• Title/Summary/Keyword: Mobile Card

Search Result 214, Processing Time 0.03 seconds

A Study on Contents Sharing Mechanism based on Proxy Re-Encryption Scheme using the Smart Card (스마트카드를 이용한 프록시 재 암호화 기법 기반 콘텐츠 공유 메커니즘에 관한 연구)

  • Park, Seung-Hwan;Koo, Woo-Kwon;Kim, Ki-Tak;Mun, Hye-Ran;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.3
    • /
    • pp.131-141
    • /
    • 2011
  • OMA(Open Mobile Alliance) is one of the most active group about DRM technology in mobile device field. OMA announced an OMA-DRM v 2.1 standardization in 2007. After then OMA announced OMA-SRM(Secure Removable Media) and SCE(Secure Contents Exchanges) that are the extension of OMA-DRM v2.1. In SCE, a user can form user domain to share contents and rights. So the user can share contents and rights with not only the the OMA-DRM v2.1 but also home devices like mobile phones, personal computers and audios. In this paper, we analyze a sharing technology of OMA-DRM and SCE, and then propose key distribution method using proxy re-encryption and smart card to use shared contents and rights.

UHF/HF Dual-Band Integrated Mobile RFID/NFC Linkage Method for Mobile Device-based Business Application (휴대단말 기반의 비즈니스 응용을 위한 UHF/HF 듀얼밴드 통합 모바일 RFID와 NFC의 연동 방안)

  • Park, Namje
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.10
    • /
    • pp.841-851
    • /
    • 2013
  • Mobile RFID/NFC linkage technology means a provision of integrated 2 existing mobile RFID services by developing the 900MHz mobile RFID reader and the NFC reader/tag into one SoC to be put on a USIM card. In this paper, the mobile RFID related technologies that offer similar services as NFC were also analyzed to understand the potential linkage to NFC and the requirements for the linkage. In addition, the introduction of dual tag and the code system linkage suggested a linking method to maximally use the existing infrastructure and the requirement satisfaction was analyzed. Lastly, based on the analysis, the future direction for the new standard design was suggested.

Enhanced Password Based User Authentication Mechanism Using Mobile Storage Medium/Channel (이동 저장매체를 활용한 패스워드 기반 사용자 인증 강화 방안)

  • Kim, Seon-Young;Kim, Seon-Joo;Joe, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.14 no.11
    • /
    • pp.533-540
    • /
    • 2014
  • As for the application system or the user authentication scheme that is used in the system, various technologies including simple ID/PW, certificate, fingerprint/iris, phone, security card, and OTP are being used. But simple ID/PW and phone certification lack security features. As for the certificate, fingerprint/iris, and security card/OTP, the weakness in security has been quite strengthened, but there are costs and complexity involved to use these. This paper proposes a new measure of much safer and low-cost user authentication that improves the security level and uses mobile external storage media such as USB that people commonly have.

A Study on the Application of RFID to Teaching-Learning in u-Learning Environment (u-러닝 환경에서 RFID의 교수-학습 적용에 관한 연구)

  • Baek, Jang-Hyeon
    • Journal of The Korean Association of Information Education
    • /
    • v.11 no.2
    • /
    • pp.185-194
    • /
    • 2007
  • With the advent of ubiquitous society, the paradigm of education is also changing. In u-learning in ubiquitous environment, mobile devices such as cellular phone, PDA, PMP, UMPC and TPC will become important learning tools. Particularly if RFID, a key technology in ubiquitous society, is utilized in teaching-learning along with mobile devices, we can expect much more meaningful learning. The present study proposed four types of application of RFID to teaching.learning, which were RFID-card, RFID-book, RFID-label and RFID-test, and examined their possibility and effectiveness. According to the results of this study, technology was insufficient to support the application of RFID-label to teaching-learning and continuous research was required for modeling the application of RFID to teaching-learning.

  • PDF

Automatic Client Authentication Method in All-In-One Services (올인원 서비스에서 자동적인 고객 인증 기법)

  • Kim, Namyun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.1
    • /
    • pp.1-5
    • /
    • 2016
  • The all-in-one service, for example, mobile wallet enables users to have credit card, membership card, and coupon in one place. It has been one of important o2o services with offline payment. In order to take advantage of mobile commerce, it is necessary to authenticate clients automatically without entering their passwords. This paper proposes an automatic client authentication method in all-in-one service. At registration, clients receives and stores an authentication ticket from a company, which contains an user's identifier and password encrypted by company's symmetric key. Client can be authenticated by transferring authentication tickets to companies at service requests.

A Lightweight Pseudonym Authentication and Key Agreement Protocol for Multi-medical Server Architecture in TMIS

  • Liu, Xiaoxue;Li, Yanping;Qu, Juan;Ding, Yong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.2
    • /
    • pp.924-944
    • /
    • 2017
  • Telecare Medical Information System (TMIS) helps the patients to gain the health monitoring information at home and access medical services over the mobile Internet. In 2015, Das et al proposed a secure and robust user AKA scheme for hierarchical multi-medical server environment in TMIS, referred to as DAKA protocol, and claimed that their protocol is against all possible attacks. In this paper, we first analyze and show DAKA protocol is vulnerable to internal attacks, impersonation attacks and stolen smart card attack. Furthermore, DAKA protocol also cannot provide confidentiality. We then propose a lightweight pseudonym AKA protocol for multi-medical server architecture in TMIS (short for PAKA). Our PAKA protocol not only keeps good security features declared by DAKA protocol, but also truly provides patient's anonymity by using pseudonym to protect sensitive information from illegal interception. Besides, our PAKA protocol can realize authentication and key agreement with energy-saving, extremely low computation cost, communication cost and fewer storage resources in smart card, medical servers and physical servers. What's more, the PAKA protocol is proved secure against known possible attacks by using Burrows-Abadi-Needham (BAN) logic. As a result, these features make PAKA protocol is very suitable for computation-limited mobile device.

A Survey of Fraud Detection Research based on Transaction Analysis and Data Mining Technique (결제로그 분석 및 데이터 마이닝을 이용한 이상거래 탐지 연구 조사)

  • Jeong, Seong Hoon;Kim, Hana;Shin, Youngsang;Lee, Taejin;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.6
    • /
    • pp.1525-1540
    • /
    • 2015
  • Due to a rapid advancement in the electronic commerce technology, the payment method varies from cash to electronic settlement such as credit card, mobile payment and mobile application card. Therefore, financial fraud is increasing notably for a purpose of personal gain. In response, financial companies are building the FDS (Fraud Detection System) to protect consumers from fraudulent transactions. The one of the goals of FDS is identifying the fraudulent transaction with high accuracy by analyzing transaction data and personal information in real-time. Data mining techniques are providing great aid in financial accounting fraud detection, so it have been applied most extensively to provide primary solutions to the problems. In this paper, we try to provide an overview of the research on data mining based fraud detection. Also, we classify researches under few criteria such as data set, data mining algorithm and viewpoint of research.

Understanding elderly's travel pattern based on individual trip trajectory using smart card data (스마트카드 데이터를 활용한 통행궤적 기반 고령인구 통행유형 분류)

  • Lee, Ju-Yoon;Kang, Young-Ok
    • Journal of Cadastre & Land InformatiX
    • /
    • v.52 no.2
    • /
    • pp.153-169
    • /
    • 2022
  • With the extension of the average life span and the rapid aging of the population, defining elderly population as a single group is difficult as the physical, economic and social conditions of individual have become different. Therefore, policies that take into account the characteristics of each group are required. The purpose of this study is to classify individual travel types and to analyze the characteristics of each travel type, based on individual public transportation trajectory data as known as smart card data. Among the four classified types, the long-distance low-frequency stay type and the short-range medium-frequency mobile type show external activity traffic characteristics for retirement leisure, while the long-distance high-frequency stay type and the long-distance high-frequency mobile group include regular commuting. Traffic variability and residence areas of stay were identified in terms of each classified travel type. The results of this study provide the important suggestions for establishing a transportation policy that takes into account the characteristics of each type of elderly population in Seoul.

UI Design and Usability Analysis of Maternal Notebook Mobile Application (산모수첩 모바일 애플리케이션의 UI 디자인과 사용성 분석)

  • Chun, Christine Hyeyeon
    • Journal of Korea Multimedia Society
    • /
    • v.23 no.1
    • /
    • pp.85-92
    • /
    • 2020
  • This paper analyzes the design and usability of maternal notebook mobile application and suggests the improvement direction of the application. The researcher compared and analyzed the functions of maternal notebook applications, conducted user interviews and expert evaluations. The conclusions of this study are the use of appropriate information volume, proportional screen division focusing on main functions, the use of GNB format of main menus, the prohibition of double menu configuration, the use of color consistent with the image of the service, the use of few font sizes, the use of appropriate colors in typography, the use of rich icons with uniform design, card format, list format, but also timeline and infographic forms that make rich user interface design. Maternal notebook application research is expected to be an important reference for research on similar mobile applications with complex functions such as information provision, user history, and community, along with improved research in healthcare design.

A Study on the Expected Effect of Mobile Prepaid Payment for the Activation of Food Waste Volume-Rate System (음식물 종량제 활성화를 위한 모바일 선불결제 적용에 따른 기대효과 연구)

  • Kim, YongIl;Kim, SeungCheon
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.11
    • /
    • pp.47-54
    • /
    • 2020
  • This study proposes an NFC-based payment system that considers user convenience while expanding the existing payment method for RFID-based individual food and logistics waste equipment. In line with this trend, I proposed to apply NFC to the existing RFID-based food meter to release the food in the meantime and to address the problem of re-carrying due to card loss, card not possessed, and non-filling, and the question that could not be identified by various cumbersome procedures. NFC's function alone has been certified for its convenience, which led to its introduction and research in the period of time. Of course, we need to negotiate fees with the transportation card company, but if we see a market share related to transportation card soon, we think smooth negotiations will take place. NFC method will be expanded to all phones with iPhone NFC opening. Therefore, in the next study, we intend to apply the payment system in NFC by linking with local currency, mobile vouchers, and card companies, which are being paid as respective payment means according to the recent emergency support system for COVID-19.