77,531 research outputs found

    Secure electronic payments for Islamic finance

    Get PDF
    Secure electronic payment systems are of paramount importance in supporting the further development of electronic commerce. While an electronic payment system must meet the needs of both businesses and consumers, most of the current electronic payment schemes are based on the traditional methods of finance we are familiar with in the western world. The main aim of this thesis is to develop new secure electronic payment schemes that satisfy the requirements posed by Islamic finance principles, which forbid the payment or receipt of interest. After providing a generic model for an electronic payment system, a description of some of the properties that distinguish the various types of electronic payment systems is given. The thesis then reviews examples of electronic payment schemes that are relevant to this thesis. The main concepts underlying Islamic finance are also introduced. The main contribution of this thesis is to propose four protocols that can be used to conduct secure electronic commerce transactions in a way that is consistent with Islamic financial principles. In the theme of developing new schemes to enable new participants to benefit from electronic payments, we also propose a simple and secure interpersonal payment system. EMV compliant IC cards have been developed to secure traditional Point of Sale debit/credit transactions. In this thesis, we propose a way to use EMV-compliant cards to conduct an electronic Murabaha transaction with the goal of exploiting the widespread deployment of EMV cards. The Internet is the platform on which most electronic commerce transactions are performed. To build upon this base, this thesis presents a method for conducting a secure electronic Murabaha transaction using the Internet. The increase in ownership of mobile phones suggests that they can be an effective means of authorising payment in electronic commerce transactions, offering security and convenience advantages by comparison with on-line payments conducted using PCs only. Therefore, this thesis proposes a new GSM-based payment system that enhances the security of Internet Murabaha transactions. Although many charities have a web presence, almost all of them have been designed to accept credit cards as the only means for making donations. The anonymity requirements of many donors, however, make the existing means of donation inappropriate for them. A new scheme supporting anonymous donations and distribution of these donations is therefore proposed

    TRADECARD: Building A Global Trading Electronic Payment System

    Get PDF
    In an attempt to provide an on-line payment mechanism for large-dollar cross-border transactions, TradeCard Inc. developed the world\u27s first and only credit card for international trade. This case study discusses the major issues surrounding the viability of such a B2B electronic payment architecture. How would TradeCard provide a seamless and secure on-line settlement transaction? Is its platform capable of synchronizing all the databases involved in international transactions yet allowing all companies to use their own tools, operating systems and hardware platforms? How would TradeCard aggregate the disparate services offered by the network of companies involved in international trade? Would it change the mindset of global traders so that they would use its services rather than the traditional off-line settlement methods? The case discusses the critical issues involved in creating an international electronic payment system for cross-border transactions; the impact of new on-line alternative payment mechanisms on international trade payment environment; the systems security requirements for safe electronic payments for B2B e-commerce; and TradeCard\u27s business plan and marketing strategy in building a global e-commerce trading system

    Electronic business and electronic commerce (supporting lecture notes for students of dirеction "Management" of all forms of education)

    Get PDF
    E-Business systems naturally have greater security risks than traditional business systems, therefore it is important for e-business systems to be fully protected against these risks. Customers, suppliers, employees, and numerous other people use any particular e-business system daily and expect their confidential information to stay secure. Hackers are one of the great threats to the security of e-businesses. Some common security concerns for e-Businesses include keeping business and customer information private and confidential, authenticity of data, and data integrity. Some of the methods of protecting e-business security and keeping information secure include physical security measures as well as data storage, data transmission, anti-virus software, firewalls, and encryption to list a few.Розглянуто та рекомендовано до друку на засіданні кафедри інноваційного менеджменту та підприємництва, протокол No1 від 27 серпня 2015 року. Схвалено та рекомендовано до друку на засіданні методичної комісії факультету управління та бізнесу у виробництві Тернопільського національного технічного університету імені Івана Пулюя, протокол No6 від 26 лютого 2016 року.The purpose of thе document is to present the different underlying "technologies" (in reality, organizational modes based on information and communication technologies) and their associated acronyms. The term "e-Business" therefore refers to the integration, within the company, of tools based on information and communication technologies (generally referred to as business software) to improve their functioning in order to create value for the enterprise, its clients, and its partners.Topic 1. Basic concepts of electronic business and electronic commerce 1.1. Basic concepts and principles of e-business. 1.2. Origins and growth of e-commerce. Topic 2. Ecommerce as a part of electronic business 2.1. E-business infrastructure, e-environment and e-business strategy 2.2. Ways of e-business conducting. Online trading. Topic 3. Basis of global computer network internet functioning. 3.1. Basic principles of internet. 3.2. The most common services of Іnternet. 3.3. The concept and structure of Internet marketing. Topic 4. E-commerce systems in corporate sector 4.1. The basic processes of implementation of electronic commerce in the B2B sector. Virtual enterprise, internet incubator, mobile commerce. 4.2. The role of supply-chain management (SCM) and customer relationship management (CRM) in e-commerce. Topic 5. Information management for effective e-commerce building through intranet and extranet 5.1. Basic principles of Intranet functioning. 5.2. Extranet and its security issues. Topic 6. Electronic payment systems 6.1. Electronic payment systems. 6.2. Primary classification of payment systems

    Secured e-payment system based on automated authentication data and iterated salted hash algorithm

    Get PDF
    Electronic payment has been considered as one of the most significant and convenient applications of modern electronic services e-University compared to traditional methods that impose time-consuming, human resources, and inefficiency. Different automatic identification technologies have been widely used, such as radio frequency identification (RFID). Extensive research and several applications are focusing on taking the maximum advantage of RFID technology. Data and information security had considered a crucial role when information concerning e-commerce, e-banking, or e-payments, especially due to it required real data to establish accessed illegally. Hence, data originality and security fall a very significant and critical issue in data communication services in recent years. Applications such as e-banking or e-commerce regularly contain sensitive and personal information that should be managed and controlled by authorized persons. Thus, keeping a secure password is important to prevent unauthorized users from illegal access. The password hashing is one of the safety methods and means of preventing attacks. In this article, focuses on proposing an RFID based electronic payment and also provide multi-level security privileges for an academic domain by using RFID technology besides the programmable logic circuit as well the system used VB.Net C# environment also desktop and web-based application for system working purposes. The proposed system aims to manage student payments in a secure manner and provides the capabilities of getting a bus ticket, copying books, buying food, paying registration fees, and other services. The results have shown the system is secured by using the confirmation code in addition to password encryption

    A secure electronic Murabaha transaction

    Get PDF
    Conventional credit card transactions are not consistent with Islamic principles, as exemplified by the Islamic banking system and the ‘Murabaha sale’. Thus, if Islamic principles are to be applied to e-commerce, where credit card transactions are the norm, a new and secure electronic payment process is required. In this paper we present a method for secure electronic Murabaha transactions. After introducing the notion of Murabaha sale within the Islamic banking framework, we describe a general model for a secure electronic Murabaha transaction, and then consider the associated security risks. Security requirements are then identified for a secure electronic Murabaha transaction. We then present the Secure Electronic Murabaha Transaction (SEMT), designed to address the identified security requirements. Finally, we analyse how the proposed protocol matches the identified security requirements. 1

    Design of secure mobile payment protocols for restricted connectivity scenarios

    Get PDF
    The emergence of mobile and wireless networks made posible the extensión of electronic commerce to a new area of research: mobile commerce called m-commerce, which includes mobile payment), that refers to any e-commerce transaction made from a mobile device using wireless networks. Most of the mobile payment systems found in the literatura are based on the full connectivity scenario where all the entities are directly connected one to another but do not support business models with direct communication restrictions between the entities of the system is not a impediment to perform comercial transactions. It is for this reason that mobile payment systems that consider those situations where direct communications between entities of the system is not posible (temporarily or permanently) basically due to the impossibility of one of the entities connected to the Internet are required. In order to solve the current shortage in the scientific world of previous research works that address the problema of on-line payment from mobile devices in connectivity restricted scenarios, in this thesis we propose a set of secure payment protocols (that use both symmetric and non-traditional asymmetric cryptography), which have low computational power requirements, are fit for scenarios with communications restrictions (where at least two of the entities of the system cannot exchange information in a direct way and must do it through another entity) and offer the same security capabilities as those protocols designed for full connectivity scenarios. The proposed protocols are applicable to other types of networks, such as vehicular ad hoc network (VANETs), where services exist which require on-line payment and scenarios with communication restrictions.On the other hand, the implementation (in a multiplatform programming language) of the designed protocols shows that their performance is suitable for devices with limited computational power.Postprint (published version

    A security payment model for financial payment using mykad

    Get PDF
    The Malaysian Government has created smart national identity card named MyKad for every citizen aged 12 and above since September, 2001. In the following year, the National Registration Department of Malaysia (JPN) has embedded the latest application of MyKad, which is known as Public Key Infrastructure (PKI). It allows secure electronic transactions over the Internet. The electronic transactions include online submission of tax returns, secure email and e-commerce. In parallel with the emergence of e-commerce payment system, a new MyKad Payment Model (MPM) is proposed in order to introduce to the public another function of MyKad that is not only for identification purposes, but also in e-commerce transactions. However, to make this payment model accepted by the public, the focus should be made on two issues; trust/security issue and performance issue. A system with security technique named Arbitrary Random Security Algorithm (ARSA) and a one-to-one multithreading model need to be developed in order to accelerate the authentication response time of MPM. ARSA will automatically change its security algorithm based on times and attacks. If there is no attack or intrusion detected, MPM will wait for the scheduled switching within 30 minutes. However, if attack or intrusion is detected in less than 30 minutes, ARSA will automatically change the security algorithm to a new one. The evaluation of the MPM performance is measured with HP LoadRunner testing tools from which it is found that the response time of MPM with multithreading is better compared to the single thread model and credit card authorisation system. Moreover, the development of ARSA makes this model more secure and safer for the customers

    Analisis Keamanan Jaringan Komputer Pada Electronic Payment Menggunakan Secure Electronic Transaction ( SET )

