Presentation 2012/5/3
A Study on Mobile Access Infrastructure
KATSUYUKI UMEZAWA, TAKASHI KAWANO, NOBUYOSHI MORITA, HIROMI ISOKAWA, MAKOTO KAYASHIMA,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) The number of the domestic cellphone contracts was beyond 112 million. The cellphone became the important infrastructure. In addition, the service provider who treated secure information such as a point and electronic money, the subscriber ID information (we call it ID information) increased. Such a service provider reads and writes ID information to the tampa-resistant device of the cellphone. When service provider reads and writes the ID information to tampa-resistant device, it is necessary to develop application for cell-phones every service provider under the present conditions. In addition, it is necessary for the user to download and install application for the cell-phones which each service provider offers individually. The security mechanism of the application of the cellphone is necessary. In this study, We propose a mobile access infrastructure system to solve such a problem.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) Mobile / Cellular Phone / Smart Phone / Tamper Resistant Device / Smart Card
Paper # Vol.2012-CSEC-57 No.17,Vol.2012-IOT17 No.17
Date of Issue

Conference Information
Committee ICM
Conference Date 2012/5/3(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Information and Communication Management(ICM)
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) A Study on Mobile Access Infrastructure
Sub Title (in English)
Keyword(1) Mobile
Keyword(2) Cellular Phone
Keyword(3) Smart Phone
Keyword(4) Tamper Resistant Device
Keyword(5) Smart Card
1st Author's Name KATSUYUKI UMEZAWA
1st Author's Affiliation Hitachi, Ltd. Information Technology Division()
2nd Author's Name TAKASHI KAWANO
2nd Author's Affiliation Hitachi, Ltd. Security & SmartID Solutions Division
3rd Author's Name NOBUYOSHI MORITA
3rd Author's Affiliation Hitachi, Ltd. Yokohama Research Laboratory
4th Author's Name HIROMI ISOKAWA
4th Author's Affiliation Hitachi, Ltd. Yokohama Research Laboratory
5th Author's Name MAKOTO KAYASHIMA
5th Author's Affiliation Hitachi, Ltd. Yokohama Research Laboratory
Date 2012/5/3
Paper # Vol.2012-CSEC-57 No.17,Vol.2012-IOT17 No.17
Volume (vol) vol.112
Number (no) 22
Page pp.pp.-
#Pages 6
Date of Issue