Mobile application protection solution based on 3G security architecture and openID

Xiang Feng, Yonghe Wu, Xueqiang Yan

Research output: Contribution to conferencePaperpeer-review

1 Scopus citations

Abstract

Copyright attacks on mobile application is a critical issue for mobile network operators (MNOs) and application and content providers who have deployed (AS). This paper proposes a solution for this issue that leverages 3G security architecture. A trusted mobile software runtime is designed to control the execution of the mobile application. A dynamic Software ID and security key are created and deployed on both the application store and mobile device for authorization of software execution requests and to invoke web services. The Software ID will be updated each time the mobile application is executed and will be stored on the server side. The mobile software protection model, which is protected by a universal integrated circuit card will be stored on the client side. The proposed solution enables a trusted computing environment that leverages the existing resources and capability of mobile network operators for developers and stakeholders. Thus it can prevent several types of mobile application crack issues including redistribution of the application to unauthorized devices, modification of the application, copy application to other devices through cracking the (UICC) and unauthorized action to obtain web service URLs to consume the web service.

Original languageEnglish
Pages1-7
Number of pages7
DOIs
StatePublished - 2013
Event7th International Conference on Software Security and Reliability, SERE-C 2013 - Gaithersburg, MD, United States
Duration: 18 Jun 201320 Jun 2013

Conference

Conference7th International Conference on Software Security and Reliability, SERE-C 2013
Country/TerritoryUnited States
CityGaithersburg, MD
Period18/06/1320/06/13

Keywords

  • Authentication
  • Mobile Application
  • OpenID
  • Software Protection

Fingerprint

Dive into the research topics of 'Mobile application protection solution based on 3G security architecture and openID'. Together they form a unique fingerprint.

Cite this