• Title/Summary/Keyword: Smart Cards

Search Result 181, Processing Time 0.03 seconds

An Applet Recommendation System for Multi-Application Smart Cards (멀티 애플리케이션 스마트카드를 위한 애플릿 추천 시스템)

  • Eun, Na-Rae;Cho, Dong-Sub
    • Proceedings of the KIEE Conference
    • /
    • 2005.10b
    • /
    • pp.295-297
    • /
    • 2005
  • As multi-application smart cards have become very attractive mobile devices, card users are able to add and to remove card-applets after card issuance. However, because of constrained memory on a smart card, it is necessary to manage card-resident applets. In this paper, we propose an adaptive applet management algorithm in order to recommend card-resident applets which can be removed. This algorithm's goal is to select card-resident applets in a way minimizes the number of applet downloads. To serve this purpose, our algorithm identifies the applets that are most likely to be executed again, and based on that, decides which should be kept in the memorY and which can be discarded.

  • PDF

A Password-Based Searchable Encryption using Smart Cards (스마트 카드를 이용한 패스워드 기반의 검색 가능한 암호화 기술)

  • Lee, Dong-Kun;Rhee, Hyun-Sook;Lim, Jong-In
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.49 no.3
    • /
    • pp.56-61
    • /
    • 2012
  • User authentication is a necessity to set up secure system which only an authorized user can use various resource on the Internet. Encryption is to provide data privacy. Also, searchable encryption is to provide both data privacy and efficient management of data by searching with a keyword. The public key based searchable encryption requires in advance the authentication of user's public key as well as the secure management of a publlic/private key of a user, respectively. In cloud, it is purpose to use cloud various resources by using various devices, meanwhile, it is not sufficient resource that some devices manage public/private keys and certificates and it is not easy to implement these clients. To solve this problem, we propose a password-based saerchable encryption using smart cards which are temper-resistant devices.

A Research on The Generation of Bus Stop Information by The Line Using Passenger's Boarding and Getting off Information on Smart Cards (교통카드 이용자 승차 및 하차 정보를 이용한 버스 노선별 정류장 정보 생성 모형 연구)

  • Yoo, Bong-Seok;Choo, Sang-Ho
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.12 no.5
    • /
    • pp.873-882
    • /
    • 2017
  • Smart cards are currently used in about 150 locales, including the metropolitan ares, and are utilized as a policy base for various public areas, including public transportation, bus fares, and public transportation requirements. However, excluding the metropolitan area and some metropolitan areas, there are many areas where the existing BIS data was unable to match station information on the data and Smart cards itself are not available on the bus stop information by the line. The purpose of this research was to produce bus stop information generated by the bus stop based on the bus route, and the actual stop information generated by the model presented in the study was derived by matching the actual station information.

Card-based User Interface on Smart-phone (스마트 폰의 카드 기반 사용자 인터페이스)

  • Lee, Young-Ju
    • Journal of Digital Convergence
    • /
    • v.15 no.12
    • /
    • pp.555-561
    • /
    • 2017
  • The card-based user interface is one of the easiest navigation methods for smart phones, and many of the contents have recently been exposed as cards. In this paper, we have dealt with the definitions of cards and the components of cards used in smart phones. The card can play multimedia including various images and media, and serves as an entry point into detailed contents through the arrangement of buttons or actions. The card UI had different characteristics depending on the type, if it could be classified into basic type, timeline type, workflow type, and dashboard type. The basic type and the timeline type were not suitable for the hierarchy and order of information, and they were suitable for providing large contents. The workflow type was not significantly different from the amount of content, horizontal content arrangement was possible, and the dashboard type was analyzed to be suitable for providing various data as graph or number.

Development of Dynamic Magnetic Field Emulator for Smart Multi-Card (스마트멀티카드를 위한 동적자장모사장치의 개발)

  • Bae, Jae-Ho
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.40 no.4
    • /
    • pp.183-190
    • /
    • 2017
  • This paper proposes a dynamic magnetic field emulator (DMFE), which can electrically emulate information for the magnetic stripes of most widely used credit cards. Payment transactions with most common credit cards are performed by reading the card's information, encoded in magnetic stripes, using the reader head of a point-of-sale (POS) system. A stripe-type permanent magnet is attached to the back side of the credit card, and information for payments or value-added service is reorganized by exposing it to strong magnetic field. The process of data recording and retrieving as stated above has been pointed out as a major cause of illegal credit card use, because the information on the magnetic stripe is always exposed, and is thus vulnerable to forgery or alteration. A dynamic magnetic field emulator displays card information only when necessary by using the principle of solenoidal magnets. The DMFE proposed in this paper can prevent fraudulent use if it is operated with a device, like a smart phone, or a separate user-authentication procedure. In addition, because it is possible to display various information as needed, it can be utilized for a smart multi-card application, in which information for multiple cards is stored in one card, and can be selected and used as needed. This paper introduces the necessity of the DMFE and its manufacturing principles. As a result, this study will be helpful for making various application cases in payment, which is a core area of the Fintech (a newly-coined word of finance and technology) industry.

