Skip to main content

Payment Security Mechanism of Intelligent Mobile Terminal

  • Conference paper
  • First Online:
Soft Computing and Signal Processing

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 900))

  • 820 Accesses

Abstract

In recent years, with the vigorous development of mobile Internet and the increasing popularity of intelligent electronic products, intelligent mobile terminals are no longer just communication functions, but also related to our family life, such as smart home and smart cars. With the powerful function of intelligent mobile terminals, people pay more and more attention to mobile payment business because of its convenient and fast service, and the following security problems are worrisome. Compared with the bank card payment, the smart mobile terminal can complete a variety of transactions directly by downloading the corresponding payment procedures, including shopping payments. However, because of the open resources of the Android system, system ROOT permissions easily cracked, there is a big potential security risk in mobile payment. In addition, the Android system lacks strict application software signature verification measures, and unauthorized application software can be installed properly, and there may be malicious software containing virus. Therefore, the design of a highly secure and customized Android intelligent payment terminal has become a common concern in the field of payment and academia.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. S. Aral, C. Dellarocas, D. Godes, Introduction to the special issue—social media and business transformation: a framework for research. Inf. Syst. Res. 24(1), 3–13 (2013)

    Article  Google Scholar 

  2. M. Mann, S.E. Byun, Y. Li, Realignment strategies in the US retail industry during a recessionary time: dominant themes, trends, and propositions. Int. J. Retail Distrib. Manage. 43(8), 775–792 (2015)

    Article  Google Scholar 

  3. C. Vroom, C. Von Solms, Towards information security behavioural compliance. Comput. Secur. 23(3), 191–198 (2002)

    Article  Google Scholar 

  4. A. Perrig, R. Szewczyk, J.D. Tygar, SPINS: Security protocols for sensor networks. Wireless Netw. 8(5), 521–534 (2002)

    Article  Google Scholar 

  5. C.H. Bennett, G. Brassard, N.D. Mermin, Quantum cryptography without Bell’s theorem. Phys. Rev. Lett. 68(5), 557–558 (1992)

    Article  MathSciNet  Google Scholar 

  6. R. Tripathi, S. Agrawal, Comparative study of symmetric and asymmetric cryptography techniques. Int. J. Adv. Found. Res. Comput. (IJAFRC) 1(6), 68–76 (2014)

    Google Scholar 

  7. F.C. Bernstein, T.F. Koetzle, G.J.B. Williams, The protein data bank: a computer-based archival file for macromolecular structures. Arch. Biochem. Biophys. 185(2), 584–591 (1978)

    Article  Google Scholar 

  8. W. Enck, M. Ongtang, P. McDaniel, Understanding android security. IEEE Secur. Priv. 7(1), 50–57 (2007)

    Article  Google Scholar 

  9. A. Wyner, J. Ziv, The rate-distortion function for source coding with side information at the decoder. IEEE Trans. Inf. Theory 22(1), 1–10 (1976)

    Article  MathSciNet  Google Scholar 

  10. A.D. Liveris, Z. Xiong, C.N. Georghiades, Compression of binary sources with side information at the decoder using LDPC codes. IEEE Commun. Lett. 6(10), 440–442 (2002)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Seshathiri Dhanasekaran .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Dhanasekaran, S., Kasi, B. (2019). Payment Security Mechanism of Intelligent Mobile Terminal. In: Wang, J., Reddy, G., Prasad, V., Reddy, V. (eds) Soft Computing and Signal Processing . Advances in Intelligent Systems and Computing, vol 900. Springer, Singapore. https://doi.org/10.1007/978-981-13-3600-3_15

Download citation

Publish with us

Policies and ethics