Skip to main content

Four Authorization Protocols for an Electronic Payment System

  • Conference paper
Mathematical and Engineering Methods in Computer Science (MEMICS 2011)

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 7119))

Abstract

Over the recent years the Czech law has become quite liberal towards electronic payment systems dealing with low-value goods (“micropayments”) [1]. As of today, few businesses make use of the new legal facilities. This paper concerns a project aiming to support proliferation of the micropayment-based operations by creating a feature-rich, secure payment system with an open specification. More precisely, the key focus here will be payment authorization: as payments are carried out by an electronic device on a customer’s behalf, there is a clear need for prevention of its abuse in case of theft. We introduce four original authorization protocols – each suited to a different environment – that prescribe the behavior of all relevant communicating devices and hopefully allow for secure and sound authorization.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 54.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Act No. 284/2009 Sb., Payment System Act, as amended

    Google Scholar 

  2. Directive 2007/64/EC of the European Parliament and of the Council of 13, on payment services in the internal market amending Directives 97/7/EC, 2002/65/EC, 2005/60/EC and 2006/48/EC and repealing Directive 97/5/EC, as amended (November 2007)

    Google Scholar 

  3. Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press (2001)

    Google Scholar 

  4. Žilka, R., Tuček, P., Matyáš, V., Stetsko, A.: Otevřené mikroplatební schéma pro rozsáhlé infrastruktury. In: Rudolf, V. (ed.) Sborníků z 36. konference EurOpen.CZ, Plzeň, Czech Republic, pp. 63–80 (2010) ISBN 978-80-86583-19-8, http://www.europen.cz/Anot/36/eo-1-10.pdf

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Žilka, R., Matyáš, V., Kyncl, L. (2012). Four Authorization Protocols for an Electronic Payment System. In: Kotásek, Z., Bouda, J., Černá, I., Sekanina, L., Vojnar, T., Antoš, D. (eds) Mathematical and Engineering Methods in Computer Science. MEMICS 2011. Lecture Notes in Computer Science, vol 7119. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-25929-6_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-25929-6_19

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-25928-9

  • Online ISBN: 978-3-642-25929-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics