• Title/Summary/Keyword: Mobile Card

Search Result 215, Processing Time 0.028 seconds

A Mobile Application Model for Local and Tour Information Services (향토관광정보서비스를 위한 모바일 앱 모형)

  • Yi, Yong Jeong;Yi, Dajeong;Lee, Changho;Yoon, Sohyun
    • Journal of the Korean Society for information Management
    • /
    • v.36 no.1
    • /
    • pp.247-267
    • /
    • 2019
  • There has been low use of local information services that public libraries provide, and most of those services are limited only through in-house reading or checkout. Motivated by these issues, the study has developed a mobile application (app, hereafter) entitled as LibPass (a combination of Library and Pass) to propose new local information services that reflect the information needs of users. Regarding the design of LibPass, contents of LibPass are composed of the characteristics of local resources so that users can easily search for information about local culture and tour resources through mobile app. That is, it aims to provide efficient information services on local resources by providing information on accommodations, outdoor programs, and specialized libraries, as well as introducing tour resources. Above all, the services are provided with a single card issued by the National Library of Korea and is convenient to use anywhere in the country. It not only secures reliability and currency by utilizing various contents developed by public institutions, but also provides functions to facilitate specialized services for the local information of libraries. Based on the previous research, the present study derives the factors of quality evaluation of mobile tour information services; it constructs objects of LibPass application by analyzing existing applications and develops the prototype based on logical entity relationship model. This model can contribute to the increased use of local information services and, promotes the public's positive perception of the libraries through user-friendly applications.

Exploring Future Signals for Mobile Payment Services - A Case of Chinese Market - (모바일 결제 서비스에 대한 미래신호 예측 - 중국시장을 대상으로 -)

  • Bin Xuan;Seung Ik Baek
    • Journal of Service Research and Studies
    • /
    • v.13 no.1
    • /
    • pp.96-107
    • /
    • 2023
  • The objective of this study is to explore future issues that Chinese users, who have the highest mobile payment service usage rate in the world, will be most interested in. For this purpose, after collecting text data from a Chinese SNS site, it classifies major keywords into 4 types of future signals by using Keyword Emergence Map (KEM) and Keyword Issue Map (KIM). Furthermore, to understand the four types of signals in detail, it performs the qualitative analysis on text related to each signal keyword. As a result, it finds that the strong signal, which is rapidly growing in keyword appearance frequency during this research period, includes the keywords related to the daily life of Chinese people, such as buses, subways, and household account books. Additionally, it find that the signal that appears frequently now, but with a low increase rate, includes various services that can replace cash payment, such as hongbao (cash payment) and bank cards. The weak signal and latent signal, which appear less often than other two signals, includes the keywords related to promotion events or changes in service regulations. Its result shows that the mobile payment services greatly have changed user's daily life beyond providing convenience. Furthermore, it shows that, in the Chinese market, in which card payment is not common, the mobile payment services have the great potential to completely replace cash payment.

Vulnerabilities Analysis of the OTP Implemented on a PC (PC에 탑재된 OTP의 취약점 분석)

  • Hong, Woo-Chan;Lee, Kwang-Woo;Kim, Seung-Joo;Won, Dong-Ho
    • The KIPS Transactions:PartC
    • /
    • v.17C no.4
    • /
    • pp.361-370
    • /
    • 2010
  • OTP(One Time Password) is a user authentication using secure mechanism to authenticate each other in a way to generate a password, an attacker could intercept the password to masquerade as legitimate users is a way to prevent attacks. The OTP can be implemented as H/W or S/W. Token and card type OTP, implemented as H/W, is difficult to popularize because of having problem with deployment and usability. As a way to replace it implemented as S/W on Mobile or PC is introduced. However, S/W products can be target of malicious attacks if S/W products have vulnerability of implementation. In fact, FSA said the OTP implemented on a mobile have vulnerability of implementation. However, the OTP implemented on a PC have no case about analysis of vulnerability. So, in this paper derive security review and vulnerabilities analysis of implemented on a PC.

An Area-Efficient Design of Merged TEA Block Cipher for Mobile Security (모바일 보안용 병합 TEA 블록 암호의 면적 효율적인 설계)

  • Sonh, Seungil;Kang, Min-Goo
    • Journal of Internet Computing and Services
    • /
    • v.21 no.3
    • /
    • pp.11-19
    • /
    • 2020
  • In this paper, a merged TEA block cipher processor which unifies Tiny Encryption Algorithm(TEA), extended Tiny Encryption Algorithm(XTEA) and corrected block TEA(XXTEA) is designed. After TEA cipher algorithm was first designed, XTEA and XXTEA cipher algorithms were designed to correct security weakness. Three types of cipher algorithm uses a 128-bit master key. The designed cipher processor can encrypt or decrypt 64-bit message block for TEA/XTEA and variable-length message blocks up to 256-bit for XXTEA. The maximum throughput for 64-bit message blocks is 137Mbps and that of 256-bit message blocks is 369Mbps. The merged TEA block cipher designed in this paper has a 16% gain on the area side compared to a lightweight LEA cipher. The cryptographic IP of this paper is applicable in security module of the mobile areas such as smart card, internet banking, and e-commerce.

Off-Line Electronic Payment Scheme using Smart Cards (스마트 카드를 사용한 오프 -라인 전자 지불 기법)

  • Kim, Jeong-Eun;Lee, Hyeong-U;Kim, Tae
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.26 no.11
    • /
    • pp.1363-1372
    • /
    • 1999
  • 에이전트 기반 이동 컴퓨팅 환경에서 전자 상거래를 구현하기 위해 가장 필요로 하는 것은 안전한 지불 구조를 제공하는 것이다. 본 연구에서는 불확정 전송 기법 1,2 을 사용한 비대화형 엔티티 인증 기법과 Horster 기법 4,5 을 기반으로 메시지 복원 기능을 제공하는 공정 은닉 서명 기법을 제시한다. 또한 이를 직접 Brands가 제시한 오프-라인 전자 지불 시스템 3,6 에 접목한다. 인증 단계가 비대화형으로 수행되므로 이동 엔티티 인증에 효율적이고, 메시지 복원 기능을 갖고 공개 검증 기능을 제공하는 은닉 서명을 적용하기 때문에 카운터 방식을 사용한 스마트 카드 기반 전자 지불 시스템 6 에 효과적으로 적용할 수 있었다. 전자 화폐에 대해서 신뢰 센터에 의한 공정성 검토 기능을 추가로 제공하므로 전자 지불 시스템의 신뢰성을 향상시킬 수 있다.Abstract The primary requirements for realizing the electronic commerce in agent based mobile computing environments are to implement the compatible secure payment framework. In this paper, we propose both the non-interactive entity authentication scheme that is combined with oblivious transfer protocol 1,2 and the message recovery fair blind signature based on Horster scheme 4,5 . And these techniques are directly applied to the Brand's off-line electronic payment system 3,6 . As the authentication processes are done by non-interactive manner, we can also get efficiency for mobile entity authentication. Additionally, as the used signature scheme provides a message recovery function with publicly verifiable properties, it is efficiently applicable to a counter based off-line electronic payment scheme 6 based on the additional device like smart card. Therefore, we can enhance the reliability of proposed electronic payment system based on the publicly verifiable fairness in its electronic cash by a trusted judge.

An Improved High-Performance Protocol for Security Vulnerability of GSM based on SIM Card (SIM 카드 기반 보안 취약성을 개선한 고성능 GSM 보안 프로토콜)

  • Kim, Hee-Jung;Jeon, Ha-Yong;Lee, Ju-Hwa;Jung, Min-Soo
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.7
    • /
    • pp.902-911
    • /
    • 2007
  • GSM platform is a hugely successful wireless technology and an unprecedented story of global achievement. In less than ten years since the first GSM network was commercially launched, it became the world's leading and fastest growing mobile standard, using over 1 billion GSM subscribers across more than 200 countries of the world. GSM platform evolved into 3th generation mobile communication which includes not only voice call services but also the international roaming and various kinds of the multimedia services. GSM is an essential element techniques a safe data transmission and a personal private protection while support services. However, a crypto algorithm and a secure protocol for a safe data communication using GSM are indicating various kinds of problems. In this paper, we propose a more safer and more efficient authentication protocol in 3th generation network through analysis of GSM security mechanism of 2th/2.5th generation. This security protocol offers enforced security efficiency by using user verification between SIM/ME and reduction of authentication and key agreement step between SIM/ME/AuC.

  • PDF

XML Document Encrypt Implementation using Elliptic Curve Cryptosystem (타원곡선 알고리즘을 이용한 XML 문서 암호 구현)

  • Ko, Hoon
    • Journal of Internet Computing and Services
    • /
    • v.8 no.1
    • /
    • pp.79-85
    • /
    • 2007
  • As the use of the computer and networks generalized, the various tasks which are requested secrets can be processed such os the banking transaction. And because of increasing of data exchange, Internet, and mobile networks, the method which is not connected only but also used with many users has been changed. Especially because of the structural problem of the Internet, a lot of information is leaked out when we use the Internet banking. If we check the Internet banking by using an existing cypher method which is either simple of slow, a credit card number, an account number or password will be leaked out. Because the security of information doesn't meet our expectation, we need more powerful cryptography. But, the wasted space-time which is required shouldn,t be ignored when the whole transferred data are encrypted. So, by using both the Elliptic Curve algorithm which is based on mobile networks and the partial encryption of the DTD of XML in this essay, we will implement more faster cypher method of the partial XML.

  • PDF

Design of Encryption/Decryption IP for Lightweight Encryption LEA (경량 블록암호 LEA용 암·복호화 IP 설계)

  • Sonh, Seungil
    • Journal of Internet Computing and Services
    • /
    • v.18 no.5
    • /
    • pp.1-8
    • /
    • 2017
  • Lightweight Encryption Algorithm(LEA) was developed by National Security Research Institute(NSRI) in 2013 and targeted to be suitable for environments for big data processing, cloud service, and mobile. LEA specifies the 128-bit message block size and 128-, 192-, and 256-bit key sizes. In this paper, block cipher LEA algorithm which can encrypt and decrypt 128-bit messages is designed using Verilog-HDL. The designed IP for encryption and decryption has a maximum throughput of 874Mbps in 128-bit key mode and that of 749Mbps in 192 and 656Mbps in 256-bit key modes on Xilinx Vertex5. The cryptographic IP of this paper is applicable as security module of the mobile areas such as smart card, internet banking, e-commerce and IoT.

Research on Consumer Protection of Carrier Billing Services (통신과금서비스 소비자 보호 방안 연구)

  • Yoo, Soon-Duck;Kim, Jong-Ihl
    • Journal of Digital Convergence
    • /
    • v.13 no.3
    • /
    • pp.1-10
    • /
    • 2015
  • Carrier billing services market is growing according to the technical development. This study investigated the limiting factor in carrier billing services and suggested the improvement factor for it using the Delphi Method. The amount money to use in carrier billing charges should be provided in their credit based and the accumulated payment using a text message is displayed and also telecommunications carriers and carrier billing firms are the least responsible for consumer harm. It also provides administrative responsibility for communications carriers and billing services company for non recognition and payment. The service provider to prove negligence not proven by consumer and telecommunications billing service delinquency rate is applied at a rate such as a credit card and it also should integrate retail payment and service fee. This study will contribute to the communication billing services market growth through improved communication billing service. Further research is needed to continue the study of the factors that emerged from communication and billing services due to emerging technologies and services.

The Effect of Using Zentangle Art Therapy on Improving the Attention Span of People with Developmental Disabilities in Lifelong Education Center (젠탱글 활용 미술치료가 평생교육센터 이용 발달장애인의 주의집중력에 미치는 효과)

  • Kong, Maria;Kwak, Bong-Cheol;Kim, Joon-Soo;Jeong, Yeo-Jin
    • Journal of Korea Entertainment Industry Association
    • /
    • v.13 no.4
    • /
    • pp.419-429
    • /
    • 2019
  • The objective of this study was to look into the effect of using Zentangle art therapy on improving the attention span of people with developmental disabilities in Lifelong Education Center. The 29 people with developmental disabilities in Lifelong Education Center of D-University in K-city were the subjects to reach the primary goal of this study. Nine of the subjects were assigned to the experimental group of the Zentangle art therapy, ten to the control group. As for the study tools, 3.5x3.5 inch paper card, various colors of Deco Markers, and Zentangle cards for the experimental group. The FAIR and MindWaveMobile (MWM) were used to measure the effectiveness. The twelve 30-minute sessions of the program, held from October to December in 2018, has shown the result that the attention span improved on the experimental group using the Zentangle art therapy.