Secure Online Transaction Algorithm: Securing Online Transaction Using Two-Factor Authentication

Joseph Gualdoni, Andrew Kurtz, Ilva Myzyri, Megan Wheeler, Syed Rizvi

Research output: Contribution to journalConference articlepeer-review

16 Scopus citations

Abstract

Identity theft is a very scary and real threat to everyone. In an attempt to give people peace of mind a new algorithm of mitigating risk is presented, the Secure Online Transaction Algorithm (SOTA). The proposed SOTA seeks to use two-factor authentication with the random codes. This form of user authentication has become widely accepted and many companies have started to implement this security feature. This can be utilized to identify users and establish secure way of purchasing items online. The proposed SOTA uses mobile devices to log into card accounts via an application to view the randomly generated code. This is then inputted on an online retailer's website when prompted in order to authenticate the individual making the purchase. This minimizes the possibility that an illegitimate user can use someone else's information to make fraudulent purchases. Without a valid code, identity thieves cannot use the stolen card information to make purchases. This in turns protects both the consumer and the credit card companies, which could be harmed financially. In order to better understand how our model could protect someone from having a stolen credit card used, we provide one case study to showcase the security.

Original languageEnglish (US)
Pages (from-to)93-99
Number of pages7
JournalProcedia Computer Science
Volume114
DOIs
StatePublished - 2017
EventComplex Adaptive Systems Conference with Theme: Engineering Cyber Physical Systems, CAS 2017 - Chicago, United States
Duration: Oct 30 2017Nov 6 2017

All Science Journal Classification (ASJC) codes

  • General Computer Science

Fingerprint

Dive into the research topics of 'Secure Online Transaction Algorithm: Securing Online Transaction Using Two-Factor Authentication'. Together they form a unique fingerprint.

Cite this