Research on identity authentication management in mobile commerce based on ECC and dynamic fingerprint key

This paper aims to provide a secure and reliable solution to the electronic identity authentication in mobile commerce system. The solution is to get high-strength elliptic curve cryptography (ECC) key by generating hash values from dynamic vector collection of fingerprints, which are converted from fingerprint images by randomising angular movement or rotation angle. With the introduction of ECC asymmetric encryption algorithms and SSL-VPN network integration, the proposed security identity authentication of mobile commerce and the processes of access management may well solve the problems of identity control and verification of authorisation management. 536 Z. Peiyan et al. The hybrid authentication and secure mode not only realises the dynamic binding of login users and the control of role management in mobile commerce but also dramatically reduces the risk of internal identity being tampered and brute forced in mobile commerce system, providing a more reliable security for current business transactions and gross settlement.

[1]  Jin Ki Kim,et al.  Selection of digital convergence strategy for telecommunications carriers , 2014, Int. J. Mob. Commun..

[2]  Zinaida Benenson,et al.  Realizing Robust User Authentication in Sensor Networks , 2005 .

[3]  Ronald Mraz Secure Blue: an architecture for a scalable, reliable high volume SSL Internet server , 2001, Seventeenth Annual Computer Security Applications Conference.

[4]  Robert J. Kauffman,et al.  Event history, spatial analysis and count data methods for empirical research in information systems , 2011, Information Technology and Management.

[5]  Bih-Huang Jin,et al.  Analysis of emerging technology adoption for the digital content market , 2012, Inf. Technol. Manag..

[6]  David A. Wagner,et al.  Intercepting mobile communications: the insecurity of 802.11 , 2001, MobiCom '01.

[7]  Cheng-Chi Lee,et al.  A remote user authentication scheme using hash functions , 2002, OPSR.

[8]  Cheng-Chi Lee,et al.  Security Enhancement on a New Authentication Scheme With Anonymity for Wireless Environments , 2006, IEEE Transactions on Industrial Electronics.

[9]  Kin Keung Lai,et al.  An empirical analysis of mobile internet acceptance from a value-based view , 2012, Int. J. Mob. Commun..

[10]  Costas Vassilakis,et al.  Context management for m-commerce applications: determinants, methodology and the role of marketing , 2012, Information Technology and Management.

[11]  Young Bong Chang,et al.  Does RFID improve firms’ financial performance? an empirical analysis , 2011, Inf. Technol. Manag..

[12]  Erik Bohlin,et al.  Empirical exploration of factors that determine multiple mobile phone subscriptions , 2014, Int. J. Mob. Commun..

[13]  David Levin,et al.  Survivable mobile wireless networks: issues, challenges, and research directions , 2002, WiSE '02.

[14]  Chou Chen Yang,et al.  Secure authentication scheme for session initiation protocol , 2005, Comput. Secur..

[15]  Alfred Menezes,et al.  The State of Elliptic Curve Cryptography , 2000, Des. Codes Cryptogr..

[16]  Wang Feng,et al.  Research on Enterprise Operation with Finance and Accounting Cost Calculation Integration Framework System Based on IT Perspective , 2012 .

[17]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[18]  Robert J. Kauffman,et al.  Making the ‘MOST’ out of RFID technology: a research agenda for the study of the adoption, usage and impact of RFID , 2007, Inf. Technol. Manag..

[19]  Shashank Khanvilkar,et al.  Flexi-tunes: an integrated architecture based on flexible tunnels for secure and scalable multimedia comm , 2006 .

[20]  X. Qin,et al.  ERP research, development and implementation in China: an overview , 2005 .

[21]  Alessandra Lumini,et al.  Fingerprint Image Reconstruction from Standard Templates , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[22]  Ashok Kumar Das,et al.  Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards , 2011, IET Inf. Secur..

[23]  Robert J. Kauffman,et al.  Internet-based selling technology and e-commerce growth: a hybrid growth theory approach with cross-model inference , 2011, Inf. Technol. Manag..

[24]  T. Parthasarathy,et al.  Development of a Mathematical Formula for the Calculation of Fingerprint Probabilities Based on Individual Characteristics , 1977 .

[25]  Mark E. Nissen,et al.  Agent-Based Supply Chain Integration , 2001, Inf. Technol. Manag..

[26]  Ching-Wen Lin,et al.  Trading signals analysis of mobile trading services , 2013, Int. J. Mob. Commun..

[27]  Yi Liu,et al.  Towards a theoretical framework of strategic decision, supporting capability and information sharing under the context of Internet of Things , 2012, Information Technology and Management.

[28]  Sunil Erevelles,et al.  Consumer Satisfaction for Internet Service Providers: An Analysis of Underlying Processes , 2003, Inf. Technol. Manag..

[29]  Qin Su,et al.  Analysing relational benefits in e‐business environment from behavioural perspective , 2009 .

[30]  Li D. Xu,et al.  Integrating knowledge management and ERP in enterprise information systems , 2006 .

[31]  Lida Xu,et al.  Enterprise Systems: State-of-the-Art and Future Trends , 2011, IEEE Transactions on Industrial Informatics.

[32]  Anang Hudaya Muhamad Amin,et al.  Biologically inspired mobile agent-based sensor network (BIMAS) , 2014, Int. J. Mob. Commun..

[33]  Chun-Ta Li,et al.  An efficient biometrics-based remote user authentication scheme using smart cards , 2010, J. Netw. Comput. Appl..

[34]  Leslie Lamport,et al.  Password authentication with insecure communication , 1981, CACM.

[35]  Pankaj Setia,et al.  Realizing business value of agile IT applications: antecedents in the supply chain networks , 2008, Inf. Technol. Manag..

[36]  Huimin Liu,et al.  Modelling and analysis techniques for cross‐organizational workflow systems , 2009 .