06.11.2014 Views

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Businesses<br />

Governments<br />

Privacy<br />

Preserving<br />

Services<br />

Online<br />

Banking<br />

2.4 The <strong>User</strong> <strong>Centric</strong> <strong>Tamper</strong>-<strong>Resistant</strong> Device<br />

card that supported the ICOM; there<strong>for</strong>e, it does not support as many requirements as a<br />

UCOM-based smart card. We can say that table 2.1 also provides a comparison between<br />

UCOM- and ICOM-based smart cards and their suitability <strong>for</strong> the UCTD initiative.<br />

2.4 The <strong>User</strong> <strong>Centric</strong> <strong>Tamper</strong>-<strong>Resistant</strong> Device<br />

As is apparent from the comparison in table 2.1, a multi-application smart card architecture<br />

has the potential to serve as the underlying framework <strong>for</strong> the UCTD. The crucial point<br />

that has to be taken into account is that smart card architecture is traditionally under<br />

a stringent centralised control, whereas the UCTD requires a more diverse architecture<br />

which also accommodates the user's ownership. There<strong>for</strong>e, the concept of the <strong>User</strong> <strong>Centric</strong><br />

Smart Card Ownership <strong>Model</strong> (UCOM) becomes synonymous with the UCTD. In addition<br />

to the UCOM framework <strong>for</strong> smart cards, <strong>for</strong> the UCTD initiative the <strong>for</strong>m factor of smart<br />

cards is also diversied as shown in gure 2.3.<br />

Industry Sectors<br />

Applications Areas<br />

<strong>User</strong> <strong>Centric</strong> <strong>Tamper</strong>-<strong>Resistant</strong> <strong>Devices</strong><br />

E-<br />

Commerce<br />

Healthcare<br />

Access<br />

Identification<br />

Retail<br />

Ticketing<br />

Hotels<br />

<strong>Security</strong><br />

Transport<br />

Internet<br />

Identity<br />

Banks<br />

Biometric<br />

Data<br />

Universities<br />

Online Entertainment<br />

Mobile Network Operator<br />

Figure 2.3: Illustration of UCTD <strong>for</strong>m factors, application areas, and industry sectors<br />

Figure 2.3 shows dierent possible <strong>for</strong>m factors <strong>for</strong> the UCTD, various applications that<br />

it can host, and dierent industries that can use the provided functionality. In subsequent<br />

sections, we briey introduce multiple application smart cards along with dierent<br />

management architectures. This discussion serves as a foundation <strong>for</strong> the concept of multiapplication<br />

smart cards, their management architecture, and potential issues with them.<br />

Be<strong>for</strong>e we dive into the UCOM proposal in chapter 3, in subsequent sections we briey<br />

survey dierent management initiatives in the smart card industry and also discuss some<br />

earlier attempts at user centric smart card management.<br />

43

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!