Smart Inventory System for Expiry Date Tracking
Volume-7 | Issue-2

Classification of Remote Sensing Image Scenes Using Double Feature Extraction Hybrid Deep Learning Approach
Volume-3 | Issue-2

Light Weight CNN based Robust Image Watermarking Scheme for Security
Volume-3 | Issue-2

Survey: Unconventional Categories of Chatbots that make use of Machine Learning Techniques
Volume-5 | Issue-3

AI based Identification of Students Dress Code in Schools and Universities
Volume-6 | Issue-1

Principle of 6G Wireless Networks: Vision, Challenges and Applications
Volume-3 | Issue-4

PROGRESS AND PRECLUSION OF KNEE OSTEOARTHRITIS: A STUDY
Volume-3 | Issue-3

Getis-Ord (Gi*) based Farmer Suicide Hotspot Detection
Volume-4 | Issue-2

Ground-breaking Theory of Knowledge Representation Practices for Information Sharing in IT Organization
Volume-4 | Issue-3

Review on Sanskrit Sandhi Splitting using Deep Learning Techniques
Volume-6 | Issue-2

AUTOMATION USING IOT IN GREENHOUSE ENVIRONMENT
Volume-1 | Issue-1

Principle of 6G Wireless Networks: Vision, Challenges and Applications
Volume-3 | Issue-4

Classification of Remote Sensing Image Scenes Using Double Feature Extraction Hybrid Deep Learning Approach
Volume-3 | Issue-2

Light Weight CNN based Robust Image Watermarking Scheme for Security
Volume-3 | Issue-2

VIRTUAL REALITY GAMING TECHNOLOGY FOR MENTAL STIMULATION AND THERAPY
Volume-1 | Issue-1

Design of Digital Image Watermarking Technique with Two Stage Vector Extraction in Transform Domain
Volume-3 | Issue-3

Analysis of Natural Language Processing in the FinTech Models of Mid-21st Century
Volume-4 | Issue-3

PROGRESS AND PRECLUSION OF KNEE OSTEOARTHRITIS: A STUDY
Volume-3 | Issue-3

Image Augmentation based on GAN deep learning approach with Textual Content Descriptors
Volume-3 | Issue-3

Comparative Analysis for Personality Prediction by Digital Footprints in Social Media
Volume-3 | Issue-2

Home / Archives / Volume-6 / Issue-1 / Article-5

Volume - 6 | Issue - 1 | march 2024

Credit Card Transaction System Using Secured Software Open Access
R. Prabha  , M. Mohamed Suhail, N. Muralidhar, R. Sangeetha, J. Yameen Ahamed  62
Pages: 60-69
Cite this article
Prabha, R., M. Mohamed Suhail, N. Muralidhar, R. Sangeetha, and J. Yameen Ahamed. "Credit Card Transaction System Using Secured Software." Journal of Information Technology and Digital World 6, no. 1 (2024): 60-69
Published
02 April, 2024
Abstract

The Credit Card Transaction System, is developed using the XAMPP server-a combination of Apache, MySQL, Perl, and PHP-is a dependable and secure financial software solution. For seamless credit card transactions, this system places a strong emphasis on functionality and security. The Apache web server ensures user accessibility by enabling the online application to be hosted on a stable platform. MySQL, a relational database management system, securely stores and manages sensitive data, protecting its security and integrity. The program integrates PHP and Perl scripts to process payments, which is one of its primary features. PHP is a programming language on the server side that handles the dynamic aspects of the website, ensuring efficient data exchange between the database and user interface. Perl scripts offer a range of server-side functions that enhance system functionality, making transaction processing more comprehensive and responsive. The NodeMCU, acting as the backend system's central processing unit, manages communication with the RFID Module RC522. The RFID Module RC522, which enables customers to initiate with their respective RFID cards resembles a credit card in this prototype. Each RFID card has a unique identification number that paves the way to diverse customer access and usage. This reliable hardware configuration makes very little effort required to process the payments. The main objective of developing this prototype is to enhance the safety and security environment of the existing credit card system by adding personal questions that have to be answered by the payment maker to complete the transaction. It is almost impossible to crack the personal questions stage with advanced algorithms, mathematical techniques etc, because it is only known to the authorized user of the card. Although the frauds and thefts involving credit cards occur only in small percentages around 1%-3%, the volume of payments involved is huge when compared to credit cards. Thus, resulting in a large sum of money that has been misused by the fraudsters. Hence to protect this, the proposed system has suggested a novel method for the implementation of the small and safe system to proceed with payments. This little and effective feature keeps away hackers from accessing others' credit cards and prevents speculation.

Keywords

XAMPP Server Processing unit Personal question NodeMCU RFID

×

Currently, subscription is the only source of revenue. The subscription resource covers the operating expenses such as web presence, online version, pre-press preparations, and staff wages.

To access the full PDF, please complete the payment process.

Subscription Details

Category Fee
Article Access Charge
15 USD
Open Access Fee Nil
Annual Subscription Fee
200 USD
After payment,
please send an email to irojournals.contact@gmail.com / journals@iroglobal.com requesting article access.
Subscription form: click here