Integration of a Secure Mobile Payment System in a Gsm/umts Sim Smart Card
نویسندگان
چکیده
The idea of electronic money and the digitalization of economic transactions are appealing as a result of the nowadays’ technological evolution. Many proposals have been presented and several projects have been implemented in this direction, however there is still a long way ahead to widely commercially deployed applications. In this paper a new counter-based electronic payment system is introduced. Guidelines to that are high-level system security, user mobility, user anonymity, off-line operation ability, system scalability, and entity transferability. We introduce a new electronic purse application, with the corresponding payment protocol. The application mainly intends to serve subscribers of cellular networks, by enabling them to hold electronic means of money, and use it for commercial purposes.
منابع مشابه
Mobile communication security controllers an evaluation paper
Cellular communication via a traditional mobile handset is a ubiquitous part of modern life and as device technology and network performance continues to advance, it becomes possible for laptop computers, Personal Digital Assistants (PDAs) and even electrical meters to better exploit mobile networks for wireless communication. As the diverse demands for network access and value added services i...
متن کاملSecuring USIM-based Mobile Communications from Interoperation of SIM-based Communications
Mobile networks security is constantly evolving and adapting to meet the needs of users and network operators. It is a requirement that there be interoperation of legacy security frameworks into modern mobile networks. Mobile networks originally had no real security which proved to be a deployment that was attacked constantly and the providers were defrauded of millions of dollars. To address t...
متن کاملProposing a Model for Patient Admission and NFC Mobile Payment by Biometric Identification and Smart Health Card
Abstract Following the advances in mobile communication and information technology, smart phones have been used in a wide variety of commercial, social, entertainment, file sharing and health transactions and applications. The current procedures in healthcare environment for patient registration, appointment scheduling and payment are time consuming and somehow tiresome. Traditionally, patie...
متن کاملDesign, Installation & Execution of a Security Agent for Mobile Stations
In this paper we present a methodology and protocol for establishing a security context between a Mobile Operator’s application server and a GSM/UMTS SIM card. The methodology assumes that the already issued Mobile Station is capable but unprepared. The proposed scheme creates a secure entity within the Mobile Station “Over The Air” (OTA). This secure entity can then be used for subsequent SIM ...
متن کاملDesign, Installation and Execution of a Security Agent for Mobile Stations
In this paper we present a methodology and protocol for establishing a security context between a Mobile Operator’s application server and a GSM/UMTS SIM card. The methodology assumes that the already issued Mobile Station is capable but unprepared. The proposed scheme creates a secure entity within the Mobile Station “Over The Air” (OTA). This secure entity can then be used for subsequent SIM ...
متن کامل