Integration of Biometric authentication procedure in customer oriented payment system in trusted mobile devices.

@article{Raina2011IntegrationOB,
  title={Integration of Biometric authentication procedure in customer oriented payment system in trusted mobile devices.},
  author={Vibha Kaw Raina},
  journal={International Journal of Information Technology and Computer Science},
  year={2011},
  volume={1},
  pages={15-25}
}
  • V. K. Raina
  • Published 31 December 2011
  • Computer Science
  • International Journal of Information Technology and Computer Science
Mobile payments have become an important application in daily activities. The unique advantage of mobile payments over traditional payments has led to tremendous growth of mobile phones. The strong demand of mobile applications raised increased concern on the security of mobile applications as well as devices. New mobile devices are developed to serve various functions like storing sensitive information, accessing this information as well transacting this information through payment systems. In… 

Design of Improved Algorithm for Mobile Payments Using Biometrics

TLDR
This work will be designing a mobile payment system integrated with biometric authentication model which will provide the facility of mobile payments with increased security levels and that it would enable more and more people to use mobile payments system even with the simplest mobile phones.

Biometric and Traditional Mobile Authentication Techniques: Overviews and Open Issues

TLDR
This chapter gives an overview of the current mobile authentication mechanisms: traditional and biometric, and their most commonly used techniques in the mobile authentication environment and a comparison among these techniques will be conducted.

Implicit Authentication System for Smartphones Users Based on Touch Data

TLDR
A mobile App is developed to collect the data source of users’ biometrics and then features (pressure, position, size, and time) are extracted and classifiers were then applied to decide whether a user is the true owner of device or an impostor.

A proposed Iris Recognition Model for Authentication in Mobile Exams

TLDR
A model that uses a traditional username and password in addition to the biometric iris recognition technique to verify student identity before and during mobile exams is proposed.

Evaluation and performance comparison of a model for adoption of biometrics in online banking

TLDR
The results revealed that self-efficacy, perceived behavioural control, reliability, appearance, support, content, safety and privacy are important parameters that need to be carefully addressed by the bank management while considering adoption of Biometrics in online banking in Kuwait.

PAY-OFF System in E-ZPASS using RFID Technology

TLDR
Radio Frequency Identification (RFID) is a wireless technology, that is increasingly popular for smartphone applications including smart payments and device pairing whose effective communication range is only within a few millimeters.

Emerging Technologies for User-Friendly Mobile Payment Applications

TLDR
This chapter describes the different emerging technologies carried out between a resource-limited mobile device and a resources-rich computer server over wireless networks.

A Study on the Performance of Biometric Devices with Reference to Employee Interface

Biometric technology is a contemporary method of identifying and verifying individuals by studying human behavior. The study is focused on primary data obtained at random from numerous employees

Grobner Bases Method for Biometric Traits Identification and Encryption

TLDR
The normal methods of biometric templates matching are replaced by a more powerful and high quality identification approach based on Grobner bases computations, which gives particularly exact matching.

Biometrics: Effectiveness and Applications within the Blended Learning Environment

TLDR
This paper outlines an implementation and reports the effectiveness of the fingerprint model as a secure biometric method on a database consisting of 13000 students.

References

SHOWING 1-10 OF 34 REFERENCES

Biometric and ID Based User Authentication Mechanism Using Smart Cards for Multi-Server Environment

TLDR
A new efficient and secure multi server authentication scheme based on one way hash function without verification table is proposed to minimize the complexity of hash operation among all users and fit multi server communication environment.

Fuzzy Vault for Fingerprints

TLDR
This paper explores the realization of a previously proposed cryptographic construct, called fuzzy vault, with the fingerprint minutiae data, which aims to secure critical data with the fingerprints in a way that only the authorized user can access the secret by providing the valid fingerprint.

Biometrics Verification Techniques Combing with Digital Signature for Multimodal Biometrics Payment System

  • Jucheng Yang
  • Computer Science
    2010 International Conference on Management of e-Commerce and e-Government
  • 2010
TLDR
A digital signature procedure with the Public Key Infrastructure (PKI) to illustrate a multimodal biometrics payment system with safe model is proposed and can be applied to some public key platforms, too.

Mobile payment architectures for India

TLDR
This paper proposes new mobile payment architectures that support interoperability in India and recommends that initially the peer-to-peer design is chosen, and once the technology is more widespread, the central database option should be adopted.

New Shielding Functions to Enhance Privacy and Prevent Misuse of Biometric Templates

TLDR
This work introduces the concept of a delta-contracting and epsilon-revealing function which executes preprocessing in the biometric authentication scheme and believes that this concept can become a building block of a public infrastructure for biometrics authentication that nonetheless preserves privacy of the participants.

Biometric cryptosystems: issues and challenges

TLDR
This work presents various methods that monolithically bind a cryptographic key with the biometric template of a user stored in the database in such a way that the key cannot be revealed without a successful biometric authentication.

Personal authentication through biometric technologies

  • F. Podio
  • Computer Science
    Proceedings 2002 IEEE 4th International Workshop on Networked Appliances (Cat. No.02EX525)
  • 2002
TLDR
Topics, utilization scenarios in the home and an introduction to the state-of-the art of biometrics standards in place will be discussed.

Hiding Biometric Data

TLDR
This work introduces two applications of an amplitude modulation-based watermarking method, in which a user's biometric data is hidden in a variety of images and has the ability to increase the security of both the hiddenBiometric data and host images.

An introduction to biometric recognition

TLDR
A brief overview of the field of biometrics is given and some of its advantages, disadvantages, strengths, limitations, and related privacy concerns are summarized.

Are existing internet security measures guaranteed to protect user identity in the financial services industry?

TLDR
The internet security threats in the financial services industry are discussed, possible strategic and technical solutions are suggested, and it is becoming more difficult for businesses to survive let alone prosper and grow.