A Reform Measure of the Structure and Transaction Process for the Safety Improvement of a Credit Card (신용카드의 안전성 향상을 위한 구조 및 거래절차 개선방법)

  • Lee, Young Gyo;Ahn, Jeong Hee
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.7 no.3
    • /
    • pp.63-74
    • /
    • 2011
  • Credit cards are more convenient than cash of heavy. Therefore, credit cards are used widely in on_line (internet) and off_line in nowadays. To use credit cards on internet is commonly secure because client identification based security card and authentication certificate. However, to use in off_line as like shop, store, department, restaurant is unsecure because of irregular accident. As client identification is not used in off_line use of credit cards, the irregular use of counterfeit, stolen and lost card have been increasing in number recently. Therefore, client identification is urgently necessary for secure card using in off_line. And the method of client identification must be simple, don't take long time, convenient for client, card affiliate and card company. In this paper, we study a reform measure of the structure and transaction process for the safety improvement of a credit cards. And we propose several authentication method of short-and long-term for client identification. In the proposal, the client authentication method by OTP application of smart-phone is efficient nowadays.

A Study on Java COS for Devices Which Have Safe Power System (전력공급이 안정된 장치들을 위한 자바 COS에 관한 연구)

  • Jung, Min-Soo
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.1
    • /
    • pp.103-111
    • /
    • 2011
  • Legacy Java card which adapts a Java platform loads and executes an application when electronics power is provided. However, recently the most Java cards are embedded into a mobile terminal as USIM cards, therefore the power is continually provided for the smart cards. In this case, operation of a Java card system needs to consider its operating system to be advanced in memory management, object management and transaction mechanism. In this paper, we present a high performance Java Card system which is able to have efficient installation, loading and execution of application by applying a new memory management of the smart card that has safe power system.

A study on the smart band, technologies, and case studies for the vulnerable group. - The Digital Age and the Fourth Industrial Revolution.

  • YU, Kyoungsung;SHIN, Seung-Jung
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.14 no.1
    • /
    • pp.182-187
    • /
    • 2022
  • This study aims to study non-rechargeable wrist-type smart bands for those vulnerable to the digital environment. The transition to the digital age means improving the efficiency of human life and the convenience of management. In the digital age, it can be a very convenient infrastructure for the digital generation, but otherwise, it can cause inconvenience. COVID-19 is spreading non-face-to-face culture. The reality is that the vulnerable are complaining of discomfort in non-face-to-face culture. The core of the digital environment is smartphones. Digital life is spreading around smartphones. Technology that drives the digital environment is the core technology of the Fourth Industrial Revolution. The technologies are lot, big data, Blockchain, Smart Mobility, and AI. Related technologies based on these technologies include digital ID cards, digital keys, and nfc technologies. Non-rechargeable wrist-type smart bands based on related technologies can be conceptualized. Through these technologies, blind people can easily access books and manage their ID cards conveniently and efficiently. In particular, access authentication is required wherever you go due to COVID-19, which can be used as a useful tool for the elderly who feel uncomfortable using smartphones. It can also eliminate the inconvenience of the elderly finding or losing their keys.

Remote User Authentication Scheme using Smart Cards (스마트카드를 이용한 원격 사용자 인증 구조)

  • Choi, Jong-Seok;Shin, Seung-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.2
    • /
    • pp.36-42
    • /
    • 2009
  • In 2005, Chien and Chen proposed a remote user authentication scheme for preserving user anonymity to conquer some problems Das et. al. schemes have. In 2007, Hu et. al. pointed out that their scheme have some problems. Therefore, they proposed a new one and claimed that their scheme overcome all of these problems. However, We will show that Hu et. al. scheme still hold some problems; it cannot resist to denial of service attack and protect the user anonymity. Hence, we propose ours and demonstrate our scheme conquer these problems.

Cryptanalysis of Improved Password Authentication Scheme with Smart Cards (스마트 카드에서 향상된 비밀번호 인증 암호해독기법)

  • Pathan, Al-Sakib Khan;Hong, Choong-Seon
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2008.06d
    • /
    • pp.101-104
    • /
    • 2008
  • The intent of this paper is to present the flaws and weaknesses of Kim et al.'s timestamp-based password authentication scheme using smart cards. We prove that, in spite of the improvement of Yang-Wang-Chang's scheme, Kim et al.'s solution is still vulnerable to a type of forgery attack. We also note down how the flaw could be overcome to ensure better level of security in remote client-server communication procedure.

  • PDF