期刊文献+

基于CoSE的NFC安全支付协议 被引量:3

NFC security payments protocol with cloud of secure elements
下载PDF
导出
摘要 基于CoSE(cloud of secure elements)概念,提出一个NFC安全支付协议。根据CoSE架构部署一个可信云支付平台,使用虚拟SE替代硬件安全模块,所有交易项都由云支付平台完成;商户的POS终端充当消费者和云支付平台的通信桥梁,消费者的NFC设备和商户的POS终端通过射频场连接,消费者NFC设备不需要数据网络即可完成支付流程;交易过程中通过对交易双方身份信息与随机数进行hash运算,实现正常交易匿名性。通过安全性分析及实验验证了该协议的正确性和安全性。 Based on the concept of cloud of secure elements (CoSE) , a NFC secure payment protocol was proposed According to the CoSE architecture, a trusted cloud payment platform that used virtual SEs instead of hardware security modules was de-ployed, all transactions were completed through the cloud payment platform. Merchant's POS terminal was taken as a commu-nication bridge between customer and cloud payment platform, customer's NFC device and merchant's POS terminal were con-nected through radio frequency field, and customer^ s NFC devices could complete the payment process without data network. In the process of transaction, the identity information of two parties and a random number were operated using hash arithmetic to realize the anonymity of the normal transaction. Through security analysis and experiments? the correctness and security of the presented protocol was demonstrated
作者 柳毅 葛辉赟
出处 《计算机工程与设计》 北大核心 2017年第9期2363-2368,共6页 Computer Engineering and Design
基金 国家自然科学基金项目(61572144) 广东省自然科学基金项目(2014A030313517) 广东省科技计划基金项目(2016B090918125 2015B010128014)
关键词 近场通信 安全支付 半离线支付 匿名性 CoSE架构 near field communication security payments hemi-offline payments protocol anonymity cloud of secure ele-ments
  • 相关文献

参考文献1

二级参考文献12

  • 1ISO/IEC 18092.Information Technology-Telecommunicationsand Information Exchange between Systems-Near FieldCommunication—Interface and Protocol(NFCIP-1)[S].1stEd.Geneva,Switzerland:Joint Technical CommitteeISO/IEC,2004.
  • 2Madlmayr G,Dillinger O,Langer J,et al.The benefit ofusing SIM application toolkit in the context of near fieldcommunication applications for mobile applications[C] //Proceedings of the International Conference on theManagement of Mobile Business.Toronto,Canada:IEEE,2007:1-5.
  • 3Au Y A,Kauffman R J.The economics of mobile payments:Understanding stakeholder issues for an emerging financialtechnology application[J].Electronic Commerce Researchand Applications,2008,7(2):141-146.
  • 4Olga K.Apple plans service that lets iphone users pay withhandsets[Z/OL].(2012-04-21),http://www.bloomberg.com/news/2011-01-25/apple-plans-service-that-lets-iphone-users-pay-with-handsets.html.
  • 5Torr P.Demystifying the threat-modeling process[J].IEEESecurity and Privacy,2005,3(5):66-70.
  • 6Shostack A.Threat modeling series 2007[Z/OL].(2012-04-21),http://blogs.msdn.com/sdl/archive/tags/threat+modeling/default.aspx.published 2007-09and 2007-10.
  • 7Swiderski F,Snyder W.Threat Modeling[M].WashingtonDC,USA:Microsoft Press,2004:22-35.
  • 8Poore R S.International information security foundation,generally accepted system security principles release for publiccomment[Z/OL].(2012-04-23),http://www.infosectoday.com/Articles/gassp.pdf accessed on January11,2010.
  • 9Elahi G,Yu E.A goal oriented approach for modeling andanalyzing security trade-offs[C] //Proceedings of the 26thInternational Conference on Conceptual Modeling.Auckland,New Zealand:Springer,2007:375-390.
  • 10Weis S A,Sarma S E,Rivest R L,et al.Security andprivacy aspects of low-cost radio frequency identificationsystems[C] //Proceedings of the Security in PervasiveComputing 2003.Boppard,Germany:Springer,2004:201-212.

共引文献19

同被引文献14

引证文献3

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部