SlideShare a Scribd company logo
1 of 37
Fraud Resilient for Micro Payments
Using Coin Management
CONTENTS
 ABSTRACT
 INTRODUCTION
 EXISTING SYSTEM
 DIS ADVANTAGES
 PROPOSED SYSTEM
 ADVANTAGES
 MODULES
 HARDWARE REQUIREMENTS
 SOFTWARE REQUIREMENTS
 REFERENCES
Abstract
 Online shopping payment scheme is one of the popular in recent
years. During payment process the attackers aim to stealing the
customer data by targeting the Point of Sale (PoS) system.
 Increasing malware that can steal card data as soon as they are
read by the device.
 The proposed work is to provide secure fully off-line work is
interactivity between multiple client - server.
 Providing an exhaustive Coin Management in framing and creating
On Mobile Move Coins.
Introduction
 Credit and debit card data stealing is most
popular problem in cybercrime.
 The FRoDO introduces a secure off physical
unclonable function.
 FRoDO introduces coin element and identity
element.
 The main benefit is a simpler, faster, and more
secure interaction between the involved
actors/entities.
Existing System
 In the present method, the approach describes FRoDO,
a at ease off-line micro-cost solution that's resilient to
PoS information breaches.
 FRoDo presents a constant structure in developing and
preservation of coins.
 The FroDO solution cannot improves over up to the
moment procedures in phrases of flexibility and
protection required by using user.
Dis-Advantages
 The system implemented called FRoDO, was built using a static
coin architecture which are easier to hack.
 Current FroDo Does not provides Coins Management.
 FroDo is a weak prevention strategy based on data obfuscation and
did not address the most relevant attacks aimed at threatening
customer sensitive data, thus being vulnerable to many advanced
attack techniques.
Proposed System
 Project can be extended with Coin Management
in framing and creating On Mobile Move Coins.
 Project is extended with UmcFrodo (User
Management of Coins with Fraud Resilient
Device for Off-line micro-Payments).
 Extended Frodo provides coin management as
need of user requirements.
Advantages
 UMFroDo provides On Mobile Coins Management.
 UMFroDo is provides prevention strategy based on data
obfuscation and address the most relevant attacks.
 Creating on Mobile Coins provides user in generating and
managing coins when needed.
Modules
 System Construction Module
 Identity Element
 Coin Element
 Attack Mitigation
 Shopping Module
System Construction Module
 In the first module, develop the System
Construction module with the various entities:
Vendor, User, FRoDO, PUF, Attacker.
 This process is developed completely on
Offline Transaction process. Develop the
system with user entity initially.
Identity Element
 FRoDO does not require any special hardware
component apart from the identity and the coin
element that can be either plugged into the
customer device or directly embedded into the
device.
 Similarly to secure elements, both the identity
and the coin element can be considered
tamperproof devices with a secure storage and
execution environment for sensitive data
Coin Element
 In this module, develop Coin Element.
 The Key Generator is used to compute on-the-
fly the private key of the coin element.
 The Cryptographic Element used for
symmetric and asymmetric cryptographic
algorithms applied to data received in input
and send as output by the coin element;
Attack Mitigation
 The read-once property of the erasable PUF
used in this solution prevents an attacker from
computing the same coin twice.
 Even if a malicious customer creates a fake
vendor device and reads all the coins, it will
not be able to spend any of these coins due to
the inability to decrypt the request of other
vendors.
Shopping Module
 Designed Shopping Module with payment
gateway Interface.
 At payment, Frodo Coin Concept is connected
for payments.
 User can use coins at payment gateway
interface.
Hardware Requirements
 System : Pentium IV 2.4 GHz or More
 Hard Disk : 40 GB
 RAM : 2 GB
Software Requirements
 Operating System : Windows XP/7/8
 Language : Java
 Front End : JSP
 Database : My-SQL
Conclusion
 In this project we have introduced FRoDO that is, to the best of our
knowledge, the first data-breach-resilient fully off-line micropayment
approach.
 The security analysis shows that FRoDO does not impose
trustworthiness assumptions. Further, FRoDO is also the first
solution in the literature where no customer device data attacks can
be exploited to compromise the system.
 This has been achieved mainly by leveraging a novel erasable PUF
architecture and a novel protocol design. Furthermore, our proposal
has been thoroughly discussed and compared against the state of
the art.
 Our analysis shows that FRoDO is the only proposal that enjoys all
the properties required to a secure micro-payment solution, while
also introducing flexibility when considering the payment medium
(types of digital coins).
Future Scope
 Finally, some open issues have been identified
that are left as future work. In particular, we
are investigating the possibility to allow digital
change to be spent over multiple off-line
transactions while maintaining the same level
of security and usability
References
 [1] Vanesa Daza, Roberto Di Pietro, Flavio Lombardi, and Matteo Signorini:
“Fraud Resilient Device for Off-Line Micro-Payments,” in Ieee Transactions
On Dependable And Secure Computing, Vol. 13, No. 2, March/April 2016.
 [2] R. L. Rivest, “Payword and micromint: Two simple micropayment
schemes,” in Proc. Int. Workshop Security Protocols, 1996, pp. 69–87.
 [3] S. Martins and Y. Yang, “Introduction to bitcoins: A pseudoanonymous
electronic currency system,” in Proc. Conf. Center Adv. Stud. Collaborative
Res., 2011, pp. 349–350.
 [4] Verizon, “2014 data breach investigations report,” Verizon, Tech. Rep.,
2014, http://www.verizonenterprise.com/DBIR/2014/
 [5] T. Micro, “Point-of-sale system breaches, threats to the retail and
hospitality industries,” University of Zurich, Department of Informatics,
2010.
THANK U

More Related Content

What's hot

Phishing attack seminar presentation
Phishing attack seminar presentation Phishing attack seminar presentation
Phishing attack seminar presentation AniketPandit18
 
Money pad the future wallet
Money pad the future walletMoney pad the future wallet
Money pad the future walletLeelakh Sachdeva
 
kejahatan komputer / cybercrime
kejahatan komputer / cybercrimekejahatan komputer / cybercrime
kejahatan komputer / cybercrimeHendra Fillan
 
3D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 13D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 1Swagato Dey
 
Screenless displays ppt
Screenless displays ppt Screenless displays ppt
Screenless displays ppt Jeevan Kumar D
 
웨어러블 디바이스와 내츄럴 사용자 인터페이스(Wearable Device and Natural User Interface)
웨어러블 디바이스와 내츄럴 사용자 인터페이스(Wearable Device and Natural User Interface)웨어러블 디바이스와 내츄럴 사용자 인터페이스(Wearable Device and Natural User Interface)
웨어러블 디바이스와 내츄럴 사용자 인터페이스(Wearable Device and Natural User Interface)JeongHeon Lee
 
Self Defending Network
Self Defending NetworkSelf Defending Network
Self Defending NetworkSwarna Gautam
 
Ip spoofing ppt
Ip spoofing pptIp spoofing ppt
Ip spoofing pptAnushakp9
 
Full seminar report on ethical hacking
Full seminar report on ethical hackingFull seminar report on ethical hacking
Full seminar report on ethical hackingGeorgekutty Francis
 
AUTOMATIC BILL GENERATING TROLLY
AUTOMATIC BILL GENERATING TROLLYAUTOMATIC BILL GENERATING TROLLY
AUTOMATIC BILL GENERATING TROLLYAgara Mudhalvan
 
Secured qr code [Pankaj Jeswani and Team]
Secured qr code [Pankaj Jeswani and Team]Secured qr code [Pankaj Jeswani and Team]
Secured qr code [Pankaj Jeswani and Team]Pank Jes
 
Surface Computing
Surface ComputingSurface Computing
Surface Computingshivu1234
 
Trojan virus & backdoors
Trojan virus & backdoorsTrojan virus & backdoors
Trojan virus & backdoorsShrey Vyas
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security ritik shukla
 

What's hot (20)

Phishing attack seminar presentation
Phishing attack seminar presentation Phishing attack seminar presentation
Phishing attack seminar presentation
 
