共查询到20条相似文献,搜索用时 484 毫秒
1.
Instead of the traditional credit card payment system, we propose a new electronic payment system for use in a mobile environment.
The idea behind this payment service is that a user (customer) applies a message delivery service to obtain a varied authentication
token from a servicing bank through his cell phone. The token is used to ensure the validity of the transaction and the legality
of the user. On the other hand, because only the user knows the authentication token, he/her cannot later deny that he/her
made the transaction. Therefore, in addition to authentication, the property of non-repudiation can also be achieved by using
our proposed scheme. Most importantly, our scheme does not require any credit card or tamper-resistant device (i.e. smart
card) to store critical information. Consequently, the electronic payment system enhances the security of the traditional
credit card payment system. The proposed scheme eliminates the risks of losing a card and duplicating the content of a user’s
card by a dishonest merchant. 相似文献
2.
Credits and debits on the Internet 总被引:2,自引:0,他引:2
Since the advent of banking in the Middle Ages, bank customers have used paper based instruments to move money between accounts. In the past 25 years (1972-97), electronic messages moving through private networks have replaced paper for most of the value exchanged among banks each day. With the arrival of the Internet as a mass market data network, new technologies and business models are being developed to facilitate electronic credit and debit transfers by ordinary consumers. These new systems include CyberCash (which is a gateway between the Internet and the authorization networks of the major credit cards) and the Secure Electronic Transactions protocol (a standard for presenting credit card transactions on the Internet), as well as First Virtual (a way of using e-mail to secure approval for credit card purchases of information), GC Tech (a payment system that can use credit or debit via an intermediation server), and NetBill (a public private key encryption system for purchasing information) 相似文献
3.
While microparticle (MP) assemblies have long attracted academic interest, few practical applications of assembled MPs have been achieved because of technological difficulties related to MP synthesis, MP position registration, and the absence of device concepts. The precise positioning of functional MPs in a proper stencil can produce flexible/stretchable electronic devices, even when the MPs themselves are rigid. In recent years, remarkable progress has been made in the programmable position registration of MPs, production of functional MPs, and concepts for MP‐based, pixel‐type electronic devices. This progress report reviews the recent technological advances in MP assembly and discusses the technological challenges preventing the realization of the one‐particle/one‐pixel concept. 相似文献
4.
Electronic equivalents of traditional cash payment systems are being launched worldwide. Electronic cash can combine the benefits of traditional cash with those of payment by debit and credit card, while circumventing both their shortcomings. As with traditional cash, electronic cash should have high acceptability and be suitable for low value payment from person to person. With the possible exception of online payment platforms such as the Internet, it is preferred that payments be verifiable offline, without the bank's involvement, for reasons of cost effectiveness and speed. To facilitate electronic cash payments over the phone and the Internet, physical proximity of payer and payee should not be necessary. Moreover, electronic cash should offer privacy of payments. In particular, payments by an honest payer should be untraceable, and information about transaction content should remain privy to payer and payee. Yet a payer ought to always be able to trace the payee; traceability suits electronic cash and is as open to extortion, money laundering, and bribery as a check or wire transfer. Lastly, as with payments by debit and credit card, electronic cash should be convenient to store and transport, while protecting users against loss, theft, and accidental destruction 相似文献
5.
Cash, cheque, credit card, debit card, store card-methods of payment can seem bewildering in their variety. Here, the author describes how the Mondex system of electronic cash could bring order, convenience and security to the inescapable need to pay for goods and services 相似文献
6.
7.
The worldwide boom in smartcard deployment is accelerating their evolution. What can be found in a typical wallet?, In all likelihood, bills and coins, a variety of credit cards, a driver's license, a transit pass, a voter registration card, a library card, a video rental card, insurance cards, frequent flyer and car rental cards, a telephone charge card. By the end of the century, all of these documents might be replaced by just two or three smartcards. Because they can store and protect relatively large amounts of data, smartcards are being used in a number of ways around the world, replacing a wallet's contents bit by bit. Stored value cards were in place last year (1996) in Atlanta, Ga., at Olympic venues, standing in for coins and bills. A health card identifying the holder's insurance provider and account number has been issued to every citizen of Germany, and plans are in place to add such medical information as the name of the holder's doctor, blood type, allergic reactions, medications, next of kin, and instructions in case of emergency. Smart social security cards in Spain interface with a kiosk system that can provide updated information on benefits and eligibility, as well as pertinent job opportunities. Today, most smartcards handle a single application, but will realize their true value when a single card can address multiple applications 相似文献
8.
《IEE Review》1992,38(6):227-231
A prepayment card is usually the size and shape of a credit card and has value encoded on it, which is partially used for each purchase until none is left. The card is then normally thrown away, although a growing minority of prepayment cards are designed to be recharged and used again. Prepayment cards usually need some electronic device at the point of sale to carry out the decrementing, and a reloading facility requires other equipment that accepts banknotes, credit or debit cards to put value on the card. So far, payphones and `stored-value tickets' for trains and buses are the largest applications. The author describes the technology involved in magnetic stripe, optical and chip cards. The author discusses the security features of each type of card 相似文献
9.
凌晨添 《微电子学与计算机》2011,28(10)
自动信用卡欺诈检测是一个重要且有潜力的领域.基于人工神经网络的欺诈检测系统虽能令人满意.但具有良好结构的神经网络是很难构造的.由此提出一种进化方法来自适应地生成用于欺诈检测的神经网络结构.实验结果表明,该进化神经网络可以有效地完成信用卡欺诈检测. 相似文献
10.
信用卡是电子支付中最常用的支付方式.为此世界两大信用卡组织Visa和MasterCard相继开发出3-D Secure与SecureCode技术.用来保证信用卡网上支竹的安全性.文中在对这两种技术的功能及流程进行简要介绍的基础上,从功能结构、使用流程等方面对比分析了这两种安全支付模式的区别,并对其各自的优缺点加以论述. 相似文献
11.
Internet的普及,促使网上购物、网上交易迅速发展。随之出现的信息安全问题逐渐引起了社会各界的关注。作为全球化的商业操作,电子商务对其安全性提出了特别的要求。SET(Security Electronic Transaction)规范是专为电子商务应用而设计的。本文详细评介了SET规范。 相似文献
12.
应用不经意多项式估值协议构造了一种非对称的公钥叛逆者追踪方案。该方案具有无需任何可信方和不泄漏用户敏感信息(如信用卡号码或数字签字密钥)的非对称追踪能力,以及自身强化性、直接不可否认性、防诬陷性等特性。更重要的是,数据供应商能够动态地撤销或恢复某个叛逆者解密密钥的解密权限,而无需更新其他用户的解密密钥。 相似文献
13.
14.
15.
Identification using integrated-circuit cards in credit card format with a built-in microcontroller (smart cards) is examined. The process by which the terminal's card adapter device verifies the authenticity of the smart card, called cryptographic node authentication, is examined. The methods used for node authentication, all of which are based on interrogation protocols, can be divided into the following categories on the basis of their fundamental cryptographic principles: challenge response with symmetrical key algorithms; challenge response with trapdoor public key algorithms; and zero-knowledge-based protocols. The various methods are described and compared, and the outlook for standardization is assessed 相似文献
16.
Single-event transient (SET) induced soft errors are becoming more and more a threat to the reliability of electronic systems in space. The SET pulse width is an important parameter characterizing the possibility of an SET being latched by a sequential element such as a flip-flop. This paper improves the widely used on-chip self-triggered SET measurement circuit by changing it from a single SET measurement module to a combination of two modules. One module is responsible for measuring narrow SET pulse widths while the other is responsible for measuring modest and wide SET pulse widths. In this way, the range of measurable SET pulse width is increased. Pulsed laser facility is used to simulate single-event transients induced by single-particles. Experimental results demonstrate that the minimum accurately measured SET pulse width is decreased from 166.5 ps to 33.3 ps after adopting the proposed design when compared with the original one. SET pulse width broadening effect was also observed using the measurement system. The broadening factor was measured to be 0.123–0.143 ps/inverter. 相似文献
17.
