11. Mobile Trusted Devices Flashcards

1
Q

Requirements for Qualified Electronic Signature Creation Devices

A

 Shall ensure: confidentiality, signature creation can occur only once, reliably protected against forgery, protected against use by others
 Shall not alter the data to be signed or prevent such data from being presented
 generating or managing electronic signature creation data on behalf of the signatory may only be done by a qualified trust service provider
 these may duplicate electronic signature creation data only for back-up purposes under following requirements: security of duplicated handsets must be the same as originals & shall not exceed minimum needed to ensure continuity of the service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Popular Vision: Security Assistant (&challenges)

A

storing personal data, performs sensitive processes (e.g. decoding of confidential messages) & assist negotiations (e.g. methods of payment)
— CHALLENGE: usability, protection from unauthorized access to stored data, trust

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Risks in Current Mobile Platforms & solution?

A
  • Risks of malware
  • passwords can be deactivated
  • attackers can steal private information
  • cameras -> invasion of personal privacy
  • communication protocols can be used to attack device/steal data
  • —–> SOLUTION: (embedded) Secure Elements, Trend from open platforms to open and trusted platforms
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Trusted Platform Module (TPM)

A

(from Trusted Computing Group) Chip to make computers more secure as part of TCG
specifications -> like hardcoded smartcard with difference that ≠ bound to specific user but system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Mobile Equipment Identifier (5)

A

IMEI (International Mobile Equipment Identity)–IMSI (International Mobile Subscriber Identity)–UDID (Apple Unique Device Identifier)–Google Android ID–TPM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Mobile Market Players

A
  • mobile equipment manufacturers
  • (mobile) telecom operators
  • MVNOs
  • content providers
  • application service providers (not far way from content providers)
  • private customers
  • corporate buyers (distinction due to the fact that probably different preferences)
  • corporate users
  • intelligence agencies
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Usage Scenarios for Trusted Mobile Devices

A
  • secure OS
  • mobile device management (MDM)
  • secure corporate network interaction
  • DRM
  • device misuse prevention
  • storage of additional credentials on the mobile device
  • mobile wallets
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Matching Usage Scenarios & Players

A

Security options enabled by trusted platform features & the respective usage scenarios correspond to different interests of the different players within the mobile market.
–> especially important for equipment manufacturers, MOs, MVNOs & corp. buyers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Conclusion & Outlook regarding trusted platforms/devices

A
  • Mobile platforms had good chances to migrate into trusted platforms
  • All market players have an interest in device security enhancements
  • Major players actively engaged in standardization & development process

BUT missing: architecture combining different features all parties are interested in (some interests are contradictory) & entity to drive this architecture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly