INTEGRATED IDENTITY MECHANISM FOR UBIQUITOUS SERVICE ACCESS
|
|
|
- Gary Powers
- 10 years ago
- Views:
Transcription
1 INTEGRATED IDENTITY MECHANISM FOR UBIQUITOUS SERVICE ACCESS Mohammad M. R. Chowdhury UniK University Graduate Center P.O. Box 70, N-2007 Kjeller, Norway. Josef Noll UniK University Graduate Center P.O. Box 70, N-2007 Kjeller, Norway. ABSTRACT Ubiquitous access and pervasive computing enable innovative services and provide the service access in every situation. People currently rely on numerous forms of identities to access remote or proximity services. The inconvenience of possessing and using these identities creates significant security vulnerability. This paper proposes an architecture that integrates the identities required to access various remote and proximity services. In the mechanism, identities are distributed into the user s personal device and a secure network space. Third party identity providers along with the mobile network provide the underlying secure infrastructure for identity information exchange. In this regard, the use of multi-factor authentication contexts meets different levels of service access security requirements. At the end, a prototypical implementation demonstrates a service access scenario based on the proposed mechanism. KEYWORDS Identity management, remote service, proximity service, security, SIM 1. INTRODUCTION Now-a-days, fixed and wireless broadband networks are not the only means to access diverse web services. Ubiquitous access and pervasive computing enable the service access in every situation. The mobile network can provide sufficient capacity for real time data communication. The deployment of state-of-the-art technology in core networks is allowing fixed and mobile services to be seamlessly mixed. In addition to the remote (web) services, introduction of near field communication (NFC) at usage in mobile phones can enable many new proximity services [19]. All these significant developments in network and service capabilities can boost innovative service creations and interaction. User identity handling will play a vital role for accessing diverse services. Now-a-days, service access in Internet is burdened with many user names and passwords. Reuse of these is frequent and unsafe. Service providers also use substantial efforts issuing and managing identities to the users. Gartner predicted in its annual IT security summit 2005, 80% of organizations will reach a password breaking point by 2007 [7]. Numerous physical identities are used to identify its owner to various services. Now-a-days, people increasingly use smart cards with electronic chip for service access and payment. It enhances the security and allows storage of user details on the card. To meet additional security requirements, the possession factor of physical/online identities is often enhanced by a knowledge factor, a PIN code. If there are several of these, the users tend to compromise security by writing down their PIN codes. It is evident that the current forms of identities are inconvenient to use and manage both for the users and service providers. Therefore, the service access scenarios demand a new form of identity management.
2 An integrated identity mechanism is suggested in this paper to overcome the deficiencies of current password identification. The proposed solution is expected to integrate the identities required to access both the remote and proximity services into a single mechanism. The identities are distributed into the user s personal device and a secure network space. Third party identity providers along with the mobile networks provide the underlying security infrastructure for identity information exchange. The proposed mechanism has the potential to eliminate not only the numerous usernames and passwords but also the use of various physical identities. In addition to user s convenience, such identity mechanism might also be useful for other stakeholders like, identity providers, service/application providers, and equipment vendors. Section 2 presents the related work in this area. The following section illustrates the nature of ubiquitous services and the challenges in this area. The proposed identity mechanism and the service access demonstration based on the mechanism are discussed in section 4 and 5. Section 6 states the benefits of the stakeholders involved in the proposed identity mechanism and the paper concludes with section RELATED WORK Managing identities is crucial for the development of the next generation of distributed applications and services. Ubiquitous access, sufficient bandwidth by mobile networks and capabilities of the future SIM card can bring many new services to the user. Identity handling should also consider the utilization of the strengths of the mobile environments. Numerous research works are going on in various institutes and industries to provide better identity management solutions. In one approach, Altman and Sampath propose a user-centric network identity management framework [1]. The paper suggests a unifying identity solution to integrate the multiple user credentials currently stored independently by the service providers. The authors only concentrate on the identity management issues over the Internet. In another solution, He and Zhang present a framework for identity management in a distributed environment [13]. It supports secure and convenient access to web-based applications and services. Most of the research concentrates on managing user identities over the Internet [2], [3], [21], [22]. However, some of the initiatives also consider the capabilities and challenges of mobile environments in identity management [14], [15], [22]. It is to be noted that user identities include not only the username/password/pin codes for accessing remote service but also many physical identities to access many proximity services. All these efforts lack solutions for handling the physical identities. There are significant initiatives from the ICT industries to provide real life solutions in this area. In Liberty Alliance [16], members are working to build open standard-based specifications for federated identity and interoperability in multiple federations, thereby foster the usage of identity-based web services. Within this, they are focusing on end user privacy and confidentiality issues and solutions against identity theft. Some of these solutions incorporated mobile communication technology. Another solution, Sxip [24] has been designed to address the Internet-scalable and user-centric identity architecture. It provides user identifications, authentications and internet form fill solutions using web interfaces for storing user identity, attribute profiles and facilitating automatic exchange of identity data over the Internet. To access online services, Windows CardSpace [26] uses various virtual cards (mimic physical cards) issued by the identity providers for user identifications and authentications, each retrieving identity data from an identity provider in a secure manner. Banking industry of Norway with a partnership of a mobile operator initiated BankID [5] for identification and signing agreement on the move. BankID for mobile phones will initially be used in four areas: logging on to Internet banks, mobile banking, electronic service for business and the public sector, and account-based payment service for internet and mobiles. Gemalto [11] provides online and offline identity management and security solutions based on smart cards with associated software, middleware and serverbased solutions. NXP [20] is also offering identification products in areas like government, banking, and access control using secure innovative contactless smart cards and chips. MasterCard uses NFC-enabled mobile phone for a customer trial in Dallas, Texas for touch and go payment with the MasterCard PayPass [9]. The main focus of these initiative is towards the identity management in Internet domain (remote services), but some of the solutions also target services located in the proximity of users. For ubiquitous service access, the big challenge will be to integrate these scattered user s identities into a single mechanism. The proposed integrated identity management mechanism is expected to address this challenge. The
3 mechanism engages the SIM card as storage place for identities and uses the mobile network as secure underlying infrastructure for key distribution. 3. UBIQUITOUS SERVICE WORLD Now-a-days people can access services from anywhere and any time, whenever it is necessary. Ubiquitous access and pervasive computing make these possible. The section will address the nature of the two types of services, remote services and proximity services. 3.1 Remote services The introduction of state-of-the-art ubiquitous networks offers sufficient capacity, QoS and interoperability and allows the users to interact with numerous services remotely. Social communications (exchanging messages, voice, photos, videos), online shopping, reservation and banking, remote home or office network access are few examples of remote services. Fixed-mobile convergence [10] and thereby seamless user experience can boost such service creations and intake by users. These services are currently accessed through the Internet using different authentication mechanisms. This form of identification and authentication can be termed as something you know (knowledge based) and sometimes something you have (possession based) [25]. Users have to register prior to first usage and publish private information, often more than what is strictly necessary for service access. The access is often granted through username, password or PIN. Having usernames/passwords is an example of some you know and possessing a smart card to generate onetime-password (OTP) is an instance of something you have. Figure 1 gives a generic diagram for ubiquitous service access. It illustrates the notion of remote and proximity service access. Figure 1 A generic diagram for ubiquitous service access. 3.2 Proximity services The second group of services happens in close proximity of users. These services are accessed through physical interactions with physical cards or devices, e.g. payment cards and admittance cards. This form of identification can be said as something you have. Depending on the security requirements of the services, the possession based authentication might be enhanced by a knowledge factor (e.g. PIN code) add on. The devices/ cards and PIN codes are issued to the users when registered for relevant services. The introduction of NFC technology makes the transfer of user s information from one device to another possible. This will obviously boost the intake of proximity services. In the ubiquitous service world, the border between remote services and proximity services is not strict. Proximity services like NFC may initiate remote services like ticket ordering for cinema tickets [19].
