Filters








31 Hits in 3.5 sec

Design and Implementation of a Mobile Transactions Client System: Secure UICC Mobile Wallet

Hao Zhao, Sead Muftic
2012 International Journal for Information Security Research  
In our approach Secure Mobile Wallet is stored and running in the Javacard SIM chip, called UICC module.  ...  Mobile Wallet is an application stored in mobile phones providing to subscribers the possibility to perform various mobile financial transactions.  ...  into a phone Wallet Application and Wallet middleware implemented as J2ME applications.  ... 
doi:10.20533/ijisr.2042.4639.2012.0014 fatcat:2yw6z26cnbaz7gkhz6q3d7m67a

A Role-Based Service Level NFC Ecosystem Model

Kerem OK, Vedat Coskun, Busra Ozdenizci, Mehmet N. Aydin
2011 Wireless personal communications  
This mode is useful for payment and ticketing applications, since corresponding data is stored in the mobile phone and it is read by an external NFC reader (Figure 2 ).  ...  NFC-enabled mobile phone creates magnetic field and powers the NFC tag within 4 cm Tag broadcasts the answer which is then read by mobile phone 1 2  ...  SPs and users by securely downloading applications to mobile phones.  ... 
doi:10.1007/s11277-011-0484-3 fatcat:7wrgxrthbrcblms737iqjwdw4e

Mobile Electronic Memos [chapter]

Giovanni Bartolomeo, Stefano Salsano, Antonella Frisiello
2011 Lecture Notes in Computer Science  
We examine related works and standards that could be good candidates for implementing MEMs and describe a prototype implementation that has been realized as a proof of concept.  ...  To achieve this goal, Mobile Electronic Memos decouple the semantics of the information from the physical and pragmatic constraints of the medium that transports it.  ...  Glaschick (Siemens C-Lab) for his key contributions on security, privacy and trust aspects and C. Rust (Sagem Orga) and A.  ... 
doi:10.1007/978-3-642-22875-9_16 fatcat:n4mn3hxry5c53eri6y7eaacbpa

Open Mobile API: Accessing the UICC on Android Devices [article]

Michael Roland, Michael Hölzl
2016 arXiv   pre-print
This report gives an overview of secure element integration into Android devices. It focuses on the Open Mobile API as an open interface to access secure elements from Android applications.  ...  The overall architecture of the Open Mobile API is described and current Android devices are analyzed with regard to the availability of this API.  ...  It defines a platform-independent middleware architecture between apps and secure elements on mobile devices, and specifies a programming language independent API for integrating secure element access  ... 
arXiv:1601.03027v1 fatcat:oebae4eazjd3xknnqzcdg56ym4

MobiPag: Integrated Mobile Payment, Ticketing and Couponing Solution Based on NFC

Helena Rodrigues, Rui José, André Coelho, Ana Melro, Marta Ferreira, João Cunha, Miguel Monteiro, Carlos Ribeiro
2014 Sensors  
We identify a set of design lessons resulting from usage experiences associated with real-world payment situations with NFC-enabled mobile phones.  ...  We describe the Mobipag architecture and how it has been used to support a mobile payment trial.  ...  They also supervised the main programming tasks in the development of the MobiPag middleware and MobiPag reference applications.  ... 
doi:10.3390/s140813389 pmid:25061838 pmcid:PMC4179034 fatcat:ikqsruxrknebncl46xlxvegkx4

Executing Arbitrary Code in the Context of the Smartcard System Service [article]

Michael Roland
2016 arXiv   pre-print
The vulnerability allows arbitrary code coming from a specially crafted Android application package (APK) to be injected into and executed by the smartcard system service component (the middleware component  ...  The affected source code seems to originate from the SEEK-for-Android open-source project and was adopted by various vendor-specific implementations of the Open Mobile API, including the one that is used  ...  It defines a platform-independent middleware architecture between apps and secure elements on mobile devices, and specifies a programming language independent API for integrating secure element access  ... 
arXiv:1601.05833v1 fatcat:mkvvhl7usrfo7hhkcwtltvgwla

Secure service-oriented architecture for mobile transactions

Feng Zhang, Sead Muftic, Gernot Schmoelzer
2011 2011 World Congress on Internet Security (WorldCIS-2011)  
PC-based or device-based Point-of-Sale (PoS) applications, and finally our Wallet implemented as an application in mobile phones, as an UICC applet or as a smart card applet.  ...  The paper describes secure service-oriented architecture for mobile transactions.  ...  On the mobile phone, there is mobile client software named SAFE Mobile Wallet. It consists of three parts: UI, middleware and applets in UICC. UI is developed as Midlet by using J2ME.  ... 
doi:10.1109/worldcis17046.2011.5749898 fatcat:mrl2whrstjdcjl6n73rhj3ypzm

Middleware for Smart Cards [chapter]

