scispace - formally typeset
Book ChapterDOI

Pseudonymous Mobile Identity Architecture Based on Government-Supported PKI

TLDR
This paper reports a prototype implementation of an identity tool on a mobile phone with a PKI-SIM card, combining an officially recognised national mobile e-ID infrastructure with identification procedures based on controlled identity revelation.
Abstract
An electronic ID scheme must be usable in a wide range of circumstances, especially in ordinary situations, such as proving your right to a concession ticket on a bus. One of the problems to be addressed is privacy. Indeed, when documents are read by electronic means, a lot of information is not only revealed, but can be copied, stored and processed without our consent. Another issue is ubiquity, reliability and acceptance of the involved technology. In this paper we attempt to address these issues by combining an officially recognised national mobile e-ID infrastructure with identification procedures based on controlled identity revelation. We report a prototype implementation of an identity tool on a mobile phone with a PKI-SIM card.

read more

Citations
More filters
Patent

Identity management for mobile devices

TL;DR: In this paper, the identity management process involves selecting an identity when a first record comprising the one or more parameters detected is found in said searching and modifying an active identity of the mobile telecommunications device to be the selected identity when the active identity is not already the chosen identity.
Patent

Method and system for securely linking digital user's data to an NFC application running on a terminal

TL;DR: In this paper, the authors proposed a method for securely linking at least one user digital data, proper to a user of a user terminal, to a near field communication (NFC) application running on said user terminal.
Dissertation

A framework for identity and privacy management on mobile devices

TL;DR: In this paper, the authors presented a Masteroppgave i informasjons- og kommunikasjonsteknologi 2010, Universitetetet i Agder, Grimstad
Patent

Secure identification over communication network

TL;DR: In this paper, a method for providing identification data of an individual to a service over a communication network (102) is described. But the identification data are stored in the device (108).
Patent

Method of securely transmitting an image from an electronic identity document to a terminal

TL;DR: In this article, the authors describe a system and methods of securely transmitting an image stored in the memory of an identity document to a first terminal that is suitable for receiving the image.
References
More filters
Journal ArticleDOI

Sun Microsystems Inc.

Dwight B. Davis
- 15 Jun 1993 - 
TL;DR: Sun acknowledges the pioneering efforts of Xerox in researching and developing the concept of visual or graphical user interfaces for the computer industry and holds a non-exclusive license from Xerox to the Xerox Graphical User Interface.
Proceedings ArticleDOI

Security and Privacy Issues in E-passports

TL;DR: In this paper, the privacy and security issues of the International Civil Aviation Organization (ICAO) standard for e-passports have been analyzed in the context of next-generation ID cards.
Book ChapterDOI

Crossing borders: security and privacy issues of the european e-passport

TL;DR: In this paper, the authors discuss how borders are crossed regarding the security and privacy erosion of the proposed schemes, and show which borders need to be crossed to improve the security of the next generation of e-passports.
Posted Content

Crossing Borders: Security and Privacy Issues of the European e-Passport

TL;DR: This work discusses attacks on Basic Access Control due to the low entropy of the data from which the access keys are derived, sketches the European proposals for Extended Access Control and the weaknesses in that scheme, and shows how fundamentally different design decisions can make e-passports more secure.
Journal ArticleDOI

Enabling pervasive computing with smart phones

TL;DR: The quest for the "killer" third-generation (3G) mobile telephony application dominated the EU Information Society Technology research program as mentioned in this paper, and dozens of projects launched to pursue this aim, and we were intimately involved in several of them.