A Secure Protocol for M-commerce Secure SMS Mobile Payment
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2016, Vol 4, Issue 4
Abstract
The worldwide utilization of the Internet has profoundly supplied the development of e-commerce. Technological advancement in mobile phones (e.g. Mobile phones) has likewise added to doing ecommerce by means of mobile phones (m-business). Mcommerce includes the utilization of mobile phones, for example, mobile phones in doing electronic exchanges. Applications in this area range from ordinary data utilization to high security money related electronic exchanges. Much the same as ecommerce, the security of m-business applications is basic, particularly when it includes applications that arrangement with client touchy information, In the usage, the purchaser utilizes the program to shop online of course, at the checkout he is sent to the versatile application gave and secured by the bank. The gatherings imparts through three distinctive channels (VPN burrowing, SMS informing and HTTPS) to improve the security. This convention guarantees that the purchaser basic data is never ignored the web to have the capacity to buy and in the meantime the scanning knowledge has little interference. Additionally it presents minimal overhead on the vendor and the banks to have the capacity to give such administration. To ensure the convention acts as expected, an android application was made that speaks with web servers speaking to the purchaser bank, the shipper site and vendor bank. All interchanges between the application and the purchaser bank were through VPN and SMS.
Authors and Affiliations
Sai Dharma Reddy Gudimetla| isecure payments (Android Developer),Gachibowli,Hyderabad, TG, India, BuddharajuShanmukh Varma| Gayatri Vidya Parishad College of Engineering, Visakhapatnam, AP, India, SaiRaghukanth Reddy Gudimetla| Gayatri Vidya Parishad College of Engineering, Visakhapatnam, AP, India
A Novel Approach of Privacy Preserving Data With Anonymizing Tree Structure
Data anonymization techniques have been proposed in order to allow processing of personal data without compromising user’s privacy. the data management community is facing a big challenge to protect personal inform...
Design And Implementation of Cascaded Multilevel Inverter Topology With Reduced Number Of Components
In this paper, using H-bridge topology a general cascade multilevel inverter for the implementation of 49th level inverter and a new algorithm in generating all voltage levels for a 49th level with less number of dc...
Optimizing Architecture of DSRC Device By Using Component Reuse
Devoted short-extend correspondence (DSRC) is a developing method to push the keen transportation framework into our day by day life. The DSRC norms for the most part receive FM0 and Manchester codes to achieve dc-ad...
DYNAMIC PERFORMANCE IMPROVEMENT OF INDUCTION MOTOR USING RADR CONTROLLER
Induction Motors are widely used in Industries, because of the low maintenance and robustness. Speed Control of Induction motor can be obtained by maximum torque and efficiency. Apart from other techniques Artificial...
Effective Data Hiding Method Through Pixel Pair Matching
This work proposes a new data-hiding method based on pixel pair matching , which is to use the values of pixel pair as a reference coordinate, and find a coordinate in the neighborhood set of this pixel pair based on...