Airo National Research Journal October, 2016 Volume V, ISSN:

Size: px
Start display at page:

Download "Airo National Research Journal October, 2016 Volume V, ISSN:"

Transcription

1 1

2 A STUDY ON SECURITY OF WIRELESS FINANCIAL ARCHITECTURE Abstract MAHINDER JIT SINGH KHANNA RESEARCH SCHOLAR OF SRI SATYA SAI UNIVERSITY MADHYA PRADESH (INDIA) Mobile commerce (m-commerce) offers a practical and complementary solution to credit card transactions. This paper proposes a Secure Wireless Financial Transaction (SWiFT) system and describes a proto-type implementation. A review of similar m-commerce solutions is included with comparison to the proposed SWiFT system. Keywords M-commerce, secure wireless financial transaction system INTRODUCTION Credit card fraud is an increasing problem; card fraud in the UK totalled over 500 million in 2004, a 20% increase on 2003 [1]. The two major types of credit card fraud are: Card-present fraud: forgery of authenticating signature where the card is present at the point of sale (POS). The introduction of Chip-and-PIN credit card technology offers increased security, though only to card-present transactions. Card-not-present fraud: online purchasing or phone-based ordering where a merchant cannot view the card at the time of transaction. This fraud is more common than card-present fraud [1]. Chip-and-PIN credit card technology does not protect against card-not-present transaction fraud. A stolen card contains all of the required information to conduct fraudulent transactions. Customers report lost or stolen cards to the appropriate financial institution and are required to wait several days before re-issue of a replacement card. 2

3 M-commerce offers a solution, which protects against both of the above types of fraud and which offers the consumer increased control over personal transactions and accounts. Interest in m-commerce is increasing; the Mobey Forum [2] expects the global m-commerce market to be in excess of $40 billion by 2009 [3]. Forum members include leading financial institutions and major developers of mobile communications technology. M-commerce solution architecture, security and functionality remain critical to their adoption by consumers. Massive global mobile phone ownership (estimated 1.52 billion users in December 2004 [7]) makes such technology an obvious choice as a user device. Current technology and a growing wireless network infrastructure, including J2ME-enabled mobile phones, enables practical implementation of secure m- commerce transaction systems. With improvements in processing power, screen size and transmission bandwidth, adequate data encryption for security and content delivery to consumers is becoming a reality. M-commerce offers an improved consumer-orientated approach to transactions, improved transaction security and extended services, compared to credit card transactions. The proposed SWiFT system includes the following three key components: a consumer e-card, a bank server (or banking agent server), and a merchant terminal. Unlike credit card transactions, no direct communication occurs between the SWiFT system e-card and merchant terminal. The e- card and merchant terminal communicate only via the trusted bank server. This approach reduces the security risk as each device must only establish one secure channel each and the bank has centralised control of all network connections. RELATED RESEARCH Research in secure wireless transaction systems has delivered various approaches to the architecture, security protocols and consumer applications. Various fora, mobile phone manufacturers, financial institutions and educational institutes have driven this research. The SWiFT system provides a fresh approach to m-commerce and to the concept of a wireless wallet. Before outlining the proposed solution, this paper will first comment on some of the most pertinent previous research developments in this area. 3

4 Itani proposes an end-to-end security protocol for an mcommerce solution developed on a J2ME enabled mobile phone [5]. It utilises the HTTP protocol implemented on top of the WAP stack to communicate with a server using HTTP requests. As WAP 1.0 support for encryption and security is not on its own satisfactory for an m-commerce application, it is necessary to further encrypt the data. Itani proposes to use the AES encryption algorithm and describes a cipher key management procedure. The protocol described is particularly suitable for mobile phone based transaction authentication. It overcomes the main limitations of J2ME enabled mobile phone development, namely processing power for encryption and lack of support for TCP/IP. AES is a symmetric encryption algorithm, which requires sensitive data to be stored on the device and a cipher key management protocol to be implemented. RSA has an advantage over AES in that it does not need sensitive data to be stored locally as it is the case with an asymmetric public-private key algorithm. Labrou describes a wireless wallet application and architecture [6] similar to the way in which SWiFT system operates. The system was implemented on two devices; a purpose-built Wi-Fi enabled device and a J2ME enabled mobile phone. The Wi-Fi device connected directly to a merchant provided access point and all communication with the banking agent are done via the merchant s resources. The consumer and merchant devices also exchange data. The concept that the SWiFT system is based is that the merchant and consumer should be able to operate independently. The dependence used in Labrou s solution could be used to compromise security by an untrustworthy merchant or a criminal posing as a merchant. The solution implemented on the developed device could not be easily ported to a phone due to architectural structure and reliance on Wi-Fi. The phone solution requires the user to register separately with each retailer and download a J2ME wireless wallet application specific to each retailer. The proposed architecture in contrast offers an integrated approach that combines all merchants under one solution. The Mobey Forum was founded in May 2000 by the leading financial institutions and mobile phone terminal manufacturers [2]. It aims to 4

5 encourage the use of mobile technology in financial services. The Forum has established a Preferred Payment Architecture (PPA). A prototype based on the PPA has been demonstrated [2]. SWIFT SYSTEM TRANSACTION PROTOCOL The SWiFT system (Fig. 1) processes a financial transaction in the following sequence. The description also explains the log in and authentication procedure for each customer e-card. 1. E-card begins the log in procedure by requesting a server connection. 2. Server authenticates the e-card by issuing three handshaked challenges to the e-card to validate the customer PIN number, e-card device serial number and two known secret values. 3. The e-card must respond correctly to each challenge to enable authentication by the server. 4. Using location information the e-card indicates its current geographic location to the bank and requests a list of available local merchants. 5. Server responds with a list of local retailers and optional retailer marketing information. 6. The customer initiates a payment transaction by selecting a specific retailer and informing the bank. 5

6 The SWiFT transaction is customer-driven and customer focused. A customer can maintain anonymity by providing a username. All sensitive data is encrypted using the RSA algorithm on both merchantto-bank and e-card-to-bank communication channels. Exponent and modulus values are 1024 bits wide. A two-stage encryption method is used: 1. encryption using the sender s private key 2. encryption using the receiver s public key. This ensures that only the intended receiver can recover the original data and it authenticates the sender. PIN number padding and hashing (using MD5) is performed and the resulting hash is encrypted (using the RSA algorithm) before network transmissions. This guarantees optimum security. DESCRIPTION OF SWIFT SYSTEM ELEMENTS The server provides clients transaction support and guards system security. The concept of a single bank server supporting all e-cards and merchant terminals is only applicable to a small-scale implementation. 6

7 For a scalable solution, many dedicated e- card servers would be required with dedicated merchant servers communicating over an internal secure network. The RSA encryption and MD5 hash algorithms are implemented to provide secure data transmission between server, e-card and merchant. As a result of server authentication of each device into the system, unauthorized parties are prevented from interfering. The server maintains a database containing all PIN numbers, device serial numbers and additional customer and merchant account information to enable control of network security. A customer web interface to the server is provided to enable customer control of PIN numbers and selected device parameters. The web interface takes the form of a secure (https) web site with authorized access to the main database. A consumer is required to enter username and PIN number to view account details, e.g., recent transaction history and balance. The server is typically implemented using the J2EE specification, which provides support for servlets and session tracking. As most J2ME enabled phones do not have support for TCP/IP but instead communicate using HTTP requests, J2EE makes an excellent choice for handling such requests. The HTTP servlets can be used to full advantage in responding to e-card requests. Communication is performed using the widely used Java database connectivity (JDBC) API. Sockets provide the merchant terminal communication over TCP/IP, allowing a duplex stream of data between a merchant and the bank. Socket programming is used rather than a high level HTTP protocol, as it is more convenient for servermerchant communication. Consumer E-Card The e-card could in theory be deployed on any device (ideally wireless, such as mobile phone or PDA) that supports HTTP and implements encryption algorithms. This paper describes the deployment using J2ME enabled mobile phones. The e-card application is developed using the mobile information device profile (MIDP), which is a set of Java API s provided by J2ME enabled phones. Combined with the Connected Limited Device Configuration (CLDC), a mobile phone provides a complete Java runtime environment. The e-card application is developed as a MIDlet (mobile information device 7

8 application) and downloaded onto the phone. The MIDlet then uses the provided runtime environment to execute and can communicate over the WAP stack, Bluetooth or infrared if supported by the phone. The e-card application s purpose is to represent the consumer within the SWiFT network. The e-card provides a simple, informative GUI on the mobile phone screen to support user requests and provide the user with current status and instructions. Device memory limitation and processing power constraints must be considered to meet the required encryption performance. The RSA algorithm implementation must be highly optimised, and the amount of data encrypted minimised, to allow the phone to encrypt at the 1024-bit level. Unique secret values known only to the bank and the individual phone are generated and encrypted using the consumers PIN at compile time. These are then hard coded within the customer unique MIDlet which is downloaded to the mobile phone. A customer s PIN number is the final security mechanism. The application requests the customer s PIN number to authenticate the transaction during the bank login procedure. During this phase, the PIN is used to decipher the known secret values. A hashed version of the padded value is sent to the bank. It is also required to allow authentication of the purchase. The phone could be connected to the bank over a data call, GPRS, HSCSD or 3G connections. The bandwidth requirement of the e-card application is low. Ideally the e-card would be constantly connected, e.g., using GPRS. With GPRS, customers pay for service during data upload or download. Consequently a consumer using the SWiFT system would be charged only when purchasing something or updating the geographic location. The relatively low data volume that needs to be transferred makes this service affordable and competitive. Merchant Terminal To ease integration of the proposed SWiFT system, the merchant terminal would be very similar to existing terminals already in use in retail stores. SWiFT system functionality could be integrated with existing terminals. There are some minor changes. These are however largely software updates as follows: Merchant kiosks implement the RSA and MD5 algorithms. A unique secret code is encrypted using the retailer s password on the device. 8

9 There is no requirement that the kiosk should be developed in Java, as network communications are software independent. The terminal is required to have a constant connection to the bank, as a bank must be able to issue updates to the merchant kiosk when a customer wishes to initiate a transaction. This could be achieved using a DSL or possibly a GPRS connection. If DSL and GPRS infrastructure were not available, a terminal could dial in to the server as performed presently. However, this would prove inefficient, slow and time consuming. A private wired connection would also give added security to the system. SWIFT PROTOTYPE IMPLEMENTATION The proposed SWiFT system has been prototyped (Fig. 2). A description of each implemented component is included below: 9

10 Bank Server The bank server was developed as a standalone Java application connected to a MySQL database using the JDBC connector. The fundamental components of the server are illustrated in Fig. 3. The server application deals with requests from clients received from the Internet. Customer and retail records are retrieved by the server application as needed. Consumer E-Card The e-card architecture is illustrated in Figure 4. The ecard uses a Sharp Zaurus SL PDA. The device s Linux kernel supports a reduced version of the standard Java runtime environment, similar to J2ME. The SWiFT prototype e-card (Sharp PDA) supports TCP/UDP sockets, which are quicker and easier to implement than HTTP requests, supported by MIDP. 10

11 Merchant Terminal This device has been developed to resemble the current merchant terminal device using an Analog Devices ADuC7020 ARM7TDMI Development Board. The board interfaces with an LCD display and a 16 key keypad. CONCLUSION AND FUTURE WORK This paper presents a new approach to secure financial transactions as an m- commerce solution. We have presented an alternative approach to existing solutions that overcomes the reliance of trust between merchant and customer. It provides a centralised authentication server that does not require any direct interaction between both parties. Consequently this architecture does not rely on local trust with a merchant, but builds solely on GPRS mobile phone services. The system offers improved security over other solutions and can be easily integrated into a mobile phone platform reducing the total cost of ownership. The proposed solution provides complete support for both card-present and card-non-present types of transactions, protecting against all types of credit card fraud. The described prototype demonstrates the capabilities of the SWiFT system. Currently further optimisations of the RSA encryption algorithm are proposed for implementation on a mobile phone platform. In addition, hardware support to 11

