DocumentCode :
638275
Title :
Mobile Application Protection Solution Based on 3G Security Architecture and OpenID
Author :
Xiang Feng ; Yonghe Wu ; Xueqiang Yan
Author_Institution :
Shanghai Eng. Res. Center of Digital Educ. Equip., ECNU, Shanghai, China
fYear :
2013
fDate :
18-20 June 2013
Firstpage :
1
Lastpage :
7
Abstract :
Copyright attacks on mobile application is a critical issue for mobile network operators (MNOs) and application and content providers who have deployed AS. This paper proposes a solution for this issue that leverages 3G security architecture. A trusted mobile software runtime is designed to control the execution of the mobile application. A dynamic Software ID and security key are created and deployed on both the application store and mobile device for authorization of software execution requests and to invoke web services. The Software ID will be updated each time the mobile application is executed and will be stored on the server side. The mobile software protection model, which is protected by a universal integrated circuit card will be stored on the client side. The proposed solution enables a trusted computing environment that leverages the existing resources and capability of mobile network operators for developers and stakeholders. Thus it can prevent several types of mobile application crack issues including redistribution of the application to unauthorized devices, modification of the application, copy application to other devices through cracking the UICC and unauthorized action to obtain web service URLs to consume the web service.
Keywords :
3G mobile communication; Web services; authorisation; digital rights management; mobile computing; software architecture; telecommunication security; trusted computing; 3G security architecture; MNO; OMA DRM; OpenID; URL; Web services; application modification; application store; copy application; copyright attacks; dynamic software ID; mobile application execution control; mobile application protection solution; mobile device; mobile network operators; mobile software protection model; open mobile alliance digital right management; security key; software execution request authorization; trusted computing environment; trusted mobile software runtime; unauthorized devices; universal integrated circuit card; Mobile communication; Mobile computing; Runtime; Security; Software protection; Web services; Authentication; Mobile Application; OpenID; Software Protection;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Software Security and Reliability-Companion (SERE-C), 2013 IEEE 7th International Conference on
Conference_Location :
Gaithersburg, MD
Print_ISBN :
978-1-4799-2924-5
Type :
conf
DOI :
10.1109/SERE-C.2013.24
Filename :
6616318
Link To Document :
بازگشت