Subscribe free to our newsletters via your
. 24/7 Space News .




CYBER WARS
Turning smartphones into secure and versatile keys
by Staff Writers
Darmstadt, Germany (SPX) Jan 04, 2013


Thanks to ShareKey, digital keys can be transferred by e-mail using a smartphone. Image courtesy Fraunhofer SIT.

It's already possible to open doors using an app - but we are a long way from seeing widespread acceptance of this in the market. Now, researchers have developed a piece of software that will make the technology even more secure and versatile.

Smartphones and tablets have become an integral part of our daily lives. The capabilities of these handily sized mini-computers seem almost boundless as we phone friends, shoot holiday snaps, lose ourselves in a new music download or access the internet to obtain the boarding card for our next flight in comfort.

Does it not seem logical, then, that we should make use of these constant companions as the key to our cars, front doors or lockers as well? A few such solutions are already available, but what's still missing is widespread market acceptance.

At this year's CeBIT trade fair in Hannover (March 5-9, 2013), researchers from the Fraunhofer Institute for Secure Information Technology SIT in Darmstadt will be demonstrating their ShareKey software, a solution which will make the key app concept even more versatile and secure.

"In essence, ShareKey offers two new functions: users can issue digital keys remotely and assign these keys certain user permissions. For instance, I can grant the building superintendent access to my apartment for a short period so that he can open the door for the gas meter to be read while I'm at work," explains Alexandra Dmitrienko from the SIT.

"The solution is built around modern security technologies and can be easily integrated into existing access control systems." ShareKey sends electronic keys directly to the user's mobile phone, in the form of a QR code attached to an e-mail or MMS.

Protecting parcel stations from phishing
One thing that Dmitrienko and her team will also be demonstrating at CeBIT (Hall 9, Booth E08) is a parcel station where access rights to individual compartments are issued using ShareKey.

"Recently, users of parcel stations have fallen victim to phishing attacks. Equally, hackers continue to target their efforts on smartphones. In light of this, the big challenge was to protect the electronic keys without compromising the intuitive operation of such devices," explains Dmitrienko.

ShareKey works using the Near Field Communication (NFC) transmission standard, which allows data to be exchanged wirelessly over short ranges of up to a few centimeters."To open a door, all you need to do is hold your mobile phone close to the lock," says Dmitrienko. NFC interface and door locks only operate within a narrow bandwidth and have limited computing power.

Consequently, scientists at the SIT have equipped ShareKey with particularly resource-efficient communication protocols. Further, electronic keys are reliably protected on the smartphone from malware and unauthorized access.

This is achieved by leveraging advanced technologies which keep sensitive data on the smartphone separate from other data and apps (e.g. Fraunhofer's BizzTrust).

Communication between the mobile phone and a central server is protected by established security protocols.

"And even if this communication is hacked into, it's impossible for unauthorized people to gain access to the digital key. This is because opening the door requires information contained both in the encrypted token sent to the user and in the app installed on their smartphone," clarifies Dmitrienko. Alongside front doors and parcel or locker compartments, the research scientist also suggests that the technology could potentially be applied to help administer keys in hotels or as part of car-sharing schemes.

"The trend towards a 'shareconomy' will benefit the further development of this technology," concludes Dmitrienko. So the era of mobile phones as keys is one step closer.

+ Research News January 2013 Complete Issue [ PDF 0.48 MB ]

+ Fraunhofer SIT Turning smartphones into secure and versatile keys [ ZIP 0.15 MB ]

.


Related Links
Fraunhofer Institute for Secure Information Technology SIT
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle








CYBER WARS
Secure communication technology can conquer lack of trust
Singapore (SPX) Jan 04, 2013
Many scenarios in business and communication require that two parties share information without either being sure if they can trust the other. Examples include secure auctions and identification at ATM machines. Exploiting the strange properties of the quantum world could be the answer to dealing with such distrust: researchers at the Centre for Quantum Technologies (CQT) at the National U ... read more


CYBER WARS
Russia designs manned lunar spacecraft

GRAIL Lunar Impact Site Named for Astronaut Sally Ride

NASA probes crash into the moon

No plans of sending an Indian on moon

CYBER WARS
Stanford researchers develop acrobatic space rovers to explore moons and asteroids

Researchers Identify Water Rich Meteorite Linked To Mars Crust

Mars meteorite has significant water

'Spiky' rovers could explore martian moon

CYBER WARS
Congress Approves Bill Supporting Human Space Exploration

China's Chengdu aiming to be world's next Silicon Valley

Satellite highs, suspension lows for Indian space sector in 2012

NASA's Destination Station Exhibit Opens In Mesa, Arizona

CYBER WARS
Mr Xi in Space

China plans manned space launch in 2013: state media

China to launch manned spacecraft

Tiangong 1 Parked And Waiting As Shenzhou 10 Mission Prep Continues

CYBER WARS
Station Crew Ringing in New Year

Expedition 34 Ready to Ring in New Year

New ISS crew docked at Space Station

Expedition 34 Spends Christmas in Space

CYBER WARS
CSF Applauds Passage Of Risk-Sharing Regime Extension For Launch Industry

Rokot Launch Set for January 15

Russian rocket launch rescheduled

Investigation into Proton Launch Anomaly Continues as Root Cause is being Evaluated

CYBER WARS
Billions and Billions of Planets

ALMA Shows How Young Star and Planets Grow Simultaneously

ALMA Sheds Light on Planet-Forming Gas Streams

A stray planet

CYBER WARS
COM DEV wins commercial contract from MacDonald Dettwiler and Associates

Thai 'scavengers club' turns trash to treasure

Malaysia convoy in Australia rare earth plant protest

All Systems Go for Highest Altitude Supercomputer




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement