Shawn Willden wrote:
On Wednesday 22 March 2006 19:33, Karsten Ohme wrote:
Serious card terminals (OK, it is possible to spoof the PIN, but
maybe this will change and then it is.) have a key pad to enter the
PIN. It would violate the idea behind the concept that the
untrustworthy computer never sees the PIN, only the trustworthy
card terminal. Biometric (Although this is not a serious secure way
to authenticate users in the present time.) data may also only be
entered at the card terminal. The concept should include this.
Further support for my position! :-)
I agree that card readers with integral PIN pads are much better for
security, but with that improvement, PIN caching at the application
level becomes impossible and it becomes even *more* important to have
some mechanism to allow the card authentication state to persist over
time and across applications while simultaneously preventing another
user from hijacking the card.
Indeed, serious card terminals it has got to be. GP is working towards
that, the FINREAD European spec can do it (but a suitable profile has to
be derived from the wide scope of FINREAD), and Wave Systems worked this
out at the end of the 1990s. The role of the PC has to be simplified as
much as possible, and for online transactions communication between card
and server must treat the PC as just another insecure node along the
way. But this needs a major culture change in the way we specify the
card edge and thus write the card software - the user should authorise
the card to authorise the transaction.
But signature (e.g. of emails) is still a problem - the secure terminal
may need a big enough screen to be able to view the email - and the card
(token) needs a high speed interface because it will be in charge of the
terminal screen.
Peter
_______________________________________________
Muscle mailing list
[email protected]
http://lists.drizzle.com/mailman/listinfo/muscle