Font Size: a A A

Research On Safety Of Mobile Payment

Posted on:2017-03-04Degree:MasterType:Thesis
Country:ChinaCandidate:R T QiuFull Text:PDF
GTID:2348330491962555Subject:Electronic and communication engineering
Abstract/Summary:PDF Full Text Request
With the vigorous development of mobile phones and the popularity of mobile network infrastructure, e-commerce and the Internet economy is increasingly active. It has become a culture for online transactions on the phone habits, namely mobile payment. Bying mobile payment, people can pay the network anytime, anywhere, including air ticket booking, book hotel, book movie tickets, and a series of consumer business as well as a variety of payment scenarios. In this way, it has greatly facilitated people's daily lives, and saves a lot of time arid effort.While this has greatly enriched our lives so that we can stay at home to buy favorite items. But for the judiciary:As the mobile payment transaction occurs on the network, so that the process of detection brought some trouble in certain cases. But also because the mobile Internet is popular in just a few years, so for this study is relatively poor, research in this area has the urgency and practicality. For the general public:although the mobile payment convenience for our life, but due to the limitations of the existing information systems lets our private information being leaked constantly, on the one hand, this information could be used by criminals, on the other hand it may be some formal company collects as a data era of big data for analysis. It collects data as a large data analysis times. Although the era of big data can greatly facilitate the better use of resources, but the way of ordinary user behavior as data scared us. Payment data because of its special sensitivity, on the one hand we neither want their orders to be leaked, nor want their consumption habits is predicted and then face countless number of telemarketing calls per day, on the other hand we do not want our account or password cause property damage. For the above two aspects, justice and the general population, this paper solves two problems:(1) For the Judiciary, we have designed a smart phone forensics system, describes its main sub-modules. First, we through the UML tool analyzes the demand for forensic system, and then we were analyzed the basic contacts, text messages and call history, and then we focused on Alipay 8.0 version of the lock screen password reverse analysis. And for the results we write the code for the module, and do the test program MFC module. Finally, we propose a simulation landing module. It is built on the basis of a similar way of screen lock key information has been obtained. After landing simulation module we can analyze other critical information such as school card number, details of the transaction and other judicial and forensic analysis.(2) For the ordinary user privacy security needs, we designed a third party to pay for mobile security protocols. Due to the current mainstream third party payment is based on SSL (Secure Sockets Layer, Secure Sockets Layer) protocol, so it can not help with a disadvantage in that it relies on third-party confidentiality commitment. Which may be indicative of future SET (Secure Electronic Transaction) protocol, but because our infrastructure is not satisfied and not yet build a sound credit payment system, resulting in lack of promotion. Our protocol is based on that and we proposed identity-based key management protocol Lagrange Interpolation secure payment protocols. The results show that we not only meet the information transfer confidentiality, integrity, non-repudiation but meet the isolation to parties in the transaction information. Businesses can obtain order information, but isolate cardholder's account and password information. Bank can obtain account and password information, but isolate specific information about the order. Third-party platform is only responsible for the transit payment platform of information to consumers have a unified front interface, but also has integrated various background bank payment gateway, but isolate its order information and account password information, at the same time it is responsible for the arbitration when both sides of the transaction has confliction.The contribution of this paper is to study with high availability mobile phone forensics research and design protocols for mobile payments to third parties. Forensics system based on the actual needs of justice, focusing on the 8.0 version of Alipay key information extraction, with high availability. Payment agreement solves the mobile payment process information isolate problems and in the premise of greatly improving the security payment efficiency.
Keywords/Search Tags:Mobile payments, Android, mobile phone forensics, payment protocol, reverse analysis, UML
PDF Full Text Request
Related items