Analysis on the Security Assess Requirements of Mobile Banking Based on Mobile Smart Terminal

Article Preview

Abstract:

With the rising user number of mobile smart terminal and the rapid development of Internet in our country, the demand of resources sharing between mobile terminal and the Internet becomes more and more urgent. However, the mobile banking based on mobile smart terminal is facing increasingly serious security threatens. On the basis of a comprehensive analysis of the development and present situation of mobile banking, this paper describes the related security mechanism and potential security threatens of mobile banking. Furthermore, information security technology and development trend of mobile banking are comparised and summarized in this paper, and the security assessment demand for mobile banking is proposed.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1219-1225

Citation:

Online since:

December 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Deng-guoFeng, Yang Zhang, Yu-qing and Zhang. Survey of information security risk assessment [J], Journal of China Institute of Communications, 2004, 25(7):9-14.

Google Scholar

[2] Ying-feng Zhang. Application and Development Trend of Mobile Banking[J]. Financial Copmuter of China, 2010, (5): 22-25.

Google Scholar

[3] Yu-long Pan, Lei Huang, Mu-yuan Ma. The development of mobile banking in our country [J]. Co-operative Economy& Science, 2011, (3): 54-56.

Google Scholar

[4] Liang Sun, Lai-shunZhang, Chao-wen Chang. Research of Police Mobile Security System based on STK Card[J]. Microcomputer Information, 2006, (6): 1-4.

Google Scholar

[5] Jin Zhou. Research on mobile banking system security[J]. Information Security and Technology, 2010, (9): 33-34.

Google Scholar

[6] Chun-xiao Zhou. Analysis and solution of mobile banking security[J]. Telecommunications Technology, 2010, (2): 84-87.

Google Scholar

[7] Dong-fang Lu. Analysis of Smartphone security framework[J]. Information Security and Communications Privacy, 2010, (10): 29-30.

Google Scholar

[8] Guo Chuan-Xiong, Wan H.J., Zhu Wen-Wu. Smart phone attacks and defenses[C]. In. Proceedings of the 3rd Workshop on Hot Topic in Networks, San Diego, CA, USA, 2005: 94-100.

Google Scholar

[9] Yu Zheng, Da-ke He, Ming-xing He. Trusted Computing Based User Authentication for Mobile Equipment[J]. CHINESE JOURNAL OF COMPUTERS, 2006, (8): 1255-1264.

Google Scholar