• Title/Summary/Keyword: One Card System

Search Result 209, Processing Time 0.025 seconds

A Study of Security Vulnerability by Cloning 2G(GSM) SIM Card in China (중국 2G(GSM) SIM카드 복제로 인한 보안 취약성 연구)

  • Kim, Wan-Soo;Kim, Shik
    • The Journal of Information Technology
    • /
    • v.12 no.2
    • /
    • pp.1-12
    • /
    • 2009
  • China first started its mobile phone services in 1987, and the number of users has exponentially increased so that it reached 700 millions in January 2009. Currently China's 2G(GSM) users is 650 millions. These 2G (GSM) services have an advantage of the capability to use the mobile phone with a SIM (Subscriber Identity Modul) card, one kind of smart cards, inserted into it. However, due to the security vulnerability of SIM cards being used within China's 2G (GSM) services, SIM cards cloning. Problems concerning mobile phone surveillance towards a designated person by illegal cloning ESN and IMSI have recently risen to be a massive social issue within Korea as well. These studies have experimented the possibility of SIM cards clone in various mobile communication corporations using 2G (GSM) in China, and hence discovered the security vulnerability such as the incoming outgoing, SMS service and additional services on mobile phones using clone SIM cards.

  • PDF

Research on the linking method of ITA and BSC (ITA와 BSC의 연계 방안 연구)

  • Kim, Ji-Young;Cho, sung-nam;Chung, taik-yeong;Park, chan-jin
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2007.11a
    • /
    • pp.947-950
    • /
    • 2007
  • Recently, most of the public institutions are developing ITA(Information Technology Architecture) & BSC (Balance ScoreCard) system. ITA's reference model is provided for the consistency, reusability, and interoperability. By the way, PRM(Performance Reference Model), one of the ITA reference models, is needed to link with BSC system. In this paper, we provide the linking method of ITA and BSC.

  • PDF

Development of a Hydraulic Servo System Real-Time Simulator Using a One-board Microprocessor and Personal Computer (원보드 마이크로 프로세서 제어기 및 PC를 이용한 유압서보시스템의 실시간 시뮬레이터 개발)

  • Chang, Sung-Ouk;Lee, Jin-Kul
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.17 no.8
    • /
    • pp.94-99
    • /
    • 2000
  • In this study applied the general controller into th 16bit ordinary controller and recommand the simulator features the real system's propeties without DSP(Digital Signal Processing)-card. This simulator is designed to be synchronized in real time using A/D(Analog-Digital) convert and D/A(Digital-Analong) convert. In this study DSP card which is usually used for complex calculation is replaced with personal computer and designed to control, control-force using with the 16-bit micro processor.

  • PDF

Generalized K Path Searching in Seoul Metropolitan Railway Network Considering Entry-Exit Toll (진입-진출 요금을 반영한 수도권 도시철도망의 일반화 K-경로탐색)

  • Meeyoung Lee
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.21 no.6
    • /
    • pp.1-20
    • /
    • 2022
  • The basic way to charge vehicles for using road and public transport networks is the entry-exit toll system. This system works by reading Hi-Pass and public transportation cards of the vehicles using card readers. However, the problems of navigating a route in consideration of entry-exit toll systems include the non-additive costs of enumerating routes. This problem is known as an NP-complete task that enumerates all paths and derives the optimal path. So far, the solution to the entry-exit toll system charging has been proposed in the form of transforming the road network. However, unlike in the public transport network where the cards are generalized, this solution has not been found in situations where network expansion is required with a transfer, multi-modes and multiple card readers. Hence, this study introduced the Link Label for a public transportation network composed of card readers in which network expansion is bypassed in selecting the optimal path by enumerating the paths through a one-to-one k-path search. Since the method proposed in this study constructs a relatively small set of paths, finding the optimal path is not burdensome in terms of computing power. In addition, the ease of comparison of sensitivity between paths indicates the possibility of using this method as a generalized means of deriving an optimal path.

A Study of node Authentication in Ad-hoc Network using Java Card (자바 카드를 이용한 Ad-hoc망의 노드 인증에 관한 연구)

  • Lee, Cheol-Seung;Shin, Myeong-Sook;Lee, Joon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.902-905
    • /
    • 2005
  • In this paper we challenge the mobile node Authentication using Java Card authentication protocol in Ad-hoc network environment. Ad-hoc network is a collection of wireless mobile nodes without the support of a stationary infrastructure. and DSR routing protocol, which is one of famous mobile ad-hoc rooting protocols, has the following network path problem. this paper is the security structure that defined in a mobile network and security and watches all kinds of password related technology related to the existing authentication system. It looks up weakness point on security with a problem on the design that uses Ad-hoc based structure and transmission hierarchical security back of a mobile network, and a server-client holds for user authentication of an application level all and all, and it provides one counterproposal. Java Card Authentication of mobile node can possibly be applied to the area of M-Commerce, Wireless Security, and Ubiquitous Computing and so on.

  • PDF

A Study of Wireless LAN Communication using Embedded System (임베디드 시스템을 이용한 무선랜 통신에 관한 연구)

  • Lee, Chang-Keun;Choi, Jae-Woo;Ro, Bang-Hyun;Hwang, Hee-Yeung
    • Proceedings of the KIEE Conference
    • /
    • 2003.11c
    • /
    • pp.673-676
    • /
    • 2003
  • In this paper, we designed the embedded system used for wireless LAN communication. Embedded system kernel is made from general linux kernel 2.4.18 by applying the ARM patch (2.4.18-rmk7) and the SA1100 patch(2.4.18-rmk7), then porting board level suitable to target system. The SA-1110 PCMCIA interface provides controls for one PCMCIA card slot with a PSKTSEL pin for support of a second slot. The embedded system requires external logic to complete the PCMCIA socket interface. For dual-voltage support, level shifting buffers are required for all SA-1110 input signals. Hot insertion capability requires that each socket be electrically isolated from each other, and from the remainder of the memory system. embedded system is for socket services approaching PCMCIA socket, detecting number of sockets, sensing insertion and removal, and applying power. It also provides interface with Card services. Embedded system supports Host driver for lucent chips that is installed orinoco driver cross compiled. The meaning can say that is doing wireless LAN communication through wireless LAN in imbedded system.

  • PDF

IC카드용 대칭 키 알고리듬을 사용한 인증 시스템의 연구

  • 이창순
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.2 no.1
    • /
    • pp.161-175
    • /
    • 1997
  • In this ppaer, we present a Authenticatino System for IC-card using symmetric key algorithm. And we anlayzed previsous articles and solved a problem of key management which is one of difficulties in using symmetric key algorithm. This presented protocal is strong to different attacks.

A Study on the Development of a Value-Added Real Estate Information System with a Focus on Marketing Analysis Using Credit Card Data (부가가치화된 부동산 종합정보시스템 개발에 대한 연구 - 신용카드 매출정보를 활용한 상권분석시스템을 중심으로 -)

  • Kim, Sang-Beom;Park, Hwa-Jin
    • Journal of Digital Contents Society
    • /
    • v.7 no.4
    • /
    • pp.227-234
    • /
    • 2006
  • While most of the real estate information provided on the web is simply based on the information of the properties like addresses, locations, prices etc, this paper suggests methodologies for the development of a total information system of real estate which can provide, in an one-stop mode, value-added real estate information contents. The total information system of real estate designed in this paper includes a geological information system using a GIS, a property information system using photos and videos, a systemized legal consulting system, a web call center where customers can communicate with real estate experties on the web and lastly marketing analyses system using credit card data.

  • PDF

Enhanced ART1 Algorithm for the Recognition of Student Identification Cards of the Educational Matters Administration System on the Web (웹 환경 학사관리 시스템의 학생증 인식을 위한 개선된 ART1 알고리즘)

  • Park Hyun-Jung;Kim Kwang-Baek
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.5 s.37
    • /
    • pp.333-342
    • /
    • 2005
  • This paper proposes a method, which recognizes student's identification card by using image processing and recognition technology and can manage student information on the web. The presented scheme sets up an average brightness as a threshold, based on the brightest Pixel and the least bright one for the source image of the ID card. It is converting to binary image, applies a horizontal histogram, and extracts student number through its location. And, it removes the noise of the student number region by the mode smoothing with 3$\times$3 mask. After removing noise from the student number region, each number is extracted using vertical histogram and normalized. Using the enhanced ART1 algorithm recognized the extracted student number region. In this study, we propose the enhanced ART1 algorithm different from the conventional ART1 algorithm by the dynamical establishment of the vigilance parameter. which shows a tolerance limit of unbalance between voluntary and stored patterns for clustering. The Experiment results showed that the recognition rate of the proposed ART1 algorithm was improved much more than that of the conventional ART1 algorithm. So, we develop an educational matters administration system by using the proposed recognition method of the student's identification card.

  • PDF

Classification of Subway Trip Patterns from Smart Card Transaction Databases (교통카드 트랜잭션 데이터베이스에서 지하철 탑승 패턴 분류)

  • Park, Jong-Soo;Kim, Ho-Sung;Lee, Keum-Sook
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.12
    • /
    • pp.91-100
    • /
    • 2010
  • To understand the trip patterns of subway passengers is very important to making plans for an efficient subway system. Accordingly, there have been studies on mining and classifying useful patterns from large smart card transaction databases of the Metropolitan Seoul subway system. In this paper, we define a new classification of subway trip patterns and devise a classification algorithm for eleven trip patterns of the subway users from smart card transaction databases which have been produced about ten million transactions daily. We have implemented the algorithm and then applied it to one-day transaction database to classify the trip patterns of subway passengers. We have focused on the analysis of significant patterns such as round-trip patterns, commuter patterns, and unexpected interesting patterns. The distribution of the number of passengers in each trip pattern is plotted by the get-on time and get-off time of subway transactions, which illustrates the characteristics of the significant patterns.