Abstract
In recent years, with the vigorous development of mobile Internet and the increasing popularity of intelligent electronic products, intelligent mobile terminals are no longer just communication functions, but also related to our family life, such as smart home and smart cars. With the powerful function of intelligent mobile terminals, people pay more and more attention to mobile payment business because of its convenient and fast service, and the following security problems are worrisome. Compared with the bank card payment, the smart mobile terminal can complete a variety of transactions directly by downloading the corresponding payment procedures, including shopping payments. However, because of the open resources of the Android system, system ROOT permissions easily cracked, there is a big potential security risk in mobile payment. In addition, the Android system lacks strict application software signature verification measures, and unauthorized application software can be installed properly, and there may be malicious software containing virus. Therefore, the design of a highly secure and customized Android intelligent payment terminal has become a common concern in the field of payment and academia.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
S. Aral, C. Dellarocas, D. Godes, Introduction to the special issue—social media and business transformation: a framework for research. Inf. Syst. Res. 24(1), 3–13 (2013)
M. Mann, S.E. Byun, Y. Li, Realignment strategies in the US retail industry during a recessionary time: dominant themes, trends, and propositions. Int. J. Retail Distrib. Manage. 43(8), 775–792 (2015)
C. Vroom, C. Von Solms, Towards information security behavioural compliance. Comput. Secur. 23(3), 191–198 (2002)
A. Perrig, R. Szewczyk, J.D. Tygar, SPINS: Security protocols for sensor networks. Wireless Netw. 8(5), 521–534 (2002)
C.H. Bennett, G. Brassard, N.D. Mermin, Quantum cryptography without Bell’s theorem. Phys. Rev. Lett. 68(5), 557–558 (1992)
R. Tripathi, S. Agrawal, Comparative study of symmetric and asymmetric cryptography techniques. Int. J. Adv. Found. Res. Comput. (IJAFRC) 1(6), 68–76 (2014)
F.C. Bernstein, T.F. Koetzle, G.J.B. Williams, The protein data bank: a computer-based archival file for macromolecular structures. Arch. Biochem. Biophys. 185(2), 584–591 (1978)
W. Enck, M. Ongtang, P. McDaniel, Understanding android security. IEEE Secur. Priv. 7(1), 50–57 (2007)
A. Wyner, J. Ziv, The rate-distortion function for source coding with side information at the decoder. IEEE Trans. Inf. Theory 22(1), 1–10 (1976)
A.D. Liveris, Z. Xiong, C.N. Georghiades, Compression of binary sources with side information at the decoder using LDPC codes. IEEE Commun. Lett. 6(10), 440–442 (2002)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Dhanasekaran, S., Kasi, B. (2019). Payment Security Mechanism of Intelligent Mobile Terminal. In: Wang, J., Reddy, G., Prasad, V., Reddy, V. (eds) Soft Computing and Signal Processing . Advances in Intelligent Systems and Computing, vol 900. Springer, Singapore. https://doi.org/10.1007/978-981-13-3600-3_15
Download citation
DOI: https://doi.org/10.1007/978-981-13-3600-3_15
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-3599-0
Online ISBN: 978-981-13-3600-3
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)