Advertisement

PCA: Jini-based Personal Card Assistant

  • Roger Kehr
  • Joachim Posegga
  • Harald Vogt
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1740)

Abstract

We describe the Personal Card Assistant, a scenario that brings together PDAs and smartcards. The underlying idea is that a PDA acts as a personal device for controlling a smartcard attached to it using an asymmetric key pair.

We describe how such an approach can be used for creating digital signatures: in particular, we can circumvent the problems involved with untrusted document viewers in this context.

We consider what sort of network infrastructure is required for using the PCA and outline how Jini can be used for integrating the PDA and smartcards into unknown service networks a mobile user is confronted with.

Keywords

Digital Signature Cryptographic Protocol Authentication Service Card Reader Brute Force Attack 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Deutscher Bundestag. Gesetz zur digitalen Signatur. http://www.regtp.de/Fachinfo/Digitalsign/neu/rechtsgr.htm, 22 July 1997. English Version (“Digital Signature Act”) available from http://www.regtp.de/English/laws/download.htm.
  2. 2.
    Deutscher Bundestag. Verordnung zur digitalen Signatur. http://www.regtp.de/Fachinfo/Digitalsign/neu/rechtsgr.htm, 22 July 1997. English Version (“Digital Signature Ordinance”) available from http://www.regtp.de/English/laws/download.htm.
  3. 3.
    Commission of the European Communities. Information technology evaluation criteria. Directorate XXIII/F, SOG Information Security, 1991.Google Scholar
  4. 4.
    European Telecommunications Standards Institute. Specification of the SIM Application Toolkit (GSM 11.14), 1998. http://www.etsi.org.
  5. 5.
    Sun. Jini Architecture Specification-Revision 1.0. Sun Microsystems Inc., January 1999.Google Scholar
  6. 6.
    Joachim Posegga. Die Sicherheitsaspekte von Java. Informatik-Spektrum, 21(1):16–22, 1998.CrossRefGoogle Scholar
  7. 7.
    Sun. Jini Lookup Service Specification-Revision 1.0. Sun Microsystems Inc., January 1999.Google Scholar
  8. 8.
    Sun. Jini Discovery and Join Specification-Revision 1.0. Sun Microsystems Inc., January 1999.Google Scholar
  9. 10.
    Jaap Haartsen, Mahmoud Naghshineh, Jon Inouye, Olaf J. Joeressen, and Warren Allen. Bluetooth: Visions, goals, and architecture. ACM Mobile Computing and Communications Review, 2(4), October 1998.Google Scholar
  10. 11.
    Bluetooth Technology Overview. http://www.bluetooth.com.
  11. 12.
    Sun. Jini Device Architecure Specification-Revision 1.0. Sun Microsystems Inc., January 1999.Google Scholar
  12. 13.
    Dirk Husemann and Reto Hermann. OpenCard Framework. Technical report, IBM Corporation, 1998.Google Scholar
  13. 14.
    OpenCard Forum. http://www.opencard.org.
  14. 15.
    Specifications for PC-ICC Interoperability. http://www.smartcardsys.com.
  15. 16.
    B. Clifford Neuman and Theodore Ts’o. Kerberos: An Authentication Service for Computer Networks. IEEE Communications Magazine, 32(9):33–38, September 1994.CrossRefGoogle Scholar
  16. 17.
    A. Pfitzmann, B. Pfitzmann, M. Schunter, and M. Waidner. Vertrauenswurdiger Entwurf portabler Endgerate und Sicherheitsmodule. In H. H. Bruggemann and W. Gerhardt-Hackl, editors, Verlaβliche IT-Systeme, Braunschweig, 1995.Google Scholar
  17. 18.
    Neil Daswani and Dan Boneh. Experimenting with Electronic Commerce on the PalmPilot. In Financial Cryptography’ 99, Conference Pre-Proceedings, Anguilla, BWI, 22 Februar 1999.Google Scholar
  18. 19.
    Safe Internet Programming Group Princeton University. Smarter Smartcards-Using Devices That Support User Interaction. http://www.cs.princeton.edu/sip/projects/handheld/, 1999.
  19. 20.
    Jean-Jacques Vandewalle and Eric Vétillard. Developing Smart Card-Based Applications using Java Cards. In Proceedings of the Third Smart Card Research and Advanced Application Conference (CARDIS’98), Louvain-la-Neuve, Belgium, September 1998.Google Scholar
  20. 21.
    J. Veizades, E. Guttman, C. Perkins, and S. Kaplan. Service Location Protocol (SLP). Internet RFC 2165, June 1997.Google Scholar
  21. 22.
    Steven Czerwinski, Ben Y. Zhao, Todd Hodes, Anthony Joseph, and Randy Katz. An Architecture for a Secure Service Discovery Service. In Fifth Annual International Conference on Mobile Computing and Networks (MobiCOM’ 99), Seattle, WA, August 1999. Draft version, accepted for publication.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1999

Authors and Affiliations

  • Roger Kehr
    • 1
  • Joachim Posegga
    • 1
  • Harald Vogt
    • 1
  1. 1.Deutsche Telekom AGTechnologiezentrumDarmstadt

Personalised recommendations