06.11.2014 Views

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

3.4 <strong>User</strong> <strong>Centric</strong> Smart Card Ownership <strong>Model</strong> (UCOM)<br />

3.4.6.1 Application Management Server (AMS)<br />

An AMS is implemented and maintained by an SP to support the UCOM. The AMS's main<br />

function is to facilitate authorised cardholders to ubiquitously manage the SP's applications<br />

on their cards.<br />

The account details provided by the SP to its customers contain the AMS access credentials.<br />

Using these credentials, the user can access and install the SP's application(s). The exact<br />

mechanism of the user registration and credential issuance, and the usage mechanism which<br />

controls how a user's credential will be veried (authenticated) are specic to each SP.<br />

The main function of an AMS is to maintain the SP's application(s) and to ensure that the<br />

application is only leased to a smart card if it satises the SP's Application Lease Policy<br />

(ALP).<br />

3.4.6.2 Application Lease Policy (ALP)<br />

An ALP denes the minimum requirement of an SP that a smart card has to satisfy be<strong>for</strong>e<br />

the SP will lease its application. The ALP is dened by an SP, and it could have the<br />

following requirements.<br />

1. Minimum smart card hardware requirement.<br />

2. Minimum Smart Card Operating System (SCOS) or plat<strong>for</strong>m (e.g. Java Card) requirements.<br />

3. Minimum application memory requirement.<br />

4. Minimum Common Criteria <strong>Security</strong> Evaluation Level [69].<br />

5. Maximum number of smart cards that can hold the lease of the application.<br />

6. Cryptographic key generation requirements.<br />

7. Secure communication channel requirements.<br />

8. Application lease limits and restrictions (if applicable).<br />

In addition to the abovementioned points in the ALP, an SP can dene some additional<br />

criteria <strong>for</strong> its application. During the application installation process [10], a smart card<br />

tries to satisfy the SP's requirements, and if it succeeds, the SP will lease the application<br />

to the smart card; otherwise the request will be declined.<br />

69

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!