Skip to main content

PCA: Jini-based Personal Card Assistant

  • Conference paper
  • First Online:
Secure Networking — CQRE [Secure] ’ 99 (CQRE 1999)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1740))

Included in the following conference series:

  • 389 Accesses

Abstract

We describe the Personal Card Assistant, a scenario that brings together PDAs and smartcards. The underlying idea is that a PDA acts as a personal device for controlling a smartcard attached to it using an asymmetric key pair.

We describe how such an approach can be used for creating digital signatures: in particular, we can circumvent the problems involved with untrusted document viewers in this context.

We consider what sort of network infrastructure is required for using the PCA and outline how Jini can be used for integrating the PDA and smartcards into unknown service networks a mobile user is confronted with.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Deutscher Bundestag. Gesetz zur digitalen Signatur. http://www.regtp.de/Fachinfo/Digitalsign/neu/rechtsgr.htm, 22 July 1997. English Version (“Digital Signature Act”) available from http://www.regtp.de/English/laws/download.htm.

  2. Deutscher Bundestag. Verordnung zur digitalen Signatur. http://www.regtp.de/Fachinfo/Digitalsign/neu/rechtsgr.htm, 22 July 1997. English Version (“Digital Signature Ordinance”) available from http://www.regtp.de/English/laws/download.htm.

  3. Commission of the European Communities. Information technology evaluation criteria. Directorate XXIII/F, SOG Information Security, 1991.

    Google Scholar 

  4. European Telecommunications Standards Institute. Specification of the SIM Application Toolkit (GSM 11.14), 1998. http://www.etsi.org.

  5. Sun. Jini Architecture Specification-Revision 1.0. Sun Microsystems Inc., January 1999.

    Google Scholar 

  6. Joachim Posegga. Die Sicherheitsaspekte von Java. Informatik-Spektrum, 21(1):16–22, 1998.

    Article  Google Scholar 

  7. Sun. Jini Lookup Service Specification-Revision 1.0. Sun Microsystems Inc., January 1999.

    Google Scholar 

  8. Sun. Jini Discovery and Join Specification-Revision 1.0. Sun Microsystems Inc., January 1999.

    Google Scholar 

  9. Jaap Haartsen, Mahmoud Naghshineh, Jon Inouye, Olaf J. Joeressen, and Warren Allen. Bluetooth: Visions, goals, and architecture. ACM Mobile Computing and Communications Review, 2(4), October 1998.

    Google Scholar 

  10. Bluetooth Technology Overview. http://www.bluetooth.com.

  11. Sun. Jini Device Architecure Specification-Revision 1.0. Sun Microsystems Inc., January 1999.

    Google Scholar 

  12. Dirk Husemann and Reto Hermann. OpenCard Framework. Technical report, IBM Corporation, 1998.

    Google Scholar 

  13. OpenCard Forum. http://www.opencard.org.

  14. Specifications for PC-ICC Interoperability. http://www.smartcardsys.com.

  15. B. Clifford Neuman and Theodore Ts’o. Kerberos: An Authentication Service for Computer Networks. IEEE Communications Magazine, 32(9):33–38, September 1994.

    Article  Google Scholar 

  16. A. Pfitzmann, B. Pfitzmann, M. Schunter, and M. Waidner. Vertrauenswurdiger Entwurf portabler Endgerate und Sicherheitsmodule. In H. H. Bruggemann and W. Gerhardt-Hackl, editors, Verlaβliche IT-Systeme, Braunschweig, 1995.

    Google Scholar 

  17. Neil Daswani and Dan Boneh. Experimenting with Electronic Commerce on the PalmPilot. In Financial Cryptography’ 99, Conference Pre-Proceedings, Anguilla, BWI, 22 Februar 1999.

    Google Scholar 

  18. Safe Internet Programming Group Princeton University. Smarter Smartcards-Using Devices That Support User Interaction. http://www.cs.princeton.edu/sip/projects/handheld/, 1999.

  19. Jean-Jacques Vandewalle and Eric Vétillard. Developing Smart Card-Based Applications using Java Cards. In Proceedings of the Third Smart Card Research and Advanced Application Conference (CARDIS’98), Louvain-la-Neuve, Belgium, September 1998.

    Google Scholar 

  20. J. Veizades, E. Guttman, C. Perkins, and S. Kaplan. Service Location Protocol (SLP). Internet RFC 2165, June 1997.

    Google Scholar 

  21. Steven Czerwinski, Ben Y. Zhao, Todd Hodes, Anthony Joseph, and Randy Katz. An Architecture for a Secure Service Discovery Service. In Fifth Annual International Conference on Mobile Computing and Networks (MobiCOM’ 99), Seattle, WA, August 1999. Draft version, accepted for publication.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 1999 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kehr, R., Posegga, J., Vogt, H. (1999). PCA: Jini-based Personal Card Assistant. In: Secure Networking — CQRE [Secure] ’ 99. CQRE 1999. Lecture Notes in Computer Science, vol 1740. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-46701-7_5

Download citation

  • DOI: https://doi.org/10.1007/3-540-46701-7_5

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-66800-8

  • Online ISBN: 978-3-540-46701-4

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics