期刊文献+

基于RFID智能卡的Android移动终端数据保护方案 被引量:3

RFID smartcard-based data protection scheme for Android mobile terminal
下载PDF
导出
摘要 针对当前Android移动终端数据加密保护方案中存在的密钥安全存储及使用问题,提出了一种基于RFID智能卡的机卡分离数据保护方案。方案使用具有密码计算功能的RFID智能卡作为密钥保护的重要组件,移动终端通过Android系统具备的NFC功能,实现对RFID智能卡的密码操作,和RFID智能卡共同配合实现对移动终端数据的双重加密保护。该方案对移动终端无特殊硬件要求,具有更好的易用性。对系统方案进行了分析、实现以及性能测试,分析及测试结果表明该方案具有较好的安全性与可行性。 In view of the problem of insecure key protection and usage that currently exists in the data protection scheme for Android mobile terminal, this paper proposes a RFID smartcard-based data protection scheme, which introduces the RFID smartcard as an important factor to secure the key. The NFC function enables the terminal to do cryptographic operations on RFID smartcard and cooperate with the RFID smartcard to realize double encryption protection. The scheme has no special hardware requirements for the mobile terminal and acquires better ease of use. The scheme has been analyzed,realized and tested. The analysis and experimental results show the scheme is possessed with better security and feasibility.
出处 《计算机工程与应用》 CSCD 北大核心 2016年第2期112-116,126,共6页 Computer Engineering and Applications
基金 国家863课题(No.Y370061103)
关键词 ANDROID 射频识别(RFID)智能卡 数据保护 Android Radio Frequency Identification(RFID)smartcard data protection
  • 相关文献

参考文献11

  • 1张中文,雷灵光,王跃武.Android Permission机制的实现与安全分析[J].信息网络安全,2012(8):3-6. 被引量:6
  • 2Kalutarage H K,Krishnan P,Shaikh S A.Android revolution[J].ITNOW,2013,55(1):36-37.
  • 3Hornyack P,Han S,Jung J,et al.These aren’t the droids you’re looking for:retrofitting android to protect data from imperious applications[C]//Proceedings of the 18th ACM Conference on Computer and Communications Security,2011:639-652.
  • 4Portokalidis G,Homburg P,Anagnostakis K,et al.Paranoid Android:versatile protection for smartphones[C]//Proceedings of the 26th Annual Computer Security Applications Conference,2010:347-356.
  • 5Zhou Y,Zhang X,Jiang X,et al.Taming information-stealing smartphone applications(on android)[M]//Trust and trustworthy computing.Berlin/Heidelberg:Springer,2011:93-107.
  • 6Nauman M,Khan S,Zhang X.Apex:extending android permission model and enforcement with user-defined runtime constraints[C]//Proceedings of the 5th ACM Symposium on Information,Computer and Communications Security,2010:328-332.
  • 7Enck W,Gilbert P,Chun B G,et al.Taint Droid:an informationflow tracking system for realtime privacy monitoring on smartphones[C]//OSDI,2010,10:1-6.
  • 8肖萍,李茜.基于RSA数字信封技术的Android数据安全机制[J].信息网络安全,2013(3):37-39. 被引量:3
  • 9刘树杰.Android下SQLite数据库安全机制的设计与实现[EB/OL].[2010-12-28].http://www.paper.edu.cn/releasepaper/content/201012-1167.
  • 10吴剑华,莫兰芳,李湘.Android用户隐私保护系统[J].信息网络安全,2012(9):50-53. 被引量:13

二级参考文献22

  • 1姚昱旻,刘卫国.Android的架构与应用开发研究[J].计算机系统应用,2008,17(11):110-112. 被引量:281
  • 2施向东,董平.基于RSA算法的一种新的加密核设计[J].微计算机信息,2005,21(12X):39-41. 被引量:12
  • 3高蕾,郑建德.基于PKI的高校安全教务管理研究[J].厦门大学学报(自然科学版),2006,45(B05):305-308. 被引量:6
  • 4沈昌祥,张焕国,冯登国,曹珍富,黄继武.信息安全综述[J].中国科学(E辑),2007,37(2):129-150. 被引量:359
  • 5李刚.疯狂Android讲义[M].北京:电子工业出版社,2011年7月,643-644.
  • 6R.L.Rivest,A.Shamir,L.Adleman. A Method for Obtain- ing Digital Signatures and Public-Key Cryptosystems.Commnunieations of the ACM. 1978,21(2):120-126.
  • 7WiUiam Stallings. Theoy & praetice on Encryption and Network Security 2004:172-195,335-360.
  • 8谷利泽,郑世慧,杨义先.现代密码学教程[M].北京:北京邮电大学出版社,2009.
  • 9W. Enck, M. Ongtang, P. McDaniel. On Lightweight Mobile Phone Application Certification[C]. In Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS ' 09, 2009.
  • 10David Barrera, H. G fines Kayaclk, P.C. van Oorschot, Anil Somayaji. A Methodology for Empirical Analysis of Permission-Based Security Models and its Application to Android[C]. In Proceedings of the 18th ACM Conference on Computer and Communications Security, 2010.

共引文献20

同被引文献19

引证文献3

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部