Abstract
With the service boundary blurring between services on the device and services on the cloud there is an increasing amount of value put into services. Access to these services need to be controlled and potentially compartmentalised between work, home and play. The value of having strong identity credentials to prove identity to access these services is proportionally increasing. This paper will look at the different use cases, challenges in using strong ID credentials and technologies and standards that are currently available that can address some of these challenges. It will also look at the management requirements around these credentials especially when they represent a derived credential from an existing credential (e.g. existing ID/ SmartCard)
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
Literature
Jens Heider and Matthias Boll. “Lost iPhone? Lost Passwords! Practical Consideration of iOS Device Encryption Security”, http://www.sit.fraunhofer.de/Images/sc_iPhone%20Passwords_tcm501-80443.pdf, February 9 2011
GlobalPlatform, “TEE Client API”, “TEE Internal API”,” TEE System Architecture”, http://www.globalplatform.org/specificationsdevice.asp
RSA Laboratories, “PKCS #11: Cryptographic Token Interface Standard”, http://www.rsa.com/rsalabs/node.asp?id= 2133
SIM Alliance, “Open Mobile API Specification V2”, http://www.simalliance.org/en?t=/documentManager/sfdoc.file.supply&fileID=1340815328538
FIPS PUB 201-1,”Personal Identity Verification (PIV) of Federal Employees and Contractors”,http://csrc.nist.gov/publications/fips/fips201-1/FIPS-201-1-chng1.pdf
ANSI INCITS 504-1 and ANSI INCITS 504-2,”, Generic Identity Command Set”,http:/store.ansi.org/RecordDetail.aspx ?sku=BSR+INCITS + 504-1+and+BSR+INCITS + 504-2/
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer Fachmedien Wiesbaden
About this chapter
Cite this chapter
Hoyer, P. (2012). Management and Use of ID Credentials on NFC Enabled Phones: Use Cases, Challenges, Technologies and Standards. In: Reimer, H., Pohlmann, N., Schneider, W. (eds) ISSE 2012 Securing Electronic Business Processes. Springer Vieweg, Wiesbaden. https://doi.org/10.1007/978-3-658-00333-3_16
Download citation
DOI: https://doi.org/10.1007/978-3-658-00333-3_16
Published:
Publisher Name: Springer Vieweg, Wiesbaden
Print ISBN: 978-3-658-00332-6
Online ISBN: 978-3-658-00333-3
eBook Packages: Computer ScienceComputer Science (R0)