476 research outputs found

    Fingerprint Biometric Authentication Based Point of Sale Terminal

    Get PDF
    Retail businesses that are not transacted online still represent a substantial amount of retail deals that are closed on a daily basis. Retail business owners and customers continue to explore other means of ensuring payments made with Point of Sale (POS) devices are done securely. This paper proposes the incorporation of fingerprint biometric recognition as an additional layer of protection to the customary pin and password requirements to gain permission to pay for goods purchased and services rendered using point of sale devices. The proposed fingerprint biometric recognition point of sale device has zero false match and false non‐match rate. This strengthens the present authentication process that makes use of pins and passwords that are prone to fraud and solidifies the trust and confidence users place on point of sale devices

    Critical success factors for preventing E-banking fraud

    Get PDF
    E-Banking fraud is an issue being experienced globally and is continuing to prove costly to both banks and customers. Frauds in e-banking services occur as a result of various compromises in security ranging from weak authentication systems to insufficient internal controls. Lack of research in this area is problematic for practitioners so there is need to conduct research to help improve security and prevent stakeholders from losing confidence in the system. The purpose of this paper is to understand factors that could be critical in strengthening fraud prevention systems in electronic banking. The paper reviews relevant literatures to help identify potential critical success factors of frauds prevention in e-banking. Our findings show that beyond technology, there are other factors that need to be considered such as internal controls, customer education and staff education etc. These findings will help assist banks and regulators with information on specific areas that should be addressed to build on their existing fraud prevention systems

    Study of Biometrics System for Fingerprint Payment System

    Get PDF
    for deduction of money from a bank account Biometric payment is a point of sale (POS) technology. It utilizes biometric authentication to recognize the user. Fingerprint payment, in view of finger scanning, is the most well-known biometric payment technique. Regularly, the framework utilizes two-factor confirmation, in which the finger scan replaces the card swipe and the client types in a PIN (personal ID number) of course. Biometrics utilizes biological attributes or behavioral qualities to recognize a person. A Biometrics framework is compelling example acknowledgment framework that uses distinctive examples like retina designs, iris designs and organic characteristics like fingerprints, voice recognition, facial geometry and hand recognition and so on. Biometric payment system is ensured and shielded and amazingly inconvenience allowed utilizing and evening without utilizing secret word or best mystery codes to remember as contrast and past framework like credit card payment framework, and mobile banking and so forth

    Three Factor Authentication Using Java Ring and Biometrics

    Get PDF
    Computer security is a growing field in the IT industry. One of the important aspects of the computer security is authentication. Using passwords (something you know) is one of the most common ways of authentications. But passwords have proven to provide weak level of security as they can be easily compromised. Some other ways of authenticating a user are using physical tokens, (something you possess) and biometrics, (something you are). Using any one of these techniques to secure a system always has its own set of threats. One way to make sure a system is secure is to use multiple factors to authenticate. One of the ways to use multiple factors is to use all the three factors of authentication, something you possess, something you are and something you know. This thesis discusses about different ways of authentication and implements a system using three factor authentication. It takes many security aspects of the system into consideration while implementing it, to make it secure

    Three Factor Authentication Using Java Ring and Biometrics

    Get PDF
    Computer security is a growing field in the IT industry. One of the important aspects of the computer security is authentication. Using passwords (something you know) is one of the most common ways of authentications. But passwords have proven to provide weak level of security as they can be easily compromised. Some other ways of authenticating a user are using physical tokens, (something you possess) and biometrics, (something you are). Using any one of these techniques to secure a system always has its own set of threats. One way to make sure a system is secure is to use multiple factors to authenticate. One of the ways to use multiple factors is to use all the three factors of authentication, something you possess, something you are and something you know. This thesis discusses about different ways of authentication and implements a system using three factor authentication. It takes many security aspects of the system into consideration while implementing it, to make it secure

    AN EVALUATION OF A BIOMETRIC ENABLED CREDIT CARD FOR PROVIDING HIGH AUTHENTICITY IDENTITY PROOFING DURING THE TRANSACTION AUTHENTICATION PROCESS

