Veloz-Cherrez et al., 2019 - Google Patents
NFC-Based Payment System Using Smartphones for Public Transport ServiceVeloz-Cherrez et al., 2019
- Document ID
- 7477065096633674622
- Author
- Veloz-Cherrez D
- Suárez J
- Publication year
- Publication venue
- Information and Communication Technologies of Ecuador (TIC. EC) 6
External Links
Snippet
This paper presents an implementation of software applications and an infrastructure for payments using NFC compatible Android smartphones. This prototype is suited for, but not limited to, payments in a public transport system. The importance of security in …
- 238000004891 communication 0 abstract description 35
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
- G06F21/35—User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/606—Protecting data by securing the transmission between two devices or processes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/03—Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2111—Location-sensitive, e.g. geographical location, GPS
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Harbi et al. | A review of security in internet of things | |
Bojjagani et al. | Systematic survey of mobile payments, protocols, and security infrastructure | |
US9219722B2 (en) | Unclonable ID based chip-to-chip communication | |
CN107181714B (en) | Verification method and device based on service code and generation method and device of service code | |
US20120303310A1 (en) | Systems and Methods for Providing Test Keys to Mobile Devices | |
KR20160101058A (en) | Technologies for supporting multiple digital rights management protocols on a client device | |
Shamshuddin et al. | Privacy preserving scheme for smart transportation in 5G integrated IoT | |
Sanyal et al. | A multifactor secure authentication system for wireless payment | |
Veloz-Cherrez et al. | NFC-Based Payment System Using Smartphones for Public Transport Service | |
Shivanna et al. | Privacy preservation in cloud computing with double encryption method | |
CN114641772A (en) | System, method and computer program product for secure key management | |
Armando et al. | Trusted host-based card emulation | |
Jerald et al. | Algorithmic approach to security architecture for integrated IoT smart services environment | |
Hölzl et al. | Real-world Identification for an Extensible and Privacy-preserving Mobile eID | |
Kim | A study on the Cryptographic Algorithm for NFC | |
Arulmozhi et al. | A lightweight memory-based protocol authentication using radio frequency identification (rfid) | |
Wu et al. | Research of eid mobile identity authentication method | |
Zhang | Secure mobile service-oriented architecture | |
Sarode et al. | Data Encryption Security in Mobile and Cloud Computing Environments | |
US20220311617A1 (en) | Cryptographic signing of a data item | |
Li | Context-aware attribute-based techniques for data security and access control in mobile cloud environment | |
Kim et al. | Multimedia image data processing on smartphone for authentication | |
Hossain et al. | Security solution of RFID card through cryptography | |
Mani Sekhar et al. | Security and privacy in 5G-enabled internet of things: a data analysis perspective | |
Kasper et al. | Rights management with NFC smartphones and electronic ID cards: A proof of concept for modern car sharing |