• Title/Summary/Keyword: Smart Cards

Search Result 181, Processing Time 0.031 seconds

Factors Influencing User Satisfaction and Continuous Usage Intention on Mobile Credit Card: Based on Innovation Diffusion Theory and Post Acceptance Model (모바일 신용카드 사용자 만족 및 지속사용의도에 영향을 미치는 요인에 관한 연구: 혁신확산이론 및 후기수용모형을 중심으로)

  • Jung, Young Hoon;Kim, Gun;Lee, Choong C.
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.3
    • /
    • pp.11-28
    • /
    • 2015
  • Due to the mobil-centered lifestyle following the wider use of Smartphones, Mobile services, including mobile banking and mobile shopping business have increased rapidly. Also with the emergence of "Fintech", which finance combined with technology, IT based financial market is going to be highly promising. In this trend, interests mobile credit cards are increasing. But diffusion of the mobile credit card services is still in the low level. In this situation, to identify factors that influencing satisfaction and continuous usage intention on mobile credit card, this study applied innovation diffusion theory (IDT) and post acceptance model (PAM). To conducting this research, survey data were collected, and we used SmartPLS to analyze survey data. As a result of the study, perceived easy of use, image, compatibility and facilitation positively affect user's satisfaction in mobile credit cards and that such satisfaction have a positive impact on continuous intention to use. The facilitation influences user satisfaction more strongly for those who use mobile credit cards more than plastic credit cards. Also, perceived of use and image influence user satisfaction more strongly for those who use plastic credit cards more than mobile credit cards. It is expected that this study can be a guideline for credit card service providers and policy makers to invigorate mobile credit card business. Also it worths as a early-stage research on Fintech-related studies.

A Scheme for Secure Storage and Retrieval of (ID, Password) Pairs Using Smart Cards as Secure and Portable Storages (안전한 휴대 저장장치로서의 스마트카드를 활용한 (ID, 패스워드) 쌍들의 안전한 저장 및 검색 기법)

  • Park, Jun-Cheol
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.6
    • /
    • pp.333-340
    • /
    • 2014
  • Despite the security weakness of reusing passwords, many Internet users are likely to use a single ID and password on various sites to avoid the inconvenience of remembering multiple credentials. This paper proposes a scheme for securely storing, retrieving, and updating randomly chosen (ID, password) pairs by using smart cards as secure and portable storages. The scheme makes a user free from remembering her (ID, password) pairs for Internet accesses. By splitting and scattering the (ID, password) pairs of a user across the user's smart card memory and a remote server's storage, it can protect the logon credentials even from the theft or loss of the smart card. Also, a user, if deemed necessary, can issue and let the server to delete all information belonging to the user. Hence even an attacker who cracked the smart card memory would not be able to obtain any (ID, password) pair of the victim thereafter. The scheme requires a user to input a site information and pass-phrase to her smart card to obtain the logon credentials, but it should be an acceptable overhead considering the benefits of not remembering the freely chosen (ID, password) pairs at all.

Theoretical study of the optical properties of low voltage stacked cholesteric liquid-crystal displays

  • Valyukh, Iryna;Valyukh, Sergiy;Skarp, Kent
    • 한국정보디스플레이학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.202-204
    • /
    • 2004
  • We study theoretically optical properties of thin layered stacked monochrome cholesteric liquid-crystal displays. Thin thickness of the layers (${\sim}1{\mu}m$) allows us appreciably to reduce driving voltage and use such displays in smart cards. Good selective reflection is achieved due to stacked structure. Dependence of the reflectivity of this type of displays on the quantity of the layers, their thickness, and liquid crystal birefringence is investigated.

  • PDF

Efficient Zero-Knowlege Identification Scheme fitted for Smart Cards (스마트카드에 적합한 효율적인 영지식 개인식별 방식)

  • 김태훈;이보영;원동호
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 1996.11a
    • /
    • pp.359-365
    • /
    • 1996
  • 일반적으로 스마트 카드에서의 사용자 인증은 사용자가 제출하는 패스워드나 PIN을 스마트 카드내의 것과 비교하여서 이루어지고 있으며, 카드/리더기 인증은 암호프로토콜을 사용함으로써 이루어지고 있다. 본 논문에서 제시하고자하는 새로운 프로토콜은 〔9〕에서 제안된 모델을 바탕으로 구현한 것으로 사용자 인증과 스마트 카드 인증을 동시에 수행할 수 있으며 키관리측면에 있어서 효율적이며 오프라인이 가능하다.

  • PDF

ID-based Key Exchange Protocol using Smart cards (스마트 카드를 이용한 ID기반의 키 교환 프로토콜)

  • 배헌중;김현성;유기영
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.04a
    • /
    • pp.491-493
    • /
    • 2003
  • 본 논문에서는 사용자의 식별 정보를 이용하여 두 시스템간에 인증과 키 교환을 스마트 카드를 이용하여 수행하는 ID기반의 키 교환 프로토콜을 제안한다. 제안한 프로토콜은 사용자의 스마트 카드와 입력 지문 특징점 정보를 이용하여 스마트 카드와 시스템간에 세션키를 교환한다. 제안한 프로토콜의 안전성은 이산 대수 문제와 Diffie-Hellman 문제의 어려움에 기반하며 완전한 전 방향 보안을 제공하고 가장 공격, 잠재적인 재전송 공격을 방지할 수 있다.

  • PDF

A Secure S/KEY One-Time Password Authentication Scheme Using Smart Cards (스마트 카드를 이용한 안전한 S/KEY 일회용 패스워드 인증 스킴)

  • 윤은준;류은경;유기영
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.10a
    • /
    • pp.763-765
    • /
    • 2003
  • 본 논문에서는 RFC 1760 표준 S/KEY 일회용 패스워드 인증 스킴이 서버 스푸핑 공격 재시도 공격 오프라인 패스워드 공격, 능동적 공격 등 여러 가지 공격에 취약함에 대해서 설명하고 이들 공격에 안전한 스마트 카드를 이용한 새로운 스킴을 제안한다. 본 논문에서 제안한 스킴은 스마트 카드를 이용한 안전한 S/KEY 일회용 패스워드 인증 스킴으로 기존의 S/KEY 일회용 패스워드 인증 스킴의 보안 문제점을 개선하였으며 상호 인증을 가능하게 하는 새로운 스킴으로 여러 가지 안전성 향상을 보인다.

  • PDF

A Memory-Efficient Fingerprint Verification Algorithm Using a Multi-Resolution Accumulator Array

  • Pan, Sung-Bum;Gil, Youn-Hee;Moon, Dae-Sung;Chung, Yong-Wha;Park, Chee-Hang
    • ETRI Journal
    • /
    • v.25 no.3
    • /
    • pp.179-186
    • /
    • 2003
  • Using biometrics to verify a person's identity has several advantages over the present practices of personal identification numbers (PINs) and passwords. At the same time, improvements in VLSI technology have recently led to the introduction of smart cards with 32-bit RISC processors. To gain maximum security in verification systems using biometrics, verification as well as storage of the biometric pattern must be done in the smart card. However, because of the limited resources (processing power and memory space) of the smart card, integrating biometrics into it is still an open challenge. In this paper, we propose a fingerprint verification algorithm using a multi-resolution accumulator array that can be executed in restricted environments such as the smart card. We first evaluate both the number of instructions executed and the memory requirement for each step of a typical fingerprint verification algorithm. We then develop a memory-efficient algorithm for the most memory-consuming step (alignment) using a multi-resolution accumulator array. Our experimental results show that the proposed algorithm can reduce the required memory space by a factor of 40 and can be executed in real time in resource-constrained environments without significantly degrading accuracy.

  • PDF

Security Improvements on Smart-Card Based Mutual Authentication Scheme (스마트카드 기반 상호인증 스킴의 보안성 개선)

  • Joo, Young-Do
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.6
    • /
    • pp.91-98
    • /
    • 2012
  • Password-based authentication schemes have been widely adopted in order to protect resources from unauthorized access. In 2008, Liu et al. proposed a new mutual authentication scheme using smart cards which can withstand the forged attack. In this paper, author has proven that Liu et al.'s scheme is still vulnerable to the various attacks by analyzing the security of their scheme. This paper introduces an enhanced scheme to overcome these security weakness and to provide mutual authentication between the user and the server, even if the secrete information stored in the smart card is revealed by an attacker. The comparative result from the security analysis demonstrates that the proposed scheme is more secure against the possible attacks than Liu et al.'s scheme.

Analysis of Vocational Training Needs Using Big Data Technique (빅데이터 기법을 활용한 직업훈련 요구분석)

  • Sung, Bo-Kyoung;You, Yen-Yoo
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.5
    • /
    • pp.21-26
    • /
    • 2018
  • In this study, HRD-NET (http://hrd.go.kr), a vocational and training integrated computer network operated by the Ministry of Employment and Labor, is used to confirm whether job training information required by job seekers is being provided smoothly The question bulletin board was extracted using 'R' program which is optimized for big data technique. Therefore, the effectiveness, appropriateness, visualization, frequency analysis and association analysis of the vocational training system were conducted through this, The results of the study are as follows. First, the issue of vocational training card, video viewing, certificate issue, registration error, Second, management and processing procedures of learning cards for tomorrow 's learning cards are complicated and difficult. In addition, it was analyzed that the training cost system and the refund structure differentiated according to the training occupation, the process, and the training institution in the course of the training. Based on this paper, we will study not only the training system of the Ministry of Employment and Labor but also the improvement of the various training computer system of the government department through the analysis of big data.

Comparison of Deep Learning Models for Judging Business Card Image Rotation (명함 이미지 회전 판단을 위한 딥러닝 모델 비교)

  • Ji-Hoon, Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.27 no.1
    • /
    • pp.34-40
    • /
    • 2023
  • A smart business card printing system that automatically prints business cards requested by customers online is being activated. What matters is that the business card submitted by the customer to the system may be abnormal. This paper deals with the problem of determining whether the image of a business card has been abnormally rotated by adopting artificial intelligence technology. It is assumed that the business card rotates 0 degrees, 90 degrees, 180 degrees, and 270 degrees. Experiments were conducted by applying existing VGG, ResNet, and DenseNet artificial neural networks without designing special artificial neural networks, and they were able to distinguish image rotation with an accuracy of about 97%. DenseNet161 showed 97.9% accuracy and ResNet34 also showed 97.2% precision. This illustrates that if the problem is simple, it can produce sufficiently good results even if the neural network is not a complex one.