Title :
Trusted module based secure electronic transaction scheme
Author :
Mao, Jian ; Li, Ku ; Xu, Xiandong
Author_Institution :
Dept. of Electron. & Inf. Eng., Beihang Univ., Beijing, China
Abstract :
We propose a trusted computing module based secure electronic transaction architecture, which uses trusted equipment as the identity authentication and transaction authorization terminal. The framework binds authentication and authorization in e-transaction operations and guarantee the secure sensitive operation is executed properly in an isolated, trusted, auditable environment. Our approach thwarts Man-in-the-Middle attacks, and protects user´s account from keyloggers and most forms of spyware and fends off the authorization hijack attack efficiently.
Keywords :
computer crime; transaction processing; identity authentication; keyloggers; man-in-the-middle attacks; secure electronic transaction architecture; spyware; transaction authorization terminal; trusted computing module; trusted equipment; trusted module based secure electronic transaction scheme; Authentication; Authorization; Browsers; Computer architecture; Malware; Servers; Authorization Hijack; Identity Theft; Transaction Hijack; Web spoofing;
Conference_Titel :
Information Theory and Information Security (ICITIS), 2010 IEEE International Conference on
Conference_Location :
Beijing
Print_ISBN :
978-1-4244-6942-0
DOI :
10.1109/ICITIS.2010.5689513