Maia et al., 2012 - Google Patents
Java JCA/JCE programming in Android with SD smart cardsMaia et al., 2012
View PDF- Document ID
- 8105494366449321418
- Author
- Maia L
- Correia M
- Publication year
- Publication venue
- 7th Iberian Conference on Information Systems and Technologies (CISTI 2012)
External Links
Snippet
The mobile phone is currently the preferred means by which people can communicate and interact with each other at a distance. Not only that, the smart-phone nowadays constitutes the full embodiment of the truly personal device users carry constantly with them …
- 239000008186 active pharmaceutical agent 0 description 12
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
- G06F21/35—User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Shepherd et al. | Secure and trusted execution: Past, present, and future-a critical review in the context of the internet of things and cyber-physical systems | |
KR101712784B1 (en) | System and method for key management for issuer security domain using global platform specifications | |
JP5852265B2 (en) | COMPUTER DEVICE, COMPUTER PROGRAM, AND ACCESS Permission Judgment Method | |
US8171295B2 (en) | Information processing apparatus, a server apparatus, a method of an information processing apparatus, a method of a server apparatus, and an apparatus executable process | |
Dietrich et al. | Implementation aspects of mobile and embedded trusted computing | |
CN110326266B (en) | Data processing method and device | |
TW201512879A (en) | Mobile communication device and method of operating thereof | |
Bouazzouni et al. | Trusted mobile computing: An overview of existing solutions | |
CN110383240B (en) | Method and apparatus for containerized secure computing resources | |
US20190012664A1 (en) | Method and system for enhancing the security of a transaction | |
KR101504647B1 (en) | Portable mass storage with virtual machine activation | |
EP3048553B1 (en) | Method for distributing applets, and entities for distributing applets | |
US10025575B2 (en) | Method for installing security-relevant applications in a security element of a terminal | |
Cooijmans et al. | Secure key storage and secure computation in Android | |
JP2016012902A (en) | Electronic data utilization system, portable terminal device, and method for electronic data utilization system | |
Maia et al. | Java JCA/JCE programming in Android with SD smart cards | |
Kostiainen | On-board credentials: an open credential platform for mobile devices | |
KR101836236B1 (en) | User authentication method and apparatus using authentication between applications, program therefor | |
Toegl et al. | Towards platform-independent trusted computing | |
Dmitrienko et al. | Market-driven code provisioning to mobile secure hardware | |
Tamrakar et al. | Can hand-held computers still be better smart cards? | |
Othman et al. | Towards a high-level trusted computing API for Android software stack | |
Ribeiro | HCE Mobile Ticketing | |
Shepherd et al. | Isolated Hardware Execution Platforms | |
Lilhare | Distribution portal for applications for cryptographic smartcards |