• Title/Summary/Keyword: Smart Cards

Search Result 180, Processing Time 0.029 seconds

A Method of Digital Credit Cards Management in Smart-Phone (스마트폰에서의 디지털 신용카드 관리 방법)

  • Lee, Young Gyo;Ahn, Jeong Hee
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.8 no.2
    • /
    • pp.67-79
    • /
    • 2012
  • As credit cards are more convenient than cash of heavy and volume, they are used widely in on_line (internet) and off_line in nowadays. A head of the economically active population had 4.8 credit cards in the third quarter 2011. The economically active population in their 20's and 30's may have more than 10 credit cards. If the membership card and point card are included, the count rise to 20 cards in a man. Therefore, the their purse become thick by several cards. Nowadays, the smart-phone is widely used. Therefore, a lot of credit cards are come in smarty-phone from analog form to digital form. In this paper, we study a method of digital credit cards management in smart-phone. For the method, the hardware need in small and existing system have a few change. All kinds of credit cards are used in smarty-phone. We compare the method with Moneta card and NFC of smarty-phone. The digital credit cards feature a light, safety and convenience of mobile users in several ways.

An Attribute-Based Authentication Scheme Using Smart Cards (스마트카드를 이용한 속성기반 사용자 인증 스킴)

  • Yoo, Hye-Joung;Rhee, Hyun-Sook
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.5
    • /
    • pp.41-47
    • /
    • 2008
  • In a network environment, when a user requests a server's service, he/she must pass an examination of user authentication. Through this process, the server can determine if the user can use the provided services and the exact access rights of this user in these services. In these authentication schemes, the security of private information became an important issue. For this reason, many suggestions have been made in order to protect the privacy of users and smart cards have been widely used for authentication systems providing anonymity of users recently. An remote user authentication system using smart cards is a very practical solution to validate the eligibility of a user and provide secure communication. However, there are no studies in attribute-based authentication schemes using smart cards so far. In this paper, we propose a novel user authentication scheme using smart cards based on attributes. The major merits include : (1) the proposed scheme achieves the low-computation requirement for smart cards; (2) user only needs to register once and can use permitted various services according to attributes; (3) the proposed scheme guarantees perfect anonymity to remote server.

BLIND IDENTIFICATION USING BILINEAR PAIRINGS FOR SMART CARDS

  • Lee, Young-Whan
    • Journal of applied mathematics & informatics
    • /
    • v.26 no.5_6
    • /
    • pp.1139-1147
    • /
    • 2008
  • A. Saxena et al. first proposed a two-flow blind identification protocol in 2005. But it has a weakness of the active-intruder attack and uses the pairing operation that causes slow implementation in smart cards. In this paper, we give a method of the active-intruder attack on their identification scheme and propose a new zero- knowledge blind identification protocol for Smart cards. Our protocol consists of only two message flows and does not rely on any underlying signature or encryption scheme. The prover using computationally limited devices such as smart cards has no need of computing the bilinear pairings. It needs only for the verifier. Our protocol is secure assuming the hardness of the Discrete-Logarithm Problem in bilinear groups.

  • PDF

Comparative Analysis of ViSCa Platform-based Mobile Payment Service with other Cases (스마트카드 가상화(ViSCa) 플랫폼 기반 모바일 결제 서비스 제안 및 타 사례와의 비교분석)

  • Lee, June-Yeop;Lee, Kyoung-Jun
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.2
    • /
    • pp.163-178
    • /
    • 2014
  • Following research proposes "Virtualization of Smart Cards (ViSCa)" which is a security system that aims to provide a multi-device platform for the deployment of services that require a strong security protocol, both for the access & authentication and execution of its applications and focuses on analyzing Virtualization of Smart Cards (ViSCa) platform-based mobile payment service by comparing with other similar cases. At the present day, the appearance of new ICT, the diffusion of new user devices (such as smartphones, tablet PC, and so on) and the growth of internet penetration rate are creating many world-shaking services yet in the most of these applications' private information has to be shared, which means that security breaches and illegal access to that information are real threats that have to be solved. Also mobile payment service is, one of the innovative services, has same issues which are real threats for users because mobile payment service sometimes requires user identification, an authentication procedure and confidential data sharing. Thus, an extra layer of security is needed in their communication and execution protocols. The Virtualization of Smart Cards (ViSCa), concept is a holistic approach and centralized management for a security system that pursues to provide a ubiquitous multi-device platform for the arrangement of mobile payment services that demand a powerful security protocol, both for the access & authentication and execution of its applications. In this sense, Virtualization of Smart Cards (ViSCa) offers full interoperability and full access from any user device without any loss of security. The concept prevents possible attacks by third parties, guaranteeing the confidentiality of personal data, bank accounts or private financial information. The Virtualization of Smart Cards (ViSCa) concept is split in two different phases: the execution of the user authentication protocol on the user device and the cloud architecture that executes the secure application. Thus, the secure service access is guaranteed at anytime, anywhere and through any device supporting previously required security mechanisms. The security level is improved by using virtualization technology in the cloud. This virtualization technology is used terminal virtualization to virtualize smart card hardware and thrive to manage virtualized smart cards as a whole, through mobile cloud technology in Virtualization of Smart Cards (ViSCa) platform-based mobile payment service. This entire process is referred to as Smart Card as a Service (SCaaS). Virtualization of Smart Cards (ViSCa) platform-based mobile payment service virtualizes smart card, which is used as payment mean, and loads it in to the mobile cloud. Authentication takes place through application and helps log on to mobile cloud and chooses one of virtualized smart card as a payment method. To decide the scope of the research, which is comparing Virtualization of Smart Cards (ViSCa) platform-based mobile payment service with other similar cases, we categorized the prior researches' mobile payment service groups into distinct feature and service type. Both groups store credit card's data in the mobile device and settle the payment process at the offline market. By the location where the electronic financial transaction information (data) is stored, the groups can be categorized into two main service types. First is "App Method" which loads the data in the server connected to the application. Second "Mobile Card Method" stores its data in the Integrated Circuit (IC) chip, which holds financial transaction data, which is inbuilt in the mobile device secure element (SE). Through prior researches on accept factors of mobile payment service and its market environment, we came up with six key factors of comparative analysis which are economic, generality, security, convenience(ease of use), applicability and efficiency. Within the chosen group, we compared and analyzed the selected cases and Virtualization of Smart Cards (ViSCa) platform-based mobile payment service.

A Study on Test Module of Smart Cards in Electronic Payment Systems (전자지불시스템에서 이용되는 스마트카드의 시험 모듈 구성에 대한 연구)

  • 김윤정;이기한
    • The Journal of Society for e-Business Studies
    • /
    • v.9 no.1
    • /
    • pp.303-320
    • /
    • 2004
  • Smart card is a useful tool used in electronic payment systems and it is very important to test whether a smart card operates correctly. In this paper, we analyze previous researches on testing smart cards, such as ISO/IEC and KS standard documents, and Guideline of Card Quality Test. We also propose the functional test results done on the Highpassplus card of Korea Highway Corporation. By testing the Hipgpassplus card we can get card systems with reliable functionality and security. Furthermore, this can help developing more reliable security systems. The test results of the Highpassplus card proposed in this paper are the first research on testing smart cards in services in Korea and we expect that the test methods of smart card will be advanced based on our results.

  • PDF

Mutual Anonymous Authentication Using Smart Cards in Multi-server Environments (다중서버 환경에서의 스마트카드를 이용한 상호 익명 인증)

  • Yoo, Hye-Joung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.12C
    • /
    • pp.1021-1028
    • /
    • 2008
  • In a network environment, when a user requests a server's service, a remote user authentication system using smart cards is a very practical solution to validate the eligibility of a user and provide secure communication. In these authentication schemes, due to fast progress of networks and information technology, most of provided services are in multi-server environments. However, there are no studies in multi-server authentication schemes using smart cards providing mutual anonymity so far. In this paper, we propose a novel user authentication scheme using smart cards providing mutual authentication and mutual anonymity for multi-server environments. Our proposed scheme achieves the low-computation requirement for smart cards and a user can use permitted various services in eligible servers by only one registration. Also, this scheme guarantees perfect mutual anonymity of participants.

