Abstract
This paper describes the functionality and practical uses of a network smart card: a smart card that can connect to the Internet as a secure and autonomous peer. The network smart card does not require any special middleware on the host device. It uses standard networking protocols PPP and TCP/IP to achieve network connectivity. Network security is accomplished by an optimized SSL/TLS stack on the smart card. The combination of TCP/IP and SSL/TLS stacks on the smart card enables the smart card to establish a secure end-to-end network connection with any standard (unmodified) client or server on the Internet. This opens the door to seamless, secure and novel applications of smart cards in the most ubiquitous network: the Internet. Some of these applications that use the network smart card in confidential online transactions are explained.
Chapter PDF
Similar content being viewed by others
References
Simpson, W. “The Point-to-Point Protocol (PPP)”, RFC 1661, July 1994.
Postel, J. “Internet Protocol,” RFC 791, September 1981.
Postel, J. “Transmission Control Protocol,” RFC 793, September 1981.
Socolofsky, T. “A TCP/IP Tutorial,” RFC 1180, January 1991.
Almquist, P. “Type of Service in the Internet Protocol Suite,” RFC 1349, July 1992.
Freier, Alan O., et al. “The SSL Protocol, Version 3.0,” Internet Draft, November 18, 1996. Also see the following Netscape URL: http://wp.netscape.com/eng/ssl3/.
Dierks, T., Allen, C., “The TLS Protocol, Version 1.0,” IETF Network Working Group. RFC 2246. See http://www.ietf.org/rfc/rfc2246.txt.
Elgamal, et al. August 12, 1997, “Secure socket layer application program apparatus and method.” United States Patent 5,657,390.
Rees, J., and Honeyman, P. “Webcard: a Java Card web server,” Proc. IFIP CARDIS 2000, Bristol, UK, September 2000.
Urien, P. “Internet Card, a smart card as a true Internet node,” Computer Communication, volume 23, issue 17, October 2000.
Guthery, S., Kehr, R., and Posegga, J. “How to turn a GSM SIM into a web server,” Proc. IFIP CARDIS 2000, Bristol, UK, September 2000.
Muller, C. and Deschamps, E. “Smart cards as first-class network citizens,” 4th Gemplus Developer Conference, Singapore, November 2002.
Montgomery, M., Ali, A., and Lu, K. “Implementation of a Standard Network Stack in a Smart Card”, CARDIS 2004, Toulouse, France, August 2004.
Lu, K., and Ali, A. “Prevent Online Identity Theft-Using Network Smart Cards for Secure Online Transactions,” 7th Information Security Conference, Palo Alto, CA, September 2004.
Montgomery, M., et al., “Web Identity Card”, Axalto booth, CARTES & IT Security 2003, Paris, France, November 2003.
Ali, A., et al., “Web Identity Card”, Axalto booth, CTST 2004, 14th Annual Conference and Exhibition, Washington D.C., April 2004.
Montgomery, M., et al., “Web Identity Card”, Axalto booth, CARTES & IT Security 2004, Paris, France, November 2004.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 International Federation for Information Processing
About this paper
Cite this paper
Ali, A., Lu, K., Montgomery, M. (2005). Network Smart Card. In: Sasaki, R., Qing, S., Okamoto, E., Yoshiura, H. (eds) Security and Privacy in the Age of Ubiquitous Computing. SEC 2005. IFIP Advances in Information and Communication Technology, vol 181. Springer, Boston, MA. https://doi.org/10.1007/0-387-25660-1_18
Download citation
DOI: https://doi.org/10.1007/0-387-25660-1_18
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-25658-0
Online ISBN: 978-0-387-25660-3
eBook Packages: Computer ScienceComputer Science (R0)