Research on mobile commerce payment management based on the face biometric authentication

This paper mainly put forward the mode of identification and secure payment based on face recognition from a face bio-identification perspective. With the technology of face recognition, the general framework of mobile commerce and the management processes are designed and constructed in this paper. The proposed management solution of anonymous payment, based on face identity, is an important method for m-commerce privacy protection. Users only need a payment expression to replace traditional payment, random verification code input and other cumbersome process, which not only frees mobile users from remembering a lot of numeric passwords but also avoids potential hazards, such as password disclosure, forgotten, lost and illegal access. This paper presents an innovative digital solution to the secure payments in mobile commerce, which greatly enhances the safety and efficiency of mobile payment system and boosts the rapid and humanistic development of mobile commerce by technological means.

[1]  Chung-Ren Ou,et al.  SETNR/A: an agent-based secure payment protocol for mobile commerce , 2010, Int. J. Intell. Inf. Database Syst..

[2]  Oscar Déniz-Suárez,et al.  An Incremental Learning Algorithm for Face Recognition , 2002, Biometric Authentication.

[3]  Lida Xu,et al.  Business Intelligence for Enterprise Systems: A Survey , 2012, IEEE Transactions on Industrial Informatics.

[4]  Lida Xu,et al.  A new type of recurrent fuzzy neural network for modeling dynamic systems , 2001, Knowl. Based Syst..

[5]  Yong Chen,et al.  A System Framework of Security Management in Enterprise Systems , 2013 .

[6]  John T. Kohl,et al.  The Kerberos Network Authentication Service (V5 , 2004 .

[7]  Jian Yang,et al.  Two-dimensional discriminant transform for face recognition , 2005, Pattern Recognit..

[8]  Xiaomin Wang,et al.  Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices , 2008 .

[9]  X. Qin,et al.  ERP research, development and implementation in China: an overview , 2005 .

[10]  Lin Wang,et al.  Electronic commerce international logistics performance influence factor analysis , 2015, Int. J. Mob. Commun..

[11]  Mohamed Kouta,et al.  Modified SET protocol for mobile payment: An empirical analysis , 2010, 2010 2nd International Conference on Software Technology and Engineering.

[12]  Yuguang Fang,et al.  SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks , 2011, IEEE Transactions on Dependable and Secure Computing.

[13]  Chin-Chen Chang,et al.  Enhanced authentication scheme with anonymity for roaming service in global mobility networks , 2009, Comput. Commun..

[14]  Dong Hoon Lee,et al.  Password-Authenticated Key Exchange between Clients with Different Passwords , 2002, ICICS.

[15]  Chen Lizhi User Authentication Mechanism Based on Dynamic Password and Its Security Analysis , 2002 .

[16]  Lida Xu,et al.  Dynamic recurrent neural networks for a hybrid intelligent decision support system for the metallurgical industry , 1999, Expert Syst. J. Knowl. Eng..

[17]  Ma Hui-min Research and Realization of Authentication Technique Based on OTP , 2004 .

[18]  Li D. Xu,et al.  Integrating knowledge management and ERP in enterprise information systems , 2006 .

[19]  Liu Jinye,et al.  An Anonymous Authentication Scheme for Mobile Communication Based on Third-Party , 2012 .

[20]  Li Ying Jin,et al.  Effects of platformization strategy on continuance intention of mobile messaging apps , 2016, Int. J. Mob. Commun..

[21]  Zhang Guan-yu Identity authentication protocol in GSM network environment based on elliptic curve cryptosystem , 2004 .

[22]  Xiaomin Zhu,et al.  A system model and protocol for mobile payment , 2005, IEEE International Conference on e-Business Engineering (ICEBE'05).

[23]  Ji Yi The Research of Identity Authentication and Authorization under Java2 , 2003 .

[24]  Lida Xu,et al.  Enterprise Systems: State-of-the-Art and Future Trends , 2011, IEEE Transactions on Industrial Informatics.

[25]  Richa Singh,et al.  Robust biometric image watermarking for fingerprint and face template protection , 2006, IEICE Electron. Express.

[26]  Chin-Chen Chang,et al.  An efficient multi-server password authenticated key agreement scheme using smart cards with access control , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).

[27]  Elisa Bertino,et al.  Privacy preserving multi-factor authentication with biometrics , 2006, DIM '06.

[28]  Chun-I Fan,et al.  Provably Secure Remote Truly Three-Factor Authentication Scheme With Privacy Protection on Biometrics , 2009, IEEE Transactions on Information Forensics and Security.

[29]  L. Harn Public-key cryptosystem design based on factoring and discrete logarithms , 1994 .

[30]  Pan Wang,et al.  A novel Bayesian learning method for information aggregation in modular neural networks , 2010, Expert Syst. Appl..

[31]  Wang Feng,et al.  Research on Enterprise Operation with Finance and Accounting Cost Calculation Integration Framework System Based on IT Perspective , 2012 .

[32]  Costas Vassilakis,et al.  Context management for m-commerce applications: determinants, methodology and the role of marketing , 2012, Information Technology and Management.

[33]  C. Laih,et al.  New Signature Schemes Based on Factoring and Discrete Logarithms (Special Section on Cryptography and Information Security) , 1997 .

[34]  Zhuming Bi,et al.  Support vector machine and ROC curves for modeling of aircraft fuel consumption , 2015 .

[36]  Alessandra Lumini,et al.  Fingerprint Image Reconstruction from Standard Templates , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[37]  Sun Xiao-mei Improved Scheme for One-time Password Authentication , 2006 .

[38]  Xiaohong Guan,et al.  An SVM-based machine learning method for accurate internet traffic classification , 2010, Inf. Syst. Frontiers.

[39]  Ashutosh Saxena,et al.  A dynamic ID-based remote user authentication scheme , 2004, IEEE Transactions on Consumer Electronics.

[40]  Dai Zhan-feng A Supporting Multi-Mode Application Single Sign-On Scheme Based on PKI/PMI , 2009 .

[41]  Hua Yu,et al.  A direct LDA algorithm for high-dimensional data - with application to face recognition , 2001, Pattern Recognit..

[42]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[43]  Yingjiu Li,et al.  Cryptanalysis of Hsiang-Shih's authentication scheme for multi-server architecture , 2011, Int. J. Commun. Syst..

[44]  Antonio F. Gómez-Skarmeta,et al.  Payment frameworks for the purchase of electronic products and services , 2012, Comput. Stand. Interfaces.

[45]  Leslie Lamport,et al.  Password authentication with insecure communication , 1981, CACM.

[46]  Chun-Ta Li,et al.  An efficient biometrics-based remote user authentication scheme using smart cards , 2010, J. Netw. Comput. Appl..

[47]  W.-S. Juang,et al.  Anonymous channel and authentication in wireless communications , 1999, Comput. Commun..

[48]  Konstantinos N. Plataniotis,et al.  Face recognition using kernel direct discriminant analysis algorithms , 2003, IEEE Trans. Neural Networks.

[49]  Alan L. Yuille,et al.  Feature extraction from faces using deformable templates , 2004, International Journal of Computer Vision.

[50]  Lida Xu,et al.  A neural network representation of linear programming , 2000, Eur. J. Oper. Res..

[51]  G. A. Swanson,et al.  Systems science and enterprise integration, technological economics and the theory of material flow , 2009 .