首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 484 毫秒
1.
Instead of the traditional credit card payment system, we propose a new electronic payment system for use in a mobile environment. The idea behind this payment service is that a user (customer) applies a message delivery service to obtain a varied authentication token from a servicing bank through his cell phone. The token is used to ensure the validity of the transaction and the legality of the user. On the other hand, because only the user knows the authentication token, he/her cannot later deny that he/her made the transaction. Therefore, in addition to authentication, the property of non-repudiation can also be achieved by using our proposed scheme. Most importantly, our scheme does not require any credit card or tamper-resistant device (i.e. smart card) to store critical information. Consequently, the electronic payment system enhances the security of the traditional credit card payment system. The proposed scheme eliminates the risks of losing a card and duplicating the content of a user’s card by a dishonest merchant.  相似文献   

2.
Credits and debits on the Internet   总被引:2,自引:0,他引:2  
Sirbu  M.A. 《Spectrum, IEEE》1997,34(2):23-29
Since the advent of banking in the Middle Ages, bank customers have used paper based instruments to move money between accounts. In the past 25 years (1972-97), electronic messages moving through private networks have replaced paper for most of the value exchanged among banks each day. With the arrival of the Internet as a mass market data network, new technologies and business models are being developed to facilitate electronic credit and debit transfers by ordinary consumers. These new systems include CyberCash (which is a gateway between the Internet and the authorization networks of the major credit cards) and the Secure Electronic Transactions protocol (a standard for presenting credit card transactions on the Internet), as well as First Virtual (a way of using e-mail to secure approval for credit card purchases of information), GC Tech (a payment system that can use credit or debit via an intermediation server), and NetBill (a public private key encryption system for purchasing information)  相似文献   

3.
While microparticle (MP) assemblies have long attracted academic interest, few practical applications of assembled MPs have been achieved because of technological difficulties related to MP synthesis, MP position registration, and the absence of device concepts. The precise positioning of functional MPs in a proper stencil can produce flexible/stretchable electronic devices, even when the MPs themselves are rigid. In recent years, remarkable progress has been made in the programmable position registration of MPs, production of functional MPs, and concepts for MP‐based, pixel‐type electronic devices. This progress report reviews the recent technological advances in MP assembly and discusses the technological challenges preventing the realization of the one‐particle/one‐pixel concept.  相似文献   

4.
Chaum  D. Brands  S. 《Spectrum, IEEE》1997,34(2):30-34
Electronic equivalents of traditional cash payment systems are being launched worldwide. Electronic cash can combine the benefits of traditional cash with those of payment by debit and credit card, while circumventing both their shortcomings. As with traditional cash, electronic cash should have high acceptability and be suitable for low value payment from person to person. With the possible exception of online payment platforms such as the Internet, it is preferred that payments be verifiable offline, without the bank's involvement, for reasons of cost effectiveness and speed. To facilitate electronic cash payments over the phone and the Internet, physical proximity of payer and payee should not be necessary. Moreover, electronic cash should offer privacy of payments. In particular, payments by an honest payer should be untraceable, and information about transaction content should remain privy to payer and payee. Yet a payer ought to always be able to trace the payee; traceability suits electronic cash and is as open to extortion, money laundering, and bribery as a check or wire transfer. Lastly, as with payments by debit and credit card, electronic cash should be convenient to store and transport, while protecting users against loss, theft, and accidental destruction  相似文献   

5.
Everett  D. 《IEE Review》1997,43(2):59-62
Cash, cheque, credit card, debit card, store card-methods of payment can seem bewildering in their variety. Here, the author describes how the Mondex system of electronic cash could bring order, convenience and security to the inescapable need to pay for goods and services  相似文献   

6.
SETBOC--一种新型的基于单向身份认证的安全电子交易协议   总被引:4,自引:0,他引:4  
黄少寅  陈勇  高传善 《通信学报》2003,24(12):170-176
传统的安全电子交易协议需做交易3方交叉认证,协议复杂、实用性差。本文提出了一种新型的基于单向身份认证技术的安全电子交易协议SETBOC,支持客户、商家、银行间的相互身份认证,并提供了交易的冲突仲裁策略,具有效率高、符合钱原子性、易实现优点。  相似文献   

7.
Fancher  C.H. 《Spectrum, IEEE》1997,34(2):47-53
The worldwide boom in smartcard deployment is accelerating their evolution. What can be found in a typical wallet?, In all likelihood, bills and coins, a variety of credit cards, a driver's license, a transit pass, a voter registration card, a library card, a video rental card, insurance cards, frequent flyer and car rental cards, a telephone charge card. By the end of the century, all of these documents might be replaced by just two or three smartcards. Because they can store and protect relatively large amounts of data, smartcards are being used in a number of ways around the world, replacing a wallet's contents bit by bit. Stored value cards were in place last year (1996) in Atlanta, Ga., at Olympic venues, standing in for coins and bills. A health card identifying the holder's insurance provider and account number has been issued to every citizen of Germany, and plans are in place to add such medical information as the name of the holder's doctor, blood type, allergic reactions, medications, next of kin, and instructions in case of emergency. Smart social security cards in Spain interface with a kiosk system that can provide updated information on benefits and eligibility, as well as pertinent job opportunities. Today, most smartcards handle a single application, but will realize their true value when a single card can address multiple applications  相似文献   

8.
《IEE Review》1992,38(6):227-231
A prepayment card is usually the size and shape of a credit card and has value encoded on it, which is partially used for each purchase until none is left. The card is then normally thrown away, although a growing minority of prepayment cards are designed to be recharged and used again. Prepayment cards usually need some electronic device at the point of sale to carry out the decrementing, and a reloading facility requires other equipment that accepts banknotes, credit or debit cards to put value on the card. So far, payphones and `stored-value tickets' for trains and buses are the largest applications. The author describes the technology involved in magnetic stripe, optical and chip cards. The author discusses the security features of each type of card  相似文献   

9.
自动信用卡欺诈检测是一个重要且有潜力的领域.基于人工神经网络的欺诈检测系统虽能令人满意.但具有良好结构的神经网络是很难构造的.由此提出一种进化方法来自适应地生成用于欺诈检测的神经网络结构.实验结果表明,该进化神经网络可以有效地完成信用卡欺诈检测.  相似文献   

10.
信用卡是电子支付中最常用的支付方式.为此世界两大信用卡组织Visa和MasterCard相继开发出3-D Secure与SecureCode技术.用来保证信用卡网上支竹的安全性.文中在对这两种技术的功能及流程进行简要介绍的基础上,从功能结构、使用流程等方面对比分析了这两种安全支付模式的区别,并对其各自的优缺点加以论述.  相似文献   

11.
Internet的普及,促使网上购物、网上交易迅速发展。随之出现的信息安全问题逐渐引起了社会各界的关注。作为全球化的商业操作,电子商务对其安全性提出了特别的要求。SET(Security Electronic Transaction)规范是专为电子商务应用而设计的。本文详细评介了SET规范。  相似文献   

12.
李勇  张果 《通信技术》2002,(11):82-85
应用不经意多项式估值协议构造了一种非对称的公钥叛逆者追踪方案。该方案具有无需任何可信方和不泄漏用户敏感信息(如信用卡号码或数字签字密钥)的非对称追踪能力,以及自身强化性、直接不可否认性、防诬陷性等特性。更重要的是,数据供应商能够动态地撤销或恢复某个叛逆者解密密钥的解密权限,而无需更新其他用户的解密密钥。  相似文献   

13.
14.
移动支付空中圈存技术研究   总被引:2,自引:0,他引:2  
空中圈存作为移动支付业务的核心功能之一,为移动支付业务提供了与传统IC卡支付业务所不同的非常重要的差异化服务。本文在对空中圈存业务实现原理及关键问题进行分析的同时,对空中圈存技术中的圈存安全机制、交易保护机制等重点问题进行了深入研究,提出了一种可行的空中圈存技术实现方案,供移动支付运营商及应用方在发展空中圈存业务过程中参考。  相似文献   

15.
Identification using integrated-circuit cards in credit card format with a built-in microcontroller (smart cards) is examined. The process by which the terminal's card adapter device verifies the authenticity of the smart card, called cryptographic node authentication, is examined. The methods used for node authentication, all of which are based on interrogation protocols, can be divided into the following categories on the basis of their fundamental cryptographic principles: challenge response with symmetrical key algorithms; challenge response with trapdoor public key algorithms; and zero-knowledge-based protocols. The various methods are described and compared, and the outlook for standardization is assessed  相似文献   

