SlideShare ist ein Scribd-Unternehmen logo
1 von 19
Architecture and security Gauthier Van Damme, IBBT/COSIC, K.U.Leuven Kris Vanhecke, IBBT/WICA, UGent
Table of content ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
System overview: fundamentals ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The NFC Voucher System Registration TSM Handset Voucher Issuer 4 2 3 5 MIDlet/Applet Public Key Certificate 1 Phone Number Public Key/Certificate
The NFC Voucher System
Technical – User-side components ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OS Features (Java based) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Push Registry ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Security aspects ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SE: security backbone of the system ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Java Card applet on the SE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Limitations of the SE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Practical: user-side features Check Balance Review History Make Payment MMS Intercept Phone 2 Phone Configuration
Use Cases in more detail ,[object Object],[object Object],[object Object]
1. Receiving new vouchers via MMS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
2. Making a payment at the cash desk MIDlet 1 2 3 Notification External Reader Detected ISO 14443 (APDUs) Check new balance JSR-257
3. Transferring Vouchers to users MIDlet 2 3 4 Notification JSR-257 MIDlet JSR-257 Initialize transaction 1 Start protocol Execute protocol 4
Conclusions: Security issues solved/remaining ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Conclusions: usability ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

Weitere ähnliche Inhalte

Was ist angesagt?

Datasheet two factor-authenticationx
Datasheet two factor-authenticationxDatasheet two factor-authenticationx
Datasheet two factor-authenticationxHai Nguyen
 
Psdot 19 four factor password authentication
Psdot 19 four factor password authenticationPsdot 19 four factor password authentication
Psdot 19 four factor password authenticationZTech Proje
 
Two factor authentication 2018
Two factor authentication 2018Two factor authentication 2018
Two factor authentication 2018Will Adams
 
Rfid based automated bank locker system
Rfid based automated bank locker systemRfid based automated bank locker system
Rfid based automated bank locker systemeSAT Publishing House
 
Seminar-Two Factor Authentication
Seminar-Two Factor AuthenticationSeminar-Two Factor Authentication
Seminar-Two Factor AuthenticationDilip Kr. Jangir
 
A secure communication in smart phones using two factor authentications
A secure communication in smart phones using two factor authenticationsA secure communication in smart phones using two factor authentications
A secure communication in smart phones using two factor authenticationseSAT Publishing House
 
Two Factor Authentication: Easy Setup, Major Impact
Two Factor Authentication: Easy Setup, Major ImpactTwo Factor Authentication: Easy Setup, Major Impact
Two Factor Authentication: Easy Setup, Major ImpactSalesforce Admins
 
Two factor authentication
Two factor authenticationTwo factor authentication
Two factor authenticationHai Nguyen
 
ACDI IdentID Overview
ACDI IdentID OverviewACDI IdentID Overview
ACDI IdentID OverviewACDI
 
Securing Wireless Cellular Systems
Securing Wireless Cellular SystemsSecuring Wireless Cellular Systems
Securing Wireless Cellular SystemsACMBangalore
 
TS31103 ISIM introduction
TS31103 ISIM introductionTS31103 ISIM introduction
TS31103 ISIM introductionKimmy Yang
 
Combat the Latest Two-Factor Authentication Evasion Techniques
Combat the Latest Two-Factor Authentication Evasion TechniquesCombat the Latest Two-Factor Authentication Evasion Techniques
Combat the Latest Two-Factor Authentication Evasion TechniquesIBM Security
 
AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATION
AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATIONAN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATION
AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATIONIJCNCJournal
 
Finger print based bank locker system
Finger print based bank locker systemFinger print based bank locker system
Finger print based bank locker systemEcwayt
 
Logincat MFA and SSO
Logincat  MFA and SSOLogincat  MFA and SSO
Logincat MFA and SSORohit Kapoor
 
2 factor authentication 3 [compatibility mode]
2 factor authentication 3 [compatibility mode]2 factor authentication 3 [compatibility mode]
2 factor authentication 3 [compatibility mode]Hai Nguyen
 

Was ist angesagt? (19)

Datasheet two factor-authenticationx
Datasheet two factor-authenticationxDatasheet two factor-authenticationx
Datasheet two factor-authenticationx
 
Psdot 19 four factor password authentication
Psdot 19 four factor password authenticationPsdot 19 four factor password authentication
Psdot 19 four factor password authentication
 
locker presentation (1)
locker presentation (1)locker presentation (1)
locker presentation (1)
 
Two factor authentication 2018
Two factor authentication 2018Two factor authentication 2018
Two factor authentication 2018
 
Rfid based automated bank locker system
Rfid based automated bank locker systemRfid based automated bank locker system
Rfid based automated bank locker system
 
Seminar-Two Factor Authentication
Seminar-Two Factor AuthenticationSeminar-Two Factor Authentication
Seminar-Two Factor Authentication
 
A secure communication in smart phones using two factor authentications
A secure communication in smart phones using two factor authenticationsA secure communication in smart phones using two factor authentications
A secure communication in smart phones using two factor authentications
 
Two Factor Authentication: Easy Setup, Major Impact
Two Factor Authentication: Easy Setup, Major ImpactTwo Factor Authentication: Easy Setup, Major Impact
Two Factor Authentication: Easy Setup, Major Impact
 
Two factor authentication
Two factor authenticationTwo factor authentication
Two factor authentication
 
ACDI IdentID Overview
ACDI IdentID OverviewACDI IdentID Overview
ACDI IdentID Overview
 
Securing Wireless Cellular Systems
Securing Wireless Cellular SystemsSecuring Wireless Cellular Systems
Securing Wireless Cellular Systems
 
Presentation iot
Presentation iotPresentation iot
Presentation iot
 
TS31103 ISIM introduction
TS31103 ISIM introductionTS31103 ISIM introduction
TS31103 ISIM introduction
 
Combat the Latest Two-Factor Authentication Evasion Techniques
Combat the Latest Two-Factor Authentication Evasion TechniquesCombat the Latest Two-Factor Authentication Evasion Techniques
Combat the Latest Two-Factor Authentication Evasion Techniques
 
AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATION
AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATIONAN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATION
AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATION
 
Research Paper
Research PaperResearch Paper
Research Paper
 
Finger print based bank locker system
Finger print based bank locker systemFinger print based bank locker system
Finger print based bank locker system
 
Logincat MFA and SSO
Logincat  MFA and SSOLogincat  MFA and SSO
Logincat MFA and SSO
 
2 factor authentication 3 [compatibility mode]
2 factor authentication 3 [compatibility mode]2 factor authentication 3 [compatibility mode]
2 factor authentication 3 [compatibility mode]
 

Andere mochten auch

Acknowledge 10 Het Betrekken Van Context Ter Ondersteuning Van Competentiemod...
Acknowledge 10 Het Betrekken Van Context Ter Ondersteuning Van Competentiemod...Acknowledge 10 Het Betrekken Van Context Ter Ondersteuning Van Competentiemod...
Acknowledge 10 Het Betrekken Van Context Ter Ondersteuning Van Competentiemod...imec.archive
 
I Minds2009 Alex Brabers (Gimv) Partnering With A Venture Capitalist An En...
I Minds2009 Alex Brabers (Gimv)   Partnering With A Venture Capitalist  An En...I Minds2009 Alex Brabers (Gimv)   Partnering With A Venture Capitalist  An En...
I Minds2009 Alex Brabers (Gimv) Partnering With A Venture Capitalist An En...imec.archive
 
I Minds2009 Vodtec
I Minds2009 VodtecI Minds2009 Vodtec
I Minds2009 Vodtecimec.archive
 
D'estrella a forat negre
D'estrella a forat negreD'estrella a forat negre
D'estrella a forat negrejordipeti
 
2008 Brokerage 02 Test Beds And Living Labs [Compatibility Mode]
2008 Brokerage 02 Test Beds And Living Labs [Compatibility Mode]2008 Brokerage 02 Test Beds And Living Labs [Compatibility Mode]
2008 Brokerage 02 Test Beds And Living Labs [Compatibility Mode]imec.archive
 
Peter Schelkens - Future Media and Imaging
Peter Schelkens - Future Media and ImagingPeter Schelkens - Future Media and Imaging
Peter Schelkens - Future Media and Imagingimec.archive
 
Progress reports 2010.7.15
Progress reports 2010.7.15Progress reports 2010.7.15
Progress reports 2010.7.15lau
 
Maduf08 Business Models Olivier Braet
Maduf08 Business Models   Olivier BraetMaduf08 Business Models   Olivier Braet
Maduf08 Business Models Olivier Braetimec.archive
 
A2 Bforum P1 10 Kul Sam Michiels Stadium
A2 Bforum P1 10 Kul   Sam Michiels   StadiumA2 Bforum P1 10 Kul   Sam Michiels   Stadium
A2 Bforum P1 10 Kul Sam Michiels Stadiumimec.archive
 
Peter de cleyn isbo ng wi nets - demo storyline
Peter de cleyn   isbo ng wi nets - demo storylinePeter de cleyn   isbo ng wi nets - demo storyline
Peter de cleyn isbo ng wi nets - demo storylineimec.archive
 
20081114 Friday Food iLabt Ingrid Moerman
20081114 Friday Food iLabt Ingrid Moerman20081114 Friday Food iLabt Ingrid Moerman
20081114 Friday Food iLabt Ingrid Moermanimec.archive
 
