{"title":"简化了南非和欧洲的网上银行认证方法","authors":"F. Blauw, S. von Solms","doi":"10.1109/ISTAFRICA.2014.6880608","DOIUrl":null,"url":null,"abstract":"Online banking now requires additional levels of authentication in order to prevent fraudulent transactions. The first, and still most prevalent, method of authentication in South Africa makes use of the mobile phone. By using an SMS to send a one-time password, or Push USSD to immediately require action from the user, the online bank system attempts to verify the authenticity of the transaction. Newer methods, particularly found in Europe, make use of specialised devices that incorporate existing bank tokens, i.e. chip card, to further validate any online transactions. Both of these methods have security defects and usability issues. A new method that uses the best of the approaches and includes additional factors, e.g. biometrics, is explored.","PeriodicalId":248893,"journal":{"name":"2014 IST-Africa Conference Proceedings","volume":"55 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Streamlined approach to online banking authentication in South Africa and Europe\",\"authors\":\"F. Blauw, S. von Solms\",\"doi\":\"10.1109/ISTAFRICA.2014.6880608\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Online banking now requires additional levels of authentication in order to prevent fraudulent transactions. The first, and still most prevalent, method of authentication in South Africa makes use of the mobile phone. By using an SMS to send a one-time password, or Push USSD to immediately require action from the user, the online bank system attempts to verify the authenticity of the transaction. Newer methods, particularly found in Europe, make use of specialised devices that incorporate existing bank tokens, i.e. chip card, to further validate any online transactions. Both of these methods have security defects and usability issues. A new method that uses the best of the approaches and includes additional factors, e.g. biometrics, is explored.\",\"PeriodicalId\":248893,\"journal\":{\"name\":\"2014 IST-Africa Conference Proceedings\",\"volume\":\"55 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-05-07\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 IST-Africa Conference Proceedings\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISTAFRICA.2014.6880608\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 IST-Africa Conference Proceedings","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISTAFRICA.2014.6880608","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Streamlined approach to online banking authentication in South Africa and Europe
Online banking now requires additional levels of authentication in order to prevent fraudulent transactions. The first, and still most prevalent, method of authentication in South Africa makes use of the mobile phone. By using an SMS to send a one-time password, or Push USSD to immediately require action from the user, the online bank system attempts to verify the authenticity of the transaction. Newer methods, particularly found in Europe, make use of specialised devices that incorporate existing bank tokens, i.e. chip card, to further validate any online transactions. Both of these methods have security defects and usability issues. A new method that uses the best of the approaches and includes additional factors, e.g. biometrics, is explored.