IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Identity Authentication Security Management in Mobile Payment Systems

Identity Authentication Security Management in Mobile Payment Systems
View Sample PDF
Author(s): Feng Wang (School of Management, Jilin University, Changchun, China), Ge Bao Shan (School of Management, Jilin University, Changchun, China), Yong Chen (School of Business, Texas A&M International University, Laredo, USA), Xianrong Zheng (Department of Information Technology and Decision Sciences, Old Dominion University, Norfolk, USA), Hong Wang (College of Business and Economics, North Carolina A&T State University, Greensboro, USA), Sun Mingwei (Public Education and Teaching Department, Changchun Automobile Industry Institute, Changchun, China)and Li Haihua (School of Management Science and Information Engineering, Jilin University of Finance and Economics, Changchun, China)
Copyright: 2020
Volume: 28
Issue: 1
Pages: 15
Source title: Journal of Global Information Management (JGIM)
Editor(s)-in-Chief: Zuopeng (Justin) Zhang (University of North Florida, USA)
DOI: 10.4018/JGIM.2020010110

Purchase

View Identity Authentication Security Management in Mobile Payment Systems on the publisher's website for pricing and purchasing information.

Abstract

Mobile payment is a new payment method offering users mobility, reachability, compatibility, and convenience. But mobile payment involves great uncertainty and risk given its electronic and wireless nature. Therefore, biometric authentication has been adopted widely in mobile payment in recent years. However, although technology requirements for secure mobile payment have been met, standards and consistent requirements of user authentication in mobile payment are not available. The flow management of user authentication in mobile payment is still at its early stage. Accordingly, this paper proposes an anonymous authentication and management flow for mobile payment to support secure transaction to prevent the disclosure of users' information and to reduce identity theft. The proposed management flow integrates transaction key generation, encryption and decryption, and matching to process users' personal information and biometric characteristics based on mobile equipment authentication carrier.

Related Content

Santosh Kumar Srivastava, Susmi Routray, Surajit Bag, Shivam Gupta, Justin Zuopeng Zhang. © 2024. 29 pages.
Hsiang-Lan Cheng, Chiew Mei Tan, Chao-Min Chiu, Hsin-Yi Huang, Yi-Chien Lee. © 2024. 39 pages.
Zixuan Li, Chengli Wang. © 2024. 23 pages.
Lan Zhang, Yuwei Ye, Zixuan Meng, Ning Ma, Chia-Huei Wu. © 2024. 20 pages.
Haowei Zhang, Yang Lv, Su Zhang, Yulong David Liu. © 2024. 20 pages.
Yongling Zhang, Huaqing Du, Tianyu Piao, Hongyu Shi, Sang-Bing (Jason) Tsai. © 2024. 26 pages.
Hyundong Nam, Taewoo Nam, Songeun Kim. © 2024. 21 pages.
Body Bottom