• Title/Summary/Keyword: Smart Cards

Search Result 181, Processing Time 0.021 seconds

A Study on the Edu-tainer Convergence App for Young Children's Play learning in Mobile Environments (모바일 환경에서의 유아 놀이 학습을 위한 에듀테이너 융합 앱 연구)

  • Jung, Doo-Yong;Sok, Yun-Young
    • Journal of the Korea Convergence Society
    • /
    • v.7 no.5
    • /
    • pp.23-28
    • /
    • 2016
  • In this paper, smart devices using a 4 to 6 years old, infants and parents to a user layer of training and with games or studying infants by integrating them. Not losing interest and concentration, Mobile infants to learning to learn Korean, English, the estimated budget. design the app tainer. For parents of infants and a variety of media concentration and learning Korean, English, English word cards that can increase the interest of the design and, to find a picture Memory game, had provided games are various kinds such as learning to do puzzles. Also, infants and tries to help study a visual learning and auditory learning at the same time can be achieved by mothers of children is much more conveniently. Learning to guide implementation to maximize the availability, convenience and mobility.

Improvements of a Dynamic ID-Based Remote User Authentication Scheme (동적 ID 기반 원격 사용자 인증 스킴의 보안성 개선)

  • Young-Do, Joo;An, Young-Hwa
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.6
    • /
    • pp.303-310
    • /
    • 2011
  • Recently, many user authentication schemes using smart cards have been proposed to improve the security weaknesses in user authentication process. In 2009, Wang et al. proposed a more effective and secure dynamic ID-based remote user authentication scheme to improve the security weakness of Das et al.'s scheme, and asserted that the improved scheme is secure against independent of password in authentication phase and provides mutual authentication between the user and the remote server. However, in this paper, we analyze the security of Wang et al. scheme and demonstrate that Wang et al.'s scheme is vulnerable to the man-in-the-middle attack and the off-line password guessing attack. In addition, we show that Wang et al. scheme also fails to provide mutual authentication. Accordingly, we propose an improved scheme to overcome these security weakness even if the secrete information stored in the smart card is revealed. Our proposed scheme can withstand the user impersonation attack, the server masquerading attack and off-line password guessing attack. Furthermore, this improved scheme provides the mutual authentication and is more effective than Wang et al.'s scheme in term of the computational complexities.

An Implementation of Waiting Queue System based on Mobile NFC (모바일 NFC기반의 순번대기 시스템의 설계)

  • Kim, Sang-yoon;Cho, Kyung-rae;Kim, Jung-han;Bae, Sung-ho;Kang, Sung-in
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.862-865
    • /
    • 2013
  • The smartphone digs deep into our lives, is changing our life. With increases the penetration of smart phones, it getting better performance. In recent years, tend to increase its utilization by an increase in the prevalence of smart phones equipped with NFC short-range wireless communication technology based on RFID in a number of areas, including e-cards, tagging. In this paper, we implement a system that can operate the system by traditional saddlecloth way of waiting waiting waiting standby system more efficient by applying NFC.

  • PDF

Digital Contents Protection Without Server Authentication Using Smart Cards (스마트 카드를 이용한 서버 인증이 필요 없는 디지털 콘텐츠 보호 기법)

  • Kim, Young-Sik;Lim, Dae-Woon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.3C
    • /
    • pp.133-139
    • /
    • 2011
  • Nowadays, it is considered as an important task to protect digital contents from illegal use and reproduction. In many cases, there are secure servers to authenticate the allowed users and the user authentication process is performed by communication between the servers and users. However, if the number of users and contents are increased, the servers should treat a large amount of authentication loads and the authentication cost will be considerably increased. Moreover, this scheme is not adequate for some players in which only a limited function of communication is deployed. In order to solve this problem, this paper proposes an authentication method which can certificate both the digital contents and players, and prevent illegal reproduction without the certification server. The proposed scheme is secure in the replay attack, the man in the middle attack, and data substitution attack.

Cryptanalysis and Enhancement of a Remote User Authentication Scheme Using Smart Cards (스마트카드를 이용한 사용자 인증 스킴의 안전성 분석 및 개선)

  • Lee, Young-Sook;Won, Dong-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.1
    • /
    • pp.139-147
    • /
    • 2010
  • A remote user authentication scheme is a two-party protocol whereby an authentication server in a distributed system confirms the identity of a remote individual logging on to the server over an untrusted, open network. In 2005, Liao et al. proposed a remote user authentication scheme using a smart card, in which users can be authenticated anonymously. Recently, Yoon et al. have discovered some security flaws in Liao et al.'s authentication scheme and proposed an improved version of this scheme to fix the security flaws. In this article, we review the improved authentication scheme by Yoon et al. and provide a security analysis on the scheme. Our analysis shows that Yoon et al.'s scheme does not guarantee not only any kind of authentication, either server-to-user authentication or user-to-server authentication but also password security. The contribution of the current work is to demonstrate these by mounting two attacks, a server impersonation attack and a user impersonation attack, and an off-line dictionary attack on Yoon et al.'s scheme. In addition, we propose the enhanced authentication scheme that eliminates the security vulnerabilities of Yoon et al.'s scheme.

