Kamel et al., 2016 - Google Patents
Secure model for SMS exchange over GSMKamel et al., 2016
View PDF- Document ID
- 139297203189233441
- Author
- Kamel M
- George L
- Publication year
- Publication venue
- International Journal of Computer Network and Information Security
External Links
Snippet
Distributed systems use General Packet Radio Service (GPRS) to exchange information between different members of the system. The members of the system depend critically upon their ability to access internet connection in order to exchange data via GPRS and the …
- 238000004891 communication 0 abstract description 15
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/357—Cards having a plurality of specified features
- G06Q20/3578—Hierarchy of users of cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices
- G06Q20/36—Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2143—Clearing memory, e.g. to prevent the data from being stolen
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2111—Location-sensitive, e.g. geographical location, GPS
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP3816337B2 (en) | Security methods for transmission in telecommunications networks | |
EP2341724B1 (en) | System and method for secure transaction of data between wireless communication device and server | |
FI112418B (en) | Method for checking data integrity, system and mobile | |
US8499156B2 (en) | Method for implementing encryption and transmission of information and system thereof | |
US6633979B1 (en) | Methods and arrangements for secure linking of entity authentication and ciphering key generation | |
Saxena et al. | Authentication protocol for an IoT-enabled LTE network | |
EP2416524A2 (en) | System and method for secure transaction of data between wireless communication device and server | |
CN101183938A (en) | Wireless network security transmission method, system and equipment | |
BRPI0418366B1 (en) | SYSTEM AND METHOD FOR GENERATING REPRODUCABLE SESSION KEYS | |
CN112104454B (en) | Data secure transmission method and system | |
CN105792190B (en) | Data encryption, decryption and transmission method in communication system | |
JP7461515B2 (en) | Data transmission methods and systems, electronic equipment, and computer-readable storage media | |
Cattaneo et al. | Security Issues and Attacks on the GSM Standard: a Review. | |
CN109951513A (en) | Anti- quantum calculation wired home quantum cloud storage method and system based on quantum key card | |
CN1316405C (en) | Method for obtaining digital siguature and realizing data safety | |
Croft et al. | Using an approximated one-time pad to secure short messaging service (SMS) | |
Borsc et al. | Wireless security & privacy | |
CN110572825A (en) | Wearable equipment authentication device and authentication encryption method | |
Abdo et al. | EC-AKA2 a revolutionary AKA protocol | |
Kamel et al. | Secure model for SMS exchange over GSM | |
Ekwonwune et al. | Design and implementation of end to end encrypted short message service (SMS) using hybrid cipher algorithm | |
Khan et al. | An HTTPS approach to resist man in the middle attack in secure SMS using ECC and RSA | |
CN114978769A (en) | Unidirectional lead-in device, method, medium, and apparatus | |
CN112054905B (en) | Secure communication method and system of mobile terminal | |
Al-juaifari | Secure SMS Mobile Transaction with Peer to Peer Authentication Design for Mobile Government |