期刊文献+

面向现场支付的MCSP模式及其支付协议 被引量:1

MCSP Model and Payment Protocol Oriented Near-field Payment
下载PDF
导出
摘要 针对一机仿真多卡的应用需求,基于密码技术设计了一个面向现场模式、支持多卡仿真的NFC(Near Field Communication,近距离通信)智能手机移动支付安全模式MCSP(Multiple Cards on a Single Phone,一机多卡),并面向MCSP模式设计了一个安全支付协议.通过在智能终端中增加一个支持SWP(Single Wire Protocol,单线协议)的安全TF(Trans-flash)卡,将多张银行信用卡信息与智能终端硬件信息绑定后加密存储在安全TF卡中,基于密码分割实现多信用卡间的安全隔离;通过采用三级密钥机制,保护信用卡信息的安全性;通过扩展应用密文消息,实现交易金额二次确认、PIN(Personal Identification Number,个人识别码)输入过程前移和完整性增强保护;通过重新设计交易计数器更新策略实现抗重放攻击. For the application requirement of one machine simulating multi-cards, it designs a mobile payment security model MCSP on a NFC smartphone, which is oriented near field payment, supported for multi-card emulation, and based on the cryptographic technology. This model increases the safety TF card that supports SWP protocol in the smart terminal, stores multiple bank credit card informa- tion encrypted in the safety TF card after bounds with the intelligent terminal hardware information. It realizes the security isolation be- tween multiple credit card based on cipher segmentation; It protects the security of credit card information by using three key system; It realizes the secondary confirmation of transaction volume, inputting process forward of the PIN code and integrity protection enhanced by extending the application ciphertext message;It achieves anti-replay attacks by redesigning the transaction counter update strategy.
出处 《小型微型计算机系统》 CSCD 北大核心 2014年第10期2319-2324,共6页 Journal of Chinese Computer Systems
关键词 移动支付 NFC技术 支付协议 KAILAR逻辑 mobile payment near field communication technology payment protocol kailar logic
  • 相关文献

参考文献2

二级参考文献12

  • 1KAILAR R. Accountabitity protocols [J]. IEEE Transactions in electronic commerce on Software Engineering, 1996,22(5):313-328.
  • 2ZHEN J, GOLLMANN D A fair non--repudiation protoeol[J]. IEEE Computer Socieff Symposium on Research in Security and Privacy,1996.
  • 3ZHOU J, GOLLMAN D. A fair non-repudiation protocol[C]. Proceeding of 1996 IEEE Symposium on Security and Privacy, 1996:55-61.
  • 4卿斯汉,常晓林.章江.安全电子商务协议iKPI的设计和实现[C].信息和通信安全--CCICS'99:第一届中国信息和通信安全学术会议,2000.230-239.
  • 5ISO/IEC 1388822, Information technology security techniques non-repudiation part2 : mechanisms using symmetrical techniques[S]. International Organization for Standardization, 1998.
  • 6Kailar R.Accountability in electronic commerce protocols[J].IEEE Transactions on Software Engineering, 1996 ;2 (5) :313-328.
  • 7Feng Deng-Guo.Cryptanalysis[M].Beijing:Tsinghua University Publishing House, 2000.
  • 8Zhou Jian-Ying,Gollmann Dieter.Towards verification of non-repudiation protoeols[C].In:Proeeedings of the 1998 International Refinement Workshop and Formal Methods Pacific,Canberra,Australia,1998: 370-380.
  • 9Maufieio PAPA, Oliver Bremer, John HALE.Sujeet Shenoi.Formal analysis of E-commerce protoeols[J].IEICS Transactions on Information & System,2001 ;E84-D(10) :1313-1323.
  • 10周典萃,卿斯汉,周展飞.Kailar逻辑的缺陷[J].软件学报,1999,10(12):1238-1245. 被引量:29

共引文献2

同被引文献3

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部