Multi-Factor Authentication and Fingerprint-based Debit Card System

One thing can be said to be common to all forms of debit card fraud – authentication bypass. This implies that a secure debit card transaction system can only be guaranteed by a safe and reliable authentication system. Many approaches have been adopted to ensure a secure authentication system, but often, these approaches are either focused on the Automated Teller Machines (ATM)/Point of Sales (POS) terminals or Online/e-commerce transactions, thus not providing full security on both fronts. In this work, we address this problem by adopting a multi-factor debit card system that uses a combination of the traditional Personal Identification Number code (PIN) and the mobile-phone delivered One-Time Password (OTP) with a biometric authentication option (fingerprint). We demonstrate that this approach ensures the security of both online and terminal transactions. The fingerprint option makes it easy to use by people who find memorizing PINs difficult.

[1]  Zhao Yao,et al.  The study of multi-level authentication-based single sign-on system , 2009, 2009 2nd IEEE International Conference on Broadband Network & Multimedia Technology.

[2]  Sunil Gupta The Mobile Banking and Payment Revolution , 2013 .

[3]  Yuri N. Moseykin,et al.  SCIENTIFIC-TECHNICAL COOPERATION WITHIN THE EAEU AS A KEY FACTOR OF THE LOYALTY OF THE PARTICIPATING COUNTRIES’ POPULATION TO THE INTEGRATION AND OF ITS ATTRACTIVENESS FOR NEW MEMBERS , 2018 .

[4]  Do Van Thanh,et al.  Strong authentication with mobile phone as security token , 2009, 2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems.

[5]  P. Gertler,et al.  How Debit Cards Enable the Poor to Save More , 2017, The Journal of Finance.

[6]  Patrick Traynor,et al.  Fear the Reaper: Characterization and Fast Detection of Card Skimmers , 2018, USENIX Security Symposium.

[7]  Phil Gosset,et al.  Classification, Detection and Prosecution of Fraud on Mobile Networks , 1999 .

[8]  Richard J. Sullivan The Changing Nature of US Card Payment Fraud: Issues for Industry and Public Policy , 2010, WEIS.

[9]  Muthucumaru Maheswaran,et al.  Social Authentication Protocol for Mobile Phones , 2009, 2009 International Conference on Computational Science and Engineering.

[10]  D. Parameswari,et al.  SET with SMS OTP using Two Factor Authentication , .

[11]  Wassim El-Hajj,et al.  Two factor authentication using mobile phones , 2009, 2009 IEEE/ACS International Conference on Computer Systems and Applications.

[12]  Sugata Sanyal,et al.  Survey of Strong Authentication Approaches for Mobile Proximity and Remote Wallet Applications - Challenges and Evolution , 2014, ArXiv.

[13]  Michael Okpara,et al.  ENHANCED ATM SECURITY SYSTEM USING BIOMETRICS , 2012 .

[14]  Cyberspace Identity Theft: An Overview , 2015 .