TrustID: trustworthy identities for untrusted mobile devices

  • Authors:
  • Julian Horsch;Konstantin Böttinger;Michael Weiß;Sascha Wessel;Frederic Stumpf

  • Affiliations:
  • Fraunhofer AISEC, Garching near Munich, Germany;Fraunhofer AISEC, Garching near Munich, Germany;Fraunhofer AISEC, Garching near Munich, Germany;Fraunhofer AISEC, Garching near Munich, Germany;Fraunhofer AISEC, Garching near Munich, Germany

  • Venue:
  • Proceedings of the 4th ACM conference on Data and application security and privacy
  • Year:
  • 2014

Quantified Score

Hi-index 0.00

Visualization

Abstract

Identity theft has deep impacts in today's mobile ubiquitous environments. At the same time, digital identities are usually still protected by simple passwords or other insufficient security mechanisms. In this paper, we present the TrustID architecture and protocols to improve this situation. Our architecture utilizes a Secure Element (SE) to store multiple context-specific identities securely in a mobile device, e.g., a smartphone. We introduce protocols for securely deriving identities from a strong root identity into the SE inside the smartphone as well as for using the newly derived IDs. Both protocols do not require a trustworthy smartphone operating system or a Trusted Execution Environment. In order to achieve this, our concept includes a secure combined PIN entry mechanism for user authentication, which prevents attacks even on a malicious device. To show the feasibility of our approach, we implemented a prototype running on a Samsung Galaxy SIII smartphone utilizing a microSD card SE. The German identity card nPA is used as root identity to derive context-specific identities.