12 meet m-commerce transaction performance requirements also needs investigation. REFERENCES [1] United Kingdom Crime Reduction Website, [2] The Mobey Forum, [3] The European Financial Management & Marketing Association, [4] Mobile Electronic Transactions Ltd, [5] W. Itani and A. I. Kayssi, J2ME Endto-End Security for MCommerce, Wireless Communications and Networking 2003, WCNC 2003, IEEE, March 2003 [6] Y. Labrou, J. Agre, L. Ji, J. Molina and W. Chen, Wireless Wallet, 1st Mobile and Ubiquitous Systems: Networking and Services, Mobiquitous 2004, August 04 [7] Cellular Online, [8] Irish Bankers Federation, 12

Best Practices Guide to Electronic Banking

Best Practices Guide to Electronic Banking Best Practices Guide to Electronic Banking City Bank & Trust Company offers a variety of services to our customers. As these services have evolved over time, a much higher percentage of customers have

More information

Overview. SSL Cryptography Overview CHAPTER 1

Overview. SSL Cryptography Overview CHAPTER 1 CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet. SSL ensures the secure transmission of data between a client and a server through

More information

key distribution requirements for public key algorithms asymmetric (or public) key algorithms

key distribution requirements for public key algorithms asymmetric (or public) key algorithms topics: cis3.2 electronic commerce 24 april 2006 lecture # 22 internet security (part 2) finish from last time: symmetric (single key) and asymmetric (public key) methods different cryptographic systems

More information

Názov prezentácie. Logo partnera

Názov prezentácie. Logo partnera Názov prezentácie Logo partnera Mobile banking more popular than a Facebook? Mobile Dependence Day, ExactTarget report on mobile usage, 2012 Competition is heating up Payment area competition Foreign banks

More information

Distributed Systems. Lecture 14: Security. 5 March,

Distributed Systems. Lecture 14: Security. 5 March, 06-06798 Distributed Systems Lecture 14: Security 5 March, 2002 1 What is security? policies and mechanisms threats and attacks Overview Security of electronic transactions secure channels authentication

More information

Lecture 11C Mobile Commerce

Lecture 11C Mobile Commerce Lecture 11C Mobile Commerce Outline Introduction Characteristics of M-commerce Enabling Technologies Mobile Payment Conclusion Outline Introduction Characteristics of M-commerce Enabling Technologies Mobile

More information

Authentication Technology for a Smart eid Infrastructure.

Authentication Technology for a Smart eid Infrastructure. Authentication Technology for a Smart eid Infrastructure. www.aducid.com One app to access all public and private sector online services. One registration allows users to access all their online accounts

More information

Symmetric Key Services Markup Language Use Cases

Symmetric Key Services Markup Language Use Cases Symmetric Key Services Markup Language Use Cases Document Version 1.1 - February 28, 2007 The OASIS Symmetric Key Services Markup Language (SKSML) is the proposed language/protocol that defines how a client

More information

Cryptography (Overview)

Cryptography (Overview) Cryptography (Overview) Some history Caesar cipher, rot13 substitution ciphers, etc. Enigma (Turing) Modern secret key cryptography DES, AES Public key cryptography RSA, digital signatures Cryptography

More information

Keys to the Success of Mobile Commerce

Keys to the Success of Mobile Commerce Keys to the Success of Mobile Commerce Security, Performance, Usability and Practical Business Applications Marty Andolino Introduction to Mobile Commerce Evaluation Security Performance Usability Practical

More information

A simple approach of Peer-to-Peer E-Cash system

A simple approach of Peer-to-Peer E-Cash system A simple approach of Peer-to-Peer E-Cash system Mr. Dharamvir, Mr. Rabinarayan Panda Asst. Professor, Dept. of MCA, The Oxford College of Engineering Bangalore, India. Abstract-With the popularization

More information

Network Security Issues and Cryptography

Network Security Issues and Cryptography Network Security Issues and Cryptography PriyaTrivedi 1, Sanya Harneja 2 1 Information Technology, Maharishi Dayanand University Farrukhnagar, Gurgaon, Haryana, India 2 Information Technology, Maharishi

More information

Distributed Systems. Lecture 14: Security. Distributed Systems 1

Distributed Systems. Lecture 14: Security. Distributed Systems 1 06-06798 Distributed Systems Lecture 14: Security Distributed Systems 1 What is security? policies and mechanisms threats and attacks Overview Security of electronic transactions secure channels authentication

More information

Restricting Unauthorized Access Using Biometrics In Mobile

Restricting Unauthorized Access Using Biometrics In Mobile Restricting Unauthorized Access Using Biometrics In Mobile S.Vignesh*, M.Narayanan# Under Graduate student*, Assistant Professor# Department Of Computer Science and Engineering, Saveetha School Of Engineering

More information

Principles of Information Security, Fourth Edition. Chapter 8 Cryptography

Principles of Information Security, Fourth Edition. Chapter 8 Cryptography Principles of Information Security, Fourth Edition Chapter 8 Cryptography Learning Objectives Upon completion of this material, you should be able to: Chronicle the most significant events and discoveries

More information

Mobile Station Execution Environment (MExE( MExE) Developing web applications for PDAs and Cellphones. WAP (Wireless Application Protocol)

Mobile Station Execution Environment (MExE( MExE) Developing web applications for PDAs and Cellphones. WAP (Wireless Application Protocol) Developing web applications for PDAs and Cellphones Mobile Station Execution Environment (MExE( MExE) MExE is a standard for defining various levels of wireless communication These levels are called classmarks

More information

BlackBerry Enterprise Server for IBM Lotus Domino Version: 5.0. Administration Guide

