SECURE NETWORK ACCESS USING MULTIPLE APPLICATIONS OF AT-AND-TS SMART-CARD

被引:3
|
作者
SHERMAN, SA
SKIBO, R
MURRAY, RS
机构
来源
AT&T TECHNICAL JOURNAL | 1994年 / 73卷 / 05期
关键词
D O I
10.1002/j.1538-7305.1994.tb00611.x
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Fraud amounting annually to billions of dollars occurs due to the failure of conventional network access security systems, including data, voice, and credit card authorization networks. At the same time, consumers demand greater convenience in their daily lives, where a multitude of passwords and personal identification numbers, badges, keys, and other devices have become unmanageable. In response to the obviously conflicting needs, AT&T has developed a credit card sized device, the contactless AT&T Smart Card. By means of an internal microprocessor, the card provides the secure partitioning of authentication codes and data files, as well as encryption capabilities, using the data encryption standard. This paper provides a basic description of the card technology, and the overall architecture of securing access to multiple networks with the AT&T Smart Card.
引用
收藏
页码:61 / 72
页数:12
相关论文
共 50 条
  • [21] Model-Driven Code Generation for Secure Smart Card Applications
    Moebius, Nina
    Stenzel, Kurt
    Grandy, Holger
    Reif, Wolfgang
    ASWEC 2009: 20TH AUSTRALIAN SOFTWARE ENGINEERING CONFERENCE, PROCEEDINGS, 2009, : 44 - 53
  • [22] An enhanced multi-server authentication protocol using password and smart-card: cryptanalysis and design
    Maitra, Tanmoy
    Islam, S. K. Hafizul
    Amin, Ruhul
    Giri, Debasis
    Khan, Muhammad Khurram
    Kumar, Neeraj
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (17) : 4615 - 4638
  • [23] Activity-based TOD typology for seoul transit station areas using smart-card data
    Shin, Yonggeun
    Kim, Dong-Kyu
    Kim, Eui-Jin
    JOURNAL OF TRANSPORT GEOGRAPHY, 2022, 105
  • [24] Variability in Regularity: Mining Temporal Mobility Patterns in London, Singapore and Beijing Using Smart-Card Data
    Zhong, Chen
    Batty, Michael
    Manley, Ed
    Wang, Jiaqiu
    Wang, Zijia
    Chen, Feng
    Schmitt, Gerhard
    PLOS ONE, 2016, 11 (02):
  • [25] SecureMDD: A Model-Driven Development Method for Secure Smart Card Applications
    Moebius, Nina
    Stenzel, Kurt
    Grandy, Holger
    Reif, Wolfgang
    2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2, 2009, : 841 - 846
  • [26] Strongly secure authenticated key agreement protocol using smart card
    Li, Xiao-Wei
    Zhang, Yu-Qing
    Zhang, Ge-Fei
    Liu, Xue-Feng
    Fan, Dan
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2014, 42 (08): : 1587 - 1593
  • [27] A secure smart card authentication and authorization framework using in multimedia cloud
    Ta-Chih Yang
    Nai-Wei Lo
    Horng-Twu Liaw
    Wei Chen Wu
    Multimedia Tools and Applications, 2017, 76 : 11715 - 11737
  • [28] A secure smart card authentication and authorization framework using in multimedia cloud
    Yang, Ta-Chih
    Lo, Nai-Wei
    Liaw, Horng-Twu
    Wu, Wei Chen
    MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (09) : 11715 - 11737
  • [29] A provable secure access control using smart cards
    Yang, FY
    Jan, JK
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2003, 49 (04) : 1223 - 1226
  • [30] Validation of Activity-Based Travel Demand Model using Smart-Card Data in Seoul, South Korea
    Cho, Sungjin
    Do Lee, Won
    Hwang, Jeong-Hwan
    Kochan, Bruno
    Knapen, Luk
    Bellemans, Tom
    Choi, Keechoo
    Joh, Chang-Hyun
    6TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT-2015), THE 5TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2015), 2015, 52 : 707 - 712