Skip to main content

Authority Delegation for Safe Social Media Services in Mobile NFC Environment

  • Conference paper
Mobile, Ubiquitous, and Intelligent Computing

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 274))

  • 2720 Accesses

Abstract

With the rapid development of NFC(Near Field Communications) technologies, NFC-enabled mobile devices are replacing the existing RFID such as mobile payment service, access control system of door locks, and ticketing service. Your service access authority through authenticating the mobile device can be delegated to any person temporarily. But when a person wants to share one’s authority to others, it would be considered prevention for abuse of authority. For example, when parents give the payment right to their children, it can be used indiscriminately. And it can be abused when the authority is transferred to a third party without checking authentication code. So transferred tickets or copied access authority of door locks can occur. In this paper, for safe authority delegation, we will contain the authorized user’s identity and check authorization in mobile device whether it contains suitable delegation information or not.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. CBSNEWS, http://www.cbsnews.com/

  2. Mambo, M., Usuda, K., Okamoto, E.: Proxy Signatures: Delegation of the Power to Sign Messages. IEICE Trans. on Fundamentals  E79-A(9), 1338–1353 (1996)

    Google Scholar 

  3. Horster, P., Michels, M., Petersen, H.: Hidden signature schemes based on the discrete logarithm problem and related concepts. In: Proc. of Communications and Multimedia Security 1995. Chapman&Hall (1995)

    Google Scholar 

  4. Seong-Yeol, K., Dong-Hyun, K.: A Protocol to Delegate Signing Right for Multi-level Proxy Signature. J. Korean Institute of Electronic Communication Sciences 3 (2009)

    Google Scholar 

  5. Se-Joon, P., Yong-Jun, L., Hae-Suk, O.: Efficient Proxy Signature Technology using Proxy-Register. J. Korea Information and Communications Society 29 (2003)

    Google Scholar 

  6. Yunlim, K., Okkyung, C., Kangseok, K., Taeshik, S., Manpyo, H., Hongjin, Y., Jai-Hoon, K.: Two-factor authentication system based on extended OTP mechanism. J. Computer Mathematics 89, 1–15 (2013)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jinsung Choi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Choi, J. et al. (2014). Authority Delegation for Safe Social Media Services in Mobile NFC Environment. In: Park, J., Adeli, H., Park, N., Woungang, I. (eds) Mobile, Ubiquitous, and Intelligent Computing. Lecture Notes in Electrical Engineering, vol 274. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-40675-1_60

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-40675-1_60

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-40674-4

  • Online ISBN: 978-3-642-40675-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics