Secure and cost effective transaction model for financial services

With the advent of the e-commerce, it has become much easier for a ‘data bandit’ to sit in non descriptive location and quietly siphon away money from the service users. The financial service outlets (e.g. automated teller machine (ATM), point of sale (PoS) terminal) have been a soft target for these bandits since long. In the existing model, the users are forced to trust a service outlet to be authentic. A spoofed outlet can collect the account information and use it in some way later. Installing an outlet is also an expensive affair due to the need of dedicated network connectivity. In this paper, we propose a model that would overcome these security and cost related issues of the conventional Financial Service Model. In developing economies, where two-third of the population still lives in rural areas with limited or no network connectivity, this model can help the banks reach the masses and foster economic growth.

[1]  Robin Sharp Principles of protocol design , 1978 .

[2]  Yehuda Lindell,et al.  Introduction to Modern Cryptography , 2004 .

[3]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[4]  Aditi Gupta Design and Implementation of Public Key Infrastructure on Smart Card Operating System , 2008 .

[5]  Philippe Fouquart,et al.  ASN.1 Communication Between Heterogeneous Systems , 2000 .

[6]  Wolfgang Rankl,et al.  Smart Card Handbook , 1997 .

[7]  Stella Benson The little world , 1925 .

[8]  Rajat Moona,et al.  Using Personal Electronic Device for Authentication-Based Service Access , 2008, 2008 IEEE International Conference on Communications.

[9]  Jacques Stern,et al.  RSA-OAEP Is Secure under the RSA Assumption , 2001, Journal of Cryptology.

[10]  David Cooper,et al.  Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile , 2008, RFC.

[11]  Nitin Munjal Low Cost Secure Transaction Model for Financial Services , 2009 .

[12]  Yehuda Lindell,et al.  Introduction to Modern Cryptography (Chapman & Hall/Crc Cryptography and Network Security Series) , 2007 .

[13]  John W. Rittinghouse,et al.  Cybersecurity Operations Handbook: The Definitive Reference on Operational Cybersecurity , 2003 .

[14]  Xinghuo Yu,et al.  A Novel Hybrid Crypto-Biometric Authentication Scheme for ATM Based Banking Applications , 2006, ICB.

[15]  Sead Muftic,et al.  Mobile ATM for developing countries , 2008, MobiArch '08.