CFP last date
20 December 2024
Reseach Article

Immune Banking System

Published on February 2013 by Ram Thilak P
International Conference on Communication, Computing and Information Technology
Foundation of Computer Science USA
ICCCMIT - Number 2
February 2013
Authors: Ram Thilak P
86cd5710-5e1f-4cf5-8e10-5f7aa5e1f9ab

Ram Thilak P . Immune Banking System. International Conference on Communication, Computing and Information Technology. ICCCMIT, 2 (February 2013), 29-32.

@article{
author = { Ram Thilak P },
title = { Immune Banking System },
journal = { International Conference on Communication, Computing and Information Technology },
issue_date = { February 2013 },
volume = { ICCCMIT },
number = { 2 },
month = { February },
year = { 2013 },
issn = 0975-8887,
pages = { 29-32 },
numpages = 4,
url = { /specialissues/icccmit/number2/10334-1019/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Special Issue Article
%1 International Conference on Communication, Computing and Information Technology
%A Ram Thilak P
%T Immune Banking System
%J International Conference on Communication, Computing and Information Technology
%@ 0975-8887
%V ICCCMIT
%N 2
%P 29-32
%D 2013
%I International Journal of Computer Applications
Abstract

One of the main problems which our country is facing today is that of Black Money. Black money stands for unaccounted money which has put our nation's development on the back foot, hampered growth and is anti-poor. In order to eliminate black money completely, every transaction happening in our country has to be accounted. This can be achieved by a cashless society where every major transaction is accountable. But the main drawback of implementing this is the fear of security of your account details and fear of stealing your confidential information. Though, many methods such as SSL, PIN/TAN system have been implemented to protect the interests of online bankers, a substantial cost-effective secured solution for this impediment has not been achieved. In the proposed system, I have indented to add a random customized QR code along with available password authentication and PIN system for online transactions. When the user uses his cashless card, the server sends a temporary QR code automatically to the registered mobile number of the user. This QR code generated with a UUID number sent to the mobile has to be scanned by the receiver using his mobile or a QR code reader. The back copy of the QR code is registered in the bank's server which generates and sends the QR Code. Now, all the transactions done are registered and accounted. Instead of securing the cashless transaction using the customer's signature, this system stores the QR code and since the back copy of this code is stored in the bank's server all transactions are accounted. As this system integrates your mobile, QR Code with an UUID number into the security web, the details about the transactions is more secure. By implementing this, a trio security for an account is achieved and at the same time every monetary transactions is registered. The currently existing online banking and e-commerce system is functioned with the help of disciplined devices which work with the help of programmed codes. When a user uses his card for online transactions, he/she only receives an acknowledgement of the transaction. All these things function in an automated environment which is vulnerable for hacking. With our method, we also include the human conformation of the transaction along with the computer conformation which increases the security manifolds. Though, implementing this method on a larger scale in a country like India is difficult, this can at least be started in metropolitan cities where maximum online transactions happen and then be extended to other parts after making people aware of the technology used.

References
  1. This link http://en. wikipedia. org/wiki/Universally_unique_identifier, retrieved on 20th August 2011.
  2. http://blogs. itbusiness. ca/2010/08/qr-code-security-are-we-ready-to-discuss-the-risks/ retrieved on 19th August, 2011.
  3. Image sourced from http://www. mobilito. ca/images/siteMobile_1. jpg retrieved on 20th August, 2011
  4. Image sourced from http://www. blogcdn. com/www. engadget. com/media/2009/05/acer-easy-store-server-2-rm-eng2. jpg retrieved on August 20th 2011
  5. Image sourced from http://www. tradingcritic. com/files/electronic-money-trading. jpg. retrieved on August 20th ,2011
  6. Paper reference from Peter Kieseberg, Manuel Leithner, Martin Mulazzani, Lindsay Munroe, Sebastian Schrittwieser, Mayank Sinha, Edgar Weippl, SBA Research Favoriten strasse 16,AT-1040 Vienna, Austria. The website is www. sba-research. org
  7. http://www. iretireearly. com/1-4-trillion-indias-black-money-stashed-in-swiss-banks. html retrieved on 21st August,2011.
Index Terms

Computer Science
Information Sciences

Keywords

Uuid (universal Unique Identifier) Qr Code Transactions Mobile And Black Money