SlideShare a Scribd company logo
Key2Share: NFC-enabled
Smartphone-based Access Control
Alexandra Dmitrienko
Cyberphysical Mobile Systems Security Group
Fraunhofer SIT, Darmstadt
In collaboration with TU Darmstadt, Center for Advanced Security
Research in Darmstadt (CASED), Intel Collaborative Research Institute for
Secure Computing (ICRI-SC) at TU-Darmstadt, Bosch Security Systems
+ NFC =
Near Field Communication (NFC)
Applications
mPayments
services in one touch
mTicketing
+ NFC =
Why not Using a Smartphone as a Key?
Smartphone as a Door Key
 Access control by enterprises to their facilities
 Access control in private sector (houses, garages)
4
 Access to hotel rooms
5
Smartphone as a Door Key
Smartphone as a Car Key/Immobilizer
 Fleet management by enterprises
 Car sharing with family members or friends
6
Smartphone as a Car Key/Immobilizer
 Car sharing by rental/car sharing companies
7
Smartphone for Access to Storage
Facilities
 Access to safes in hotel rooms
 Lockers in luggage storage at train stations/airports
8
DHL packing stations
Smartphone for Access to Storage
Facilities
 DHL packstations
9
Smartphone for Access to Facilities
 E.g., parking houses
10
Usual Keys vs. SmartCards vs. Key2Share
11
Usual Keys SmartCards Key2Share
Distribution Requires physical
access
Requires physical
access
Remote
Revocation Requires physical
access or replacement
of the lock
Remote Remote
Delegation Not possible Not possible Possible
Context-aware
access (e.g.,
time frame)
Not possible Possible Possible
Key2Share: System Architecture
12
Issuer
Key2Share
web-service
Resources
1. Employ the employee/sell the car
Users
Delegated users
5.Sharekey
3. Electronic key issued
4. User Authentication
with the issued key
6. User Authentication
with the shared key
2. One-time registration
Key Sharing
 The key to be shared is represented as a QR-code
 Can be sent to the recipient per e-mail, MMS
or scanned by a camera of another device
QR Code: What’s Inside?
14
 Electronic keys of Key2Share are similar to passports
Issued by a central authority Government Enterprise
Issued for a particular entity Citizen Employee
Has binding to an identity of
an entity it is issued for
Photo
Cryptographic key
bound to the platform
Public (not a secret) Yes Yes (encrypted)
Key2Share Security
Platform Security
15
Secure communication
protocols
Protocol Security
16
Well-established cryptographic
primitives (AES, SHA-1, RSA)
Formal security proof of the
protocols
Formal tool-aided verification of
protocols
Platform Security
 Different trade-offs between security and requirements
to a mobile device
17
Built-in Security
Mechanisms of Mobile OS
System level software-based
security extensions
Hardware-based
security extensions
More secureLess secure
No extra requirements to
mobile hardware and
system software (e.g.,
operating system)
Requires update of system
software (e.g., OS)
Requires support in
hardware. Available
only on some
mobile platforms
Platform Security
 Require support in hardware
 e.g., Giesecke & Devrient Mobile
Security Card http://www.gd-
sfs.com/the-mobile-security-
card/
 Can be attached to the device
via microSD card slot 18
 provided by BizzTrust
architecture
 http://www.bizztrust.de/
Hardware-based security
extensions
Software-based security
extensions
Supported Platforms
 Android NFC-enabled platforms
(e.g., Samsung Nexus S, Galaxy S3)
19
Flexible access rights:
 policy-based
 easy delegation
 remote revocation
 managable
Summary
Proof of Concept with Bosch Security Systems:
 Key2Share as Access Pass
 Key2Share as Building Block in Bosch‘s
„Access-Control-as-a-Service“
 Compatibility with already deployed
infrastructure (wireless readers, management
software)
Current Work
Thank you
alexandra.dmitrienko@sit.fraunhofer.de
22

More Related Content

PPT
Mobile_Security_En
PPTX
Secure Element Solutions
PPS
Mobile Security Blanco/Ueda
PPTX
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0
PDF
Block Armour Zero Trust Solution for Hybrid and Distributed IT environments
PPTX
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0 Architecture
PDF
WISekey IoT Technologies Presentation
PPTX
Zero Trust Cybersecurity for IoT - powered by SDP and Blockchain technology
Mobile_Security_En
Secure Element Solutions
Mobile Security Blanco/Ueda
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0
Block Armour Zero Trust Solution for Hybrid and Distributed IT environments
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0 Architecture
WISekey IoT Technologies Presentation
Zero Trust Cybersecurity for IoT - powered by SDP and Blockchain technology

