Multi-application smart cards enable a user to have multiple applications on her smart card. The growing trend of services convergence fuelled by the Near Field Communication and smartphones has made multi-application...
详细信息
ISBN:
(纸本)9780769550886
Multi-application smart cards enable a user to have multiple applications on her smart card. The growing trend of services convergence fuelled by the Near Field Communication and smartphones has made multi-application smart cards a tangible reality. In such an environment, cardholders might have number of applications on their smart cards and in case they lose the smart card, they would lose all of the applications. Currently, the recovery of a smart card based service might take from a day to a week at best, during which time the service provider might lose on business from the user because she is not able to access the respective services. The proposed framework in this paper enables a user to acquire a new smart card as she desires and then migrate/restore all of her applications onto it - facilitating her to recover from her lost digital wallet in a secure, efficient, seamless and ubiquitous manner.
This paper presents a case study on the use of formal methods in specification-based, black-box testing of a smart card applet. The system under test is a simple electronic purse application running on a java card pla...
详细信息
ISBN:
(纸本)038725658X
This paper presents a case study on the use of formal methods in specification-based, black-box testing of a smart card applet. The system under test is a simple electronic purse application running on a java card platform. The specification of the applet is given as a Statechart model, and transformed into a functional form to serve as the input for the on-the-fly test generation, -execution, and -analysis tool GAST. We show that automated, formal, specification-based testing of smart card applets is of high value, and that errors can be detected using this model-based testing.
The healthcare researchers', academics' and practitioners' interest concerning the development of Healthcare Information Systems has been on a steady rise for the last decades. Fueling this steady rise has...
详细信息
ISBN:
(纸本)9781614992769;9781614992752
The healthcare researchers', academics' and practitioners' interest concerning the development of Healthcare Information Systems has been on a steady rise for the last decades. Fueling this steady rise has been the healthcare professional need of quality information, in every healthcare provision incident, whenever and wherever this incident may take place. In order to address this need a truly mobile health care system is required, one that will be able to provide a healthcare provider with accurate patient-related information regardless of the time and place that healthcare is provided. In order to fulfill this role the present study proposes the architecture for a Healthcare Smartcard system, which provides authenticated healthcare professionals with remote mobile access to a Patient's Healthcare Record, through their Smartphone. Furthermore the research proceeds to develop a working prototype system.
Among the protection mechanisms that ensure the java card security, the Byte Code Verifier (BCV) is one of the most important security elements. In fact, embedded applets must be verified prior installation. This prev...
详细信息
ISBN:
(纸本)9781538606865
Among the protection mechanisms that ensure the java card security, the Byte Code Verifier (BCV) is one of the most important security elements. In fact, embedded applets must be verified prior installation. This prevents ill-formed applet to be loaded. In this article, the behavior of the Oracle BCV towards some unchecked piece of codes is analyzed, and the way to bypass the BCV is highlighted. Then, we demonstrate how one can use this breach to access to the system data of a frame, and persistently activate any code. Using both a white-box approach and fault injection that can transform a well-formed code to an ill-formed one during runtime execution.
Smart card secure channel protocols based on public key cryptography are not widely utilised mainly due to processing overheads introduced in the underlying smart card microprocessors and the complexities introduced b...
详细信息
ISBN:
(纸本)0387244859
Smart card secure channel protocols based on public key cryptography are not widely utilised mainly due to processing overheads introduced in the underlying smart card microprocessors and the complexities introduced by the operation of a PKI infrastructure. In this paper we analyse the significance of public key secure channel protocols in multi-application smart cards. We believe that multi-application smart card technology (e.g. the GlobalPlatform smart card specification) should benefit more from the advantages of public key cryptography specifically for the initiation and maintenance of a secure channel. This paper introduces a public key based cryptographic protocol for secure entity authentication, data integrity and data confidentiality. The proposed secure channel protocol uses a combination of public key, secret key and the main idea behind the Diffie-Hellman key establishment protocols in order to achieve the desired goals.
SecureMDD is a model-driven approach to develop secure systems with a special focus on smart card applications. Based on a platform-dependent UML model of the system under development we generate a platform-specific m...
详细信息
ISBN:
(纸本)9780769535999
SecureMDD is a model-driven approach to develop secure systems with a special focus on smart card applications. Based on a platform-dependent UML model of the system under development we generate a platform-specific model, and finally executable code. The SecureMDD approach also allows to generate a formal specification where security properties can be proven formally. In this paper we describe the automatic generation of java card code from UML class and activity diagrams in detail. The full code running on the smart card is generated which is not trivial because of the limitations of smart cards and the specialties of java card.
Virtual machines executing high level languages are nowadays found even in small secure embedded systems. We have studied properties of the java virtual machine and the java virtual machine language under certain faul...
详细信息
ISBN:
(纸本)3540462503
Virtual machines executing high level languages are nowadays found even in small secure embedded systems. We have studied properties of the java virtual machine and the java virtual machine language under certain fault attacks. Focused glitching attacks may enforce type confusion situations. Defensive java virtual machine is prosed as a counter-measure.
This paper describes an elementary protocol to prove possession of anonymous credentials together with its implementation on smart cards. The protocol uses self-blindable attribute certificates represented as points o...
详细信息
ISBN:
(纸本)9783642125096
This paper describes an elementary protocol to prove possession of anonymous credentials together with its implementation on smart cards. The protocol uses self-blindable attribute certificates represented as points on an elliptic curve (which are stored on the card). These certificates are verified on the reader-side via a bilinear pairing. java card smart cards offer only very limited access to the cryptographic coprocessor. It thus requires some ingenuity to get the protocol running with reasonable speed. We realise protocol runs with on-card computation times in the order of 1.5 seconds. It should be possible to further reduce this time with extended access to the cryptographic coprocessor.
The evolution of smart card technology provides an interesting case study of the relationship and interactions between security and business requirements. This paper maps out the milestones for smart card technology, ...
详细信息
ISBN:
(纸本)9781479947966
The evolution of smart card technology provides an interesting case study of the relationship and interactions between security and business requirements. This paper maps out the milestones for smart card technology, discussing at each step the opportunities and challenges. The paper reviews recently proposed innovative ownership/management models and the security challenges associated with them. The paper concludes with a discussion of possible future directions for the technology, and the challenges these present.
Trusted computing technology aims to enhance the security of platform by the TPM. But there are some drawbacks of TCG's Trusted Computing architecture for user-based applications. This paper presents a new concept...
详细信息
ISBN:
(纸本)9781450302449
Trusted computing technology aims to enhance the security of platform by the TPM. But there are some drawbacks of TCG's Trusted Computing architecture for user-based applications. This paper presents a new concept of portable TPM (PTM) based on USB Key to solve those problems. At first, we use PTM to establish a trusted path between the verifier and the user in remote attestation so as to propagate the trust chain to the end user. Secondly, we design the trust model and platform management mechanism of PTM. In this model the single point failure of TPM and frequent sensitive data migrations between different platforms are avoided based on PTM. At last, we implement the PTM on the USB Key with java card Runtime Environment. The test results show that the PTM scheme is feasible for user-based application.
暂无评论