z-logo
open-access-imgOpen Access
Scanning Hybrid Transaction Algorithm for Secure Financial Transactions
Author(s) -
Divyansh Joshi
Publication year - 2021
Publication title -
international journal for research in applied science and engineering technology
Language(s) - English
Resource type - Journals
ISSN - 2321-9653
DOI - 10.22214/ijraset.2021.39355
Subject(s) - database transaction , credit card , computer security , computer science , authentication (law) , encryption , order (exchange) , identity theft , card security code , code (set theory) , identity (music) , multi factor authentication , financial transaction , internet privacy , business , database , world wide web , authentication protocol , finance , physics , set (abstract data type) , acoustics , payment , programming language
Identity theft is a frightening and often very serious concern to everyone. A novel risk-mitigation algorithm, the Hybrid Transaction Algorithm, is given in an effort to provide individuals with peace of mind (HTA). With the random codes, the proposed HTA aims to implement two-factor authentication. This kind of user authentication has been generally recognized, and many businesses have begun to employ it as a security feature. This may be used to identify people and provide a secure method of buying products online. The suggested method involves using mobile devices to log into card accounts using an application in order to examine the randomly generated code. This is then entered when required on an online retailer's website in order to verify the person making the transaction. This reduces the chance of an unauthorized user using someone else's details to make fraudulent transactions. Identity thieves cannot use stolen card information to make transactions unless they have a valid code. This, in turn, protects both the customer and the credit card companies, who may be financially affected. We give one case study to demonstrate the security of our methodology in order to better understand how it may safeguard someone from having a stolen credit card used. Keywords: Two-Factor Authentication; Hybrid Transaction Algorithm (HTA); AES Encryption; SHA–256.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here