skip to main content
research-article

A prototype design for DRM based credit card transaction in E-commerce

Published: 06 May 2008 Publication History

Abstract

In E-Commerce credit cards gained popularity as a sophisticated payment mechanism. With the increase in credit card use on web, credit card fraud has gone up dramatically. Which cause customer's inconvenience and for merchant, loss of customers. To combat credit card fraud and to regain the customer's trust an attempt is made here to design a trust based payment system, in which the customer does not need to disclose his/her credit card number during the transaction, and hence they can feel safe. In this newly proposed system on behalf of the customer the bank or the issuer of the credit card is involved to perform the transaction. This is basically done by generating a single use 'token' by the bank which includes information about the customer, merchant, product, payment amount, date of issue and date of expiry etc. and thereafter wrapped as a DRM package. Among various advantages, one is that only the intended user and the specified application software can open the DRM package using special key. The application, thereafter, will take care of the rights imposed on the 'token' and expires itself after the single use. We have tried an attempt to use UML to design the model of such system, which is the recent trend of software engineering practice.

References

[1]
"The Technology of Rights: Digital Rights Management", Karen Coyle, Based on a talk originally given at the Library of Congress, November 19, 2003.
[2]
"E-Commerce - An Indian Perspective", P.T. Joseph, S.J, PHI, 2nd Edn, 2006.
[3]
http://www.epaynews.com
[4]
http://wwwnasscom.org
[5]
"Cryptography and E-Commerce", Jon C. Graff, Wiley, ISBN: 0471-40574-4, 2001.
[6]
"E-Commerce and E-Business: Rising from the Ashes", T. Pritsky, Whitepaper, www.hill.com, Dec 2002.
[7]
Netscape Website: http://www.netscape.com/newsref/std/SSL.html
[8]
MasterCard Website: http://www.mastercard.com
[9]
"Building an E-Commerce Trust Infrastructure SSL Server Certificates and Online Payment Services", VeriSign Technical Brief, www.verisign.com
[10]
http://www.setco.org/download/set_bk1.pdf
[11]
"Off-line generation of limited-use credit card numbers", Aviel D. Rubin, Rebecca N. Wright, Financial Cryptography Conference, Feb 2001.
[12]
"A Survey of Security in Online Credit Card Payments", Umesh Shankar, Miriam Walker, May 2001.
[13]
American Express website: http://www26.americanexpress.com
[14]
T. Huang, Y. Liu, "Considerations on AVS DRM Architecture", Jour. of Computer Science and Technology, Vol. 21, No. 3, DOI. 10.1007/s11390-006-0366-4, May, 2006.
[15]
P. Koster, F. Kamperman, P. Lenoir, K. Vrielink, "Identity-Based DRM: Personal Entertainment Domain", LNCS, Vol. 4300, DOI. 10.1007/11926214_4, 2006.
[16]
H. Kim, Y. Lee, B. Chung, H. Yoon, J. Lee, K. Jung, "Digital Rights Management with Right Delegation for Home Networks", LNCS, Vol. 4296, DOI. 10.1007/11927587_20, 2006.
[17]
J. Nutzel, A. Beyer, "How to Increase the Security of Digital Rights Management Systems Without Affecting Consumer's Security", LNCS, Vol. 3995, DOI. 10.1007/11766155_26, 2006.
[18]
M. Petkovic, R.P. Koster, "User Attributed Rights in DRM", LNCS, Vol. 3919, DOI. 10.1007/11787952_6, 2006.
[19]
B. Vassiliadis, V. Fotopoulos, A.N. Skodras, "Decentralising the Digital Rights Management Value Chain by means of Distributed License Catalogues", LNCS, Vol. 204, DOI. 10.1007/0-387-34224_9_81, 2006.
[20]
B.B. Zhu, Y. Yang, T. Chen, "A DRM System Supporting What You See Is What You Pay", LNCS, Vol. 3919, DOI. 10.1007/11787952_26, 2006.
[21]
R. Iannella, "Digital Rights Management (DRM) Architectures", D-Lib Magazine, Vol. 7, No. 6, ISSN 1082-9873, June 2001.
[22]
G. Booch, J. Rumbaugh, I. Jacobson, "Unified Modeling Language User Guide", Addison Wesley, 2nd Edition, ISBN: 0-321-26797-4, 2005.
[23]
P. Kruchten, "The Rational Unified Process", Addison-Wesley Longman Inc, 3rd Edition, 2004.
[24]
IBM's Rational Rose: (http://www.rational.com).
[25]
S. Banerjee, S. Karforma, S. Ghosh, "A DRM Based Credit Card Transaction in E-Commerce System", 41st National Convention of CSI, November 23-25, 2006, Tata McGraw-Hill, ISBN-0-07-062171-3, pp-107-110, 2006.
[26]
K. Lee, D.E. Booth, "A Prototype System Developed for Digital Rights Management in Electronic Commerce", Jour. of Internet Commerce, Vol. 3, No. 4, pp. 93-117, ISSN 1533-2861, 2004.
[27]
S. Banerjee, D.E. Booth, S. Ghosh, S. Mukhopadhyay, "A Prototype Design for Digital Intellectual Property Right Management in E-Commerce - A UML Based Approach", Journal of the Computer Society of India, Vol. 36 No. 4 (Oct-Dec 2006), pp-46-51, ISSN-0254-7813, 2006.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Ubiquity
Ubiquity  Volume 2008, Issue May
May 2008
20 pages
EISSN:1530-2180
DOI:10.1145/1386853
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 06 May 2008
Published in UBIQUITY Volume 2008, Issue May

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. DRM
  2. credit-card transaction
  3. security
  4. single-use token

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)198
  • Downloads (Last 6 weeks)12
Reflects downloads up to 06 Jan 2025

Other Metrics

Citations

Cited By

View all

View Options

View options

Magazine Site

View this article on the magazine site (external)

Magazine Site

Login options

Full Access

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media