06.11.2014 Views

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

4.2 Plat<strong>for</strong>m Architecture<br />

user (section 3.6). The owner of an application space has the right to install or delete any<br />

application they choose within their respective space. With the concept of spaces, we can<br />

even extend the smart card's capability to accommodate multiple users. An example is a<br />

home personal computer used by family members where each member of the family has her<br />

or his own prole (account) on the computer. In such a scenario, applications on a UCTD<br />

belonging to individual family members should also be securely segregated, and this can<br />

be accomplished by creating an application space <strong>for</strong> each individual user.<br />

A logical set of memory locations, associated with a single SP, is called a domain and it<br />

is under the complete and independent control of that SP. The domain provides a simple<br />

mechanism in which each application has a secure compartment that is independently managed<br />

by the SP. Domain ownership is delegated independently of any o-card entity (e.g.<br />

card manufacturer) to the SP during the application installation process that is discussed<br />

in chapter 6. A point to note is that the concept of domains is widely deployed by the<br />

GlobalPlat<strong>for</strong>m card specication [30] and we simply adapt it to the UCOM architecture.<br />

The managers shown in the plat<strong>for</strong>m space of gure 4.1 are collectively represented by the<br />

term Plat<strong>for</strong>m Manager (PM), illustrated in gure 3.7.<br />

4.2.2 Card <strong>Security</strong> Manager<br />

The card security manager is the hub <strong>for</strong> the dierent security and operational services<br />

that a smart card provides.<br />

During the application installation process, the card security manager will facilitate the<br />

generation of an SP's domain and oversee the transfer of control of the domain to the<br />

appropriate SP. For each application belonging to an SP, there will be a separate domain<br />

allocated to the SP that will only have one application in it. This is to allow an SP to<br />

manage its individual applications on a smart card individually. Furthermore, this also<br />

simplies the deletion, and blocking/disabling of applications. The card security manager<br />

can delete entire domain and any associated privileges to applications installed in the<br />

domain without aecting other applications in the domain. The card security manager<br />

facilitates the transfer of domain control to the appropriate SP. This transfer includes<br />

the generation of cryptographic keys that the SP will use them to authenticate itself to<br />

the domain and per<strong>for</strong>m related management tasks (e.g. application installation, deletion,<br />

blocking, unblocking and update). The card security manager would also ensure that the<br />

keys generated during the application installation process are not revealed to any third<br />

party (e.g. card manufacturer or cardholder).<br />

If an installed application violates the security policy of a smart card, the card security<br />

82

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!