    Get PDF
    ABSTRAKSI: Perkembangan internet yang sangat pesat di dunia menyebabkan banyak perusahaan barang dan jasa merubah gaya bisnisnya melalui internet. Salah satu yang marak dikembangkan adalah sistem perdagangan melalui internet.Dengan semakin berkembangnya perdagangan di Internet, banyak pula protokol protokol yang dipergunakan untuk perdagangan di Internet. Protokol ini digunakan untuk menghindari adanya penyusupan atau penyalahgunaan fasilitas perdagangan di internet yang menyebabkan kerugian oleh salah satu pihak. Salah satu protokol yang dianggap paling aman adalah Secure Electronic Transaction (SET) yang dikeluarkan oleh Visa dan Mastercard. Di Indonesia belum ada yang mengimplementasikan SET untuk perdagangan di Internet. Dalam penelitian ini dicoba untuk membuat emulasi protokol SET dan kemudian menganalisanya.SET ( Secure Electronic Transaction ) merupakan protokol yang dikeluarkan oleh Visa dan Mastercard yang ditujukan untuk melindungi proses perdagangan melalui internet terhadap kejahatan – kejahatan yang mungkin dilakukan melalui internet. Protokol ini didukung oleh penyediaan fasilitas enkripsi yang cukup memadai. Fasilitas utama yang dibanggakan oleh protokol ini adalah adanya dual signature yang membuat pemisahan antara data order pembelian dan informasi pembayaran. Pada protokol ini, merchant hanya dapat mengetahui informasi order barang yang diajukan oleh client tanpa dapat mengetahui informasi pembayaran yang akan digunakan oleh client. Oleh karena itu, dalam protokol ini dibutuhkan pihak ketiga yaitu payment gateway yang akan mengurus proses pembayaran kedua belah pihak.Tujuan dari tugas akhir ini adalah untuk merancang emulasi objek-objek yang dipakai dalam protokol SET dan kemudian menganalisa protokol ini pada aplikasi electronic payment.Sistem yang dirancang ternyata dapat memenuhi parameter – parameter keamanan jaringan komputer yaitu confidentiality, integrity, authentication, authority, dan non-repudiation. Sistem belum mampu mengatasi pemutusan pengiriman data yang dilakukan pada serangan man-in-the-middle namun data yang tertangkap masih terlindungi karena masih dalam bentuk ciphertext. Sistem masih aman terhadap serangan brute-force sampai beberapa tahun ke depan.Kata Kunci : electronic payment,SET,dual signatureABSTRACT: The development of internet in the world causes many company changes their style of bussiness through internet. For example is trading system via internet.Together with developed of trading via internet, many protocol that is used for e- commerce. This protocol is used for avoiding intruding or exploiting facility in e-commerce that can cause damage for the party. One of many protocol that considered as the most secure is Secure Electronic Transaction ( SET ) that is released by Visa and MasterCard. In Indonesia, no one has implemented SET for e-commerce. In this final task, i try to make the SET emulator and then analyze it.SET is a protocol that is released by Visa and MasterCard that used for protect the trading process via internet from any crime that maybe happened in internet. This protocol is supported by strong encryption method. The main facility from this protocol is dual signature that separates between order information and payment information. In this protocol, merchant just can know the order information without know the payment information. Therefore, this protocol needs a third party that is payment gateway which can manage the payment transaction from each parity.The purpose of this final task is to make emulator and the objects that are used in SET and then analyze the protocol in electronic payment.System that has been made can meet the requirement of computer network security parameter such as confidentiality, integrity, authentication, authority, and non-repudiation. System has not able to overcome man-in-the-middle attack, but it still can protect the data because it still in ciphertext form. System able to overcome brute-force attack until next few year.Keyword: electronic payment,SET,dual signatur

    SPP Secure Payment Protocol: Protocol Analysis, Implementation and Extensions

    Get PDF
    Internet commerce continues to grow rapidly. Over 60% of US households use the internet to shop online. A secure payment protocol is required to support this rapid growth. A new payment protocol was recently invented at IBM. We refer to the protocol as SPP or Secure Payment Protocol. This thesis presents a protocol analysis of SPP. It is essential that a thorough security analysis be done on any new payment protocol so that we can better understand its security properties. We first develop a method for analyzing payment protocols. This method includes a list of desirable security features and a list of proofs that should be satisfied. We then present the results of the analysis. These results validate that the protocol does contain many security features and properties. They also help understand the security properties and identify areas where the protocol can be further secured. This led us to extend the design of the protocol to enhance its security. This thesis also presents a prototype implementation of SPP. Three software components were implemented. They are the Electronic Wallet component, the merchant software component and the Trusted Third Party component. The architecture and technologies that are required for implementation are discussed. The prototype is then used in performance measurement experiments. Results on system performance as a function of key size are presented. Finally, this thesis presents an extension of SPP to support a two buyer scenario. In this scenario one buyer makes an order while another buyer makes the payment. This scenario enables additional commerce services
    corecore