06.11.2014 Views

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 5<br />

Smart Card Management<br />

Architecture<br />

Contents<br />

5.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111<br />

5.2 GlobalPlat<strong>for</strong>m Card Management Framework . . . . . . . . . 112<br />

5.3 Multos Card Management Framework . . . . . . . . . . . . . . . 114<br />

5.4 Proposed Smart Card Management Framework . . . . . . . . . 116<br />

5.5 Card Management-Related Issues . . . . . . . . . . . . . . . . . 121<br />

5.6 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126<br />

In this chapter, we discuss two of the most widely accepted and deployed smart card management<br />

architectures in the smart card industry, namely GlobalPlat<strong>for</strong>m and Multos. We<br />

explain how these architectures do not fully comply with the UCOM. We then describe our<br />

novel card management architecture designed <strong>for</strong> the UCTD framework. Finally, we discuss<br />

three new security issues raised by the proposed architecture.<br />

110

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!