140 likes | 279 Views
A Fair Biometric Enabled M-Payment Solution with Anonymity Support. Presented by: Șoșu Liviu. Introduction. Mobile commerce Security issues: ► non-repudiation (malicious merchants/customers). Proposals. Biometric Authentication Fair Exchange Anonymity Support. Participants.
E N D
A Fair Biometric Enabled M-Payment Solution withAnonymity Support Presented by: Șoșu Liviu
Introduction • Mobile commerce • Security issues: ► non-repudiation (malicious merchants/customers)
Proposals • Biometric Authentication • Fair Exchange • Anonymity Support
Assumptions 1. The customer has purchased a pre-paid SIM card from the Mobile Operator without revealing his/her identity. The Mobile Operator holds the list of currency accounts corresponding with every SIM card and every authorized merchant. 2. The Mobile Operator has issued an asymmetric key pair for every SIM card and authorized merchants. 3. An on-line trusted Third Party exists. It generates a public/private key pair, (PTP, STP), and its public key PTP is stored in the customer’s Mobile Phone and the merchant also holds it.
Assumptions 4. The fingerprint sensor is embedded in the handset and the customer has stored his/her fingerprint template data inside SIM card. 5. The Mobile Operator provides methods for customer to top up his/her SIM card’s currency account. 6. The customer has stored his/her Delivery Cabinet address information in the Mobile Phone.
Assumptions 7. The Mobile Phone and the Payment Applet share a symmetric encryption session key Kpay for data flow’s exchange between them. 8. The Mobile Phone and Bio-Applet share a symmetric encryption session key Kbio for every data flow’s exchanged between them. 9. Secure channels are set up between parties during the process of transaction. All the communications keep anonymous over these secure channels if the parities do not reveal identities on their own.
Protocol Phases Phase 1: The Customer Triggers the Transaction Message 1: MA → MP: Invoice || PMA Phase 2: The Authentication of the Mobile Phone Message 2: MP → BA: TMP || eK bio(BIO_DATA) Message 3: BA → MP: TBA || eK bio (BIO_RESULT)
Protocol Phases Phase 3: The Payment Applet Sends the Encrypted Payment Message 4: MP →PA: eKpay (Payment Request || Invoice || PMA || PTP) Message 5: PA → MP → MA: zPMA { zEk (ρ )|| sSPA (purchase-order) || PPA }
Protocol Phases Message 6: PA → MP → TP: zK1 (ρ) || zPTP (K1−1 || M ) Phase 4: The Payment is held temporarily Message 7: TP: zPMA {sSTP { amount || zK1 (ρ)}} Phase 5: Verification of the payment Message 8 MA MP: sSMA { sSPA (purchase order)}
System Analysis • Analysis of Fair Exchange • Anonymity and Privacy • Security • Eficiency