An architecture for secure generation and verification of electronic coupons

被引:0
|
作者
Garg, R
Mittal, P
Agarwal, V
Modani, N
机构
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Coupons are very useful mechanism for carrying out different marketing management functions like sales promotion, brand promotion, and inventory management. With the advent of Internet shopping and online stores, there is an immediate need for an electronic equivalent of traditional paper coupons. Security issues such as coupon tampering, exchange, duplication and double spending become very important for electronic coupons. Although the security issues in electronic coupons appear to be similar to those in electronic cash systems, there are significant differences that require the design of a different protocol to carry out secure coupon transactions. In this paper we describe a system for secure generation and verification of electronic manufacturer and store coupons. The proposed solution is based on a third party centralized coupon mint which carries out the check for double spending, similar to online electronic cash systems. However, unlike electronic cash systems, the coupon mint remains completely unaware of the promotion details (the amount of discount, product details etc.) and simply provides an infrastructure for online coupon verification. Thus, the coupon mint service can be provided by semi-trusted third parties different from manufacturers. The proposed system is inherently distributed and scalable. It lets different manufacturers independently choose their own promotion and targeting policies (without involving the coupon mint) and the coupon mint service provider. The system also offers several new types of coupons like aging coupons, growing coupons, random value coupons, and early bird coupons which were not practical by using traditional paper coupons (and not possible by using the electronic cash protocols).
引用
收藏
页码:51 / 63
页数:13
相关论文
共 50 条
  • [11] Architecture of secure portable and interoperable electronic health records
    Blobel, B
    COMPUTATIONAL SCIENCE-ICCS 2002, PT II, PROCEEDINGS, 2002, 2330 : 982 - 994
  • [12] Secure, atomic electronic commerce protocol and its formal verification
    Wu, Zhigang
    Fang, Binxing
    Sun, Peng
    Li, Yaping
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2000, 37 (07): : 869 - 873
  • [13] Modeling and Verification of Dependable Electronic Power System Architecture
    Yuan, Ling
    Fan, Ping
    Zhang, Xiao-fang
    INTERNATIONAL CONFERENCE ON APPLIED PHYSICS AND INDUSTRIAL ENGINEERING 2012, PT A, 2012, 24 : 465 - 472
  • [14] PASPORT: A Secure and Private Location Proof Generation and Verification Framework
    Nosouhi, Mohammad Reza
    Sood, Keshav
    Yu, Shui
    Grobler, Marthie
    Zhang, Jingwen
    IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2020, 7 (02): : 293 - 307
  • [15] A system of secure virtual coupons using NFC technology
    Aigner, Manfred
    Dominikus, Sandra
    Feldhofer, Martin
    FIFTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, 2007, : 362 - +
  • [16] An Architecture for Anonymous Mobile Coupons in a Large Network
    Bartoli, Alberto
    Medvet, Eric
    JOURNAL OF COMPUTER NETWORKS AND COMMUNICATIONS, 2016, 2016
  • [17] Secure Architecture Dedicated for VANET Alarm Messages Authentication through Semantic Verification
    Assila, Ahlem
    Jabri, Issam
    Ltifi, Amel
    2012 6TH INTERNATIONAL CONFERENCE ON SCIENCES OF ELECTRONICS, TECHNOLOGIES OF INFORMATION AND TELECOMMUNICATIONS (SETIT), 2012, : 652 - 657
  • [18] Automated Generation, Verification, and Ranking of Secure SoC Access Control Policies
    Meza, Andres
    Kastner, Ryan
    2023 CYBER-PHYSICAL SYSTEMS AND INTERNET-OF-THINGS WEEK, CPS-IOT WEEK WORKSHOPS, 2023, : 198 - 202
  • [19] Secure Storage of Electronic Health Records on Cloud Using Integrity Verification Auditing
    Srinivasan, S.
    Keerthi, Kethineni
    Tejaswi, Gummadi
    Shobana, Kodali Divya
    REVISTA GEINTEC-GESTAO INOVACAO E TECNOLOGIAS, 2021, 11 (02): : 2132 - 2141
  • [20] Secure Architecture for Inter-Healthcare Electronic Health Records Exchange
    Ajayi, Oluwaseyi
    Abouali, Meryem
    Saadawi, Tarek
    2020 IEEE INTERNATIONAL IOT, ELECTRONICS AND MECHATRONICS CONFERENCE (IEMTRONICS 2020), 2020, : 531 - 536