2017
DOI: 10.1007/s00779-017-1035-z
|View full text |Cite
|
Sign up to set email alerts
|

Technical feasibility of context-aware passive payment authorization for physical points of sale

Abstract: In this work, the technical feasibility of passive secure payments for brick-and-mortar points of sale is analyzed. The core element of the proposed approach is a new application for context-based risk and trust assessment. It allows for dynamic selection of payment authorization methods that constitutes accurate trade-off between security and convenience. Particularly, the payments can be performed and authorized in the background using biometric means (face recognition), without user's explicit action. Gener… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(2 citation statements)
references
References 3 publications
0
2
0
Order By: Relevance
“…The authors of [7] proposed a risk engine based on fuzzy logic applicable to energy management tasks in smart homes. In [15], a system is proposed to dynamically choose the appropriate authenticator for the authorization process of payment at the point of service (POS) based on a predefined set of rules. While these systems show that risk-based authentication systems are usable in real-life applications, they are not transferable to other domains because the proposed risk engines are too intertwined with their respective application domain.…”
Section: Related Work a Risk-based Authentication Systemsmentioning
confidence: 99%
“…The authors of [7] proposed a risk engine based on fuzzy logic applicable to energy management tasks in smart homes. In [15], a system is proposed to dynamically choose the appropriate authenticator for the authorization process of payment at the point of service (POS) based on a predefined set of rules. While these systems show that risk-based authentication systems are usable in real-life applications, they are not transferable to other domains because the proposed risk engines are too intertwined with their respective application domain.…”
Section: Related Work a Risk-based Authentication Systemsmentioning
confidence: 99%
“…The single-factor authentication is not dependable and is relatively simple to get around. Although there have been recent in-depth investigations of password substitutes, no work has yet given a comprehensive assessment of the combined usage of several authentication or testimony procedures inside adaptive systems [8]. In the set of traits chosen for recognizing a person's fingerprint based on the context, there are variables that are used for comparison in adjusting behavior.…”
Section: Literature Reviewmentioning
confidence: 99%