4 3.3 Challenges in wireless service oriented architecture (SOA) Service Oriented Architecture (SOA) is an architectural style where functionalities and applications are packaged as services. Some of the requirements for efficient use of a SOA are seamless interoperability between different networks and systems, clear and unambiguous service description in a platformindependent fashion and high quality retrieval of services. Fixed and fixed wireless networks have capabilities to support requirements of SOA provisions. In this regard, wireless networks and devices have hardware and software limitations. Therefore, it is important to mention the challenges of wireless SOA provisions when wireless networks are considered as the driving force in ubiquitous service access. The following table points out some of these challenges compared to fixed SOA. Table 1 Challenges in wireless SOA provision. SOAP protocol fixed SOA - always online, - fixed internal delay < 50 ms Number of messages - practically no limitations (not important in fixed networks) Wireless - bad radio, packet loss, retransmission round-trip-delay mobile up to 1.2 s - cost of air-time - cost of air-time Service repository - UDDI 1, always available - context and location dependent services - no reliable services due to bad radio, packet loss and service termination Service support - resources available - limited CPU & battery power - specialised OS - device optimised for limited resource usage Semantic support - increased computing resources - services optimised for device/os, not for interoperability - limited support for semantic SOA 4. INTEGRATED IDENTITY MECHANISM The ubiquitous service world and deficiencies of current forms of identities demand an integrated mechanism of managing user s identities. The proposed integrated identity mechanism consists of certificates, keys and preferences. These identities are categorized broadly into personal identity (PID), corporate identity (CID) and social identity (SID) based on the roles exercised by a person in real life [6]. PID can be used to identify ourselves in our very personal and commercial interactions. CID and SID can be used in our professional and social interactions respectively. 4.1 The concepts and elements The elements consist of identity providers (IDP), user s personal devices and underlying mobile network infrastructure for identity service subscriptions, storage of identities and transmission of identity information with service providers and other IDPs. 1 UDDI, Universal Description, Discovery, and Integration, is a platform-independent, XML-based registry for business worldwide to make them available on the Internet.
5 4.1.1 The role of identity providers The role of an identity provider is very crucial in ID provisioning. Identity providers may come from user s social, corporate or personal domain. Figure 2 illustrates user s ID provisioning. Security requirements of ID provisioning from these domains depend on the relevant service access security demands. State/government is the traditional and most accepted identity provider in national and international level providing citizen ID. With strong regulations in place, banks and mobile operators can also act as an IDP. Having a state or citizen ID is obligatory to establish access to some of these services. These belong to high security environments and therefore the roles of these IDPs are strictly regulated. Figure 2 User s identity provisioning. Similar to the subscription of voice and data services, access to identity services subjects to explicit agreement between users and identity providers. An IDP is maintaining strong trust relationships among the subscribers, service providers and the other IDPs. The proposed mechanism makes use of the mobile network along with phone and SIM card as the secure infrastructure for storing and exchanging identity information. There are reasons why we think the existing mobile network infrastructure is ideal for identity services like user authentication and consent such as, Mobile network s global acceptability, interoperability and reach. The security of 3G mobile systems has been strengthened by introducing longer cipher key, mutual (network, user) authentication, signaling and data traffic integrity and extension of ciphering back into the network [4]. In addition to Bluetooth and Infrared, introduction of NFC makes the proximity service more accessible. Introduction of mobile communication technology as a mean to provide identity service also brings new challenges, for example, Minimizing the consequences of mobile terminal s loss or theft. Restoration of user s ongoing session, dropped due to poor and erratic RF signal quality. Usability problems in terms of handling and user interface, especially referring to complex transactions. Requirements from emerging number-portability legislation are making interoperability even more complicated and more critical Distributed identities With the identity services subscription, IDP issues a certificate to the user and allocates a secure identity space in the network. User identity data and attributes are distributed and stored into two places. A part of the user identities that contain very sensitive user information like, PID Bank/Creditcard, PID Home admittance will be stored (permanently or temporarily) in the SIM card of mobile phone. Therefore, access to these requires strict authentication. Another part of user identities which need low authentication requirements, for example social identities and preferences (SID), will be stored into the secure identity space in the network. Table 1
