ImageVerifierCode 换一换
格式:PDF , 页数:15 ,大小:63.41KB ,
资源ID:738967      下载积分:10000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
注意:如需开发票,请勿充值!
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-738967.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(ETSI TS 102 350-2005 Smart cards Identity Files and Procedures on a UICC Stage 1 (Release 7)《智能卡 关于UICC的识别文件和程序 第1阶段(版本7 0 0 第7次发布)》.pdf)为本站会员(medalangle361)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

ETSI TS 102 350-2005 Smart cards Identity Files and Procedures on a UICC Stage 1 (Release 7)《智能卡 关于UICC的识别文件和程序 第1阶段(版本7 0 0 第7次发布)》.pdf

1、 ETSI TS 102 350 V7.0.0 (2005-09)Technical Specification Smart cards; Identity Files and Procedures on a UICC; Stage 1 (Release 7) ETSI ETSI TS 102 350 V7.0.0 (2005-09) 2 Release 7 Reference DTS/SCP-R0287 Keywords ID, security, smart card ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex -

2、FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N 348 623 562 00017 - NAF 742 C Association but non lucratif enregistre la Sous-Prfecture de Grasse (06) N 7803/88 Important notice Individual copies of the present document can be downloaded from: http:/www.etsi.org The present document ma

3、y be made available in more than one electronic version or in print. In any case of existing or perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF). In case of dispute, the reference shall be the printing on ETSI printers of the PDF ver

4、sion kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at http:/portal.etsi.org/tb/status/status.asp

5、 If you find errors in the present document, please send your comment to one of the following services: http:/portal.etsi.org/chaircor/ETSI_support.asp Copyright Notification No part may be reproduced except as authorized by written permission. The copyright and the foregoing restriction extend to r

6、eproduction in all media. European Telecommunications Standards Institute 2005. All rights reserved. DECTTM, PLUGTESTSTM and UMTSTM are Trade Marks of ETSI registered for the benefit of its Members. TIPHONTMand the TIPHON logo are Trade Marks currently being registered by ETSI for the benefit of its

7、 Members. 3GPPTM is a Trade Mark of ETSI registered for the benefit of its Members and of the 3GPP Organizational Partners. ETSI ETSI TS 102 350 V7.0.0 (2005-09) 3 Release 7 Contents Intellectual Property Rights4 Foreword.4 Introduction 4 1 Scope 5 2 References 5 3 Definitions and abbreviations.5 3.

8、1 Definitions5 3.2 Abbreviations .6 4 Overview 6 4.1 Basic functionality of a TM6 5 Requirements7 5.1 Description of Requirements7 5.1.1 Deployment Contexts for TMUICC .7 5.2 Secure Communications with the TMUICC 10 5.2.1 Basic Requirements 10 Annex A (informative): Liberty Alliance requirements12 A

9、nnex B (informative): Change history .13 Annex C (informative): Bibliography.14 History 15 ETSI ETSI TS 102 350 V7.0.0 (2005-09) 4 Release 7 Intellectual Property Rights IPRs essential or potentially essential to the present document may have been declared to ETSI. The information pertaining to thes

10、e essential IPRs, if any, is publicly available for ETSI members and non-members, and can be found in ETSI SR 000 314: “Intellectual Property Rights (IPRs); Essential, or potentially Essential, IPRs notified to ETSI in respect of ETSI standards“, which is available from the ETSI Secretariat. Latest

11、updates are available on the ETSI Web server (http:/webapp.etsi.org/IPR/home.asp). Pursuant to the ETSI IPR Policy, no investigation, including IPR searches, has been carried out by ETSI. No guarantee can be given as to the existence of other IPRs not referenced in ETSI SR 000 314 (or the updates on

12、 the ETSI Web server) which are, or may be, or may become, essential to the present document. Foreword This Technical Specification (TS) has been produced by ETSI Project Smart Card Platform (SCP). The present document defines the stage 1 requirements for identity files and procedures on a UICC. The

13、 contents of the present document are subject to continuing work within EP SCP and may change following formal EP SCP approval. If EP SCP modifies the contents of the present document, it will then be republished by ETSI with an identifying change of release date and an increase in version number as

14、 follows: Version x.y.z where: x the first digit: 0 early working draft; 1 presented to EP SCP for information; 2 presented to EP SCP for approval; 3 or greater indicates EP SCP approved document under change control. y the second digit is incremented for all changes of substance, i.e. technical enh

15、ancements, corrections, updates, etc. z the third digit is incremented when editorial only changes have been incorporated in the document. Introduction There are a number of industry organizations producing authentication, privacy, and payment standards for the enterprise, mobile, financial, and ser

16、vices industries. For example the Liberty Alliance are creating specifications describing how a users digital identity may be “federated“, i.e. shared between (WEB) Service Providers and Identity Providers, to provide single sign-on and other services over mobile and wired networks in both online (c

17、onnected) and offline (standalone) environments. Another example is that the Open Mobile Alliance has produced a set of requirements in order to create a single Identity Management enabler to be used by all OMA enablers. The UICC platform is considered a candidate for a so-called Trusted Module for

18、performing these identification, authentication, authorization and secure storage of personal data. Interoperability considerations require the standardization of the UICC/ME interface for the “identity“ parameters on the card. The present document is intended to collate the functional requirements

19、from the Liberty Alliance and other “identity“ forums that may have similar requirements. ETSI ETSI TS 102 350 V7.0.0 (2005-09) 5 Release 7 1 Scope The present document covers the client environment which typically includes an Identity User Agent (IdUA) and a secure hardware Trusted Module (TM). Ope

20、ration of the TM based on a UICC requires the use of existing standardized functions and applications on the UICC, as well as functions that are unique to the TM. The present document focuses on the requirements for the TMUICC which has emerged from organizations such as Liberty Alliance and other r

21、elevant fora. 2 References The following documents contain provisions which, through reference in this text, constitute provisions of the present document. References are either specific (identified by date of publication and/or edition number or version number) or non-specific. For a specific refer

22、ence, subsequent revisions do not apply. For a non-specific reference, the latest version applies. Referenced documents which are not found to be publicly available in the expected location might be found at http:/docbox.etsi.org/Reference. 1 ETSI TS 102 221: “Smart cards; UICC-Terminal interface; P

23、hysical and logical characteristics“. 3 Definitions and abbreviations 3.1 Definitions For the purposes of the present document, the following terms and definitions apply: authentication assertion: proof of the authentication status of a user that is acceptable to the service provider for which acces

24、s is requested NOTE: An authentication assertion may include information describing the authentication context and cryptographic objects required for communication with the WSP. Identity Provider: entity that creates, maintains and manages identity information for users and provides user authenticat

25、ion to other service providers within a federation of service providers and other identity providers that have business relationship and operational agreements Identity Service: Internet-based service that is invoked by the users identity Identity User Agent (IdUA): software that allows users to ret

26、rieve and render web content, interact with an IdP, a web service provider (WSP) and has an abstracted logical interface to a Trusted Module Signing: in TS 102 350, “signing“ a message refers to the mechanism to create a proof of origin of a message by use of either Digital Signature or Cryptographi

27、c Checksum Trusted Module: accessible storage and processing module available in association with an IdUA NOTE: Functions include storage of personal data and credentials, client provisioning, authentication, secure messaging and application-layer security such as digital signature. ETSI ETSI TS 102

28、 350 V7.0.0 (2005-09) 6 Release 7 Trusted Module on a UICC: removable TM based on a UICC as defined in TS 102 221 1 with at least one authentication application as they appear at its interface, including requirements for an end to end secure interface to the IdP and a secure local interface to the I

29、dUA Web Service: Generically, a service defined in terms of an XML-based protocol, often transported over SOAP, and/or a service whose instances, and possibly data objects managed therein, are concisely addressable via URIs NOTE: Such a generic web service (gWS) may be defined in various proprietary

30、 and/or standardized terms, e.g. security paradigms. Web Service Consumer: a role a system entity acts/performs when it makes a request to a web service Web Service Provider: a role a system entity acts/performs when it provides a web service 3.2 Abbreviations For the purposes of the present documen

31、t, the following abbreviations apply: AP Attribute Provider CAD Card Acceptance Device IdP Identity Provider IdUA Identity User Agent MNO Mobile Network Operator OTA Over The Air SOAP Simple Object Access Protocol SSO Single Sign On TM Trusted Module TMUICC Trusted Module implemented on a UICC URI U

32、niform Resource Identifier WSC Web Service Consumer WSP Web Service Provider XML eXtended Markup Language 4 Overview A TM is a removable, personalized module containing files and executables that provides a secure storage and execution environment for certain operations required by an IdP and a IdUA

33、 in identity services. Functions include storage of personal data and credentials, IdUA provisioning, authentication, secure messaging and application-layer security such as digital signature. The UICC requirements for identity files and procedures are designed to fully support the requirements of t

34、he Liberty Alliance and OMA. For clarity the relevant Liberty Alliance and OMA requirements are provided for information. 4.1 Basic functionality of a TM Basic functionality of the interfaces between identity services and the TMUICC are to: Create and remotely manage Identity provisioning and creden

35、tial storage files on a TMUICC. Use the TMUICC to provide identification, multiple levels of authentication and authorization i.e. signing (some schemes require the TM to sign authorization tokens for proof-of-presence of the user). Achieve end-to-end secure messaging between authorized entities (th

36、e IdP and the IdUA) and files and applications on the TMUICC in non-secure client environments and across insecure networks. TMs shall be able to be deployed in environments where messages originating or terminating at the TMUICC can be subject to replay, eavesdropping or manipulation attacks that m

37、ay not be feasible within a mobile phone or across mobile networks. Typical scenarios include deployment in a PC or in a PC peripheral device, as well as certain types of smart phone equipped with IdUA and an operating system with an open API. ETSI ETSI TS 102 350 V7.0.0 (2005-09) 7 Release 7 Figure

38、 1 shows some of the entities involved in a typical identity service. Only the IdP and the IdUA are allowed to directly interface to the TM. WSPs can interface to applications in the client environment and to the IdUA. IdP-UICC secure interface SP Environment IdP Environment IdUA-UICC secure interfa

39、ce Identity User Agent TM Application IdP Server Authentication Application Signature Application Client Environment UICC WSP User Applications Figure 1: Standardized Interfaces Required to the TMUICC 5 Requirements 5.1 Description of Requirements 5.1.1 Deployment Contexts for TMUICC The Card accept

40、ing device shall assume that the TMUICC will support all context(s) defined in this clause. The simultaneous use of the TMUICC in different contexts at the same time is FFS. (A single set of protocols and functions on the TMUICC that will meet the requirements of all deployment contexts implies a TM

41、UICC-related protocol stack and command set that is common to all deployment contexts). The figures and table below categorize and characterize the deployment contexts. ETSI ETSI TS 102 350 V7.0.0 (2005-09) 8 Release 7 CAD TMUICC PC IdUA ID applications e.g. USB, IrDA, Access Network Internet IdP Au

42、thentication vectors Context 1: TMUICC in a CAD connected to a PC communication of an opaque identifier from the TMUICC to the IdP, to bootstrap the communications and authentication processes; secure distribution of dynamic session keys derived from shared secrets; secure processing of requests and

43、 responses for authentication assertions and for authorization assertions. These messages may need to be signed and verified by the TMUICC or IdP; secure transfer of application commands and responses, e.g. to invoke a challenge/response authentication application or a PIN verification application o

44、n the TMUICC; sending and receiving of authentication vectors inside the secure channels; requesting, sending and receiving of authentication assertions and authorization assertions. Some services require the assertions to be signed by the IdUA (i.e. the TM) before being passed to a WSP - the signat

45、ures being verified by either the IdP or WSP. These are: 1) Authentication. 2) Message integrity. 3) Replay detection and sequence integrity. ETSI ETSI TS 102 350 V7.0.0 (2005-09) 11Release 7 4) Proof of receipt and execution. 5) Message confidentiality. 6) Security management. 7) Exceptional proced

46、ures. The TMUICC will also provide: 8) Signing of authorization assertions using symmetric techniques. 9) Secure storage and management functions for provisioned keys. 10) Secure generation, storage and deletion of temporary symmetric keys. 11) A secure environment for the execution of cryptographic

47、 algorithms, preventing unauthorized monitoring of or interference with such operations. ETSI ETSI TS 102 350 V7.0.0 (2005-09) 12Release 7 Annex A (informative): Liberty Alliance requirements Liberty Alliance requirements for identity services will create corresponding requirements on the TMUICC tha

48、t will be taken into account for standardization in ETSI SCP: IdUA obtains and securely stores pre-issued assertions from the IdP and uses them to access services e.g. when the IdP is not accessible. This includes keeping records of assertions that have been issued and/or stored and reporting back t

49、o the IdP. IdUA acts as an attribute provider, i.e.: - Obtains (e.g. personal) attributes, validates them and stores them securely. - Allows controlled access to attributes by validating service authorization assertions from identity-consuming entities. IdUA acts as a Discovery Service by permitting discovery of its AP services, requiring validation of authorization assertions from WSCs. Pro-active SSO: Enables efficient SSO when the IdUA has behavioural knowledge that an WSP will require authentication in the near future. IdUA announces

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1