Information Technology Reference
In-Depth Information
Figure 8. The Example of the USF-based Multimedia Contents Sharing among FMC devices
on the terminal itself can steal personal sensitive
information in the terminal memory, disable the
normal operations of the terminal and ruin the
networks by unlimited communication requests
such as SMS. The terminal can be the path for
the viruses to invade the network devices even
though they cannot attack the terminal. Therefore,
the target viruses should be ones that can attack
not only the information stored in the terminal but
also the network devices in the FMC networks.
Any file or any traffic can be transferred to the
USF-powered UICC for the scanning and curing.
be utilized as the FMC terminal for the finance
services.
In Republic of Korea, the public certificates,
the authenticity of it can be guaranteed by the
government, should be utilized for the user
authentication, the digital signature for each fi-
nance transaction and so forth. According to the
guidelines for finance services of smart phones
from the public organization in Republic of
Korea, the smart phone should utilize the public
certificates for the purpose mentioned earlier. The
UICC supporting the USF can be utilized as the
secure storage of the public certificates and also
the cryptographic token for generating the digital
signature using the public certificate stored in the
UICC. Furthermore, the UICC can be facilitated
for issuing the public certificates by supporting
the RSA key generation and other required func-
tionalities such as CMP, etc. With the help of the
USF, the secure finance service environment for
the smart phones can be achieved.
Finance Solution for Smart Phone
In the pervasive FMC environments, any terminal
can be utilized as the device for finance services
such as banking, stock, and so forth. Especially,
the smart phone, which can be considered as the
small computer supporting lots of features, can
Search WWH ::




Custom Search