A Study on Implementation of LED Smart Card built-in Flexible Ultra-thin Speaker of Piezoelectric (압전방식의 플렉시블 초박형 스피커가 내장된 LED 스마트카드 구현에 관한 연구)

  • Yu, Hyeungkeun;Lee, JungHoon;Lee, Jongsung;Jang, Yeongmin;Cha, Jaesang;Lee, Kangwon
    • Journal of Satellite, Information and Communications
    • /
    • v.8 no.2
    • /
    • pp.1-5
    • /
    • 2013
  • Recently, the spread of a variety of electronic card is using as credit cards, transportation cards, passports, driver's licenses, public phone card, and etc. LED smart cards need to raise application technique because variety of LED smart cards increasing supply and usage. in this paper, we propose a LED smart card contained inside the card that piezoelectric method flexible Ultra-thin speaker. and a melody flows when User using the LED smart card.. Therefore we are verified to useful through develop to electronic card that was designed system circuit and implemented circuit add in ultra-thin flexible Speaker based on piezoelectric.

Flexible Electronics Devices for Smart Card Applications

  • Hou, Jack;Kimball, Bob;Vincent, Bryan;Ratcliffe, Bill;Mahan, Mike
    • 한국정보디스플레이학회:학술대회논문집
    • /
    • 2008.10a
    • /
    • pp.75-77
    • /
    • 2008
  • Flexible electronics devices such as plastic display, thin film battery, membrane switch, organic memory for smart card applications will be presented. The performance and power consumption of various display technologies will be compared for OTP requirement in smart cards. Wireless power transmission by RF coupling through an antenna provides a potential power solution to smart cards. Finally, the general trend of smart card future developments will be discussed.

  • PDF

Enhanced Password-based Remote User Authentication Scheme Using Smart Cards

  • Jeon, II-Soo;Kim, Hyun-Sung
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.16 no.1
    • /
    • pp.9-19
    • /
    • 2011
  • Secure and efficient authentication schemes over insecure networks have been a very important issue with the rapid development of networking technologies. Wang et al. proposed a remote user authentication scheme using smart cards. However, recently, Chen et al. pointed out that their scheme is vulnerable to the impersonation attack and the parallel session attack, and they proposed an enhanced authentication scheme. Chen et al. claimed that their scheme is secure against the various attacks. However, we have found that their scheme cannot resist the parallel attack and the stolen smart card attack. Therefore, in this paper, we show the security flaws in Chen et al.'s scheme and propose an improved remote user authentication scheme using tamper-resistant smart cards to solve the problem of Chen et al.'s scheme. We also analyze our scheme in terms of security and performance.

SECURE IDENTIFICATION AND SIGNATURE USING ZERO-KNOWLEDGE PROOFS AND BILINEAR PAIRINGS

  • Choi, Byung Mun;Lee, Young Whan
    • Journal of the Chungcheong Mathematical Society
    • /
    • v.21 no.3
    • /
    • pp.403-411
    • /
    • 2008
  • In 2005, A. Saxena, B. Soh and S. Priymak [10] proposed a two-flow blind identification protocol. But it has a weakness of the active-intruder attack and uses the pairing operation that causes slow implementation in smart cards. In 2008, Y. W. Lee [9] made a method of the active-intruder attack on their identification scheme and proposed a new zero-knowledge blind identification protocol for smart cards. In this paper, we give more simple and fast protocols than above protocols such that the prover using computationally limited devices such as smart cards has no need of computing the bilinear pairings. Computing the bilinear pairings is needed only for the verifier and is secure assuming the hardness of the Discrete-Logarithm Problem (DLP).

  • PDF