An Open Mobile Identity: An Architecture for Mobile Identity Management Konstantin Hyppönen University of Kuopio Finland.

Slides:



Advertisements
Similar presentations
Michal Bodlák. Referred to as mobile money, mobile money transfer, and mobile wallet generally refer to payment services operated under financial regulation.
Advertisements

HCE AND BLE UNIVERSITY TOMORROWS TRANSACTIONS LONDON, 20 TH MARCH 2014.
NFC Devices: Security and Privacy
1 GP Confidential © GlobalPlatform’s Value Proposition for Mobile Point of Sale (mPOS)
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
Understanding Networked Applications: A First Course Chapter 14 by David G. Messerschmitt.
Cross Platform Single Sign On using client certificates Emmanuel Ormancey, Alberto Pace Internet Services group CERN, Information Technology department.
Lect. 18: Cryptographic Protocols. 2 1.Cryptographic Protocols 2.Special Signatures 3.Secret Sharing and Threshold Cryptography 4.Zero-knowledge Proofs.
Civil Registry Agency of the Ministry of Justice, Georgia Digital Signature Services in Georgia Mikheil Kapanadze.
ZTM Current State and plans for the future a collection fees on travel.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
Mar 12, 2002Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities SSL/TLS.
Using Cryptographic ICs For Security and Product Management Misconceptions about security Network and system security Key Management The Business of Security.
User Managed Privacy Using Distributed Trust Privacy and Security Research Workshop Carnegie Mellon University May 29-30, 2002 Lark M. Allen / Wave Systems.
FIT3105 Smart card based authentication and identity management Lecture 4.
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
Cyber Security and Key Management Models Smart Grid Networks The Network System Key Management and Utilization Why Hardware Security Christopher Gorog,
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
Mar 4, 2003Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities.
CMSC 414 Computer and Network Security Lecture 19 Jonathan Katz.
CERTIFICATES “a document containing a certified statement, especially as to the truth of something ”
CMSC 414 Computer and Network Security Lecture 14 Jonathan Katz.
TrustPort Public Key Infrastructure. Keep It Secure Table of contents  Security of electronic communications  Using asymmetric cryptography.
SMARTCARDS. What we’ll cover: How does the Smart Card work (layout and operating system)? Security issues for the card holder The present and future of.
1 Authentication Protocols Celia Li Computer Science and Engineering York University.
Alexander Potapov.  Authentication definition  Protocol architectures  Cryptographic properties  Freshness  Types of attack on protocols  Two-way.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 10: Authentication Guide to Computer Network Security.
Information Security for Managers (Master MIS)
LEVERAGING UICC WITH OPEN MOBILE API FOR SECURE APPLICATIONS AND SERVICES Ran Zhou 1 9/3/2015.
Hsu-Chen Cheng, *Wen-Wei Liao, Tian-Yow Chi, Siao-Yun Wei
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
Security Keys, Signatures, Encryption. Slides by Jyrki Nummenmaa ‘
Registration Processing for the Wireless Internet Ian Gordon Director, Market Development Entrust Technologies.
1 Using EMV cards for Single Sign-On 26 th June st European PKI Workshop Andreas Pashalidis and Chris J. Mitchell.
Keep Your Enemies Close: Distance Bounding Against Smartcard Relay Attacks Authors: Saar Drimer and Steven J. Murdoch Presented in: Usenix Security Symposium.
Shambhu Upadhyaya Security –Upper Layer Authentication Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 10)
Near Field Communication Systems Patras, July 2006.
Ignite Presentation: Near Field Communication Harry Yang.
, Josef NollNISnet NISnet meeting Mobile Applied Trusted Computing Josef Noll,
Identity Management: A Technical Perspective Richard Cissée DAI-Labor; Technische Universität Berlin
Encryption Questions answered in this lecture: How does encryption provide privacy? How does encryption provide authentication? What is public key encryption?
Middleware for Secure Environments Presented by Kemal Altıntaş Hümeyra Topcu-Altıntaş Osman Şen.
CSCE 522 Identification and Authentication. CSCE Farkas2Reading Reading for this lecture: Required: – Pfleeger: Ch. 4.5, Ch. 4.3 Kerberos – An Introduction.
Authentication Issues and Solutions CSCI 5857: Encoding and Encryption.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Kerberos Guilin Wang School of Computer Science 03 Dec
Pertemuan #9 Security in Practice Kuliah Pengaman Jaringan.
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
COEN 351 Authentication. Authentication is based on What you know Passwords, Pins, Answers to questions, … What you have (Physical) keys, tokens, smart-card.
György Kálmán, Josef Noll Mobile and Wireless Communications Summit, th IST 1-5, July 2007 Speaker : 黃韋綸 Right Management Infrastructure for Home.
Secure Transactions Chapter 17. The user's machine No control over security of user's machine –Might be in very insecure: library, school, &c. Users disable.
Digital Security Jesline James! 9cc. Contents  The CREATORS!!!! =] The CREATORS!!!! =]  What is Digital Security? What is Digital Security?  How does.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
Jason Kuo APSCA October 29, 2010 Convergence and cross usage of secure elements for mobile PKI and secure mobile contactless services.
Information Systems Design and Development Security Precautions Computing Science.
Prof. Reuven Aviv, Nov 2013 Public Key Infrastructure1 Prof. Reuven Aviv Tel Hai Academic College Department of Computer Science Public Key Infrastructure.
Mar 18, 2003Mårten Trolin1 Agenda Parts that need to be secured Card authentication Key management.
Identification (User Authentication). Model Alice wishes to prove to Bob her identity in order to access a resource, obtain a service etc. Bob may ask.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
The Future Digital Identity Landscape in Europe Timothée Mangenot, chairman 14th of December, 2015 ACSIEL partners day.
A l a d d I n. c o m Strong Authentication and Beyond Budai László, IT Biztonságtechnikai tanácsadó.
Computer Communication & Networks
Presentation transcript:

An Open Mobile Identity: An Architecture for Mobile Identity Management Konstantin Hyppönen University of Kuopio Finland

Outline Motivation Ideas Architecture Implementation notes Discussion

Motivation 1 The mobile phone has become a highly personal device: – Phonebook – – Music, videos – Landmarks – Payment-related information – Personal files

Motivation 2 Electronic identity documents: – Identity cards – Biometric passports – SIM-based identification Security/privacy improvements over the old documents?

Motivation 3 “ -scenario” Reveal yourself to prove your age. Why?

Motivation 4 Privacy-enhancing technologies: – State of public research is reasonably mature – Real life?

Idea 1 Mobile phone as an identity token: – Officially recognised PKI-SIM cards available in Finland, Estonia, … – Mobile network operators have the central role in current implementations.

Idea 2 A proof of a certain attribute......shown by a mobile phone?

Idea 3 The mobile phone as a contactless multi- application smart card – Such cards have been available since 2001, but are still hard to find in the real life – Post-issuance downloading of applets usually disabled (mostly due to security reasons) – A second try with mobile phones? Can it be made open?

Credentials on mobile phones Three options for a storage place: – Unprotected memory Suitable for non-critical applications only – Security environments See e.g. Nokia OnBoard Credentials Fully open Certification issues – SIM card Can be easily moved to another phone Property of the MNO — any solutions?

PKI-SIM: Current implementation Figure by Pekka Rauhala, HST group

Access to SIM The SIM card is owned by the operator – Access to SAT applets – Mobile user authentication (GAA) – Installation of new applets over-the-air Other service providers can use it – A contract with the operator is needed – The operator charges for services – Only online use

Access to SIM JSR-177 Security and Trust Services, SATSA: – Access to SIM-based applets from Java ME – Exchange of APDU messages – Supported by Nokia Series 40 since 3rd Edition FP 2 Nokia Series 60 since 3rd Edition Certain Sony Ericsson, BenQ, Motorola models

Near Field Communication A short-range communication technology. Three modes of operation: – Reader/writer mode for tags and smart cards – Tag emulation mode – Peer-to-peer mode (up to 424 kbit/s) Nokia 3220Nokia 5140iNokia 6131 NFCBenQ T80 (with NFC shells only) ‏

Near Field Communication Potentially, bright future: – ABI Research: 20% of phones will have NFC by year – Recently, ETSI has defined an interface between SIM and NFC. – Proximity payments already offered by Visa and MasterCard.

Near Field Communication Potentially, some problems: – Tampering with tags used in NFC services (Collin Mulliner, EUSecWest 2008) – Attacks are similar to those based on manipulating with PIN entry devices (PEDs) in chip payments (Drimer, Murdoch) Protection against maliciously modified tags/terminals? – Authenticate arriving requests, require user's informed consent.

Open Mobile Identity Architecture at a glance: PhoneTerminal Credentials Privacy proxy Java Card applet J2ME applet SATSANFC Security and trust services == Near Field Communication Computer Display UI

Open Mobile Identity The SIM card applet contains: – A pseudonym pool: biometric identifiers, customer numbers, strings. – Identity profiles. A profile contains A private key, generated on-card A certificate issued to a pseudonym, with corresponding certificate chain Attribute certificates with masked values of attributes; attribute masks Secret keys – Profile-loading private key and a corresponding public key certificate

Identity proxy Provides a trusted user interface – Informs the user about requests – Asks for user's consent – Communicates with the SIM card applet – Communicates with the verifier/payment terminal A signed Java ME applet – Signature is checked by the phone before any message exchange with SIM is allowed.

Loading an identity profile Identity issuerIdentity proxySIM card Generate a timestamp T T Generate a keypair {KU, KR} KU signed and timestamped; profile- loading certificate; [pseudonym] Construct CertificationRequestInfo block CRI  CRI  KR Construct Certificate Signing Request CSR; profile-loading certificate, [pseudonym] Construct identity profile data Identity profile data Store identity profile

Identity proofs and digital signatures Identity verifierIdentity proxySIM card Verify request signature; Acquire user's consent Identity profile type; list of attributes; message G to be signed (optional); timestamp T IV Identity profile type Root certificate Generate a timestamp T IP Request data; T IV, T IP Ask and verify PIN, if needed Proof data;  G, T IV, T IP  KR

Other uses Challenge-response protocol – Encrypt a nonce with a secret key – Mobile phone as an electronic key, proximity scenario One-time passwords – Encrypt the current time with a secret key – Mobile phone as a secure authentication token

Biometric authentication Privacy-aware Biometric patterns not released to verifiers TPM/trusted user interface is needed 479a1 is a proof fingerprint

Implementation issues NFC terminals are needed – Not many yet, but the situation may change – Many electronic ticketing trials – Contactless payments with cellphones already work in some places For certificate validation, CRL is probably the best option – Identity proxy must go online from time to time

Implementation issues SIM as a storage place for profiles: – Most SIMs have passed Common Criteria certification – High density SIMs provide tens to hundreds of megabytes of Flash memory for profiles – Not much RAM is required. – 1024-bit RSA signatures in ~200 ms. – Software distribution can be done over-the- air (Sirett et al., CARDIS 2006)

Discussion Benefits + A terminal that the user can trust + Easy time syncronisation + Secure and certified storage for identity info + Fast proximity transactions + No need for extra hardware tokens + Biometrics supported + Privacy-aware + Open for use by anyone: a public tool Drawbacks – Electronic tickets with stored value not supported – Not many NFC terminals – Possible opposition by mobile network operators – Requires installation of a J2ME applet – Pseudonymous, not anonymous

Thank you for your attention! Answer to the first question: Other questions?