Conference Paper

Using Personal Electronic Device for Authentication-Based Service Access

Dept. of Comput. Sci. & Eng., Indian Inst. of Technol., Kanpur
DOI: 10.1109/ICC.2008.1108 Conference: Communications, 2008. ICC '08. IEEE International Conference on
Source: IEEE Xplore

ABSTRACT A person usually carries multiple authentication tokens in the form of various cards to access services electronically. Often the service outlets are equipped with a strong infrastructure to permit the user interactions. The network connectivity is usually a must for the service outlet to authenticate the user with the server. In this paper, we propose a solution which uses the personal mobile devices held by the user to interact with the service outlets. Such a system can then alleviate the needs for interaction console and communication infrastructure at service outlets.

0 Bookmarks
 · 
158 Views
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: Installing a financial service outlet (e.g. automated teller machine (ATM)) is an expensive affair due to the need of dedicated network connectivity. In the existing model, the users are forced to trust a service outlet to be authentic. A spoofed outlet can collect the account information and use it in some way later. In this paper, we propose a new model that would overcome these cost and security related issues of the conventional Financial Service Model. In a developing economy like India, whose 70 percent population of 1.15 billion is in rural areas with limited or no network connectivity, this model can help the banks reach the masses.
    01/2009;
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: With the advent of the e-commerce, it has become much easier for a `data bandit' to sit in non descriptive location and quietly siphon away money from the service users. The financial service outlets (e.g. automated teller machine (ATM), point of sale (PoS) terminal) have been a soft target for these bandits since long. In the existing model, the users are forced to trust a service outlet to be authentic. A spoofed outlet can collect the account information and use it in some way later. Installing an outlet is also an expensive affair due to the need of dedicated network connectivity. In this paper, we propose a model that would overcome these security and cost related issues of the conventional Financial Service Model. In developing economies, where two-third of the population still lives in rural areas with limited or no network connectivity, this model can help the banks reach the masses and foster economic growth.
    Ultra Modern Telecommunications & Workshops, 2009. ICUMT '09. International Conference on; 11/2009
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: Nowadays, new tools and technologies are emerging rapidly. They are often used cross-culturally before being tested for suitability and validity. However, they would be validated to ensure that they work with all users, not just part of them. Mobile banking (as a new technology tool) has been introduced assuming that it performs well concerning authentication among all members of the society. We aim to validate mobile banking intention to use, through Technology Acceptance Model (TAM), focused on security, in Arabic countries, namely Yemen. The results confirm the previous studies that have shown the importance of perceived ease of use and perceived usefulness.
    Research and Design Innovations for Mobile User Experience, 1 edited by Kerem Rizvanoglu, Gorkem Cetin, 10/2014: chapter Determinants of Behavioral Intention to Mobile Banking in Arab Culture, Research and Design Innovations for Mobile User Experience, , Editors; IGI Global.

Full-text (2 Sources)

Download
8 Downloads
Available from
Jun 11, 2014