Money pad the future wallet
Money pad the future walletMoney pad the future wallet
Money pad the future wallet
 
kejahatan komputer / cybercrime
kejahatan komputer / cybercrimekejahatan komputer / cybercrime
kejahatan komputer / cybercrime
 
3D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 13D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 1
 
spyware
spywarespyware
spyware
 
Screenless displays ppt
Screenless displays ppt Screenless displays ppt
Screenless displays ppt
 
E cash payment
E cash paymentE cash payment
E cash payment
 
Krishna cyber safety
Krishna cyber safetyKrishna cyber safety
Krishna cyber safety
 
웨어러블 디바이스와 내츄럴 사용자 인터페이스(Wearable Device and Natural User Interface)
웨어러블 디바이스와 내츄럴 사용자 인터페이스(Wearable Device and Natural User Interface)웨어러블 디바이스와 내츄럴 사용자 인터페이스(Wearable Device and Natural User Interface)
웨어러블 디바이스와 내츄럴 사용자 인터페이스(Wearable Device and Natural User Interface)
 
Self Defending Network
Self Defending NetworkSelf Defending Network
Self Defending Network
 
Touchless touch screen
Touchless touch screenTouchless touch screen
Touchless touch screen
 
CYBER CRIME
CYBER CRIME CYBER CRIME
CYBER CRIME
 
Ip spoofing ppt
Ip spoofing pptIp spoofing ppt
Ip spoofing ppt
 
Mobile phone-cloning
Mobile phone-cloningMobile phone-cloning
Mobile phone-cloning
 
Full seminar report on ethical hacking
Full seminar report on ethical hackingFull seminar report on ethical hacking
Full seminar report on ethical hacking
 
AUTOMATIC BILL GENERATING TROLLY
AUTOMATIC BILL GENERATING TROLLYAUTOMATIC BILL GENERATING TROLLY
AUTOMATIC BILL GENERATING TROLLY
 
Secured qr code [Pankaj Jeswani and Team]
Secured qr code [Pankaj Jeswani and Team]Secured qr code [Pankaj Jeswani and Team]
Secured qr code [Pankaj Jeswani and Team]
 
Surface Computing
Surface ComputingSurface Computing
Surface Computing
 
Trojan virus & backdoors
Trojan virus & backdoorsTrojan virus & backdoors
Trojan virus & backdoors
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 

Similar to micro payments using coin

IEEE projects 2016 | IEEE Projects 2016 - 1 Crore Projects
IEEE projects 2016 | IEEE Projects 2016 - 1 Crore Projects IEEE projects 2016 | IEEE Projects 2016 - 1 Crore Projects
IEEE projects 2016 | IEEE Projects 2016 - 1 Crore Projects 1crore projects
 
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...IJRTEMJOURNAL
 
INSECURE Magazine - 35
INSECURE Magazine - 35INSECURE Magazine - 35
INSECURE Magazine - 35Felipe Prado
 
All You Wanted To Know About Top Online Payment Security Methods.pptx
All You Wanted To Know About Top Online Payment Security Methods.pptxAll You Wanted To Know About Top Online Payment Security Methods.pptx
All You Wanted To Know About Top Online Payment Security Methods.pptxITIO Innovex
 
What is an IDO How can IDO be attacked.pdf
What is an IDO How can IDO be attacked.pdfWhat is an IDO How can IDO be attacked.pdf
What is an IDO How can IDO be attacked.pdfcoingabbar
 
Cryptomathic white paper 2fa for banking
Cryptomathic white paper 2fa for bankingCryptomathic white paper 2fa for banking
Cryptomathic white paper 2fa for bankingHai Nguyen
 
Mobey Forum Oslo Aradiom Presentation - How to Choose 2FA Security Solution
Mobey Forum Oslo Aradiom Presentation - How to Choose 2FA Security SolutionMobey Forum Oslo Aradiom Presentation - How to Choose 2FA Security Solution
Mobey Forum Oslo Aradiom Presentation - How to Choose 2FA Security Solutionguestd1c15
 
How to 2FA-enable Open Source Applications
How to 2FA-enable Open Source ApplicationsHow to 2FA-enable Open Source Applications
How to 2FA-enable Open Source ApplicationsAll Things Open
 
