Kamel et al., 2016 - Google Patents
Secure Model for SMS Exchange over GSM.Kamel et al., 2016
View PDF- Document ID
- 139297203189233441
- Author
- Kamel M
- George L
- Publication year
- Publication venue
- International Journal of Computer Network & Information Security
External Links
Snippet
Distributed systems use General Packet Radio Service (GPRS) to exchange information between different members of the system. The members of the system depend critically upon their ability to access internet connection in order to exchange data via GPRS and the …
- 238000004891 communication 0 abstract description 15
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/357—Cards having a plurality of specified features
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices
- G06Q20/36—Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2111—Location-sensitive, e.g. geographical location, GPS
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2143—Clearing memory, e.g. to prevent the data from being stolen
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110971415B (en) | An anonymous access authentication method and system for a space-earth integrated spatial information network | |
JP3816337B2 (en) | Security methods for transmission in telecommunications networks | |
EP2341724B1 (en) | System and method for secure transaction of data between wireless communication device and server | |
CN101183938B (en) | A wireless network security transmission method, system and device | |
FI112418B (en) | Method for checking the integrity of data, systems and mobile terminal | |
CN111447276B (en) | Encryption continuous transmission method with key agreement function | |
US6633979B1 (en) | Methods and arrangements for secure linking of entity authentication and ciphering key generation | |
Saxena et al. | Authentication protocol for an IoT-enabled LTE network | |
EP2416524A2 (en) | System and method for secure transaction of data between wireless communication device and server | |
EP1248483A1 (en) | System and method for providing secure communications between wireless units using a common key | |
CN112104454B (en) | Data secure transmission method and system | |
EP3883178A1 (en) | Encryption system and method employing permutation group-based encryption technology | |
CN105792190B (en) | Data encryption, decryption and transmission method in communication system | |
CN110830396A (en) | Physical layer key-based IMSI privacy protection method and device | |
CN109951513A (en) | Anti- quantum calculation wired home quantum cloud storage method and system based on quantum key card | |
CN112020038A (en) | Domestic encryption terminal suitable for rail transit mobile application | |
CN1316405C (en) | Method for obtaining digital siguature and realizing data safety | |
Croft et al. | Using an approximated one-time pad to secure short messaging service (SMS) | |
Borsc et al. | Wireless security & privacy | |
CN105592431A (en) | Short message encryption method based on iOS system mobile terminal | |
Abdo et al. | EC-AKA2 a revolutionary AKA protocol | |
CN114978481B (en) | Anti-quantum computing communication system based on post-quantum cryptography CA | |
Kamel et al. | Secure Model for SMS Exchange over GSM. | |
CN213938340U (en) | 5G Application Access Authentication Network Architecture | |
Ekwonwune et al. | Design and implementation of end to end encrypted short message service (SMS) using hybrid cipher algorithm |