USIM Application Toolkit (USAT) is a command interaction mechanism between mobile Terminal and SIM card, SIM card applications can interact with users or terminals by calling USAT capability to realize various services. If these capabilities are improperly managed or not reasonably used and controlled, they may bring different levels of security risks. In addition to the hundreds of millions of user base of SIM cards, these security risks may cause extensive adverse effects. Based on the introduction of USAT capabilities, this paper has analyzed its typical security risks, then verified them one by one, and finally gave suggestions.
The digital car key is available on smart devices now. People no longer have to bring the key fob to unlock and start the engine. The existing schemes have some problems, such as poor device compatibility and poor user experience. In this paper, we proposed an unperceived digital car key scheme based on Bluetooth Low Energy (BLE) SIM card. After owner paring, the vehicle automatically locks/unlocks when the terminal device with the BLE SIM card approaches/leaves it. The data of the digital car key is stored in the secure element of the Bluetooth SIM card. The digital credentials are exchanged and mutually authenticated through a Bluetooth connection between the vehicle and the BLE SIM card. Compared to the existing schemes, our scheme has better device compatibility and a better user experience.
At present, fingerprint authentication is one of the main authentication methods on terminals, but its security level is not enough. SIM-based authentication services have high security level and are being used more and more widely. However, SIM card authentication requires users to input PIN code, which affects user experience to some extent. In this paper, the fingerprint authentication technology, SIM card and SIM with fingerprint technologies are studied, and this paper proposes an authentication framework which combines SIM card and fingerprint authentication technology, this framework greatly enhance the user experience of SIM card authentication, at the same time it also increased the level of security for fingerprint authentication, which can be applied in all kinds of application scenarios with high level security requirements.
KEYWORDS: Computer security, Network security, Information security, Internet, Data transmission, Data storage, Telecommunications, System on a chip, Security technologies, Data communications
The identification information of the IoT device is an important content for the device configuration and management. In terms of identification carrier technology, compared to passive identification technologies such as barcodes and QR codes, security chips and modules as active identification carriers can actively initiate a connection to the platform side, without the need for identification reading and writing equipment to trigger, which is more automated and intelligent. However, the cost of the security chip is high, and the security level of the module is relatively low. Both of them need to be equipped with special software to realize the management ability of the identification. Neither of the two solutions can fully meet the needs of the IoT terminal. The IoT SIM card has the advantages of low cost, high universality, high security, two-way communication capabilities, etc., and can realize the function of active identification carrier. Therefore, this paper proposes a SIM card-based IoT identification management scheme. Through the management platform and the identification card application and other modules can manage the identification of IoT equipment, and at the same time, combined with the IoT security service system, the safety protection of identification is realized. This method is based on the BIP channel and does not require much management cost. It is a solution with high security, low cost and better convenience, and has a good application prospect in the field of equipment management.
Based on the analysis of the SIM card based Internet of Things security service, this paper proposes a secure communication module solution based on SIM card as root of trust. The solution can provide Internet of Things users a transparent policy management, transparent secure communication service which can help device users to realize security service transparently. The solution provides Internet of Things users with a more intelligent, more convenient management of secure communication.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.