BlackBerry Enterprise Server for IBM Lotus Domino Version: 5.0. Administration Guide BlackBerry Enterprise Server for IBM Lotus Domino Version: 5.0 Administration Guide SWDT487521-636611-0528041049-001 Contents 1 Overview: BlackBerry Enterprise Server... 21 Getting started in your BlackBerry

More information

Target Breach Overview

Target Breach Overview Target Breach Overview Q: Media reports are stating that Target experienced a data breach. Can you provide more specifics? A: Yes, Target has confirmed that it experienced unauthorized access to its systems

More information

IP Mobility vs. Session Mobility

IP Mobility vs. Session Mobility IP Mobility vs. Session Mobility Securing wireless communication is a formidable task, something that many companies are rapidly learning the hard way. IP level solutions become extremely cumbersome when

More information

The future of mobile banking

The future of mobile banking The future of mobile banking Ludwig Schulze Business Development Corporate Development Office 1 2008 Nokia Amazing growth of mobility Global subscriber s (million) 4 500 4 000 3 500 4 billion in 2009 3

More information

Mobile Security / Mobile Payments

Mobile Security / Mobile Payments Mobile Security / Mobile Payments Leslie K. Lambert CISSP, CISM, CISA, CRISC, CIPP/US, CIPP/G VP, Chief Information Security Officer Juniper Networks Professional Techniques - Session T23 MOBILE SECURITY

More information

Securing Americans Identities: The Future of the Social Security Number

Securing Americans Identities: The Future of the Social Security Number Cha : Testimony, SASC 04 /25 /2017 1 Statement Before the House Ways and Means Subcommittee on Social Security Securing Americans Identities: The Future of the Social Security Number A Testimony by: James

More information

SECURING DEVICES IN THE INTERNET OF THINGS

SECURING DEVICES IN THE INTERNET OF THINGS SECURING DEVICES IN THE INTERNET OF THINGS EXECUTIVE SUMMARY Security breaches at the device level in the Internet of Things (IoT) can have severe consequences, including steep financial losses, damage

More information

Modern two-factor authentication: Easy. Affordable. Secure.

Modern two-factor authentication: Easy. Affordable. Secure. Modern two-factor authentication: Easy. Affordable. Secure. www.duosecurity.com Your systems and users are under attack like never before The last few years have seen an unprecedented number of attacks

More information

Exploring the potential of Mobile Connect: From authentication to identity and attribute sharing. Janne Jutila, Head of Business Development, GSMA

Exploring the potential of Mobile Connect: From authentication to identity and attribute sharing. Janne Jutila, Head of Business Development, GSMA Exploring the potential of Mobile Connect: From authentication to identity and attribute sharing Janne Jutila, Head of Business Development, GSMA Fragility of passwords No matter what you tell them, users

More information

SECURING DEVICES IN THE INTERNET OF THINGS

SECURING DEVICES IN THE INTERNET OF THINGS SECURING DEVICES IN THE INTERNET OF THINGS WHEN IT MATTERS, IT RUNS ON WIND RIVER EXECUTIVE SUMMARY Security breaches at the device level in the Internet of Things (IoT) can have severe consequences, including

More information

Securing Devices in the Internet of Things

Securing Devices in the Internet of Things AN INTEL COMPANY Securing Devices in the Internet of Things WHEN IT MATTERS, IT RUNS ON WIND RIVER EXECUTIVE SUMMARY Security breaches at the device level in the Internet of Things (IoT) can have severe

More information

ARM Security Solutions and Numonyx Authenticated Flash

ARM Security Solutions and Numonyx Authenticated Flash ARM Security Solutions and Numonyx Authenticated Flash How to integrate Numonyx Authenticated Flash with ARM TrustZone* for maximum system protection Introduction Through a combination of integrated hardware

More information

GoToMyPC Corporate Product Guide

GoToMyPC Corporate Product Guide GoToMyPC Corporate Product Guide 072402 Contents Product Overview...1 How It Works...1 Target Audiences/Product Uses...2 Primary Selling Points...3 Software Features and Benefits...4 Administration Center

More information

Mobile Banking: Boldly Go WNOHGB

Mobile Banking: Boldly Go WNOHGB Mobile Banking: Boldly Go WNOHGB Regional & Community Bankers Conference October 16, 2008 Mike Stewart, Assistant Vice President Business Development & Customer Services 1 Discussion Topics Some Definitions

More information

The Design of an Anonymous and a Fair Novel E-cash System

The Design of an Anonymous and a Fair Novel E-cash System International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 2, Number 2 (2012), pp. 103-109 International Research Publications House http://www. ripublication.com The Design of

More information

RSA Solution Brief. Providing Secure Access to Corporate Resources from BlackBerry. Devices. Leveraging Two-factor Authentication. RSA Solution Brief

RSA Solution Brief. Providing Secure Access to Corporate Resources from BlackBerry. Devices. Leveraging Two-factor Authentication. RSA Solution Brief Providing Secure Access to Corporate Resources from BlackBerry Devices Leveraging Two-factor Authentication Augmenting the BlackBerry Enterprise Solution BlackBerry devices are becoming ubiquitous throughout

More information

WAP Security. Helsinki University of Technology S Security of Communication Protocols

WAP Security. Helsinki University of Technology S Security of Communication Protocols WAP Security Helsinki University of Technology S-38.153 Security of Communication Protocols Mikko.Kerava@iki.fi 15.4.2003 Contents 1. Introduction to WAP 2. Wireless Transport Layer Security 3. Other WAP

More information

CM0256 Pervasive Computing

CM0256 Pervasive Computing CM0256 Pervasive Computing Lecture 17 Software Development Approaches Tom Goodale t.r.goodale@cs.cardiff.ac.uk Lecture Outline In this lecture we: J2ME applications Palm. Device Limitations Limited Power

More information

Technical White Paper. Cube Engine Version 1.0

Technical White Paper. Cube Engine Version 1.0 Technical White Paper Cube Engine Version 1.0 Last Updated: Feb 06. 2018 1 Contents 1. Summary 1) Introduction 2) Overview 2. Features of Cube Chain 1) Cubing 2) Indexing Block 3) Statistics Block 4) Escrow

