06.11.2014 Views

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

4.3 Trusted Environment & Execution Manager<br />

Interface<br />

· Protocol Encoding/Decoding<br />

· En<strong>for</strong>ces Access Policy<br />

Trusted Environment & Execution Manager (TEM)<br />

Backup Token<br />

Handler<br />

Attestation Handler<br />

Runtime <strong>Security</strong><br />

Manager<br />

Crypto-coprocessor<br />

· Asymmetric Encryption/Decryption<br />

· Symmetric Encryption/Decryption<br />

· Digital Signature<br />

Native Code<br />

Hash Generator<br />

Smart Card Hardware<br />

Random Number<br />

Generator<br />

Self-test Manager<br />

Figure 4.2: Architecture <strong>for</strong> the Trusted Environment & Execution Manager<br />

and utilise the smart card's cryptographic hardware (the crypto co-processor). The TEM<br />

requires access to the crypto co-processor <strong>for</strong> encryption/decryption, signature generation<br />

and verication, and random number generation.<br />

4.3.1 Interface<br />

The TEM interface manages the communication between the TEM and on-card entities<br />

(e.g. plat<strong>for</strong>m services and applications) or o-card entities (e.g. SPs). The TEM interface<br />

does not replace the o-card interface discussed in section 4.2.3, it only implements the<br />

communication service that a TEM uses to communicate with on-card applications and<br />

(o-card) SPs.<br />

The TEM interface implements the attestation protocol discussed in section 4.7. Furthermore,<br />

it also provides a state validation service (section 4.4.3) to installed applications<br />

during the application sharing process. The state validation of an application can only be<br />

per<strong>for</strong>med by the TEM if it is explicitly requested to do so by that application. There<strong>for</strong>e,<br />

<strong>for</strong> state validation, the TEM establishes a shared secret with an application (at the time<br />

of application installation). When the installed application (refer to it as App A ) needs to<br />

provide state validation to another application (refer to it as App B ), <strong>for</strong> example during<br />

the application sharing process, the TEM will only provide the state valuation of App A<br />

to App B if App A explicitly requests the TEM with App B identity using the shared secret<br />

(<strong>for</strong> a more detailed discussion, please see section 7.3.2).<br />

4.3.2 Backup Token Handler<br />

The backup token handler acts as a repository that stores the restoration tokens of individual<br />

applications (if sanctioned by their respective SPs) on a smart card. When a<br />

user registers with a backup server or wants to transfer the installed applications from<br />

86

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!