SlideShare a Scribd company logo
1 of 22
Download to read offline
Key2Share: NFC-enabled
Smartphone-based Access Control
                      Alexandra Dmitrienko
       Cyberphysical Mobile Systems Security Group
               Fraunhofer SIT, Darmstadt



   In collaboration with TU Darmstadt, Center for Advanced Security
Research in Darmstadt (CASED), Intel Collaborative Research Institute for
 Secure Computing (ICRI-SC) at TU-Darmstadt, Bosch Security Systems
Near Field Communication (NFC)
          Applications

                + NFC =
      services in one touch



    mPayments        mTicketing
Why not Using a Smartphone as a Key?


                 + NFC =
Smartphone as a Door Key
 Access control by enterprises to their facilities
 Access control in private sector (houses, garages)




                                                       4
Smartphone as a Door Key
 Access to hotel rooms




                                   5
Smartphone as a Car Key/Immobilizer
 Fleet management by enterprises
 Car sharing with family members or friends




                                               6
Smartphone as a Car Key/Immobilizer
 Car sharing by rental/car sharing companies




                                                7
Smartphone for Access to Storage
             Facilities
 Access to safes in hotel rooms
 Lockers in luggage storage at train stations/airports


                      DHL packing stations




                                                          8
Smartphone for Access to Storage
             Facilities
 DHL packstations




                                      9
Smartphone for Access to Facilities
 E.g., parking houses




                                        10
Usual Keys vs. SmartCards vs. Key2Share
                     Usual Keys             SmartCards        Key2Share



 Distribution    Requires physical       Requires physical   Remote
                 access                  access
 Revocation      Requires physical       Remote              Remote
                 access or replacement
                 of the lock
 Delegation      Not possible            Not possible        Possible


 Context-aware   Not possible            Possible            Possible
 access (e.g.,
 time frame)

                                                                          11
Key2Share: System Architecture
 Issuer                   1. Employ the employee/sell the car
                                                                    Users

            Key2Share         2. One-time registration
            web-service
                            3. Electronic key issued




                                                                     5. Share key
                              4. User Authentication
                                with the issued key

                              6. User Authentication
                               with the shared key
Resources

                                                                Delegated users
                                                                                    12
Key Sharing
 The key to be shared is represented as a QR-code
    Can be sent to the recipient per e-mail, MMS
     or scanned by a camera of another device
QR Code: What’s Inside?
 Electronic keys of Key2Share are similar to passports




 Issued by a central authority    Government        Enterprise
 Issued for a particular entity     Citizen          Employee
 Public (not a secret)                Yes         Yes (encrypted)
 Has binding to an identity of                   Cryptographic key
                                    Photo
 an entity it is issued for                    bound to the platform



                                                                       14
Key2Share Security
Platform Security     Secure communication
                      protocols




                                             15
Protocol Security

Well-established cryptographic
primitives (AES, SHA-1, RSA)

Formal security proof of the
protocols

Formal tool-aided verification of
protocols



                                    16
Platform Security
   Different trade-offs between security and requirements
    to a mobile device

        Less secure                                            More secure



   Built-in Security         System level software-based     Hardware-based
Mechanisms of Mobile OS           security extensions       security extensions

  No extra requirements to     Requires update of system   Requires support in
  mobile hardware and          software (e.g., OS)         hardware. Available
  system software (e.g.,                                   only on some
  operating system)                                        mobile platforms




                                                                                  17
Platform Security
Software-based security       Hardware-based security
extensions                    extensions




 provided by BizzTrust       Require support in hardware
  architecture                e.g., Giesecke & Devrient Mobile
                               Security Card http://www.gd-
 http://www.bizztrust.de/     sfs.com/the-mobile-security-
                               card/
                              Can be attached to the device
                               via microSD card slot           18
Supported Platforms
 Android NFC-enabled platforms
  (e.g., Samsung Nexus S, Galaxy S3)




                                       19
Summary

Flexible access rights:
 policy-based
 easy delegation
 remote revocation
 managable
Current Work

Proof of Concept with Bosch Security Systems:
 Key2Share as Access Pass
 Key2Share as Building Block in Bosch‘s
  „Access-Control-as-a-Service“
 Compatibility with already deployed
 infrastructure (wireless readers, management
 software)
Thank you
alexandra.dmitrienko@sit.fraunhofer.de




                                         22

More Related Content

Similar to Key2 share moosecon

Smart Cards & Devices Forum 2012 - Securing Cloud Computing
Smart Cards & Devices Forum 2012 - Securing Cloud ComputingSmart Cards & Devices Forum 2012 - Securing Cloud Computing
Smart Cards & Devices Forum 2012 - Securing Cloud Computing
OKsystem
 
SmartCard Forum 2011 - Evolution of authentication market
SmartCard Forum 2011 - Evolution of authentication marketSmartCard Forum 2011 - Evolution of authentication market
SmartCard Forum 2011 - Evolution of authentication market
OKsystem
 
Securing online services by combining smart cards and web-based applications
Securing online services by combining smart cards and web-based applicationsSecuring online services by combining smart cards and web-based applications
Securing online services by combining smart cards and web-based applications
Olivier Potonniée
 
Droidcon2013 key2 share_dmitrienko_fraunhofer
Droidcon2013 key2 share_dmitrienko_fraunhoferDroidcon2013 key2 share_dmitrienko_fraunhofer
Droidcon2013 key2 share_dmitrienko_fraunhofer
Droidcon Berlin
 
Cloud security - The Cloud is as Secure as you want it to be! - Indicthreads ...
Cloud security - The Cloud is as Secure as you want it to be! - Indicthreads ...Cloud security - The Cloud is as Secure as you want it to be! - Indicthreads ...
Cloud security - The Cloud is as Secure as you want it to be! - Indicthreads ...
IndicThreads
 
Securing the Smart Grid with SafeNet HSMs
Securing the Smart Grid with SafeNet HSMsSecuring the Smart Grid with SafeNet HSMs
Securing the Smart Grid with SafeNet HSMs
SafeNet
 
Public key authentication is the most secure colution and utilizes a.pdf
Public key authentication is the most secure colution and utilizes a.pdfPublic key authentication is the most secure colution and utilizes a.pdf
Public key authentication is the most secure colution and utilizes a.pdf
mohammadirfan136964
 

Similar to Key2 share moosecon (20)

Access Control in Enterprises with Key2Share
Access Control in Enterprises with Key2ShareAccess Control in Enterprises with Key2Share
Access Control in Enterprises with Key2Share
 
Smart Cards & Devices Forum 2012 - Securing Cloud Computing
Smart Cards & Devices Forum 2012 - Securing Cloud ComputingSmart Cards & Devices Forum 2012 - Securing Cloud Computing
Smart Cards & Devices Forum 2012 - Securing Cloud Computing
 
SmartCard Forum 2011 - Evolution of authentication market
SmartCard Forum 2011 - Evolution of authentication marketSmartCard Forum 2011 - Evolution of authentication market
SmartCard Forum 2011 - Evolution of authentication market
 
Single Sign-On for Mobile
Single Sign-On for MobileSingle Sign-On for Mobile
Single Sign-On for Mobile
 
Mobile phone as Trusted identity assistant
Mobile phone as Trusted identity assistantMobile phone as Trusted identity assistant
Mobile phone as Trusted identity assistant
 
Securing online services by combining smart cards and web-based applications
Securing online services by combining smart cards and web-based applicationsSecuring online services by combining smart cards and web-based applications
Securing online services by combining smart cards and web-based applications
 
Droidcon2013 key2 share_dmitrienko_fraunhofer
Droidcon2013 key2 share_dmitrienko_fraunhoferDroidcon2013 key2 share_dmitrienko_fraunhofer
Droidcon2013 key2 share_dmitrienko_fraunhofer
 
ASFWS 2011 - Secure software development for mobile devices
ASFWS 2011 - Secure software development for mobile devicesASFWS 2011 - Secure software development for mobile devices
ASFWS 2011 - Secure software development for mobile devices
 
Webinar on Enterprise Security & android
Webinar on Enterprise Security & androidWebinar on Enterprise Security & android
Webinar on Enterprise Security & android
 
Beam datasheet final 7 28-12
Beam datasheet final 7 28-12Beam datasheet final 7 28-12
Beam datasheet final 7 28-12
 
A wearable token system
A wearable token systemA wearable token system
A wearable token system
 
Cloud security - The Cloud is as Secure as you want it to be! - Indicthreads ...
Cloud security - The Cloud is as Secure as you want it to be! - Indicthreads ...Cloud security - The Cloud is as Secure as you want it to be! - Indicthreads ...
Cloud security - The Cloud is as Secure as you want it to be! - Indicthreads ...
 
Samsung knox security_solution_v1_10_0
Samsung knox security_solution_v1_10_0Samsung knox security_solution_v1_10_0
Samsung knox security_solution_v1_10_0
 
Securing the Smart Grid with SafeNet HSMs
Securing the Smart Grid with SafeNet HSMsSecuring the Smart Grid with SafeNet HSMs
Securing the Smart Grid with SafeNet HSMs
 
Security and Mobile Application Management with Worklight
Security and Mobile Application Management with WorklightSecurity and Mobile Application Management with Worklight
Security and Mobile Application Management with Worklight
 
Blockchain Defined Perimeter (BDP) - Experience the power of Software Defined...
Blockchain Defined Perimeter (BDP) - Experience the power of Software Defined...Blockchain Defined Perimeter (BDP) - Experience the power of Software Defined...
Blockchain Defined Perimeter (BDP) - Experience the power of Software Defined...
 
Block Armour Blockchain Defined Perimeter Brochure
Block Armour Blockchain Defined Perimeter BrochureBlock Armour Blockchain Defined Perimeter Brochure
Block Armour Blockchain Defined Perimeter Brochure
 
Make the Smartcard great again
Make the Smartcard great againMake the Smartcard great again
Make the Smartcard great again
 
Rebooting the smartcard
Rebooting the smartcardRebooting the smartcard
Rebooting the smartcard
 
Public key authentication is the most secure colution and utilizes a.pdf
Public key authentication is the most secure colution and utilizes a.pdfPublic key authentication is the most secure colution and utilizes a.pdf
Public key authentication is the most secure colution and utilizes a.pdf
 

More from Heinrich Seeger

Hasan hosgel moosecon_2013_customers_choice fullsize
Hasan hosgel moosecon_2013_customers_choice fullsizeHasan hosgel moosecon_2013_customers_choice fullsize
Hasan hosgel moosecon_2013_customers_choice fullsize
Heinrich Seeger
 
Moosecon rcs for developers
Moosecon   rcs for developersMoosecon   rcs for developers
Moosecon rcs for developers
Heinrich Seeger
 
Mobile apps on the big screen
Mobile apps on the big screenMobile apps on the big screen
Mobile apps on the big screen
Heinrich Seeger
 
Push notification generaltalk
Push notification generaltalkPush notification generaltalk
Push notification generaltalk
Heinrich Seeger
 
Backendasaservice apiomat
Backendasaservice apiomatBackendasaservice apiomat
Backendasaservice apiomat
Heinrich Seeger
 
Push notification technicaltalk
Push notification technicaltalkPush notification technicaltalk
Push notification technicaltalk
Heinrich Seeger
 
Moosecon native apps_blackberry_10-optimized
Moosecon native apps_blackberry_10-optimizedMoosecon native apps_blackberry_10-optimized
Moosecon native apps_blackberry_10-optimized
Heinrich Seeger
 
Mooscon 2013 cebit - google integration in android apps (1)
Mooscon 2013   cebit - google integration in android apps (1)Mooscon 2013   cebit - google integration in android apps (1)
Mooscon 2013 cebit - google integration in android apps (1)
Heinrich Seeger
 
Dev mobile apps ent it final
Dev mobile apps ent   it finalDev mobile apps ent   it final
Dev mobile apps ent it final
Heinrich Seeger
 

More from Heinrich Seeger (11)

Dennis hoppe droidcon_2014_slide_deck_screen
Dennis hoppe droidcon_2014_slide_deck_screenDennis hoppe droidcon_2014_slide_deck_screen
Dennis hoppe droidcon_2014_slide_deck_screen
 
Hasan hosgel moosecon_2013_customers_choice fullsize
Hasan hosgel moosecon_2013_customers_choice fullsizeHasan hosgel moosecon_2013_customers_choice fullsize
Hasan hosgel moosecon_2013_customers_choice fullsize
 
Moosecon rcs for developers
Moosecon   rcs for developersMoosecon   rcs for developers
Moosecon rcs for developers
 
Mobile apps on the big screen
Mobile apps on the big screenMobile apps on the big screen
Mobile apps on the big screen
 
Push notification generaltalk
Push notification generaltalkPush notification generaltalk
Push notification generaltalk
 
Backendasaservice apiomat
Backendasaservice apiomatBackendasaservice apiomat
Backendasaservice apiomat
 
Paypal
PaypalPaypal
Paypal
 
Push notification technicaltalk
Push notification technicaltalkPush notification technicaltalk
Push notification technicaltalk
 