Certificate-based Electronic Cash System (인증서를 기반으로 하는 전자 현금 시스템)

  • Hwang, Seong-Oun
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.11
    • /
    • pp.2921-2929
    • /
    • 1998
  • We propose an efficient off-line electronic cash system based on the certificate issued by Certificate Authority. It satisfies all the basic requirements for electronic payment system such as cash unforgeability, cash anonymity, double spending detection, no framing, etc. Our proposed system is very computationally efficient in the sense that: (1) the number of exponentiation operation imposed on the user during withdrawal phase is much smaller than any existing off-line electronic cash schemes, (2) all the computation of user's during withdrawal phase can be performed by off-line pre-processing. So the proposed system is suitable to be implemented by smart cards in both memory and computation.

  • PDF

QR code-based Mobile Web Platform for Viewing detailed Product Information (상품 정보 열람을 위한 QR 코드 기반의 모바일 웹 플랫폼)

  • Kim, Bong-Han
    • Journal of Digital Convergence
    • /
    • v.10 no.3
    • /
    • pp.143-148
    • /
    • 2012
  • QR Code is available in many areas(business cards, coupons, advertising, billing, etc) due to the increase in the smart phones. In particular, the company's image and marketing are also available and using the Internet address, personal and corporate PR and publicity are also available. I was implemented the mobile web platform by the case wine information that easily seen but difficult to understand the information. Using QR Code, consumers can get information easily and quickly. In addition, based on the idea of using mobile web platform, variety of services and benefits will be able to expected.

WMPS: A Positioning System for Localizing Legacy 802.11 Devices

  • Gallo, Pierluigi;Garlisi, Domenico;Giuliano, Fabrizio;Gringoli, Francesco;Tinnirello, Ilenia
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.1 no.2
    • /
    • pp.106-116
    • /
    • 2012
  • The huge success of location-aware applications has called for the rapid development of an alternative positioning system to the global positioning system (GPS) for indoor localization based on existing technologies, such as 802.11 wireless networks. This paper proposes the Wireless MAC Processor Positioning System (WMPS), which is a localization system running on off-the-shelf 802.11 Access Points and based on the time-of-flight ranging of users' standard terminals. This paper proves through extensive experiments that the propagation delays can be measured with the accuracy required by indoor applications despite the different noise components that can affect the result: latencies of the hardware transreceivers, multipath, ACK jitters and timer quantization. Key to this solution is the choice of the Wireless MAC Processor architecture, which enables a straightforward implementation of the ranging subsystem directly inside the commercial cards without affecting the basic DCF channel access algorithm. In addition to the proposed measurement framework, this study developed a simple and effective localization algorithm that can work without requiring any preliminary calibration or device characterization. Finally, the architecture allows the measurement methodology to be adjusted as a function of the network load or propagation environments at the run time, without requiring any firmware update.

  • PDF

Security Analysis of the Lightweight Cryptosystem TWINE in the Internet of Things

  • Li, Wei;Zhang, Wenwen;Gu, Dawu;Tao, Zhi;Zhou, Zhihong;Liu, Ya;Liu, Zhiqiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.2
    • /
    • pp.793-810
    • /
    • 2015
  • The TWINE is a new Generalized Feistel Structure (GFS) lightweight cryptosystem in the Internet of Things. It has 36 rounds and the key lengths support 80 bits and 128 bits, which are flexible to provide security for the RFID, smart cards and other highly-constrained devices. Due to the strong attacking ability, fast speed, simple implementation and other characteristics, the differential fault analysis has become an important method to evaluate the security of lightweight cryptosystems. On the basis of the 4-bit fault model and the differential analysis, we propose an effective differential fault attack on the TWINE cryptosystem. Mathematical analysis and simulating experiments show that the attack could recover its 80-bit and 128-bit secret keys by introducing 8 faulty ciphertexts and 18 faulty ciphertexts on average, respectively. The result in this study describes that the TWINE is vulnerable to differential fault analysis. It will be beneficial to the analysis of the same type of other iterated lightweight cryptosystems in the Internet of Things.

Hyperelliptic Curve Crypto-Coprocessor over Affine and Projective Coordinates

  • Kim, Ho-Won;Wollinger, Thomas;Choi, Doo-Ho;Han, Dong-Guk;Lee, Mun-Kyu
    • ETRI Journal
    • /
    • v.30 no.3
    • /
    • pp.365-376
    • /
    • 2008
  • This paper presents the design and implementation of a hyperelliptic curve cryptography (HECC) coprocessor over affine and projective coordinates, along with measurements of its performance, hardware complexity, and power consumption. We applied several design techniques, including parallelism, pipelining, and loop unrolling, in designing field arithmetic units, group operation units, and scalar multiplication units to improve the performance and power consumption. Our affine and projective coordinate-based HECC processors execute in 0.436 ms and 0.531 ms, respectively, based on the underlying field GF($2^{89}$). These results are about five times faster than those for previous hardware implementations and at least 13 times better in terms of area-time products. Further results suggest that neither case is superior to the other when considering the hardware complexity and performance. The characteristics of our proposed HECC coprocessor show that it is applicable to high-speed network applications as well as resource-constrained environments, such as PDAs, smart cards, and so on.

  • PDF