More information

Transaction Security Challenges & Solutions

Transaction Security Challenges & Solutions Transaction Security Challenges & Solutions A REPORT FROM NEWNET COMMUNICATION TECHNOLOGIES, LLC Copyright NewNet Communication Technologies, LLC. 700 East Butterfield Road, Suite 350, Lombard, IL 60148

More information

ASSESSMENT LAYERED SECURITY

ASSESSMENT LAYERED SECURITY FFIEC BUSINESS ACCOUNT GUIDANCE RISK & ASSESSMENT LAYERED SECURITY FOR ONLINE BUSINESS TRANSACTIONS New financial standards will assist banks and business account holders to make online banking safer and

More information

Meeting FFIEC Meeting Regulations for Online and Mobile Banking

Meeting FFIEC Meeting Regulations for Online and Mobile Banking Meeting FFIEC Meeting Regulations for Online and Mobile Banking The benefits of a smart card based authentication that utilizes Public Key Infrastructure and additional mechanisms for authentication and

More information

Network Security and Cryptography. 2 September Marking Scheme

Network Security and Cryptography. 2 September Marking Scheme Network Security and Cryptography 2 September 2015 Marking Scheme This marking scheme has been prepared as a guide only to markers. This is not a set of model answers, or the exclusive answers to the questions,

More information

Paying. on the go: Mobile payments slowly catch on in the United States

Paying. on the go: Mobile payments slowly catch on in the United States Paying on the go: Mobile payments slowly catch on in the United States apan adopted a mobile payment system for mass transit as a way to move millions of commuters through congested stations. Some African

More information

WHITE PAPER. Bluetooth 4 LE: the only viable solution for next generation payments

WHITE PAPER. Bluetooth 4 LE: the only viable solution for next generation payments WHITE PAPER Bluetooth 4 LE: the only viable solution for next generation payments 2 Introduction As the IoT and connected devices become more prevalent, our smartphones are becoming increasingly connected

More information

FACTS WHAT DOES FARMERS STATE BANK DO WITH YOUR PERSONAL INFORMATION? WHY? WHAT? HOW? L QUESTIONS?

FACTS WHAT DOES FARMERS STATE BANK DO WITH YOUR PERSONAL INFORMATION? WHY? WHAT? HOW? L QUESTIONS? FACTS WHAT DOES FARMERS STATE BANK DO WITH YOUR PERSONAL INFORMATION? WHY? WHAT? HOW? Financial companies choose how they share your personal information. Federal law gives consumers the right to limit

More information

Business Card Services StatementLook User s Guide Phone:

Business Card Services StatementLook User s Guide Phone: Business Card Services StatementLook User s Guide Phone: 1-800-441-4025 www.businesscardstatement.com Register Your Account... 2 Successful Registration First Time Login... 8 Forgot User Name... 10 Forgot

More information

WHITE PAPER. OAuth A new era in Identity Management and its Applications. Abstract

WHITE PAPER. OAuth A new era in Identity Management and its Applications. Abstract WHITE PAPER OAuth A new era in Identity Management and its Applications Abstract OAuth protocol is a standard which allows end users to share their web resources with the third-party applications without

More information

Design and Implementation of a Mobile Transactions Client System: Secure UICC Mobile Wallet

Design and Implementation of a Mobile Transactions Client System: Secure UICC Mobile Wallet Design and Implementation of a Mobile Transactions Client System: Secure UICC Mobile Wallet Hao Zhao, Sead Muftic School of Information and Communication Technologies (ICT) Royal Institute of Technology

More information

MASTERCARD PRICELESS SPECIALS INDIA PRIVACY POLICY

MASTERCARD PRICELESS SPECIALS INDIA PRIVACY POLICY Effective Date: 12 September 2017 MASTERCARD PRICELESS SPECIALS INDIA PRIVACY POLICY Mastercard respects your privacy. This Privacy Policy describes how we process personal data, the types of personal

More information

Secure Web Transactions. Sridhar Iyer K R School of Information Technology IIT Bombay

Secure Web Transactions. Sridhar Iyer K R School of Information Technology IIT Bombay Secure Web Transactions Sridhar Iyer K R School of Information Technology IIT Bombay sri@it.iitb.ernet.in http://www.it.iitb.ernet.in/~sri Overview Electronic Commerce Underlying Technologies Cryptography

More information

WHAT IS CORPORATE ACCOUNT TAKEOVER? HOW DOES IT HAPPEN?

WHAT IS CORPORATE ACCOUNT TAKEOVER? HOW DOES IT HAPPEN? WHAT IS CORPORATE ACCOUNT TAKEOVER? Corporate Account Takeover (also referred to as CATO) is a type of fraud where criminals gain access to a business financial accounts to make unauthorized transactions.

More information

Adaptive Authentication Adapter for Citrix XenApp. Adaptive Authentication in Citrix XenApp Environments. Solution Brief

Adaptive Authentication Adapter for Citrix XenApp. Adaptive Authentication in Citrix XenApp Environments. Solution Brief Adaptive Authentication Adapter for Citrix XenApp Adaptive Authentication in Citrix XenApp Environments Solution Brief RSA Adaptive Authentication is a comprehensive authentication platform providing costeffective

More information

CPSC 467b: Cryptography and Computer Security

CPSC 467b: Cryptography and Computer Security CPSC 467b: Cryptography and Computer Security Michael J. Fischer Lecture 24 April 16, 2012 CPSC 467b, Lecture 24 1/33 Kerberos Secure Shell (SSH) Transport Layer Security (TLS) Digital Rights Management

More information

JXTA for J2ME Extending the Reach of Wireless With JXTA Technology

JXTA for J2ME Extending the Reach of Wireless With JXTA Technology JXTA for J2ME Extending the Reach of Wireless With JXTA Technology Akhil Arora Carl Haywood Kuldip Singh Pabla Sun Microsystems, Inc. 901 San Antonio Road Palo Alto, CA 94303 USA 650 960-1300 The Wireless

More information

telensa.com @Telensa Telensa is the only firm monetizing multiple IoT applications including smart lighting and smart parking. We deliver ultra-scalable, private network solutions through Ultra Narrow

More information

Online Banking Security

Online Banking Security Online Banking Security Fabian Alenius Uwe Bauknecht May 17, 2009 Contents 1 Introduction 2 2 Secure Communication 2 2.1 Password authentication..................... 2 2.2 One-time Passwords.......................