Moosecon native apps_blackberry_10-optimized
Moosecon native apps_blackberry_10-optimizedMoosecon native apps_blackberry_10-optimized
Moosecon native apps_blackberry_10-optimized
 
Mooscon 2013 cebit - google integration in android apps (1)
Mooscon 2013   cebit - google integration in android apps (1)Mooscon 2013   cebit - google integration in android apps (1)
Mooscon 2013 cebit - google integration in android apps (1)
 
Dev mobile apps ent it final
Dev mobile apps ent   it finalDev mobile apps ent   it final
Dev mobile apps ent it final
 

Recently uploaded

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Recently uploaded (20)

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 

Key2 share moosecon

  • 1. Key2Share: NFC-enabled Smartphone-based Access Control Alexandra Dmitrienko Cyberphysical Mobile Systems Security Group Fraunhofer SIT, Darmstadt In collaboration with TU Darmstadt, Center for Advanced Security Research in Darmstadt (CASED), Intel Collaborative Research Institute for Secure Computing (ICRI-SC) at TU-Darmstadt, Bosch Security Systems
  • 2. Near Field Communication (NFC) Applications + NFC = services in one touch mPayments mTicketing
  • 3. Why not Using a Smartphone as a Key? + NFC =
  • 4. Smartphone as a Door Key  Access control by enterprises to their facilities  Access control in private sector (houses, garages) 4
  • 5. Smartphone as a Door Key  Access to hotel rooms 5
  • 6. Smartphone as a Car Key/Immobilizer  Fleet management by enterprises  Car sharing with family members or friends 6
  • 7. Smartphone as a Car Key/Immobilizer  Car sharing by rental/car sharing companies 7
  • 8. Smartphone for Access to Storage Facilities  Access to safes in hotel rooms  Lockers in luggage storage at train stations/airports DHL packing stations 8
  • 9. Smartphone for Access to Storage Facilities  DHL packstations 9
  • 10. Smartphone for Access to Facilities  E.g., parking houses 10
  • 11. Usual Keys vs. SmartCards vs. Key2Share Usual Keys SmartCards Key2Share Distribution Requires physical Requires physical Remote access access Revocation Requires physical Remote Remote access or replacement of the lock Delegation Not possible Not possible Possible Context-aware Not possible Possible Possible access (e.g., time frame) 11
  • 12. Key2Share: System Architecture Issuer 1. Employ the employee/sell the car Users Key2Share 2. One-time registration web-service 3. Electronic key issued 5. Share key 4. User Authentication with the issued key 6. User Authentication with the shared key Resources Delegated users 12
  • 13. Key Sharing  The key to be shared is represented as a QR-code  Can be sent to the recipient per e-mail, MMS or scanned by a camera of another device
  • 14. QR Code: What’s Inside?  Electronic keys of Key2Share are similar to passports Issued by a central authority Government Enterprise Issued for a particular entity Citizen Employee Public (not a secret) Yes Yes (encrypted) Has binding to an identity of Cryptographic key Photo an entity it is issued for bound to the platform 14
  • 15. Key2Share Security Platform Security Secure communication protocols 15
  • 16. Protocol Security Well-established cryptographic primitives (AES, SHA-1, RSA) Formal security proof of the protocols Formal tool-aided verification of protocols 16
  • 17. Platform Security  Different trade-offs between security and requirements to a mobile device Less secure More secure Built-in Security System level software-based Hardware-based Mechanisms of Mobile OS security extensions security extensions No extra requirements to Requires update of system Requires support in mobile hardware and software (e.g., OS) hardware. Available system software (e.g., only on some operating system) mobile platforms 17
  • 18. Platform Security Software-based security Hardware-based security extensions extensions  provided by BizzTrust  Require support in hardware architecture  e.g., Giesecke & Devrient Mobile Security Card http://www.gd-  http://www.bizztrust.de/ sfs.com/the-mobile-security- card/  Can be attached to the device via microSD card slot 18
  • 19. Supported Platforms  Android NFC-enabled platforms (e.g., Samsung Nexus S, Galaxy S3) 19
  • 20. Summary Flexible access rights:  policy-based  easy delegation  remote revocation  managable
  • 21. Current Work Proof of Concept with Bosch Security Systems:  Key2Share as Access Pass  Key2Share as Building Block in Bosch‘s „Access-Control-as-a-Service“  Compatibility with already deployed infrastructure (wireless readers, management software)