skip to main content
research-article
Free Access

A prototype design for DRM based credit card transaction in E-commerce

Authors Info & Claims
Published:06 May 2008Publication History
Skip Abstract Section

Abstract

In E-Commerce credit cards gained popularity as a sophisticated payment mechanism. With the increase in credit card use on web, credit card fraud has gone up dramatically. Which cause customer's inconvenience and for merchant, loss of customers. To combat credit card fraud and to regain the customer's trust an attempt is made here to design a trust based payment system, in which the customer does not need to disclose his/her credit card number during the transaction, and hence they can feel safe. In this newly proposed system on behalf of the customer the bank or the issuer of the credit card is involved to perform the transaction. This is basically done by generating a single use 'token' by the bank which includes information about the customer, merchant, product, payment amount, date of issue and date of expiry etc. and thereafter wrapped as a DRM package. Among various advantages, one is that only the intended user and the specified application software can open the DRM package using special key. The application, thereafter, will take care of the rights imposed on the 'token' and expires itself after the single use. We have tried an attempt to use UML to design the model of such system, which is the recent trend of software engineering practice.

References

  1. "The Technology of Rights: Digital Rights Management", Karen Coyle, Based on a talk originally given at the Library of Congress, November 19, 2003.Google ScholarGoogle Scholar
  2. "E-Commerce - An Indian Perspective", P.T. Joseph, S.J, PHI, 2nd Edn, 2006.Google ScholarGoogle Scholar
  3. http://www.epaynews.comGoogle ScholarGoogle Scholar
  4. http://wwwnasscom.orgGoogle ScholarGoogle Scholar
  5. "Cryptography and E-Commerce", Jon C. Graff, Wiley, ISBN: 0471-40574-4, 2001.Google ScholarGoogle Scholar
  6. "E-Commerce and E-Business: Rising from the Ashes", T. Pritsky, Whitepaper, www.hill.com, Dec 2002.Google ScholarGoogle Scholar
  7. Netscape Website: http://www.netscape.com/newsref/std/SSL.htmlGoogle ScholarGoogle Scholar
  8. MasterCard Website: http://www.mastercard.comGoogle ScholarGoogle Scholar
  9. "Building an E-Commerce Trust Infrastructure SSL Server Certificates and Online Payment Services", VeriSign Technical Brief, www.verisign.comGoogle ScholarGoogle Scholar
  10. http://www.setco.org/download/set_bk1.pdfGoogle ScholarGoogle Scholar
  11. "Off-line generation of limited-use credit card numbers", Aviel D. Rubin, Rebecca N. Wright, Financial Cryptography Conference, Feb 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. "A Survey of Security in Online Credit Card Payments", Umesh Shankar, Miriam Walker, May 2001.Google ScholarGoogle Scholar
  13. American Express website: http://www26.americanexpress.comGoogle ScholarGoogle Scholar
  14. T. Huang, Y. Liu, "Considerations on AVS DRM Architecture", Jour. of Computer Science and Technology, Vol. 21, No. 3, DOI. 10.1007/s11390-006-0366-4, May, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. P. Koster, F. Kamperman, P. Lenoir, K. Vrielink, "Identity-Based DRM: Personal Entertainment Domain", LNCS, Vol. 4300, DOI. 10.1007/11926214_4, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. H. Kim, Y. Lee, B. Chung, H. Yoon, J. Lee, K. Jung, "Digital Rights Management with Right Delegation for Home Networks", LNCS, Vol. 4296, DOI. 10.1007/11927587_20, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. J. Nutzel, A. Beyer, "How to Increase the Security of Digital Rights Management Systems Without Affecting Consumer's Security", LNCS, Vol. 3995, DOI. 10.1007/11766155_26, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. M. Petkovic, R.P. Koster, "User Attributed Rights in DRM", LNCS, Vol. 3919, DOI. 10.1007/11787952_6, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. B. Vassiliadis, V. Fotopoulos, A.N. Skodras, "Decentralising the Digital Rights Management Value Chain by means of Distributed License Catalogues", LNCS, Vol. 204, DOI. 10.1007/0-387-34224_9_81, 2006.Google ScholarGoogle Scholar
  20. B.B. Zhu, Y. Yang, T. Chen, "A DRM System Supporting What You See Is What You Pay", LNCS, Vol. 3919, DOI. 10.1007/11787952_26, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. R. Iannella, "Digital Rights Management (DRM) Architectures", D-Lib Magazine, Vol. 7, No. 6, ISSN 1082-9873, June 2001.Google ScholarGoogle ScholarCross RefCross Ref
  22. G. Booch, J. Rumbaugh, I. Jacobson, "Unified Modeling Language User Guide", Addison Wesley, 2nd Edition, ISBN: 0-321-26797-4, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. P. Kruchten, "The Rational Unified Process", Addison-Wesley Longman Inc, 3rd Edition, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. IBM's Rational Rose: (http://www.rational.com).Google ScholarGoogle Scholar
  25. S. Banerjee, S. Karforma, S. Ghosh, "A DRM Based Credit Card Transaction in E-Commerce System", 41st National Convention of CSI, November 23-25, 2006, Tata McGraw-Hill, ISBN-0-07-062171-3, pp-107-110, 2006.Google ScholarGoogle Scholar
  26. K. Lee, D.E. Booth, "A Prototype System Developed for Digital Rights Management in Electronic Commerce", Jour. of Internet Commerce, Vol. 3, No. 4, pp. 93-117, ISSN 1533-2861, 2004.Google ScholarGoogle ScholarCross RefCross Ref
  27. S. Banerjee, D.E. Booth, S. Ghosh, S. Mukhopadhyay, "A Prototype Design for Digital Intellectual Property Right Management in E-Commerce - A UML Based Approach", Journal of the Computer Society of India, Vol. 36 No. 4 (Oct-Dec 2006), pp-46-51, ISSN-0254-7813, 2006.Google ScholarGoogle Scholar

Index Terms

  1. A prototype design for DRM based credit card transaction in E-commerce

              Recommendations

              Comments

              Login options

              Check if you have access through your login credentials or your institution to get full access on this article.

              Sign in

              Full Access

              HTML Format

              View this article in HTML Format .

              View HTML Format