[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Veloz-Cherrez et al., 2019 - Google Patents

NFC-Based Payment System Using Smartphones for Public Transport Service

Veloz-Cherrez et al., 2019

Document ID
7477065096633674622
Author
Veloz-Cherrez D
Suárez J
Publication year
Publication venue
Information and Communication Technologies of Ecuador (TIC. EC) 6

External Links

Snippet

This paper presents an implementation of software applications and an infrastructure for payments using NFC compatible Android smartphones. This prototype is suited for, but not limited to, payments in a public transport system. The importance of security in …
Continue reading at link.springer.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2111Location-sensitive, e.g. geographical location, GPS

Similar Documents

Publication Publication Date Title
Harbi et al. A review of security in internet of things
Bojjagani et al. Systematic survey of mobile payments, protocols, and security infrastructure
US9219722B2 (en) Unclonable ID based chip-to-chip communication
CN107181714B (en) Verification method and device based on service code and generation method and device of service code
US20120303310A1 (en) Systems and Methods for Providing Test Keys to Mobile Devices
KR20160101058A (en) Technologies for supporting multiple digital rights management protocols on a client device
Shamshuddin et al. Privacy preserving scheme for smart transportation in 5G integrated IoT
Sanyal et al. A multifactor secure authentication system for wireless payment
Veloz-Cherrez et al. NFC-Based Payment System Using Smartphones for Public Transport Service
Shivanna et al. Privacy preservation in cloud computing with double encryption method
CN114641772A (en) System, method and computer program product for secure key management
Armando et al. Trusted host-based card emulation
Jerald et al. Algorithmic approach to security architecture for integrated IoT smart services environment
Hölzl et al. Real-world Identification for an Extensible and Privacy-preserving Mobile eID
Kim A study on the Cryptographic Algorithm for NFC
Arulmozhi et al. A lightweight memory-based protocol authentication using radio frequency identification (rfid)
Wu et al. Research of eid mobile identity authentication method
Zhang Secure mobile service-oriented architecture
Sarode et al. Data Encryption Security in Mobile and Cloud Computing Environments
US20220311617A1 (en) Cryptographic signing of a data item
Li Context-aware attribute-based techniques for data security and access control in mobile cloud environment
Kim et al. Multimedia image data processing on smartphone for authentication
Hossain et al. Security solution of RFID card through cryptography
Mani Sekhar et al. Security and privacy in 5G-enabled internet of things: a data analysis perspective
Kasper et al. Rights management with NFC smartphones and electronic ID cards: A proof of concept for modern car sharing