06.11.2014 Views

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

3.4 <strong>User</strong> <strong>Centric</strong> Smart Card Ownership <strong>Model</strong> (UCOM)<br />

Cardholder/<br />

<strong>User</strong> /Customer<br />

UCSC Supplier<br />

<strong>User</strong> <strong>Centric</strong> Smart Card (UCSC)<br />

Card Application<br />

Management Software<br />

(CAMS)<br />

Service Access Point (SAP)/ Host Plat<strong>for</strong>ms<br />

Host Device<br />

Cell Phone<br />

Kiosk<br />

Computer<br />

1<br />

2<br />

Internet / Service<br />

Provider’s Network /<br />

Third Party Network<br />

Service Provider<br />

Application Management<br />

Server (AMS)<br />

Cell Phone Kiosk Computer<br />

Access Panel<br />

1: Application Request/Download Channel<br />

2: Service Request/Delivery Channel<br />

Application Services<br />

Authentication Server<br />

(ASAS)<br />

Figure 3.6: Illustration of the UCOM components and their interactions<br />

There<strong>for</strong>e, the role of security policy en<strong>for</strong>cer is taken up by the smart card itself and<br />

cardholders only have the privilege to install and delete applications. The ICOM enables a<br />

card issuer to control the issuance of its smart card to individual users, which is translated<br />

as the privilege to lease its application in the UCOM, whereas installed applications will<br />

always be in total control of the SPs, and users will be entitled to use them under the lease<br />

policy of their respective SPs.<br />

The architecture of a UCOM consists of seven main components, as shown in gure 3.6:<br />

the <strong>User</strong> <strong>Centric</strong> Smart Card (UCSC) supplier, the cardholder, the UCSC, the Card Application<br />

Management Software (CAMS), the host devices, the Service Provider (SP) and<br />

the Service Access Points (SAPs). A smart card that supports a user's ownership is called<br />

a UCSC and we use this term only in this chapter to dierentiate between ICOM-based<br />

smart cards and cards that support the UCOM.<br />

A cardholder acquires a UCSC from a UCSC supplier. After acquiring the UCSC, the cardholder<br />

requests an SP to lease their application. The cardholder presents her card to a host<br />

device. The host device then enables the cardholder to use Card Application Management<br />

Software (CAMS) that establishes an interface between UCSC and the SP's Application<br />

Management Server (AMS). After authentication of the cardholder and security validation<br />

of the UCSC, the AMS leases the application(s).<br />

Once the application is installed, the cardholder can present her card to a SAP to access<br />

services. The SAP will establish a connection between UCSC and the SP's Application<br />

Services Authentication Server (ASAS). After being authenticated by ASAS, the user can<br />

use the designated service. The architecture of the application lease and usage is explained<br />

in section 3.4.6.2. In subsequent sections, we discuss the UCOM components shown in<br />

gure 3.6.<br />

66

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!