Don’t trust POS terminals! Verify in-shop payments with your phone

نویسندگان

  • Iulia Ion
  • Boris Dragovic
چکیده

Despite the advanced capabilities of the chip-enabled, debit and credit cards, fraud in payment transactions has not diminished it has shifted. The reason lies in the lack of a trusted communication path between the smartcard and the cardholder. More explicitly, because users have no means of verifying the authenticity of the Point-of-Sales (POS) terminal, they do not know how much they are about to pay nor to whom. We propose to use the camera-enabled mobile phone and a previously shared secret to create a two-way, secure communication channel. Messages from the card are displayed by the POS terminal as visual codes, then captured and decoded by the phone. Messages from the cardholder are computed by the phone and manually typed in as one-time PINs. We extend the EMV payment protocol to provide explicit verification and confirmation of the transaction amount. In the process we also improve cardholder authentication, protect against stolen PIN and cards, and eliminate the POS terminal from the trust chain altogether. The implementation requires minimal software updates and no hardware

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The diffusion pattern of non-cash payments: evidence from China

Exploiting an original dataset of non-cash payments during the period between 1996 and 2005, this study analyses the diffusion patterns of non-cash payments in China. Based on both exponential and Gompertz curves, the point of sale (POS) terminal has shown a higher diffusion rate than that of automatic teller machines (ATMs). This result is also robust when a time trend is interacted with rival...

متن کامل

RFID and the Middleman

Existing bank-card payment systems, such as EMV, have two serious vulnerabilities: the user does not have a trustworthy interface, and the protocols are vulnerable in a number of ways to man-in-themiddle attacks. Moving to RFID payments may, on the one hand, let bank customers use their mobile phones to make payments, which will go a fair way towards fixing the interface problem; on the other h...

متن کامل

Assurance on the Reliability of Mobile Payment System and Its Effects on Its’ Use: an Empirical Examination

Mobile Payment Systems (MPS) such as Google Wallet are an emerging technology. This paper examines if mobile assurance as provided by examining the five criteria, namely security, availability, processing integrity, confidentiality and privacy (as per the Trust Framework by the American Institute of Certified Public Accountants (AICPA)) has any relationship with use of MPS. The theory used for ...

متن کامل

Positing a Factorial Model for Consumer Trust in Mobile Payments

Payments via mobile and wireless terminal devices (i.e. cell phone/smartphone handsets) have been introduced by businesses for more than a decade now—alas mostly with less than desired success. There are numerous barriers to widespread adoption and the required wireless architectures are often prone to competitive as well as technological incompatibilities. However, one important acceptance/app...

متن کامل

Trust Building in Consumer Learning Process and Its Effect on Consumers' Behavioral Intention toward Mobile Payments

The era of mobile commerce is coming, and mobile payments will become an important channel for conducting transactions, especially concerning mobile commerce. However, we are still in the early days for global adoption of mobile payments. This research explores consumers’ trust building in the consumer learning process and its effect on consumers’ behavioral intention toward mobile payments. Re...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008