Visible to the public Trusted Platform Module for Smart Cards

TitleTrusted Platform Module for Smart Cards
Publication TypeConference Paper
Year of Publication2014
AuthorsAkram, R.N., Markantonakis, K., Mayes, K.
Conference NameNew Technologies, Mobility and Security (NTMS), 2014 6th International Conference on
Date PublishedMarch
Keywordsapplication provider, Computational modeling, Computer architecture, cross-device security, data privacy, deployment model, embedded devices, global platform consumer centric model, Hardware, Mobile communication, Mobile handsets, multiapplication smart card initiative, near field communication-based mobile phone services, near-field communication, off-card trusted relationship, privacy preservation platforms, Runtime, security, smart cards, TEE, Trusted Execution Environment, Trusted Platform Module, trusted service manager, UCOM, UCTD, user centric smart card ownership model, User Centric Tamper-Resistant Device
Abstract

Near Field Communication (NFC)-based mobile phone services offer a lifeline to the under-appreciated multiapplication smart card initiative. The initiative could effectively replace heavy wallets full of smart cards for mundane tasks. However, the issue of the deployment model still lingers on. Possible approaches include, but are not restricted to, the User Centric Smart card Ownership Model (UCOM), GlobalPlatform Consumer Centric Model, and Trusted Service Manager (TSM). In addition, multiapplication smart card architecture can be a GlobalPlatform Trusted Execution Environment (TEE) and/or User Centric Tamper-Resistant Device (UCTD), which provide cross-device security and privacy preservation platforms to their users. In the multiapplication smart card environment, there might not be a prior off-card trusted relationship between a smart card and an application provider. Therefore, as a possible solution to overcome the absence of prior trusted relationships, this paper proposes the concept of Trusted Platform Module (TPM) for smart cards (embedded devices) that can act as a point of reference for establishing the necessary trust between the device and an application provider, and among applications.

DOI10.1109/NTMS.2014.6814058
Citation Key6814058