- 1、本文档共6页,可阅读全部内容。
- 2、有哪些信誉好的足球投注网站(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
- 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
Authenticated Mobile Device Proxy Service
Abstract—In the current study we present a system that is
capable to deliver proxy based differentiated service. It will help the
carrier service node to sell a prepaid service to clients and limit the
use to a particular mobile device or devices for a certain time. The
system includes software and hardware architecture for a mobile
device with moderate computational power, and a secure protocol for
communication between it and its carrier service node. On the
carrier service node a proxy runs on a centralized server to be
capable of implementing cryptographic algorithms, while the mobile
device contains a simple embedded processor capable of executing
simple algorithms. One prerequisite is needed for the system to run
efficiently that is a presence of Global Trusted Verification Authority
(GTVA) which is equivalent to certifying authority in IP networks.
This system appears to be of great interest for many commercial
transactions, business to business electronic and mobile commerce,
and military applications.
Keywords—Mobile Device Security, Identity Authentication,
Mobile Commerce Security.
I. INTRODUCTION
HE rapid progress in wireless communication systems,
personal communication systems, and smart card
Technologies has brought new opportunities and challenges to
be met by engineers and researchers working on the security
aspects of the contemporary communication technologies
[1,2].
Having this technology available on the market, made a
high demand for many applications and services to get
restricted to certain physical devices. However, there are still
significant difficulties to overcome when integrating mobile
devices with embedded features into a ubiquitous computing
environment. These difficulties include designing devices
smart enough to collaborate with each other, increasing ease-
of-use, and enabling enhanced connectivity between the
different devices [3-6].
Public-key cryptography offers robust solutions to many of
th
您可能关注的文档
- An Observational Estimate of Inferred Ocean Energy Divergence.pdf
- An Quantum Brain Storm Optimization for Fog Computing in 5G.ppt
- AN OPTI~[AL STRATEGY FOR SEARCHING THE BEST FAULT-PLANE SOLUTION USING WAVE-AMPLITUDE DATA.pdf
- AN469 I2C I_O Ports_V2_Jan_20_2005.pdf
- Analysis of 40 year records of solar radiation data in Shanghai.pdf
- ANALYSIS AND COORDINATION OF EXPERT STATEMENTS IN THE PROBLEMS OF INTELLECTUAL INFORMATION.pdf
- anal sphincter repair.pdf
- An-Yang, Korea.pdf
- An-overview-of-values-for-the-threshold-of-toxicological-concern_2012_Toxicology-Letters.pdf
- Analysis of Creeping Locomotion of a Snake-like Robot on a Slope_2006.pdf
文档评论(0)