Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Pekka Laitinen is active.

Publication


Featured researches published by Pekka Laitinen.


international conference on trusted systems | 2010

Can hand-held computers still be better smart cards?

Sandeep Tamrakar; Jan-Erik Ekberg; Pekka Laitinen; N. Asokan; Tuomas Aura

Smart cards using the ISO/IEC 7816 interface are widely used for authentication, ticketing and legacy secure applications. When used with host computers, the smart card typically connects to the host computer over a USB or RS232 smart card reader. This paper presents implementations of an architecture where a Trusted Execution Environment (TrEE) in a smartphone is used as the security foundation for implementing security modules based on the ISO/IEC 7816 smart card standard. The smartphone software emulates both the smart card reader and the card, and thus no new drivers are needed in the host to enable the use of the smart card emulation.


trust, security and privacy in computing and communications | 2015

On Rehoming the Electronic ID to TEEs

Sandeep Tamrakar; Jan-Erik Ekberg; Pekka Laitinen

Government Electronic IDs (EIds) are digital credentials issued to the citizens. In Europe, EIds are distributed in the form of identity cards or passports that allow for identity verification towards government and private services in the digital domain. This paper provides a reference design and implementation examples for Trusted Execution Environment (TEE) based EIds. Especially, the paper highlights the role of attestation during enrolment, a requirement that is not present in legacy EIds.


Archive | 1997

Implementation of access service

Philip Ginzboorg; Jan-Erik Ekberg; Pekka Laitinen; Antti Ylä-J{umlaut over }ski


Archive | 2005

Methods, system and mobile device capable of enabling credit card personalization using a wireless network

Silke Holtmanns; Pekka Laitinen


Archive | 2006

Method and apparatus for using generic authentication architecture procedures in personal computers

Pekka Laitinen; Shreekanth Lakshmeshwar


Archive | 2009

Method and apparatus for authenticating a mobile device

Jan-Erik Ekberg; Kari Kostiainen; Pekka Laitinen; Ville Aarni; Miikka Sainio; Niklas Von Knorring; Dmitry Kolesnikov; Atte Lahtiranta


Archive | 2005

Method for verifying a first identity and a second identity of an entity

Pekka Laitinen


Archive | 2007

User equipment credential system

Silke Holtmanns; Pekka Laitinen


Archive | 2003

Method, system and devices for transferring accounting information

Henry Haverinen; Pekka Laitinen; N. Asokan


Archive | 2007

Authenticating an application

Shreekanth Lakshmeshwar; Philip Ginzboorg; Pekka Laitinen; Silke Holtmanns

Collaboration


Dive into the Pekka Laitinen's collaboration.

Researchain Logo
Decentralizing Knowledge