Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Multi-Factor Authentication for Net Banking


Affiliations
1 Computer Science and Engineering, Sree Buddha College of Engineering, Pattoor, Alappuzha, Kerala, India
     

   Subscribe/Renew Journal


Today's mobile devices come incorporated with biometric security features. In this paper, we explain about how to use this feature to develop a web login authentication mobile application. Our application uses Redmi Xiaomi note 3 fingerprint recognition feature to login to the application and only using this interface we can carry on any online transactions. On the web side, we enable the user to login and thus proceed with the transaction. The user has to enter a valid OTP send to his phone within a limited time frame. On the successful completion of that, a QR code will be generated which is encrypted with the registered IMEI and the OTP generated. When all these three authentication procedures fall into place, a transaction proceeds to fulfillment. As the production of mobile devices with fingerprint recognition continues to increase, biometric authentication apps, like the one introduced here, will become a prevalent security measure.

Keywords

Index Terms-Biometric, Fingerprint, Online Transactions.
Subscription Login to verify subscription
User
Notifications
Font Size


  • A. C. Grivei, “Touch based biometric authentication for android devices,” ECAI 2015 - International Conference on (7thEd), Electronics, Computers and Artificial Intelligence, Bucharest, June 2015.
  • M. Umamaheswari, S. Sivasubramanian, and B. H. Kumar, “Online credit card transaction using finger print recognition,” International Journal of Engineering and Technology, vol. 2, no. 5, pp. 320-322, 2010.
  • W. Yang, J. Hu, J. Yang, S. Wang, and L. Shu, “Biometrics for securing mobile payments: Benefits, challenges and solutions,” 6th International Congress on Image and Signal Processing, 2013.
  • “Goode Intelligence forecasts that the market for mobile biometric security products and services is set to grow and will generate over $S.3 billion revenue by 201S,” 2013, Available: Goodeintelligence.com.
  • Q. Tao, and R. Veldhuis, “Biometric authentication system on mobile personal devices,” IEEE Transactions on Instrumentation and Measurement, 2010.
  • F. S. Lesani, F. F. Ghazvini, and R. Dianat, “Mobile phone security using automatic lip reading,” 9th International Conference on e-Commerce in Developing Countries: With focus on e-Business (ECDC), 2015.
  • D. Mahto, and D. K. Yadav, “Enhancing security of one-time password using elliptic curve cryptography with biometrics for e-commerce applications”, IEEE 3rd International Conference on Computer, Communication, Control and Information Technology, 2015.
  • W. Yang, Y. Wu, and G. Chen, “Application of voice recognition for mobile e-commerce security”, 3rd Pacific-Asia Conference on Circuits, Communications and System (PACCS), 2011.
  • S. Easwaramoorthy, “Biometric authentication using finger nails,” International Conference on Emerging Trends in Engineering, Technology and Science, 2016.
  • T. Barbu, A. Ciobanu, and M. Luca, “Multimodal Biometric Authentication based on Voice, Face and Iris,” Conference on E-Health and Bioengineering (EHB), 2015.
  • Y. Li, J. Yang, M. Xie, D. Carlson, H. G. Jang, and J. Bian, “Comparison of PIN-and pattern-based behavioral biometric authentication on mobile devices,” Military Communications Conference, MILCOM, 2015.

Abstract Views: 195

PDF Views: 1




  • Multi-Factor Authentication for Net Banking

Abstract Views: 195  |  PDF Views: 1

Authors

Neenu Ann Shaji
Computer Science and Engineering, Sree Buddha College of Engineering, Pattoor, Alappuzha, Kerala, India
Sumitha Soman
Computer Science and Engineering, Sree Buddha College of Engineering, Pattoor, Alappuzha, Kerala, India

Abstract


Today's mobile devices come incorporated with biometric security features. In this paper, we explain about how to use this feature to develop a web login authentication mobile application. Our application uses Redmi Xiaomi note 3 fingerprint recognition feature to login to the application and only using this interface we can carry on any online transactions. On the web side, we enable the user to login and thus proceed with the transaction. The user has to enter a valid OTP send to his phone within a limited time frame. On the successful completion of that, a QR code will be generated which is encrypted with the registered IMEI and the OTP generated. When all these three authentication procedures fall into place, a transaction proceeds to fulfillment. As the production of mobile devices with fingerprint recognition continues to increase, biometric authentication apps, like the one introduced here, will become a prevalent security measure.

Keywords


Index Terms-Biometric, Fingerprint, Online Transactions.

References