6 gives several examples of PIDs, CIDs and SIDs, their possible realizations and where these identities will be located or stored. Considering the various levels of security, the corresponding security requirement of each identity is also mentioned. Table 2 Identity types, realizations, storage, and security requirements. Identity Examples Realization Location Security requirement PID PID (Bank/Creditcard) Certificate + key (private + public) SIM High PID (Home admittance) Home entry key CID (Office admittance) Office entry key SIM High CID CID (Other admittance) Temp. entry keys Network Medium CID profiles foaf/owl Preferences foaf/owl Low SID Attributes foaf/owl Network Medium During the subscription, an operator can load the SIM card with a private key for the user. Besides, PID Bank/Creditcard credentials are realized through certificates and keys provided from the Banks. These can also be stored in the SIM card. The trusted third party (whoever it is) can mediate the whole process. There are few possibilities of PID Home admittance realization. Admittance keys can directly be stored in binary format in the SIM card or a hash can be generated from the stored private key and hash algorithm. The keys or a hash can later be transferred to other devices using NFC technology. CID and SID profiles and preferences are realized using either FOAF 2 (friend of a friend) or OWL 3 (Web Ontology Language) and stored these foaf/owl files in the network. We think Semantic Web Technology (foaf/owl) can provide solutions to access control and privacy in corporate and social environment by defining roles of user, access control and privacy policies and rules. We have already implemented several ontologies in OWL representing identity handling, access control and privacy support in corporate and social scenarios in a separate work [8]. Detail descriptions of these mechanisms are beyond the scope of this paper. The SIM card is considered as storage place because it can be revoked, user now-a-days can rarely be found without a mobile phone and there are possibilities of further security enhancements in it. High capacity SIM cards are available in the industry with increased memory size, additional cryptographic and high speed communication (SIM-handset, SIM-network) capabilities [27]. Handling identities from the SIM gives the user control over the usage of his identities. Figure 2 depicts a user-centric (i-centric) vision of ID provisioning. The proposed mechanism is expecting that IDPs do not own or control SIM card rather act as facilitators to manage identities. To manage multiple credentials, IDPs can load additional IDs confidentially to either a SIM card (with over-the-air provisioning) or at network identity space with user s consent. In case of loosing the SIM card, a new one can be ordered and the identities previously stored in the card can be reloaded. With the identity subscription certificate user can identify himself to access the network identity repository that contains identities for example SIDs. These identities will be used to access services that need medium or low level of security requirements. The SIM card holds only the most sensitive user identities. As an online network is vulnerable to many security threats, only information of less sensitive character are stored in the network Ubiquitous service access To make the remote service access hassle-free, the concept of Circle of Trust (COT) developed by Liberty Alliance can be employed [7]. For remote service access, user can have single sign-on (SSO) functionality to move seamlessly between federated service/content/identity providers using a single SIM card credential (or identity subscription certificate) without entering numerous usernames and passwords. This is how a federated identity domain can be realized (figure 1). The identity subscription certificate issued by an IDP is not enough to access services that need additional security requirements. PIDs/CIDs stored in the SIM card 2 FOAF, 3 OWL,
7 have to be used to meet such requirements. Besides the mobile environment, services can also be accessed from PC when identity subscription certificate (issued by IDP) and user s PID/CID/SIDs are available from PC. The introduction of NFC technology adds intelligence and networking capabilities to the phone and creates many new opportunities to add product and service capabilities to handset like digital transactions in very good proximities. It can make a mobile phone an ideal device for payments and gaining access [17], [18]. This is more promising when the mobile is considered as the preferred device in the proposed mechanism for certificate and key handling. Besides, less sensitive admittance keys can be stored at network identity space, and when required, can be downloaded temporarily to the SIM card memory. To access proximity services, the identity information stored in SIM card (permanently or temporarily) can be transmitted through the NFC interface. The channel between two NFC devices can be secured using available cryptographic protocols [12]. 4.2 Authentication mechanisms This section discusses about the authentication mechanisms for the proposed integrated identity architecture. The mechanism is supported by multiple levels of authentication, and SIM based certificate and key handling provisions Multi-factor authentication Different levels of authentication mechanisms need to be maintained depending on service access security requirements. From user point of view, a securely maintained communication channel is required to exchange very sensitive user information with the service provider. There are services that require only little information about the user. Highly secured infrastructure is not a necessity for them. Besides, building or maintaining very secure channel requires good investment as well. Therefore, different levels of security should be employed for different types of services. Analyzing all these aspects, [17] introduced three levels of security: Nice to know, need to know, have to know (see figure 3). Figure 3 Security infrastructure based on security requirements. Nice to know services are for example, network access, where knowledge about usage is only required in case of misuse of the network. Need to know services like Intranet or VPN access, admittance have higher security requirements. Highest security requirements have to be met for have to know services, such as credit card or bank transactions. As the SIM card is proposed to contain most sensitive user identities and also allows the owner access to his/her network identity space, an extra protective measure should be employed for accessing SIM to make PIDs more secure. To address this, an extended SIM (ESIM) is proposed which is a customized variant of USIM (Universal Subscriber Identity Module). It has two modules: one is responsible for operator service access and access to network identity space. The other part contains the highly sensitive personal identities with protection through additional PIN code. Therefore, the solution has several layers of security provisions. Something you have which is a smart card (ESIM) gives low level of security, and something you know, a knowledge based ones (PIN codes) provide medium or high level of security.
8 4.2.2 SIM based certificate and key handling SIM with PKI is proposed to solve the security problems. PKI enables the parties in a dialogue to establish confidentiality, message integrity and user authentications without having to exchange any secret information in advance. In cryptography, it is an arrangement that binds public keys with respective user identities by means of a certificate authority (CA). Users then can use public key information in their public key certificates to encrypt messages to each other. User can select the key provided by the Bank (and Credit card) to make online financial transactions. For other services, if necessary the users can utilize the key from the home operator. Banks and mobile operators can work as certificate authority respectively. The later is crucial when the user is under roaming. In this case, the visited operator can negotiate with the home operator for authenticating the users. BankID partnership [5] is an example in this regard where it provides user a public key infrastructure (PKI) built in SIM card for identification and signing the agreement. Figure 4 SIM based certificate and key handling. Figure 4 illustrates SIM based certificate and key handling provisions. Certificates can be provided to the mobile phone either physically or through mobile over-the-air 4 (OTA) provisioning. It is possible to sign the certificate/transactions using stored private key from the mobile phone or PC. These signed certificate/transactions will provide authentication, integrity and non-repudiation services during service interactions. 5. SERVICE ACCESS DEMONSTRATION A mobile based key exchange and thereby service access demonstrator was built based on an earlier implementation of NFC-based admittance keys [17]. The key generation and distribution was modified to support online access to contents of a service provider (SP). The authentication provider generates key upon request and transmit to the user through mobile phone system. The key is stored in integrated smartcard and transmitted on demand to the mobile terminal. The terminal can itself access services based on that key or, as demonstrated, can be used to perform user identification, where higher security is required. In our service example, the key is transmitted over the NFC interface towards SP. User wants to access contents remotely from a service provider from the PC. Figure 5 illustrates the steps of service access demonstration. In step 1, the access request is sent to SP. Triggered by the request, in step 2, access control system of the provider sends a message to the authentication provider. This entity transmits access information and an access key to the mobile phone of user. We assume that Service and authentication 4 Over-the-air (OTA) is a standard for the transmission and reception of application-related information in wireless communication systems.
9 provider belong to a common trust system and user s mobile phone number is sent to SP during service access request. Figure 5 Prototype of key exchange for online content access. The key is stored in the integrated SmartMX card of the phone and can be transmitted over the NFC interface. In step 5, the key is transmitted over NFC to the PC, which is used to access selected contents. Our implementation uses Telenor s mobile network through PATS 5 Innovation lab. The user authentication provider (service centre) creates an information message (3) and a binary key (4), which is transmitted to the user s phone (here Nokia 3320) and stored in the SmartMX card of the NFC unit. NFC-based connection to the PC transmits the admittance key and authenticates (6) access to contents. Figure 6 User requests a service that requires PID payment. The above prototypical implementation provides a need to know authentication using a key/password. Now we are going to describe a service access scenario which requires financial transactions. Figure 6 illustrates the corresponding sequence of messages. In step 1, uses requests for a service. The message contains the user certificate provided by the IDP during identity subscription. SP then forwards this certificate with its own one and asks the IDP for authenticating the user. In next step, IDP authenticates the user and SP (using their certificates) and returns reply to both so that user and SP can check each other s 5 PATS Lab,
10 validity. SP then sends payment request to user (step 7). User then applies the PIN code to initiate a payment request using PID payment stored in the SIM. In step 9, a payment certificate is sent to SP when the request is authenticated (step 8). Upon validation, SP delivers the services. It is to be noted that the procedure avoids providing payment information directly to SP. Instead using PID payment, a payment certificate is generated which confirms the payment to SP. It further enhances the security avoiding disclosure of payment information to SP. These service access demonstrations depict the use of proposed integrated identity mechanism for accessing various types of services in a secure manner. 6. STAKEHOLDER S BENEFITS Users, identity providers, service/application providers and equipment vendors every associated entity can be benefited through the proposed integrated identity mechanism. User is benefited through easy-to-use and mobility in service interactions at a lower cost. With strong security mechanism in place by the underlying infrastructure, the proposed identity mechanism can ensure more secure service access. Single sign-on (SSO) through the use of COT allows users to move seamlessly without entering numerous user names and passwords [16]. Use of NFC makes this identity mechanism more accessible to new proximity services. Finally, hassle-free service access is a main feature of this mechanism. Revenues can be generated through providing identity services including user authentication and consent, and infrastructure sharing, including SIM, with other identity providers (when operators choose not to be the identity providers because of trust). Mobile/wireless operators can extract value from their infrastructure investment with the increase in data traffic over their licensed airwaves and expansion of their brand s reach. The identity service provision positions the mobile network as a preferred channel for trusted services. Service provider benefits generally derive from a lower cost-of-business and more service intake by users. User is motivated to use more services as integrated identity mechanism provides, hassle-free usage, security, ease of use and availability. Use of identity provider services for user s authentication lowers the cost of business (by not maintaining an individual authentication mechanism), integration efforts and accelerates time-to-market. Mobile vendors, including network infrastructure, devices and platform, and smart card/chip vendors benefit from an increased demand for standardized, higher-end devices and interfaces. User demand for identity-enabled services accelerates device renewal. Higher demand leads to volume savings in production cost. Multi-functional and easy to use terminals increase user experience and brand loyalty. 7. CONCLUSION The paper introduces an integrated mechanism for identity provision that facilitates both remote service and proximity service access. It addresses the concerns that user can no longer cope with the current identity usage scenarios. The proposed mechanism suggests the storage of user identities in a distributed manner. A customized SIM card is proposed that stores most sensitive user identities. Less sensitive ones are stored at a secure user identity space in the network. Multiple factors of authentication mechanisms are employed to address different levels of security requirements. The paper also demonstrates service access architectures using the proposed identity mechanism. The use of such an integrated identity concept can benefit the application/service industries, infrastructure vendors and above all, the users. Nevertheless, there are few challenges such as the role of home certificate authority internationally, certificate revocation and limitations of mobile environments. In our future work, we will focus on these challenges and will extend the work further to develop a complex use case on seamless user experience in heterogeneous wireless networks when the user is roaming. ACKNOWLEDGEMENT The contribution is a part of an ongoing research in WP2 of SWACOM project, funded by The Research
11 Council of Norway. The authors would like to acknowledge the contributions and supports provided by their colleagues from UniK, Kjeller and Telenor R&I, Fornebu, Norway. REFERENCES [1] Altmann, J. and Sampath, R., 2006, UNIQuE: A User-Centric Framework for Network Identity Management, Network Operations and Management Symposium, NOMS 2006, Vancouver, Canada, pp [2] Buell, D. and Samdhu, R., 2003, Identity Management, IEEE Internet Computing, Vol. 7, No. 6, pp [3] Berthold, O. and Köhntopp, M., 2001, Identity Management Based on P3P, Designing Privacy Enhancing Technologies: International Workshop on Design Issues in Anonymity and Unobservability, Springer Berlin / Heidelberg, pp [4] Boman, K. et al., 2002, UMTS security, Electronics and Communication Engineering Journal, Volume 14, Issue 5, pp [5] BankID: Delivering Bank-common Trust for Web-based Transactions, [Accessed on April 2, 2007] [6] Chowdhury, M. M. R. and Noll, J., 2006, Service Interaction through Role based Identity, Proceedings of Wireless World Research Forum Meeting 17, Heidelberg, Germany. [7] Chowdhury, M. M. R. and Noll, J., 2007, Distributed Identity for Secure Service Interaction, Proceedings of the Third International Conference on Wireless and Mobile Communications, ICWMC07, Gaudeloupe, French Caribbean. [8] Chowdhury, M. M. R. et al., Enabling Access Control and Privacy through Ontology, to be published in proceeding of the 4th International Conference on Innovations in Information Technology, Innovations'07, Nov 18-20, Dubai. [9] Cellular-news, MasterCard Tests NFC Payments with Nokia Handsets, [Accessed on April 2, 2007] [10] Fixed-Mobile Convergence Alliance, [Accessed on November 5, 2007] [11] Gemalto, a digital security company, [Accessed on November 5, 2007] [12] Haselsteiner, E. and Breitfuss, K., 2006, Security in Near Field Communication (NFC) Strengths and Weaknesses, Workshop on RFID Security - RFIDSec 06, Graz, Austria. [13] He, J. and Zhang, R., 2005, Towards Formal Framework for Distributed Identity Management, Web Technologies Research and Development APWeb 2005, Springer Berlin / Heidelberg, pp [14] Hoffmann, M., 2004, User-centric Identity Management in Open Mobile Environments, Privacy, Security and Trust within the Context of Pervasive Computing, Springer Netherlands, pp [15] Jøsang, A. et al., 2007, Usability and Privacy in Identity Management Architectures, Proceedings of the Australian Information Security Workshop (AISW 07), Victoria, Australia. [16] Liberty Alliance Project, [Accessed on November 5, 2007] [17] Noll, J. et al., 2006, Admittance services through mobile phone short messages, Proceedings of the International Conference on Wireless and Mobile Communications ICWMC 06, Bucharest, Romania. [18] Noll, J. et al., 2006, License transfer mechanisms through seamless SIM authentication, International Conference on Wireless Information Systems, Winsys 2006, Setubal, Portugal. [19] NFC forum, [Accessed on November 5, 2007] [20] NXP Semiconductors, [Accessed on November 5, 2007] [21] Poursalidis, V. and Nikolaou, C., 2006, A New User-Centric Identity Management Infrastructure for Federated Systems, Trust and Privacy in Digital Business, Springer Berlin / Heidelberg, pp [22] Siddiqi, J. et al., 2006, Secure ICT Services for Mobile and Wireless Communications: A Federated Global Identity Management Framework, Proceedings of the Third International Conference on Information Technology: New Generations (ITNG 06), Nevada, USA, pp [23] Shin, D. et al., 2004, Information Assurance in Federated Identity Management: Experimentations and Issues, Web Information Systems WISE 2004, Springer Berlin / Heidelberg, pp [24] Sxip Identity, [Accessed on November 5, 2007] [25] Two-factor authentication, [Accessed on November 5, 2007] [26] Windows CardSpace, [Accessed on November 5, 2007] [27] White paper: High Capacity SIMs, [Accessed on November 1, 2007]
Enhancing Web Application Security
Enhancing Web Application Security Using Another Authentication Factor Karen Lu and Asad Ali Gemalto, Inc. Technology & Innovations Austin, TX, USA Overview Introduction Current Statet Smart Cards Two-Factor
m Commerce Working Group
m-powering Development Initiative Advisory Board second meeting Geneva, 23 rd of May 2014 m Commerce Working Group M-Commerce structure 2 Definitions Mobile Device m-commerce MFS m-marketing m-banking
Business through Mobile Phone initiated Near Field Communication
Business through Mobile Phone initiated Near Field Communication Josef Noll 1, Juan Carlos Lopez Calvet, Telenor R&D,, N-1331 Fornebu [email protected], [email protected] 1 from 1.6.2005 Prof. stip.
Mobile Office Security Requirements for the Mobile Office
Mobile Office Security Requirements for the Mobile Office [email protected] Alcatel SEL AG 20./21.06.2001 Overview Security Concepts in Mobile Networks Applications in Mobile Networks Mobile Terminal used
Longmai Mobile PKI Solution
Longmai Mobile PKI Solution A quick Solution to External and Internal fraud in Insurance Industry Putting the client at the center of modernization Contents 1. INTRODUCTION... 3 1.1 Challenges... 3 1.2
SERIES Y: GLOBAL INFORMATION INFRASTRUCTURE, INTERNET PROTOCOL ASPECTS AND NEXT-GENERATION NETWORKS Next Generation Networks Security
International Telecommunication Union ITU-T Y.2740 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (01/2011) SERIES Y: GLOBAL INFORMATION INFRASTRUCTURE, INTERNET PROTOCOL ASPECTS AND NEXT-GENERATION NETWORKS
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public
Significance of Tokenization in Promoting Cloud Based Secure Elements
Significance of Tokenization in Promoting Cloud Based Secure Elements Busra O zdenizci 1, Vedat Coskun 1*, Kerem Ok 1 and Turgay Karlidere 2 1 NFC Lab - Istanbul, Department of Information Technologies,
HOBCOM and HOBLink J-Term
HOB GmbH & Co. KG Schwadermühlstr. 3 90556 Cadolzburg Germany Tel: +49 09103 / 715-0 Fax: +49 09103 / 715-271 E-Mail: [email protected] Internet: www.hobsoft.com HOBCOM and HOBLink J-Term Single Sign-On
WIRELESS PUBLIC KEY INFRASTRUCTURE FOR MOBILE PHONES
WIRELESS PUBLIC KEY INFRASTRUCTURE FOR MOBILE PHONES Balachandra Muniyal 1 Krishna Prakash 2 Shashank Sharma 3 1 Dept. of Information and Communication Technology, Manipal Institute of Technology, Manipal
Training. MIFARE4Mobile. Public. MobileKnowledge April 2015
MIFARE4Mobile Public MobileKnowledge April 2015 Agenda Why MIFARE4Mobile? MIFARE in Mobile related technologies MIFARE technology NFC technology MIFARE4Mobile technology High level system architecture
DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0
DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS
Title: A Client Middleware for Token-Based Unified Single Sign On to edugain
Title: A Client Middleware for Token-Based Unified Single Sign On to edugain Sascha Neinert Computing Centre University of Stuttgart, Allmandring 30a, 70550 Stuttgart, Germany e-mail: [email protected]
Your Mobile Phone as a Ticket (NFC)
Your Mobile Phone as a Ticket (NFC) Francisco Maria van Uden Chaves IST - Technical University of Lisbon Av. Prof. Cavaco Silva Tagus Park 2780-990 Porto Salvo, Portugal [email protected] Abstract.
Best Practices for the Use of RF-Enabled Technology in Identity Management. January 2007. Developed by: Smart Card Alliance Identity Council
Best Practices for the Use of RF-Enabled Technology in Identity Management January 2007 Developed by: Smart Card Alliance Identity Council Best Practices for the Use of RF-Enabled Technology in Identity
CWI/CTIF seminar 24.-25.Oct2011. Integrating context- and content-aware mobile services into the cloud
Center for Wireless Innovation Norway cwin.no CWI Norway CWI/CTIF seminar 24.-25.Oct2011 Integrating context- and content-aware mobile services into the cloud Josef Noll, Zahid Iqbal, Mohammad M.R. Chowdhury
Mobile MasterCard PayPass Testing and Approval Guide. December 2009 - Version 2.0
Mobile MasterCard PayPass Testing and Approval Guide December 2009 - Version 2.0 Proprietary Rights Trademarks The information contained in this document is proprietary and confidential to MasterCard International
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards January 2007 Developed by: Smart Card Alliance Identity Council RF-Enabled Applications and Technology:
Security in Wireless Local Area Network
Fourth LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCET 2006) Breaking Frontiers and Barriers in Engineering: Education, Research and Practice 21-23 June
Nationwide and Regional Health Information Networks and Federated Identity for Authentication and HIPAA Compliance
Nationwide and Regional Health Information Networks and Federated Identity for Authentication and HIPAA Compliance Christina Stephan, MD Co-Chair Liberty Alliance ehealth SIG National Library of Medicine
Store Logistics and Payment with Near Field Communication
with www.stolpan.com Store Logistics and Payment with Near Field Communication Hagenberg, Hagenberg, March March 20. 2007 20. 2007. Dr. László Kutor, Dr. BMF László Kutor, BMF 19/1 StoLPaN Project Summary
Defending the Internet of Things
Defending the Internet of Things Identity at the Core of Security +1-888-690-2424 entrust.com Table of contents Introduction Page 3 Challenge: protecting & managing identity Page 4 Founders of identity
Evaluation of different Open Source Identity management Systems
Evaluation of different Open Source Identity management Systems Ghasan Bhatti, Syed Yasir Imtiaz Linkoping s universitetet, Sweden [ghabh683, syeim642]@student.liu.se 1. Abstract Identity management systems
Mobile Financial Services Business Ecosystem Scenarios & Consequences. Summary Document. Edited By. Juha Risikko & Bishwajit Choudhary
Mobile Financial Services Business Ecosystem Scenarios & Consequences Summary Document Edited By Juha Risikko & Bishwajit Choudhary Mobey Forum Mobile Financial Services Ltd. Disclaimer: This document
Achieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER
with Convenience and Personal Privacy version 0.2 Aug.18, 2007 WHITE PAPER CONTENT Introduction... 3 Identity verification and multi-factor authentication..... 4 Market adoption... 4 Making biometrics
The Convergence of IT Security and Physical Access Control
The Convergence of IT Security and Physical Access Control Using a Single Credential to Secure Access to IT and Physical Resources Executive Summary Organizations are increasingly adopting a model in which
The Convergence of IT Security and Physical Access Control
The Convergence of IT Security and Physical Access Control Using a Single Credential to Secure Access to IT and Physical Resources Executive Summary Organizations are increasingly adopting a model in which
Co-existence of Wireless LAN and Cellular Henry Haverinen Senior Specialist Nokia Enterprise Solutions
Co-existence of Wireless LAN and Cellular Henry Haverinen Senior Specialist Nokia Enterprise Solutions 1 2005 Nokia city_wlan_2005_haverinen.ppt / 2005-08-19 / HH Outline Key use cases of integrating Wireless
How To Understand And Understand The Security Of A Key Infrastructure
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 12 Applying Cryptography Objectives Define digital certificates List the various types of digital certificates and how they are used
Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008
Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Contents Authentication and Identity Assurance The Identity Assurance continuum Plain Password Authentication
Trust areas: a security paradigm for the Future Internet
Trust areas: a security paradigm for the Future Internet Carsten Rudolph Fraunhofer Institute for Secure Information Technology SIT Rheinstrasse 75, Darmstadt, Germany [email protected]
Deriving a Trusted Mobile Identity from an Existing Credential
Deriving a Trusted Mobile Identity from an Existing Credential Exploring and applying real-world use cases for mobile derived credentials +1-888-690-2424 entrust.com Table of contents Approval of the mobile
Federation Proxy for Cross Domain Identity Federation
Proxy for Cross Domain Identity Makoto Hatakeyama NEC Corporation, Common Platform Software Res. Lab. 1753, Shimonumabe, Nakahara-Ku, Kawasaki, Kanagawa 211-8666, Japan +81-44-431-7663 [email protected]
Cybersecurity and Secure Authentication with SAP Single Sign-On
Solution in Detail SAP NetWeaver SAP Single Sign-On Cybersecurity and Secure Authentication with SAP Single Sign-On Table of Contents 3 Quick Facts 4 Remember One Password Only 6 Log In Once to Handle
ETSI TR 102 071 V1.2.1 (2002-10)
TR 102 071 V1.2.1 (2002-10) Technical Report Mobile Commerce (M-COMM); Requirements for Payment Methods for Mobile Commerce 2 TR 102 071 V1.2.1 (2002-10) Reference RTR/M-COMM-007 Keywords commerce, mobile,
A Federated Authorization and Authentication Infrastructure for Unified Single Sign On
A Federated Authorization and Authentication Infrastructure for Unified Single Sign On Sascha Neinert Computing Centre University of Stuttgart Allmandring 30a 70550 Stuttgart [email protected]
Bringing Security & Interoperability to Mobile Transactions. Critical Considerations
Bringing Security & Interoperability to Mobile Transactions Critical Considerations April 2012 Transactions 2 Table of Contents 1. Introduction... 3 2. Section 1: Facing up the challenges of a connected
White Paper. Bearer Independent Protocol (BIP)
White Paper Bearer Independent Protocol (BIP) - 2 - Contents 1 Executive summary...4 2 Introduction...5 3 Solution description...5 3.1 Standards compliance...5 3.2 Interface architecture...6 3.3 Data carriers...9
Authentication and Security in IP based Multi Hop Networks
7TH WWRF MEETING IN EINDHOVEN, THE NETHERLANDS 3RD - 4TH DECEMBER 2002 1 Authentication and Security in IP based Multi Hop Networks Frank Fitzek, Andreas Köpsel, Patrick Seeling Abstract Network security
Analysis of E-Commerce Security Protocols SSL and SET
Analysis of E-Commerce Security Protocols SSL and SET Neetu Kawatra, Vijay Kumar Dept. of Computer Science Guru Nanak Khalsa College Karnal India ABSTRACT Today is the era of information technology. E-commerce
etoken TMS (Token Management System) Frequently Asked Questions
etoken TMS (Token Management System) Frequently Asked Questions Make your strong authentication solution a reality with etoken TMS (Token Management System). etoken TMS provides you with full solution
Strengthen RFID Tags Security Using New Data Structure
International Journal of Control and Automation 51 Strengthen RFID Tags Security Using New Data Structure Yan Liang and Chunming Rong Department of Electrical Engineering and Computer Science, University
Loyalty Systems over Near Field Communication (NFC)
Loyalty Systems over Near Field Communication (NFC) Diogo Simões IST - Technical University of Lisbon Av. Prof. Cavaco Silva Tagus Park 2780-990 Porto Salvo, Portugal [email protected] Abstract.
Executive Summary P 1. ActivIdentity
WHITE PAPER WP Converging Access of IT and Building Resources P 1 Executive Summary To get business done, users must have quick, simple access to the resources they need, when they need them, whether they
Security Levels for Web Authentication using Mobile Phones
Security Levels for Web Authentication using Mobile Phones Anna Vapen and Nahid Shahmehri Department of computer and information science Linköpings universitet, SE-58183 Linköping, Sweden {annva,nahsh}@ida.liu.se
Introduction of Information Security Research Division
Introduction of Information Security Research Division 2005. 5. 13. Kyo-il Chung, Ph. D. Information Security Infrastructure Research Group Contents Overview - Secure u-it KOREA - Organization of ETRI
Seminar: Security Metrics in Cloud Computing (20-00-0577-se)
Technische Universität Darmstadt Dependable, Embedded Systems and Software Group (DEEDS) Hochschulstr. 10 64289 Darmstadt Seminar: Security Metrics in Cloud Computing (20-00-0577-se) Topics Descriptions
Chapter 1: Introduction
Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure
CipherShare Features and Benefits
CipherShare s and CipherShare s and Security End-to-end Encryption Need-to-Know: Challenge / Response Authentication Transitive Trust Consistent Security Password and Key Recovery Temporary Application
HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper
HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper Rev 1.0 HIPAA Security Considerations for Broadband Fixed Wireless Access Systems This white paper will investigate
White Paper: Managing Security on Mobile Phones
White Paper: Managing Security on Mobile Phones April 2006 Managing Security on Mobile Phones April 2006 Table of Contents Abstract...2 Executive Summary...2 The Importance Of Managing Security On Mobile
Introduction to SAML
Introduction to THE LEADER IN API AND CLOUD GATEWAY TECHNOLOGY Introduction to Introduction In today s world of rapidly expanding and growing software development; organizations, enterprises and governments
More effective protection for your access control system with end-to-end security
More effective protection for your access control system with end-to-end security By Jeroen Harmsen The first article on end-to-end security appeared as long ago as 1981. The principle originated in ICT
CA ArcotOTP Versatile Authentication Solution for Mobile Phones
PRODUCT SHEET CA ArcotOTP CA ArcotOTP Versatile Authentication Solution for Mobile Phones Overview Consumers have embraced their mobile phones as more than just calling or texting devices. They are demanding
THE APPEAL FOR CONTACTLESS PAYMENT 3 AVAILABLE CONTACTLESS TECHNOLOGIES 3 USING ISO 14443 BASED TECHNOLOGY FOR PAYMENT 4
CONTACTLESS THE APPEAL FOR CONTACTLESS 3 AVAILABLE CONTACTLESS TECHNOLOGIES 3 USING ISO 14443 BASED TECHNOLOGY FOR 4 DESIGNING AN EMV LIKE CONTACTLESS SYSTEM 5 INGENICO, LEADER IN CONTACTLESS TECHNOLOGY
BlackBerry 10.3 Work and Personal Corporate
GOV.UK Guidance BlackBerry 10.3 Work and Personal Corporate Published Contents 1. Usage scenario 2. Summary of platform security 3. How the platform can best satisfy the security recommendations 4. Network
CBIO Security White Paper
One Canon Plaza Lake Success, NY 11042 www.ciis.canon.com CBIO Security White Paper Introduction to Canon Business Imaging Online Canon Business Imaging Online ( CBIO ) is a cloud platform for Canon s
CONTACTLESS INTEROPERABILITY IN TRANSIT
NEW SCIENCE TRANSACTION SECURITY ARTICLE CONTACTLESS INTEROPERABILITY IN TRANSIT SUMMER 2014 UL.COM/NEWSCIENCE NEW SCIENCE TRANSACTION SECURITY OVERVIEW From research on the latest electronic transaction
Mobile Banking. Product Overview
Mobile Banking Product Overview financial services & retail enterprise internet content providers public sector telecommunications > PRODUCT transport Introduction Mobile phones have become an integral
Design and Implementation Guide. Apple iphone Compatibility
Design and Implementation Guide Apple iphone Compatibility Introduction Security in wireless LANs has long been a concern for network administrators. While securing laptop devices is well understood, new
A Conceptual Technique for Modelling Security as a Service in Service Oriented Distributed Systems
Volume 1, Number 2, December 2014 JOURNAL OF COMPUTER SCIENCE AND SOFTWARE APPLICATION A Conceptual Technique for Modelling Security as a Service in Service Oriented Distributed Systems Satish Kumar*,
Entrust IdentityGuard
+1-888-437-9783 [email protected] IdentiSys.com Distributed by: Entrust IdentityGuard is an award-winning software-based authentication enterprises and governments. The solution serves as an organization's
ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3
ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3 TO THE Overview EXHIBIT T to Amendment No. 60 Secure Wireless Network Services are based on the IEEE 802.11 set of standards and meet the Commonwealth of Virginia
Gemalto Mifare 1K Datasheet
Gemalto Mifare 1K Datasheet Contents 1. Overview...3 1.1 User convenience and speed...3 1.2 Security...3 1.3 Anticollision...3 2. Gemalto Mifare Features...4 2.1 Compatibility with norms...4 2.2 Electrical...4
SWIFT: Advanced identity management
SWIFT: Advanced identity management Elena Torroglosa, Alejandro Pérez, Gabriel López, Antonio F. Gómez-Skarmeta and Oscar Cánovas Department of Information and Communications Engineering University of
Authentication Application
Authentication Application KERBEROS In an open distributed environment servers to be able to restrict access to authorized users to be able to authenticate requests for service a workstation cannot be
Introduction to Service Oriented Architectures (SOA)
Introduction to Service Oriented Architectures (SOA) Responsible Institutions: ETHZ (Concept) ETHZ (Overall) ETHZ (Revision) http://www.eu-orchestra.org - Version from: 26.10.2007 1 Content 1. Introduction
PASSWORD MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region
PASSWORD MANAGEMENT February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
Norton Mobile Privacy Notice
Effective: April 12, 2016 Symantec and the Norton brand have been entrusted by consumers around the world to protect their computing devices and most important digital assets. This Norton Mobile Privacy
RFID based Bill Generation and Payment through Mobile
RFID based Bill Generation and Payment through Mobile 1 Swati R.Zope, 2 Prof. Maruti Limkar 1 EXTC Department, Mumbai University Terna college of Engineering,India Abstract Emerging electronic commerce
The Ubiquitous Web, UPnP and Smart Homes
The Ubiquitous Web, UPnP and Smart Homes Franklin Reynolds Nokia Research Center, Cambridge [email protected] 1 NOKIA PCG.PPT / 15 6 2004 / Franklin Reynolds Our Vision "The essence of this vision
Secure Authentication for the Development of Mobile Internet Services Critical Considerations
Secure Authentication for the Development of Mobile Internet Services Critical Considerations December 2011 V1 Mobile Internet Security Working Group, SIMalliance AGENDA SIMalliance presentation What s
Controller of Certification Authorities of Mauritius
Contents Pg. Introduction 2 Public key Infrastructure Basics 2 What is Public Key Infrastructure (PKI)? 2 What are Digital Signatures? 3 Salient features of the Electronic Transactions Act 2000 (as amended)
Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access
Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access CONTENTS What is Authentication? Implementing Multi-Factor Authentication Token and Smart Card Technologies
A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS. N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1
A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1 1 Royal Holloway, University of London 2 University of Strathclyde ABSTRACT Future mobile
Trend of Federated Identity Management for Web Services
30 Trend of Federated Identity Management for Web Services Chulung Kim, Sangyong Han Abstract While Web service providers offer different approaches to implementing security, users of Web services demand
Securing the future of mobile services. SIMalliance Open Mobile API. An Introduction v2.0. Security, Identity, Mobility
1 An Introduction v2.0 September 2015 Document History 2 Version Date Editor Remarks 1.0 06/04/2011 OMAPI Working Group Public release 2.0 27/09/2015 OMAPI Working Group Public release Copyright 2015 SIMalliance
CHAPTER 4 DEPLOYMENT OF ESGC-PKC IN NON-COMMERCIAL E-COMMERCE APPLICATIONS
70 CHAPTER 4 DEPLOYMENT OF ESGC-PKC IN NON-COMMERCIAL E-COMMERCE APPLICATIONS 4.1 INTRODUCTION In this research work, a new enhanced SGC-PKC has been proposed for improving the electronic commerce and
Ingenious Systems. Evolute System's. Mobile Payment. Initiative
Ingenious Systems Evolute System's Mobile Payment Initiative The Mobile Payment Concept A mobile payment is any payment where a mobile device is used to initiate, authorize and confirm an exchange of financial
D.I.M. allows different authentication procedures, from simple e-mail confirmation to electronic ID.
Seite 1 von 11 Distributed Identity Management The intention of Distributed Identity Management is the advancement of the electronic communication infrastructure in justice with the goal of defining open,
TFS ApplicationControl White Paper
White Paper Transparent, Encrypted Access to Networked Applications TFS Technology www.tfstech.com Table of Contents Overview 3 User Friendliness Saves Time 3 Enhanced Security Saves Worry 3 Software Componenets
Authentication methods for mobile services INF 5261
UNIVERSITY OF OSLO Department of Informatics Authentication methods for mobile services INF 5261 Report: Main factors affecting user acceptance of authentication methods for mobile services in Norway Spring
MOBILE CHIP ELECTRONIC COMMERCE: ENABLING CREDIT CARD PAYMENT FOR MOBILE DEVICES
MOBILE CHIP ELECTRONIC COMMERCE: ENABLING CREDIT CARD PAYMENT FOR MOBILE DEVICES Marko Schuba and Konrad Wrona Ericsson Research, Germany ABSTRACT This paper describes the Mobile Chip Electronic Commerce
Authentication Methods for USIM-based Mobile Banking Service
Authentication Methods for USIM-based Mobile Banking Service Jonghyun Baek 1, Young-Jun Kim 1, Yoojae Won 1, HeungYoul Youm 2 Korea Information Security Agency, Seoul, Korea 1 Soon Chun Hyang University,
Enterprise SSO Manager (E-SSO-M)
Enterprise SSO Manager (E-SSO-M) Many resources, such as internet applications, internal network applications and Operating Systems, require the end user to log in several times before they are empowered
