06.11.2014 Views

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

9.4 Decommissioning Process<br />

process only tries to nd dependent applications and point out to the user the list of applications<br />

that cannot resolve their dependencies on App D . The application removal process<br />

will then iterate through the applications <strong>for</strong> deletion and delete them one at a time.<br />

In cases where the deletion request was initiated by the SP of the App D , and it requires<br />

deletion of other applications that do not belong to the SP, the user will still be notied. If<br />

the user opts <strong>for</strong> not deleting it, the SP can then proceed with blocking the App D . In the<br />

block state, an application is not accessible to the user; however, dependent applications<br />

can still access it through the application sharing mechanism.<br />

As discussed be<strong>for</strong>e, the UCOM deletion process only provides dependent applications<br />

with an opportunity to gracefully resolve their dependencies. If an application does not<br />

have such a mechanism, the UCOM deletion process marks that application <strong>for</strong> deletion.<br />

Furthermore, during the deletion process the App D 's resource manager that maintains the<br />

access to the application via the smart card rewall is removed. Thus, if a dependent<br />

application tries to access App D resources, the rewall mechanism will reject that request.<br />

If the application does not gracefully proceed after the rewall rejects its request, the card<br />

security manager can either block the application or mark it <strong>for</strong> deletion. There<strong>for</strong>e, any<br />

application that aects the reliability of the smart card plat<strong>for</strong>m will be removed or at<br />

least blocked by the card security manager.<br />

9.4 Decommissioning Process<br />

The decommissioning process in the UCOM involves deletion of all applications from a<br />

UCTD and removal of any user-specic data stored by the respective TEM or UCTD<br />

plat<strong>for</strong>m managers (section 4.2). The decommissioning process is initiated by the user<br />

in a manner similar to the ownership acquisition process (section 4.6.3). However, in the<br />

decommissioning process the user requests a UCTD to delete all applications in a manner<br />

similar to the one discussed in the previous section but this time the UCTD does not check<br />

<strong>for</strong> dependencies. Once all applications are deleted, the card security manager will delete<br />

the user-specic cryptographic keys (e.g. user signature key) and associated certicates.<br />

It will then request the deletion of ownership credentials that the user has set during the<br />

ownership acquisition process. After the decommissioning process is completed, the UCTD<br />

reverts to the state it was in when the user acquired it from the card manufacturer (or<br />

UCTD suppliers). In other words, it is a blank UCTD.<br />

222

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!