期刊文献+

基于安全SIM卡的移动通信研究 被引量:2

Research on secure SIM-based communications by mobile
下载PDF
导出
摘要 通过对当前电子商务及电子政务安全性以及灵活性的分析,结合双因子认证技术,实现了一种基于SIM卡的安全移动通信解决方案。该SIM卡以硬件方式实现了加解密、签名、认证等模块,运用PKI技术实现移动通信过程中签名用户身份、认证以及安全传输等特定的业务信息。同时SIM卡使用了PIN码技术,保证了用户对SIM卡访问的合法性,进一步增强其应用系统的安全性。  After an analysis of the properties of e-business security, flexibility and of dual-factor authentication, this paper takes up with a SIM-based secure communications by mobile. The SIM card encrypts, signs and authenticate data by hardware. It uses PKI to sign and to authenticate users' information, to transfer special data securely. This SIM card adopts PIN-password to make sure of the validity of the users' accessibility to the card and to protect the application further.
作者 刘百乐
机构地区 同济大学
出处 《计算机安全》 2007年第11期26-29,共4页 Network & Computer Security
关键词 SIM卡 PKI 硬件 SIM card PKI hardware encryption
  • 相关文献

参考文献1

二级参考文献8

  • 1RSA Laboratories. PKCS #15 v1.0:Cryptographic Token Information Format Standard[S]
  • 2SIM-Basic Tutorial:The Technical Platform for Commercial Services.Available at: http://www.smarttrust.com/sim/default.asp
  • 3H Krawczyk,M Bellare,R Canetti.HMAC:Keyed-Hashing for Message Authentication[S].RFC2104,1997-02
  • 4Olle Kallstrom. Business solutions for mobile e-commerce. Available at: http://www.mcl.hu/mmrel/related/mobip_a.pdf
  • 5Hung-Yu Lin,Lein Harn,Vijay Kumar. Authentication Protocols in Wireless Communications. Available at:http://www.mcl.hu/mmrel/related/authentication-protocols-in-wircless.pdf
  • 6Tuomas Aura. Strategies against Replay Attacks. Available at:http://www.saturn.tcs.hut.fi/Publications/papers/aura/aura-csfws97.ps
  • 7International Organisation for Standardisation(ISO),JTC 1/SC 17.ISO/IEC 7816 Identification cards-Integrated circuit(s)cards with contacts[S]
  • 8Digital cellular telecommunications system(Phase 2+);Specification of the Subscriber Identity Module - Mobile Equipment(SIM-ME)interface(GSM 11.11 version 8.3.0 Release 1999)[S].Available at:http://www.etsi.org, 2000

共引文献7

同被引文献17

  • 1唐剑峰,吕志虎.增强型安全SIM卡技术方案[J].电信科学,2004,20(12):25-27. 被引量:3
  • 2Markovi6 M, Dordevi6 G. Secure mobile government and mo- bile banking systems based on android clients[ M]//Securing electronic business processes. Fachmedien Wiesbaden:Spring- er,2013:263-273.
  • 3EI Kettani M D E C, En-Nasry B. MIdM : an open architecture for mobile identity management [ J ]. Journal of Convergence, 2011,2(2) :25-32.
  • 4Toshikazu N. A distributed authentication mechanism for sha- ring an overlay network among multiple organizations [ C ]// Proceedings of the 12th international conference on informa-tion integration and web-based applications & services. USA: [ s. n. ] ,2010:813-817.
  • 5许吉占明.基于PKI的智能卡双向身份认证机制的设计与实现[D].长沙:国防科学技术大学,2006.
  • 6Li M, Sandrasegaran K. A proxy based authentication localisa- tion scheme for handover between non trust-associated do- mains [ J]. ACM SIGMOBILE Mobile Computing and Commu- nications Review,2010(4) :47-50.
  • 7Tsai Y R, Chang C J. SIM- based subscriber authentication Mechanism for wireless local area networks [ J ]. Computer Communications, 2006,29 ( 10 ) : 1744 - 1753.
  • 8Firoozy- Najafabadi H R, Feizi- Derakhshi M. Multipurpose smart SIM card based on mobile database and location de- pendent query [ C ]//Proc of 2012 6th international conference on application of information and communication technologies. [s. 1. ] :IEEE,2012:1-5.
  • 9Kuhn D R, Coyne E J, Well T R. Adding attributes to role- based access control[ J ]. Computer,2010,43 (6) :79-81.
  • 10刘丽霞,庄奕琪.嵌入式Java蓝牙构件模型的研究与应用[J].微计算机信息,2010,26(8):16-17. 被引量:2

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部