The Research of Identity Management Services and its Key Devices for Mobile Internet

Article Preview

Abstract:

This paper presents an eID based solution to use for mobile internet, namely a platform structure and some key devices to realize the solution, in order to bring us an approach more secure and convenience to access online banking services and avoids some privacy leaking and online banking fishing problems.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 546-547)

Pages:

1245-1249

Citation:

Online since:

July 2012

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Per E. Pedersen, Adoption of Mobile Internet Services: An Exploratory Study of Mobile Commerce Early Adopters, Journal of Organizational Computing and Electronic Commerce, Vol. 15, Issue 3, (2005). pp: 203-222.

DOI: 10.1207/s15327744joce1503_2

Google Scholar

[2] G. Muller , S. Wohlgemuth, Study on mobile identity management. FIDIS – Future of Identity in the Information Society, deliverable 3. 3 , (2005).

Google Scholar

[3] CNNIC: the 28th China Internet network development state statistic report. on http: /www. cnnic. cn/dtygg/dtgg/201107/t20110719_22132. html.

Google Scholar

[4] G. Kalman, J. Noll, "SIM as secure key storage in communication networks. In: Wireless and Mobile Communications, edited by Dini, C., Dohler, M., Eltoweissy, M., Rui, T., Skouby, K.E. Third International Conference on, Gosier, Guadeloupe(2007).

DOI: 10.1109/icwmc.2007.82

Google Scholar

[5] FIDIS - Future of Identity in the Information Society: Budapest declaration on machine readable travel documents (MRTDs), (2006) , on http: /www. fidis. net/fileadmin/fidis/press/budapest declaration on MRTD. en. 20061106. pdf.

Google Scholar

[6] The Mobile Internet Report key themes from Morgan Stanley's Mobile Internet Report, published 12/15/2009. on http: /www. ms. com/techresearch.

Google Scholar

[7] CHEN Bing, ZOU Xiang, ZHOU Guo-yong, The Development Trend of the Network Identity Management, Netinfo security, ( 2011), pp.5-8.

Google Scholar

[8] Jin Bo, eID Internet Identity management, on http: /www. cio360. net/h/1784/366189-16071. html.

Google Scholar