An architecture for secure generation and verification of electronic coupons

被引:0
|
作者
Garg, R
Mittal, P
Agarwal, V
Modani, N
机构
来源
USENIX ASSOCIATION PROCEEDINGS OF THE 2001 USENIX ANNUAL TECHNICAL CONFERENCE | 2001年
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Coupons are very useful mechanism for carrying out different marketing management functions like sales promotion, brand promotion, and inventory management. With the advent of Internet shopping and online stores, there is an immediate need for an electronic equivalent of traditional paper coupons. Security issues such as coupon tampering, exchange, duplication and double spending become very important for electronic coupons. Although the security issues in electronic coupons appear to be similar to those in electronic cash systems, there are significant differences that require the design of a different protocol to carry out secure coupon transactions. In this paper we describe a system for secure generation and verification of electronic manufacturer and store coupons. The proposed solution is based on a third party centralized coupon mint which carries out the check for double spending, similar to online electronic cash systems. However, unlike electronic cash systems, the coupon mint remains completely unaware of the promotion details (the amount of discount, product details etc.) and simply provides an infrastructure for online coupon verification. Thus, the coupon mint service can be provided by semi-trusted third parties different from manufacturers. The proposed system is inherently distributed and scalable. It lets different manufacturers independently choose their own promotion and targeting policies (without involving the coupon mint) and the coupon mint service provider. The system also offers several new types of coupons like aging coupons, growing coupons, random value coupons, and early bird coupons which were not practical by using traditional paper coupons (and not possible by using the electronic cash protocols).
引用
收藏
页码:51 / 63
页数:13
相关论文
共 50 条
  • [21] Experimental Evaluation of a Secure and Ubiquitous Architecture for Electronic Health Records Retrieval
    Quincozes, Silvio E.
    Kazienko, Juliano F.
    INTERNATIONAL JOURNAL OF E-HEALTH AND MEDICAL COMMUNICATIONS, 2019, 10 (04) : 39 - 53
  • [22] A secure mobile electronic payment architecture platform for wireless mobile networks
    Lin, Phone
    Chen, Hung-Yueh
    Fang, Yuguang
    Jeng, Jeu-Yih
    Lu, Fang-Sun
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2008, 7 (07) : 2705 - 2713
  • [23] Architecture Design and Security Evaluation of Secure Optical Transport Network Using Formal Verification
    Maeda, Shion
    Nakabayashi, Misato
    Okuda, Tetsuya
    2022 IEEE 46TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE (COMPSAC 2022), 2022, : 1810 - 1815
  • [24] Educational Blockchain: A Secure Degree Attestation and Verification Traceability Architecture for Higher Education Commission
    Ayub Khan, Abdullah
    Laghari, Asif Ali
    Shaikh, Aftab Ahmed
    Bourouis, Sami
    Mamlouk, Amir Madany
    Alshazly, Hammam
    APPLIED SCIENCES-BASEL, 2021, 11 (22):
  • [25] Secure Path Verification
    Cabodi, G.
    Camurati, P.
    Finocchiaro, S. F.
    Loiacono, C.
    Savarese, F.
    Vendraminetto, D.
    2016 1ST IEEE INTERNATIONAL VERIFICATION AND SECURITY WORKSHOP (IVSW), 2016, : 58 - 63
  • [26] Secure Track Verification
    Schaefer, Matthias
    Lenders, Vincent
    Schmitt, Jens
    2015 IEEE SYMPOSIUM ON SECURITY AND PRIVACY SP 2015, 2015, : 199 - 213
  • [27] Secure iris verification
    Yang, Shenglin
    Verbauwhede, Ingrid
    2007 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOL II, PTS 1-3, 2007, : 133 - +
  • [28] Electronic Secure Vehicle Verification system using Advanced Digi-Locker system
    Ghodke, Ankita V.
    Dagade, Rahul V.
    2018 3RD INTERNATIONAL CONFERENCE FOR CONVERGENCE IN TECHNOLOGY (I2CT), 2018,
  • [29] A Secure Architecture for Electronic Ticketing Based on the Portuguese e-ID Card
    Crocker, Paul
    Nicolau, Vasco
    PROCEEDINGS OF THE 10TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2011, : 38 - 49
  • [30] I Am Alice, I Was in Wonderland: Secure Location Proof Generation and Verification Protocol
    Javali, Chitra
    Revadigar, Girish
    Rasmussen, Kasper B.
    Hu, Wen
    Jha, Sanjay
    2016 IEEE 41ST CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN), 2016, : 477 - 485