An architecture for secure generation and verification of electronic coupons

被引:0
|
作者
Garg, R
Mittal, P
Agarwal, V
Modani, N
机构
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Coupons are very useful mechanism for carrying out different marketing management functions like sales promotion, brand promotion, and inventory management. With the advent of Internet shopping and online stores, there is an immediate need for an electronic equivalent of traditional paper coupons. Security issues such as coupon tampering, exchange, duplication and double spending become very important for electronic coupons. Although the security issues in electronic coupons appear to be similar to those in electronic cash systems, there are significant differences that require the design of a different protocol to carry out secure coupon transactions. In this paper we describe a system for secure generation and verification of electronic manufacturer and store coupons. The proposed solution is based on a third party centralized coupon mint which carries out the check for double spending, similar to online electronic cash systems. However, unlike electronic cash systems, the coupon mint remains completely unaware of the promotion details (the amount of discount, product details etc.) and simply provides an infrastructure for online coupon verification. Thus, the coupon mint service can be provided by semi-trusted third parties different from manufacturers. The proposed system is inherently distributed and scalable. It lets different manufacturers independently choose their own promotion and targeting policies (without involving the coupon mint) and the coupon mint service provider. The system also offers several new types of coupons like aging coupons, growing coupons, random value coupons, and early bird coupons which were not practical by using traditional paper coupons (and not possible by using the electronic cash protocols).
引用
收藏
页码:51 / 63
页数:13
相关论文
共 50 条
  • [1] Secure Electronic Coupons
    Chang, Chin-Chen
    Lin, Iuon-Chang
    Chi, Yi-Lun
    2015 10TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS), 2015, : 104 - 109
  • [2] Secure e-coupons
    Blundo C.
    Cimato S.
    De Bonis A.
    Electronic Commerce Research, 2005, 5 (1) : 117 - 139
  • [3] Secure interoperation of secure distributed databases - An architecture verification case study
    Gilham, F
    Riemenschneider, RA
    Stavridou, V
    FM'99-FORMAL METHODS, 1999, 1708 : 701 - 717
  • [4] Logical verification of secure electronic transactions protocol
    Chen, Qingfeng
    Wang, Ju
    Bai, Shuo
    Zhang, Shichao
    Sui, Liying
    Ruan Jian Xue Bao/Journal of Software, 2000, 11 (03): : 346 - 362
  • [5] Design and verification of a secure electronic auction protocol
    Subramanian, S
    SEVENTEENTH IEEE SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS, PROCEEDINGS, 1998, : 204 - 210
  • [6] A survey on electronic coupons
    Ferrer-Gomila, Josep-Lluis
    Francisca Hinarejos, M.
    Huguet-Rotger, Llorenc
    COMPUTERS & SECURITY, 2018, 77 : 106 - 127
  • [7] A Trust Verification Architecture with Hardware Root for Secure Clouds
    Yu, Zhilou
    Dai, Hongjun
    Xi, Xiaoming
    Qiu, Meikang
    IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING, 2020, 5 (03): : 353 - 364
  • [8] (B)LOCKBOX - Secure Software Architecture with Blockchain Verification
    Heiland, Erik
    Hillmann, Peter
    36TH ANNUAL EUROPEAN SIMULATION AND MODELLING CONFERENCE, ESM 2022, 2022, : 90 - 93
  • [9] Adaptive secure software architecture for electronic commerce
    Tak, SW
    Park, EK
    SOFTWARE-PRACTICE & EXPERIENCE, 2003, 33 (14): : 1343 - 1357
  • [10] Using MTMs to Secure Electronic Signatures Generation
    Serb, Mihai
    Patriciu, Victor Valeriu
    2012 9TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS (COMM), 2012, : 315 - 318