06.11.2014 Views

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

5.4 Proposed Smart Card Management Framework<br />

5.4 Proposed Smart Card Management Framework<br />

In the UCTD proposal, the management framework is divided into two categories based on<br />

whether the device is under administrative control or not. There<strong>for</strong>e, these two categories<br />

are referred as administrative and user management, where administrative management<br />

corresponds to the CASC architecture and user management corresponds to the UCOM<br />

architecture.<br />

5.4.1 Administrative Management Architecture<br />

In the administrative management architecture, a smart card is under the shared ownership<br />

of an administrative authority and the respective cardholder (section 3.6). The framework<br />

is shown in gure 5.3 and the dotted lines in this gure represent optional messages.<br />

Administrative<br />

Authority<br />

Installation<br />

Authorised<br />

Smart Cards<br />

Card<br />

Manufacturer<br />

Card<br />

Issued<br />

Use<br />

Charge<br />

Installation<br />

Authorisation<br />

Cardholder<br />

Request Application &<br />

Provide Credentials<br />

Syndicate Member<br />

Register Customer<br />

Customer<br />

Credentials<br />

Request Application<br />

Installation Authorisation<br />

Service Provider<br />

Evaluation<br />

Certificate<br />

Product<br />

Evaluation<br />

Third Party<br />

Evaluation<br />

List of<br />

Syndicate<br />

Members<br />

Evaluation<br />

Certificate<br />

Smart Card<br />

<strong>Security</strong> Assurance<br />

Request<br />

Product Evaluation<br />

Certificate<br />

Application ID<br />

Administrative Authority ID<br />

Application & optional Authorisation<br />

from Administrative Authority<br />

Application Download Certificate<br />

Figure 5.3: Administrative card management framework (CASC: section 3.6)<br />

The card manufacturer gets its product evaluated by a third party that issues an evaluation<br />

certicate. The smart cards are then acquired by the administrative authority that takes<br />

administrative control and issues the cards to individual cardholders. The cardholder then<br />

has ownership, which is delegated to the cardholder under certain terms and conditions.<br />

The cardholder has to register with the relevant SP to gain access to their application. The<br />

registration process generates customer credentials that are issued by the SP and used by<br />

cardholders to download the application(s) onto their smart cards. The cardholder then<br />

provides these credentials to the smart card along with the details of the SP's application<br />

server (section 3.4.6.1). Be<strong>for</strong>e the SP leases its application, it requests the smart card to<br />

provide a security assurance, which is furnished by providing the evaluation certicate and<br />

a validation proof (section 4.4.3). The SP then sends the application identity to the smart<br />

card, which will check whether the application belongs to the administrative authority's<br />

116

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!