{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T10:15:19Z","timestamp":1773051319126,"version":"3.50.1"},"reference-count":92,"publisher":"IGI Global","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,1]]},"abstract":"<jats:p>Mobile payment is a new payment method offering users mobility, reachability, compatibility, and convenience. But mobile payment involves great uncertainty and risk given its electronic and wireless nature. Therefore, biometric authentication has been adopted widely in mobile payment in recent years. However, although technology requirements for secure mobile payment have been met, standards and consistent requirements of user authentication in mobile payment are not available. The flow management of user authentication in mobile payment is still at its early stage. Accordingly, this paper proposes an anonymous authentication and management flow for mobile payment to support secure transaction to prevent the disclosure of users' information and to reduce identity theft. The proposed management flow integrates transaction key generation, encryption and decryption, and matching to process users' personal information and biometric characteristics based on mobile equipment authentication carrier.<\/jats:p>","DOI":"10.4018\/jgim.2020010110","type":"journal-article","created":{"date-parts":[[2019,11,15]],"date-time":"2019-11-15T16:10:29Z","timestamp":1573834229000},"page":"189-203","source":"Crossref","is-referenced-by-count":35,"title":["Identity Authentication Security Management in Mobile Payment Systems"],"prefix":"10.4018","volume":"28","author":[{"given":"Feng","family":"Wang","sequence":"first","affiliation":[{"name":"School of Management, Jilin University, Changchun, China"}]},{"given":"Ge Bao","family":"Shan","sequence":"additional","affiliation":[{"name":"School of Management, Jilin University, Changchun, China"}]},{"given":"Yong","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Business, Texas A&M International University, Laredo, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2695-9642","authenticated-orcid":true,"given":"Xianrong","family":"Zheng","sequence":"additional","affiliation":[{"name":"Department of Information Technology and Decision Sciences, Old Dominion University, Norfolk, USA"}]},{"given":"Hong","family":"Wang","sequence":"additional","affiliation":[{"name":"College of Business and Economics, North Carolina A&T State University, Greensboro, USA"}]},{"given":"Sun","family":"Mingwei","sequence":"additional","affiliation":[{"name":"Public Education and Teaching Department, Changchun Automobile Industry Institute, Changchun, China"}]},{"given":"Li","family":"Haihua","sequence":"additional","affiliation":[{"name":"School of Management Science and Information Engineering, Jilin University of Finance and Economics, Changchun, China"}]}],"member":"2432","reference":[{"key":"JGIM.2020010110-0","doi-asserted-by":"publisher","DOI":"10.1109\/NSS.2009.57"},{"key":"JGIM.2020010110-1","doi-asserted-by":"publisher","DOI":"10.4018\/ijisp.2013100103"},{"key":"JGIM.2020010110-2","unstructured":"Al-Qayedi, A., Adi, W., Zahro, A., & Mabrouk, A. (2004, March). Combined web\/mobile authentication for secure web access control. In Wireless Communications and Networking Conference, 2004. WCNC. 2004 IEEE (Vol. 2, pp. 677-681). IEEE."},{"key":"JGIM.2020010110-3","doi-asserted-by":"publisher","DOI":"10.1142\/S2424862218500069"},{"key":"JGIM.2020010110-4","doi-asserted-by":"publisher","DOI":"10.1049\/ip-com:20010511"},{"key":"JGIM.2020010110-5","unstructured":"Benenson, Z., Dewald, A., & Freiling, F. C. (2009). Presence, Intervention, Insertion: Unifying Attack and Failure Models in Wireless Sensor Networks (Vol. 356). Technical report, University of Mannheim."