Apollon-23/05/2012-9u30- Parallell session: Living Labs added value
Apollon-23/05/2012-9u30- Parallell session: Living Labs added value  Apollon-23/05/2012-9u30- Parallell session: Living Labs added value
Apollon-23/05/2012-9u30- Parallell session: Living Labs added value imec.archive
 
Proceso de donación
Proceso de donaciónProceso de donación
Proceso de donaciónTu país
 
A2 Bforum P2 4 Vub Walter Colitti Esna
A2 Bforum P2 4 Vub   Walter Colitti   EsnaA2 Bforum P2 4 Vub   Walter Colitti   Esna
A2 Bforum P2 4 Vub Walter Colitti Esnaimec.archive
 
Maduf11 Mobile Television User Experiences And Practices Bram Lievens En Ev...
Maduf11 Mobile Television User Experiences And Practices   Bram Lievens En Ev...Maduf11 Mobile Television User Experiences And Practices   Bram Lievens En Ev...
Maduf11 Mobile Television User Experiences And Practices Bram Lievens En Ev...imec.archive
 
Caroline pauwels digital society
Caroline pauwels   digital societyCaroline pauwels   digital society
Caroline pauwels digital societyimec.archive
 
A scalable collaborative filtering framework based on co-clustering
A scalable collaborative filtering framework based on co-clusteringA scalable collaborative filtering framework based on co-clustering
A scalable collaborative filtering framework based on co-clusteringlau
 

Andere mochten auch (20)

Kurikulum Nia
Kurikulum NiaKurikulum Nia
Kurikulum Nia
 
Acknowledge 10 Het Betrekken Van Context Ter Ondersteuning Van Competentiemod...
Acknowledge 10 Het Betrekken Van Context Ter Ondersteuning Van Competentiemod...Acknowledge 10 Het Betrekken Van Context Ter Ondersteuning Van Competentiemod...
Acknowledge 10 Het Betrekken Van Context Ter Ondersteuning Van Competentiemod...
 
I Minds2009 Alex Brabers (Gimv) Partnering With A Venture Capitalist An En...
I Minds2009 Alex Brabers (Gimv)   Partnering With A Venture Capitalist  An En...I Minds2009 Alex Brabers (Gimv)   Partnering With A Venture Capitalist  An En...
I Minds2009 Alex Brabers (Gimv) Partnering With A Venture Capitalist An En...
 
I Minds2009 Vodtec
I Minds2009 VodtecI Minds2009 Vodtec
I Minds2009 Vodtec
 
D'estrella a forat negre
D'estrella a forat negreD'estrella a forat negre
D'estrella a forat negre
 
2008 Brokerage 02 Test Beds And Living Labs [Compatibility Mode]
2008 Brokerage 02 Test Beds And Living Labs [Compatibility Mode]2008 Brokerage 02 Test Beds And Living Labs [Compatibility Mode]
2008 Brokerage 02 Test Beds And Living Labs [Compatibility Mode]
 
Peter Schelkens - Future Media and Imaging
Peter Schelkens - Future Media and ImagingPeter Schelkens - Future Media and Imaging
Peter Schelkens - Future Media and Imaging
 
Progress reports 2010.7.15
Progress reports 2010.7.15Progress reports 2010.7.15
Progress reports 2010.7.15
 
Maduf08 Business Models Olivier Braet
Maduf08 Business Models   Olivier BraetMaduf08 Business Models   Olivier Braet
Maduf08 Business Models Olivier Braet
 
A2 Bforum P1 10 Kul Sam Michiels Stadium
A2 Bforum P1 10 Kul   Sam Michiels   StadiumA2 Bforum P1 10 Kul   Sam Michiels   Stadium
A2 Bforum P1 10 Kul Sam Michiels Stadium
 
Peter de cleyn isbo ng wi nets - demo storyline
Peter de cleyn   isbo ng wi nets - demo storylinePeter de cleyn   isbo ng wi nets - demo storyline
Peter de cleyn isbo ng wi nets - demo storyline
 
20081114 Friday Food iLabt Ingrid Moerman
20081114 Friday Food iLabt Ingrid Moerman20081114 Friday Food iLabt Ingrid Moerman
20081114 Friday Food iLabt Ingrid Moerman
 
Galileo
GalileoGalileo
Galileo
 
Apollon-23/05/2012-9u30- Parallell session: Living Labs added value
Apollon-23/05/2012-9u30- Parallell session: Living Labs added value  Apollon-23/05/2012-9u30- Parallell session: Living Labs added value
Apollon-23/05/2012-9u30- Parallell session: Living Labs added value
 
Proceso de donación
Proceso de donaciónProceso de donación
Proceso de donación
 
Japanese paper
Japanese paperJapanese paper
Japanese paper
 
A2 Bforum P2 4 Vub Walter Colitti Esna
A2 Bforum P2 4 Vub   Walter Colitti   EsnaA2 Bforum P2 4 Vub   Walter Colitti   Esna
A2 Bforum P2 4 Vub Walter Colitti Esna
 
Maduf11 Mobile Television User Experiences And Practices Bram Lievens En Ev...
Maduf11 Mobile Television User Experiences And Practices   Bram Lievens En Ev...Maduf11 Mobile Television User Experiences And Practices   Bram Lievens En Ev...
Maduf11 Mobile Television User Experiences And Practices Bram Lievens En Ev...
 
Caroline pauwels digital society
Caroline pauwels   digital societyCaroline pauwels   digital society
Caroline pauwels digital society
 
A scalable collaborative filtering framework based on co-clustering
A scalable collaborative filtering framework based on co-clusteringA scalable collaborative filtering framework based on co-clustering
A scalable collaborative filtering framework based on co-clustering
 

Ähnlich wie Architecture and security - Gauthier Van Damme (IBBT-COSIC- K.U.Leuven) & Kris Vanhecke( IBBT-WICA-UGent)

Make the Smartcard great again
Make the Smartcard great againMake the Smartcard great again
Make the Smartcard great againEric Larcheveque
 
Cidway Bank Finance 01 2009 2 Fa Tr
Cidway Bank Finance 01 2009 2 Fa TrCidway Bank Finance 01 2009 2 Fa Tr
Cidway Bank Finance 01 2009 2 Fa Trlfilliat
 
SIM application toolkit in the context of Near Field communication Applications
SIM application toolkit in the context of Near Field communication ApplicationsSIM application toolkit in the context of Near Field communication Applications
SIM application toolkit in the context of Near Field communication ApplicationsMukta Gupta
 
Emerging Technologies in Payment Industry
Emerging Technologies in Payment IndustryEmerging Technologies in Payment Industry
Emerging Technologies in Payment IndustryErfan Moradian
 
Electronic key-card & ELC;elc
Electronic key-card & ELC;elcElectronic key-card & ELC;elc
Electronic key-card & ELC;elcMohitKataria15
 
5th Meetup - Ethereum & IoT: examples, opportunities and IBM initiative
5th Meetup - Ethereum & IoT: examples, opportunities and IBM initiative5th Meetup - Ethereum & IoT: examples, opportunities and IBM initiative
5th Meetup - Ethereum & IoT: examples, opportunities and IBM initiativeAlexander Hirner
 
Security Architecture for On-Line Mutual Funds Trading With Multiple Mobile A...
Security Architecture for On-Line Mutual Funds Trading With Multiple Mobile A...Security Architecture for On-Line Mutual Funds Trading With Multiple Mobile A...
Security Architecture for On-Line Mutual Funds Trading With Multiple Mobile A...CSCJournals
 
Digital wallet (e-wallet)
Digital wallet  (e-wallet)Digital wallet  (e-wallet)
Digital wallet (e-wallet)Krishna Kumar
 
All the 12 Payment Enabling Technologies & 54 Illustrative Companies
All the 12 Payment Enabling  Technologies & 54  Illustrative CompaniesAll the 12 Payment Enabling  Technologies & 54  Illustrative Companies
All the 12 Payment Enabling Technologies & 54 Illustrative CompaniesMEDICI admin
 
A secure communication in smart phones using two factor authentication
A secure communication in smart phones using two factor authenticationA secure communication in smart phones using two factor authentication
A secure communication in smart phones using two factor authenticationeSAT Journals
 
IRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTPIRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTPIRJET Journal
 

Ähnlich wie Architecture and security - Gauthier Van Damme (IBBT-COSIC- K.U.Leuven) & Kris Vanhecke( IBBT-WICA-UGent) (20)

NFC Basic Concepts
NFC Basic ConceptsNFC Basic Concepts
NFC Basic Concepts
 
Make the Smartcard great again
Make the Smartcard great againMake the Smartcard great again
Make the Smartcard great again
 
E walllet / Digital Wallet
E walllet / Digital WalletE walllet / Digital Wallet
E walllet / Digital Wallet
 
M Commerce
M CommerceM Commerce
M Commerce
 
Cidway Bank Finance 01 2009 2 Fa Tr
Cidway Bank Finance 01 2009 2 Fa TrCidway Bank Finance 01 2009 2 Fa Tr
Cidway Bank Finance 01 2009 2 Fa Tr
 
SSL TSL;& SET
SSL TSL;& SETSSL TSL;& SET
SSL TSL;& SET
 
SIM application toolkit in the context of Near Field communication Applications
SIM application toolkit in the context of Near Field communication ApplicationsSIM application toolkit in the context of Near Field communication Applications
SIM application toolkit in the context of Near Field communication Applications
 
