SlideShare une entreprise Scribd logo
1  sur  3
Télécharger pour lire hors ligne
@ IJTSRD | Available Online @ www.ijtsrd.com
ISSN No: 2456
International
Research
Pay
1
Dr. B. Srinivasa Rao, 2
Ch. Sphoorthi,
1,2,3,4,5
Dept. of CSE, Dhanekula Institute of Engineering & Technology, Ganguru, Vijayawada,
ABSTRACT
Continuous improvements in technology and quality
of life have had a strong impact on the development
of payment techniques. With the evolution of near
field communication (NFC) technology, contactless
payment has received recent attention because of its
short-range, conducive nature. As mobile computing
made great leaps due to enormous development in the
smart phone platform, companies like Google,
Samsung, and Apple embedded NFC in smart phones
to provide on-the-go payment capabilities, eliminating
the need for payment cards. But due to
interoperability and high cost, these technologies are
not available to everyone.
Keywords: Biometrics, mobile computing, ne
communication, telecommunication security
I. INTRODUCTION
The ideal technology would combine the best features
of contactless payment with reliable security at an
affordable cost. This article presents a prototype of a
hardware module called Pay-Cloak, which could be
used as a back cover for an NFC enabled smart phone.
The module communicates via Bluetooth with an
Android application installed in the smart phone after
verifying the user’s identity through a capacitive
fingerprint sensor. The application processes both
merchant point-of-sale (POS) payments using quick
response (QR) codes and peer-to-peer (P2P) payment
using NFC. The security of the transaction is further
enhanced using the tokenization technique. The app
can also be used as a virtual form of identification
(ID).
@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 3 | Mar-Apr 2018
ISSN No: 2456 - 6470 | www.ijtsrd.com | Volume
International Journal of Trend in Scientific
Research and Development (IJTSRD)
International Open Access Journal
Pay-Cloak: Biometric
Ch. Sphoorthi, 3
K. Teja Sree, 4
G. Sai Snigdha, 5
V.
1
Professor, 2,3,4,5
Student
Dhanekula Institute of Engineering & Technology, Ganguru, Vijayawada,
Continuous improvements in technology and quality
of life have had a strong impact on the development
of payment techniques. With the evolution of near-
communication (NFC) technology, contactless
payment has received recent attention because of its
range, conducive nature. As mobile computing
made great leaps due to enormous development in the
smart phone platform, companies like Google,
d Apple embedded NFC in smart phones
go payment capabilities, eliminating
the need for payment cards. But due to
interoperability and high cost, these technologies are
Biometrics, mobile computing, near-field
communication, telecommunication security
The ideal technology would combine the best features
of contactless payment with reliable security at an
affordable cost. This article presents a prototype of a
ak, which could be
used as a back cover for an NFC enabled smart phone.
The module communicates via Bluetooth with an
Android application installed in the smart phone after
verifying the user’s identity through a capacitive
ion processes both
sale (POS) payments using quick
peer (P2P) payment
using NFC. The security of the transaction is further
enhanced using the tokenization technique. The app
orm of identification
Due to its very less communication range, NFC is
preferred for payment-related needs. In 1995, Seoul
Bus Transport first implemented contactless payment
technology. In 2007, Barclay card first embedded
NFC in its payment card to support contactless
payment. Since then, NFC development took a huge
leap, and contactless transaction is increasing every
day. Many researchers are exploring the use cases of
NFC for different payment-related issues.
In present days, the security of a system is critical
question in every field as hacking is a big concern. As
the payment technologies are being converted to
internet based service, hacking has also become a
major threat to crack a system. So, while developing a
payment technology it is very much required to
concentrate on the security. In the proposed
methodology, we have tried to increase the security
with the use of biometric trait of the user. This
architecture mainly has two parts: App development
for NFC enabled Smartphone and an external
hardware part, which will be basically realized as a
back cover of the phone. Here, in the proposed
method an android application installed in the smart
phone communicate with the external hardware
through Bluetooth and also connected with a cloud
server through GPRS. The system also incorporates
the Tokenization technique to eliminate the need of
sending sensitive information o
functioning of the proposed mobile Application can
be divided into three parts: QR Code Based Merchant
Payment, Peer To Peer money transaction and ID
virtualization.
II. LITERATURE REVIEW
Apr 2018 Page: 1577
6470 | www.ijtsrd.com | Volume - 2 | Issue – 3
Scientific
(IJTSRD)
International Open Access Journal
V. S R Harika
Dhanekula Institute of Engineering & Technology, Ganguru, Vijayawada, Andhra Pradesh
Due to its very less communication range, NFC is
related needs. In 1995, Seoul
Bus Transport first implemented contactless payment
technology. In 2007, Barclay card first embedded
NFC in its payment card to support contactless
payment. Since then, NFC development took a huge
leap, and contactless transaction is increasing every
Many researchers are exploring the use cases of
related issues.
In present days, the security of a system is critical
question in every field as hacking is a big concern. As
the payment technologies are being converted to
et based service, hacking has also become a
major threat to crack a system. So, while developing a
payment technology it is very much required to
concentrate on the security. In the proposed
methodology, we have tried to increase the security
of biometric trait of the user. This
architecture mainly has two parts: App development
for NFC enabled Smartphone and an external
hardware part, which will be basically realized as a
back cover of the phone. Here, in the proposed
tion installed in the smart