},{"key":"JGIM.2020010110-6","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-2007-15503"},{"key":"JGIM.2020010110-7","doi-asserted-by":"publisher","DOI":"10.1016\/j.jii.2018.02.004"},{"issue":"1","key":"JGIM.2020010110-8","first-page":"14","article-title":"Framework for mobile payments integration.","volume":"15","author":"F.Carton","year":"2012","journal-title":"Electronic Journal of Information Systems Evaluation"},{"issue":"3","key":"JGIM.2020010110-9","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1049\/ip-e.1991.0022","article-title":"Remote password authentication with smart cards.","volume":"138","author":"C. C.Chang","year":"1991","journal-title":"IEE Proceedings. Computers and Digital Techniques"},{"key":"JGIM.2020010110-10","doi-asserted-by":"publisher","DOI":"10.1142\/S2424862217500129"},{"key":"JGIM.2020010110-11","unstructured":"Chen, L., & Nath, R. (2008). A socio-technical perspective of mobile work. Information Knowledge Systems Management, 7(1-2), 41-60."},{"key":"JGIM.2020010110-12","unstructured":"Chen, L. D. (2006). A theoretical model of consumer acceptance of m-payment. AMCIS 2006 Proceedings, 247."},{"key":"JGIM.2020010110-13","doi-asserted-by":"publisher","DOI":"10.1504\/IJMC.2008.015997"},{"key":"JGIM.2020010110-14","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2010.11.005"},{"key":"JGIM.2020010110-15","unstructured":"Chen, Y. (2018). Security Risk Tolerance in Mobile Payment: A Trade-off Framework. Academic Press."},{"key":"JGIM.2020010110-16","unstructured":"Chen, Y., & Chen, J. (2012). Study on the business model of mobile payment industry. Enterprise Economy, 8, 99-104."},{"key":"JGIM.2020010110-17","doi-asserted-by":"publisher","DOI":"10.19173\/irrodl.v14i5.1632"},{"key":"JGIM.2020010110-18","doi-asserted-by":"publisher","DOI":"10.1016\/j.jii.2018.04.001"},{"key":"JGIM.2020010110-19","doi-asserted-by":"publisher","DOI":"10.1108\/JCEFTS-05-2017-0012"},{"key":"JGIM.2020010110-20","doi-asserted-by":"publisher","DOI":"10.1155\/2009\/284124"},{"key":"JGIM.2020010110-21","doi-asserted-by":"publisher","DOI":"10.1016\/j.elerap.2015.07.006"},{"key":"JGIM.2020010110-22","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2004.1309441"},{"key":"JGIM.2020010110-23","doi-asserted-by":"publisher","DOI":"10.1109\/35.995858"},{"key":"JGIM.2020010110-24","doi-asserted-by":"publisher","DOI":"10.1080\/17517575.2016.1173728"},{"key":"JGIM.2020010110-25","first-page":"554","article-title":"Role-Based Access Control.","author":"D.Ferraiolo","year":"1992","journal-title":"15th NIST-NCSC National Computer Security Conference"},{"key":"JGIM.2020010110-26","unstructured":"GeekPark. (2014). Pay for the New Future-Six Major Change You Can\u2019t Miss. Business Next. Retrieved October 25th, 2018 from www.bnext.com.tw\/article\/33511\/BN-ARTICLE-33511"},{"key":"JGIM.2020010110-27","doi-asserted-by":"publisher","DOI":"10.1108\/info-01-2016-0003"},{"key":"JGIM.2020010110-28","unstructured":"Hahn, I., & Kod\u00f3, K. (2017). Acceptance of Online and Mobile Payment: A Cross-Country Analysis of Germany,Hungary, and Sweden. Academic Press."},{"key":"JGIM.2020010110-29","first-page":"675","article-title":"A novel hybrid crypto-biometric authentication scheme for ATM based banking applications.","author":"F.Han","year":"2006","journal-title":"International Conference on Biometrics"},{"key":"JGIM.2020010110-30","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2006.07.030"},{"key":"JGIM.2020010110-31","doi-asserted-by":"publisher","DOI":"10.1080\/23270012.2018.1528900"},{"key":"JGIM.2020010110-32","doi-asserted-by":"publisher","DOI":"10.1016\/j.elerap.2015.03.005"},{"key":"JGIM.2020010110-33","doi-asserted-by":"crossref","unstructured":"Hoofnagle, C. J., Urban, J. M., & Li, S. (2012). Mobile payments: Consumer benefits & new privacy concerns. Retrieved September 16th, 2018 from https:\/\/www.ftc.gov\/es\/system\/files\/documents\/public_comments\/2013\/12\/00007-89102.pdf","DOI":"10.2139\/ssrn.2045580"},{"key":"JGIM.2020010110-34","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2009.02.009"},{"key":"JGIM.2020010110-35","doi-asserted-by":"crossref","unstructured":"Hu, J. Y., Sueng, C. C., Liao, W. H., & Ho, C. C. (2012, January). Android-based