only. The system also provides the ability to remotely lock and disable the mobile payment service.

Show MeSH