phone communicate with the external hardware
through Bluetooth and also connected with a cloud
server through GPRS. The system also incorporates
the Tokenization technique to eliminate the need of
sending sensitive information over the network. The
functioning of the proposed mobile Application can
be divided into three parts: QR Code Based Merchant
Payment, Peer To Peer money transaction and ID
LITERATURE REVIEW
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 3 | Mar-Apr 2018 Page: 1578
Advancement in payment technologies has an
important impact on one's quality of life. Emerging
payment technologies create both opportunities and
challenges for the future. Being a quick and
convenient process, contactless payment gained
momentum, especially with merchants, with
throughput being the main parameter.
Any combination of various smart components can
make cities smart. Swing-pay: A digital card module
using NFC and bio-metric authentication for peer-to-
peer payment. Advancement in payment technologies
has an important impact on one's quality of life.
Emerging payment technologies create both
opportunities and challenges for the future.
Portable radio frequency emitting identifier is based
on automatic toll collection system wherein user
doesn’t have to pay toll by cash, user has to purchase
etc tag from designated counters and get it fixed on
vehicle, tag will act like a prepaid card wherein user
has to recharge the same to ensure sufficient balance,
as and when vehicle passes through the etc lane on
toll plazas, the balance will be automatically deducted
from card and user need not to stop his vehicle since
after deduction of money from certain length, the
traffic barrier will automatically open thus allowing
user to avoid waiting in long queues which in turn
saves the fuel as well as time of user.
III. PROPOSED SYSTEM
In divergence to the existing system, in this paper we
develop a web application where the key modules are
user and viewing/login. Pay-Cloak uses fingerprint
authentication and a tokenization scheme for
verification and security. Swing-Pay and Pay-Cloak
both have the same functioning and processes. The
key difference is that Swing-Pay is a separate module
that can handle all payment and identity needs,
whereas Pay-Cloak can be attached with existing
NFC-enabled smart phones to process the transactions
and identity virtualization.
Fig.1 the architecture of the system shows how this
application works.
Fig. 1: Architecture of the system.
In our proposed system, we are developing an
Android Payment Application, using Biometric
System instead of OTP, which can secure our
payments more and more.
The main advantage of this application is it provides
more security to our payment wallets than the existing
system does.
CONCLUSION
To the best of our understanding, in this paper, we
presented a system incorporating a NFC enabled
smart phone, which could be realized as an external
smart phone cover consisting of a fingerprint sensor.
The fingerprint sensor authenticates the user and
sends appropriate data to the smart phone app. The
process is very intuitive because the user does not
have to put any information like card number, expiry
date etc. like traditional systems. Also we have used
the fingerprint sensor as our secure element, which
verifies the biometric trait of the user. We have also
integrated the Tokenization technique and QR code
scanning feature in the application. The app securely
stores the Token in the local database which can only
be used if the Biometric data is matched. All the
process runs in the background without the need of
entering bank / card information manually. As the
Token only stored in the Bank server and customer’s
mobile device, the chance of data breach is less
compared to other existing solutions. The App can
also be used to virtualize the identity information,
eliminating the need of carrying all the ID cards like
driving license, passport, voter ID card etc. The ID
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 3 | Mar-Apr 2018 Page: 1579
information is displayed on a reader device with NFC
antenna.
REFRENCES
1. S. Ghosh, J. Goswami, A. Majumder, A. Kumar,
S. P. Mohanty, and B. K. Bhattacharyya, "Swing-
Pay: A Digital Card Module using NFC and
Biometric Authentication for Peer-to-Peer
Payment", IEEE Consumer Electronics Magazine,
Volume 7, Issue 1, Jan 2017, pp. in press.
2. D. Abrazhevich, “Electronic Payment Systems: A
User-Centered Perspective and Interaction
Design”, Ph.D. Thesis, Eindhoven University of
Technology, The Netherlands.
3. C. A. Walton, “Portable radio frequency emitting
identifier” US Patent 4 3842 88, Dec.30, 1980.
4. Smart Card Alliance, “Contactless Payment and
the Retail Pint of Sale: Applications, Technologies
and Transaction Models”, Smart Card Alliance.
Princeton Junction, NJ, Mar. 2003.
5. Radio Electronics, “NFC Near Field
Communication Tutorial,” [Online]. Available:
http://www.radioelectronics.com/info/wireless/nfc
/near-field-communications-tutorial.php.
6. S. Ghosh, J. Goswami, A. Kumar, A. Majumder,
"Issues in NFC as a form of contactless
communication: A comprehensive survey", in
Proc. ICSTM, 2015, pp. 245-252
7. E. Haselsteiner, & K. Breitfuß, (2006, July).
Security in near field communication (NFC).
Presented at Workshop on RFID security,
[Online].
Available:http://events.iaik.tugraz.at/RFIDSec06/
Program/papers/002%20%20Security%20in%20N
FC.pdf, 2006.
8. NFC Times.Barclay Card. [Online]. Available:
http://nfctimes.com/company/barclaycard.
9. C. P. Beshouri and J. Gravråk, “Capturing the
promise of mobile banking in emerging markets,”
McKinsey & Comp., New York City, NY, Apr.
2010.
10. S. Clark. “Google unveils first Android NFC
phone — but Nexus S is limited to tag reading
only for now”, [Online].
Available:http://www.nfcworld.com/2010/12/07/3
5385/google-unveils-first-android-nfc-phone-but-
nexus-s-is-limited-to-tag-reading-only-for-now/.
Dec. 2010.
11. Google, “Google Wallet”. [Online]. Available:
https://www.google.com/wallet/faq
12. G. Paul, and J. Irvine. (2016). “IEDs on the Road
to Fingerprint Authentication: Biometrics have
vulnerabilities that PINs and passwords don't.”
IEEE Consumer Electronics Magazine 5(2), pp.
79-86.