Harald Vogt, Michael Rohs, Roger Kilian-Kehr
2005 Middleware for Communications  
The ATR and the ATR file play an important role for the integration of smart cards into middleware systems.  ...  For each application, the developer needs to specify an APDU protocol, and manually encode and decode APDUs.  ...  They are widely deployed in wireless phones, such as SIM cards in GSM phones, UICC cards in 3G phones, RUIM cards in CDMA phones, and WIM applications in a SIM or UICC card in WAP-enabled phones.  ... 
doi:10.1002/0470862084.ch15 fatcat:linagtbqhvdite4cv4iw724oay

A Survey on Near Field Communication (NFC) Technology

Vedat Coskun, Busra Ozdenizci, Kerem Ok
2012 Wireless personal communications  
from payment and loyalty applications to access keys for offices and houses.  ...  An encouraging property of NFC technology is the assurance of secure storage of the personal and private information on the secure element of the mobile phones those are traditionally saved in other items  ...  For example, a mobile phone may contain embedded hardware, or SMC, together with a UICC.  ... 
doi:10.1007/s11277-012-0935-5 fatcat:vqrzstrvwngxvd2kgbn4stqtwu

Handheld Computing and Programming for Mobile Commerce

Wen‐Chen Hu, Jyh‐Haw Yeh, Lixin Fu, Hung‐Jen Yang
2007 International Journal of Web Information Systems  
The mobile-commerce system structure includes six components: (i) mobile commerce applications, (ii) mobile handheld devices, (iii) mobile middleware, (iv) wireless networks, (v) wired networks, and (vi  ...  Mobile handheld devices provide convenience and portable access to the huge information on the Internet for mobile users from anywhere and at anytime.  ...  GSM circuit switched voice and data and packet-based data; CDMA circuit switched voice, data and packet-based data; SIM, RUIM and UICC Toolkit.  Security.  ... 
doi:10.1108/17440080780000297 fatcat:qpyehsf33far7ixwceil2cvfsy

The German eID as an Authentication Token on Android Devices [article]

Florian Otterbein, Tim Ohlendorf, Marian Margraf
2017 arXiv   pre-print
While there are several solutions available for desktop use of the eID infrastructure, mobile approaches have to be payed more attention.  ...  In this paper we present a new approach for using the German eID concept on an Android device without the need of the actual identity card and card reader.  ...  middleware based on seek-for-android and open for developers.  ... 
arXiv:1701.04013v1 fatcat:yvjysv3tlvgf7cmj5nl724blni

Services, Use Cases and Future Challenges for Near Field Communication: the StoLPaN Project [chapter]

Carlo Maria, Alice Moroni, Valentina Volpi, Ugo Biader, Andras Vilmos, Balazs Benyo
2011 Deploying RFID - Challenges, Solutions, and Open Issues  
The technical solution proposed by both the GSMA and the AEPM is based on the UICC as the Secure Element for a mobile payment transaction.  ...  Our middleware should work on any future MIDP 2.0 handset based on UICC or embedded chips without modification. For non-MIDP 2.0 based handsets (e.g.  ...  /services-use-cases-and-future-challenges-for-near-field-communication-the-stolpan-project  ... 
doi:10.5772/20358 fatcat:orhaigwwjratpigte2z6q2ur5m

Authentication in a Multi-access IMS Environment

Do van Thanh, Ivar Jørstad, Paal Engelstad, Tore Jønvik, Boning Feng, Do van Thuan
2008 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications  
The standard ISIM-based authentication mechanism of IMS is only intended for mobile phones and cannot be used for fixed IMS clients on stationary devices without SIM cards.  ...  These applications are assumed to be located on the same stationary device as the IMS client, and might for example be browsers, contact lists and email clients.  ...  level authentication in middleware and application level authentication.  ... 
doi:10.1109/wimob.2008.80 dblp:conf/wimob/ThanhJEJFT08 fatcat:4kadmb7zlnhtnfb4hlgkspyhcm

Secure Bluetooth for Trusted m-Commerce

Pasquale Stirparo, Jan Löschner
2013 International Journal of Communications, Network and System Sciences  
Keywords : Bluetooth; Mobile Security; Mobile Commerce; Privacy  906 million mobile phones sold in 2010, almost 100 percent with Bluetooth technology.  171 million laptops shipped in 2010, including  ...  Just in 2010, 906 million mobile Bluetooth enabled phones had been sold, and in 2011, there were more than 40 million Bluetooth enabled health and medical devices on the market.  ...  The application will interact with the UICC via Secure Middleware [16] , making the payment a secure transaction.  ... 
doi:10.4236/ijcns.2013.66030 fatcat:hbiasjkgzrellfgy4dlmrzhifi

Challenges to Next Generation Services in IP Multimedia Subsystem

Kai-Di Chang, Chi-Yuan Chen, Jiann-Liang Chen, Han-Chieh Chao
2010 Journal of Information Processing Systems  
for 3G and even future 4G networks.  ...  The aim of IP Multimedia Subsystem (IMS) is to integrate mobile communication networks and computer networks.  ...  mobile phones.  ... 
doi:10.3745/jips.2010.6.2.129 fatcat:rqtf2264kzewfllatyfm6bg6se
« Previous Showing results 1 — 15 out of 31 results