06.11.2014 Views

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

7.4 Application Binding Protocol Local<br />

third party evaluation [69] to an SP of a server application, and vice versa. If third party<br />

evaluation is not available then both client and server application's SPs can decide on any<br />

other adequate way of establishing trust in each other's application and its functionality.<br />

During this process, they decide the details of the ABP, such as how to per<strong>for</strong>m an on-card<br />

verication and validation of applications. One possible way could be that the SP of a<br />

server application issues a certicate to a client application, and vice versa.<br />

The certicate hierarchy in the ABP is illustrated in gure 7.9. In the absence of CC<br />

evaluation, the certicate hierarchy shown in gure 7.9 will not include Common Criteria<br />

Certication Authority. The client application certicate has the hash value of the application.<br />

Similar contents will also be included in the server application's certicate that<br />

is issued by the SP of the client application. Basically, the enrolment process denes the<br />

restrictions and mechanisms (i.e. certicates, and cryptographic algorithms, etc.) that a<br />

client/server application's SPs agree on <strong>for</strong> the ABP.<br />

7.4 Application Binding Protocol Local<br />

In this section, we begin the discussion by explaining the protocol prerequisite followed by<br />

the protocol description.<br />

7.4.1 Protocol Prerequisites<br />

The prerequisites <strong>for</strong> the ABPL are listed below, and are an extension to the prerequisites<br />

listed in sections 4.7.1, 6.3.1 and 6.5.2 with exception of prerequisites PPR-8 to PPR-13.<br />

PPR-14 O-Card Relationship: The SPs of individual applications trust each other. The<br />

roles of the server and client are predened along with the privilege each client<br />

application is allocated.<br />

PPR-15 Certicated Application State: A client application either has a certicate that is<br />

issued by a third party evaluation authority or by the server application's SP. This<br />

certicate has the hash value of the secure (trusted) state of the client application<br />

as considered by the third party evaluation authority or the server application's<br />

SP. A similar situation applies <strong>for</strong> the server application's certicate that is issued<br />

by the client application's SP or third party evaluators.<br />

PPR-16 Trustworthy TEM: Applications trust the TEM and they have established a longterm<br />

shared secret key with it at the time of application installation (section 7.3.2).<br />

174

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!