Contenu connexe

Tendances

Biometrics in India
Biometrics in IndiaBiometrics in India
Biometrics in India
Kshitij Behl
 
SBVLC: Secure Barcode-based Visible Light Communication for Smart phones
SBVLC: Secure Barcode-based Visible Light Communication for Smart phonesSBVLC: Secure Barcode-based Visible Light Communication for Smart phones
SBVLC: Secure Barcode-based Visible Light Communication for Smart phones
Kamal Spring
 
Paper id 252014116
Paper id 252014116Paper id 252014116
Paper id 252014116
IJRAT
 
Two aspect authentication system using secure
Two aspect authentication system using secureTwo aspect authentication system using secure
Two aspect authentication system using secure
Uvaraj Shan
 

Tendances (19)

Security issues in_mobile_payment
Security issues in_mobile_paymentSecurity issues in_mobile_payment
Security issues in_mobile_payment
 
Overview of Mobile Payment Systems
Overview of Mobile Payment SystemsOverview of Mobile Payment Systems
Overview of Mobile Payment Systems
 
Report
ReportReport
Report
 
IRJET- High Security in Automated Fare Collection for TollSystem with NFC usi...
IRJET- High Security in Automated Fare Collection for TollSystem with NFC usi...IRJET- High Security in Automated Fare Collection for TollSystem with NFC usi...
IRJET- High Security in Automated Fare Collection for TollSystem with NFC usi...
 
Secure Authentication for Mobile Banking Using Facial Recognition
Secure Authentication for Mobile Banking Using Facial RecognitionSecure Authentication for Mobile Banking Using Facial Recognition
Secure Authentication for Mobile Banking Using Facial Recognition
 
Biometrics in India
Biometrics in IndiaBiometrics in India
Biometrics in India
 
Location Based Services in M-Commerce: Customer Trust and Transaction Securit...
Location Based Services in M-Commerce: Customer Trust and Transaction Securit...Location Based Services in M-Commerce: Customer Trust and Transaction Securit...
Location Based Services in M-Commerce: Customer Trust and Transaction Securit...
 
