A Generalized Effectuate Strategy for Mash-up Mobile Circumstances A Generalized Effectuate Strategy for Mash-up Mobile Circumstances Project Guide M.J.Jeyasheela.

Slides:



Advertisements
Similar presentations
IEEE INFOCOM 2004 MultiNet: Connecting to Multiple IEEE Networks Using a Single Wireless Card.
Advertisements

BUSINESS PLAN Project Brief: Facilitating general public to have Cash-in-hand by converting mobile phone credit to cash. And transfering the credit to.
CP3397 ECommerce.
Zenith Visa Web Acquiring A quick over view. Web Acquiring Allows merchants to receive payments for goods and services through the Internet Allows customers.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
Online Payments Module © Copyright Tucasi Ltd.
1 Secure Credit Card Transactions on an Untrusted Channel Source: Information Sciences in review Presenter: Tsuei-Hung Sun ( 孫翠鴻 ) Date: 2010/9/24.
1 Supplement III: Security Controls What security services should network systems provide? Confidentiality Access Control Integrity Non-repudiation Authentication.
Lect. 18: Cryptographic Protocols. 2 1.Cryptographic Protocols 2.Special Signatures 3.Secret Sharing and Threshold Cryptography 4.Zero-knowledge Proofs.
Chapter 13 Paying Via The Net. Agenda Digital Payment Requirements Fraud Detection Online Payment Methods Online Payment Types The Future Payment.
Electronic Transaction Security (E-Commerce)
CSCE 790: Computer Network Security Chin-Tser Huang University of South Carolina.
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Elias M. Awad Third Edition ELECTRONIC COMMERCE From Vision to Fulfillment ELC 200 Day 24.
Chapter 11 Electronic Commerce Payment Systems. Learning Objectives 1.Describe the situations where micropayments are used and alternative ways to handle.
장홍예 Telecommunication Engineer Lab E-COMMERCE: TECHNICAL AND MARKET APPROACH.
Internet/Intranet firewall security – policy, architecture and transaction services Written by Ray Hunt This presentation will Examines Policies that influence.
1 Design, Implementation and Deployment of the iKP Secure Electronic Payment System Mihir Bellare, Juan A. Garay et al. “ … At this day and age it is hardly.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Fall 2006 Davison/LinCSE 197/BIS 197: Search Engine Strategies 5-1 Search Engine Strategies: Road Map INTRO: What is SEM PLANNING: Things to Know BEFORE.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
EUROCON “Computer as a Tool”, Belgrade, 24 th November 2005 (1) Paul Killoran EUROCON 2005 Paul Killoran, Fearghal Morgan & Michael Schukat National.
LU Chenglong ( ) DIAO Wenrui ( )
UICC UICC is a smart card used in mobile terminals in GSM and UMTS networks It provides the authentication with the networks secure storage crypto algorithms.
REMINDER + RADAR Brad Bootz, Robert Douglas, Natalie Freed Team Members: Getting things done… one place at a time R.
Securing Electronic Transactions University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
1 Using EMV cards for Single Sign-On 26 th June st European PKI Workshop Andreas Pashalidis and Chris J. Mitchell.
The Data Grid: Towards an Architecture for the Distributed Management and Analysis of Large Scientific Dataset Caitlin Minteer & Kelly Clynes.
CSC8320. Outline Content from the book Recent Work Future Work.
Chapter 4 Getting Paid. Objectives Understand electronic payment systems Know why you need a merchant account Know how to get a merchant account Explain.
E-commerce What are the relationships among: – Client (i.e. you) – Server – Bank – Certification authority Other things to consider: – How to set up your.
Logo Add Your Company Slogan China Financial Certification Authority Third-party certification authority Team 13 :吉露露、吴莹莹、潘韦韦 ( CFCA )
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Chapter 18: Doing Business on the Internet Business Data Communications, 4e.
Clemente-Cuervo et al. A PDA Implementation of an Off-line e-Cash Protocol.
Web Security : Secure Socket Layer Secure Electronic Transaction.
Security protocols and their verification Mark Ryan University of Birmingham Midlands Graduate School University of Birmingham April 2005 Steve Kremer.
A security framework combining access control and trust management for mobile e-commerce applications Gregor v.Bochmann, Zhen Zhang, Carlisle Adams School.
Chapter 4 E-commerce Security and Payment.
Free Powerpoint Templates Page 1 Free Powerpoint Templates FP7 – Secure Enterprise Remote Banking System (SERBS) Small or medium scale focused research.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #22 Secure Web Information.
Human Tracking System Using DFP in Wireless Environment 3 rd - Review Batch-09 Project Guide Project Members Mrs.G.Sharmila V.Karunya ( ) AP/CSE.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
Security Patterns for Web Services 02/03/05 Nelly A. Delessy.
E-Commerce & M-Commerce. Introduction Electronic commerce, commonly known as e- commerce, It is a type of industry where buying and selling of product.
1 Chapter 7 WEB Security. 2 Outline Web Security Considerations Secure Socket Layer (SSL) and Transport Layer Security (TLS) Secure Electronic Transaction.
Introduction to Network Systems Security Mort Anvari.
Introduction Web analysis includes the study of users’ behavior on the web Traffic analysis – Usage analysis Behavior at particular website or across.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
E-FINANCE CHAPTER 6 RISK AND CHALLENGES Risk and Challenges, V.C joshi (2004), E-finance Log into the future, 2nd Edition, Thousand Oakes, London, E-finance:
Electronic Banking & Security Electronic Banking & Security.
© 2015 Tucasi Limited Online Payments Module. © 2015 Tucasi Limited Benefits of our Online Payments Module Parents can use it to pay funds to the school.
Comparing Merchant Credit Card Accounts Having a merchant charge account is essential to running a modern business as more consumers eschew cash for debit.
MOBILE PAYMENTS (“M-PAYMENTS”) August 2007 Potential impact on South African banking industry Team Galahad Lionel Diakanyo Joshua Makgate Sean Rule.
2016 LOGO Comparison Between Apple Pay and Ali Pay Zhu Liang Li Zhihao
WEB TESTING
BUILD SECURE PRODUCTS AND SERVICES
PAYMENT GATEWAY Presented by SHUJA ASHRAF SHAH ENROLL: 4471
EMV® 3-D Secure - High Level Overview
Brad Bootz, Robert Douglas, Natalie Freed
Chapter 4 E-commerce Security and Payment.
Mobile Payment Protocol 3D by Using Cloud Messaging
Use of Biometric Technology in Payments to avoid Frauds
Go Mobile with MX! Enhanced Responsiveness in MX 8.2
Peer-to-peer and events 19TH AND 20TH JUNE
Presentation transcript:

A Generalized Effectuate Strategy for Mash-up Mobile Circumstances A Generalized Effectuate Strategy for Mash-up Mobile Circumstances Project Guide M.J.Jeyasheela Rakkini AP/CSE Team members J.Aravindhan ( ) S.Heduson ( ) K.M.Jeganath ( ) K.Varun ( ) Third Review

Objective : To replace the traditional cash or bank card with mobile payment which will cause a payment revolution and high authentication security by giving payment mode with the top priority by providing extra layer of affix.

Abstract : The focus of this system is on third-party mobile payment service which is to provide a protocol for mobile payments that is secure and authenticated with a complex key. PayPal Hash chains and keyed hash values are used to achieve payment, non-repudiation and thwart free riding attacks. The system is with high affix of covering transaction commit rate, message complexity, and commit/abort decision time.

Existing System : Online purchases of products are made only through websites. Large number of protocols are used in this system. There is no commit application of mobile payment. Changes in the environment will results to the payment error. User need to participate actively in the choosing product process. Using mobile device free active high accuracy cannot be achieved.

Limitations : High rates of using cryptographic protocols it will take to the loss of flow control and accuracy. High accuracy cannot be achieved due to the problems in listing the category by filtering based approach. Both Merchant and Acquire does not take part in client payment protocol so there may be loss of payment. User carries a payment failure and the refundable amount will carry a lot of time and work. Changes in the environment will result in payment error by both the network or the third party failure.

Proposed System : Improved Security Through trusted third party member for the payment options. High accuracy can be achieved by both the network overcome as well as the third party member. Flexible Transaction environment has been provided in the application. User does not need to go to the live place instead he can purchase easily via a mobile application. Noisy Wireless Channel is avoided in transaction for getting the effective transaction. The update operation is often more than an order of magnitude faster in the proposed system. Continuous Space Estimator returns a multiple location of mobile with the network while the mobile is in motion.

Advantages : User can use the mobile device to detect localization. Web Content will extract the knowledge from the context of particular Web sites. An android application for mobile payment has been redefined. Payment with extra layer of security and authentication are implemented with complex keys. The update operation is often more than an order of magnitude faster. Using device free passive and high accuracy can be achieved

System Architecture:

Modules: Product Searching Module Filter Module Payment Module Authentication Module Confirmation Module

Conclusion: Thus the replacement of traditional cash or bank card with mobile payment has been made and high authentication security by giving payment mode with the top priority is attained by providing extra layer of affix.

Thank You