Credit cards have become one of the primary and vital sources of shopping. Online shopping using the internet has also become widespread in use. Credit cards are thought to serve as a currency to e-business and e-shopping. Regarding benefits, it has many advantages but hackers can steal your sensitive data and information, and they can take your money. As this is in digital form so hackers can avail at any time, sitting anywhere.
How can hackers steal your data?
Spam software sent to the system that can assist them to steal your personal information relevant to your credit cards and ATM cards. Skimming is another method through which they can take our data from ATM cards on the point of sale and then they can steal information and copy paste into fake ATM cards and use Red Hat Enterprise Linux.
How can we save our transactions using biometric in secure e-transaction?
A biometric system is a recognition system, which makes a personal identification by shaping the authenticity of a physiological or behavioral characteristic that is influenced by the user.
• Biometric techniques used which eliminates the need to remember a password or carry an identification.
Following of these features can be used for biometric identification:
• Facial Recognition
• Hand geometry
• Palm Prints (Analyze of the veins of the palm)
All these identifications and authentication did in following ways:
Information of person relating to biometric trait will be identified using various identification patterns, and then this information is stored in a database against that person id. After storage, if we go to POS and want to have some transaction, then authentication is done by using various sensors and detection systems which then fetches data against that person id and Windows 10.
Using fingerprint sensors at POS (Point of Sale) can relieve us from hacking. Fingerprint sensors at the mobiles should also be used to save our information that is sensitive, i.e., our messages, conversation, email, calls. Like email authentication, SMS confirmation becomes easy for hackers if we do not use biometric traits like the fingerprint sensor. Most of mobile of modern age now use the fingerprint to access different applications.
Retina based recognition system can be used at POS and in mobiles also it is being used. In this system, Iris of a person is scanned and converted into a digital form and can save as an identifying trait. Iris scanner can use for identifying a person id.
Various facial characteristics also used Face recognition uses mainly the following techniques:
• Facial geometry: uses geometrical features of the face. Also use multiple cameras to have better precision (2D, 3D)
• Skin pattern identification (Visual Skin Print)
• Facial thermogram (uses an infrared camera to map the face temperatures)
• Smile (acceptance of the wrinkle changes when smiling)
These things can enable one’s identification easy.
Hand geometry and palm identification using infrared light also used at POS. ATMs should have a sensor-based system to recognize characteristics of Palm using IR light. Palm characteristics can be lines of Palm, shape of hand and patterns. These things can be used as a character and stored as identification pattern. Voice recognition based on how the person speaks? Pitches, tones, rise and fall of voice is identified and stored and then matched for authentication.
Thus, these mobile multi-biometrics can fix in mobile phone and point of sales(POS). At the end of the purchase, it also has some extra cost to maintain and bring technology. Thus, more security can be provided to e-Business and e-Transactions using biometric system.