14 research outputs found

    One-Time Code Cardholder Verification Method in Electronic Funds Transfer Transactions

    Get PDF
    Card payments are getting more and more popular across the world. The dominantstandard used for Electronic Funds Transfer transaction is EMV. It is widely used across Europeand Canada, and currently it is being introduced in the USA. The most frequently used CardholderVerification Method in EMV transaction is PIN, which requires from the payment terminal to beequipped with pinpad - which increases the cost of the whole payment device. In this article I presentan alternative Cardholder Verification Method (CVM) that can be used instead of traditional PIN.The key advantage of the presented mechanism is that it can be easily implemented in currentlyutilized authorization protocols, it does not affect rules of EMV specification and may decrease timeof transaction processing

    Adaptable Context Management Framework for Secure Network Services

    Get PDF
    Last decades the contextual approach became an important methodology of analysing information processes in the dynamic environment. In this paper we propose a context management framework suitable for secure network services. The framework allows tracking the contextual information from its origin, through all stages of its processing up to application in security services protecting the secure network application. Besides the framework's description, an example of its application in constructing secure voice call network service is given

    Systematic review and meta-analysis of randomized clinical trials comparing efficacy and safety outcomes of insulin glargine with NPH insulin, premixed insulin preparations or with insulin detemir in type 2 diabetes mellitus

    Get PDF
    AIMS: A variety of basal insulin preparations are used to treat patients with type 2 diabetes mellitus (T2DM). We aimed to summarize scientific evidence on relative efficacy and safety of insulin glargine (IGlar) and other insulins in T2DM. METHODS: A systematic review was carried out in major medical databases up to December 2012. Relevant studies compared efficacy and safety of IGlar, added to oral drugs (OAD) or/and in combination with bolus insulin, with protamine insulin (NPH) or premixed insulin (MIX) in the same regimen, as well as with insulin detemir (IDet), in T2DM. Target HbA1c level without hypoglycemic events was considered the primary endpoint. RESULTS: Twenty eight RCTs involving 12,669 T2DM patients followed for 12–52 weeks were included in quantitative analysis. IGlar + OAD use was associated with higher probability of reaching target HbA1c level without hypoglycemia as compared to NPH + OAD (RR = 1.32 [1.09, 1.59]) or MIX without OAD (RR = 1.61 [1.22, 2.13]) and similar effect as IDet + OAD (RR = 1.07 [0.87, 1.33]) and MIX + OAD (RR = 1.09 [0.86, 1.38]). IGlar + OAD demonstrated significantly lower risk of symptomatic hypoglycemia as compared to NPH + OAD (RR = 0.89 [0.83, 0.96]), MIX + OAD (RR = 0.75 [0.68, 0.83]) and MIX without OAD(RR = 0.75 [0.68, 0.83]), but not with IDet + OAD (RR = 0.99 [0.90, 1.08]). In basal-bolus regimens, IGlar demonstrated similar proportion of T2DM patients achieving target HbA1c as compared to NPH (RR = 1.14 [0.91, 1.44]) but higher than MIX (RR = 1.26 [1.12, 1.42) or IDet (RR = 1.38 [1.11, 1.72]). The risk of severe hypoglycemia was lower in IGlar than in NPH (RR = 0.77 [0.63, 0.94]), with no differences in comparison with MIX (RR = 0.74 [0.46, 1.20]) and IDet (RR = 1.10 [0.54, 2.25]). IGlar + OAD has comparable safety profile to NPH, with less frequent adverse events leading to treatment discontinuation than MIX + OAD (RR = 0.41 [0.22, 0.76]) and IDet + OAD (RR = 0.40 [0.24, 0.69]). Also severe adverse reactions were less common for IGlar + OAD when compared to MIX + OAD (RR = 0.71 [0.52; 0.98]). CONCLUSION: For the majority of examined efficacy and safety outcomes, IGlar use in T2DM patients was superior or non-inferior to the alternative insulin treatment options. ELECTRONIC SUPPLEMENTARY MATERIAL: The online version of this article (doi:10.1007/s00592-014-0698-4) contains supplementary material, which is available to authorized users

    POS-originated transaction traces as a source of contextual information for risk management systems in EFT transactions

    No full text
    Abstract Transaction traces analysis is a key utility for marketing, trend monitoring, and fraud detection purposes. However, they can also be used for designing and verification of contextual risk management systems for card-present transactions. In this paper, we presented a novel approach to collect detailed transaction traces directly from payment terminal. Thanks to that, it is possible to analyze each transaction step precisely, including its frequency and timing. We also demonstrated our approach to analyze such data based on real-life experiment. Finally, we concluded this paper with important findings for designers of such a system

    A New Card-Linked Loyalty Program: Estimated and Anticipated Benefits for Payment Transaction Parties

    No full text
    Electronic card payments are getting more and more popular, mainly because of their simplicity, convenience, processing time and high level of security. The fact that a single payment card is issued for a particular cardholder makes it possible to link a card to various services. In this paper, we investigated a usage of a payment card in the loyalty program that incorporates our Contextual Risk Management System (CRMS) to assure a novel intangible reward: Shorter transaction processing time. In the beginning, we emphasize the importance of soft benefits in modern loyalty programs and recall the risk management algorithms and the reputation system that has been used in the CRMS. Then, using an extensive dataset of 2.5 million payment transaction traces (collected within a year from 68 terminals) we estimate potential benefits for merchants and cardholders and try to predict an effect of this system for the future. We also discuss the impact of this system on the real and user-perceived security level
    corecore