Blockchains.My - Decentralised Mobile Wallet App
Blockchains.My - Decentralised Mobile Wallet AppBlockchains.My - Decentralised Mobile Wallet App
Blockchains.My - Decentralised Mobile Wallet App
 
Emerging Technologies in Payment Industry
Emerging Technologies in Payment IndustryEmerging Technologies in Payment Industry
Emerging Technologies in Payment Industry
 
Electronic key-card & ELC;elc
Electronic key-card & ELC;elcElectronic key-card & ELC;elc
Electronic key-card & ELC;elc
 
Fu3111411144
Fu3111411144Fu3111411144
Fu3111411144
 
Secure mobile payment
Secure mobile paymentSecure mobile payment
Secure mobile payment
 
87559489 auth
87559489 auth87559489 auth
87559489 auth
 
5th Meetup - Ethereum & IoT: examples, opportunities and IBM initiative
5th Meetup - Ethereum & IoT: examples, opportunities and IBM initiative5th Meetup - Ethereum & IoT: examples, opportunities and IBM initiative
5th Meetup - Ethereum & IoT: examples, opportunities and IBM initiative
 
Security Architecture for On-Line Mutual Funds Trading With Multiple Mobile A...
Security Architecture for On-Line Mutual Funds Trading With Multiple Mobile A...Security Architecture for On-Line Mutual Funds Trading With Multiple Mobile A...
Security Architecture for On-Line Mutual Funds Trading With Multiple Mobile A...
 
Smartcard
SmartcardSmartcard
Smartcard
 
Digital wallet (e-wallet)
Digital wallet  (e-wallet)Digital wallet  (e-wallet)
Digital wallet (e-wallet)
 
All the 12 Payment Enabling Technologies & 54 Illustrative Companies
All the 12 Payment Enabling  Technologies & 54  Illustrative CompaniesAll the 12 Payment Enabling  Technologies & 54  Illustrative Companies
All the 12 Payment Enabling Technologies & 54 Illustrative Companies
 
A secure communication in smart phones using two factor authentication
A secure communication in smart phones using two factor authenticationA secure communication in smart phones using two factor authentication
A secure communication in smart phones using two factor authentication
 
IRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTPIRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTP
 

Mehr von imec.archive

iMinds-iLab.o, Open Innovation in ICT
iMinds-iLab.o, Open Innovation in ICTiMinds-iLab.o, Open Innovation in ICT
iMinds-iLab.o, Open Innovation in ICTimec.archive
 
Accio presentation closing event
Accio presentation closing eventAccio presentation closing event
Accio presentation closing eventimec.archive
 
PRoF+ Patient Room of the Future
PRoF+ Patient Room of the FuturePRoF+ Patient Room of the Future
PRoF+ Patient Room of the Futureimec.archive
 
Results of the Apollon pilot in homecare and independent living
Results of the Apollon pilot in homecare and independent livingResults of the Apollon pilot in homecare and independent living
Results of the Apollon pilot in homecare and independent livingimec.archive
 
Delivery of feedback on Health, Home Security and Home Energy in Aware Homes ...
Delivery of feedback on Health, Home Security and Home Energy in Aware Homes ...Delivery of feedback on Health, Home Security and Home Energy in Aware Homes ...
Delivery of feedback on Health, Home Security and Home Energy in Aware Homes ...imec.archive
 
NMMU-Emmanuel Haven Living Lab
NMMU-Emmanuel Haven Living LabNMMU-Emmanuel Haven Living Lab
NMMU-Emmanuel Haven Living Labimec.archive
 
The Humanicité workshops
The Humanicité workshopsThe Humanicité workshops
The Humanicité workshopsimec.archive
 
A Real-World Experimentation Platform
A Real-World Experimentation PlatformA Real-World Experimentation Platform
A Real-World Experimentation Platformimec.archive
 
ENoLL @ AAL Forum 2012
ENoLL @ AAL Forum 2012ENoLL @ AAL Forum 2012
ENoLL @ AAL Forum 2012imec.archive
 
ENoLL 6th Wave Results Ceremony (Jesse Marsh)
ENoLL 6th Wave Results Ceremony (Jesse Marsh)ENoLL 6th Wave Results Ceremony (Jesse Marsh)
ENoLL 6th Wave Results Ceremony (Jesse Marsh)imec.archive
 
The Connected Smart Cities Network and Living Labs - Towards Horizon 2020 - K...
The Connected Smart Cities Network and Living Labs - Towards Horizon 2020 - K...The Connected Smart Cities Network and Living Labs - Towards Horizon 2020 - K...
The Connected Smart Cities Network and Living Labs - Towards Horizon 2020 - K...imec.archive
 
Apollon - 22/5/12 - 11:30 - Local SME's - Innovating Across borders
Apollon - 22/5/12 - 11:30 - Local SME's - Innovating Across bordersApollon - 22/5/12 - 11:30 - Local SME's - Innovating Across borders
Apollon - 22/5/12 - 11:30 - Local SME's - Innovating Across bordersimec.archive
 
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future InternetApollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internetimec.archive
 
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future InternetApollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internetimec.archive
 
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future InternetApollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internetimec.archive
 
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future InternetApollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internetimec.archive
 
Apollon - 22/5/12 - 11:30 - Local SME's - Innovating Across borders
Apollon - 22/5/12 - 11:30 - Local SME's - Innovating Across bordersApollon - 22/5/12 - 11:30 - Local SME's - Innovating Across borders
Apollon - 22/5/12 - 11:30 - Local SME's - Innovating Across bordersimec.archive
 
Apollon - 22/5/12 - 09:00 - User-driven Open Innovation Ecosystems
Apollon - 22/5/12 - 09:00 - User-driven Open Innovation EcosystemsApollon - 22/5/12 - 09:00 - User-driven Open Innovation Ecosystems
Apollon - 22/5/12 - 09:00 - User-driven Open Innovation Ecosystemsimec.archive
 
Apollon - 22/5/12 - 09:00 - User-driven Open Innovation Ecosystems
Apollon - 22/5/12 - 09:00 - User-driven Open Innovation EcosystemsApollon - 22/5/12 - 09:00 - User-driven Open Innovation Ecosystems
Apollon - 22/5/12 - 09:00 - User-driven Open Innovation Ecosystemsimec.archive
 
Apollon - 22/5/12 - 09:00 - User-driven Open Innovation Ecosystems
Apollon - 22/5/12 - 09:00 - User-driven Open Innovation EcosystemsApollon - 22/5/12 - 09:00 - User-driven Open Innovation Ecosystems
Apollon - 22/5/12 - 09:00 - User-driven Open Innovation Ecosystemsimec.archive
 

Mehr von imec.archive (20)

iMinds-iLab.o, Open Innovation in ICT
iMinds-iLab.o, Open Innovation in ICTiMinds-iLab.o, Open Innovation in ICT
iMinds-iLab.o, Open Innovation in ICT
 
Accio presentation closing event
Accio presentation closing eventAccio presentation closing event
Accio presentation closing event
 
PRoF+ Patient Room of the Future
PRoF+ Patient Room of the FuturePRoF+ Patient Room of the Future
PRoF+ Patient Room of the Future
 
Results of the Apollon pilot in homecare and independent living
Results of the Apollon pilot in homecare and independent livingResults of the Apollon pilot in homecare and independent living
Results of the Apollon pilot in homecare and independent living
 
Delivery of feedback on Health, Home Security and Home Energy in Aware Homes ...
Delivery of feedback on Health, Home Security and Home Energy in Aware Homes ...Delivery of feedback on Health, Home Security and Home Energy in Aware Homes ...
Delivery of feedback on Health, Home Security and Home Energy in Aware Homes ...
 
NMMU-Emmanuel Haven Living Lab
NMMU-Emmanuel Haven Living LabNMMU-Emmanuel Haven Living Lab
NMMU-Emmanuel Haven Living Lab
 
The Humanicité workshops
The Humanicité workshopsThe Humanicité workshops
The Humanicité workshops
 
A Real-World Experimentation Platform
A Real-World Experimentation PlatformA Real-World Experimentation Platform
A Real-World Experimentation Platform
 
ENoLL @ AAL Forum 2012
ENoLL @ AAL Forum 2012ENoLL @ AAL Forum 2012
ENoLL @ AAL Forum 2012
 
ENoLL 6th Wave Results Ceremony (Jesse Marsh)
ENoLL 6th Wave Results Ceremony (Jesse Marsh)ENoLL 6th Wave Results Ceremony (Jesse Marsh)
ENoLL 6th Wave Results Ceremony (Jesse Marsh)
 
The Connected Smart Cities Network and Living Labs - Towards Horizon 2020 - K...
The Connected Smart Cities Network and Living Labs - Towards Horizon 2020 - K...The Connected Smart Cities Network and Living Labs - Towards Horizon 2020 - K...
The Connected Smart Cities Network and Living Labs - Towards Horizon 2020 - K...
 
Apollon - 22/5/12 - 11:30 - Local SME's - Innovating Across borders
Apollon - 22/5/12 - 11:30 - Local SME's - Innovating Across bordersApollon - 22/5/12 - 11:30 - Local SME's - Innovating Across borders
Apollon - 22/5/12 - 11:30 - Local SME's - Innovating Across borders
 
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future InternetApollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
 
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future InternetApollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
 
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future InternetApollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
 
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future InternetApollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
 
Apollon - 22/5/12 - 11:30 - Local SME's - Innovating Across borders
Apollon - 22/5/12 - 11:30 - Local SME's - Innovating Across bordersApollon - 22/5/12 - 11:30 - Local SME's - Innovating Across borders
Apollon - 22/5/12 - 11:30 - Local SME's - Innovating Across borders
 
Apollon - 22/5/12 - 09:00 - User-driven Open Innovation Ecosystems
Apollon - 22/5/12 - 09:00 - User-driven Open Innovation EcosystemsApollon - 22/5/12 - 09:00 - User-driven Open Innovation Ecosystems
Apollon - 22/5/12 - 09:00 - User-driven Open Innovation Ecosystems
 
Apollon - 22/5/12 - 09:00 - User-driven Open Innovation Ecosystems
Apollon - 22/5/12 - 09:00 - User-driven Open Innovation EcosystemsApollon - 22/5/12 - 09:00 - User-driven Open Innovation Ecosystems
Apollon - 22/5/12 - 09:00 - User-driven Open Innovation Ecosystems
 
Apollon - 22/5/12 - 09:00 - User-driven Open Innovation Ecosystems
Apollon - 22/5/12 - 09:00 - User-driven Open Innovation EcosystemsApollon - 22/5/12 - 09:00 - User-driven Open Innovation Ecosystems
Apollon - 22/5/12 - 09:00 - User-driven Open Innovation Ecosystems
 

Architecture and security - Gauthier Van Damme (IBBT-COSIC- K.U.Leuven) & Kris Vanhecke( IBBT-WICA-UGent)

  • 1. Architecture and security Gauthier Van Damme, IBBT/COSIC, K.U.Leuven Kris Vanhecke, IBBT/WICA, UGent
  • 2.
  • 3.
  • 4. The NFC Voucher System Registration TSM Handset Voucher Issuer 4 2 3 5 MIDlet/Applet Public Key Certificate 1 Phone Number Public Key/Certificate
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13. Practical: user-side features Check Balance Review History Make Payment MMS Intercept Phone 2 Phone Configuration
  • 14.
  • 15.
  • 16. 2. Making a payment at the cash desk MIDlet 1 2 3 Notification External Reader Detected ISO 14443 (APDUs) Check new balance JSR-257
  • 17. 3. Transferring Vouchers to users MIDlet 2 3 4 Notification JSR-257 MIDlet JSR-257 Initialize transaction 1 Start protocol Execute protocol 4
  • 18.
  • 19.

