So the cutest demo Ive seen with GP technology - on your/CESG's
characterization of the core issue - is this:
user uses cap-sensor finger reader on card, to bind human to card.
Controlling Authority of a given GP security domain downloads parameters to
the security domain, each augmentment critical info with several https URL
links, and the control info allow local reliance on said server's https
cert.
User logs into website, doing e-e auth using GP securitiy domain keying,
based on SCP-0205. User arms/authorized card to engagned in particular URL
link (i.e. do https, afterwards) using buttons/leds on card; Seucrity Domain
controls whether PC capi can verify particular http's site cert (or use CAPI
for card-enhanced client auth) based on button (aka/ URL) status. Card
display show one-time code, synced with website logon page.
All pretty complex (and just a demo...), but exploiting trusted UI/user-auth
on the card, bascially, versus any new protocols. Just an application
context, bundling several enforcing protocols.
From: Peter Tomlinson <[EMAIL PROTECTED]>
Reply-To: MUSCLE <[email protected]>
To: MUSCLE <[email protected]>
Subject: Re: [Muscle] SCARD_SCOPE_USER [ Was Restricting reader/card
accessby user account]
Date: Mon, 27 Mar 2006 15:55:33 +0100
Shawn Willden wrote:
I need the card to be restricted to a user, not an application. It
seems to me that the same scenario will arise with pretty much any
multi-application card.
As we were reminded by a man from CESG [1] at a conference that I attended
last week, the card doesn't identify anyone: it is the binding between card
holder and card that does that as long as the interaction between card and
system is also strong. Thus you need a method to create a persistent
authenticated state for the card holder (could be PIN, physical biometric,
etc, to establish it, but how do you make it persist?) in order to do what
you want to do, an authenticated state that the remote server (and I think
in some of your cases the PC, but beware: its not secure so it has to be
protected) are forced to respect. This is where thinking is moving at last
towards having not a simple card reader but a low cost secure sub-terminal
(looks like a PIN pad, but needs to be more secure than that) and somewhat
different algorithms in the card - see FINREAD [2], talk to the Wave
Systems people, maybe even talk to GlobalPlatform people (their new
Technical Director was not very positive in his presentation last week but
better one on one). If a transaction needs to be secure it has to be
authorised by the card, and that may mean getting the sub-terminal to ask
the card holder if the transaction can go ahead.
Peter
[2] UK electronic security service for the civil (i.e. visible) part of
govt ICT
[2] But don't be fooled by FINREAD's complexity (reject all the stuff about
downloadable updates and just look at the basic concept of a router: system
can only talk to card; card talks to system and sub-terminal peripherals
(I/O devices)).
_______________________________________________
Muscle mailing list
[email protected]
http://lists.drizzle.com/mailman/listinfo/muscle
_______________________________________________
Muscle mailing list
[email protected]
http://lists.drizzle.com/mailman/listinfo/muscle