A secure communication in smart phones using two factor authentication
A secure communication in smart phones using two factor authenticationA secure communication in smart phones using two factor authentication
A secure communication in smart phones using two factor authenticationeSAT Journals
 
A secure communication in smart phones using two factor authentications
A secure communication in smart phones using two factor authenticationsA secure communication in smart phones using two factor authentications
A secure communication in smart phones using two factor authenticationseSAT Publishing House
 
Two Factor Authentication Using Smartphone Generated One Time Password
Two Factor Authentication Using Smartphone Generated One Time PasswordTwo Factor Authentication Using Smartphone Generated One Time Password
Two Factor Authentication Using Smartphone Generated One Time PasswordIOSR Journals
 
Overcome Security Threats Affecting Mobile Financial Solutions 2020
Overcome Security Threats Affecting Mobile Financial Solutions 2020Overcome Security Threats Affecting Mobile Financial Solutions 2020
Overcome Security Threats Affecting Mobile Financial Solutions 2020Fusion Informatics
 
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-PaymentsSurvey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-PaymentsIRJET Journal
 
INTERNET SECURITY.pptx
INTERNET SECURITY.pptxINTERNET SECURITY.pptx
INTERNET SECURITY.pptxbabepa2317
 
E-commerce Security and Threats
E-commerce Security and ThreatsE-commerce Security and Threats
E-commerce Security and ThreatsBPalmer13
 
E Authentication System with QR Code and OTP
E Authentication System with QR Code and OTPE Authentication System with QR Code and OTP
E Authentication System with QR Code and OTPijtsrd
 

Similar to micro payments using coin (20)

IEEE projects 2016 | IEEE Projects 2016 - 1 Crore Projects
IEEE projects 2016 | IEEE Projects 2016 - 1 Crore Projects IEEE projects 2016 | IEEE Projects 2016 - 1 Crore Projects
IEEE projects 2016 | IEEE Projects 2016 - 1 Crore Projects
 
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
 
Ijetr042177
Ijetr042177Ijetr042177
Ijetr042177
 
E banking security
E banking securityE banking security
E banking security
 
INSECURE Magazine - 35
INSECURE Magazine - 35INSECURE Magazine - 35
INSECURE Magazine - 35
 
All You Wanted To Know About Top Online Payment Security Methods.pptx
All You Wanted To Know About Top Online Payment Security Methods.pptxAll You Wanted To Know About Top Online Payment Security Methods.pptx
All You Wanted To Know About Top Online Payment Security Methods.pptx
 
What is an IDO How can IDO be attacked.pdf
What is an IDO How can IDO be attacked.pdfWhat is an IDO How can IDO be attacked.pdf
What is an IDO How can IDO be attacked.pdf
 
Cryptomathic white paper 2fa for banking
Cryptomathic white paper 2fa for bankingCryptomathic white paper 2fa for banking
Cryptomathic white paper 2fa for banking
 
Mobey Forum Oslo Aradiom Presentation - How to Choose 2FA Security Solution
Mobey Forum Oslo Aradiom Presentation - How to Choose 2FA Security SolutionMobey Forum Oslo Aradiom Presentation - How to Choose 2FA Security Solution
Mobey Forum Oslo Aradiom Presentation - How to Choose 2FA Security Solution
 
How to 2FA-enable Open Source Applications
How to 2FA-enable Open Source ApplicationsHow to 2FA-enable Open Source Applications
How to 2FA-enable Open Source Applications
 
A secure communication in smart phones using two factor authentication
A secure communication in smart phones using two factor authenticationA secure communication in smart phones using two factor authentication
A secure communication in smart phones using two factor authentication
 
A secure communication in smart phones using two factor authentications
A secure communication in smart phones using two factor authenticationsA secure communication in smart phones using two factor authentications
A secure communication in smart phones using two factor authentications
 
Two Factor Authentication Using Smartphone Generated One Time Password
Two Factor Authentication Using Smartphone Generated One Time PasswordTwo Factor Authentication Using Smartphone Generated One Time Password
Two Factor Authentication Using Smartphone Generated One Time Password
 
9 3
9 39 3
9 3
 
Overcome Security Threats Affecting Mobile Financial Solutions 2020
Overcome Security Threats Affecting Mobile Financial Solutions 2020Overcome Security Threats Affecting Mobile Financial Solutions 2020
Overcome Security Threats Affecting Mobile Financial Solutions 2020
 
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-PaymentsSurvey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
 
INTERNET SECURITY.pptx
INTERNET SECURITY.pptxINTERNET SECURITY.pptx
INTERNET SECURITY.pptx
 
Blockchains.My - Decentralised Mobile Wallet App
Blockchains.My - Decentralised Mobile Wallet AppBlockchains.My - Decentralised Mobile Wallet App
Blockchains.My - Decentralised Mobile Wallet App
 
E-commerce Security and Threats
E-commerce Security and ThreatsE-commerce Security and Threats
E-commerce Security and Threats
 
E Authentication System with QR Code and OTP
E Authentication System with QR Code and OTPE Authentication System with QR Code and OTP
E Authentication System with QR Code and OTP
 

More from Naga Dinesh

More from Naga Dinesh (20)

pi code (picture embedding)
pi code (picture embedding)pi code (picture embedding)
pi code (picture embedding)
 
internet and intra net
internet and intra netinternet and intra net
internet and intra net
 
Haptic technology
Haptic technologyHaptic technology
Haptic technology
 
Firewall
FirewallFirewall
Firewall
 
eye phone technology
eye phone technologyeye phone technology
eye phone technology
 
Tera data
Tera dataTera data
Tera data
 
Selenium ppt
Selenium pptSelenium ppt
Selenium ppt
 
pillcam
pillcampillcam
pillcam
 
team viewer
team viewerteam viewer
team viewer
 
Haptic tech
Haptic techHaptic tech
Haptic tech
 
Growth hacking
Growth hackingGrowth hacking
Growth hacking
 
Gifi
GifiGifi
Gifi
 
Anjular js
Anjular jsAnjular js
Anjular js
 
brain chip
 brain chip brain chip
brain chip
 
35.digital jewellery
35.digital jewellery35.digital jewellery
35.digital jewellery
 
mobilejammer
mobilejammermobilejammer
mobilejammer
 
29.skinput technology
29.skinput technology29.skinput technology
29.skinput technology
 
5 g technology
5 g technology5 g technology
5 g technology
 
cloud storage ppt
cloud storage pptcloud storage ppt
cloud storage ppt
 
23.rainbowtechnology
23.rainbowtechnology23.rainbowtechnology
23.rainbowtechnology
 

Recently uploaded

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 

Recently uploaded (20)

