06.11.2014 Views

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Service<br />

Provider<br />

3.6 Coopetitive Architecture<br />

Standardisation Bodies and<br />

Industrial Forums<br />

Common Criteria<br />

Plat<strong>for</strong>m Manager (PM)<br />

Cardholder<br />

Card<br />

Manufacture<br />

PM<br />

Card Terminal<br />

Manufacturer<br />

Figure 3.7: Ecosystem of the Coopetitive Architecture <strong>for</strong> Smart Cards (CASC)<br />

requirements of the CASC.<br />

The ecosystem of the CASC is illustrated in gure 3.7, and at its centre there are three<br />

main entities: the administrative authority (the card issuer, TSM, and corporate authority<br />

etc.), cardholder, and the smart card. The administrative authority issues the smart cards<br />

to its customers. The cardholder would have the choice to install or delete any application<br />

they would require. The management of the smart card application installation, deletion,<br />

and application/card lifecycle management is handled by the Plat<strong>for</strong>m Manager (PM)<br />

(discussed in section 4.2). The PM facilitates both the administrative authority and the<br />

cardholder to per<strong>for</strong>m their sanctioned tasks.<br />

As an example, consider a scenario in which a user enrols into the multi-application smart<br />

card service architecture through a Mobile Network Operator (MNO). In this scenario, the<br />

MNO plays the role of an administrative authority. As the customer of the MNO, the<br />

user can receive an NFC-enabled mobile phone (possibly under a xed period contract)<br />

and UCTDs. In certain cases, MNOs subsidise the mobile phone in return <strong>for</strong> a xed<br />

period contract with their customers. The phone is under MNO lock and it can only<br />

be used on the issuing MNO's network. At the end of the contract, the customer can<br />

request the MNO to unlock the mobile phone. The acquired secure element(s) would have<br />

the MNO's application installed by default. In addition, if the user is a customer of any<br />

other organisations that are associated partners of the MNO in the TSM scheme, then she<br />

may get their applications pre-installed on the secure element. This secure element would<br />

enable the user to request installation or deletion of any application she chooses, except<br />

77

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!