What's hot (19)

PPTX
IoT Security Trends during COVID-19
PDF
Securing Smart Cities with Blockchain-enabled Zero Trust Cybersecuity
PPTX
Multifactor Authentication
PPT
Auth shield information security solution provider
PDF
Innovative biometric voice verification system for mobile devices
PPTX
Intro to Smart Cards & Multi-Factor Authentication
PDF
Strong Authentication and US Federal Digital Services
PPT
Wifi
PDF
Smart OpenID & Mobile Network Security
PDF
IoT security fresh thinking 2017 sep 9
PDF
smartXS: 2 Door 2 Reader & 4 Door 4 Reader Access Control Panel
PDF
Block Armour: Zero Trust Cybersecurity
PDF
Connected vehicles: An Overview on Security, Vulnerabilities and Remedies
PPTX
Iot security and Authentication solution
PDF
FIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok Labs
PPTX
Digital authentication
PDF
2FA OTP Token
PDF
Introduction to the FIDO Alliance
IoT Security Trends during COVID-19
Securing Smart Cities with Blockchain-enabled Zero Trust Cybersecuity
Multifactor Authentication
Auth shield information security solution provider
Innovative biometric voice verification system for mobile devices
Intro to Smart Cards & Multi-Factor Authentication
Strong Authentication and US Federal Digital Services
Wifi
Smart OpenID & Mobile Network Security
IoT security fresh thinking 2017 sep 9
smartXS: 2 Door 2 Reader & 4 Door 4 Reader Access Control Panel
Block Armour: Zero Trust Cybersecurity
Connected vehicles: An Overview on Security, Vulnerabilities and Remedies
Iot security and Authentication solution
FIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok Labs
Digital authentication
2FA OTP Token
Introduction to the FIDO Alliance
Ad

Viewers also liked (6)

PDF
22670-RNR-Presentation 2013_
PDF
جمع التبرعات من خلال نظام الدفع الذكي
DOCX
Blogger front cover (updated)
PDF
22670-RNR-E-Brochure-May2014
PDF
Secure distributed deduplication systems with improved reliability 2
PPT
División Celular / Mitosis y Meiosis
22670-RNR-Presentation 2013_
جمع التبرعات من خلال نظام الدفع الذكي
Blogger front cover (updated)
22670-RNR-E-Brochure-May2014
Secure distributed deduplication systems with improved reliability 2
División Celular / Mitosis y Meiosis
Ad

Similar to Access Control in Enterprises with Key2Share (20)

PDF
Key2 share moosecon
PDF
Droidcon2013 key2 share_dmitrienko_fraunhofer
PDF
Connections Summit - Security & Blockchain Track
PPTX
Smart Card and Strong Cryptography for instant security
PDF
Market Study on Mobile Authentication
PDF
PPTX
Secure mobile payment
PPTX
Securing online services by combining smart cards and web-based applications
PPT
Yared Hankins Wireless Key
PDF
Near field communication
PDF
880 st011
PPTX
Saving Blackberry
PDF
Embedded Systems Security News 2011/05
PDF
droidcon 2012: What's the Hack is NFC .., Hauke Meyn, NXP
PPTX
Securing hand held computing devices
PDF
Embedded Systems Security News 2011/06
PDF
CNIT 128: 9: Mobile payments
PDF
Samsung knox security_solution_v1_10_0
PDF
Over the Air 2011 Security Workshop
PDF
Embedded Systems Security News Feb 2011
Key2 share moosecon
Droidcon2013 key2 share_dmitrienko_fraunhofer
Connections Summit - Security & Blockchain Track
Smart Card and Strong Cryptography for instant security
Market Study on Mobile Authentication
Secure mobile payment
Securing online services by combining smart cards and web-based applications
Yared Hankins Wireless Key
Near field communication
880 st011
Saving Blackberry
Embedded Systems Security News 2011/05
droidcon 2012: What's the Hack is NFC .., Hauke Meyn, NXP
Securing hand held computing devices
Embedded Systems Security News 2011/06
CNIT 128: 9: Mobile payments
Samsung knox security_solution_v1_10_0
Over the Air 2011 Security Workshop
Embedded Systems Security News Feb 2011

Recently uploaded (20)

