Nothing Special   »   [go: up one dir, main page]

Maia et al., 2012 - Google Patents

Java JCA/JCE programming in Android with SD smart cards

Maia et al., 2012

View PDF
Document ID
8105494366449321418
Author
Maia L
Correia M
Publication year
Publication venue
7th Iberian Conference on Information Systems and Technologies (CISTI 2012)

External Links

Snippet

The mobile phone is currently the preferred means by which people can communicate and interact with each other at a distance. Not only that, the smart-phone nowadays constitutes the full embodiment of the truly personal device users carry constantly with them …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Similar Documents

Publication Publication Date Title
Shepherd et al. Secure and trusted execution: Past, present, and future-a critical review in the context of the internet of things and cyber-physical systems
KR101712784B1 (en) System and method for key management for issuer security domain using global platform specifications
JP5852265B2 (en) COMPUTER DEVICE, COMPUTER PROGRAM, AND ACCESS Permission Judgment Method
US8171295B2 (en) Information processing apparatus, a server apparatus, a method of an information processing apparatus, a method of a server apparatus, and an apparatus executable process
Dietrich et al. Implementation aspects of mobile and embedded trusted computing
CN110326266B (en) Data processing method and device
TW201512879A (en) Mobile communication device and method of operating thereof
Bouazzouni et al. Trusted mobile computing: An overview of existing solutions
CN110383240B (en) Method and apparatus for containerized secure computing resources
US20190012664A1 (en) Method and system for enhancing the security of a transaction
KR101504647B1 (en) Portable mass storage with virtual machine activation
EP3048553B1 (en) Method for distributing applets, and entities for distributing applets
US10025575B2 (en) Method for installing security-relevant applications in a security element of a terminal
Cooijmans et al. Secure key storage and secure computation in Android
JP2016012902A (en) Electronic data utilization system, portable terminal device, and method for electronic data utilization system
Maia et al. Java JCA/JCE programming in Android with SD smart cards
Kostiainen On-board credentials: an open credential platform for mobile devices
KR101836236B1 (en) User authentication method and apparatus using authentication between applications, program therefor
Toegl et al. Towards platform-independent trusted computing
Dmitrienko et al. Market-driven code provisioning to mobile secure hardware
Tamrakar et al. Can hand-held computers still be better smart cards?
Othman et al. Towards a high-level trusted computing API for Android software stack
Ribeiro HCE Mobile Ticketing
Shepherd et al. Isolated Hardware Execution Platforms
Lilhare Distribution portal for applications for cryptographic smartcards