Abstract
In E-Commerce credit cards gained popularity as a sophisticated payment mechanism. With the increase in credit card use on web, credit card fraud has gone up dramatically. Which cause customer's inconvenience and for merchant, loss of customers. To combat credit card fraud and to regain the customer's trust an attempt is made here to design a trust based payment system, in which the customer does not need to disclose his/her credit card number during the transaction, and hence they can feel safe. In this newly proposed system on behalf of the customer the bank or the issuer of the credit card is involved to perform the transaction. This is basically done by generating a single use 'token' by the bank which includes information about the customer, merchant, product, payment amount, date of issue and date of expiry etc. and thereafter wrapped as a DRM package. Among various advantages, one is that only the intended user and the specified application software can open the DRM package using special key. The application, thereafter, will take care of the rights imposed on the 'token' and expires itself after the single use. We have tried an attempt to use UML to design the model of such system, which is the recent trend of software engineering practice.
- "The Technology of Rights: Digital Rights Management", Karen Coyle, Based on a talk originally given at the Library of Congress, November 19, 2003.Google Scholar
- "E-Commerce - An Indian Perspective", P.T. Joseph, S.J, PHI, 2nd Edn, 2006.Google Scholar
- http://www.epaynews.comGoogle Scholar
- http://wwwnasscom.orgGoogle Scholar
- "Cryptography and E-Commerce", Jon C. Graff, Wiley, ISBN: 0471-40574-4, 2001.Google Scholar
- "E-Commerce and E-Business: Rising from the Ashes", T. Pritsky, Whitepaper, www.hill.com, Dec 2002.Google Scholar
- Netscape Website: http://www.netscape.com/newsref/std/SSL.htmlGoogle Scholar
- MasterCard Website: http://www.mastercard.comGoogle Scholar
- "Building an E-Commerce Trust Infrastructure SSL Server Certificates and Online Payment Services", VeriSign Technical Brief, www.verisign.comGoogle Scholar
- http://www.setco.org/download/set_bk1.pdfGoogle Scholar
- "Off-line generation of limited-use credit card numbers", Aviel D. Rubin, Rebecca N. Wright, Financial Cryptography Conference, Feb 2001. Google ScholarDigital Library
- "A Survey of Security in Online Credit Card Payments", Umesh Shankar, Miriam Walker, May 2001.Google Scholar
- American Express website: http://www26.americanexpress.comGoogle Scholar
- T. Huang, Y. Liu, "Considerations on AVS DRM Architecture", Jour. of Computer Science and Technology, Vol. 21, No. 3, DOI. 10.1007/s11390-006-0366-4, May, 2006. Google ScholarDigital Library
- P. Koster, F. Kamperman, P. Lenoir, K. Vrielink, "Identity-Based DRM: Personal Entertainment Domain", LNCS, Vol. 4300, DOI. 10.1007/11926214_4, 2006. Google ScholarDigital Library
- H. Kim, Y. Lee, B. Chung, H. Yoon, J. Lee, K. Jung, "Digital Rights Management with Right Delegation for Home Networks", LNCS, Vol. 4296, DOI. 10.1007/11927587_20, 2006. Google ScholarDigital Library
- J. Nutzel, A. Beyer, "How to Increase the Security of Digital Rights Management Systems Without Affecting Consumer's Security", LNCS, Vol. 3995, DOI. 10.1007/11766155_26, 2006. Google ScholarDigital Library
- M. Petkovic, R.P. Koster, "User Attributed Rights in DRM", LNCS, Vol. 3919, DOI. 10.1007/11787952_6, 2006. Google ScholarDigital Library
- B. Vassiliadis, V. Fotopoulos, A.N. Skodras, "Decentralising the Digital Rights Management Value Chain by means of Distributed License Catalogues", LNCS, Vol. 204, DOI. 10.1007/0-387-34224_9_81, 2006.Google Scholar
- B.B. Zhu, Y. Yang, T. Chen, "A DRM System Supporting What You See Is What You Pay", LNCS, Vol. 3919, DOI. 10.1007/11787952_26, 2006. Google ScholarDigital Library
- R. Iannella, "Digital Rights Management (DRM) Architectures", D-Lib Magazine, Vol. 7, No. 6, ISSN 1082-9873, June 2001.Google ScholarCross Ref
- G. Booch, J. Rumbaugh, I. Jacobson, "Unified Modeling Language User Guide", Addison Wesley, 2nd Edition, ISBN: 0-321-26797-4, 2005. Google ScholarDigital Library
- P. Kruchten, "The Rational Unified Process", Addison-Wesley Longman Inc, 3rd Edition, 2004. Google ScholarDigital Library
- IBM's Rational Rose: (http://www.rational.com).Google Scholar
- S. Banerjee, S. Karforma, S. Ghosh, "A DRM Based Credit Card Transaction in E-Commerce System", 41st National Convention of CSI, November 23-25, 2006, Tata McGraw-Hill, ISBN-0-07-062171-3, pp-107-110, 2006.Google Scholar
- K. Lee, D.E. Booth, "A Prototype System Developed for Digital Rights Management in Electronic Commerce", Jour. of Internet Commerce, Vol. 3, No. 4, pp. 93-117, ISSN 1533-2861, 2004.Google ScholarCross Ref
- S. Banerjee, D.E. Booth, S. Ghosh, S. Mukhopadhyay, "A Prototype Design for Digital Intellectual Property Right Management in E-Commerce - A UML Based Approach", Journal of the Computer Society of India, Vol. 36 No. 4 (Oct-Dec 2006), pp-46-51, ISSN-0254-7813, 2006.Google Scholar
Index Terms
- A prototype design for DRM based credit card transaction in E-commerce
Recommendations
Securing credit card transactions with one-time payment scheme
Traditional credit card payment is not secure against credit card frauds because an attacker can easily know a semi-secret credit card number that is repetitively used. Recently one-time transaction number has been proposed by some researchers and ...
Fraud detection in credit card transaction using neural networks
SCA '19: Proceedings of the 4th International Conference on Smart City ApplicationsBanking transactions, such as online transactions, credit card transactions and the mobile wallet, are gaining popularity. People are shopping more and more using credit cards. Credit cards have become a necessity, to the virtual world, for digitized ...
Research on Credit Card Fraud Detection Model Based on Distance Sum
JCAI '09: Proceedings of the 2009 International Joint Conference on Artificial IntelligenceAlong with increasing credit cards and growing trade volume in China, credit card fraud rises sharply. How to enhance the detection and prevention of credit card fraud becomes the focus of risk control of banks. This paper proposes a credit card fraud ...
Comments