mobile payment service protected by 3-factor authentication and virtual private ad hoc networking. In Computing,Communications and Applications Conference (ComComAp),2012 (pp. 111-116). IEEE.","DOI":"10.1109\/ComComAp.2012.6154013"},{"key":"JGIM.2020010110-36","doi-asserted-by":"publisher","DOI":"10.1080\/17517575.2018.1493145"},{"key":"JGIM.2020010110-37","doi-asserted-by":"publisher","DOI":"10.1080\/23270012.2018.1490212"},{"key":"JGIM.2020010110-38","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2014.2306384"},{"issue":"5","key":"JGIM.2020010110-39","first-page":"256","article-title":"A Compendious Study of Online Payment Systems: Past Developments, Present Impact, and Future Considerations.","volume":"8","author":"B. U. I.Khan","year":"2017","journal-title":"International Journal of Advanced Computer Science and Applications"},{"key":"JGIM.2020010110-40","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2009.10.013"},{"key":"JGIM.2020010110-41","doi-asserted-by":"publisher","DOI":"10.1090\/S0025-5718-1987-0866109-5"},{"key":"JGIM.2020010110-42","doi-asserted-by":"publisher","DOI":"10.1016\/j.elerap.2007.04.003"},{"key":"JGIM.2020010110-43","doi-asserted-by":"publisher","DOI":"10.1145\/358790.358797"},{"key":"JGIM.2020010110-44","doi-asserted-by":"publisher","DOI":"10.1145\/583800.583803"},{"key":"JGIM.2020010110-45","doi-asserted-by":"publisher","DOI":"10.1108\/03090560310459087"},{"key":"JGIM.2020010110-46","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2009.08.001"},{"key":"JGIM.2020010110-47","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2014.07.004"},{"key":"JGIM.2020010110-48","author":"S.Li","year":"2017","journal-title":"Securing the Internet of Things"},{"key":"JGIM.2020010110-49","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2012.2189222"},{"key":"JGIM.2020010110-50","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-014-9492-7"},{"key":"JGIM.2020010110-51","doi-asserted-by":"publisher","DOI":"10.1016\/j.jii.2018.01.005"},{"key":"JGIM.2020010110-52","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2004.10.016"},{"key":"JGIM.2020010110-53","unstructured":"Liao, I. E., Lee, C. C., & Hwang, M. S. (2005, August). Security enhancement for a dynamic ID-based remote user authentication scheme. In Next Generation Web Services Practices, 2005. NWeSP 2005. International Conference on. IEEE."},{"key":"JGIM.2020010110-54","doi-asserted-by":"publisher","DOI":"10.1080\/23270012.2018.1516523"},{"key":"JGIM.2020010110-55","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2869847"},{"key":"JGIM.2020010110-56","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84882-254-2"},{"key":"JGIM.2020010110-57","doi-asserted-by":"publisher","DOI":"10.1016\/j.jii.2016.05.001"},{"key":"JGIM.2020010110-58","doi-asserted-by":"publisher","DOI":"10.1504\/IJITM.2010.030948"},{"key":"JGIM.2020010110-59","unstructured":"Merz, M. (2002). E-Commerce und E-Business: Marktmodelle,Anwendungen und Technologien (2nd ed.). Dpunkt Verlag."},{"key":"JGIM.2020010110-60","first-page":"417","article-title":"Use of elliptic curves in cryptography.","author":"V. S.Miller","year":"1985","journal-title":"Conference on the theory and application of cryptographic techniques"},{"key":"JGIM.2020010110-61","unstructured":"Nyang, D., & Lee, M. K. (2009). Improvement of Das's Two-Factor Authentication Protocol in Wireless Sensor Networks. IACR Cryptology ePrint Archive, 2009, 631."