Você está na página 1de 4

DIGI WALLET FOR NFC TRANSACTION

SERVICES
Mrs C.NITHYA S.SAKTHI
Department of Electronics and Communication
A.SASIKUMAR
SMIT
R.SUNDAR
Department of Electronics and Communication
CHENNAI,INDIA
SMIT
Abstract At present scenario the technology forced us to CHENNAI,INDIA
replace currency notes with various payment cards.An
average person carries around atleast 6 plastic cards in
II. RELATED WORK
their wallets, including credit and debit cards, store cards,
membership cards. Our paper objective is to propose a A. Transaction authentication scheme based on
reprogrammable smart payment card that replaces all enchanced signature RTD for nfc payment service
other cards in the wallet,based on NFC, E-Paper Display, environments
Bluetooth and Cap Touch Sense. The combination of mobile and NFC aroused great
momentum for Activation of NFC services market.Especially,
Keywords:bluetooth,capacitive touch sensor, low power e- the realization of mobile NFC payment services is expected to
paper display, nfc go commercial, and it is widely attracting attention both on a
domestic and global level. However, this realization would
increase privacy infringement, as personal information is
I. INTRODUCTION extensively used in the NFC technology. One example of such
Convenience in daily life is what every person is privacy infringement would be the case of credit card
seeking and what this paper is addressing. As the numbers of information hacking by POS terminal based on KS X 6928,
personal accounts are increasing, carrying a larger quantity of standard. we proposed a secure transaction authentication
smartcards has become a necessity.As we all know a typical scheme based on enhanced signature RTD in NFC payment
resident has four to seven smart cards in his/her possession. In service environments to using signature RTD standard and KS
many of the cases, passwords and PINs are required to be X6928 standard..
memorized which are often forgotten and this leads to an B. An illustration of dynamic network DEA in commercial
impractical use of ones time.Near field communication is a type banking including robustness tests
of electronic tag using a short-range high-frequency in the
The illustrate dynamic network data envelopment
13.56-MHz bandwidth,This technology that is able to integrate
analysis in commercial banking with emphasis on testing
the multitude of accounts into one safe, convenient location is
robustness. When network and dynamic dimensions are brought
the main objective.This is accomplished by storing the
together, a more comprehensive analysis of the period 2008
information of all of a users accounts into a secure database
2010 is enabled where divisional and between-period
utilizes an NFC tag as the unique identifier of the account
interactions are reflected in efficiency estimates. Weighted,
owner.NFC mobile devices can provide various application
variable returns-to scale, non-oriented dynamic network slacks
services such as mobile coupon services, payment services,
based measure is used within the framework of the
access control services, and smart posters. In particular, payment
intermediation approach to bank behavior. A bank network is
services using NFC and mobile devices have been popular in the
conceptualized as comprised of two divisions or sub-DMUs,
related market.In this paper proposes a transaction authentication
namely, interest-bearing operations and non interest operations
method, in which existing payment information cannot be
linked by number of referrals.Undesirable outputs from sub
exploited even if it is exposed by other entities.This method uses
DMUs 1 and 2 are treated as carry-overs that impact the
the password system provided by the NFC standard without
efficiency of the following periods.Under robustness testing, the
modifying existing mobile payment standards. In section 2, we
illustrative application discusses discrimination by efficiency
discuss about the existig papers.In section 3,we can see the
estimates,dimensionality of the performance model, stability of
blocking diagrm of work flow method,wallet unit and NFC
estimates through re-sampling (leave-one-out method), and
reader writer unit. Section 4 describes the proposed method,
sensitivity of results to divisional weights and returns-to-scale
which explains the proposed system with features and
assumptions. The results based on Chinese commercial banks
peripherals of wallet and NFC reader writer unit and section 5
are illustrative in nature because of simulated data used on two
analyzes this method. Finally, the conclusion is presented in
of the variables.
section 6.
C. A Wearable and ubiquitous NFC wallet
Technology that is able to integrate the multitude of
accounts into one safe, convenient, and wearable pass is an
attractive modern setup. Such a technology would be required to
have the ability to customize, and unify this information into a
convenient and secure system. Since all of a users accounts are
stored in a single device, the act of carrying around copious
amounts of smartcards becomes obsolete.The proposal has three
main elements: the wearable technology, a smart reader, and a
web-based phone application. The wearable technology is the
access point for the user, the readers retrieve the required
information, while the application allows the user to modify the
information they wish to store. NFC Wallet is ubiquitous; the
software is web-enabled so that the user can control it using
smart phones. The system provides a true pervasive computing
experience.

