Abstract
Recent introduction of Near Field Communication (NFC) in mobile phones has stimulated the development of new proximity payment and identification services. We present an architecture that facilitates the use of the mobile phone as a personalised electronic identity tool. The tool can work as a replacement for numerous ID cards and licenses. Design for privacy principles have been applied, such as minimisation of data collection and informed consent of the user. We describe an implementation of a lightweight version of the of the mobile identity tool using currently available handset technology and off-the-shelf development tools.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Alves, Tiago; Felton, Don: TrustZone: Integrated Hardware and Software Security. Enabling Trusted Computing in Embedded Systems. ARM white paper, July 2004. http://www.arm.com/pdfs/TZ_Whitepaper.pdf
Pleumann, Jörg; Yadan, Omry: Antenna. An Ant-to-End Solution For Wireless Java. Version 1.0.1, 2008. http://antenna.sourceforge.net/
The Legion of the Bouncy Castle: Java cryptography APIs. http://www.bouncycastle.org/java.html
Chappell, David: Introducing Windows CardSpace. April 2006. http://msdn2.microsoft.com/en-us/library/aa480189.aspx
ETSI: TS 102 622 V7.0.0. Smart Cards; UICC — Contactless Front-end (CLF) interface; Host Controller Interface (HCI) (Release 7). Technical specification, February 2008.
ETSI: TS 102 613 V7.1.0. Smart Cards; UICC — Contactless Front-end (CLF) interface; Part 1: Physical and data link layer characteristics (Release 7). Technical specification, February 2008.
Gratzer, Vanessa; Naccache, David: Trust on a Nationwide Scale. In: Gutmann, P., Naccache, D., Palmer Ch. (Eds): IEEE Security and Privacy, 2007, p. 64–66.
Hyppönen, Konstantin: An Open Mobile Identity Tool: An Architecture for Mobile Identity Management. In: S.F. Mjølsnes, S. Mauw, and S.K. Katsikas (Eds.): EuroPKI 2008, LNCS 5057, Springer-Verlag Berlin Heidelberg, 2008, p. 207–222.
Hyppönen, Konstantin; Hassinen, Marko; Trichina, Elena: Combining Biometric Authentication with Privacy-Enhancing Technologies. In: P. Lipp, A.-R. Sadeghi, and K.M. Koch (Eds.): TRUST’2008, LNCS 4968, Springer-Verlag Berlin Heidelberg, 2008, p. 107–118.
Handschuh, Helena; Trichina, Elena: High Density Smart Cards: New Security Challenges and Applications. In: Pohlmann, N., Reimer, H., Schneider, W. (Eds.): ISSE/SECURE 2007 Securing Electronic Business Processes, Vieweg, 2007, p. 251–259.
Internet2: Shibboleth 2 Documentation. March, 2008. https://spaces.internet2.edu/display/SHIB2/Home
IBM Zurich Research Laboratory: JCOP Tools 3.0 (Eclipse plugin). Technical brief, revision 1.0, 2003. ftp://ftp.software.ibm.com/software/pervasive/info/JCOPTools3Brief.pdf.
Java Community Process: Security and Trust Services API (SATSA) for Java™ 2 Platform, Micro Edition, v. 1.0. Sun Microsystems, Inc., 2004. http://www.jcp.org/en/jsr/detail?id=177
Java Community Process: Contactless Communication API, JSR 257, v. 1.0. Nokia Corporation, 2006. http://www.jcp.org/en/jsr/detail?id=257
Liberty Alliance Project: Liberty Alliance ID-FF 1.2 Specifications. December 2007. http://www.projectliberty.org/liberty/specifications__1
Müller, Günter; Wohlgemuth, Sven: Study on Mobile Identity Management. FIDIS — Future of Identity in the Information Society, deliverable 3.3. May, 2005.
OpenID Foundation: OpenID Authentication 2.0 — Final. December 5, 2007. http://openid.net/specs/openid-authentication-2_0.html
Srage, Jay; Azema, Jerome: M-Shield Mobile Security Technology: making wireless secure. Texas Instruments white paper, February 2008. http://focus.ti.com/pdfs/wtbu/ti_mshield_whitepaper.pdf
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2009 Vieweg+Teubner | GWV Fachverlage GmbH, Wiesbaden
About this chapter
Cite this chapter
Hyppönen, K., Hassinen, M., Trichina, E. (2009). Transforming Mobile Platform with KI-SIM Card into an Open Mobile Identity Tool. In: Pohlmann, N., Reimer, H., Schneider, W. (eds) ISSE 2008 Securing Electronic Business Processes. Vieweg+Teubner. https://doi.org/10.1007/978-3-8348-9283-6_22
Download citation
DOI: https://doi.org/10.1007/978-3-8348-9283-6_22
Publisher Name: Vieweg+Teubner
Print ISBN: 978-3-8348-0660-4
Online ISBN: 978-3-8348-9283-6
eBook Packages: Computer ScienceComputer Science (R0)