• Title/Summary/Keyword: UICC

Search Result 64, Processing Time 0.033 seconds

EAP-AKA Authentication without UICC for Interworking Authentication in Heterogeneous Wireless Networks (이질적인 무선 네트워크 환경에서 인증 연동을 위한 비 UICC 방식의 EAP-AKA 인증)

  • Choi, Jae-Duck;Jung, Sou-Hwan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.5
    • /
    • pp.168-177
    • /
    • 2009
  • This paper proposes the EAP-AKA scheme without UICC for extending its usage to existing WLAN/WiBro devices. To apply the current EAP-AKA scheme, the WLAN/WiBro devices require an external Universal Integrated Circuit Card (UICC) reader. If they don't use UICC due to cost overhead and architectural problem of device, the EAP-AKA scheme loses its own advantages in security and portability aspects. The proposed scheme uses the DH key algorithm and a password for non-UICC devices instead of using the long-term key stored in UICC. The main contribution is to maintain the security and portability of the EAP-AKA while being applied to non-3GPP network devices not equipped with UICC. Furthermore, it does not require major modifications of authentication architecture in 3GPP.

Does the New UICC/AJCC TNM Staging System (7th Edition) Improve Assessing Prognosis in Gastric Cancer Compared to the Old System (6th Edition)? (UICC/AJCC 제7판 위암 병기 분류법은 제6판 분류법에 비하여 예후 예측을 증진시키는가?)

  • Ha, Tae-Kyung;Kim, Hyun-Ja;Kwon, Sung-Joon
    • Journal of Gastric Cancer
    • /
    • v.9 no.4
    • /
    • pp.159-166
    • /
    • 2009
  • Purpose: We evaluated the efficacy and prognostic predictability of the $7^{th}$ UICC TNM classification compared to $6^{th}$ UICC TNM classification in patients with gastric cancer. Materials and Methods: Between June 1992 and December 2006, 1,633 patients with gastric cancer who had undergone gastric surgery and who had been analyzed by the $6^{th}$ UICC method were analyzed using the new $7^{th}$ UICC system. Results: Significant differences in 5-year survival rates were observed for $7^{th}$ UICC N0, N1, N2, N3a, and N3b compared to $6^{th}$ UICC. There were no significant differences in 5-year survival rates between T2 and T3. Distinct survival differences were present between stage III (IIIa, IIIb, and IIIc) and stage IV in $7^{th}$ UICC. Significant differences in 5-year survival rates were not expected for Ia versus Ib, Ib versus IIa, and IIb versus IIIa. The survival rates for the same stages were not homogeneously differentiated by $7^{th}$ UICC except for stage IV. Conclusion: The $7^{th}$ UICC classification system is not better able to predict patient survival compared to 6th UICC in patients with gastric cancer, but is better for accurate prognosis of patients with stage IV gastric cancer.

  • PDF

Comparison of Nodal Staging, of UICC TNM and Japanese Classification, and Prognostic Nodal Grouping of UICC N3M0 in Advanced Gastric Cancer (진행 위암의 UICC와 일본식 림프절 병기의 비교 및 UICC N3M0 병기의 문제점)

  • Han, Sang-Jun;Yang, Dae-Hyun
    • Journal of Gastric Cancer
    • /
    • v.5 no.3 s.19
    • /
    • pp.163-168
    • /
    • 2005
  • Purpose: We analyzed cases of advanced gastric cancer (AGC) by using two nodal stagings, UICC and Japanese systems. We also analyzed cases of UICC N3M0 by different ways to see which nodal system or group had better prognostic power. Materials and Methods: From Feb. 1990 to May 2000, 197 UICC M0 patients of AGC who had undergone curative resection were analyzed by using the nodal stagings of the UICC and the Japanese systems. Also, 58 patients with UICC N3M0 gastric cancer were analyzed by using the Japanese n-staging, metastatic ratio and the metastatic number Results: The 5-year survival rates were 62.9%, 33.0% and 21.2% for UICC N1, N2 and N3, and 61.2% and 25.3% for Japanese n1 and n2, respectively in patients of N3M0 AGC, the 5-year survival rates were 62.5% for Japanese n1, and 33.0% and 22.9% for metastatic ratios of less than 0.5 and metastatic numbers below 26, respectively significantly better than the 5-year survival rates for higher ratios and numbers (P=0.018, 0.021). Conclusion: UICC N staging of gastric cancer has better prognostic power with differentiation between stages than Japanese n staging. In patients with UICC N3M0 gastric cancer, the metastatic ratio and the metastatic number, as well as the Japanese n staging, were valuable prognostic factors.

