• Title/Summary/Keyword: USIM

Search Result 77, Processing Time 0.028 seconds

UHF/HF Dual-Band Integrated Mobile RFID/NFC Linkage Method for Mobile Device-based Business Application (휴대단말 기반의 비즈니스 응용을 위한 UHF/HF 듀얼밴드 통합 모바일 RFID와 NFC의 연동 방안)

  • Park, Namje
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.10
    • /
    • pp.841-851
    • /
    • 2013
  • Mobile RFID/NFC linkage technology means a provision of integrated 2 existing mobile RFID services by developing the 900MHz mobile RFID reader and the NFC reader/tag into one SoC to be put on a USIM card. In this paper, the mobile RFID related technologies that offer similar services as NFC were also analyzed to understand the potential linkage to NFC and the requirements for the linkage. In addition, the introduction of dual tag and the code system linkage suggested a linking method to maximally use the existing infrastructure and the requirement satisfaction was analyzed. Lastly, based on the analysis, the future direction for the new standard design was suggested.

A Study on Java COS for Devices Which Have Safe Power System (전력공급이 안정된 장치들을 위한 자바 COS에 관한 연구)

  • Jung, Min-Soo
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.1
    • /
    • pp.103-111
    • /
    • 2011
  • Legacy Java card which adapts a Java platform loads and executes an application when electronics power is provided. However, recently the most Java cards are embedded into a mobile terminal as USIM cards, therefore the power is continually provided for the smart cards. In this case, operation of a Java card system needs to consider its operating system to be advanced in memory management, object management and transaction mechanism. In this paper, we present a high performance Java Card system which is able to have efficient installation, loading and execution of application by applying a new memory management of the smart card that has safe power system.

SEED Hardware Cryptographic Module Implementation applied Masking Techniques (마스킹 기법을 적용한 SEED 하드웨어 암호 모듈 구현)

  • Oh, Sang-Jun;Kim, Dong-Kyue
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.11a
    • /
    • pp.904-905
    • /
    • 2013
  • IC 카드 및 USIM 등의 보안 하드웨어 토큰은 기존의 보안 소프트웨어에 비해 독립적인 하드웨어 연산을 사용하기 때문에 안전하다고 인식된다. 그러나 하드웨어의 연산시 발생하는 부채널 정보(전력, 전자파 등)를 이용하는 부채널 공격에 취약할 수 있다. 본 논문에서는 부채널 공격 방법 중 널리 사용되고 있는 전력분석공격에 대한 대응 기법을 적용 시킨 SEED 하드웨어 모듈을 구현 하고, 공격에 효과적으로 대응이 가능한지 시뮬레이션을 통해 검증 한다.

A Study on Authentication of Mobile Agency AP Connection Using Trusted Third Party in Smart Phone Environment (스마트폰 환경에서 신뢰기관을 이용한 이동 통신사 AP 접속 인증에 관한 연구)

  • Lee, Gi-Sung;Min, Dae-Gi;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.11
    • /
    • pp.5496-5505
    • /
    • 2012
  • As the IT industry develops, the smart-phone technology and functions which are actively being studied at the moment greatly influence the entire living environment. With the smart-phone technology and functions, people's interest for the wireless LAN which can be used to get access to the Internet anytime anywhere is gradually increasing. However, since the malicious attacker can easily carry out hacking or approach the contents due to the characteristics of the wireless radio wave, the personal information with a high level of importance for data security is easily exposed due to Spoofing, Denial of Service attack and Man in the Middle attack. Therefore, the demand for security is gradually increasing. In this paper, the safe wireless network service environment is provided by supplementing the vulnerability in regard to Spoofing, Session Hijacking and Man in the Middle attack after executing the client's authentication process, the AP authentication process and the Mobile Agency authentication process with the client's information in the USIM, the AP information and the Mobile Agency information when the client uses the wireless Internet through the Mobile Agency AP access in the smart phone environment.

Mutual Authentication between the mobile node in Ad-hoc Network (Ad-hoc 망에서 이동 노드 간 상호 인증)

  • Choi, Woo-Jin;Seok, Gyeong-Hyu
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.10 no.10
    • /
    • pp.1087-1092
    • /
    • 2015
  • It was diversified demand for a wireless network to the rapid growth of the Internet, the time and space that are not in the new level of Internet technology, limits the Ad-hoc networks are needed. Ad-hoc networks do not communicate with the central station, each of the mobile nodes included in the network communicate with each other by the relay role. In recent years, the Ad-hoc wireless networks in a variety of routing protocols and network security, research is actively underway for the authentication method, but the security of wireless Internet and Ad-hoc networks, certification is incomplete situation. This paper considers the authentication and key agreement technique applicability of the USIM card using the DSR routing protocol of the Java Card and Ad-hoc networks, we propose a secure authentication mechanism between the mobile node.

An Inference Verification Tool based on a Context Information Ontology (상황 정보 온톨로지 기반 추론 검증 도구)

  • Kim, Mok-Ryun;Park, Young-Ho
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.36 no.6
    • /
    • pp.488-501
    • /
    • 2009
  • In ubiquitous environments, invisible devices and software are connected to one another to provide convenient services to users. In order to provide such services, we must have mobile devices that connect users and services. But such services are usually limited to those served on a single mobile device. To resolve the resource limitation problem of mobile devices, a nearby resource sharing research has been studied. Also, not only the nearby resource share but also a resource recommendation through context-based resource reasoning has been studied such as an UMO Project. The UMO Project share and manage the various context information for the personalization resource recommendation and reason based on current context information. Also, should verify resource inference rules for reliable the resource recommendation. But, to create various context information requires huge cost and time in actuality. Thus, we propose a inference verification tool called USim to resolve problem. The proposed inference verification tool provides convenient graphic user interfaces and it easily creates context information. The USim exactly verifies new inference rules through dynamic changes of context information.

