• Title/Summary/Keyword: Mobile Card

Search Result 215, Processing Time 0.028 seconds

Development of Virtual Fusion Methodology for Analysis Via Mobility Bigdata (모빌리티 빅데이터 가상결합 분석방법론 연구)

  • Bumchul Cho;Kihun Kwon;Deokbae An
    • The Journal of Bigdata
    • /
    • v.7 no.2
    • /
    • pp.75-90
    • /
    • 2022
  • Recently, complex and sophisticated analysis of transportation is required due to changes in the socioeconomic environment and the development of bigdata technology. Especially, the revision of 3 laws including PERSONAL INFORMATION PROTECTION ACT makes it possible to combine various types of mobility data. But strengthen personal information protection makes inefficiency in utilizing mobility bigdata. In this paper, we proposed the "Virtual fusion methdology via mobility bigdata" which is a methodology for indirect data fusion for various mobility bigdata such as mobile data and transportation card data, in order to resolve legal restrictions and enable various transportation analysis. And we also analyzed regional bus passenger in Seoul capital area and Cheongju city with aforementioned methodology for verification. This methdology could analyze behavioral pattern of passenger with the MCGM(Mobility Comprehensive Genetic Map), graph with position and time, making with mobile data. Consquently, using MCGM, which is a result for indirect data fusion, makes it possible to analyze various transportation problems.

A Study on Releasing Cryptographic Key by Using Face and Iris Information on mobile phones (휴대폰 환경에서 얼굴 및 홍채 정보를 이용한 암호화키 생성에 관한 연구)

  • Han, Song-Yi;Park, Kang-Ryoung;Park, So-Young
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.44 no.6
    • /
    • pp.1-9
    • /
    • 2007
  • Recently, as a number of media are fused into a phone, the requirement of security of service provided on a mobile phone is increasing. For this, conventional cryptographic key based on password and security card is used in the mobile phone, but it has the characteristics which is easy to be vulnerable and to be illegally stolen. To overcome such a problem, the researches to generate key based on biometrics have been done. However, it has also the problem that biometric information is susceptible to the variation of environment, whereas conventional cryptographic system should generate invariant cryptographic key at any time. So, we propose new method of producing cryptographic key based on "Biometric matching-based key release" instead of "Biometric-based key generation" by using both face and iris information in order to overcome the unstability of uni-modal biometries. Also, by using mega-pixel camera embedded on mobile phone, we can provide users with convenience that both face and iris recognition is possible at the same time. Experimental results showed that we could obtain the EER(Equal Error Rate) performance of 0.5% when producing cryptographic key. And FAR was shown as about 0.002% in case of FRR of 25%. In addition, our system can provide the functionality of controlling FAR and FRR based on threshold.

Second-Order G-equivariant Logic Gate for AND Gate and its Application to Secure AES Implementation (AND 게이트에 대한 2차 G-equivariant 로직 게이트 및 AES 구현에의 응용)

  • Baek, Yoo-Jin;Choi, Doo-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.1
    • /
    • pp.221-227
    • /
    • 2014
  • When implementing cryptographic algorithms in mobile devices like smart cards, the security against side-channel attacks should be considered. Side-channel attacks try to find critical information from the side-channel infromation obtained from the underlying cryptographic devices' execution. Especially, the power analysis attack uses the power consumption profile of the devices as the side-channel information. This paper proposes a new gate-level countermeasure against the power analysis attack and the glitch attack and suggests how to apply the measure to securely implement AES.

The Effects of the Perceived Call Center Service Quality on Service Loyalty - Focused on Mediating Effects of the Perceived Brand Personality - (콜센터 서비스에 대한 인지된 품질이 서비스 로열티에 미치는 영향 - 인지된 브랜드 개성의 매개효과를 중심으로 -)

  • Lee, Myeong Sik;Kim, Gyoung Suk
    • Journal of Korean Society for Quality Management
    • /
    • v.40 no.4
    • /
    • pp.531-542
    • /
    • 2012
  • Purpose: This study examines the causal relationship among perceived call center service quality, perceived brand personality, and service loyalty. Methods: This study employs call center services in mobile phone, credit card, and internet shopping, to collect data from respondents via on-line survey, and analyzes causal relationship among above-mentioned three constraints. Results: Perceived call center service quality has a positive impact on perceived brand personality and service loyalty. Perceived brand personality has a positive impact on service loyalty. Cognitive loyalty has a positive influence on attitudinal loyalty. Attitudinal loyalty has a positive impact on behavioral loyalty. Perceived brand personality has a mediating effect towards perceived call center service quality and service loyalty. Conclusion: In order to improve service loyalty, it is necessary to understand diverse variables. Call center service companies are required to find the ways to improve their service quality, while positively applying the techniques of differentiating the brand personality used by manufacturing companies.

RSA-Based Enhanced Partially Blind Signature Algorithm Minimizing Computation Of The Signature Requester (서명 요청자의 계산량을 감소시키는 RSA에 기반한 개선된 부분은닉서명 알고리즘)

  • Kwon, Moon-Sang;Cho, Yoo-Kun
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.29 no.5
    • /
    • pp.299-306
    • /
    • 2002
  • Partially blind signature scheme is used in applications such as electronic cash and electronic voting where the privacy of the signature requester is important. This paper proposes an RSA-based enhanced partially blind signature scheme minimizing the amount of computation of the signature requester. The signature requester needs computation in blinding the message to the signer and in generating the final signature using the intermediate signature generated by the signer. Since the proposed scheme enables the signature requester to get the final signature just by using modular additions and multiplications, it decreases computation of the signature requester considerably. So, the proposed partially blind signature scheme is adequate for devices such as mobile device, smart-card, and electronic purse that have relatively low computing power.

Analysis/Design and Implementation of 3D Print Remote Control and Printing Mobile Software (3D 프린터 원격제어 및 프린팅 모바일 소프트웨어 분석/설계 및 구현)

  • Cho, Byung-Ho
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.5
    • /
    • pp.177-182
    • /
    • 2015
  • Nevertheless 3D printer is propagated fast, it is difficult for us of using 3D printer at the same time because of 3D printer's slow velocity. Existing solution is to print using SD card which moves files and on PC but this method is spend too much time and can not be showed status of printing. Yet we have no 3D printer software solution which is controlled and printed remotely. Therefore, this 3D printer software solution makes 3D printer be connected on internet networks and selected to use it on smart App. And it is controlled and printed remotely. In my paper, to build an Android App. which can execute these functions, an effective analysis & design using UML and implementation method will be presented.

Possibility of Disclosure of User Information in Internet Explorer (인터넷 익스플로러에서 사용자 정보 유출 가능성)

  • Lee, SangHo;Maeng, YoungJae;Nyang, DaeHun;Lee, KyungHee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.12
    • /
    • pp.937-943
    • /
    • 2013
  • Internet Explorer is the popular internet browser the most in domestic. In some version of Internet Explorer, user information could be leaked cause CORS(Cross-Origin Resource Sharing) Internet Explorer support. Different before, without setup a malicious program, attacker can get the user information even account information, credit card usage list and user information with SNS or internet portal site logged in regardless of secure program. Not only Internet Explorer but also mobile browser, it could be. In this paper, we make study of the potential disclosure of user information by attack using CORS, second attack and the way to improvement of vulnerability of CORS.

Study on NFC Security Analysis and UICC Alternative Effect (NFC 보안 기술 분석 및 UICC 적용 효과 연구)

  • Lim, Sun-Hee;Jeon, Jae-Woo;Jung, Im-Jin;Yi, Ok-Yeon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.1B
    • /
    • pp.29-36
    • /
    • 2011
  • Near Field Communication is an emerging short-range wireless connectivity technology that offers proximity and different operating modes. Particularly, NFC technology has the potential to revolutionize mobile applications like payment and ticketing because NFC is more complex and mutual connectivity than RFID as the simple tag reader. Finally, NFC security technology defines the robust security protocols. This paper will specify and analyze the NFC security technology, and study the chance and its beneficial effect of the UICC card as the NFC Secure Element.

A Study on Improvement method of designation criteria for Personal Proofing Service Based on Resident Registration Number (주민등록번호 기반의 온라인 본인확인서비스 기관 지정기준 개선방안 연구)

  • Kim, Jongbae
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.16 no.3
    • /
    • pp.13-23
    • /
    • 2020
  • Currently, online means of replacing resident registration numbers(RRN) include I-Pin, mobile phone, credit card, MyPin, and general-purpose certificate. In order to issue alternative means based on the RRN, it must be designated through the designation review by the Korea Communications Commission(KCC) through a designation review by personal proofing agency and be subject to annual management. However, the criteria for designation and follow-up of the designation of the personal proofing agency carried out by KCC have been used in 2010 without revision, and there are problems that do not conform to the evaluation standards of various alternative means. Therefore, in this paper, we propose a method for improving the designation criteria and management system of the personal proofing service agency. The proposed method analyzes the characteristics of the alternative identification-based personal proofing service and proposes a follow-up management standard that can appropriately evaluate the analyzed characteristics and improves the designation criteria according to the emergence of new alternatives. Through the proposed method, it can be seen that it is possible to strengthen the safety of the personal proofing service based on the alternative means of RRN provided online and face-to-face and to protect the user's personal information.

Development of an App for Store Information Management based on NFC (NFC 기반 가게정보관리 앱 개발에 관한 연구)

  • Ahn, Ki Ho;Kim, Yong Il
    • Smart Media Journal
    • /
    • v.2 no.3
    • /
    • pp.39-46
    • /
    • 2013
  • According to popularization of smart phones, we can easily see the QR code attached to products. Restaurants also provide customers with store information using QR code. Sixteen years have passed since QR code was developed. In Korea, QR code has been widely utilized in the field of marketing because of easiness of technique implementation and channel expansion to mobile. However, to recognize QR code, we should run the proper application and focus on it during loading time. To address this problem, this paper proposes the app to manage store information using NFC technology. The proposed app saves easily store information through the name card of a store and facilitates its management obtained by a smart phone.

  • PDF