Online Authentication Using Smart Card Technology in Mobile Phone Infrastructure

Online Authentication Using Smart Card Technology in Mobile Phone Infrastructure

Teddy Mantoro, Admir Milišic, Media Ayu
Copyright: © 2011 |Volume: 3 |Issue: 4 |Pages: 17
ISSN: 1937-9412|EISSN: 1937-9404|EISBN13: 9781613508466|DOI: 10.4018/jmcmc.2011100105
Cite Article Cite Article

MLA

Mantoro, Teddy, et al. "Online Authentication Using Smart Card Technology in Mobile Phone Infrastructure." IJMCMC vol.3, no.4 2011: pp.67-83. http://doi.org/10.4018/jmcmc.2011100105

APA

Mantoro, T., Milišic, A., & Ayu, M. (2011). Online Authentication Using Smart Card Technology in Mobile Phone Infrastructure. International Journal of Mobile Computing and Multimedia Communications (IJMCMC), 3(4), 67-83. http://doi.org/10.4018/jmcmc.2011100105

Chicago

Mantoro, Teddy, Admir Milišic, and Media Ayu. "Online Authentication Using Smart Card Technology in Mobile Phone Infrastructure," International Journal of Mobile Computing and Multimedia Communications (IJMCMC) 3, no.4: 67-83. http://doi.org/10.4018/jmcmc.2011100105

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

The widespread of Internet usage has resulted in a greater number and variety of applications involving different types of private information. In order to diminish privacy concerns and strengthen user trust, security improvements in terms of authentication are necessary. The solutions need to be convenient, entailing ease of use and higher mobility. The suggested approach is to make use of the already popular mobile phone and to involve the mobile network, benefiting from Subscriber Identity Module (SIM) card’s tamper resistance to become trusted entities guarding personal information and identifying users. Mobile phone’s SIM card is convenient for safely storing security parameters essential for secured communication. It becomes secure entity compulsory for getting access to privacy sensitive Internet applications, like those involving money transfers. Utilizing the NFC interface passes the personal user keys only when needed, giving additional strength to the traditional public key cryptography approach in terms of security and portability.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.