Kamel et al., 2016 - Google Patents

Secure model for SMS exchange over GSM

Kamel et al., 2016

View PDF
Document ID
139297203189233441
Author
Kamel M
George L
Publication year
Publication venue
International Journal of Computer Network and Information Security

External Links

Snippet

Distributed systems use General Packet Radio Service (GPRS) to exchange information between different members of the system. The members of the system depend critically upon their ability to access internet connection in order to exchange data via GPRS and the …
Continue reading at www.mecs-press.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/357Cards having a plurality of specified features
    • G06Q20/3578Hierarchy of users of cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices
    • G06Q20/36Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2143Clearing memory, e.g. to prevent the data from being stolen
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2111Location-sensitive, e.g. geographical location, GPS

Similar Documents

Publication Publication Date Title
JP3816337B2 (en) Security methods for transmission in telecommunications networks
EP2341724B1 (en) System and method for secure transaction of data between wireless communication device and server
FI112418B (en) Method for checking data integrity, system and mobile
US8499156B2 (en) Method for implementing encryption and transmission of information and system thereof
US6633979B1 (en) Methods and arrangements for secure linking of entity authentication and ciphering key generation
Saxena et al. Authentication protocol for an IoT-enabled LTE network
EP2416524A2 (en) System and method for secure transaction of data between wireless communication device and server
CN101183938A (en) Wireless network security transmission method, system and equipment
BRPI0418366B1 (en) SYSTEM AND METHOD FOR GENERATING REPRODUCABLE SESSION KEYS
CN112104454B (en) Data secure transmission method and system
CN105792190B (en) Data encryption, decryption and transmission method in communication system
JP7461515B2 (en) Data transmission methods and systems, electronic equipment, and computer-readable storage media
Cattaneo et al. Security Issues and Attacks on the GSM Standard: a Review.
CN109951513A (en) Anti- quantum calculation wired home quantum cloud storage method and system based on quantum key card
CN1316405C (en) Method for obtaining digital siguature and realizing data safety
Croft et al. Using an approximated one-time pad to secure short messaging service (SMS)
Borsc et al. Wireless security & privacy
CN110572825A (en) Wearable equipment authentication device and authentication encryption method
Abdo et al. EC-AKA2 a revolutionary AKA protocol
Kamel et al. Secure model for SMS exchange over GSM
Ekwonwune et al. Design and implementation of end to end encrypted short message service (SMS) using hybrid cipher algorithm
Khan et al. An HTTPS approach to resist man in the middle attack in secure SMS using ECC and RSA
CN114978769A (en) Unidirectional lead-in device, method, medium, and apparatus
CN112054905B (en) Secure communication method and system of mobile terminal
Al-juaifari Secure SMS Mobile Transaction with Peer to Peer Authentication Design for Mobile Government