• Title/Summary/Keyword: Smart-Card

Search Result 552, Processing Time 0.02 seconds

Anonymity Certification Technique of a Smart Card base for Personal Information Protection (개인정보보호를 위한 스마트카드 기반의 익명 인증 기법)

  • Lee, Kwang-Hyoung;Park, Jeong-Hyo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.12
    • /
    • pp.6071-6080
    • /
    • 2012
  • Regarding the official authentication method which is a strong encrypt method for financial transactions, there has recently been a concern for the problem of storage. As a solution for such problems, this study provides the anonymous authentication method based on the smart card used for such a purpose by utilizing the pseudo ID replacing the user's personal data. Such an anonymous authentication method makes it possible to prevent any inside leakage, intermediary attack, limited re-transmission attack, service-denying attack, directional safety attack and secret inspector attack in regard to the user's personal data. As a result, there would be no concern for the leakage of any personal data. In comparative analysis, after executing the comparison and analysis process through the experiment for the authentication process by using the previously-used smart card, the new one has shown about 10% a high level of efficiency for the encrypt and decrypt process together with excellent features in terms of flexibility in regard to the user's anonymity and tracking ability.

An Implementation of Smart Card Identification System Using 1 vs. 1 Fingerprint Matching (1대1 지문매칭을 이용한 스마트 카드 인증 시스템의 구현)

  • 최순우;김영길
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.5 no.7
    • /
    • pp.1204-1209
    • /
    • 2001
  • According to the rapid development of information and communication, various services are offered using information and communication infrastructure for example e-commerce, internet banking, stock dealings, etc. This time, the most important problem is personal identification. But now secret number that is used to personal identification mostly can be misappropriated. To solve this problem, this paper proposes smart card identification system using 1 vs. 1 fingerprint matching. Information protection and security of smart card excel and use is convenient. And fingerprint becomes the focus of public attention in biometric field. Implemented system in this paper is based on PC. This system stores minutia that is fingerprint information into smart card and compare it with personal minutia. Therefore this system is sure to be on personal identification. If this system is applied to various services, safety degree of services will be enhanced.

  • PDF

Analysis of User Demand Characteristics of Currently-established Night Bus in Seoul by Using Smart Card Data : Case Study on Gangnam Station (스마트카드 데이터를 이용한 심야버스 이용수요 특성분석 : 강남역을 중심으로)

  • Kim, Min ju;Lee, Young ihn
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.16 no.1
    • /
    • pp.101-116
    • /
    • 2017
  • This Study estimates the actual night traffic using the smart card data used by most of the public transportation users, and compares it with the current night bus routes by KT Telecom based on the night time call volume. In order to compare the current night bus and night trips evaluated by smart card data, we presented indicators related to the degree of matching, and estimated the volume of service currently provided. The unique approach of the study is that we chose subway station instead of bus stop for the unit of the study. Bus stops has their complexity in a way that stops with same name could belong to different administrative area depending on its direction. For this reason, we decided to use subway station and defined its adjacent administrative district as the scope of influence. Since night bus is the primary means of transportation during the late night, it is anticipated that they will be able to provide better service by calculating the actual traffic and selecting the routes.

A Robust Multiple Set-Top Box Authentication Scheme for IPTV Against Smart Card Cloning Attack (IPTV 환경에서 스마트카드 복제에 강건한 다중 셋톱박스 인증기법)

  • Lim, Ji-Hwan;Oh, Hee-Kuck;Kim, Sang-Jin
    • The KIPS Transactions:PartC
    • /
    • v.17C no.1
    • /
    • pp.37-46
    • /
    • 2010
  • In an IPTV system, the rights of the content and service provider can be protected by using Conditional Access System (CAS) and Digital Right Management (DRM). In case of the CAS, only the authorized user who has structured authentication keys can decrypt the encrypted content. However, since the CAS establishes a secure channel only between content provider and Smart Card (SC), it cannot protect the system against McCormac Hack attack which eavesdrops on unsecure channel between SC and Set-Top Box (STB) and SC cloning attack. In this paper, we propose a robust multi-STB assisted SC / STB authentication protocol which can protect the IPTV system against not only McCormac Hack attack, but also SC cloning attack. The previous works which bind a STB and a SC during the SC registration phase against the SC cloning attack does not support multi-STB environments. The proposed system which dynamically updates the STB information in subscriber management system using the bi-directional channel characteristic of IPTV system can support the user's multi-STB device effectively.

Classification of Subway Trip Patterns from Smart Card Transaction Databases (교통카드 트랜잭션 데이터베이스에서 지하철 탑승 패턴 분류)

  • Park, Jong-Soo;Kim, Ho-Sung;Lee, Keum-Sook
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.12
    • /
    • pp.91-100
    • /
    • 2010
  • To understand the trip patterns of subway passengers is very important to making plans for an efficient subway system. Accordingly, there have been studies on mining and classifying useful patterns from large smart card transaction databases of the Metropolitan Seoul subway system. In this paper, we define a new classification of subway trip patterns and devise a classification algorithm for eleven trip patterns of the subway users from smart card transaction databases which have been produced about ten million transactions daily. We have implemented the algorithm and then applied it to one-day transaction database to classify the trip patterns of subway passengers. We have focused on the analysis of significant patterns such as round-trip patterns, commuter patterns, and unexpected interesting patterns. The distribution of the number of passengers in each trip pattern is plotted by the get-on time and get-off time of subway transactions, which illustrates the characteristics of the significant patterns.