  • PDF

UICC File System Design and Implementation for Java Card (자바 카드에서의 UICC 파일 시스템 설계 및 구현)

  • Kim, Hak-Du;Jeon, Seong-Ik
    • Proceedings of the KIEE Conference
    • /
    • 2003.11c
    • /
    • pp.584-587
    • /
    • 2003
  • UICC는 애플리케이션, 파일 시스템, 보안 메커니즘, 암호 알고리즘 등을 포함하고 있는 일종의 스마트 카드이다. UICC의 파일은 ISO7816-4 표준에서 정의한 파일들과 애플리케이션의 최상 위 파일인 Application Dedicated file등이 있다. UICC가 자바 카드 기반에서 구현되 었을 때 모든 파일은 객체로서 구체화될 수 있다. 이 때 각 파일 객체는 파일에 대한 정보들과 정보 조작과 관련된 메소드를 제공하게 된다. 자바 카드는 일반 컴퓨터와 유사하지만 제한적인 메모리와 처리속도 등으로 인하여 구현 상 많은 제약사항이 따른다. 자바카드는 저장 공간을 ROM, RAM, EEPROM로 구분할 수 있으며, 파일이나 애플릿, 데이터 등은 EEPROM 영역에 저장된다. 하지만 자바 카드가 지원하는 EEPROM영역이 2.2.1 버전에서 확장되었다 할지라도 여전히 많은 데이터를 저장하기에는 부족한 메모리 공간을 갖는다. 이것은 메모리 사용에 있어 신중을 기해야 한다는 것을 의미하며 효율적인 메모리 사용은 카드 사용자에게 보다 많은 가용 메모리를 제공할 수 있다는 점에서 중요하다. 본 논문에서 는 이러한 점을 고려하여 자바 카드에서 UICC의 파일 시스템을 Linked List 방식을 이용하여 구현하는 방법과 배열을 이용하여 구현하는 방법을 제시하고 파일 시스뎀의 전체적인 구조를 효율적으로 구성하는 방법을 제시한다.

  • PDF

A LEA Implementation study on UICC-16bit (UICC 16bit 상에서의 LEA 구현 적합성 연구)

  • Kim, Hyun-Il;Park, Cheolhee;Hong, Dowon;Seo, Changho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.4
    • /
    • pp.585-592
    • /
    • 2014
  • In this paper, we study the LEA[1] block cipher system in UICC-16bit only. Also, we explain a key-schedule function and encryption/decryption structures, propose an advanced modified key-scheduling, and perform LEA in UICC-16bit that we proposed advanced modified key-scheduling. Also, we compare LEA with ARIA that proposed domestic standard block cipher, and we evaluate the efficiency on the LEA algorithm.

A Study on UICC(Universal IC Card)-based Authentication Mechanism using OTP (OTP를 활용한 UICC(Universal IC Card) 기반의 인증 메커니즘에 관한 연구)

  • Kang, Soo-Young;Lee, Im-Yeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.2
    • /
    • pp.21-31
    • /
    • 2008
  • Ubiquitous environment is constructed by development of an IT technology, offer environment of many service changed to mobile environment. Also, existed service offered at fixed position like home or company, but according to development of mobile device. user require service as moving. Wibro can offer as user moving using mobile device. As requirement should be included authentication, in case of authentication between UICC and AAA authentication server is offered in Wibro, service is available. However, when UICC requires initial authentication to AAA authentication server, identification information of UICC expose as plaintext, so privacy infringement of mobile device occurs. Therefore, identification information of terminal generate randomly using OTP(One-Time Password) that generated in mobile terminal, and we proposed mechanism of privacy protection. Also, we proposed mechanism that offer secure service to user as offer authentication from OTP framework, and offer OTP combination authentication detailedly.

