TEAPM Home Page
What is a TEAPM ?
TEAPMs are tamper resistant devices (smartcards) that run EAP client
and/or server applications.
A public javacard implementation, based on the
OpenEapSmartcard
platform is available on the WEB.
Multiple client and server entities may simultaneously work in a 64
KB device.
What are the TEAPMs benefits ?
- Security modules dedicated to IP devices.
- They are used for access controls and users'
authentication in Wi-Fi or WiMAX networks and VPN infrastructures
- Independent of any operating system (Windows,
LINUX,…).
- TEAPM applications run in tamper resistant devices,
such as smartcards. They may be designed for javacards, and therefore are
independent of any manufacturers.
- Highly secure Authentication Servers.
- Smartcards enabled RADIUS servers are docking hosts
that work in collaboration with multiple TEAPMs. This architecture is scalable,
and may be used in existing Wi-Fi infrastructure, supporting a great number
of clients.
- Privacy and tracability .
- IP tracability is generally understanding as the record
of data traffic associated to a particular IP address. This address is
linked to an human user by means of the authentication procedure. Privacy
in the tracability context means that the network client remains anonymous,
its identity is never exposed to an untrusted party. The TEAPM architecture
enables highly secure authentication but guaranties user's anonymity.
- Remote administration.
- TEAPMs may be remotely and securely managed, and support
the following services
- Cancellation of credentials, such as X509 certificates
and associated private keys. Smartcards cloning is extremely difficult,
in consequence there is only one physical instance of these entities. The
ability to remotely block their use, is an important security requirement,
in a distributed PKI environment.
- Updating of credentials. There is a need to guaranty
continuity or extension of customer subscriptions. This demand is fulfilled
by replacing or adding information elements that control services availability.
- Downloading of new applications. Authentication protocols
may evolve and include new functionalities. In that case, the software
is transparently updated, e.g. without TEAPM bearers interaction.
Other details can be found in this
white paper
.
TEAPM technical papers.
- TEAPM presentation
at
eSmart'2006
, Sophia Antipolis, French Riviera
- TEAPM use in RADIUS server,
paper
presented at the 2006 International Symposium on
Collaborative Technologies and Systems, at
CTS 2006
Las Vegas, NV, USA
- Identity Protection over EAP-TLS,
presentation
at the IETF 66th in Montreal
- Identity protection over EAP-TLS with TEAPM,
paper
presented at the International Conference on Security and Cryptography,
Secrypt'2006
- Introducing Trusted EAP Module for security enhancement in
WLANs and VPNs, paper
presented at the third IASTED International Conference
on COMMUNICATION, NETWORK, AND INFORMATION SECURITY,
CNIS 2006
, October 9-11, 2006, MIT Faculty Club, Cambridge, Massachusetts, USA