SBVLC: Secure Barcode-based Visible Light Communication for Smart phones
SBVLC: Secure Barcode-based Visible Light Communication for Smart phonesSBVLC: Secure Barcode-based Visible Light Communication for Smart phones
SBVLC: Secure Barcode-based Visible Light Communication for Smart phones
 
Paper id 252014116
Paper id 252014116Paper id 252014116
Paper id 252014116
 
Trend of NFC Technology for Payment Transaction
Trend of NFC Technology for Payment TransactionTrend of NFC Technology for Payment Transaction
Trend of NFC Technology for Payment Transaction
 
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
 
Two aspect authentication system using secure
Two aspect authentication system using secureTwo aspect authentication system using secure
Two aspect authentication system using secure
 
AI Deep Learning Patents Data 3Q 2016
AI Deep Learning Patents Data 3Q 2016AI Deep Learning Patents Data 3Q 2016
AI Deep Learning Patents Data 3Q 2016
 
IRJET - Three Layered Security for Banking
IRJET -  	  Three Layered Security for BankingIRJET -  	  Three Layered Security for Banking
IRJET - Three Layered Security for Banking
 
Biometric Identification Evolves to Provide Unprecedented Security & Reliability
Biometric Identification Evolves to Provide Unprecedented Security & ReliabilityBiometric Identification Evolves to Provide Unprecedented Security & Reliability
Biometric Identification Evolves to Provide Unprecedented Security & Reliability
 
India Biometrics Market Forecast and Opportunities, 2019
India Biometrics Market Forecast and Opportunities, 2019India Biometrics Market Forecast and Opportunities, 2019
India Biometrics Market Forecast and Opportunities, 2019
 
Mobile Banking – A Transformation of Traditional Banking
Mobile Banking – A Transformation of Traditional BankingMobile Banking – A Transformation of Traditional Banking
Mobile Banking – A Transformation of Traditional Banking
 
Secure E-Banking Using Bioinformatics
Secure E-Banking Using BioinformaticsSecure E-Banking Using Bioinformatics
Secure E-Banking Using Bioinformatics
 
D0351022026
D0351022026D0351022026
D0351022026
 

Similaire à Pay-Cloak:Biometric

Similaire à Pay-Cloak:Biometric (20)

The Fact-Finding Security Examination in NFC-enabled Mobile Payment System
The Fact-Finding Security Examination in NFC-enabled Mobile Payment System The Fact-Finding Security Examination in NFC-enabled Mobile Payment System
The Fact-Finding Security Examination in NFC-enabled Mobile Payment System
 
IRJET- Smart Shopping Application using NFC
IRJET- Smart Shopping Application using NFCIRJET- Smart Shopping Application using NFC
IRJET- Smart Shopping Application using NFC
 
Payments(paa s) – the new mantra and trends
Payments(paa s) – the new mantra and trendsPayments(paa s) – the new mantra and trends
Payments(paa s) – the new mantra and trends
 
IRJET - A Survey Paper on Secure Digital Payment
IRJET -  	  A Survey Paper on Secure Digital PaymentIRJET -  	  A Survey Paper on Secure Digital Payment
IRJET - A Survey Paper on Secure Digital Payment
 
Smart Verification of Passenger using AI
Smart Verification of Passenger using AISmart Verification of Passenger using AI
Smart Verification of Passenger using AI
 
Face Recognition Using ML in Public Transports
Face Recognition Using ML in Public TransportsFace Recognition Using ML in Public Transports
Face Recognition Using ML in Public Transports
 
Gresham Publication
Gresham PublicationGresham Publication
Gresham Publication
 
Mobile Transaction Using Near Field Communication(NFC)
Mobile Transaction Using Near Field Communication(NFC)Mobile Transaction Using Near Field Communication(NFC)
Mobile Transaction Using Near Field Communication(NFC)
 
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-PaymentsSurvey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
 
MOBILE PHONE APPLICATION PROGRAMMING INTERFACES FOR E-COMMERCE
MOBILE PHONE APPLICATION PROGRAMMING INTERFACES FOR E-COMMERCEMOBILE PHONE APPLICATION PROGRAMMING INTERFACES FOR E-COMMERCE
MOBILE PHONE APPLICATION PROGRAMMING INTERFACES FOR E-COMMERCE
 
IRJET- A Mobile Payment System Based on Face Recognition
IRJET- A Mobile Payment System Based on Face RecognitionIRJET- A Mobile Payment System Based on Face Recognition
IRJET- A Mobile Payment System Based on Face Recognition
 
Digital Wallet App Development Guide 2023.pdf
Digital Wallet App Development Guide 2023.pdfDigital Wallet App Development Guide 2023.pdf
Digital Wallet App Development Guide 2023.pdf
 
Literature Review 3 (2).docx
Literature Review 3 (2).docxLiterature Review 3 (2).docx
Literature Review 3 (2).docx
 
Design and develop authentication in electronic payment systems based on IoT ...
Design and develop authentication in electronic payment systems based on IoT ...Design and develop authentication in electronic payment systems based on IoT ...
Design and develop authentication in electronic payment systems based on IoT ...
 
Trends in Software Development for 2023
Trends in Software Development for 2023Trends in Software Development for 2023
Trends in Software Development for 2023
 
Trends in Software Development for 2023
Trends in Software Development for 2023Trends in Software Development for 2023
Trends in Software Development for 2023
 
Study on The Impact And Social Implications of Fintech
Study on The Impact And Social Implications of FintechStudy on The Impact And Social Implications of Fintech
Study on The Impact And Social Implications of Fintech
 
All the 12 Payment Enabling Technologies & 54 Illustrative Companies
All the 12 Payment Enabling  Technologies & 54  Illustrative CompaniesAll the 12 Payment Enabling  Technologies & 54  Illustrative Companies
All the 12 Payment Enabling Technologies & 54 Illustrative Companies
 
Mobility as a driver of IOT
Mobility as a driver of IOTMobility as a driver of IOT
Mobility as a driver of IOT
 
Security and privacy in smart city: a secure e-voting system based on blockch...
Security and privacy in smart city: a secure e-voting system based on blockch...Security and privacy in smart city: a secure e-voting system based on blockch...
Security and privacy in smart city: a secure e-voting system based on blockch...
 

Plus de ijtsrd

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
ijtsrd
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
ijtsrd
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
ijtsrd
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
ijtsrd
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
ijtsrd
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
ijtsrd
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
ijtsrd
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
ijtsrd
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
ijtsrd
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
ijtsrd
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
ijtsrd
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
ijtsrd
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
ijtsrd
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
ijtsrd
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
ijtsrd
 

Plus de ijtsrd (20)

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learning
 

Dernier

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 

Dernier (20)

ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 

Pay-Cloak:Biometric

  • 1. @ IJTSRD | Available Online @ www.ijtsrd.com ISSN No: 2456 International Research Pay 1 Dr. B. Srinivasa Rao, 2 Ch. Sphoorthi, 1,2,3,4,5 Dept. of CSE, Dhanekula Institute of Engineering & Technology, Ganguru, Vijayawada, ABSTRACT Continuous improvements in technology and quality of life have had a strong impact on the development of payment techniques. With the evolution of near field communication (NFC) technology, contactless payment has received recent attention because of its short-range, conducive nature. As mobile computing made great leaps due to enormous development in the smart phone platform, companies like Google, Samsung, and Apple embedded NFC in smart phones to provide on-the-go payment capabilities, eliminating the need for payment cards. But due to interoperability and high cost, these technologies are not available to everyone. Keywords: Biometrics, mobile computing, ne communication, telecommunication security I. INTRODUCTION The ideal technology would combine the best features of contactless payment with reliable security at an affordable cost. This article presents a prototype of a hardware module called Pay-Cloak, which could be used as a back cover for an NFC enabled smart phone. The module communicates via Bluetooth with an Android application installed in the smart phone after verifying the user’s identity through a capacitive fingerprint sensor. The application processes both merchant point-of-sale (POS) payments using quick response (QR) codes and peer-to-peer (P2P) payment using NFC. The security of the transaction is further enhanced using the tokenization technique. The app can also be used as a virtual form of identification (ID). @ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 3 | Mar-Apr 2018 ISSN No: 2456 - 6470 | www.ijtsrd.com | Volume International Journal of Trend in Scientific Research and Development (IJTSRD) International Open Access Journal Pay-Cloak: Biometric Ch. Sphoorthi, 3 K. Teja Sree, 4 G. Sai Snigdha, 5 V. 1 Professor, 2,3,4,5 Student Dhanekula Institute of Engineering & Technology, Ganguru, Vijayawada, Continuous improvements in technology and quality of life have had a strong impact on the development of payment techniques. With the evolution of near- communication (NFC) technology, contactless payment has received recent attention because of its range, conducive nature. As mobile computing made great leaps due to enormous development in the smart phone platform, companies like Google, d Apple embedded NFC in smart phones go payment capabilities, eliminating the need for payment cards. But due to interoperability and high cost, these technologies are Biometrics, mobile computing, near-field communication, telecommunication security The ideal technology would combine the best features of contactless payment with reliable security at an affordable cost. This article presents a prototype of a ak, which could be used as a back cover for an NFC enabled smart phone. The module communicates via Bluetooth with an Android application installed in the smart phone after verifying the user’s identity through a capacitive ion processes both sale (POS) payments using quick peer (P2P) payment using NFC. The security of the transaction is further enhanced using the tokenization technique. The app orm of identification Due to its very less communication range, NFC is preferred for payment-related needs. In 1995, Seoul Bus Transport first implemented contactless payment technology. In 2007, Barclay card first embedded NFC in its payment card to support contactless payment. Since then, NFC development took a huge leap, and contactless transaction is increasing every day. Many researchers are exploring the use cases of NFC for different payment-related issues. In present days, the security of a system is critical question in every field as hacking is a big concern. As the payment technologies are being converted to internet based service, hacking has also become a major threat to crack a system. So, while developing a payment technology it is very much required to concentrate on the security. In the proposed methodology, we have tried to increase the security with the use of biometric trait of the user. This architecture mainly has two parts: App development for NFC enabled Smartphone and an external hardware part, which will be basically realized as a back cover of the phone. Here, in the proposed method an android application installed in the smart phone communicate with the external hardware through Bluetooth and also connected with a cloud server through GPRS. The system also incorporates the Tokenization technique to eliminate the need of sending sensitive information o functioning of the proposed mobile Application can be divided into three parts: QR Code Based Merchant Payment, Peer To Peer money transaction and ID virtualization. II. LITERATURE REVIEW Apr 2018 Page: 1577 6470 | www.ijtsrd.com | Volume - 2 | Issue – 3 Scientific (IJTSRD) International Open Access Journal V. S R Harika Dhanekula Institute of Engineering & Technology, Ganguru, Vijayawada, Andhra Pradesh Due to its very less communication range, NFC is related needs. In 1995, Seoul Bus Transport first implemented contactless payment technology. In 2007, Barclay card first embedded NFC in its payment card to support contactless payment. Since then, NFC development took a huge leap, and contactless transaction is increasing every Many researchers are exploring the use cases of related issues. In present days, the security of a system is critical question in every field as hacking is a big concern. As the payment technologies are being converted to et based service, hacking has also become a major threat to crack a system. So, while developing a payment technology it is very much required to concentrate on the security. In the proposed methodology, we have tried to increase the security of biometric trait of the user. This architecture mainly has two parts: App development for NFC enabled Smartphone and an external hardware part, which will be basically realized as a back cover of the phone. Here, in the proposed tion installed in the smart phone communicate with the external hardware through Bluetooth and also connected with a cloud server through GPRS. The system also incorporates the Tokenization technique to eliminate the need of sending sensitive information over the network. The functioning of the proposed mobile Application can be divided into three parts: QR Code Based Merchant Payment, Peer To Peer money transaction and ID LITERATURE REVIEW
  • 2. International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470 @ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 3 | Mar-Apr 2018 Page: 1578 Advancement in payment technologies has an important impact on one's quality of life. Emerging payment technologies create both opportunities and challenges for the future. Being a quick and convenient process, contactless payment gained momentum, especially with merchants, with throughput being the main parameter. Any combination of various smart components can make cities smart. Swing-pay: A digital card module using NFC and bio-metric authentication for peer-to- peer payment. Advancement in payment technologies has an important impact on one's quality of life. Emerging payment technologies create both opportunities and challenges for the future. Portable radio frequency emitting identifier is based on automatic toll collection system wherein user doesn’t have to pay toll by cash, user has to purchase etc tag from designated counters and get it fixed on vehicle, tag will act like a prepaid card wherein user has to recharge the same to ensure sufficient balance, as and when vehicle passes through the etc lane on toll plazas, the balance will be automatically deducted from card and user need not to stop his vehicle since after deduction of money from certain length, the traffic barrier will automatically open thus allowing user to avoid waiting in long queues which in turn saves the fuel as well as time of user. III. PROPOSED SYSTEM In divergence to the existing system, in this paper we develop a web application where the key modules are user and viewing/login. Pay-Cloak uses fingerprint authentication and a tokenization scheme for verification and security. Swing-Pay and Pay-Cloak both have the same functioning and processes. The key difference is that Swing-Pay is a separate module that can handle all payment and identity needs, whereas Pay-Cloak can be attached with existing NFC-enabled smart phones to process the transactions and identity virtualization. Fig.1 the architecture of the system shows how this application works. Fig. 1: Architecture of the system. In our proposed system, we are developing an Android Payment Application, using Biometric System instead of OTP, which can secure our payments more and more. The main advantage of this application is it provides more security to our payment wallets than the existing system does. CONCLUSION To the best of our understanding, in this paper, we presented a system incorporating a NFC enabled smart phone, which could be realized as an external smart phone cover consisting of a fingerprint sensor. The fingerprint sensor authenticates the user and sends appropriate data to the smart phone app. The process is very intuitive because the user does not have to put any information like card number, expiry date etc. like traditional systems. Also we have used the fingerprint sensor as our secure element, which verifies the biometric trait of the user. We have also integrated the Tokenization technique and QR code scanning feature in the application. The app securely stores the Token in the local database which can only be used if the Biometric data is matched. All the process runs in the background without the need of entering bank / card information manually. As the Token only stored in the Bank server and customer’s mobile device, the chance of data breach is less compared to other existing solutions. The App can also be used to virtualize the identity information, eliminating the need of carrying all the ID cards like driving license, passport, voter ID card etc. The ID
  • 3. International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470 @ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 3 | Mar-Apr 2018 Page: 1579 information is displayed on a reader device with NFC antenna. REFRENCES 1. S. Ghosh, J. Goswami, A. Majumder, A. Kumar, S. P. Mohanty, and B. K. Bhattacharyya, "Swing- Pay: A Digital Card Module using NFC and Biometric Authentication for Peer-to-Peer Payment", IEEE Consumer Electronics Magazine, Volume 7, Issue 1, Jan 2017, pp. in press. 2. D. Abrazhevich, “Electronic Payment Systems: A User-Centered Perspective and Interaction Design”, Ph.D. Thesis, Eindhoven University of Technology, The Netherlands. 3. C. A. Walton, “Portable radio frequency emitting identifier” US Patent 4 3842 88, Dec.30, 1980. 4. Smart Card Alliance, “Contactless Payment and the Retail Pint of Sale: Applications, Technologies and Transaction Models”, Smart Card Alliance. Princeton Junction, NJ, Mar. 2003. 5. Radio Electronics, “NFC Near Field Communication Tutorial,” [Online]. Available: http://www.radioelectronics.com/info/wireless/nfc /near-field-communications-tutorial.php. 6. S. Ghosh, J. Goswami, A. Kumar, A. Majumder, "Issues in NFC as a form of contactless communication: A comprehensive survey", in Proc. ICSTM, 2015, pp. 245-252 7. E. Haselsteiner, & K. Breitfuß, (2006, July). Security in near field communication (NFC). Presented at Workshop on RFID security, [Online]. Available:http://events.iaik.tugraz.at/RFIDSec06/ Program/papers/002%20%20Security%20in%20N FC.pdf, 2006. 8. NFC Times.Barclay Card. [Online]. Available: http://nfctimes.com/company/barclaycard. 9. C. P. Beshouri and J. Gravråk, “Capturing the promise of mobile banking in emerging markets,” McKinsey & Comp., New York City, NY, Apr. 2010. 10. S. Clark. “Google unveils first Android NFC phone — but Nexus S is limited to tag reading only for now”, [Online]. Available:http://www.nfcworld.com/2010/12/07/3 5385/google-unveils-first-android-nfc-phone-but- nexus-s-is-limited-to-tag-reading-only-for-now/. Dec. 2010. 11. Google, “Google Wallet”. [Online]. Available: https://www.google.com/wallet/faq 12. G. Paul, and J. Irvine. (2016). “IEDs on the Road to Fingerprint Authentication: Biometrics have vulnerabilities that PINs and passwords don't.” IEEE Consumer Electronics Magazine 5(2), pp. 79-86.