D. Security vulnerabilities of the NDEF signature record


type
The NFC Forum has released a first candidate for their
Signature Record Type Definition. This specification adds
digital signatures to the NFC Data Exchange Format Fig 2.wallet unit
(NDEF),which is a standardized format for storing data on NFC
(NearField Communication) tags and for transporting data across
peerto-peer links between NFC devices. With an increasing
number of applications of the NFC and NDEF technology, more
and more security threats became apparent. The signature record
type is supposed to increase security for NDEF applications by
providing authenticity and integrity to the NDEF data. This
paper takes a close look on the recently published Signature
Record Type Definition and discusses its various security
aspects. First, we introduce the signature record type and its
usage. After that, we analyze the security aspects of the current
signaturmethod. Finally, we disclose multiple security
vulnerabilities of the current Signature Record Type Definition
and propose measures to avoid them.

III.BLOCK DIAGRAM
Fig 3.NFC reader writer unit
DATABASE POS
SERVER IV.PROPOSED SYSTEM
SERVER
Our paper objective is to propose a reprogrammable
smart payment card model that replaces all other cards in the
wallet.The proposed system consist of two unit.They are wallet
FIREWALL
unit and NFC reader writer unit.Our model is constructed by
FIREWALL using an ultra low power e-paper display, capacitive touch
sensor, NFC and by bluetooth communication. The card details
is sent to the wallet by the medium of the app in the
smartphone.The card details will be stored in the wallet via
bluetooth from smart phone.The card details will be displayed in
the low power LCD screen in the wallet and any of the card
details from list is selected which is through capacitive touch
SMARTPHONE
NFC READER sensor.The user can add a new card, erase a particular one or
APP even erase all using a smartphone app. The card is enabled with
(AT POS bluetooth radio to communicate with the smartphone. The
TERMINAL) smartcard can store upto 30 different cards. The android app
allows the user to see the current balance of their bank accounts
in their cards. It also allows seeing the history of transaction.
WALLET This eliminates the user from logging into different bank apps
and maintaining them.NFC reader writer unit is to used to read
the card details in the wallet during transaction. The user will be
able to lock it with 4 digits of the card using a simple touch on
Fig 1.working mechanism the card.To enable this, the card has a capacitive touch input area
that senses both button press as well as swapping gestures. C.AUTHENTICATION
Entering secure PIN and switching cards is thus intuitive and an
easy one within a few seconds.The card will be in constant Our proposed system has less authentication risk
communication with smartphone.In case if the connection was because all card details are comes under the single password
lost,after a certain time interval the card interprets it as lost or system.The card is in continuous contact with smartphone of the
user.If the card is theft the card cannot be accessed by the thief.It
stolen and will automatically disable itself.The user can re-
is because if the connection of the card with the smartphone is
enable the card only by entering the authentication password on lost it deactivate automatically.Sometimes user may deactivate
the card and from the smartphone app.The entire payment or activate the card by accessing the smartphone.Many account
process is carried over NFC,which is a secure and universal details can be added or deleted in a ease of way.Therefore it is
contactless payment technology.A dynamic NFC transponder easy for user to use and the wallet is protective.The main
chip is embedded on the card to support this.This chip also acts advantage of the system is confidentiality,integrity and safety.
Data used in communication include sensitive payment
as the permanent memory area to store the card details.the wallet
information, which should be shared only by legitimate
unit is interfaced with 4-input capacitive touch sensor,low power communication objects, and data contents should not be inferred
consuming display,bluetooth transceiver and nfc transponder. even if data are exposed in the middle of communication.Data
provided during communications should not be tampered with or
A.WALLET UNIT modulated because the data can be used as the basis for a
financial transaction such as billing.Safety should be provided
by protecting against the security vulnerabilities found in the
The wallet is of microcontroller STM32LO53 works in
existing signature RTD structure.The proposed system uses
the low power platform which is about 1.65V and it operates password for authentication.During the communication phase
upto frequency of 72 MHz.The memories is up to 64 KB Flash via secret keys, the payment information used in the
memory,8KB RAM,2 KB of data EEPROM ,protection against communication is transferred safely using the payment standard-
R/W operation.,the lcd driver controller can be used upto based session key establishment.
828segment which support contrast adjustment,blinking mode
and Step-up converted on board,the controller also supports 24
capacitive touch sensing channels and has capability of V. ANALYSIS OF PROPOSED METHOD
supporting 8x peripheral communication interfaces and it has
firewall protection.the NFC transponder is interfaced with the The proposed method satisfies the security
controller which is nothing but Short range contactless requirements.The proposed method solves the problem of record
technology limited to 10cm range and it has very high privacy composition and record hiding attacks, which are considered to
be security vulnerabilities using a password method that
operates at 13.56 MHz frequency at speed of 106 to 424 Kbps
combines related records without physical changes in structures.
data rate.The advantage of using NFC is the cost is low and In particular,the proposed method utilizes existing methods
consumes less power than bluetooth or wifi.The NFC has three without the need to implement an additional encryption
operating modes such as Read/Write,Peer to Peer and Card algorithm module in hardware or software.Thus, it can
Emulation.for NFC transponder.The 2.04" dispalay active area immediately be applied to existing systems, and no additional
contains 172x72 pixels, and has 1-bit and 2-bit full display adoption cost is needed.Therefore,it provides high efficiency in
terms of cost effectiveness.Finally,if this method is applied in
capabilities.It has SPI interface and On-chip oscillator.Bluetooth
practice,it can resolve the additional damage due to existing
Supports Android Smartphone/Tablet/PC Communication and it personal payment information exposure.The user has to enter a
has 3Mbps Modulation with complete 2.4GHz radio transceiver four digit secure PIN before switching cards or making changes
and baseband,it consumes Low Power 1.8V Operates in the to the card.Once the authentication is completed, the desired
range of 1.8 to 3.6V .It has UART interface with programmable card can be selected by simply swiping on the cap touch area
baud rate.The HC-05 is With integrated antenna and edge and used for payment.If the card is already selected, simply
connector.The Default Baud rate of HC-05 is 9600.The LCD entering the secure PIN will unlock the card for payment,
ensuring that no other can take the card and use it.Before
display Uses PCD8544 low power, CMOS LCD controller,it is
handling the card to a merchant, the user will be able to lock it
Interfaced via SPI protocol and has 48 rows and 84 columns. with only the last 4 digits of the card visible using a simple touch
on the card.To enable this,the card has a capacitive touch input
B. NFC READER WRITER UNIT area that senses both button press as well as swapping gestures.
Entering secure PIN and switching cards is thus intuitive and an
The NFC reader writer unit is of LPC1313 and it is easy one within a few second. The card will be in constant
communication with smartphone. In case if the connection was
interfaced with PN532 and PCD5344 LCD display.PN532 NFC
lost, after a certain time interval the card interprets it as lost or
supports all three NFC modes ands SPI, I2C and UART stolen and will automatically disable itself. The user can re-
Interface.Ultra low power consumption.is one of its enable the card only by entering the authentication password on
advantage.The PCD8544 CMOS LCD controller consumes low the card and from the smartphone app.The entire payment
power and interfaced via SPI protocol.the display has 48 rows process is carried over NFC, which is a secure and universal
and 84 columns contactless payment technology.A dynamic NFC transponder
chip is embedded on the card to support this. This chip also acts
as the permanent memory area to store the card details.The user
can add a new card, erase a particular one or even erase all using
a smartphone app.The card is enabled with bluetooth radio to
communicate with the smartphone.The smartcard can store upto
30 different cards.The android app allows the user to see the
current balance of their bank accounts in their cards.It also
allows seeing the history of transaction.This eliminates the user
from logging into different bank apps and maintaining them.The
transaction can be carried out using an NFC enabled android
smartphone or using a separately designed NFC reader-writer
device.This device consists of an NFC controller to
communicate with the card and a graphics display to show
transaction.