A Case Study about implementation of Personalized Services Environment using UICC on Mobile Open Platform (차세대 UICC 기술을 이용한 모바일 오픈 플랫폼 기반 개인화 서비스 환경 구축 사례)

  • Sohn, Young-Seol;Park, Joon-Ho;Ok, Chang-Seok
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.04a
    • /
    • pp.1128-1131
    • /
    • 2009
  • 폐쇄적 무선망 및 단말 플랫폼의 개방화 추세에 따라 이동통신사업자(MNO)는 자사 고객 retention 및 신규 수익창출을 위해 다양한 전략을 수립하고 있다. 그리고 고객은 이러한 개방 환경에서 이동통신사업자(MNO)의 단말 및 망에 구애받지 않고 자신의 개인정보 및 멀티미디어 컨텐츠 서비스를 편리하게 이용하기를 원하고 있다. 본 논문에서는 와이브로(WiBro)가입자 인증을 위해 단말에 필수 탑재되는 UICC 에 웹 기능 및 대용량 메모리 기술을 추가하여 이를 기반으로 개인화 서비스 제공을 위한 인프라 구축 사례를 살펴본다. 먼저, UICC 기반 개인화 서비스 인프라를 구성하는 UICC 및 단말에서 구현되어야 할 SCWS 및 대용량 메모리 처리 기술을 소개하고 이를 위한 기술 요구사항을 정의한다. 그리고, 해당 UICC 및 단말을 원격에서 관리하기 위해 플랫폼에서 구현하여야 할 제어 프로토콜 기술을 살펴보고, 이를 위한 기술 요구사항을 정의한다. 다음으로 최종적으로 구축된 전체 시스템의 구성 및 서비스 흐름을 기술하고, 끝으로 이러한 인프라를 통하여 제공될 수 있는 개인화 서비스를 소개하고 향후 방향을 소개함으로써 글을 맺는다.

An Implementation of an SHA-3 Hash Function Validation Program and Hash Algorithm on 16bit-UICC (SHA-3 해시 함수 검정 프로그램과 16bit-UICC 용 SHA-3 구현)

  • Lee, Hee-Woong;Hong, Dowon;Kim, Hyun-Il;Seo, ChangHo;Park, Kishik
    • Journal of KIISE
    • /
    • v.41 no.11
    • /
    • pp.885-891
    • /
    • 2014
  • A hash function is an essential cryptographic algorithm primitive that is used to provide integrity to many applications such as message authentication codes and digital signatures. In this paper, we introduce a concept and test method for a Cryptographic Algorithm Validation Program (CAVP). Also, we design an SHA-3 CAVP program and implement an SHA-3 algorithm in 16bit-UICC. Finally, we compare the efficiency of SHA-3 with SHA-2 and evaluate the exellence of the SHA-3 algorithm.

Study on NFC Security Analysis and UICC Alternative Effect (NFC 보안 기술 분석 및 UICC 적용 효과 연구)

  • Lim, Sun-Hee;Jeon, Jae-Woo;Jung, Im-Jin;Yi, Ok-Yeon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.1B
    • /
    • pp.29-36
    • /
    • 2011
  • Near Field Communication is an emerging short-range wireless connectivity technology that offers proximity and different operating modes. Particularly, NFC technology has the potential to revolutionize mobile applications like payment and ticketing because NFC is more complex and mutual connectivity than RFID as the simple tag reader. Finally, NFC security technology defines the robust security protocols. This paper will specify and analyze the NFC security technology, and study the chance and its beneficial effect of the UICC card as the NFC Secure Element.