OOBD Data Security
Indroduction
OOBD allows to create customer specific procedures, where confidential information could be included to change the module behaviour, like modify the settings.
As these confidential information should not become known to the public, it is important to protect these data against misuse.
OOBD Data Security
Data Security: What is possible?
OOBD runs mainly on Android. Android does not have hardware based crypto chips yet, so OOBD needs to rely on software based data security.
That means:
OOBD Data Security
What can unauthorized people do?
At any point in time, the data needs to be readable to the application to be used.
That means:
OOBD Data Security
The 4- Phase Data Protection Concept
To make the unauthorized data access as difficulty as possible, OOBD is using four mechanisms in a chain to protect the data:
OOBD Data Security
Phase 1: User Groups
The data pool is split into different user groups
That has the effects:
OOBD Data Security
Phase 2: User Specific Encryption
As next step, the data is encrypted with PGP with the single user personal key.
That has the effects:
OOBD Data Security
Phase 3: Application Specific Encryption
As third step, the data is encrypted with PGP with the application specific key.
That has the effects:
OOBD Data Security
Phase 4: Application Code Obfuscation
As said for Phase 3, the application decrypts the data by knowing the application specific pass-phrase. To stop an evil user to identify this pass-phrase and the encrypted data as such, the application code is obfuscated.
That means:
OOBD Data Security
Summary
When using 4- Phase Data Encryption, at least the following three conditions need to come together to get unauthorized access (limited to the data of the own groups)
Being "Evil"
Access to
pass-phrase
and
key file
Advanced
Debugging skills
and technology
Residual Risk