skip to main content
10.1145/1314403.1314412acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article

Implementing identity provider on mobile phone

Published:02 November 2007Publication History

ABSTRACT

We have implemented an identity provider (IdP), which is defined by the Liberty Alliance on a mobile phone. We propose an authentication method, which uses this personal IdP as a security token to prevent password leakage. In our method, the personal IdP on a mobile phone issues a security assertion signed by a private key on a Universal Subscriber Identifier Module (USIM). There are some authentication solutions that require special hardware tokens to prevent password leakage incidents, but their disadvantage is a higher distribution cost. In our method, there is no need for distribution of special hardware tokens because mobile phones are widespread personal devices. There are other authentication methods that use mobile phone terminals, but our method has the advantage that there is no need for installation of special software on PCs. In addition, users are able to carry out single sign-on (SSO) with our method by using the Liberty Alliance architecture. Compared with ordinary SSO where the IdP is a server computer, our method has a unique feature that the initial authentication is performed on a user's mobile phone with the key pad as an input device and LCD as an output device. Therefore, the credential for initial authentication is not transmitted from the mobile phone, and we can avoid the risk of password theft. If the mobile phone has its own security feature like fingerprint authentication, the feature can be used for SSO too. In this paper, we also discuss implementation issues on a mobile phone network and security issues regarding the man-in-the-middle attack. Results of the performance test of a prototype system are also described.

References

  1. RSA SecureID Token for Mobile Phones, RSA Security Inc., http://www.rsa.com/node.aspx?id=1314Google ScholarGoogle Scholar
  2. FirstPass, NTT DoCoMo Inc., http://www.nttdocomo.co.jp/service/other/firstpass/ (Japanese OnlyGoogle ScholarGoogle Scholar
  3. Liberty Alliance Project. http://www.projectliberty.org/Google ScholarGoogle Scholar
  4. Security Assertion Markup Language (SAML) V2.0. Version 2.0. OASIS Standards. http://www.oasis-open.org/committees/tc_home.php?wg_abbrev=securityGoogle ScholarGoogle Scholar
  5. Universal Subscriber Identity Module (USIM) conformance test specification. 3GPP TS 31.122. http://www.3gpp.org/Google ScholarGoogle Scholar
  6. Trust Models Guidelines, OASIS, http://www.oasis-open.org/committees/download.php/6158/sstc-saml-trustmodels-2.0-draft-01.pdfGoogle ScholarGoogle Scholar
  7. OpenID, http://openid.net/Google ScholarGoogle Scholar
  8. i-appli, NTT DoCoMo Inc., http://www.nttdocomo.co.jp/english/service/imode/make/content/iappli/index.htmlGoogle ScholarGoogle Scholar
  9. FOMA F903i, NTT DoCoMo Inc., http://www.nttdocomo.co.jp/english/product/foma/903i/f903i/index.htmlGoogle ScholarGoogle Scholar
  10. Renesas Technology's SH-Mobile G1 Chip to be Selected for FOMA 903i Series Handsets, http://america.renesas.com/fmwk.jsp?cnt=press_release000696.htm&fp=/company_info/news_and_events/press_releasesGoogle ScholarGoogle Scholar
  11. Liberty Reverse HTTP Binding for SOAP Specification, http://www.projectliberty.org/liberty/content/download/909/6303/file/liberty-paos-v2.0.pdfGoogle ScholarGoogle Scholar
  12. XML-Signature Syntax and Processing, W3C Recommendation, http://www.w3.org/TR/2002/REC-xmldsig-core-20020212/Google ScholarGoogle Scholar
  13. RFC 2315 - PKCS #7: Cryptographic Message Syntax Version 1.5, http://www.faqs.org/rfcs/rfc2315.htmlGoogle ScholarGoogle Scholar

Index Terms

  1. Implementing identity provider on mobile phone

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            DIM '07: Proceedings of the 2007 ACM workshop on Digital identity management
            November 2007
            98 pages
            ISBN:9781595938893
            DOI:10.1145/1314403

            Copyright © 2007 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 2 November 2007

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • Article

            Acceptance Rates

            Overall Acceptance Rate16of34submissions,47%

            Upcoming Conference

            CCS '24
            ACM SIGSAC Conference on Computer and Communications Security
            October 14 - 18, 2024
            Salt Lake City , UT , USA

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader