• Title/Summary/Keyword: Smart-Card Data

Search Result 147, Processing Time 0.026 seconds

Digital Contents Protection Without Server Authentication Using Smart Cards (스마트 카드를 이용한 서버 인증이 필요 없는 디지털 콘텐츠 보호 기법)

  • Kim, Young-Sik;Lim, Dae-Woon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.3C
    • /
    • pp.133-139
    • /
    • 2011
  • Nowadays, it is considered as an important task to protect digital contents from illegal use and reproduction. In many cases, there are secure servers to authenticate the allowed users and the user authentication process is performed by communication between the servers and users. However, if the number of users and contents are increased, the servers should treat a large amount of authentication loads and the authentication cost will be considerably increased. Moreover, this scheme is not adequate for some players in which only a limited function of communication is deployed. In order to solve this problem, this paper proposes an authentication method which can certificate both the digital contents and players, and prevent illegal reproduction without the certification server. The proposed scheme is secure in the replay attack, the man in the middle attack, and data substitution attack.

Analysis of Improvement Measures of Vertical Moving Facilities at Subway Stations for Elderly Users based on a Data Envelopment Analysis (자료포락분석 기반의 고령자를 위한 지하철 역사 수직이동시설의 개선방안 분석)

  • Lee, Eun Hak;Kho, Seoung-Young;Kim, Dong-Kyu
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.16 no.5
    • /
    • pp.60-71
    • /
    • 2017
  • The purpose of this study is to evaluate vertical moving facilities at subway stations for the elderly users and to analyze their improvement measures. To evaluate vertical moving facilities of the top 31 subway stations with the most trips in Seoul, a data envelopment analysis (DEA) is employed. The input variables for the DEA include the number and percentage of elderly users, which are calculated using smart card data. the output variables consist of the number of elevators and escalators per 100 steps. The results show that the average score of 31 subway stations is 0.62 and four stations, i.e., Jamsil, Gasan Complex, Konkuk University, and Dongmyo, have the highest score. These four subway stations are set as benchmarking groups for the other stations with the lower score. Based on the comparison with the benchmarking groups, the improvement measures for vertical moving facilities of each station are suggested and discussed.

Security Enhancement to an Biometric Authentication Protocol for WSN Environment (WSN 환경에서 Biometric 정보를 이용한 안전한 사용자 인증 스킴의 설계)

  • Lee, Youngsook
    • Convergence Security Journal
    • /
    • v.16 no.6_2
    • /
    • pp.83-88
    • /
    • 2016
  • Over recent years there has been considerable growth in interest in the use of biometric systems for personal authentication. Biometrics is a field of technology which has been and is being used in the identification of individuals based on some physical attribute. By using biometrics, authentication is directly linked to the person, rather than their token or password. Biometric authentication is a type of system that relies on the unique biological characteristics of individuals to verify identity for secure access to electronic systems. In 2013, Althobati et al. proposed an efficient remote user authentication protocol using biometric information. However, we uncovered Althobati et al.'s protocol does not guarantee its main security goal of mutual authentication. We showed this by mounting threat of data integrity and bypassing the gateway node attack on Althobati et al.'s protocol. In this paper, we propose an improved scheme to overcome these security weaknesses by storing secret data in device. In addition, our proposed scheme should provide not only security, but also efficiency since sensors in WSN(Wireless Sensor Networks) operate with resource constraints such as limited power, computation, and storage space.

A Study on Zero Pay Image Recognition Using Big Data Analysis

  • Kim, Myung-He;Ryu, Ki-Hwan
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.14 no.3
    • /
    • pp.193-204
    • /
    • 2022
  • The 2018 Seoul Zero Pay is a policy actively promoted by the government as an economic stimulus package for small business owners and the self-employed who are experiencing economic depression due to COVID-19. However, the controversy over the effectiveness of Zero Pay continues even after two years have passed since the implementation of the policy. Zero Pay is a joint QR code mobile payment service introduced by the government, Seoul city, financial companies, and private simple payment providers to reduce the burden of card merchant fees for small business owners and self-employed people who are experiencing economic difficulties due to the economic downturn., it was attempted in the direction of economic revitalization for the return of alleyways[1]. Therefore, this study intends to draw implications for improvement measures so that the ongoing zero-pay can be further activated and the economy can be settled normally. The analysis results of this study are as follows. First, it shows the effect of increasing the income of small business owners by inducing consumption in alleyways through the economic revitalization policy of Zero Pay. Second, the issuance and distribution of Zero Pay helps to revitalize the local economy and contribute to the establishment of a virtuous cycle system. Third, stable operation is being realized by the introduction of blockchain technology to the Zero Pay platform. In terms of academic significance, the direction of Zero Pay's policies and systems was able to identify changes in the use of Zero Pay through big data analysis. The implementation of the zero-pay policy is in its infancy, and there are limitations in factors for examining the consumer image perception of zero-pay as there are insufficient prior studies. Therefore, continuous follow-up research on Zero Pay should be conducted.

A Study on Passengers' Travel Characteristics at Bus Stops on Seoul Ring Expressway (서울외곽순환고속도로 버스정류장 승하차 및 환승통행실태)

  • Lee, Soongbong;Baek, Seungkirl;Kim, Jiyoon;Choo, Sang Ho
    • Journal of Korean Society of Transportation
    • /
    • v.33 no.2
    • /
    • pp.170-181
    • /
    • 2015
  • This study explores passengers' travel characteristics at six bus stops on the Seoul Ring Expressway using smart traffic card data. Based on the characteristics, political strategies to improve bus facilities on expressway are suggested. Firstly, among them two bus stops of Guri and Uiwang-Cheonggye have higher transfer rate of passengers, 37.56% and 36.9% of the total intercity (red) bus passengers on the expressway, respectively. Secondly, Uiwang-Cheonggye bus stop has the highest transfer rate, and Guri bus stop has also higher transfer rate and the highest on-and-off passengers. It implies that both bus stops need to be prioritized for improving bus stop facility, access roads, and connection facility between the bi-directional stops. Thirdly, Guri (down) bus stop has relatively longer waiting time for transfer, thus shorter bus headways running the bus stop should be considered. Lastly, most passengers using both stops come to and from Bundang-gu in Geongnam City. Overall, the results of this study would be helpful for transport planners to develop effective bus route policies and bus operation.

Determination of Service Areas and Operating Numbers for Free-floating Personal Mobility Sharing Services (First-mile과 Last-mile을 고려한 자유 주차방식(Free-floating) 개인형 이동장치 공유 서비스 권역 및 운영대수 결정)

  • Sang-Wook Han;Dong-Kyu Kim;Sedong Moon
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.23 no.2
    • /
    • pp.106-118
    • /
    • 2024
  • Interest in personal mobility has increased with the growing significance of first-mile and last-mile connectivity in smart mobility services. This study aims to propose a methodology for setting the service area of free-floating personal mobility sharing services and determining the optimal fleet size for the selected shared service area to address first-mile and last-mile challenges. We utilize population data, smart card data, and building data. Additionally, we estimate latent demand by incorporating age-specific and distance-specific utilization rates based on personal mobility device data. Along with the latent demand, we determine the service area based on locations of transit stops and buildings. We apply the proposed methodology to Yeongjong Island, Incheon. As a result, dense residential areas and popular beachside locations are designated as personal mobility sharing service areas. The fleet size for personal mobility in the dense residential service area is determined to be 1,022 units, while the fleet size for the beachside service area is set at 269 units.

