Extending the Belgian eID Technology with Mobile Security Functionality

نویسندگان

  • Jorn Lapon
  • Bram Verdegem
  • Pieter Verhaeghe
  • Vincent Naessens
  • Bart De Decker
چکیده

The Belgian Electronic Identity Card was introduced in 2002. The card enables Belgian citizens to prove their identity digitally and to sign electronic documents. Today, only a limited number of citizens really use the card in electronic applications. A major reason is the lack of killer functionality and killer applications. This paper presents two reusable extensions to the Belgian eID technology that opens up new opportunities for application developers. First, a secure and ubiquitously accessible remote storage service is presented. Second, we show how the eID card can be used to issue new certificates. To demonstrate the applicability and feasibility of both extensions, they are combined in the development of a secure e-mail application. The proposed solution offers strong privacy, security and key management properties while increasing the accessibility of confidential e-mail compared to existing solutions (such as PGP and S/MIME).

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security and Privacy Improvements for the Belgian eID Technology

The Belgian Electronic Identity Card enables Belgian citizens to prove their identity digitally and to sign electronic documents. At the end of 2009, every Belgian citizen older than 12 years will have such an eID card. In the future, usage of the eID card may be mandatory. However, irresponsible use of the card may cause harm to individuals. Currently, there exist some privacy and security pro...

متن کامل

A New Intrusion Detection System to deal with Black Hole Attacks in Mobile Ad Hoc Networks

By extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. Security is a serious challenge for actual implementation in wireless networks. Due to lack of the fixed infrastructure and also because of security holes in routing protocols in mobile ad hoc networks, these networks are not protected against attack...

متن کامل

Mobile devices as secure eid reader using trusted execution environments

This work presents a prototype implementation of a smartphone as secure eID reader using NFC technology. The presented approach aims to reach a security level close to standalone smart card readers. This security level will be allowed by the means of a trusted execution environment (TEE) which allows strong isolation and separation for critical applications and provides trusted, not interceptab...

متن کامل

Geotagging Where Cyberspace Comes to Your Place

The combination of GPS services and information technology is increasing with the use of geotagging now occurring as a default action in many commodity based devices functionality for example mobile phones and cameras. The camera in suitably enabled phones takes the picture and embeds GPS co-ordinates of the location into the metadata of the resulting image file. Furthermore there are now onlin...

متن کامل

Consumers’ Awareness of, Attitudes Towards and Adoption of Mobile Phone Security

Mobile phones are used frequently, and people keep them turned on for extended periods of time. In this paper we examine to what extent current mobile phone security functionality is adopted and also about interest in future authentication methods. A student survey was conducted (N = 97) targeting Swedish security students’ awareness, attitudes and adoption of mobile phone security functionalit...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009