A new approach to prepayment schemes could make it easier for UK consumers to shop around for the best value gas and electricity. The proposed approach to smart prepayment uses the same building blocks as a traditional budget scheme. For each day of the week, the meter records the energy used in each half hour period and calculates average usage over a specified period which can be monthly, quarterly etc. The majority of consumers will fall into a small number of profiles, so matching the consumption pattern to one of a number of preprogrammed profiles downloaded from the vending system via the smart card or communications channel would take up less storage space. When the customer wants to top up their gas or electricity credit they visit a vending machine which uses the consumption data stored on their card to allocate a tariff and calculates how much energy to offer the consumer for their money. A multi-supplier machine could even compare the different tariffs available to a customer with a particular profile and offer the cheapest. Once the transaction is complete, the card is credited with the amount of energy purchased for downloading to the meter. The meter would be capable of interrupting the supply when credit has been used, although there would probably have to be an emergency credit facility-paid back at the next transaction-to provide a period of grace 相似文献
18.
近年来,离群点检测已经引起人们的广泛关注. 离群点检测在网络入侵检测、信用卡欺诈、电子商务犯罪、医疗诊断以及反恐等诸多领域都具有十分重要的作用. 离群点检测的目的是为了发现数据集中的一小部分对象,与数据集中其余的大部分对象相比,这一小部分对象有着特殊的行为或者具有反常的属性. 针对现有的离群点检测方法不能有效处理不确定与不完整数据的问题,本文将粗糙集中边界的概念与 Knorr 等所提出的基于距离的离群点检测方法结合在一起,在粗糙集的框架中提出一种新的离群点定义与检测方法. 针对于该方法,我们设计出相应的离群点检测算法 BDOD,并且通过在临床诊断数据集上所进行的实验,验证了算法BDOD的有效性. 实验结果表明本文的方法为处理离群点检测中的不确定与不完整数据问题提供了一条新的途径. 相似文献
19.
Dorst L. Hoeksfra A. van den Akker J.M. Breeman J. Groen F.C.A. Lagerberg J. Visser A. Yakali H. Hertzberger L.O. 《IEEE instrumentation & measurement magazine》1998,1(2):18-25
The Dutch government is considering placing Automatic Debiting Systems (ADS) for electronic fee collection (EFC) on the highways. These systems would interact via a transponder in each passing car, and subtract a fee from the driver's credit card. Nonpayers would be photographed and fined. The ultimate goal is to use these systems to influence road usage. It is shown how the concept of virtual sensors, designed for goal-directed sensing in (robotic) autonomous systems, can be used in the design of the simulation. It is also shown how this forces the choice for a discrete event simulation, which in turn affects the implementation of the virtual sensor concept 相似文献
20.
Loewke KE Camarillo DB Piyawattanametha W Mandella MJ Contag CH Thrun S Salisbury JK 《IEEE transactions on bio-medical engineering》2011,58(1):159-171
Recent advances in optical imaging have led to the development of miniature microscopes that can be brought to the patient for visualizing tissue structures in vivo. These devices have the potential to revolutionize health care by replacing tissue biopsy with in vivo pathology. One of the primary limitations of these microscopes, however, is that the constrained field of view can make image interpretation and navigation difficult. In this paper, we show that image mosaicing can be a powerful tool for widening the field of view and creating image maps of microanatomical structures. First, we present an efficient algorithm for pairwise image mosaicing that can be implemented in real time. Then, we address two of the main challenges associated with image mosaicing in medical applications: cumulative image registration errors and scene deformation. To deal with cumulative errors, we present a global alignment algorithm that draws upon techniques commonly used in probabilistic robotics. To accommodate scene deformation, we present a local alignment algorithm that incorporates deformable surface models into the mosaicing framework. These algorithms are demonstrated on image sequences acquired in vivo with various imaging devices including a hand-held dual-axes confocal microscope, a miniature two-photon microscope, and a commercially available confocal microendoscope. 相似文献