2015 | OriginalPaper | Chapter
Application Authentication and Secure Key Management Scheme Using MTM
Authors : Jin-Hee Han, YongSeong Jeon, Jeongnyeo Kim
Published in: Computer Science and its Applications
Publisher: Springer Berlin Heidelberg
Activate our intelligent search to find suitable subject content or patents.
Select sections of text to find matching patents with Artificial Intelligence. powered by
Select sections of text to find additional relevant content using AI-assisted search. powered by
In mobile environments, application authentication is necessarily requested for providing secure service and managing transparently the source of application. In this paper, we propose an application authentication and key management for application using a Mobile Trusted Module (MTM). After application is normally authenticated using the expected value stored in MTM, we generate a Storage Root Key (SRK) to independently operate key management system for each application. SRK for each application is created as similar as take ownership process of a Trusted Platform Module (TPM) by using two hash values. Proposed scheme will solve the performance problem of a conventional MTM key management scheme and provide more secure environment as a consequence of key isolation between applications.