{"title":"Better User Protection with Mobile Identity","authors":"D. Thanh, T. Jønvik, I. Jørstad, Do van Thuan","doi":"10.1109/ICITCS.2013.6717809","DOIUrl":null,"url":null,"abstract":"So far mobile network users are enjoying better protection than Internet users thanks to the SIM card, a tampered resistant module providing strong authentication. To offer better protection to Internet users this paper proposes a solution called Universal Mobile Identity, which extends the usage of the current mobile identity to the access of Internet services. For signing on from mobile phone, tablet, laptop, etc. the SIM card is used to provide strong and user-friendly authentication. The architecture of Universal Mobile Identity is thoroughly described and illustrated by use cases.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 International Conference on IT Convergence and Security (ICITCS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICITCS.2013.6717809","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
So far mobile network users are enjoying better protection than Internet users thanks to the SIM card, a tampered resistant module providing strong authentication. To offer better protection to Internet users this paper proposes a solution called Universal Mobile Identity, which extends the usage of the current mobile identity to the access of Internet services. For signing on from mobile phone, tablet, laptop, etc. the SIM card is used to provide strong and user-friendly authentication. The architecture of Universal Mobile Identity is thoroughly described and illustrated by use cases.