Bachelor Thesis Smart Card Based Solutions for Secure Internet Banking with a primitive reader or mobile phone

نویسنده

  • Feng Zhu
چکیده

Internet Banking is performed in an insecure environment, that is, both the PC and the web browser may have viruses and spyware. Therefore the sensitive data such as client passwords and financial transactions can be eavesdropped and modified. This paper presents two smart card based solutions for Internet Banking. Unlike most of earlier approaches which handles all the sensitive data using the web browser, both proposed solutions provides an trusted system which processing the sensitive data using a smart card with a micro-processor and on-card operating system. The difference between two solutions is that the first one uses a primitive smart card reader (connected to the PC) with the trusted display and keypad, whereas the other makes use of a mobile phone (and the smart card) to provide a trusted computing base for Internet Banking. Since the modern mobile phone has bigger screen and enough computing power, the mobile phone approach does not necessarily require a PC to be involved. For both solutions, we have shown that the integrity of client’s transactions can be ensured. Furthermore, if we assume that the hardware and the software of the mobile phone can be trusted, then some other security aspects in Internet Banking can be achieved with the mobile phone solution. These aspects includes the authentication of the client and the bank, the confidentiality and the integrity of the client’s financial information (not only the transactions).

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Softer Smartcards - Usable Cryptographic Tokens with Secure Execution

Cryptographic smartcards provide a standardized, interoperable way for multi-factor authentication. They bridge the gap between strong asymmetric authentication and short, user-friendly passwords (PINs) and protect long-term authentication secrets against malware and phishing attacks. However, to prevent malware from capturing entered PINs such cryptographic tokens must provide secure means for...

متن کامل

A Mobile and Fog-based Computing Method to Execute Smart Device Applications in a Secure Environment

With the rapid growth of smart device and Internet of things applications, the volume of communication and data in networks have increased. Due to the network lag and massive demands, centralized and traditional cloud computing architecture are not accountable to the high users' demands and not proper for execution of delay-sensitive and real time applications. To resolve these challenges, we p...

متن کامل

Mobile Smart Card Reader Using NFC-Enabled Smartphones

Due to the increasing use of electronic systems in all fields of everyday life, users are now having to deal with electronic identification and authentication practically every day. Password based authentication systems are neither secure nor particularly convenient for users. Here, we are presenting the idea of using an NFC-enabled mobile phone as a chip card reader for contactless smart cards...

متن کامل

Mobile Devices to the Identity Rescue

Identity management is defined as the set of processes related to identity and access information for the whole identity life cycle in a system. In the open internet users need new methods for identity management that supply reliable authentication and sufficient user control. Currently applied methods often lack a proper level of security (e.g., passwords) and privacy (e.g., diverse processing...

متن کامل

New methods and solutions based on Contactless smart-card (CSC) for Customer servicing and CRM development in a muti- modal / inter-modal transport environment

This paper deals with customer identification and access control to personnalized services in the context of multimodal transport services and in-car telematics services. We present a vision or concept of the e-Pass, a universal portable secure object for transport. We illustrate it with the CarSharing service and its use scenarios and discuss the suitability of mobile technologies, contactless...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009