InvestorsHub Logo
Followers 14
Posts 1871
Boards Moderated 0
Alias Born 01/21/2008

Re: None

Monday, 01/02/2012 11:23:05 AM

Monday, January 02, 2012 11:23:05 AM

Post# of 249340
Remember the Samsung/Wave video and proximity Control with the SED and Galaxy Tab?

I found this an interesting read from the TCG site about the MTM Specifications and their uses.

PG 17: some snips:

"The end user can use the certificates in his/her mobile device and connect via Bluetooth/infrared/cable to laptop/PC applications to authenticate or encrypt using the certificates in the mobile device. Once the connection to the other device is broken, no certificates or private keys are left in second device since such credentials never left the mobile device."

"2.3.3 Benefits for Actors

For the corporate IT service provider, there is the efficiency of authentication credentials being provisioned over-the-air (OTA) to the enterprise user?s mobile device.

For the end user, there is the convenience of having authentication to applications and services done in the background without the need for user interaction, particularly interaction involving security.

The end user avails himself of the mobile device as a strong authentication device; there is no need to carry a separate token or any other corresponding strong authentication gadget.

The end user avails himself of effort-free device access control. When the mobile device moves out of the proximity of the enterprise workstation (laptop, PC, etc.) it locks without user interaction, since the mobile device is used for physical access control. When the end user returns to the workstation, it unlocks without user interaction."

2.3.4 Pre-conditions

- The mobile device provides a secure certificate store.

- Applications are developed to conform with industry standards e.g. PKCS#11.

2.3.6 Lifecycle Scenario

This is just one lifecycle representation amongst probable others.

Lifecycle stage/Initialisation

The mobile device needs to have a complete implementation of PCKS#11, and secure storage (MTM) for private keys.

There must be the ability to securely add new trusted third parties... etc.


http://www.trustedcomputinggroup.org/files/static_page_files/FA751710-1A4B-B294-D0F1698506A36AE8/TCG%20Mobile%20Trusted%20Module%202%200%20Use%20Cases%20v1%200.pdf



Join InvestorsHub

Join the InvestorsHub Community

Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.