Mobile Electronic Identity: Securing Payment on Mobile Phones - Information Security Theory and Practice: Security and Privacy of Mobile Devices in Wireless Communication Access content directly
Conference Papers Year : 2011

Mobile Electronic Identity: Securing Payment on Mobile Phones

Abstract

The pervasive use of mobile phones has created a dynamic computing platform that a large percentage of the population carries routinely. There is a growing trend of integrating mobile phones with electronic identity, giving the phone the ability to prove or support the identity of the owner by containing, for example, a tuple of name, ID, photo and public key. While this helps phone owners prove who they are, it does not prove to them that they are giving their identities to intended parties. This is important in its own right for reasons of privacy and avoiding cases of “identity theft”, but all the more important when identity is being provided to support the transfer of value (e.g. in mobile payment) or information. In this paper we show how Human Interactive Security Protocols can support this type of authentication in cases where PKIs are inappropriate, misunderstood or too expensive, concentrating on the case of payment.
Fichier principal
Vignette du fichier
978-3-642-21040-2_2_Chapter.pdf (2.75 Mo) Télécharger le fichier
Origin : Files produced by the author(s)
Loading...

Dates and versions

hal-01573293 , version 1 (09-08-2017)

Licence

Attribution

Identifiers

Cite

Chen Bangdao, A. W. Roscoe. Mobile Electronic Identity: Securing Payment on Mobile Phones. 5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.22-37, ⟨10.1007/978-3-642-21040-2_2⟩. ⟨hal-01573293⟩
107 View
67 Download

Altmetric

Share

Gmail Facebook X LinkedIn More