06.11.2014 Views

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

3.3 Frameworks <strong>for</strong> the ICOM<br />

Controlling Authorities<br />

<strong>Security</strong> Domain<br />

Card Issuer’s<br />

<strong>Security</strong> Domain<br />

Application<br />

Provider’s <strong>Security</strong><br />

Domain<br />

Card Issuer’s<br />

Application<br />

GlobalPlat<strong>for</strong>m API<br />

Application Provider’s<br />

Application<br />

Global Services<br />

Application<br />

System Classes<br />

OPEN and GlobalPlat<strong>for</strong>m Trusted Framework<br />

Smart Card Runtime Environment (SCRT)<br />

Smart Card Hardware<br />

Figure 3.4: Generic representation of the GlobalPlat<strong>for</strong>m card architecture<br />

owner of the domain. The security domain also provides separate cryptographic keys to<br />

the card issuer and the application providers to manage their respective domains/applications.<br />

The security domain also manages key handling, encryption, decryption, digital<br />

signature, and the verication of (hosted) applications (i.e. only at the time of installation<br />

[30, 103]). The card issuer generates the security domain (application domain) on<br />

the card and then gives control of the application domains to the card issuer's partners<br />

(application providers). These application providers can then manage their applications<br />

independently of the card issuer's involvement.<br />

The OPEN framework dened in the GlobalPlat<strong>for</strong>m specication handles/controls the<br />

downloading and installation of applications. The Trusted framework enables dierent<br />

services such as inter-application communications; however, the GlobalPlat<strong>for</strong>m Card<br />

<strong>Security</strong> Requirement Specication [1] states that GlobalPlat<strong>for</strong>m relies on the underlying<br />

plat<strong>for</strong>m's (e.g. Java Card, and Multos) implementation of the rewall mechanism..<br />

The crucial component of the GlobalPlat<strong>for</strong>m card specication is termed the Card Manager.<br />

This is a generic term used <strong>for</strong> such services as OPEN, the issuer security domain and<br />

Cardholder verication method services. The Card Manager actively controls the smart<br />

card environment. Furthermore, the smart card issuer cannot access any of the application<br />

domains because they are protected by the cryptographic keys (access keys) and these keys<br />

are shared only between an application domain and an application provider. However, if<br />

a particular application provider violates the agreement with the card issuer, or they no<br />

longer have a partnership to provide services, then the card issuer can block or delete the<br />

application provider's application.<br />

In this section, we have provided a short description of the GlobalPlat<strong>for</strong>m card specication<br />

which in no way denes all the functions of the specication. However, we continue to<br />

refer to the GlobalPlat<strong>for</strong>m card specication in subsequent chapters and give detailed descriptions<br />

of its components as required. It is noteworthy that GlobalPlat<strong>for</strong>m has shown<br />

the capacity and willingness to adapt to the industry's trends. It has published GlobalPlat<strong>for</strong>m<br />

Card Remote Application Management over HTTP Card Specication v2.2<br />

in response to Java Card 3 and GlobalPlat<strong>for</strong>m's Proposition <strong>for</strong> NFC Mobile: Secure<br />

62

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!