},{"key":"JGIM.2020010110-62","doi-asserted-by":"publisher","DOI":"10.1142\/S2424862218500033"},{"key":"JGIM.2020010110-63","author":"C.Paunov","year":"2006","journal-title":"Online Payment systems for E-Commerce. Organization for Economic Co-operation and development"},{"key":"JGIM.2020010110-64","doi-asserted-by":"publisher","DOI":"10.1145\/361082.361089"},{"key":"JGIM.2020010110-65","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"issue":"5","key":"JGIM.2020010110-66","first-page":"372","article-title":"Security implications of electronic commerce: A survey of consumers and businesses.","volume":"9","author":"C.Romdhane","year":"2005","journal-title":"Internet Research: Electronic Networking Applications and Policy"},{"key":"JGIM.2020010110-67","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-015-9551-8"},{"key":"JGIM.2020010110-68","author":"H.Shi","year":"2007","journal-title":"Factors of influence on consumer intention to use mobile payment services"},{"key":"JGIM.2020010110-69","unstructured":"Statista. (2018). Mobile POS payments. Retrieved September 20th, 2018 from https:\/\/www.statista.com\/outlook\/331\/100\/mobile-pos-payments\/worldwide#market-revenue"},{"key":"JGIM.2020010110-70","doi-asserted-by":"publisher","DOI":"10.1080\/10864415.2003.11044270"},{"key":"JGIM.2020010110-71","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2004.11.001"},{"key":"JGIM.2020010110-72","doi-asserted-by":"publisher","DOI":"10.1016\/j.jii.2018.07.004"},{"key":"JGIM.2020010110-73","doi-asserted-by":"publisher","DOI":"10.1002\/sres.2184"},{"key":"JGIM.2020010110-74","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2013.2250510"},{"key":"JGIM.2020010110-75","doi-asserted-by":"publisher","DOI":"10.1109\/MOBISECSERV.2016.7440226"},{"key":"JGIM.2020010110-76","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-014-9489-2"},{"key":"JGIM.2020010110-77","doi-asserted-by":"publisher","DOI":"10.1002\/sec.225"},{"key":"JGIM.2020010110-78","unstructured":"Xie, P., & Liu, H. (2013). ICT, mobile payment and electronic currency. Financial Research, 10, 1-14."},{"key":"JGIM.2020010110-79","doi-asserted-by":"publisher","DOI":"10.1142\/S242486221702002X"},{"key":"JGIM.2020010110-80","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2014.2300753"},{"key":"JGIM.2020010110-81","doi-asserted-by":"publisher","DOI":"10.1002\/sres.978"},{"key":"JGIM.2020010110-82","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2014.2301378"},{"key":"JGIM.2020010110-83","doi-asserted-by":"publisher","DOI":"10.1080\/00207543.2018.1444806"},{"issue":"1","key":"JGIM.2020010110-84","first-page":"117","article-title":"Examining mobile payment user adoption from the perspective of trust. International Journal of u-and e-Service","volume":"8","author":"H.Yan","year":"2015","journal-title":"Science and Technology"},{"key":"JGIM.2020010110-85","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2018.10.006"},{"key":"JGIM.2020010110-86","first-page":"79","article-title":"Study on the adoption of cross channel consumer mobile payment.","volume":"10","author":"S.Yang","year":"2011","journal-title":"Research Management"},{"key":"JGIM.2020010110-87","first-page":"1365","article-title":"Model of initial adoption of mobile payment service and its empirical study.","volume":"9","author":"S.Yang","year":"2012","journal-title":"Management Journal"},{"key":"JGIM.2020010110-88","unstructured":"Yen, Y. S. (2011). The Impact of Perceived Value on Continued usage Intention in Social Networking Sites. 2nd International Conference on Networking and Information Technology, IPCSIT, 217-223."},{"key":"JGIM.2020010110-89","doi-asserted-by":"publisher","DOI":"10.1016\/j.jii.2016.06.002"},{"key":"JGIM.2020010110-90","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-013-1596-8"},{"key":"JGIM.2020010110-91","doi-asserted-by":"publisher","DOI":"10.4018\/ijthi.2015010104"}],"container-title":["Journal of Global Information Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=242972","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T05:48:48Z","timestamp":1651816128000},"score":1,"resource":{"primary":{"URL":"http:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/JGIM.2020010110"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2020,1]]},"references-count":92,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.4018\/jgim.2020010110","relation":{},"ISSN":["1062-7375","1533-7995"],"issn-type":[{"value":"1062-7375","type":"print"},{"value":"1533-7995","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,1]]}}}