06.11.2014 Views

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

5.4 Proposed Smart Card Management Framework<br />

channel, to provide smart card security and reliability assurance to the SP, facilitate in<br />

generating domain management credentials, and download the application.<br />

In the UCTD, whether it is in administrative or user management, each SP gets its own<br />

domain. The SP's domain management credentials are mutually generated by the SP and<br />

smart card without involving any o-card entity (e.g. including the card manufacturer).<br />

Applications are directly downloaded to the SP's domain using the cryptographic keys<br />

mutually generated by the smart card and the SP, in contrast to GlobalPlat<strong>for</strong>m that uses<br />

either a push or pull model <strong>for</strong> key sharing (section 5.2.1), or Multos that requires an<br />

application provider to reveal its application code and signature key (section 5.3.1).<br />

In chapter 6, the two variants of the Secure and Trusted Channel Protocol (STCP) referred<br />

as STCP SP and STCP SC are based on the user management architecture.<br />

5.4.3 Types of Application Leases<br />

An application lease refers to issuance of an application to the requesting smart card under<br />

some terms and conditions that are stipulated by the Application Lease Policy (section<br />

3.4.6.2). In this section, we discuss the various types of application leases that an SP can<br />

issue.<br />

1. Card Bound Application Lease: In this lease, an SP issues its application to a specic<br />

smart card and that instance of lease is bound to it. There<strong>for</strong>e, an SP will only issue<br />

one lease per user, which she can have on any of her smart cards; examples of such<br />

a lease may be credit card and (U)SIM card applications.<br />

2. <strong>User</strong> Bound Application Lease: This lease is bound to the user, not to her smart card.<br />

She can install the given application on any number of her smart cards. Examples<br />

of such a lease may be Internet Identity applications [77, 160].<br />

3. Open Application Lease: The open application lease does not bind the lease to either<br />

a user or a smart card. Any smart card, and any user can download this application.<br />

Examples of such applications may be pre-paid mobile telephone usage, pre-paid<br />

calling cards, hotel room access cards, and transport cards. One thing to note is that<br />

the examples are only valid if they do not require any registration of the user be<strong>for</strong>e<br />

and after issuance of the application.<br />

118

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!