Anti-Authority Hijack Secure Electronic Transaction

毛剑,韦韬,陈昱,邹维
DOI: https://doi.org/10.3321/j.issn:1671-8836.2008.05.020
2008-01-01
Abstract:We propose a trusted computing module based secure electronic transaction architecture,which uses trusted equipment as the identity authentication and transaction authorization terminal.The new framework binds authentication and authorization in e-transaction operations and guarantees the secure sensitive operation is executed properly in an independent,trusted,auditable environment.Our approach thwarts Man-in-the-Middle attacks,protects a user's account even in the presence of most spywares like keyloggers and fends off the authorization hijack attacks efficiently.
What problem does this paper attempt to address?