Kasper et al., 2013 - Google Patents
Rights management with NFC smartphones and electronic ID cards: A proof of concept for modern car sharingKasper et al., 2013
View PDF- Document ID
- 8987705710022799522
- Author
- Kasper T
- Kühn A
- Oswald D
- Zenger C
- Paar C
- Publication year
- Publication venue
- International Workshop on Radio Frequency Identification: Security and Privacy Issues
External Links
Snippet
Numerous contactless smartcards (and the corresponding RFID readers) are compatible with NFC, eg, Mifare cards and the governmental ID card in Germany called nPA. NFC- enabled smartphones and other NFC objects such as door locks have become widespread …
- 230000000875 corresponding 0 abstract description 10
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/067—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
- G06K19/07—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
- G06K19/0723—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips the record carrier comprising an arrangement for non-contact communication, e.g. wireless communication circuits on transponder cards, non-contact smart cards or RFIDs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
- G06F21/35—User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Yang | Security Enhanced EMV‐Based Mobile Payment Protocol | |
CN110036613B (en) | System and method for providing identity authentication for decentralized applications | |
US20140365781A1 (en) | Receiving a Delegated Token, Issuing a Delegated Token, Authenticating a Delegated User, and Issuing a User-Specific Token for a Resource | |
CN104040553B (en) | Method for executing application program in NFC device | |
EP3017580B1 (en) | Signatures for near field communications | |
US11829506B2 (en) | System and method for generation, storage, administration and use of one or more digital secrets in association with a portable electronic device | |
US20190087814A1 (en) | Method for securing a payment token | |
Dmitrienko et al. | SmartTokens: Delegable access control with NFC-enabled smartphones | |
CN101300808A (en) | Method and arrangement for secure authentication | |
JP2008538668A (en) | Method and apparatus for connecting to SIM card accommodated in mobile terminal device | |
KR20090041352A (en) | How to personalize your secure NFC chipset | |
EP3813073B1 (en) | Method and system for securing sensitive information | |
Alpár et al. | Using NFC phones for proving credentials | |
KR20140098872A (en) | security system and method using trusted service manager and biometric for web service of mobile nfc device | |
Alpirez Bock et al. | Security reductions for white-box key-storage in mobile payments | |
CA2779654A1 (en) | Method for secure interaction with a security element | |
CN110278084A (en) | eID establishment method, related equipment and system | |
EP3048553B1 (en) | Method for distributing applets, and entities for distributing applets | |
Kostiainen et al. | Towards user-friendly credential transfer on open credential platforms | |
Cooijmans et al. | Secure key storage and secure computation in Android | |
Theuermann et al. | Mobile-only solution for server-based qualified electronic signatures | |
Ebadi Ansaroudi et al. | Navigating secure storage requirements for EUDI Wallets: a review paper | |
Armando et al. | Trusted host-based card emulation | |
Hölzl et al. | Real-world Identification for an Extensible and Privacy-preserving Mobile eID | |
Akram et al. | A novel consumer-centric card management architecture and potential security issues |