A Mobile Ticket System Based on Personal Trusted Device
نویسندگان
چکیده
Advances in wireless network technology and the continuously increasing users of Personal Trusted Device (PTD) make the latter an ideal channel for offering personalized services to mobile users. In this paper, we apply some cryptology (such as public key infrastructure, hashing chain and digital signature) to propose a realistic mobile ticket system such that fairness, non-repudiation, anonymity, no forging, efficient verification, simplicity, practicability and obviate the embezzlement issues can be guaranteed. On the basis of PTD is more portable and personal than personal computer, we gradually perceived that the widely used PTD will present huge commerce profits for mobile ticket service provider and it is convenient to the PTD user.
منابع مشابه
Trusted Ticket Systems and Applications
Trusted Computing is a security base technology that will perhaps be ubiquitous in a few years in personal computers and mobile devices alike. Despite its neutrality with respect to applications, it has raised some privacy concerns. We show that trusted computing can be applied for service access control in a manner protecting users’ privacy. We construct a ticket system, a concept at the heart...
متن کاملAnalyzing Trusted Elements in Mobile Devices
Since last two decades, we have witnessed a significant trend from PC to mobile devices. The primary focus of this shift on mobile devices is making a device personal to the user, but, unfortunately, neglecting the trustworthiness of mobile devices. Mobile devices consist of many elements in hardware, software (firmware) and a combination of both. Some of these elements on mobile devices are tr...
متن کاملConstruction of a Real-Time and Secure Mobile Ticket System
With the technology improving, many content-services have been digitalized constantly in our daily life. To be more convenient and efficient, many kinds of high technological products have also been personalized, mobilized, and people can handle their businesses at any time from anywhere. For example, mobile users can perform the Internet transactions via mobile devices (such as cell phone and ...
متن کاملMore Privacy in Context-aware Platforms: User Controlled Access Right Delegation using Kerberos
In this paper we propose a distributed Kerberos architecture in which each mobile client runs her own Kerberos ticket granting server. Each of these individual TGS may provide tickets only for data that is owned by the mobile (user) on behalf of which it is executed. In addition the initial authentication phase can be done by the standard Kerberos approach as well as based on PKI using certific...
متن کاملMobile Trusted Computing Based on MTM
Trusted computing (TC) denotes a set of security-related hardware and software mechanisms that make a computing device work in a consistent manner, even in the presence of external attacks. For personal computers, TC typically is interpreted to be a software architecture designed around the trusted platform module (TPM), a hardware chip residing on the motherboard and implemented according to t...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Wireless Personal Communications
دوره 40 شماره
صفحات -
تاریخ انتشار 2007