2016
DOI: 10.1155/2016/5046284
|View full text |Cite
|
Sign up to set email alerts
|

A Tokenization-Based Communication Architecture for HCE-Enabled NFC Services

Abstract: Following the announcement of Host Card Emulation (HCE) technology, card emulation mode based Near Field Communication (NFC) services have gained further appreciation as an enabler of the Cloud-based Secure Element (SE) concept. A comprehensive and complete architecture with a centralized and feasible business model for diverse HCE-based NFC services will be highly appreciated, particularly by Service Providers and users. To satisfy the need in this new emerging research area, a Tokenizationbased communication… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 16 publications
0
4
0
Order By: Relevance
“…Moreover, connections to external authentication services can be realized in order to offer 1FA, 2FA or MFA for heightened security scenarios. In situations where additional security layers are needed, integration with OTP (one-time password) services via OTA (over-the air) [15,16] or biometric controls can be added. The infrastructure layer, in essence, provides the backbone, supporting and enhancing all functionalities of the BlockSSI-CRS system.…”
Section: System Architecturementioning
confidence: 99%
“…Moreover, connections to external authentication services can be realized in order to offer 1FA, 2FA or MFA for heightened security scenarios. In situations where additional security layers are needed, integration with OTP (one-time password) services via OTA (over-the air) [15,16] or biometric controls can be added. The infrastructure layer, in essence, provides the backbone, supporting and enhancing all functionalities of the BlockSSI-CRS system.…”
Section: System Architecturementioning
confidence: 99%
“…Summary from [9]- [11], [13], [14], a TSP of centralized tokenization system generally has the following components:…”
Section: A Centralized Tokenization Technologiesmentioning
confidence: 99%
“…If the OTP verification succeeds, SP generates the Access Token ( Token ) for the user (step 6) and sends it to the smartwatch (step 7). Although we do not need specific assumptions on the token generation procedure, we suggest the usage of Random Number Generator algorithms for creating token values as described in the work of Ozdenizci et al…”
Section: Use Case Scenario: Smart Lock Access Controlmentioning
confidence: 99%