{"title":"善用流动身份保障用户安全","authors":"D. Thanh, T. Jønvik, I. Jørstad, Do van Thuan","doi":"10.1109/ICITCS.2013.6717809","DOIUrl":null,"url":null,"abstract":"So far mobile network users are enjoying better protection than Internet users thanks to the SIM card, a tampered resistant module providing strong authentication. To offer better protection to Internet users this paper proposes a solution called Universal Mobile Identity, which extends the usage of the current mobile identity to the access of Internet services. For signing on from mobile phone, tablet, laptop, etc. the SIM card is used to provide strong and user-friendly authentication. The architecture of Universal Mobile Identity is thoroughly described and illustrated by use cases.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Better User Protection with Mobile Identity\",\"authors\":\"D. Thanh, T. Jønvik, I. Jørstad, Do van Thuan\",\"doi\":\"10.1109/ICITCS.2013.6717809\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"So far mobile network users are enjoying better protection than Internet users thanks to the SIM card, a tampered resistant module providing strong authentication. To offer better protection to Internet users this paper proposes a solution called Universal Mobile Identity, which extends the usage of the current mobile identity to the access of Internet services. For signing on from mobile phone, tablet, laptop, etc. the SIM card is used to provide strong and user-friendly authentication. The architecture of Universal Mobile Identity is thoroughly described and illustrated by use cases.\",\"PeriodicalId\":420227,\"journal\":{\"name\":\"2013 International Conference on IT Convergence and Security (ICITCS)\",\"volume\":\"47 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 International Conference on IT Convergence and Security (ICITCS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICITCS.2013.6717809\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 International Conference on IT Convergence and Security (ICITCS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICITCS.2013.6717809","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
So far mobile network users are enjoying better protection than Internet users thanks to the SIM card, a tampered resistant module providing strong authentication. To offer better protection to Internet users this paper proposes a solution called Universal Mobile Identity, which extends the usage of the current mobile identity to the access of Internet services. For signing on from mobile phone, tablet, laptop, etc. the SIM card is used to provide strong and user-friendly authentication. The architecture of Universal Mobile Identity is thoroughly described and illustrated by use cases.