Development of Protected Endorsement for Online banking using Mobile Phones

被引:0
|
作者
Narayana, G. [1 ]
Venkateswarlu, T. [1 ]
Kumar, G. S. Praveen [1 ]
Padmavathamma, M. [1 ]
Sreekanth, G.
Delhibabu, K.
Prasad, A. Ravi
机构
[1] SV Univ, Dept Comp Sci, Tirupati, Andhra Pradesh, India
关键词
Online banking; authentication; IMEI; IMSI; SIM; master key; OTP; private key token; PIN;
D O I
10.1117/12.2011381
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
Securing Online Banking transactions for customer is the primary goal of financial institutions that provides Internet banking facility. Mobile phones play an important role in our society as more and more functions having been integrated within mobile phones, such as Internet browsing, mobile banking, and shopping. Mobiles phones can be used to secure ATM card pins by sending to the customer directly rather than in emails or by other means which has a possibility of hacking. In this paper we have proposed method of generating a Private Key Security Token by bank authentication servers which uses IMSI registers and IMEI number of client's mobile registered. The key is generated by implementing RIPE MD160 and Hex Encode Algorithm. Token received is valid only for that client mobile only and can be generated upon request by customer dynamically. The client is given a PIN and a Master Key when registered to the Online Banking Services. If in case a client's mobile is lost, authentication is done using Unique Master Key, else the Private Key Token is used there by making transactions secured and simple without the need of carrying any USB Tokens. The additional functionality provides the client more security on their transactions. Due to this Phishing attacks by the hackers is avoided.
引用
收藏
页数:5
相关论文
共 50 条
  • [21] May using mobile phones be harmful?
    Derkacz, Marek
    Chmiel-Perzynska, Iwona
    Kowal, Agnieszka
    Grywalska, Ewelina
    FAMILY MEDICINE AND PRIMARY CARE REVIEW, 2008, 10 (03): : 385 - 387
  • [22] DOSE RECONSTRUCTION USING MOBILE PHONES
    Beerten, K.
    Reekmans, F.
    Schroeyers, W.
    Lievens, L.
    Vanhavere, F.
    RADIATION PROTECTION DOSIMETRY, 2011, 144 (1-4) : 580 - 583
  • [23] Mobile phones security using biometrics
    Shabeer, H. Abdul
    Suganthi, P.
    ICCIMA 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND MULTIMEDIA APPLICATIONS, VOL IV, PROCEEDINGS, 2007, : 270 - +
  • [24] Emotion Recognition Using Mobile Phones
    Shapsough, Shams
    Hesham, Ahmed
    Elkhorazaty, Youssef
    Zualkernan, Imran A.
    Aloul, Fadi
    2016 IEEE 18TH INTERNATIONAL CONFERENCE ON E-HEALTH NETWORKING, APPLICATIONS AND SERVICES (HEALTHCOM), 2016, : 289 - 294
  • [25] Emotion recognition using mobile phones
    Zualkernan, I.
    Aloul, F.
    Shapsough, S.
    Hesham, A.
    El-Khorzaty, Y.
    COMPUTERS & ELECTRICAL ENGINEERING, 2017, 60 : 1 - 13
  • [26] Locative systems using mobile phones
    Weight, Jenny
    IEEE MULTIMEDIA, 2008, 15 (03) : 6 - 10
  • [27] Using Mobile Phones in Pub Talk
    Porcheron, Martin
    Fischer, Joel E.
    Sharples, Sarah
    ACM CONFERENCE ON COMPUTER-SUPPORTED COOPERATIVE WORK AND SOCIAL COMPUTING (CSCW 2016), 2016, : 1649 - 1661
  • [28] Crowd Monitoring Using Mobile Phones
    Yuan, Yaoxuan
    2014 SIXTH INTERNATIONAL CONFERENCE ON INTELLIGENT HUMAN-MACHINE SYSTEMS AND CYBERNETICS (IHMSC), VOL 1, 2014, : 261 - 264
  • [29] Safe Driving Using Mobile Phones
    Fazeen, Mohamed
    Gozick, Brandon
    Dantu, Ram
    Bhukhiya, Moiz
    Gonzalez, Marta C.
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2012, 13 (03) : 1462 - 1468
  • [30] Using mobile phones for therapeutic purposes
    Dmitriyev, BV
    Pokatayev, VN
    Olshevskiy, AL
    Kozlov, VA
    Kosharnyy, VF
    Kosharnyy, VV
    Yatsunenko, AG
    Zabolotnyy, PI
    14th International Crimean Conference: Microwave & Telecommunication Technology, Conference Proceedings, 2004, : 743 - 744