Writing in a recent issue of the Inderscience publication International Journal of Electronic Security and Digital Forensics Mohammed Assora, James Kadirire and Ayoub Shirvani explain how a disposable credit card number would protect consumers from fraud when shopping online.
Today, e-commerce transactions are performed by sending the customer's credit card details over the Internet between a web browser and the e-commerce site. Despite rudimentary security, there are many points at which the process can be compromised by a fraudster.
The most insecure aspect of the whole process, explains Shirvani and colleagues, is the client authentication step because most e-commerce sites usually only require the customer's credit card details to validate the sale. There is no certification on the customer's side of the bargain. This means that anyone who steals your credit card information could use it to buy goods and services online fraudulently.
Customer certification is not the only problem, the researchers say. Once you have entered your credit card details into a shopping or other e-commerce site, these are usually stored unencrypted in the merchant’s database, which means they could be retrieved by anyone with access to that database, whether or not that is an unscrupulous employee or someone breaking in to the database from outside.The researchers point out that more than a decade has passed since computer security experts instigated the Secure Electronic Transaction
(SET) protocol to try to solve this problem by sending the client's credit card details encrypted. However, the system was very complicated and has not been adopted by e-commerce sites.
Instead, Shirvani and colleagues put forward the idea of a disposable credit card number (DCCN) that could overcome the vast majority of security threats. They describe how DCCNs could be generated "off-line" using a pre-shared secret key between the issuer and the customer and used only once to make an electronic purchase.
The concept is related to the credit voucher and gift certificate systems used by some e-commerce sites but the off-line system means no credit card details need pass across the Internet to create the voucher code. The off-line approach would also side-step any potential security and implementation issues that might be associated with online DCCNs such as Private Payment and SecureClick.
In off-line generation of DCCNs, the customer registers his/her credit card with the card issuer and receives an associated secret key. The customer will then use this secret key in conjunction with a simple calculation device such as a smart card, PDA or mobile phone to generate an encrypted code - known as a hash - that is based on the price of the goods he/she intends to purchase and other details pertinent to the e-commerce site.
The resulting hash is adapted to form the DCCN, and then sent over the Internet instead of the actual credit card details. The shopping site validates the DCCN as any normal credit card without ever seeing or having to store their real credit card details. As a result, the client can shop with no need to worry about confidential data being compromised, the researchers conclude.
Microtechnology industry is hiring – positive developments of past years continue
09.04.2018 | IVAM Fachverband für Mikrotechnik
RWI/ISL-Container Throughput Index with minor decline on a high overall level
20.03.2018 | RWI – Leibniz-Institut für Wirtschaftsforschung
At the LASYS 2018, from June 5th to 7th, the Laser Zentrum Hannover e.V. (LZH) will be showcasing processes for the laser material processing of tomorrow in hall 4 at stand 4E75. With blown bomb shells the LZH will present first results of a research project on civil security.
At this year's LASYS, the LZH will exhibit light-based processes such as cutting, welding, ablation and structuring as well as additive manufacturing for...
There are videos on the internet that can make one marvel at technology. For example, a smartphone is casually bent around the arm or a thin-film display is rolled in all directions and with almost every diameter. From the user's point of view, this looks fantastic. From a professional point of view, however, the question arises: Is that already possible?
At Display Week 2018, scientists from the Fraunhofer Institute for Applied Polymer Research IAP will be demonstrating today’s technological possibilities and...
So-called quantum many-body scars allow quantum systems to stay out of equilibrium much longer, explaining experiment | Study published in Nature Physics
Recently, researchers from Harvard and MIT succeeded in trapping a record 53 atoms and individually controlling their quantum state, realizing what is called a...
The historic first detection of gravitational waves from colliding black holes far outside our galaxy opened a new window to understanding the universe. A...
A team led by Austrian experimental physicist Rainer Blatt has succeeded in characterizing the quantum entanglement of two spatially separated atoms by observing their light emission. This fundamental demonstration could lead to the development of highly sensitive optical gradiometers for the precise measurement of the gravitational field or the earth's magnetic field.
The age of quantum technology has long been heralded. Decades of research into the quantum world have led to the development of methods that make it possible...
02.05.2018 | Event News
13.04.2018 | Event News
12.04.2018 | Event News
23.05.2018 | Life Sciences
23.05.2018 | Life Sciences
23.05.2018 | Physics and Astronomy