Securing intelligent adjuncts using trusted computing platform technology
Proceedings of the fourth working conference on smart card research and advanced applications on Smart card research and advanced applications
Implementing Electronic Card Payment Systems
Implementing Electronic Card Payment Systems
Using EMV Cards to Protect E-commerce Transactions
EC-WEB '02 Proceedings of the Third International Conference on E-Commerce and Web Technologies
Xen and the art of virtualization
SOSP '03 Proceedings of the nineteenth ACM symposium on Operating systems principles
Proceedings of the 11th ACM conference on Computer and communications security
Conditional Access in Mobile Systems: Securing the Application
DFMA '05 Proceedings of the First International Conference on Distributed Frameworks for Multimedia Applications
BIND: A Fine-Grained Attestation Service for Secure Distributed Systems
SP '05 Proceedings of the 2005 IEEE Symposium on Security and Privacy
Property-based attestation for computing platforms: caring about properties, not mechanisms
NSPW '04 Proceedings of the 2004 workshop on New security paradigms
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
TCG inside?: a note on TPM specification compliance
Proceedings of the first ACM workshop on Scalable trusted computing
Trusted Computing (Professional Applications of Computing) (Professional Applications of Computing)
Trusted Computing (Professional Applications of Computing) (Professional Applications of Computing)
Compartmented Security for Browsers - Or How to Thwart a Phisher with Trusted Computing
ARES '07 Proceedings of the The Second International Conference on Availability, Reliability and Security
SP '07 Proceedings of the 2007 IEEE Symposium on Security and Privacy
Risks and potentials of using EMV for internet payments
WOST'99 Proceedings of the USENIX Workshop on Smartcard Technology on USENIX Workshop on Smartcard Technology
Semantic remote attestation: a virtual machine directed approach to trusted computing
VM'04 Proceedings of the 3rd conference on Virtual Machine Research And Technology Symposium - Volume 3
SecVisor: a tiny hypervisor to provide lifetime kernel code integrity for commodity OSes
Proceedings of twenty-first ACM SIGOPS symposium on Operating systems principles
Proceedings of the 2007 ACM workshop on Scalable trusted computing
Compiling information-flow security to minimal trusted computing bases
ESOP'11/ETAPS'11 Proceedings of the 20th European conference on Programming languages and systems: part of the joint European conferences on theory and practice of software
Trusted computing enhanced user authentication with OpenID and trustworthy user interface
International Journal of Internet Technology and Secured Transactions
Hi-index | 0.00 |
This paper shows how the functionality associated with EMV-compliant payment cards can be securely emulated in software on platforms supporting Trusted Computing technology. We describe a detailed system architecture encompassing user enrolment, card deployment (in the form of software), card activation, and subsequent transaction processing. Our proposal is compatible with the existing EMV transaction processing architecture, and thus integrates fully and naturally with already deployed EMV infrastructure. We show that our proposal, which effectively makes available the full security of PoS transactions for Internet-based CNP transactions, has the potential to significantly reduce the opportunity for fraudulent CNP transactions.