tailieunhanh - A survey on “security of smart card payment”

To ensure communication between the banking server and the client, they will use security algorithms such as the Brute Force algorithm, the MD5 Hashing algorithm and the Base64 algorithm. There proposed technique will ensure the flow of payment of the card. | ISSN:2249-5789 Taware Tushar et al, International Journal of Computer Science & Communication Networks,Vol 7(1),17-20 A Survey on “Security of smart card payment” TawareTushar , BhosaleAmit , SurveSujit Department of Computer Engineering Someshwar Engineering College, Someshwarnagar, , surve7sujit@ Abstract: Shoulder surfing uses direct observation techniques, such as looking over someone's shoulder for information. It is an effective way to get information in crowded places because it is relatively easy to be next to someone who enters a PIN number. When the customer hits his credit / debit card at the merchants terminal then the merchant system will communicate with the bank server for the bank server clients for the bank account details of the bank server will also notify customers of the mobile phone to enter the PIN and the customer will enter their pin from their mobile phone instead of the merchant's keyboard. To ensure communication between the banking server and the client, they will use security algorithms such as the Brute Force algorithm, the MD5 Hashing algorithm and the Base64 algorithm. There proposed technique will ensure the flow of payment of the card. Keywords : User Authentication, Shoulder Surfing Attack, Personal Identification Number, Session Key. more security to a user by typing his password, in a public place such as shopping centers, cinemas, etc. The systems use the CHIP + PIN method. Activated CHIP + PIN credit cards offer more security and protection against fraud. According to there proposal technique they wanted bank server to accept PIN from mobile phone users and not keyboard merchants. Therefore, when the user card swap user payment, the bank server will notify user on their mobile to enter the PIN number Technical Methods Black and white method: The basic model consists of the horizontal digits from 0 to 9 and randomly arranged colors The black and white .

crossorigin="anonymous">
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.