Antifungal Activity of Lactic Acid Bacteria Strains Isolated from Natural Honey against Pathogenic Candida Species

  • Bulgasem, Bulgasem Y.;Lani, Mohd Nizam;Hassan, Zaiton;Yusoff, Wan Mohtar Wan;Fnaish, Sumaya G.
    • Mycobiology
    • /
    • v.44 no.4
    • /
    • pp.302-309
    • /
    • 2016
  • The role of lactic acid bacteria (LAB) in honey as antifungal activity has received little attention and their mechanism of inhibitory of fungi is not fully understood. In this study, LAB were isolated from honey samples from Malaysia, Libya, Saudi Arabia, and Yemen. Twenty-five isolates were confirmed LAB by catalase test and Gram staining, and were screened for antifungal activity. Four LAB showed inhibitory activity against Candida spp. using the dual agar overlay method. And they were identified as Lactobacillus plantarum HS isolated from Al-Seder honey, Lactobacillus curvatus HH isolated from Al-Hanon honey, Pediococcus acidilactici HC isolated from Tualang honey and Pediococcus pentosaceus HM isolated from Al-Maray honey by the 16S rDNA sequence. The growth of Candida glabrata ATCC 2001 was strongly inhibited (>15.0 mm) and (10~15 mm) by the isolates of L. curvatus HH and P. pentosaceus HM, respectively. The antifungal activity of the crude supernatant (cell free supernatant, CFS) was evaluated using well diffusion method. The CFS showed high antifungal activity against Candida spp. especially The CFS of L. curvatus HH was significantly (p < 0.05) inhibited growth of C. glabrata ATCC 2001, C. parapsilosis ATCC 2201, and C. tropicalis ATCC 750 with inhibitory zone 22.0, 15.6, and 14.7 mm, respectively. While CFS of P. pentosaceus HM was significantly (p < 0.05) effective against C. krusei, C. glabrata, and C. albicans with inhibition zone 17.2, 16.0, and 13.3 mm, respectively. The results indicated that LAB isolated from honey produced compounds which can be used to inhibit the growth of the pathogenic Candida species.

The Security Vulnerabilities of 5G-AKA and PUF-based Security Improvement (5G 인증 및 키합의 프로토콜(5G-AKA)의 보안취약점과 PUF 기반의 보안성 향상 방안)

  • Jung, Jin Woo;Lee, Soo Jin
    • Convergence Security Journal
    • /
    • v.19 no.1
    • /
    • pp.3-10
    • /
    • 2019
  • The 5G network is a next-generation converged network that combines various ICT technologies to realize the need for high speed, hyper connection and ultra low delay, and various efforts have been made to address the security vulnerabilities of the previous generation mobile networks. However, the standards released so far still have potential security vulnerabilities, such as USIM deception and replication attack, message re-transmission attack, and race-condition attack. In order to solve these security problems, this paper proposes a new 5G-AKA protocol with PUF technology, which is a physical unclonable function. The proposed PUF-based 5G-AKA improves the security vulnerabilities identified so far using the device-specific response for a specific challenge and hash function. This approach enables a strong white-list policy through the addition of inexpensive PUF circuits when utilizing 5G networks in areas where security is critical. In addition, since additional cryptographic algorithms are not applied to existing protocols, there is relatively little burden on increasing computational costs or increasing authentication parameter storage.

A Secure Maintenance Scheme of Secret Data on Trusted Mobile Platform Environment (Trusted Mobile Platform 환경에서의 안전한 비밀 데이터 유지(이전) 방안)

  • Kang, Dong-Wan;Lee, Im-Yeong;Han, Jin-Hee;Jun, Sung-Ik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.4
    • /
    • pp.79-91
    • /
    • 2008
  • Modern society as an information society, a lot of information is communicated in on-line. Specially, mobile environment based on radio communication has a characteristic of flexibility compared with wire communication and is developed rapidly. However, the more mobile technology is developed the more security for sensitive information is needed. Therefore, MTM(Mobile Trusted Module) is developed and promoted by TCG(Trusted Computing Group), which is an industry standard body to enhance the security level in the mobile computing environment. MTM, hardware security module for mobile environment, offers user's privacy protection, platform integrity verification, and individual platform attestation. On the other hand, secure migration scheme is required in case secret data or key is transferred from one platform to the other platform. In this paper, we analyze migration schemes which were described in TCG standard and other papers and then propose security maintenance scheme for secret data using USIM(Universal Subscriber Identity Module).

Implementation of authentication mechanism for 3GPP, 3GPP2 on java card (자바 카드상에서의 3GPP, 3GPP2 인증 메커니즘 구현)

  • 조승환;전성익;이정우;이옥연;한진희;이세광
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.6
    • /
    • pp.67-75
    • /
    • 2003
  • The development of mobile phone is growing fast in the all over the world. Besides the basic voice communication, many multimedia services and global roaming service are capable in the 3rd generation mobile telecommunication. Because mobile phone has been the essential tool to communicate, the protection of privacy and the safe transmission are critical ones. In synchronous, asynchronous mode IMT2000 service, the mechanism of mutual authentication and generation of cipher key and integrity key are implemented in smart card chip called UIM, USIM. In this paper, we describe the authentication mechanism of 3GPP and 3CPP2 and its implementation results. Then, we specify a few problems which are not defined in standard.