Browse > Article
http://dx.doi.org/10.7236/JIIBC.2016.16.1.1

Automatic Client Authentication Method in All-In-One Services  

Kim, Namyun (Dept. of Information System Engineering, Hansung University)
Publication Information
The Journal of the Institute of Internet, Broadcasting and Communication / v.16, no.1, 2016 , pp. 1-5 More about this Journal
Abstract
The all-in-one service, for example, mobile wallet enables users to have credit card, membership card, and coupon in one place. It has been one of important o2o services with offline payment. In order to take advantage of mobile commerce, it is necessary to authenticate clients automatically without entering their passwords. This paper proposes an automatic client authentication method in all-in-one service. At registration, clients receives and stores an authentication ticket from a company, which contains an user's identifier and password encrypted by company's symmetric key. Client can be authenticated by transferring authentication tickets to companies at service requests.
Keywords
All-In-One Services; Client Authentication; Authentication Ticket; Symmetric Cryptography;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Byung-Rae Cha1, Sang-Hun Lee, Soo-Bong Park, Gun-Ki Lee, and Yoo-Kang, "Prototype Design of Mobile Micro-payment to Enhance Security by 2 Factor Authentication," International Journal of Security and Its Applications, Vol. 9, No. 8 2015.
2 Jung-Oh Park, Byung-Wook Jin, "A Study on Authentication Method for Secure Payment in Fintech Environment," The Journal of IIBC, Vol. 15, No. 4, 2015.
3 Susan Pandy, "Current Perspectives on the Mobile Wallet Evolution," Mobile Payments Industry Workgroup (MPIW), April 9-10, 2015.
4 Sreekanth Malladi, Jim Alves-Foss, Robert B. Heckendorn, "On Preventing Replay Attacks on Security Protocols," Proc. International Conference on Security and Management, 2002.
5 Mohammed A. Alnatheer, "Secure Socket Layer (SSL) Impact on Web Server Performance," Journal of Advances in Computer Networks, Vol. 2, No. 3, September 2014.
6 S. Pavithra, Mrs. E. Ramadevi, "Study and Performance Analysis of Cryptography Algorithms," International Journal of Advanced Research in Computer Engineering & Technology, Volume 1, Issue 5, July 2012.
7 Shanta, Jyoti Vashishtha, "Evaluating the Performance of Symmetric Key Algorithms: AES(Advanced Encryption Standard) and DES(Data Encryption Standard)," International Journal of Computational Engineering & Management, Vol. 15, Issue 4, July 2012.
8 R. L. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public key cryptosystems," Communications of the ACM, 21:120-126, 1978.   DOI