http://www.globalplatform.org/specifications/review/GPD_SE_Access_Control_v0_10_0.pdf

By adding ACL information to keys during enrollment you can limit key
"misuse" by bad apps.

Although GP specifies a generic scheme not limited to SEs, the lack
of developments by the vendors of "connected" SEs (Smart Cards),
does in practice limit such features to embedded SEs like the
one supplied for the Google Wallet.

In SKS/KeyGen2 I have taken this concept one step further by
allowing an issuer to specify that a PIN is only allowed through
a GUI running in a TEE (Trusted Execution Environment).  That is,
if somebody spoofs a PIN dialog it won't give them SE access
"in the background".

If the OS is broken nothing of this helps but that doesn't seem to be
the case with mobile trojans.  They are mainly just bad apps.


Anders



_______________________________________________
opensc-devel mailing list
opensc-devel@lists.opensc-project.org
http://www.opensc-project.org/mailman/listinfo/opensc-devel

Reply via email to