Skip to main content

Transforming Mobile Platform with KI-SIM Card into an Open Mobile Identity Tool

  • Chapter
  • 454 Accesses

Abstract

Recent introduction of Near Field Communication (NFC) in mobile phones has stimulated the development of new proximity payment and identification services. We present an architecture that facilitates the use of the mobile phone as a personalised electronic identity tool. The tool can work as a replacement for numerous ID cards and licenses. Design for privacy principles have been applied, such as minimisation of data collection and informed consent of the user. We describe an implementation of a lightweight version of the of the mobile identity tool using currently available handset technology and off-the-shelf development tools.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Alves, Tiago; Felton, Don: TrustZone: Integrated Hardware and Software Security. Enabling Trusted Computing in Embedded Systems. ARM white paper, July 2004. http://www.arm.com/pdfs/TZ_Whitepaper.pdf

    Google Scholar 

  2. Pleumann, Jörg; Yadan, Omry: Antenna. An Ant-to-End Solution For Wireless Java. Version 1.0.1, 2008. http://antenna.sourceforge.net/

    Google Scholar 

  3. The Legion of the Bouncy Castle: Java cryptography APIs. http://www.bouncycastle.org/java.html

    Google Scholar 

  4. Chappell, David: Introducing Windows CardSpace. April 2006. http://msdn2.microsoft.com/en-us/library/aa480189.aspx

    Google Scholar 

  5. ETSI: TS 102 622 V7.0.0. Smart Cards; UICC — Contactless Front-end (CLF) interface; Host Controller Interface (HCI) (Release 7). Technical specification, February 2008.

    Google Scholar 

  6. ETSI: TS 102 613 V7.1.0. Smart Cards; UICC — Contactless Front-end (CLF) interface; Part 1: Physical and data link layer characteristics (Release 7). Technical specification, February 2008.

    Google Scholar 

  7. Gratzer, Vanessa; Naccache, David: Trust on a Nationwide Scale. In: Gutmann, P., Naccache, D., Palmer Ch. (Eds): IEEE Security and Privacy, 2007, p. 64–66.

    Google Scholar 

  8. Hyppönen, Konstantin: An Open Mobile Identity Tool: An Architecture for Mobile Identity Management. In: S.F. Mjølsnes, S. Mauw, and S.K. Katsikas (Eds.): EuroPKI 2008, LNCS 5057, Springer-Verlag Berlin Heidelberg, 2008, p. 207–222.

    Google Scholar 

  9. Hyppönen, Konstantin; Hassinen, Marko; Trichina, Elena: Combining Biometric Authentication with Privacy-Enhancing Technologies. In: P. Lipp, A.-R. Sadeghi, and K.M. Koch (Eds.): TRUST’2008, LNCS 4968, Springer-Verlag Berlin Heidelberg, 2008, p. 107–118.

    Google Scholar 

  10. Handschuh, Helena; Trichina, Elena: High Density Smart Cards: New Security Challenges and Applications. In: Pohlmann, N., Reimer, H., Schneider, W. (Eds.): ISSE/SECURE 2007 Securing Electronic Business Processes, Vieweg, 2007, p. 251–259.

    Google Scholar 

  11. Internet2: Shibboleth 2 Documentation. March, 2008. https://spaces.internet2.edu/display/SHIB2/Home

    Google Scholar 

  12. IBM Zurich Research Laboratory: JCOP Tools 3.0 (Eclipse plugin). Technical brief, revision 1.0, 2003. ftp://ftp.software.ibm.com/software/pervasive/info/JCOPTools3Brief.pdf.

    Google Scholar 

  13. Java Community Process: Security and Trust Services API (SATSA) for Java™ 2 Platform, Micro Edition, v. 1.0. Sun Microsystems, Inc., 2004. http://www.jcp.org/en/jsr/detail?id=177

    Google Scholar 

  14. Java Community Process: Contactless Communication API, JSR 257, v. 1.0. Nokia Corporation, 2006. http://www.jcp.org/en/jsr/detail?id=257

    Google Scholar 

  15. Liberty Alliance Project: Liberty Alliance ID-FF 1.2 Specifications. December 2007. http://www.projectliberty.org/liberty/specifications__1

    Google Scholar 

  16. Müller, Günter; Wohlgemuth, Sven: Study on Mobile Identity Management. FIDIS — Future of Identity in the Information Society, deliverable 3.3. May, 2005.

    Google Scholar 

  17. OpenID Foundation: OpenID Authentication 2.0 — Final. December 5, 2007. http://openid.net/specs/openid-authentication-2_0.html

    Google Scholar 

  18. Srage, Jay; Azema, Jerome: M-Shield Mobile Security Technology: making wireless secure. Texas Instruments white paper, February 2008. http://focus.ti.com/pdfs/wtbu/ti_mshield_whitepaper.pdf

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Norbert Pohlmann Helmut Reimer Wolfgang Schneider

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Vieweg+Teubner | GWV Fachverlage GmbH, Wiesbaden

About this chapter

Cite this chapter

Hyppönen, K., Hassinen, M., Trichina, E. (2009). Transforming Mobile Platform with KI-SIM Card into an Open Mobile Identity Tool. In: Pohlmann, N., Reimer, H., Schneider, W. (eds) ISSE 2008 Securing Electronic Business Processes. Vieweg+Teubner. https://doi.org/10.1007/978-3-8348-9283-6_22

Download citation

  • DOI: https://doi.org/10.1007/978-3-8348-9283-6_22

  • Publisher Name: Vieweg+Teubner

  • Print ISBN: 978-3-8348-0660-4

  • Online ISBN: 978-3-8348-9283-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics