Smart Card Authentication for Mobile Devices
نویسندگان
چکیده
While mobile handheld devices provide productivity benefits, they also pose new risks. User authentication is the best safeguard against the risk of unauthorized use and access to a device’s contents. This paper describes two novel types of smart card with unconventional form factors, designed to take advantage of common interfaces built into many current handheld devices.
منابع مشابه
A Remote User Authentication Scheme with Anonymity for Mobile Devices
With the rapid growth of information technologies, mobile devices have been utilized in a variety of services such as e‐commerce. When a remote server provides such e‐commerce services to a user, it must verify the legitimacy of the user over an insecure communication channel. Therefore, remote user authentication has been widely deployed to verify the legitimacy of re...
متن کاملSmart Card based Mobile Payment Protocol
New mobile consumers are demanding access to a wider range of applications and services, convenient payment for digital content and physical goods, and integrated financial management services. As mobile devices evolve into ‘smart devices’, the primary requirements for realizing the digital contents providing services are to implement the compatibly secure payment protocol on m-commerce environ...
متن کاملAbstract: While mobile handheld devices provide productivity benefits, they also pose new risks
While mobile handheld devices provide productivity benefits, they also pose new risks. User authentication is the best safeguard against the risk of unauthorized use and access to a device’s contents. This paper describes two novel types of smart card with unconventional form factors, designed to take advantage of common interfaces built into many current handheld devices.
متن کاملMutual Authentication for Low-Power Mobile Devices
We propose methods for mutual authentication and key exchange. Our methods are well suited for applications with strict power consumption restrictions, such as wireless medical implants and contactless smart cards. We prove the security of our schemes based on the discrete log gap problem.
متن کاملA Personal Authentication Scheme Using Mobile Technology
Security is a major concern in mobile commerce where information is send over the air. Authentication is possibly the most important property since achieving privacy and integrity may have no sense without the guaranty of the receiver identity. Cryptographic strong authentication protocols are known but the hard problem is to protect secret information, like shared or private keys, used in thes...
متن کامل