    Get PDF
    Credit card fraud has continued to grow despite efforts to protect financial data from data breaches of financial institutions. Data breaches of financial transactional records over the past decade have impacted millions of U.S. consumers, resulting in decreased consumer confidence in security. Banking institutions losing money due to fraud are forced to raise interest rates and increase fees to their cardholders. The costs of fraud are passed to the banking institution’s customers to offset the losses. The requisite to detect and eliminate fraud before it occurs is mutually beneficial to both the banking institution and cardholders. Credit card companies continue to focus on methods for identifying fraudulent transactions as they occur and on validating account owners. Financial institutions utilize various models to alert consumers of potential fraud on a real-time basis. Current authorization models that validate the identity of the account holders during the transaction are limited or nonexistent. Many consumers are not required to provide any form of identification or signature proving identity for minimal purchase amount. For purchases requiring validation, consumers are able to validate a transaction with a simple, unverified signature mark at a merchant terminal. The introduction of the chip card added the additional element of security but can be combined with additional user authentication methods. To provide a more secure financial transaction, identity verification as a user authentication method can be realized through biometrics, most commonly, a fingerprint and can be achieved through the use of merchant touch screen credit card terminals or mobile purchasing applications. Using a physical credit card embedded with a fingerprint positions the user authentication process at the point of sale, thus providing real-time validation of the user as the credit card account owner utilizing the biometric fingerprint as identity proof and signature. This research seeks to evaluate the biometric-enabled physical credit card in an effort to increase the level of credit card transaction security and reduce the occurrences of fraud

    Web-based relay management with biometric authentication

    Get PDF
    This thesis proposes a web-based system for managing digital relay settings. These relays are deployed in the power system to protect sensitive and expensive equipment from physical damage during system faults and overload conditions. Providing this capability exposes these devices to the same cyber security threats that corporations have faced for many years.;This thesis investigates the risks and requirements for deploying the proposed system. A breakdown in the protection that these relays provide would cause power outages. The cost of outages can be significant. Therefore cyber security is critical in the system design. Cyber security requirements for the power industry identify access control as an important aspect for the protection of its infrastructure. If properly implemented, biometrics can be used to strengthen access control to computer systems.;The web-based relay management system uses fingerprint authentication along with a username and password to provide access control. Website users are given access to functionality based on user roles. Only high level users may attempt relay setting modification. The relay management system interacts with a database that stores the current relay settings, relay setting restrictions, and a queue of relay updates. A process is implemented to verify attempted setting changes against these setting restrictions. This provides an extra security layer if users attempt harmful changes to protection schemes. Valid setting changes are added to the queue and a separate relay update program communicates these changes to the relay. The database and relay update program protect the relays from direct modification. These features combined with biometric authentication provide a strong layered scheme for protecting relays, while supplying an easy to use interface for remotely using their capabilities

    Analysis of the latest trends in mobile commerce using the NFC technology

    Get PDF
    The aim of this research is to propose new mobile commerce proximity payment architecture, based on the analysis of existing solutions and current and future market needs. The idea is to change a Mobile Device into a reliable and secure payment tool, available to everyone and with possibility to securely and easily perform purchases and proximity paymentsThe research leading to these results has received funding by the ARTEMISA project TIN2009-14378-C02-02 within the Spanish "Plan Nacional de I+D+I", and the Madrid regional community projects S2009/TIC-1650 and CCG10-UC3M/TIC-4992

    A Review of Voice-Base Person Identification: State-of-the-Art

    Get PDF
    Automated person identification and authentication systems are useful for national security, integrity of electoral processes, prevention of cybercrimes and many access control applications. This is a critical component of information and communication technology which is central to national development. The use of biometrics systems in identification is fast replacing traditional methods such as use of names, personal identification numbers codes, password, etc., since nature bestow individuals with distinct personal imprints and signatures. Different measures have been put in place for person identification, ranging from face, to fingerprint and so on. This paper highlights the key approaches and schemes developed in the last five decades for voice-based person identification systems. Voice-base recognition system has gained interest due to its non-intrusive technique of data acquisition and its increasing method of continually studying and adapting to the person’s changes. Information on the benefits and challenges of various biometric systems are also presented in this paper. The present and prominent voice-based recognition methods are discussed. It was observed that these systems application areas have covered intelligent monitoring, surveillance, population management, election forensics, immigration and border control
    • 

    corecore