• Title/Summary/Keyword: Smart Cards

Search Result 181, Processing Time 0.034 seconds

Attribute based User Authentication for Contents Distribution Environments

  • Yoo, Hye-Joung
    • International Journal of Contents
    • /
    • v.8 no.3
    • /
    • pp.79-82
    • /
    • 2012
  • In digital contents distribution environments, a user authentication is an important security primitive to allow only authenticated user to use right services by checking the validity of membership. For example, in Internet Protocol Television (IPTV) environments, it is required to provide an access control according to the policy of content provider. Remote user authentication and key agreement scheme is used to validate the contents accessibility of a user. We propose a novel user authentication scheme using smart cards providing a secure access to multimedia contents service. Each user is authenticated using a subset of attributes which are issued in the registration phase without revealing individual's identity. Our scheme provides the anonymous authentication and the various permissions according to the combination of attributes which are assigned to each user. In spite of more functionality, the result of performance analysis shows that the computation and communication cost is very low. Using this scheme, the security of contents distribution environments in the client-server model can be significantly improved.

A Provably Secure and Practical Signature Scheme for Smart Cards

  • You, Yong Kuk;Hahn, Sang Geun
    • Journal of the Korean Society for Industrial and Applied Mathematics
    • /
    • v.2 no.1
    • /
    • pp.15-26
    • /
    • 1998
  • By "secure", we mean that some well-defined computational assumption can be shown to be sufficient for the scheme not to be existentially forgeable, even under an adaptive chosen message attack. Most, if not all, signature schemes used in practice are based on a computational assumption that is certainly necessary for this kind of security, not known to be sufficient. Since the work of Goldwasser, Micali and Rivest[?], many researches have been done for the secure signature schemes. We modify the Cramer-Damg$\dot{a}$rd scheme to implement a practical and secure signature scheme for smart cards.

  • PDF

Development of the RFID Card Reader for Multi-purpose Application (다목적 무선 식별 카드 리더기 개발)

  • Yu, Jong-Sang;Lee, Sang-Cheol;Yu, Jae-Moon
    • Proceedings of the KIEE Conference
    • /
    • 2003.07e
    • /
    • pp.117-119
    • /
    • 2003
  • Recently, Radio Frequency Identification (RFID) cards have been charming increasing attention. In addition, the RFID card ensures high durability and ease of maintenance because it has no built-in contact. And the benefits of RFID cards over contact cards are primarily due to the increased transaction speed and convenience brought to the cardholder. In this paper, we have developed a RFID card reader for the multi-purpose applications. The vicinity card reader with large-screen to display user ID and card number for a kinds of applications such as entrance and attendance management system is suitable for the use with EM card and TEMIC card, featuring easy to mount and reliable quality. The read range of the proposed RFID card reader is 70cm. This paper also addresses current RFID technology in terms of systems and provides a look forward its future applications in the aviation environment using RFID smart card.

  • PDF

Analysis to a Remote User Authentication Scheme Using Smart Cards (스마트 카드를 이용한 사용자 인증 스킴의 안전성 분석)

  • An, Young-Hwa;Lee, Kang-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.3
    • /
    • pp.133-138
    • /
    • 2009
  • Recently Lin et al. proposed the remote user authentication scheme using smart cards. But the proposed scheme has not been satisfied security requirements considering in the user authentication scheme using the password based smart card. In this paper, we showed that he can get the user's password using the off-line password guessing attack on the scheme when the adversary steals the user's smart card and extracts the information in the smart card. Also, we proposed the seven security requirements for evaluating remote user authentication schemes using smart card. As a result of analysis, in Lin et al's scheme we have found the deficiencies of security requirements. So we suggest the improved scheme, the mutual authentication scheme that does not store the user's password verifier in server and can authenticate each other at the same time between the user and server.

Diversification of User Authentication by Writing Applet on Java Card (자바카드 애플릿 설정에 따른 사용자 인증의 다각화)

  • Song, Young-Sang;Shin, In-Chul
    • Journal of IKEEE
    • /
    • v.13 no.4
    • /
    • pp.89-95
    • /
    • 2009
  • Recently, IC cards are used to protect personal information and to have user verification. Among them, the usage of Java Cards which can contain applications after issuing are increasing and installing several applets on Java card is possible. When Java Cards are used, applet works after completing user identification. In this paper, we designed, embodied and verified the mechanism of user identification process according to PIN setting of applets; Stored_PIN, Install_PIN and Update_PIN. These several applications of Java cards will be used for user identification independently or multiply, while using diverse user identification.

