CONCEPTION OF BI-FOLD AUTHENTICATED AGENT – MONITORED TRANSACTION ARCHITECTURE

The aim of this paper is to provide an introduction towards the architectural design of a bi-fold authenticated agent-monitored transaction model. The focus is primarily on implementation in ATM systems which provide the following facilities of withdrawing currency at any remote terminal, verificati...

Full description

Bibliographic Details
Main Authors: Srivatsan Sridharan, Gorthy Ravi Kiran
Format: Article
Language:English
Published: ICT Academy of Tamil Nadu 2014-06-01
Series:ICTACT Journal on Communication Technology
Subjects:
Online Access:http://ictactjournals.in/paper/IJCTV4I2Paper_2_717to722.pdf
_version_ 1811310893340819456
author Srivatsan Sridharan
Gorthy Ravi Kiran
author_facet Srivatsan Sridharan
Gorthy Ravi Kiran
author_sort Srivatsan Sridharan
collection DOAJ
description The aim of this paper is to provide an introduction towards the architectural design of a bi-fold authenticated agent-monitored transaction model. The focus is primarily on implementation in ATM systems which provide the following facilities of withdrawing currency at any remote terminal, verification of the end users identity using Personal Identification Number and an authentic One-Time-Session-Dependent Key generation and validation through the mobile. This system requires building up of an third party agent which would establish a secure session to the bank application with the terminal only after a series of authentication mechanism without compromising the privacy of any individual. The customers, without any insider privileges, can withdraw currency without being detected by any mechanisms of theft of card and eaves dropping of the Password from the card holders within the terminal software are also a major threat yet to be addressed. A basic solution is the terminals having bi-fold authentication mechanisms where mobile dependent one time session dependent key is being generated with authenticity being ensured and the confidentiality being maintained. In such a system, the correctness burden on the terminal’s code is significantly less as the customers have been given the chance to authorize themselves from their hand-held devices and are allowed to withdraw currency in terminal only after their identity is proved by a series of authentication procedures. In this paper along with the bi-fold authentication implementation, architectural design of the agent which is being introduced is also briefed.
first_indexed 2024-04-13T10:08:11Z
format Article
id doaj.art-10898a53f2704784902a4ee68d236c78
institution Directory Open Access Journal
issn 0976-0091
2229-6948
language English
last_indexed 2024-04-13T10:08:11Z
publishDate 2014-06-01
publisher ICT Academy of Tamil Nadu
record_format Article
series ICTACT Journal on Communication Technology
spelling doaj.art-10898a53f2704784902a4ee68d236c782022-12-22T02:51:01ZengICT Academy of Tamil NaduICTACT Journal on Communication Technology0976-00912229-69482014-06-0142717722CONCEPTION OF BI-FOLD AUTHENTICATED AGENT – MONITORED TRANSACTION ARCHITECTURESrivatsan Sridharan0Gorthy Ravi Kiran1Department of Computer Science, International Institute of Information Technology Bangalore, India Department of Networking and Communication Systems, International Institute of Information Technology Bangalore, India The aim of this paper is to provide an introduction towards the architectural design of a bi-fold authenticated agent-monitored transaction model. The focus is primarily on implementation in ATM systems which provide the following facilities of withdrawing currency at any remote terminal, verification of the end users identity using Personal Identification Number and an authentic One-Time-Session-Dependent Key generation and validation through the mobile. This system requires building up of an third party agent which would establish a secure session to the bank application with the terminal only after a series of authentication mechanism without compromising the privacy of any individual. The customers, without any insider privileges, can withdraw currency without being detected by any mechanisms of theft of card and eaves dropping of the Password from the card holders within the terminal software are also a major threat yet to be addressed. A basic solution is the terminals having bi-fold authentication mechanisms where mobile dependent one time session dependent key is being generated with authenticity being ensured and the confidentiality being maintained. In such a system, the correctness burden on the terminal’s code is significantly less as the customers have been given the chance to authorize themselves from their hand-held devices and are allowed to withdraw currency in terminal only after their identity is proved by a series of authentication procedures. In this paper along with the bi-fold authentication implementation, architectural design of the agent which is being introduced is also briefed.http://ictactjournals.in/paper/IJCTV4I2Paper_2_717to722.pdfAuthenticationConfidentialityEncryptionSecurity
spellingShingle Srivatsan Sridharan
Gorthy Ravi Kiran
CONCEPTION OF BI-FOLD AUTHENTICATED AGENT – MONITORED TRANSACTION ARCHITECTURE
ICTACT Journal on Communication Technology
Authentication
Confidentiality
Encryption
Security
title CONCEPTION OF BI-FOLD AUTHENTICATED AGENT – MONITORED TRANSACTION ARCHITECTURE
title_full CONCEPTION OF BI-FOLD AUTHENTICATED AGENT – MONITORED TRANSACTION ARCHITECTURE
title_fullStr CONCEPTION OF BI-FOLD AUTHENTICATED AGENT – MONITORED TRANSACTION ARCHITECTURE
title_full_unstemmed CONCEPTION OF BI-FOLD AUTHENTICATED AGENT – MONITORED TRANSACTION ARCHITECTURE
title_short CONCEPTION OF BI-FOLD AUTHENTICATED AGENT – MONITORED TRANSACTION ARCHITECTURE
title_sort conception of bi fold authenticated agent monitored transaction architecture
topic Authentication
Confidentiality
Encryption
Security
url http://ictactjournals.in/paper/IJCTV4I2Paper_2_717to722.pdf
work_keys_str_mv AT srivatsansridharan conceptionofbifoldauthenticatedagentmonitoredtransactionarchitecture
AT gorthyravikiran conceptionofbifoldauthenticatedagentmonitoredtransactionarchitecture