Hinweis der Redaktion

  1. Gauthier van damme van cosic , kuleuven en samen met wica van gent
  2. Security issues van offline digitaal systeem geven: moeilijker dan online omdat geen direct controle  duidelijk uitleggen OS: niet OS zelf maar malware/virus op systeem SE: veilige hw
  3. The voucher issuer that wants to add a user to the system, contacts the TSM and gives him the user phone number The TSM which is the only one that has has access to the SE uploads both the phone and the se application through OTA communication on the users phone Once installed, the SE applet will generate internally a secret key pair and output its public key to the TSM The TSM transfers the public key to the issuer, which creates a certificate on it. This is send back to the user which then can prove the authenticity of his public key to other users/terminals
  4. Different actors, PKI for max security, Voucher lifecycle explained: from issuer and back: short  more in detail during different use cases Sleutel gebruik focus!!!!!!!!!! -  met publieke sleutel sessie sleutel aanmaken: in alle transacties zelfde systeem zeggen Zeggen handset 2 daarna gebruik te maken van ontvangen vouchers
  5. After this short description of the system I’ll get a bit more technical, sorry for that As I said, there are two component active on the user phone First the midlet which is an applciation running on the OS will act as an interface to the user through the gui/keypad and will also route both encrypted vouchers received by mms or by transfer to or from the SE. The their is also this famous SE i’ve been talking about which is a java card and acts as a secure token and thus is the security backbone of the system. It will... See bullets
  6. Here we briefly discuss a few aspects of OS especially relevant in the context of the NFC-Voucher demonstrator. MIDLET suite = applications And it also contains a push registry and some security which i’ll discuss in the following slides
  7. The PushRegistry, based on a predetermined timer, or from an inbound network connection.
  8. As I mentionned, the phone OS has some security feature So for example ... Sending an SMS requires explicit user confirmation But as you can see, these features are far from enough to protect a critical system like ours against malware or other type of attacks And this is why we came to using this SE for all critical data and voucher management
  9. But the insecurity of the OS is not the only reason we use the SE. Although NFC has a small communication range, major security issues were shown to exist. This means that even if the OS could be trusted, the contactless communication used enables outsiders to attack the system as well. The attacker could for example ... See bullets And all these problems imply 3 major risks in our offline voucher scheme ... See bullets So the SE will not only be needed to have a secure environment for managing critical data, but will also be used to secure the contactless transactions
  10. And securing the contacless transactions of course leads us to the use of strong cryptography! And for this we used the functionalities of the SE to the fullest. First as i already said, only a TSM can load applets on the SE and the user or OS has only limited (controlled) access to the SE Then we choose not to have any voucher leave the secure element unencrypted. This solves the problem of vouchers getting stolen or getting duplicated as no user will ever see any voucher unencrypted. Finally we choose to have every voucher to be signed digitally by the issuer to avoid vouchers being created. This is because only the issuer will be able to create a provably signature on the vouchers using his secret key. So this way, our theoretical system solved all the major issues from the previous slide. The only thing left was to implement the system.
  11. And this is where, even though our architecture and thus the security offered did not change, we encountered some unfortunate limitations. The SE contained in the phones we use is .... The first problem we encountered is that our cryptografic primitives of choice were not available. For example we would have used ECC as public key scheme instead of RSA to reduce the key length for the same amount of security. This would have given us shorter vouchers as the signature on the vouchers is as long as the key length and thus less data would have to be transfered in every transaction. The second problem which is a major one concerning the speed of the system is the very slow memory access in the java card. This is why for example a private key siganture generation takes approximatly 300 ms to execute instead of the 30ms the hardware would theoretically be cappable of. A third issue which is related to the other is the limited amount of memory: As the vouchers are relatively long due to the long signature, only a limited amount of vouchers can be stored. But ok, these issues do not affect the system’s security but only the system’s speed. And this closes the more technical part of this presentation
  12. I will now get in more detail on what the user can do inside this voucher system. This slides gives an overview of the different features that were developed. The three scenarios that we will look at in more detail are receiving new vouchers via MMS, making payments at the cash desk and transferring vouchers to other users. During the hands on demo you will be able to explore the other features of the prototype.
  13. So here are the three use cases again You have the mms transfer from issuer to user (show on slide) You have NFC payments of vouchers at a cash desk ... And you have nfc voucher transfer to other users...
  14. MMS blabla, was developped for sending sound/images but can also be used to send raw data. Depending on some value in the MMS, the phone OS will send the MMS not to the user inbox but will launch the voucher midlet that will then send the data to the SE. More specifically, the NFC voucher MMS contains the vouchers encrypted under the public key of the user For example, sending 20 vouchers will result in approximatly 3 kByte of data. And here i also want to emphase again that the major part of this data is used by the signature on the voucher, so here again a signature scheme with smaller signature would pay off.
  15. Sleuteluitwisseling ook kort herhalen: sessiesleutel ifv van publieke afgesproken De verschillende fases goed uitleggen! (verschil volgende slide: 1 fase) At the payment desk, the user will touch the payment terminal. The internal security element then interacts with the external reader, exchanging public keys and setting up a session key. The user then removes his phone and The voucher application (MIDlet) is launched, asking the user to confirm the payment amount the MIDlet communicates with the secure element approving or not the requested voucher transaction and the user touches the terminal again to transfer the vouchers, encrypted under the session key and so finish the transaction. The Midlet can now inform the user that his balance has changed
  16. Note that in ‘3’, the protocol is executed between the two secure elements, the MIDlet only acting as an APDU router Use ‘sender’ and ‘receiver’!!!!!!!!!!!!!!!!!!!!!!!! Same as previous: don’t forget to explain the session key and the encryption of the vouchers under this key
  17. So to conclude, first of all we look at the security problems that were solved and those that were not. As I already explained, most of the problems were solved. Only one small problem which is not really depends on the security but more on the transaction protocol remains. As you can see in the previous slide, if during the transfer of the encrypted vouchers, the connection gets broken, then the vouchers can get lost in transaction. To prevent this we do not remove the vouchers from the sender’s phone untill an acknolagment from the receiver is send. Instead we mark the vouchers that are leaving the sender’s phone as ‘dirty’. With this system, when these vocuhers do arrive proparly, and thus the sendere receives the Acknoledgment, the vouchers can be removed, and if they do not (or if the ACK does not) arrive, then the vouchers are not completely lost and the user can claim his dirty vouchers back at the end of their expiration date, if no one else has consumed them (because in the case the vouchers arrive but the ack does not, vouchers get ‘duplicated’).
  18. Finally, we think of this system as very promising. Compared to other fdigital payment systems it has major improvement. For example cheking your balance anytime anywere or transfer from usre to user. And this without having any known security risk. The only downside of the system is the Speed. This is due as explained to different factors: large vouchers, limitations of SE/Phones hardware. For example tranferring one voucher to another user needs approximatly 6 seconds while a payment takes 4 second. The difference between thes two figures lies in the fact that during a payment, one side of the protocol lies a much more performent payment terminal. But as you will see in the demo after this presentation, these timings are not so disatrous as they look, especially knowing that better hardware would solve most of this. Thank you!