Put Trust in Your Pocket: CSIRO’s Trust Extension Device

Known as a Trust Extension Device (TED), the TED consists of software loaded onto a portable device, such as a USB memory stick or a mobile phone. It is able to minimise the risk associated with performing transactions in untrusted and unknown computing environments.

“The problem is that trust is currently tied to specific, well-known computing environments,” says CSIRO ICT Centre’s, Dr John Zic.

“TED makes that trust portable, opening the way for secure transactions to be undertaken anywhere, even in an internet café.”

The concept behind TED is that an enterprise issues a trusted customer with a portable device containing a small operating system, as well as a set of applications and encrypted data.

This device creates its own environment on an untrusted computer and, before it runs an application, it establishes trust with the remote enterprise server. Both ends must prove their identities to each other and that the computing environments are as expected.

Once the parties prove to each other they are trustworthy, the TED accesses the remote server and the transaction takes place.

“The idea is that the person or organisation issuing the device runs their own computing environment and applications within the TED,”

says Dr Zic.Focus groups run by the Centre for Networking Technologies for the Information Economy, funded by Australian Government, suggested developing a device to facilitate trusted transactions and provide authorised people with access to confidential and private information.

For instance, banks could use a technology like TED to provide authorised customers and employees with access to financial data, or conduct financial transactions over the internet.

“The idea is that the person or organisation issuing the device runs their own computing environment and applications within the TED,” says Dr Zic.

“Wherever you go, whichever machine you run on, you and the issuer can be confident both parties are known to each other, cannot engage in any malicious acts, and that the transactions are trusted.”

The CSIRO ICT Centre is currently calling for expressions of interest from parties interested in licensing the technology.

For information about business opportunities, contact Dennis Silvers at: Dennis.Silvers@csiro.au

Media Contact

Andrea Wild EurekAlert!

More Information:

http://www.csiro.au

All latest news from the category: Information Technology

Here you can find a summary of innovations in the fields of information and data processing and up-to-date developments on IT equipment and hardware.

This area covers topics such as IT services, IT architectures, IT management and telecommunications.

Back to home

Comments (0)

Write a comment

Newest articles

The Sound of the Perfect Coating

Fraunhofer IWS Transfers Laser-based Sound Analysis of Surfaces into Industrial Practice with “LAwave”. Sound waves can reveal surface properties. Parameters such as surface or coating quality of components can be…

Customized silicon chips

…from Saxony for material characterization of printed electronics. How efficient are new materials? Does changing the properties lead to better conductivity? The Fraunhofer Institute for Photonic Microsystems IPMS develops and…

Acetylation: a Time-Keeper of glucocorticoid Sensitivity

Understanding the regulatory mechanism paves the way to enhance the effectiveness of anti-inflammatory therapies and to develop strategies to counteract the negative effects of stress- and age-related cortisol excess. The…

Partners & Sponsors