PDF
Getting Started with Data Integration: FME Form 101
PDF
Unlock new opportunities with location data.pdf
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PDF
August Patch Tuesday
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PPT
Geologic Time for studying geology for geologist
PPTX
observCloud-Native Containerability and monitoring.pptx
PPTX
Chapter 5: Probability Theory and Statistics
PDF
DP Operators-handbook-extract for the Mautical Institute
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
STKI Israel Market Study 2025 version august
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
CloudStack 4.21: First Look Webinar slides
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
Getting Started with Data Integration: FME Form 101
Unlock new opportunities with location data.pdf
Group 1 Presentation -Planning and Decision Making .pptx
1 - Historical Antecedents, Social Consideration.pdf
sustainability-14-14877-v2.pddhzftheheeeee
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
August Patch Tuesday
A contest of sentiment analysis: k-nearest neighbor versus neural network
Geologic Time for studying geology for geologist
observCloud-Native Containerability and monitoring.pptx
Chapter 5: Probability Theory and Statistics
DP Operators-handbook-extract for the Mautical Institute
Hindi spoken digit analysis for native and non-native speakers
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
STKI Israel Market Study 2025 version august
Zenith AI: Advanced Artificial Intelligence
CloudStack 4.21: First Look Webinar slides
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
Taming the Chaos: How to Turn Unstructured Data into Decisions

Access Control in Enterprises with Key2Share

  • 1. Key2Share: NFC-enabled Smartphone-based Access Control Alexandra Dmitrienko Cyberphysical Mobile Systems Security Group Fraunhofer SIT, Darmstadt In collaboration with TU Darmstadt, Center for Advanced Security Research in Darmstadt (CASED), Intel Collaborative Research Institute for Secure Computing (ICRI-SC) at TU-Darmstadt, Bosch Security Systems
  • 2. + NFC = Near Field Communication (NFC) Applications mPayments services in one touch mTicketing
  • 3. + NFC = Why not Using a Smartphone as a Key?
  • 4. Smartphone as a Door Key  Access control by enterprises to their facilities  Access control in private sector (houses, garages) 4
  • 5.  Access to hotel rooms 5 Smartphone as a Door Key
  • 6. Smartphone as a Car Key/Immobilizer  Fleet management by enterprises  Car sharing with family members or friends 6
  • 7. Smartphone as a Car Key/Immobilizer  Car sharing by rental/car sharing companies 7
  • 8. Smartphone for Access to Storage Facilities  Access to safes in hotel rooms  Lockers in luggage storage at train stations/airports 8 DHL packing stations
  • 9. Smartphone for Access to Storage Facilities  DHL packstations 9
  • 10. Smartphone for Access to Facilities  E.g., parking houses 10
  • 11. Usual Keys vs. SmartCards vs. Key2Share 11 Usual Keys SmartCards Key2Share Distribution Requires physical access Requires physical access Remote Revocation Requires physical access or replacement of the lock Remote Remote Delegation Not possible Not possible Possible Context-aware access (e.g., time frame) Not possible Possible Possible
  • 12. Key2Share: System Architecture 12 Issuer Key2Share web-service Resources 1. Employ the employee/sell the car Users Delegated users 5.Sharekey 3. Electronic key issued 4. User Authentication with the issued key 6. User Authentication with the shared key 2. One-time registration
  • 13. Key Sharing  The key to be shared is represented as a QR-code  Can be sent to the recipient per e-mail, MMS or scanned by a camera of another device
  • 14. QR Code: What’s Inside? 14  Electronic keys of Key2Share are similar to passports Issued by a central authority Government Enterprise Issued for a particular entity Citizen Employee Has binding to an identity of an entity it is issued for Photo Cryptographic key bound to the platform Public (not a secret) Yes Yes (encrypted)
  • 16. Protocol Security 16 Well-established cryptographic primitives (AES, SHA-1, RSA) Formal security proof of the protocols Formal tool-aided verification of protocols
  • 17. Platform Security  Different trade-offs between security and requirements to a mobile device 17 Built-in Security Mechanisms of Mobile OS System level software-based security extensions Hardware-based security extensions More secureLess secure No extra requirements to mobile hardware and system software (e.g., operating system) Requires update of system software (e.g., OS) Requires support in hardware. Available only on some mobile platforms
  • 18. Platform Security  Require support in hardware  e.g., Giesecke & Devrient Mobile Security Card http://www.gd- sfs.com/the-mobile-security- card/  Can be attached to the device via microSD card slot 18  provided by BizzTrust architecture  http://www.bizztrust.de/ Hardware-based security extensions Software-based security extensions
  • 19. Supported Platforms  Android NFC-enabled platforms (e.g., Samsung Nexus S, Galaxy S3) 19
  • 20. Flexible access rights:  policy-based  easy delegation  remote revocation  managable Summary
  • 21. Proof of Concept with Bosch Security Systems:  Key2Share as Access Pass  Key2Share as Building Block in Bosch‘s „Access-Control-as-a-Service“  Compatibility with already deployed infrastructure (wireless readers, management software) Current Work