More information

International Mobile Phone Top Up For Consumers & Merchants

International Mobile Phone Top Up For Consumers & Merchants International Mobile Phone Top Up For Consumers & Merchants 2017 What is CY.SEND? CY.SEND is an international prepaid mobile phone top up provider located in Switzerland for consumers and merchants. We

More information

white paper SMS Authentication: 10 Things to Know Before You Buy

white paper SMS Authentication: 10 Things to Know Before You Buy white paper SMS Authentication: 10 Things to Know Before You Buy SMS Authentication white paper Introduction Delivering instant remote access is no longer just about remote employees. It s about enabling

More information

Chapter 8 Web Security

Chapter 8 Web Security Chapter 8 Web Security Web security includes three parts: security of server, security of client, and network traffic security between a browser and a server. Security of server and security of client

More information

WHITE PAPER 2019 AUTHENTICATOR WHITE PAPER

WHITE PAPER 2019 AUTHENTICATOR WHITE PAPER WHITE PAPER 2019 AUTHENTICATOR WHITE PAPER 1 The Background to the WIZZIT Authenticator THE EVOLUTION OF AUTHENTICATION At its most basic level, bank grade authentication is built around a simple concept

More information

A Step By Step Guide To Use PayPal

A Step By Step Guide To Use PayPal A Step By Step Guide To Use PayPal Table of Contents Introduction... 3 Creating an Account... 4 PayPal Verification... 5 Verification Process... 5 Utility of Each Account... 7 Transfer of Funds... 8 Checking

More information

Improved Delegation Of Computation Using Somewhat Homomorphic Encryption To Reduce Storage Space

Improved Delegation Of Computation Using Somewhat Homomorphic Encryption To Reduce Storage Space Improved Delegation Of Computation Using Somewhat Homomorphic Encryption To Reduce Storage Space Dhivya.S (PG Scholar) M.E Computer Science and Engineering Institute of Road and Transport Technology Erode,

More information

MOBILE BANKING YET TO TAKE OFF IN THE UK DUE TO LACK OF TRUST IN SECURITY ACCORDING TO NEW CONSUMER SURVEY FROM FIRSTSOURCE SOLUTIONS

MOBILE BANKING YET TO TAKE OFF IN THE UK DUE TO LACK OF TRUST IN SECURITY ACCORDING TO NEW CONSUMER SURVEY FROM FIRSTSOURCE SOLUTIONS MOBILE BANKING YET TO TAKE OFF IN THE UK DUE TO LACK OF TRUST IN SECURITY ACCORDING TO NEW CONSUMER SURVEY FROM FIRSTSOURCE SOLUTIONS 80 per cent of users have not embraced mobile banking* 58 per cent

More information

The Tension. Security vs. ease of use: the more security measures added, the more difficult a site is to use, and the slower it becomes

The Tension. Security vs. ease of use: the more security measures added, the more difficult a site is to use, and the slower it becomes s10 Security 1 The Tension Security vs. ease of use: the more security measures added, the more difficult a site is to use, and the slower it becomes Security vs. desire of individuals to act anonymously

More information

Introduction : Motivation. 1.Introduction to theoretical concepts. 2. Micropayment : PayWord. 3. Streamobile : Videos streaming implementation

Introduction : Motivation. 1.Introduction to theoretical concepts. 2. Micropayment : PayWord. 3. Streamobile : Videos streaming implementation Cyril MAILLET Computer Science Last Year Project STREAMOBILE PROJECT : Videos Streaming over the Internet Tutor : Josep Domingo-Ferrer Supervision : Antoni Martínez-Ballesté Francesc Sebé 1 Last Year Project

More information

Welcome to First Security Mobile

Welcome to First Security Mobile Welcome to First Security Mobile Frequently Asked Questions Questions General How much does this service cost? Is it secure? Which wireless carriers are supported? Do I need a data plan? I'm not enrolled

More information

Assistance with University Projects? Research Reports? Writing Skills? We ve got you covered! www.assignmentstudio.net WhatsApp: +61-424-295050 Toll Free: 1-800-794-425 Email: contact@assignmentstudio.net

More information

Smart Cards and Authentication. Jose Diaz Director, Technical and Strategic Business Development Thales Information Systems Security

Smart Cards and Authentication. Jose Diaz Director, Technical and Strategic Business Development Thales Information Systems Security Smart Cards and Authentication Jose Diaz Director, Technical and Strategic Business Development Thales Information Systems Security Payment Landscape Contactless payment technology being deployed Speeds

More information

CPET 581 E-Commerce & Business Technologies. References

CPET 581 E-Commerce & Business Technologies. References CPET 581 E-Commerce & Business Technologies The E-Commerce Security Part 2 of 2 Paul I-Hai Lin, Professor http://www.etcs.ipfw.edu/~lin A Specialty Course for M.S. in Technology IT/Advanced Computer Applications

More information

AN APPLICATION OF ENTERPRISE WLAN SYSTEM FOR A UNIVERSITY CAMPUS

AN APPLICATION OF ENTERPRISE WLAN SYSTEM FOR A UNIVERSITY CAMPUS Abdurrahman Celebi Department of Information Technologies Office Beder University, Tirana, Albania acelebi@beder.edu.al AN APPLICATION OF ENTERPRISE WLAN SYSTEM FOR A UNIVERSITY CAMPUS Abstract Installation

More information

Hosted vs on-site IP-PBX A Guide for SMEs

Hosted vs on-site IP-PBX A Guide for SMEs Hosted vs on-site IP-PBX A Guide for SMEs This white paper analyses the distinct advantages and disadvantages of hosted and on-site IP-PBX systems, and compares the differing costs. It also includes a

More information

E-commerce security: SSL/TLS, SET and others. 4.1

E-commerce security: SSL/TLS, SET and others. 4.1 E-commerce security: SSL/TLS, SET and others. 4.1 1 Electronic payment systems Purpose: facilitate the safe and secure transfer of monetary value electronically between multiple parties Participating parties:

More information

Glossary. xii. Marina Yue Zhang and Mark Dodgson Downloaded from Elgar Online at 02/04/ :16:01PM via free access

Glossary. xii. Marina Yue Zhang and Mark Dodgson Downloaded from Elgar Online at 02/04/ :16:01PM via free access Glossary 2.5G Second-and-a-half Generation mobile communications system 3G Third Generation mobile communications system 3GPP The Third Generation Partnership Project ADSL Asymmetric Digital Subscriber

More information

Authlogics for Azure and Office 365

Authlogics for Azure and Office 365 Authlogics for Azure and Office 365 Single Sign-On and Flexible MFA for the Microsoft Cloud Whitepaper Authlogics, 12 th Floor, Ocean House, The Ring, Bracknell, Berkshire, RG12 1AX, United Kingdom UK

More information

TeamViewer Security Statement

TeamViewer Security Statement TeamViewer Security Statement 2017 TeamViewer GmbH, Last update: 05/2017 Target Group This document is aimed at professional network administrators. The information in this document is of a rather technical

More information

SECURITY ON PUBLIC WI-FI New Zealand. A guide to help you stay safe online while using public Wi-Fi

SECURITY ON PUBLIC WI-FI New Zealand. A guide to help you stay safe online while using public Wi-Fi SECURITY ON PUBLIC WI-FI New Zealand A guide to help you stay safe online while using public Wi-Fi WHAT S YOUR WI-FI PASSWORD? Enter password for the COFFEE_TIME Wi-Fi network An all too common question

More information

ADAPTIVE AUTHENTICATION ADAPTER FOR IBM TIVOLI. Adaptive Authentication in IBM Tivoli Environments. Solution Brief

ADAPTIVE AUTHENTICATION ADAPTER FOR IBM TIVOLI. Adaptive Authentication in IBM Tivoli Environments. Solution Brief ADAPTIVE AUTHENTICATION ADAPTER FOR IBM TIVOLI Adaptive Authentication in IBM Tivoli Environments Solution Brief RSA Adaptive Authentication is a comprehensive authentication platform providing costeffective

More information

Mobile Wallet Service Terms and Conditions

Mobile Wallet Service Terms and Conditions Mobile Wallet Service Terms and Conditions These Terms and Conditions govern your use of eligible debit or credit cards issued by Publix Employees Federal Credit Union (each, a "Payment Card") when you

More information

Stop in the name of EMV! Is merchant regulation breaking your heart? April 4, Amegy Bank, a division of ZB, N.A. Member FDIC

Stop in the name of EMV! Is merchant regulation breaking your heart? April 4, Amegy Bank, a division of ZB, N.A. Member FDIC Stop in the name of EMV! Is merchant regulation breaking your heart? April 4, 2017 Introductions Ana Chandler AVP, Treasury Management Sales Julie Fairbanks VP, Merchant Sales William (Bill) Rogers VP

More information

How. Biometrics. Expand the Reach of Mobile Banking ENTER

How. Biometrics. Expand the Reach of Mobile Banking ENTER How Biometrics Expand the Reach of Mobile Banking ENTER Table of Contents 01 The Mobile Banking Opportunity 02 What s Suppressing Mobile Adoption? 03 Onboarding Challenges: Proving One s Identity 04 Authentication

More information

White Paper. The Impact of Payment Services Directive II (PSD2) on Authentication & Security

White Paper. The Impact of Payment Services Directive II (PSD2) on Authentication & Security White Paper The Impact of Payment Services Directive II (PSD2) on Authentication & Security First Edition June 2016 Goode Intelligence All Rights Reserved Published by: Goode Intelligence Sponsored by:

More information

School of Computer Sciences Universiti Sains Malaysia Pulau Pinang

School of Computer Sciences Universiti Sains Malaysia Pulau Pinang School of Computer Sciences Universiti Sains Malaysia Pulau Pinang Information Security & Assurance Assignment 2 White Paper Virtual Private Network (VPN) By Lim Teck Boon (107593) Page 1 Table of Content

More information

SECURING CORPORATE ASSETS WITH TWO FACTOR AUTHENTICATION

SECURING CORPORATE ASSETS WITH TWO FACTOR AUTHENTICATION SECURING CORPORATE ASSETS WITH TWO FACTOR AUTHENTICATION Introduction Why static passwords are insufficient Introducing two-factor Authentication Form Factors for OTP delivery Contact information OTP generating

More information

Trusted Platform Module explained

Trusted Platform Module explained Bosch Security Systems Video Systems Trusted Platform Module explained What it is, what it does and what its benefits are 3 August 2016 2 Bosch Security Systems Video Systems Table of contents Table of

More information

Wireless Network Standard

Wireless Network Standard Last Modified: 10/20/15 Wireless Network Standard Purpose The standard and guidelines described in this document will ensure the uniformity of wireless network access points at the University of Georgia.

More information

ThinAir Server Platform White Paper June 2000

ThinAir Server Platform White Paper June 2000 ThinAir Server Platform White Paper June 2000 ThinAirApps, Inc. 1999, 2000. All Rights Reserved Copyright Copyright 1999, 2000 ThinAirApps, Inc. all rights reserved. Neither this publication nor any part

More information

Mobile Telephony and Broadband services

Mobile Telephony and Broadband services Mobile Telephony and Broadband services A way to reduce the gap of digital divide in Mediterranean Marios Yiatzidis Regulatory Manager 02 05 2006 Table of Contents The growth of mobile communications Mobile

More information

Terms and Conditions for Remote Data Transmission

Terms and Conditions for Remote Data Transmission Terms and Conditions for Remote Data Transmission (As amended on 15 November 2013) 1. Scope of services (1) The Bank is available to its Customer (account holder) for remote transmission of data by electronic

More information

Identity Theft, Fraud & You. PrePare. Protect. Prevent.

Identity Theft, Fraud & You. PrePare. Protect. Prevent. PrePare. Protect. Prevent. Identity Theft, Fraud & You Fraud and identity theft incidents claimed fewer victims in 2010 than in previous years. But don t get too comfortable. Average out-of-pocket consumer

More information

WHITE PAPER. Good Mobile Intranet Technical Overview

WHITE PAPER. Good Mobile Intranet Technical Overview WHITE PAPER Good Mobile Intranet CONTENTS 1 Introduction 4 Security Infrastructure 6 Push 7 Transformations 8 Differential Data 8 Good Mobile Intranet Server Management Introduction Good Mobile Intranet

More information

Achieving End-to-End Security in the Internet of Things (IoT)

Achieving End-to-End Security in the Internet of Things (IoT) Achieving End-to-End Security in the Internet of Things (IoT) Optimize Your IoT Services with Carrier-Grade Cellular IoT June 2016 Achieving End-to-End Security in the Internet of Things (IoT) Table of

More information

CSCE 548 Building Secure Software Entity Authentication. Professor Lisa Luo Spring 2018

CSCE 548 Building Secure Software Entity Authentication. Professor Lisa Luo Spring 2018 CSCE 548 Building Secure Software Entity Authentication Professor Lisa Luo Spring 2018 Previous Class Important Applications of Crypto User Authentication verify the identity based on something you know

More information

FUJITSU Backup as a Service Rapid Recovery Appliance

FUJITSU Backup as a Service Rapid Recovery Appliance FUJITSU Backup as a Service Rapid Recovery Appliance The unprecedented growth of business data The role that data plays in today s organisation is rapidly increasing in importance. It guides and supports

More information

E-Commerce/Web Security

E-Commerce/Web Security E-Commerce/Web Security Prepared For: Software Engineering 4C03 Kartik Sivaramakrishnan McMaster University 2005 Prepared by James Allin 9902847 1.0 - Introduction... 3 2.0 - E-Commerce Transaction Overview...

More information

4. B2C,B2E Systems: Concepts and Architectures

4. B2C,B2E Systems: Concepts and Architectures 4. B2C,B2E Systems: Concepts and Architectures 4.1 Business-to-Consumer Systems Architectures and Components Shop Functionalities, Selected Components 4.2 Electronic Fulfillment & Payment Secure Communication,

More information

Data Communication Prof.A.Pal Dept of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture - 40 Secured Communication - II

Data Communication Prof.A.Pal Dept of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture - 40 Secured Communication - II Data Communication Prof.A.Pal Dept of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture - 40 Secured Communication - II Hello and welcome to today's lecture on secured communication.

More information

FAQ: Privacy, Security, and Data Protection at Libraries

FAQ: Privacy, Security, and Data Protection at Libraries FAQ: Privacy, Security, and Data Protection at Libraries This FAQ was developed out of workshops and meetings connected to the Digital Privacy and Data Literacy Project (DPDL) and Brooklyn Public Library

More information

SSL/TLS & 3D Secure. CS 470 Introduction to Applied Cryptography. Ali Aydın Selçuk. CS470, A.A.Selçuk SSL/TLS & 3DSec 1

SSL/TLS & 3D Secure. CS 470 Introduction to Applied Cryptography. Ali Aydın Selçuk. CS470, A.A.Selçuk SSL/TLS & 3DSec 1 SSL/TLS & 3D Secure CS 470 Introduction to Applied Cryptography Ali Aydın Selçuk CS470, A.A.Selçuk SSL/TLS & 3DSec 1 SSLv2 Brief History of SSL/TLS Released in 1995 with Netscape 1.1 Key generation algorithm

More information

Securing today s identity and transaction systems:! What you need to know! about two-factor authentication!

Securing today s identity and transaction systems:! What you need to know! about two-factor authentication! Securing today s identity and transaction systems:! What you need to know! about two-factor authentication! 1 Today s Speakers! Alex Doll! CEO OneID Jim Fenton! Chief Security Officer OneID 2 Contents!

More information

DIGITAL IDENTITY TRENDS AND NEWS IN CHINA AND SOUTH EAST ASIA

DIGITAL IDENTITY TRENDS AND NEWS IN CHINA AND SOUTH EAST ASIA DIGITAL IDENTITY TRENDS AND NEWS IN CHINA AND SOUTH EAST ASIA 1 SECURING DIGITAL IDENTITY THE KEY TO ASIA S VAST POTENTIAL IN E-COMMERCE We are living through an exciting time for digital commerce in Asia.

More information

Gold finger: Fingerprints lead biometric authentication

Gold finger: Fingerprints lead biometric authentication Gold finger: Fingerprints lead biometric authentication The use of fingerprint authentication on smartphones has surged. As of mid-2017, 28 per cent of all smartphone owners aged 16-75 used fingerprint

More information

Servers for e-commerce Operational platforms eg: Web Servers, Application Servers etc. Performance planning and Monitoring Virtualisation

Servers for e-commerce Operational platforms eg: Web Servers, Application Servers etc. Performance planning and Monitoring Virtualisation Presenter: O Rane Gray The Business Aspect Networking Technology The Internet Networking fundamentals (Broadband) Communication Protocols Network Security and ecommerce -cybersecurity Authentication, Encryption,

More information

Phishing is Yesterday s News Get Ready for Pharming

Phishing is Yesterday s News Get Ready for Pharming April 2005 Copyright 2005 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries. Entrust is a registered trademark of Entrust

More information