Advertisement

Application Level Smart Card Support through Networked Mobile Devices

  • Pierpaolo Baglietto
  • Francesco Moggia
  • Nicola Zingirian
  • Massimo Maresca
Conference paper
  • 394 Downloads
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2828)

Abstract

This paper addresses the problem of using networked mobile devices as providers of cryptographic functions. More specifically the paper describes a system developed to allow the usage of portable devices, such as PDAs and mobile phones, as remote smart card readers when connected into a TCP/IP network. This system is completely transparent to desktop applications. The digital signature technology, at its highest level of security, requires the use of smart cards and smart card readers not yet widely deployed. This requirement limits the mobility and may turn out to be an obstacle to the wide adoption of the digital signature technology. Our work aims precisely at facilitating the adoption of the smart card technology by means of PDAs and mobile phones.

Keywords

Mobile Phone Mobile Device Smart Card Application Programming Interface Cryptographic Function 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    Rohs, M., Vogt, H.: Smart Card Applications and Mobility in a World of Short Distance Communication, CASTING Project Tech Report, ETH Zurich (January 2001)Google Scholar
  2. 2.
    Kehr, R., Rohs, M., Vogt, H.: Mobile Code as an Enabling Technology for Service-oriented Smartcard Middleware. In: Proc. 2nd Int. Symposium on Distributed Objects and Applications DOA 2000, Antwerp, Belgium, September 2000, pp. 119–130. IEEE Computer Society, Los Alamitos (2000)Google Scholar
  3. 3.
    Guthery, S., Kehr, R., Posegga, J., Vogt, H.: GSM SIMs as Web Servers. In: 7th International Conference on Intelligence in Services and Networks IS&N, Athens, Greece (February 2000)Google Scholar
  4. 4.
    Chan, A., Tse, F., Cao, J., Leong, H.: Enabling distributed Corba Access to smart card applications. Ieee Internet Computing 6(3), 27–36 (2002)CrossRefGoogle Scholar
  5. 5.
    RSA Laboratories. PKCS#11 v2.11: Cryptographic Token Interface Standard (November 2001) Google Scholar
  6. 6.
    Coleridge, R.: The Cryptography API, or How to Keep a Secret. Microsoft Developer Network Technology Group (August 1996)Google Scholar
  7. 7.
    Allen, C., Dierks, T.: The TLS Protocol, Version 1.0. Internet RFC 2246 (January 1999)Google Scholar

Copyright information

© IFIP International Federation for Information Processing 2003

Authors and Affiliations

  • Pierpaolo Baglietto
    • 1
  • Francesco Moggia
    • 1
  • Nicola Zingirian
    • 2
  • Massimo Maresca
    • 2
  1. 1.DIST University of GenoaGenovaItaly
  2. 2.DEIUniversity of PaduaPadovaItaly

Personalised recommendations