06.11.2014 Views

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

6.5 Application Acquisition and Contractual Agreement Protocol<br />

requirements listed in section 3.6 as they require a mechanism that is independent of the<br />

administrative authority.<br />

During the STCP ACA , depending upon the relationship between an SP and the administrative<br />

authority of a smart card, the appropriate chain of certicate will be used. There<strong>for</strong>e,<br />

if the SP is not an associate of the administrative authority then the certicate chain (chain<br />

1 in gure 6.1) with the CC certication body as a root will be used; otherwise, chain 2 of<br />

the gure 6.1 will be used.<br />

6.5.2 Protocol Prerequisites<br />

In this section, we extend the protocol prerequisites <strong>for</strong> the STCP ACA<br />

discussed in section 6.3.1 and 4.7.1.<br />

from the ones<br />

PPR-11 Administrative Authority Registration: The smart card is registered with an administrative<br />

authority.<br />

PPR-12 Long Term Keys: Both the smart card and the associated administrative authority<br />

share long-term encryption and MAC keys. These keys are generated at the time<br />

of the smart card's registration with an administrative authority.<br />

PPR-13 List of Syndicated Members: When a card registers with an administrative authority,<br />

the authority may provide the smart card two lists: a list of subscription<br />

charges and a list of associated SPs. The rst list contains details on how the<br />

user will be charged on installation of the individual applications. For example,<br />

charging mechanisms can either be based on xed charges per installation or according<br />

to the size of the application. The associated SPs list includes the details<br />

of individual SPs that are associated with the administrative authority. If a user<br />

requests installation of any of these applications, the installation goes through the<br />

administrative authority and user may not be charged.<br />

6.5.3 Protocol Description<br />

In the STCP ACA , an SP takes the initiator's role so it can be considered as an extension<br />

of the STCP SP . The protocol details and message description are as follows:<br />

142

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!