VI. CONCLUSION
The NFC transaction is authenticative method and it
was proposed to protect the financial information stored in the
wallet.In this method the user will make easy transaction process
and will not suffer financial damage because the transaction
cannot be proceed without wallet password information.The
password method is to exclude the signature RTD method.The
user has to chose the card which has to be selected for
transaction using capacitive touch sensor and the wallet
password is entered to confirm the transaction to be
made.Finally,the proposed method is flexible for user and easy
to use by evolution of embedded system.

REFERENCES

[1] TRANSACTION AUTHNTCATION SCHEME BASED


ON ENHANCED SIGNATURE RTD FOR NFC PAYMENT
SERVICE ENVIRONMENTS, Sung-work, Park, and Im-
Yeong, Lee,Department of Computer Science and Software,
Soonchunyang University, Asan, Republic of korea,2016

[2] AN ILLUSTRATION OF DYNAMIC NETWORK DEA IN


COMMERCIAL BANKING INCLUDING ROBUSTNESS
TESTS.One Tab NFC Payment. Diss. Singapore: DBS Bank,
Avkiran, Necmi Kemal. Omega,JULY,2014

[3] A WEARABLE AND UBIQUITOUS NFC WALLET, Alaa


Eddin,Al-Chalabi, Samer Essa, Hasseb Shahzad, and Issam
Damaj. MAY,2015

[4] SECURITY VULNERABILITIES OF THE NDEF


SIGNATURE RECORD TYPE Michael Ronald, Josef Langer
NFC Research Lab Hagenberg, Upper Austria University Of
Applied Sciences and Josef Scharinger, Department Of
Computational Perception, Johannes Kepler University
Linz,2011

Você também pode gostar