期刊文献+

移动支付中二维码的安全性研究 被引量:5

Research on the security of two-dimension code used in the mobile payment
下载PDF
导出
摘要 移动支付是近年来新兴的一种便利快捷的支付手段,并迅速占有相当的支付市场份额.移动支付按支付距离分为近程支付和远程支付两种,本文研究的是第三方支付在近程支付常采用的一种方案.该方案以二维码信息技术为媒介,实现近程支付到远程支付的转换,最终完成支付.但由于所采用二维码本身的局限性,依托其作为第三方支付手段的过程中便出现了相关的安全威胁,其中最典型的是钓鱼威胁.本文详细分析了其可能存在的安全威胁,并采用特殊加密方法和第三方认证方法对这一问题进行处理,且对解决方法进行可行性分析,最后利用形式化验证的方法验证其安全性. Mobile payment is emerging in recent years which is a convenient and fast payment method,and it occupies a fairly share of the payment market in the reason of the characteristics. According to the distance mobile payment can be divided into short-range and long-range payment,and this paper studies the scheme of short-range payment used in the third-party payment. This scheme uses the information technology of two-dimension code as carrier to realize the transformation from short-range payment to long-range,finally it complete the payment. But due to the limitation of the two-dimension code used in the mobile payment,the scheme said above has to face the relevant security threats,and one of the most typical threats is the phishing threat. This paper analyzes the possible security threats,and takes private encryption and the third certification to solve it,and makes an analysis of the feasibility,and verifies its safety by formal verification methods.
出处 《天津理工大学学报》 2014年第3期15-20,共6页 Journal of Tianjin University of Technology
关键词 移动支付 二维码 支付转换 安全性 mobile payment two-dimension code payment transformation security
  • 相关文献

参考文献7

  • 1Wang Chun-dong,Zeng Qing-hui,Wang Huai-bin.A secure wap-based mobile payment protocol architecture[J].Journal of Computational Information Systems,2012,13(8):5335-5341.
  • 2Lao Guo-ling,Liu Han-bing.Study of mobile payment business model based on third-party mobile payment service provider[C]//Management and Service Science,2011International conference on IEEE.China:Wuhan,2011:1-4.
  • 3Jaesik Lee,Chang-Hyun Cho,Moon-Seog Jun.Secure quick response-payment(QR-Pay)system using mobile device[C]//13th Conference on Advanced Communication Technology.Korea:Gangwon-do,2011:1424-1427.
  • 4Robert J Kauffman,Jun Liu,Dan Ma.Technology investment decision-making under uncertainty:the case of mobile payment systems[C]//USA 46th Hawaii International International Conference on Systems Science.USA:Hawaii,2013:4166-4175.
  • 5Li-xia J I,Jian-hong M A.Research on model transformation and model checking of UML based on timed automata[J].Journal of Zhengzhou University(Natural Science Edition),2013,45(1):50-55.
  • 6熊振华,魏臻.基于UPPAAL的铁路车站信号联锁系统模型验证[J].科学技术与工程,2008,8(7):1843-1846. 被引量:3
  • 7刘倩,桂盛霖,李允,罗蕾.基于UPPAAL的AADL模型可调度性验证[J].计算机应用,2009,29(7):1820-1824. 被引量:16

二级参考文献17

  • 1SUDHANWA K, JAMIE W, HASSAN R. Comparing the specifi- cation of a near-real time commanding system using statecharts and AADL[ C]// Proceedings of the Forth International Conference on Information Technology: New Generations. Washington, DC: IEEE Computer Society, 2007:355 -360.
  • 2BEHRMANN G, LARSEN KIM G, MOLLER O, et al. UPPAAL - Present and furure[ C]// Proceedings of the 40th IEEE conference on Decision and Control. Washington, DC: IEEE Computer Society, 2001 : 2881 - 2886.
  • 3FELLER P H, LEWIS B A, VESTAL S. The SAE Architecture Analysis and Design Language (AADL) a standard for engineering performance critical systems[ C]// Proceedings of the 2006 IEEE international Symposium on Computer-Aided Control Systems Design. Washington, DC: IEEE Computer Society, 2006: 1206- 1211.
  • 4SELIC B. The pragmatics of model-driven development[ J]. IEEE Software, 2003, 20( 5 ) : 19 - 25.
  • 5SOKOLSKY O, LEE 1, CLARKE D, Schedulability analysis of AADL models[ C]// Proceedings of 20th International Symposium on Parallel and Distributed Processing. Washington, DC: IEEE Computer Society, 2006: 8.
  • 6SAE - AS5506/1. SAE Architecture Analysis and Design Language (AADL) Annex vol. 1, Annex E: Error Model Annex[ S]. Warrendale, PA, USA: International Society of Automotive Engineers, 2006.
  • 7SINGHOFF F, LEGRAND J, NANA L. Scheduling and memory requirements analysis with AADL[ C]// Proceedings of the 2005 Annum ACM SIGAda International Conference on Ada. New York, NY, USA : ACM, 2005:1 - 10.
  • 8BUTTAZZO G C. Hard real-time computing systems: Predictable scheduling algorithms and applications[ M]. Nonwell, MA, USA: Kluwer Academic Publishers, 1997.
  • 9BREMOND-GREGOIRE P, CHOI J Y, CLARKE D, et al. A process algebraic approach to the schedulability analysisof real-time systems[ M]. Norwell, MA, USA: Kluwer Academic Publishers, 1998.
  • 10User Guide Furness Toolset vl. 6[ EB/OL]. [ 2008 - 11 - 20]. http://www, furnesstoolset, com/files/Furness% 20Toolset% 20User % 20Guide. pdf.

共引文献17

同被引文献35

引证文献5

二级引证文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部