  • PDF

Development of Digital Mileage Service System using Smart-Phone (스마트폰을 이용한 디지털 적립 서비스 시스템 개발)

  • Kang, Nam-Hi
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.3
    • /
    • pp.137-142
    • /
    • 2011
  • Increasing users of smart phone and various marketing strategies activate lots of mobile mileage services recently. Such a mileage service is a typical marketing service to increase brand loyalty of clients and maximize purchase motivation. However, traditional offline mileage services introduce discomfort that users have to carry lots of mileage cards physically. Also, in case of using digital mobile mileage service, users have to search specific card to use from lots of digital cards stored in his mobile device. In this paper, to solve the problems, we design and develop a mobile mileage service system that especially discover a proper card automatically based on location information of user.

An Efficient Authentication Scheme for Downloading and Updating Applications in Smart Cards (스마트 카드 응용 프로그램의 다운로드와 갱신에 대한 효율적인 인증 기법)

  • 박용수;조유근
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.31 no.1_2
    • /
    • pp.118-124
    • /
    • 2004
  • In this paper we propose a method for authenticating the application that is to be downloaded or updated in smart cards. Previous works have some drawbacks such as having a long verification delay or requiring a large amount of primary/secondary storage. We propose an efficient parameterized scheme by using the hash chain technique where the secondary storage requirement and verification delay of updating the application are O(k) and O(k+n/k), respectively. Moreover, both the first storage requirement and verification delay of downloading the application are O(1).

Cryptanalysis of a Remote User Authentication scheme using Smart Cards (스마트카드를 이용한 원격 사용자 인증 스킴의 안전성 분석)

  • Shin, Seung-Soo;Han, Kun-Hee;Chun, Je-Ran
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.11
    • /
    • pp.5245-5251
    • /
    • 2011
  • Seo et al. criticizes that Hu-Niu-Yang's certification scheme is not enough to satisfy the security requirements of a smart card-based certification scheme because it has a weakness of password guessing attack as well as gives attackers opportunities to be disguised as legitimate users. However, Seo et al. also has a weakness not satisfying the security requirements. This paper suggests a new scheme that contains the characteristics of certification scheme provided by Seo et al. but compensates weak points. The findings show that the new scheme is more safety and efficient than Seo et al.'s

Security Improvement of Remote User Authentication Scheme based on Smart Cards (스마트 카드 기반 사용자 인증 스킴의 보안 개선)

  • Joo, Young-Do;An, Young-Hwa
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.5
    • /
    • pp.131-137
    • /
    • 2011
  • Recently Lin et al. proposed a simple remote user authentication scheme using smart cards. But the proposed scheme has not satisfied security requirements which should be considered in the user authentication scheme using the password based smart card. In this paper, we show that Lin et al.'s scheme is insecure against off-line password guessing attack. In their scheme, any legal user's password may be derived from the password guessing when his/her smart card is stolen and the secret information is leaked from the smart card by an attacker. Accordingly, we demonstrate the vulnerability of their scheme and present an enhancement to resolve such security weakness. Our proposed scheme can withstand various possible attacks including password guessing attack. Furthermore, this improved scheme can provide mutual authentication to improve the security robustness. Performance evaluation shows that the proposed scheme is relatively more effective than Lin et al.'s scheme.

A Study on the Fault Analysis and Security Assessment for Smart Card Management System (스마트카드 관리 시스템(SCMS)의 결함분석과 보안성 평가에 관한 연구)

  • Jang, Soo-Mi;Park, Man-Gon
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.1
    • /
    • pp.52-59
    • /
    • 2014
  • These days, smart card management system(SCMS) have been broadly used for security conformability, efficiency of issuance management, key management and expert management in the smart card market. SCMS is composed of card management, issuance management, key management, application management, and issuers management systems. SCMS enables card issuers from banks, credit card companies, and telecommunications companies to provide these cards to card users. And then SCMS enables card users to download new programs to chips for use of these cards successively and provide related smart card data in safety and efficiency. In this paper, we propose a framework for security assessment and an efficient method for security improvement through fault analysis which is more effective.