Implementation of Smart Card Identification System Using 1 vs. 1 Fingerprint Matching (1대1 지문매칭을 이용한 스마트 카드 인증 시스템의 구현)

  • 최순우;김영길
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.10a
    • /
    • pp.517-520
    • /
    • 2001
  • According to the rapid development of information and communication, various services are offered using information and communication infrastructure for example e-commerce, internet banking stork dealings, etc. This time, the most important problem is personal identification. But now secret number that is used to personal identification mostly can be misappropriated. To solve this problem, this paper proposes smart card identification system using 1 vs. 1 fingerprint matching. Information protection and security of smart card excel and use is convenient. And fingerprint becomes the focus of public attention in biometric field. Implemented system in this paper is based on PC. This system stores minutia that is fingerprint information into smart card and compare it with personal minutia. Therefore this system is sure to be on personal identification. If this system is applied to various services, safety degree of services will be enhanced.

  • PDF

A Study on Retrospective of External Radiation Exposure Dose by Optically Stimulated Luminescence of Smart Chip Card (스마트칩 카드을 이용한 광 자극 발광 특성 연구)

  • Park, Sang-Won;Yoo, Se-Jong
    • Journal of radiological science and technology
    • /
    • v.42 no.5
    • /
    • pp.379-385
    • /
    • 2019
  • Radiation is used for various purposes such as cancer therapy, research of industrial and drugs. However, in case of radiation accidents such as terrorism, collapsing nuclear plant by natural disasters like Fukushima in 2011, very high radiation does expose to human and could lead to death. For this reason, many people are concerning about radiation exposures. Therefore, assessment and research of retrospective radiation dose to human by various path is an necessary task to be continuously developed. Radiation exposure for workers in radiation fields can be generally measured using a personal exposure dosimeter such as TLD, OSLD. However, general people can't be measured radiation doses when they are exposed to radiation. And even if radiation fields workers, when they do not in possession personal dosimeter, they also can't be measured exposure dose immediately. In this study, we conduct retrospective research on reconstruction of dose after exposure by using smart chip card of personal items through Optically Stimulated Luminescence (OSL). The OSL signal of smart chip card shows linear response from 0.06 Gy to 15 Gy and results of fading rate 45 %, 48% for 24 and 48 hours due to the natural emission of radiation in sample, respectively. The minimum detectable limit (MDD) was 0.38 mGy. This values are expected to use as correction values for reconstruction of exposure dose.

Implementation of a High Performance SEED Processor for Smart Card Applications (스마트카드용 고성능 SEED 프로세서의 구현)

  • 최홍묵;최명렬
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.5
    • /
    • pp.37-47
    • /
    • 2004
  • The security of personal informations has been an important issue since the field of smart card applications has been expanded explosively. The security of smart card is based on cryptographic algorithms, which are highly required to be implemented into hardware for higher speed and stronger security. In this paper, a SEED cryptographic processor is designed by employing one round key generation block which generates 16 round keys without key registers and one round function block which is used iteratively. Both the round key generation block and the F function are using only one G function block with one 5${\times}$l MUX sequentially instead of 5 G function blocks. The proposed SEED processor has been implemented such that each round operation is divided into seven sub-rounds and each sub-round is executed per clock. Functional simulation of the proposed cryptographic processor has been executed using the test vectors which are offered by Korea Information Security Agency. In addition, we have evaluated the proposed SEED processor by executing VHDL synthesis and FPGA board test. The die area of the proposed SEED processor decreases up to approximately 40% compared with the conventional processor.

Anonymous Remote User Authentication Scheme with Smart Card (익명성을 제공하는 스마트카드 사용자 인증 프로토콜)

  • Kim, Se-Il;Rhee, Hyun-Sook;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.2
    • /
    • pp.139-144
    • /
    • 2007
  • Due to the increasing use of Internet and spread of ubiquitous environment the security of private information became an important issue. For this reason, many suggestions have been made in order to protect the privacy of users. In the study of authentication system using a smart card which is one of the methods for protecting private information, the main idea is to offer user anonymity. In 2004, Das et al. suggested an authentication system that guarantees anonymity by using a dynamic ID for the first time. However, this scheme couldn't guarantee complete anonymity as the identity of the user became revealed at log-in phase. In 2005, Chien at al. suggested a authentication system that guarantees anonymity, but this was only safe to the outsider(attacker). In this paper, we propose a scheme that enables the mutual authentication between the user and the sewer by using a smart card. For the protection of the user privacy, we suggest an efficient user authentication system that guarantees perfect anonymity to both the outsider and remote server.

Vulnerability Analysis of Remote Multi-Server User Authentication System Based on Smart Card and Dynamic ID (스마트 카드 및 동적 ID 기반 멀티서버 원격 사용자 인증 프로토콜의 취약점 분석)

  • Kwon Soon Hyung;Byeon Hae won;Choi Youn Sung
    • Convergence Security Journal
    • /
    • v.23 no.4
    • /
    • pp.43-52
    • /
    • 2023
  • Many businesses and organizations use smartcard-based user authentication for remote access. In the meantime, through various studies, dynamic ID-based remote user authentication protocols for distributed multi-server environments have been proposed to protect the connection between users and servers. Among them, Qiu et al. proposed an efficient smart card-based remote user authentication system that provides mutual authentication and key agreement, user anonymity, and resistance to various types of attacks. Later, Andola et al. found various vulnerabilities in the authentication scheme proposed by Qiu et al., and overcame the flaws in their authentication scheme, and whenever the user wants to log in to the server, the user ID is dynamically changed before logging in. An improved authentication protocol is proposed. In this paper, by analyzing the operation process and vulnerabilities of the protocol proposed by Andola et al., it was revealed that the protocol proposed by Andola et al. was vulnerable to offline smart card attack, dos attack, lack of perfect forward secrecy, and session key attack.