16.
Single-event transient (SET) induced soft errors are becoming more and more a threat to the reliability of electronic systems in space. The SET pulse width is an important parameter characterizing the possibility of an SET being latched by a sequential element such as a flip-flop. This paper improves the widely used on-chip self-triggered SET measurement circuit by changing it from a single SET measurement module to a combination of two modules. One module is responsible for measuring narrow SET pulse widths while the other is responsible for measuring modest and wide SET pulse widths. In this way, the range of measurable SET pulse width is increased. Pulsed laser facility is used to simulate single-event transients induced by single-particles. Experimental results demonstrate that the minimum accurately measured SET pulse width is decreased from 166.5 ps to 33.3 ps after adopting the proposed design when compared with the original one. SET pulse width broadening effect was also observed using the measurement system. The broadening factor was measured to be 0.123–0.143 ps/inverter.  相似文献   

17.
Cowburn  J. 《IEE Review》2001,47(4):17-20
A new approach to prepayment schemes could make it easier for UK consumers to shop around for the best value gas and electricity. The proposed approach to smart prepayment uses the same building blocks as a traditional budget scheme. For each day of the week, the meter records the energy used in each half hour period and calculates average usage over a specified period which can be monthly, quarterly etc. The majority of consumers will fall into a small number of profiles, so matching the consumption pattern to one of a number of preprogrammed profiles downloaded from the vending system via the smart card or communications channel would take up less storage space. When the customer wants to top up their gas or electricity credit they visit a vending machine which uses the consumption data stored on their card to allocate a tariff and calculates how much energy to offer the consumer for their money. A multi-supplier machine could even compare the different tariffs available to a customer with a particular profile and offer the cheapest. Once the transaction is complete, the card is credited with the amount of energy purchased for downloading to the meter. The meter would be capable of interrupting the supply when credit has been used, although there would probably have to be an emergency credit facility-paid back at the next transaction-to provide a period of grace  相似文献   

18.
基于边界和距离的离群点检测   总被引:4,自引:1,他引:3       下载免费PDF全文
近年来,离群点检测已经引起人们的广泛关注. 离群点检测在网络入侵检测、信用卡欺诈、电子商务犯罪、医疗诊断以及反恐等诸多领域都具有十分重要的作用. 离群点检测的目的是为了发现数据集中的一小部分对象,与数据集中其余的大部分对象相比,这一小部分对象有着特殊的行为或者具有反常的属性. 针对现有的离群点检测方法不能有效处理不确定与不完整数据的问题,本文将粗糙集中边界的概念与 Knorr 等所提出的基于距离的离群点检测方法结合在一起,在粗糙集的框架中提出一种新的离群点定义与检测方法. 针对于该方法,我们设计出相应的离群点检测算法 BDOD,并且通过在临床诊断数据集上所进行的实验,验证了算法BDOD的有效性. 实验结果表明本文的方法为处理离群点检测中的不确定与不完整数据问题提供了一条新的途径.  相似文献   

19.
The Dutch government is considering placing Automatic Debiting Systems (ADS) for electronic fee collection (EFC) on the highways. These systems would interact via a transponder in each passing car, and subtract a fee from the driver's credit card. Nonpayers would be photographed and fined. The ultimate goal is to use these systems to influence road usage. It is shown how the concept of virtual sensors, designed for goal-directed sensing in (robotic) autonomous systems, can be used in the design of the simulation. It is also shown how this forces the choice for a discrete event simulation, which in turn affects the implementation of the virtual sensor concept  相似文献   

20.
Recent advances in optical imaging have led to the development of miniature microscopes that can be brought to the patient for visualizing tissue structures in vivo. These devices have the potential to revolutionize health care by replacing tissue biopsy with in vivo pathology. One of the primary limitations of these microscopes, however, is that the constrained field of view can make image interpretation and navigation difficult. In this paper, we show that image mosaicing can be a powerful tool for widening the field of view and creating image maps of microanatomical structures. First, we present an efficient algorithm for pairwise image mosaicing that can be implemented in real time. Then, we address two of the main challenges associated with image mosaicing in medical applications: cumulative image registration errors and scene deformation. To deal with cumulative errors, we present a global alignment algorithm that draws upon techniques commonly used in probabilistic robotics. To accommodate scene deformation, we present a local alignment algorithm that incorporates deformable surface models into the mosaicing framework. These algorithms are demonstrated on image sequences acquired in vivo with various imaging devices including a hand-held dual-axes confocal microscope, a miniature two-photon microscope, and a commercially available confocal microendoscope.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号