Title :
Trusted Computing and Gene Identification Used in 3G Mobile E-Business System
Author :
Liangyin Chen ; Zhishu Li ; Xuwei Li ; Chen, Liangyin ; Zhu, Hong ; Jin, Hu ; Yin, Feng
Author_Institution :
Sch. of Comput. Sci., Sichuan Univ., Chengdu
Abstract :
Millions of people are enjoying the convenience of transferring money and shopping with mobile e-business, but at great risk. Because of the risk, security should be considered a fundamental aspect of e-business system design. Mobile wireless e-business system inherently possesses a higher degree of risk than wired e-business applications, and it requires greater level of security and trust. Special attention must be paid to the mobile e-business. With a well-established infrastructure of 3G system, and with the advent of trusted computing and gene identification technology, this kind of situation will be changed greatly. This paper introduces the trusted platform module, the gene theory and their possible application in the mobile e-business system. It proposes that gene identification (GI) module should be embedded in TPM (trust platform module), 3GTT (3G trusted terminal) and TC PC (trust computing PC) to ensure the trust of each node in the 3G mobile e-business system. It is a theoretically effective method to present the possibility of solving these security and trust issues.
Keywords :
3G mobile communication; electronic commerce; mobile computing; security of data; 3G mobile e-business system; gene identification; gene theory; trusted platform module; Communication system security; Computer science; Credit cards; Cryptography; Embedded computing; Embedded software; Hardware; Internet; Mobile computing; Protocols; 3G Mobile E-Business; Gene Identification; Security; TPM; Trusted computing;
Conference_Titel :
Embedded Software and Systems Symposia, 2008. ICESS Symposia '08. International Conference on
Conference_Location :
Sichuan
Print_ISBN :
978-0-7695-3288-2
DOI :
10.1109/ICESS.Symposia.2008.74