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 

micro payments using coin

  • 1. Fraud Resilient for Micro Payments Using Coin Management
  • 2. CONTENTS  ABSTRACT  INTRODUCTION  EXISTING SYSTEM  DIS ADVANTAGES  PROPOSED SYSTEM  ADVANTAGES  MODULES  HARDWARE REQUIREMENTS  SOFTWARE REQUIREMENTS  REFERENCES
  • 3. Abstract  Online shopping payment scheme is one of the popular in recent years. During payment process the attackers aim to stealing the customer data by targeting the Point of Sale (PoS) system.  Increasing malware that can steal card data as soon as they are read by the device.  The proposed work is to provide secure fully off-line work is interactivity between multiple client - server.  Providing an exhaustive Coin Management in framing and creating On Mobile Move Coins.
  • 4. Introduction  Credit and debit card data stealing is most popular problem in cybercrime.  The FRoDO introduces a secure off physical unclonable function.  FRoDO introduces coin element and identity element.  The main benefit is a simpler, faster, and more secure interaction between the involved actors/entities.
  • 5. Existing System  In the present method, the approach describes FRoDO, a at ease off-line micro-cost solution that's resilient to PoS information breaches.  FRoDo presents a constant structure in developing and preservation of coins.  The FroDO solution cannot improves over up to the moment procedures in phrases of flexibility and protection required by using user.
  • 6. Dis-Advantages  The system implemented called FRoDO, was built using a static coin architecture which are easier to hack.  Current FroDo Does not provides Coins Management.  FroDo is a weak prevention strategy based on data obfuscation and did not address the most relevant attacks aimed at threatening customer sensitive data, thus being vulnerable to many advanced attack techniques.
  • 7. Proposed System  Project can be extended with Coin Management in framing and creating On Mobile Move Coins.  Project is extended with UmcFrodo (User Management of Coins with Fraud Resilient Device for Off-line micro-Payments).  Extended Frodo provides coin management as need of user requirements.
  • 8. Advantages  UMFroDo provides On Mobile Coins Management.  UMFroDo is provides prevention strategy based on data obfuscation and address the most relevant attacks.  Creating on Mobile Coins provides user in generating and managing coins when needed.
  • 9. Modules  System Construction Module  Identity Element  Coin Element  Attack Mitigation  Shopping Module
  • 10. System Construction Module  In the first module, develop the System Construction module with the various entities: Vendor, User, FRoDO, PUF, Attacker.  This process is developed completely on Offline Transaction process. Develop the system with user entity initially.
  • 11. Identity Element  FRoDO does not require any special hardware component apart from the identity and the coin element that can be either plugged into the customer device or directly embedded into the device.  Similarly to secure elements, both the identity and the coin element can be considered tamperproof devices with a secure storage and execution environment for sensitive data
  • 12. Coin Element  In this module, develop Coin Element.  The Key Generator is used to compute on-the- fly the private key of the coin element.  The Cryptographic Element used for symmetric and asymmetric cryptographic algorithms applied to data received in input and send as output by the coin element;
  • 13. Attack Mitigation  The read-once property of the erasable PUF used in this solution prevents an attacker from computing the same coin twice.  Even if a malicious customer creates a fake vendor device and reads all the coins, it will not be able to spend any of these coins due to the inability to decrypt the request of other vendors.
  • 14. Shopping Module  Designed Shopping Module with payment gateway Interface.  At payment, Frodo Coin Concept is connected for payments.  User can use coins at payment gateway interface.
  • 15. Hardware Requirements  System : Pentium IV 2.4 GHz or More  Hard Disk : 40 GB  RAM : 2 GB
  • 16. Software Requirements  Operating System : Windows XP/7/8  Language : Java  Front End : JSP  Database : My-SQL
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34. Conclusion  In this project we have introduced FRoDO that is, to the best of our knowledge, the first data-breach-resilient fully off-line micropayment approach.  The security analysis shows that FRoDO does not impose trustworthiness assumptions. Further, FRoDO is also the first solution in the literature where no customer device data attacks can be exploited to compromise the system.  This has been achieved mainly by leveraging a novel erasable PUF architecture and a novel protocol design. Furthermore, our proposal has been thoroughly discussed and compared against the state of the art.  Our analysis shows that FRoDO is the only proposal that enjoys all the properties required to a secure micro-payment solution, while also introducing flexibility when considering the payment medium (types of digital coins).
  • 35. Future Scope  Finally, some open issues have been identified that are left as future work. In particular, we are investigating the possibility to allow digital change to be spent over multiple off-line transactions while maintaining the same level of security and usability
  • 36. References  [1] Vanesa Daza, Roberto Di Pietro, Flavio Lombardi, and Matteo Signorini: “Fraud Resilient Device for Off-Line Micro-Payments,” in Ieee Transactions On Dependable And Secure Computing, Vol. 13, No. 2, March/April 2016.  [2] R. L. Rivest, “Payword and micromint: Two simple micropayment schemes,” in Proc. Int. Workshop Security Protocols, 1996, pp. 69–87.  [3] S. Martins and Y. Yang, “Introduction to bitcoins: A pseudoanonymous electronic currency system,” in Proc. Conf. Center Adv. Stud. Collaborative Res., 2011, pp. 349–350.  [4] Verizon, “2014 data breach investigations report,” Verizon, Tech. Rep., 2014, http://www.verizonenterprise.com/DBIR/2014/  [5] T. Micro, “Point-of-sale system breaches, threats to the retail and hospitality industries,” University of Zurich, Department of Informatics, 2010.