"On-Card" User Authentication for Contactless Smart Cards based on Gesture Recognition
نویسندگان
چکیده
Smart cards are widely used for security purposes. To protect smart cards against misuse an authentication process (e.g. entering a pin or password) is necessary. Due to missing input interfaces “on-card”, an external terminal is required to input the password. Unfortunately the required external hardware (e.g. keypads, etc.) opens up new security issues by being vulnerable against attacks like side channel, forgery & tampering, man in the middle, eavesdropping and others. An elegant solution for such problems is an authentication process “on-card” without the need for external devices. This paper presents a new class of contactless, ISO 14443 compliant smart cards which are equipped with a multipurpose user input interface as 2D gesture recognition sensor together with an optical feedback component. This offers new “on-card” authentication, card configuration and even front end interface capabilities. We will describe the basics of the general hardware design and discuss the gesture recognition process.
منابع مشابه
Flexible Visual Display Units as Security Enforcing Component for Contactless Smart Card Systems
Today, one existing class of RFID systems are based on ISO 14443 (Proximity Coupling). This is the standard for RF-interfaces of contactless smart card systems. Contactless RF interfaces of smart cards are very often regarded as less secure than contact based smart cards. This tenor may be changed based on our new approach. Therefore we suggest to establish secure password authenticated wireles...
متن کاملMutual Authentication for Low-Power Mobile Devices
We propose methods for mutual authentication and key exchange. Our methods are well suited for applications with strict power consumption restrictions, such as wireless medical implants and contactless smart cards. We prove the security of our schemes based on the discrete log gap problem.
متن کاملPassword Authenticated Key Agreement for Contactless Smart Cards
This paper describes and compares the usage of passwordbased authenticated key agreement protocols to establish a secure communication channel between terminal and contactless card. In particular, protocols of this kind are discussed for use in contactless ID cards. The aim of this paper is to discuss, for the first time, two cryptographic password-based protocols with respect to security, impl...
متن کاملAn Interoperable Payment Protocol for the Public Transit Fare Payment System
The market for the public transit fare payment system using contactless smart cards is rapidly growing, however, the payment systems provided by different vendors are not interoperable. This paper presents an interoperable payment protocol for the public transit fare payment system using contactless smart cards. We also present implementation results of a PSAM (Purchase Secure Application Modul...
متن کاملUser Authentication with Smart Cards in Trusted Computing Architecture
The introduction of smart cards into trusted architectures establishes a clear-cut separation between the roles and responsibilities of both platform and user. On one hand, the Trusted Platform Module (TPM) ensures the platform trustworthiness and secures platform credentials and secrets, while smart cards guarantee user identity and protect user credentials and access authorization. Starting f...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012