Skip to main content

Management and Use of ID Credentials on NFC Enabled Phones: Use Cases, Challenges, Technologies and Standards

  • Chapter
  • First Online:
  • 1265 Accesses

Abstract

With the service boundary blurring between services on the device and services on the cloud there is an increasing amount of value put into services. Access to these services need to be controlled and potentially compartmentalised between work, home and play. The value of having strong identity credentials to prove identity to access these services is proportionally increasing. This paper will look at the different use cases, challenges in using strong ID credentials and technologies and standards that are currently available that can address some of these challenges. It will also look at the management requirements around these credentials especially when they represent a derived credential from an existing credential (e.g. existing ID/ SmartCard)

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Literature

  1. Jens Heider and Matthias Boll. “Lost iPhone? Lost Passwords! Practical Consideration of iOS Device Encryption Security”, http://www.sit.fraunhofer.de/Images/sc_iPhone%20Passwords_tcm501-80443.pdf, February 9 2011

  2. GlobalPlatform, “TEE Client API”, “TEE Internal API”,” TEE System Architecture”, http://www.globalplatform.org/specificationsdevice.asp

  3. RSA Laboratories, “PKCS #11: Cryptographic Token Interface Standard”, http://www.rsa.com/rsalabs/node.asp?id= 2133

  4. SIM Alliance, “Open Mobile API Specification V2”, http://www.simalliance.org/en?t=/documentManager/sfdoc.file.supply&fileID=1340815328538

  5. FIPS PUB 201-1,”Personal Identity Verification (PIV) of Federal Employees and Contractors”,http://csrc.nist.gov/publications/fips/fips201-1/FIPS-201-1-chng1.pdf

  6. ANSI INCITS 504-1 and ANSI INCITS 504-2,”, Generic Identity Command Set”,http:/store.ansi.org/RecordDetail.aspx ?sku=BSR+INCITS + 504-1+and+BSR+INCITS + 504-2/

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Philip Hoyer .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer Fachmedien Wiesbaden

About this chapter

Cite this chapter

Hoyer, P. (2012). Management and Use of ID Credentials on NFC Enabled Phones: Use Cases, Challenges, Technologies and Standards. In: Reimer, H., Pohlmann, N., Schneider, W. (eds) ISSE 2012 Securing Electronic Business Processes. Springer Vieweg, Wiesbaden. https://doi.org/10.1007/978-3-658-00333-3_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-658-00333-3_16

  • Published:

  • Publisher Name: Springer Vieweg, Wiesbaden

  • Print ISBN: 978-3-658-00332-6

  • Online ISBN: 978-3-658-00333-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics