Secure Online Transaction Algorithm: Securing Online Transaction Using Two-Factor Authentication

Joseph Gualdoni, Andrew Kurtz, Ilva Myzyri, Megan Wheeler, Syed Rizvi

Research output: Contribution to journalConference article

3 Citations (Scopus)

Abstract

Identity theft is a very scary and real threat to everyone. In an attempt to give people peace of mind a new algorithm of mitigating risk is presented, the Secure Online Transaction Algorithm (SOTA). The proposed SOTA seeks to use two-factor authentication with the random codes. This form of user authentication has become widely accepted and many companies have started to implement this security feature. This can be utilized to identify users and establish secure way of purchasing items online. The proposed SOTA uses mobile devices to log into card accounts via an application to view the randomly generated code. This is then inputted on an online retailer's website when prompted in order to authenticate the individual making the purchase. This minimizes the possibility that an illegitimate user can use someone else's information to make fraudulent purchases. Without a valid code, identity thieves cannot use the stolen card information to make purchases. This in turns protects both the consumer and the credit card companies, which could be harmed financially. In order to better understand how our model could protect someone from having a stolen credit card used, we provide one case study to showcase the security.

Original languageEnglish (US)
Pages (from-to)93-99
Number of pages7
JournalProcedia Computer Science
Volume114
DOIs
StatePublished - Jan 1 2017
EventComplex Adaptive Systems Conference with Theme: Engineering Cyber Physical Systems, CAS 2017 - Chicago, United States
Duration: Oct 30 2017Nov 6 2017

Fingerprint

Authentication
Purchasing
Mobile devices
Websites
Industry

All Science Journal Classification (ASJC) codes

  • Computer Science(all)

Cite this

Gualdoni, Joseph ; Kurtz, Andrew ; Myzyri, Ilva ; Wheeler, Megan ; Rizvi, Syed. / Secure Online Transaction Algorithm : Securing Online Transaction Using Two-Factor Authentication. In: Procedia Computer Science. 2017 ; Vol. 114. pp. 93-99.
@article{c62abca4f5d54738a35c73dd389400ad,
title = "Secure Online Transaction Algorithm: Securing Online Transaction Using Two-Factor Authentication",
abstract = "Identity theft is a very scary and real threat to everyone. In an attempt to give people peace of mind a new algorithm of mitigating risk is presented, the Secure Online Transaction Algorithm (SOTA). The proposed SOTA seeks to use two-factor authentication with the random codes. This form of user authentication has become widely accepted and many companies have started to implement this security feature. This can be utilized to identify users and establish secure way of purchasing items online. The proposed SOTA uses mobile devices to log into card accounts via an application to view the randomly generated code. This is then inputted on an online retailer's website when prompted in order to authenticate the individual making the purchase. This minimizes the possibility that an illegitimate user can use someone else's information to make fraudulent purchases. Without a valid code, identity thieves cannot use the stolen card information to make purchases. This in turns protects both the consumer and the credit card companies, which could be harmed financially. In order to better understand how our model could protect someone from having a stolen credit card used, we provide one case study to showcase the security.",
author = "Joseph Gualdoni and Andrew Kurtz and Ilva Myzyri and Megan Wheeler and Syed Rizvi",
year = "2017",
month = "1",
day = "1",
doi = "10.1016/j.procs.2017.09.016",
language = "English (US)",
volume = "114",
pages = "93--99",
journal = "Procedia Computer Science",
issn = "1877-0509",
publisher = "Elsevier BV",

}

Secure Online Transaction Algorithm : Securing Online Transaction Using Two-Factor Authentication. / Gualdoni, Joseph; Kurtz, Andrew; Myzyri, Ilva; Wheeler, Megan; Rizvi, Syed.

In: Procedia Computer Science, Vol. 114, 01.01.2017, p. 93-99.

Research output: Contribution to journalConference article

TY - JOUR

T1 - Secure Online Transaction Algorithm

T2 - Securing Online Transaction Using Two-Factor Authentication

AU - Gualdoni, Joseph

AU - Kurtz, Andrew

AU - Myzyri, Ilva

AU - Wheeler, Megan

AU - Rizvi, Syed

PY - 2017/1/1

Y1 - 2017/1/1

N2 - Identity theft is a very scary and real threat to everyone. In an attempt to give people peace of mind a new algorithm of mitigating risk is presented, the Secure Online Transaction Algorithm (SOTA). The proposed SOTA seeks to use two-factor authentication with the random codes. This form of user authentication has become widely accepted and many companies have started to implement this security feature. This can be utilized to identify users and establish secure way of purchasing items online. The proposed SOTA uses mobile devices to log into card accounts via an application to view the randomly generated code. This is then inputted on an online retailer's website when prompted in order to authenticate the individual making the purchase. This minimizes the possibility that an illegitimate user can use someone else's information to make fraudulent purchases. Without a valid code, identity thieves cannot use the stolen card information to make purchases. This in turns protects both the consumer and the credit card companies, which could be harmed financially. In order to better understand how our model could protect someone from having a stolen credit card used, we provide one case study to showcase the security.

AB - Identity theft is a very scary and real threat to everyone. In an attempt to give people peace of mind a new algorithm of mitigating risk is presented, the Secure Online Transaction Algorithm (SOTA). The proposed SOTA seeks to use two-factor authentication with the random codes. This form of user authentication has become widely accepted and many companies have started to implement this security feature. This can be utilized to identify users and establish secure way of purchasing items online. The proposed SOTA uses mobile devices to log into card accounts via an application to view the randomly generated code. This is then inputted on an online retailer's website when prompted in order to authenticate the individual making the purchase. This minimizes the possibility that an illegitimate user can use someone else's information to make fraudulent purchases. Without a valid code, identity thieves cannot use the stolen card information to make purchases. This in turns protects both the consumer and the credit card companies, which could be harmed financially. In order to better understand how our model could protect someone from having a stolen credit card used, we provide one case study to showcase the security.

UR - http://www.scopus.com/inward/record.url?scp=85039987174&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85039987174&partnerID=8YFLogxK

U2 - 10.1016/j.procs.2017.09.016

DO - 10.1016/j.procs.2017.09.016

M3 - Conference article

AN - SCOPUS:85039987174

VL - 114

SP - 93

EP - 99

JO - Procedia Computer Science

JF - Procedia Computer Science

SN - 1877-0509

ER -