The popularization of the mobile internet has given rise to demand for flexible and convenient payment methods. For China, it is necessary to keep pace with or even lead the trend of innovation and development in the ...The popularization of the mobile internet has given rise to demand for flexible and convenient payment methods. For China, it is necessary to keep pace with or even lead the trend of innovation and development in the age of mobile payment. From the perspective of systems engineering, this paper introduces research and implementation of China Union Pay's mobile payment project. The general requirements and core engineering problems of the mobile payment project are summarized based on analyses of the characteristics and engineering difficulties of this project. Integration of innovative technologies is introduced to resolve the contradiction between ease-of-use and security. A rapid iterative development process is adopted to improve the product release efficiency as well as the users' experience. The launch of the mobile payment project also opens the window to coordinating and upgrading the whole payment industry chains.展开更多
With the increasing popularity of fintech, i.e., financial technology, the e-commerce market has grown rapidly in the past decade, such that mobile devices enjoy unprecedented popularity and are playing an ever ncreas...With the increasing popularity of fintech, i.e., financial technology, the e-commerce market has grown rapidly in the past decade, such that mobile devices enjoy unprecedented popularity and are playing an ever ncreasing role in e-commerce. This is especially true of mobile payments, which are attracting increasing attention However, the occurrence of many traditional financial mishaps has exposed the challenges inherent in online authentication technology that is based on traditional modes of realizing the healthy and stable development of mobile payment. In addition, this technology ensures user account security and privacy. In this paper, we propose a Secure Mutual Authentication Protocol (SMAP) based on the Universal 2nd Factor (U2F) protocol for mobile payment. To guarantee reliable service, we use an asymmetric cryptosystem for achieving mutual authentication between the server and client, which can resist fake servers and forged terminals. Compared to the modes currently used, the proposed protocol strengthens the security of user account information as well as individual privacy throughout the mobile-payment transaction process. Practical application has proven the security and convenience of the proposed protoco展开更多
The security of mobile agent directly decides its usage width in e-commerce. Especially, to protect users' private information is becoming more important now and future. So an anonymous mobile agent security mechanis...The security of mobile agent directly decides its usage width in e-commerce. Especially, to protect users' private information is becoming more important now and future. So an anonymous mobile agent security mechanism with the secure authentication infrastructure based on PKI (public key infrastructure) is proposed in the paper. The multi-agent system is programmed by java language and every agent must register itself in CA (certificate authority) before working in the net and express his legit identity which is temptly produced and used only once. The CA ensures the legal of all agents' identity which take part in communicaiton or trade. And every user agent identity only is used once which makes other agents cannot decipher users' private information. The security mechanism of the multi-agent system implements anonymity, integrity, data confidentiality of mobile agent based on the MH(multiple hop) integrity protection regard to PKI limit.展开更多
Mobile wallet is a very convenient means of mobile payment to allow the clients to conduct the payment via their mobile devices. To reduce the computation burden of resources-constraint mobile devices, a few mobile wa...Mobile wallet is a very convenient means of mobile payment to allow the clients to conduct the payment via their mobile devices. To reduce the computation burden of resources-constraint mobile devices, a few mobile wallet protocols with outsourced verification in cloud computing were proposed. But in some of the protocols, there exist the risk of a colluding attack of the customer and the untrusted cloud server. In this paper, we propose an improved protocol, in which the payment information is protected by Hash function and random number. The malicious customer and cloud server cannot change the payment information to conduct a collusion forgery attack to defraud the merchant. The security analysis indicates that the proposed improved protocol can enhance the security in terms of correctness, unforgeability and traceability without increasing the computational burden.展开更多
Our today’s world is becoming digital and mobile. Exploiting the advantages of wireless communication protocols is not only for telecommunication purposes, but also for payments, interaction with intelligent vehicles...Our today’s world is becoming digital and mobile. Exploiting the advantages of wireless communication protocols is not only for telecommunication purposes, but also for payments, interaction with intelligent vehicles, etc. One of the most widespread wireless capabilities is the Bluetooth protocol. Just in 2010, 906 million mobile Bluetooth enabled phones had been sold, and in 2011, there were more than 40 million Bluetooth enabled health and medical devices on the market. Still in 2011, one third of all new vehicles produced worldwide included Bluetooth technology. Security and privacy protection is key in the digital world of today. There are security and privacy risks such as device tracking, communication eavesdropping, etc., which may come from improper Bluetooth implementation with very severe consequences for the users. The objective of this paper is to analyze the usage of Bluetooth in m-commerce and m-payment fields. The steps undertaken in this paper in order to come to a proposal for a secure architecture are the analysis of the state of the art of the relevant specifications, the existing risks and the known vulnerabilities the related known attacks. Therefore, we give first an overview of the general characteristics of Bluetooth technology today, going deeper in the analysis of Bluetooth stack’s layers and the security features offered by the specifications. After this analysis of the specifications, we study how known vulnerabilities have been exploited with a comprehensive list of known attacks, which poses serious threats for the users. With all these elements as background, we conclude the paper proposing a design for Secure Architecture for Bluetooth-Enhanced Mobile “Smart” Commerce Environments.展开更多
近年来,中央银行数字货币(CBDC)受到全球多个国家和地区的高度关注.双离线交易作为CBDC的可选属性,在无网络连接的情况下进行支付,被认为具有较大的实用价值.面向CBDC的双离线匿名支付场景,基于可信执行环境(TEE)和安全单元(SE)技术,提...近年来,中央银行数字货币(CBDC)受到全球多个国家和地区的高度关注.双离线交易作为CBDC的可选属性,在无网络连接的情况下进行支付,被认为具有较大的实用价值.面向CBDC的双离线匿名支付场景,基于可信执行环境(TEE)和安全单元(SE)技术,提出了一种专为移动平台设计的高效双离线匿名支付方案(dual offline anonymous E-payment for mobile devices,OAPM).OAPM适用于资源受限的移动设备,允许移动付款者在不联网状态下安全地向收款者支付数字货币,且不向收款者及商业银行泄露个人隐私信息,付款者的支付行为也不会被链接,同时允许收款者设备处于离线状态,监管机构(如中央银行)在必要情况下能够识别匿名付款者的真实身份.该方案满足数字货币交易的多项重要属性,包括正确性、不可链接性、可追踪性、不可陷害性、机密性、真实性、防双花性以及可控匿名性等.实现了原型系统,并对可能的参数进行了评估.安全性分析和实验结果表明,该方案从安全性和效率两方面均能满足移动用户CBDC双离线交易的实际需求.展开更多
文摘The popularization of the mobile internet has given rise to demand for flexible and convenient payment methods. For China, it is necessary to keep pace with or even lead the trend of innovation and development in the age of mobile payment. From the perspective of systems engineering, this paper introduces research and implementation of China Union Pay's mobile payment project. The general requirements and core engineering problems of the mobile payment project are summarized based on analyses of the characteristics and engineering difficulties of this project. Integration of innovative technologies is introduced to resolve the contradiction between ease-of-use and security. A rapid iterative development process is adopted to improve the product release efficiency as well as the users' experience. The launch of the mobile payment project also opens the window to coordinating and upgrading the whole payment industry chains.
基金supported by the National Key R&D Program of China (No. 2017YFB0802600)the National Natural Science Foundation of China (Nos. 61772403 and U1401251)+1 种基金the Natural Science Basic Research Plan in Shaanxi Province of China (No. 2017JM6004)National 111 Program of China (Nos. B16037 and B08038)
文摘With the increasing popularity of fintech, i.e., financial technology, the e-commerce market has grown rapidly in the past decade, such that mobile devices enjoy unprecedented popularity and are playing an ever ncreasing role in e-commerce. This is especially true of mobile payments, which are attracting increasing attention However, the occurrence of many traditional financial mishaps has exposed the challenges inherent in online authentication technology that is based on traditional modes of realizing the healthy and stable development of mobile payment. In addition, this technology ensures user account security and privacy. In this paper, we propose a Secure Mutual Authentication Protocol (SMAP) based on the Universal 2nd Factor (U2F) protocol for mobile payment. To guarantee reliable service, we use an asymmetric cryptosystem for achieving mutual authentication between the server and client, which can resist fake servers and forged terminals. Compared to the modes currently used, the proposed protocol strengthens the security of user account information as well as individual privacy throughout the mobile-payment transaction process. Practical application has proven the security and convenience of the proposed protoco
基金Supported by the National Natural Science Foun-dation of China (50077007) the Youth Teacher Foundation ofNorth China Electric Power University (20051101)
文摘The security of mobile agent directly decides its usage width in e-commerce. Especially, to protect users' private information is becoming more important now and future. So an anonymous mobile agent security mechanism with the secure authentication infrastructure based on PKI (public key infrastructure) is proposed in the paper. The multi-agent system is programmed by java language and every agent must register itself in CA (certificate authority) before working in the net and express his legit identity which is temptly produced and used only once. The CA ensures the legal of all agents' identity which take part in communicaiton or trade. And every user agent identity only is used once which makes other agents cannot decipher users' private information. The security mechanism of the multi-agent system implements anonymity, integrity, data confidentiality of mobile agent based on the MH(multiple hop) integrity protection regard to PKI limit.
基金Supported by the Applied Basic and Advanced Technology Research Programs of Tianjin(15JCYBJC15900)
文摘Mobile wallet is a very convenient means of mobile payment to allow the clients to conduct the payment via their mobile devices. To reduce the computation burden of resources-constraint mobile devices, a few mobile wallet protocols with outsourced verification in cloud computing were proposed. But in some of the protocols, there exist the risk of a colluding attack of the customer and the untrusted cloud server. In this paper, we propose an improved protocol, in which the payment information is protected by Hash function and random number. The malicious customer and cloud server cannot change the payment information to conduct a collusion forgery attack to defraud the merchant. The security analysis indicates that the proposed improved protocol can enhance the security in terms of correctness, unforgeability and traceability without increasing the computational burden.
文摘Our today’s world is becoming digital and mobile. Exploiting the advantages of wireless communication protocols is not only for telecommunication purposes, but also for payments, interaction with intelligent vehicles, etc. One of the most widespread wireless capabilities is the Bluetooth protocol. Just in 2010, 906 million mobile Bluetooth enabled phones had been sold, and in 2011, there were more than 40 million Bluetooth enabled health and medical devices on the market. Still in 2011, one third of all new vehicles produced worldwide included Bluetooth technology. Security and privacy protection is key in the digital world of today. There are security and privacy risks such as device tracking, communication eavesdropping, etc., which may come from improper Bluetooth implementation with very severe consequences for the users. The objective of this paper is to analyze the usage of Bluetooth in m-commerce and m-payment fields. The steps undertaken in this paper in order to come to a proposal for a secure architecture are the analysis of the state of the art of the relevant specifications, the existing risks and the known vulnerabilities the related known attacks. Therefore, we give first an overview of the general characteristics of Bluetooth technology today, going deeper in the analysis of Bluetooth stack’s layers and the security features offered by the specifications. After this analysis of the specifications, we study how known vulnerabilities have been exploited with a comprehensive list of known attacks, which poses serious threats for the users. With all these elements as background, we conclude the paper proposing a design for Secure Architecture for Bluetooth-Enhanced Mobile “Smart” Commerce Environments.
文摘近年来,中央银行数字货币(CBDC)受到全球多个国家和地区的高度关注.双离线交易作为CBDC的可选属性,在无网络连接的情况下进行支付,被认为具有较大的实用价值.面向CBDC的双离线匿名支付场景,基于可信执行环境(TEE)和安全单元(SE)技术,提出了一种专为移动平台设计的高效双离线匿名支付方案(dual offline anonymous E-payment for mobile devices,OAPM).OAPM适用于资源受限的移动设备,允许移动付款者在不联网状态下安全地向收款者支付数字货币,且不向收款者及商业银行泄露个人隐私信息,付款者的支付行为也不会被链接,同时允许收款者设备处于离线状态,监管机构(如中央银行)在必要情况下能够识别匿名付款者的真实身份.该方案满足数字货币交易的多项重要属性,包括正确性、不可链接性、可追踪性、不可陷害性、机密性、真实性、防双花性以及可控匿名性等.实现了原型系统,并对可能的参数进行了评估.安全性分析和实验结果表明,该方案从安全性和效率两方面均能满足移动用户CBDC双离线交易的实际需求.