2012/9/27 Martin Paljak <mar...@martinpaljak.net>

> On Sat, Sep 22, 2012 at 1:41 PM, Andreas Jellinghaus
> <andr...@ionisiert.de> wrote:
> >> In my mind keys could optionally contain application-oriented ACL
> telling
> >> which
> >> applications they trust so that even if you install a "bad" App, it
> would
> >> for
> >> example not be able to use your bank or eID-key in the background.
> >
> >
> > I must admit I don't know how many apps are managed and seperated. given
> the
> > restricted resources a smart
> > card has, I assume there is a master key that creates contain of specific
> > sizes/dimensions/... and the app is
> > loaded into such a container, limiting it and reserving the unallocated
> > space for further applications/containers?
> >
> > Is there a standard on doing this, or is it all JCOP magic under NDA?
>
> Are you referring to GlobalPlatform? That's public, with docs and API
> references (when applicable) available on globalplatform.org.
>

I thought JCOP had more commands than GlobalPlattform, e.g. to manage
card specific settings (e.g. change the ATR and communication settings).


> I bet there are probably vendors who tweak/amend/change/molest the
> spec, but the general principles should be there and followed by many
> vendors.
>
> There is an interesting thing called Trusted Execution Environment
> that might come to existence some time in the future, called TEE:
>
>
> http://www.globalplatform.org/documents/GlobalPlatform_TEE_White_Paper_Feb2011.pdf
>
> But for a mobile solutions and experiences, I think the time now is as
> good as pre-CCID for smart card readers: wild-wild-west and with a
> *much* tougher competition situation. Who needs standards if you have
> an iPhone  :)
>
> Martin
>
_______________________________________________
opensc-devel mailing list
opensc-devel@lists.opensc-project.org
http://www.opensc-project.org/mailman/listinfo/opensc-devel

Reply via email to