Architecture of Mobile Payment System with Tolerate Mechanism

Article Preview

Abstract:

A good architecture is the basis of system security and stable operation, which can effectively reduce the risk of system construction, and ensure health development. The mobile payment system involves many links; the process is complex and diverse with higher security requirements. Combined with advanced security technology --- tolerance mechanisms, a novel mobile payment system architecture is design. Voting unit and detection unit checks the states of system; management unit restores or reconstructs system to ensure the operation of key services by redundancy of services and equipments; Threshold (n, t) multiplies the difficulty of the attack proxy server to gain access to sensitive information. According to security and performance analysis, proposed architecture is safe and effective.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2539-2543

Citation:

Online since:

December 2012

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] HWANG R J, CHANG C C. An on-line secret sharing scheme for multi-secrets. Computer Communications, 1998, 21(13): 1170-1176.

DOI: 10.1016/s0140-3664(98)00191-1

Google Scholar

[2] SHAMIR A. How to share a secret. Communications of the ACM, 1972,22(11): 612-613.

Google Scholar

[3] WEI Fushan, MA Chuangui, CHENG Qingfeng. Gateway-Oriented Password-Authenticated Key Exchange Based on RSA. Chinese Journal of Computers, 2011, 34(1): 38-43.

DOI: 10.3724/sp.j.1016.2011.00038

Google Scholar

[4] HUANG Meijuan. Threshold Proxy Signature Scheme Based on RSA Cryptosystem. Computer Engineering, 2012, 38(8): 105-106.

Google Scholar

[5] CHENG Jieren, CAI Zhiping, YIN Jianping,ZHANG Ling. Fair and Anonymous Mobile Payment System Utilizing Smart Card. Computer Science, 2011, 38(2): 50-54.

Google Scholar

[6] Huang Zelong,Zhang Wenan,Xie Yun. Research on Key System of Mobile Payment. Telecommunications Science, 2011,6: 21-27.

Google Scholar