Skip to main content

Secure Middleware for Mobile Phones and UICC Applications

  • Conference paper
Mobile Wireless Middleware, Operating Systems, and Applications (MOBILWARE 2011)

Abstract

In this paper we describe our concept, design and current prototype implementation of a new middleware for mobile phones and UICC. The purpose of the middleware is to be used as an interface between applications, loaded in mobile phones, and functionalities of the corresponding supporting modules (applets) stored in UICC. At the moment, our middleware supports only security and mobile payment functions. Our primary goal was to explore the features that multi–application chips provide and to create a new way for handling of sensitive information when stored and used in mobile phones. Another goal is to extend the middleware to hide technology details of underlying UICC and their applets, so that applications developed on the top of the middleware are independent of the underlying mobile phone technologies. We plan to extend the current version of our middleware module to be used with other UICC applications and alternative mobile operating systems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Wireless Intelligence, http://www.wirelessintelligence.com (accessed January 26, 2011)

  2. International Standards Organization (ISO): Identification cards – Integrated Circuit Cards – Part 4: Organization, security and commands for interchange. International Standards Organization, ISO 7816-4 (2005)

    Google Scholar 

  3. Bishop, M.: Computer Security: Art and Science, pp. 348–349. Addison-Wesley, Boston (2003)

    Google Scholar 

  4. Oracle: Java Platform Micro Edition Software Development Kit 3.0 for Windows, http://www.oracle.com/technetwork/java/javame/downloads/sdk30-jsp-139759.html (accessed January 26, 2011)

  5. Java Community Process: Security and Trust Services API (SATSA) for JAVATM 2 Platform, Micro Edition. Java Community Process, JSR-177 (2007)

    Google Scholar 

  6. Zhang, F.: Secure Applications for Financial Environments (SAFE) System. Licentiate Thesis Report, pp. 66–73 (2010)

    Google Scholar 

  7. European Telecommunications Standards Institute (ETSI): UICCs: Secured Packet Structure for UICC-based Applications. ETSI TS 102.225 V7, www.etsi.org (accessed September 21, 2010)

  8. Global Platform: Global Platform Card Specifications, version 2.2, www.golbalplatform.org/secificationscard.asp (accessed September 23, 2009)

  9. Lenhart, G.: The UICC Platform. ETSI Technical Committee UICC Platform, http://portal.etsi.org/scp/summary.asp (accessed September 23, 2009)

  10. Guthery, S.B., Cronin, M.J.: Mobile Application Development with SMS and the SIM Toolkit, pp. 131–155. McGraw-Hill Professional (2001)

    Google Scholar 

  11. Guthery, S.B., Cronin, M.J.: Mobile Application Development with SMS and the SIM Toolkit, p. 117. McGraw-Hill Professional (2001)

    Google Scholar 

  12. Kounelis, I.: Design and Implementation of Secure Mobile Phone Middleware for UICC Chips. M.Sc. Thesis, ICT/KTH (June 2010)

    Google Scholar 

  13. STMicroelectronics: ST21Y144, Smartcard MCU with 114 Kbytes High Density EEPROM (March 2007), www.st.com (accessed May 5, 2011)

  14. Shanghai Huanhong Integrated Circuit Co.: SHC 1206, www.arm.com (accessed: May 5, 2011)

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Kounelis, I., Zhao, H., Muftic, S. (2012). Secure Middleware for Mobile Phones and UICC Applications. In: Venkatasubramanian, N., Getov, V., Steglich, S. (eds) Mobile Wireless Middleware, Operating Systems, and Applications. MOBILWARE 2011. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 93. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-30607-5_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-30607-5_14

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-30606-8

  • Online ISBN: 978-3-642-30607-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics