CONCEPTION OF BI-FOLD AUTHENTICATED AGENT – MONITORED TRANSACTION ARCHITECTURE
The aim of this paper is to provide an introduction towards the architectural design of a bi-fold authenticated agent-monitored transaction model. The focus is primarily on implementation in ATM systems which provide the following facilities of withdrawing currency at any remote terminal, verificati...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
ICT Academy of Tamil Nadu
2014-06-01
|
Series: | ICTACT Journal on Communication Technology |
Subjects: | |
Online Access: | http://ictactjournals.in/paper/IJCTV4I2Paper_2_717to722.pdf |
_version_ | 1811310893340819456 |
---|---|
author | Srivatsan Sridharan Gorthy Ravi Kiran |
author_facet | Srivatsan Sridharan Gorthy Ravi Kiran |
author_sort | Srivatsan Sridharan |
collection | DOAJ |
description | The aim of this paper is to provide an introduction towards the architectural design of a bi-fold authenticated agent-monitored transaction model. The focus is primarily on implementation in ATM systems which provide the following facilities of withdrawing currency at any remote terminal, verification of the end users identity using Personal Identification Number and an authentic One-Time-Session-Dependent Key generation and validation through the mobile. This system requires building up of an third party agent which would establish a secure session to the bank application with the terminal only after a series of authentication mechanism without compromising the privacy of any individual. The customers, without any insider privileges, can withdraw currency without being detected by any mechanisms of theft of card and eaves dropping of the Password from the card holders within the terminal software are also a major threat yet to be addressed. A basic solution is the terminals having bi-fold authentication mechanisms where mobile dependent one time session dependent key is being generated with authenticity being ensured and the confidentiality being maintained. In such a system, the correctness burden on the terminal’s code is significantly less as the customers have been given the chance to authorize themselves from their hand-held devices and are allowed to withdraw currency in terminal only after their identity is proved by a series of authentication procedures. In this paper along with the bi-fold authentication implementation, architectural design of the agent which is being introduced is also briefed. |
first_indexed | 2024-04-13T10:08:11Z |
format | Article |
id | doaj.art-10898a53f2704784902a4ee68d236c78 |
institution | Directory Open Access Journal |
issn | 0976-0091 2229-6948 |
language | English |
last_indexed | 2024-04-13T10:08:11Z |
publishDate | 2014-06-01 |
publisher | ICT Academy of Tamil Nadu |
record_format | Article |
series | ICTACT Journal on Communication Technology |
spelling | doaj.art-10898a53f2704784902a4ee68d236c782022-12-22T02:51:01ZengICT Academy of Tamil NaduICTACT Journal on Communication Technology0976-00912229-69482014-06-0142717722CONCEPTION OF BI-FOLD AUTHENTICATED AGENT – MONITORED TRANSACTION ARCHITECTURESrivatsan Sridharan0Gorthy Ravi Kiran1Department of Computer Science, International Institute of Information Technology Bangalore, India Department of Networking and Communication Systems, International Institute of Information Technology Bangalore, India The aim of this paper is to provide an introduction towards the architectural design of a bi-fold authenticated agent-monitored transaction model. The focus is primarily on implementation in ATM systems which provide the following facilities of withdrawing currency at any remote terminal, verification of the end users identity using Personal Identification Number and an authentic One-Time-Session-Dependent Key generation and validation through the mobile. This system requires building up of an third party agent which would establish a secure session to the bank application with the terminal only after a series of authentication mechanism without compromising the privacy of any individual. The customers, without any insider privileges, can withdraw currency without being detected by any mechanisms of theft of card and eaves dropping of the Password from the card holders within the terminal software are also a major threat yet to be addressed. A basic solution is the terminals having bi-fold authentication mechanisms where mobile dependent one time session dependent key is being generated with authenticity being ensured and the confidentiality being maintained. In such a system, the correctness burden on the terminal’s code is significantly less as the customers have been given the chance to authorize themselves from their hand-held devices and are allowed to withdraw currency in terminal only after their identity is proved by a series of authentication procedures. In this paper along with the bi-fold authentication implementation, architectural design of the agent which is being introduced is also briefed.http://ictactjournals.in/paper/IJCTV4I2Paper_2_717to722.pdfAuthenticationConfidentialityEncryptionSecurity |
spellingShingle | Srivatsan Sridharan Gorthy Ravi Kiran CONCEPTION OF BI-FOLD AUTHENTICATED AGENT – MONITORED TRANSACTION ARCHITECTURE ICTACT Journal on Communication Technology Authentication Confidentiality Encryption Security |
title | CONCEPTION OF BI-FOLD AUTHENTICATED AGENT – MONITORED TRANSACTION ARCHITECTURE |
title_full | CONCEPTION OF BI-FOLD AUTHENTICATED AGENT – MONITORED TRANSACTION ARCHITECTURE |
title_fullStr | CONCEPTION OF BI-FOLD AUTHENTICATED AGENT – MONITORED TRANSACTION ARCHITECTURE |
title_full_unstemmed | CONCEPTION OF BI-FOLD AUTHENTICATED AGENT – MONITORED TRANSACTION ARCHITECTURE |
title_short | CONCEPTION OF BI-FOLD AUTHENTICATED AGENT – MONITORED TRANSACTION ARCHITECTURE |
title_sort | conception of bi fold authenticated agent monitored transaction architecture |
topic | Authentication Confidentiality Encryption Security |
url | http://ictactjournals.in/paper/IJCTV4I2Paper_2_717to722.pdf |
work_keys_str_mv | AT srivatsansridharan conceptionofbifoldauthenticatedagentmonitoredtransactionarchitecture AT gorthyravikiran conceptionofbifoldauthenticatedagentmonitoredtransactionarchitecture |