The benefit of using SIM application toolkit in the context of near field communication applications

Gerald Madlmayr, Oliver Dillinger, Josef Langer, Christoph Schaffer, Christian Kantner, Josef Scharinger

Research output: Chapter in Book/Report/Conference proceedingsConference contributionpeer-review

14 Citations (Scopus)

Abstract

NFC is one of the most promising technologies in handsets for business applications like ticketing or payment. Actually those applications require a secure store for keeping sensitive data. Using the SIM card as a removable secure element for proximity applications is one option. We will elaborate a comprehensive study on the requirements and impacts of using the SIM card as a secure store for proximity applications, presenting the pros and cons of combining NFC with the SIM card in handsets. Based on these facts we worked out a concept and necessary processes for an NFC ecosystem based on a SAM. Hence we line out two different approaches for managing applications in the secure element. Finally the effects of this implementation on mobile network operators and application providers as well as consumers are summarized.

Original languageEnglish
Title of host publicationConference Proceedings - 6th International Conference on the Management of Mobile Business, ICMB 2007
PublisherIEEE Computer Society
Pages5-12
Number of pages8
ISBN (Print)0769528031, 9780769528038
DOIs
Publication statusPublished - 2007
Event6th International Conference on the Management of Mobile Business, ICMB 2007 - Toronto, ON, Canada
Duration: 9 Jul 200711 Jul 2007

Publication series

NameConference Proceedings - 6th International Conference on the Management of Mobile Business, ICMB 2007

Conference

Conference6th International Conference on the Management of Mobile Business, ICMB 2007
Country/TerritoryCanada
CityToronto, ON
Period09.07.200711.07.2007

Fingerprint

Dive into the research topics of 'The benefit of using SIM application toolkit in the context of near field communication applications'. Together they form a unique fingerprint.

Cite this