Font Size: a A A

Design And Implementation Of Platform For Mobile Payment Security

Posted on:2016-01-29Degree:MasterType:Thesis
Country:ChinaCandidate:C L CaiFull Text:PDF
GTID:2359330542975781Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
As time flies,the rapid development of Internet technology,online shopping has become a common shopping means for many people.With the function of the mobile terminal is becoming richer,more robust performance,coupled with its carrying huge advantage in use,has gradually become a new platform for daily online shopping.Therefore,payment system for mobile terminal also emerge as the times require,the transaction amount also from originally simple purchase a mobile end game gradually increase to shopping consumption amount and ordinary notebook desktop.The rapid development of mobile terminal is both an opportunity and a challenge,the problem of security of mobile terminal payment is always one of the puzzles using mobile terminal users to pay,in a survey,40% of the domestic consumer lack of confidence in the security of mobile payment,only less than15% of the mobile phone users are completely trust in mobile payment,and 65% mobile phone users refuse to send their mobile network through the credit card information.Obviously,if we can resolve the security problems in mobile payment,plays an important role for the mobile terminal Internet electronic commerce.An important problem in the process of mobile payment is the identity authentication method,the traditional identity authentication is mainly provided by the user account password,message authentication,digital verification code,easy to the authentication method by hackers to breakthrough technical methods,so much of the recent methods of identity authentication base on user habit characteristics or mobile terminal platform,there is a common that Alipay require user input Jiu gong ge password when user process a payment,and xiaomi mobile terminal offer a facial recognition authentication method.It is difficult to be an attacker to imitate,so it is difficult to be broken.Based on this idea,this paper presents a method for learning user habits,and to identify the user's identity.Because of the location of each person every day with some regularity,and now mobile terminal basic provide a variety development interface of positioning.therefore,we can sample to the motion situation of the users through thebackground process,such as long time location,the daily action track etc..Through the study of these information,establish the user belongs to the recognition model is unique.After the learning process,when users will surf the Internet or payment,through the behavior trajectory determine the user whether meet the recognition model of the user,as the identity authentication.If it is found that the non users in the use of my account,will be issued a warning to the real user.Two dimensional bar code technology has been widely used in recent years,in the advertisement recommendation,Web links,trade and other aspects of a place of shopping.Today,the mobile terminal gradually replace laptops and desktops to become mobile terminal new physical platform,in order to make the users in the process of shopping experience more comfortable and convenient,merchants using two-dimensional code as a commodity and the new label,the user only needs to scan the two-dimensional code,mobile terminal can parse the two-dimensional code,which can be easy access link address,or get the business recommended sites.However,due to the lack of safety verification on the scan results,after users scan two-dimensional code,malicious virus which steal the user information will be installed unconscious,or the landing of the fishing website.In order to solve this problem,the realization of the mobile terminal payment the system will get the user scan results for authentication,for this site link scan two-dimensional code result is essentially a URL address,we will be on the URL address to determine whether the fishing website,or malicious links,and returns the result to the user.Decision URL mainly through two kinds of techniques,one is by checking the URL address of the domain name,whether to meet the two proposed feature;another by means of the method of pattern recognition,feature extraction URL address phishing sites or malicious link,then the training classifier,judging by the address for the URL classifier.
Keywords/Search Tags:payment security, identity authentication strategy, two-dimensional code security scanning
PDF Full Text Request
Related items