Relationships Between Urban Infrastructure and Travel by the Elderly: Based on the Public Transit Trip Attraction Model for Dong (도시기반시설과 고령자 통행의 상관관계 분석: 행정동 단위 대중교통 통행유입 모형을 중심으로)

  • LEE, Soong-bong;JUNG, Dongjae;CHANG, Justin S.
    • Journal of Korean Society of Transportation
    • /
    • v.33 no.3
    • /
    • pp.268-275
    • /
    • 2015
  • As Korea is predicted to be a super-aged society in the near future, transport policies that internalize the elderly have also drawn attentions. Even though some studies have examined the travel by the elderly with various motives, it is, however, difficult to find references that deal with the unique spatio-temporal characteristics of senior trips. For example, the models by time period have represented the temporal property while a set of independent variables associated with urban infrastructure have addressed the spatial feature. This study was conducted under a trip attraction model for transit. The result shows that transit facilities, commercial areas, and hospitals are the dominant factors to explain the travel by the elderly, particularly during 09:00-17:00.

Optimized implementation of HIGHT algorithm for sensor network (센서네트워크에 적용가능한 HIGHT 알고리즘의 최적화 구현 기법)

  • Seo, Hwa-Jeong;Kim, Ho-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.7
    • /
    • pp.1510-1516
    • /
    • 2011
  • As emergence of the ubiquitous society, it is possible to access the network for services needed to us in anytime and anywhere. The phenomena has been accelerated by revitalization of the sensor network offering the sensing information and data. Currently, sensor network contributes the convenience for various services such as environment monitoring, health care and home automation. However, sensor network has a weak point compared to traditional network, which is easily exposed to attacker. For this reason, messages communicated over the sensor network, are encrypted with symmetric key and transmitted. A number of symmetric cryptography algorithms have been researched. Among of them HIGHT algorithm in hardware and software implementation are more efficient than tradition AES in terms of speed and chip size. Therefore, it is suitable to resource constrained devices including RFID tag, Sensor node and Smart card. In the paper, we present the optimized software implementation on the ultra-light symmetric cryptography algorithm, HIGHT.

Untraceable Authenticated Key Agreement Scheme for Multi-server Environment (다중서버를 위한 비-추적성을 제공하는 인증된 키 동의 기법)

  • Choi, Hae-Won;Kim, Sangjin;Ryoo, Myungchun
    • Journal of Digital Convergence
    • /
    • v.15 no.10
    • /
    • pp.253-260
    • /
    • 2017
  • Authenticated key agreement in multi-server environments is one of very important security issues because only authorized user needs to access their data and services. To support this issue, numerous schemes have been proposed over recent years. Recently, Shin showed the security weaknesses in the previous scheme and proposed an improved scheme called SIAKAS to solve them. Unfortunately, this paper shows that SIAKAS is still weak against application server impersonation attack and could be traceable to attackers. To solve the problems in SIAKAS, we propose an untraceable authenticated key agreement scheme, denoted by UAKAS. UAKAS efficiently solves security and privacy issues in SIAKAS and the related schemes and could reduce the operation overhead at least 12% compared to them.

Design of Encryption/Decryption IP for Lightweight Encryption LEA (경량 블록암호 LEA용 암·복호화 IP 설계)

  • Sonh, Seungil
    • Journal of Internet Computing and Services
    • /
    • v.18 no.5
    • /
    • pp.1-8
    • /
    • 2017
  • Lightweight Encryption Algorithm(LEA) was developed by National Security Research Institute(NSRI) in 2013 and targeted to be suitable for environments for big data processing, cloud service, and mobile. LEA specifies the 128-bit message block size and 128-, 192-, and 256-bit key sizes. In this paper, block cipher LEA algorithm which can encrypt and decrypt 128-bit messages is designed using Verilog-HDL. The designed IP for encryption and decryption has a maximum throughput of 874Mbps in 128-bit key mode and that of 749Mbps in 192 and 656Mbps in 256-bit key modes on Xilinx Vertex5. The cryptographic IP of this paper is applicable as security module of the mobile areas such as smart card, internet banking, e-commerce and IoT.