2016
DOI: 10.1007/978-3-319-49148-6_36
|View full text |Cite
|
Sign up to set email alerts
|

Authentication and Transaction Verification Using QR Codes with a Mobile Device

Abstract: User authentication and the verification of online transactions that are performed on an untrusted computer or device is an important and challenging problem. This paper presents an approach to authentication and transaction verification using a trusted mobile device, equipped with a camera, in conjunction with QR codes. The mobile device does not require an active connection (e.g., Internet or cellular network), as the required information is obtained by the mobile device through its camera, i.e. solely via t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 12 publications
(4 citation statements)
references
References 28 publications
0
4
0
Order By: Relevance
“…This can complicate unauthorized access attempts, as the QR code is challenging to replicate. However, there is a risk of QR code copying or theft, which can undermine its effectiveness [61]. One-time password (OTP) authentication generates temporary and exclusive authentication tokens delivered through SMS or email.…”
Section: ) Pba Methodsmentioning
confidence: 99%
“…This can complicate unauthorized access attempts, as the QR code is challenging to replicate. However, there is a risk of QR code copying or theft, which can undermine its effectiveness [61]. One-time password (OTP) authentication generates temporary and exclusive authentication tokens delivered through SMS or email.…”
Section: ) Pba Methodsmentioning
confidence: 99%
“…Many banks have enhanced their security by using One-Time Password (OTP) as another authentication method in addition to the traditional username and password method [76], [77]. Then OTP is used for transaction verification at the mobile terminal [78], [79]. Recently, Google uses the 2-step authentication framework to enhance the OTP approach [38].…”
Section: B Totp Payment Authentication Algorithmmentioning
confidence: 99%
“…The QR code has seen a variety of applications in the area of information security. For example, QR codes have been used for secret sharing [8], authentication and transaction verification [7], authenticating visual cryptography shares [36] as well as for e-voting authentication [15].…”
Section: Related Workmentioning
confidence: 99%