• Title/Summary/Keyword: USIM card

Search Result 24, Processing Time 0.04 seconds

A Study on Java COS for Devices Which Have Safe Power System (전력공급이 안정된 장치들을 위한 자바 COS에 관한 연구)

  • Jung, Min-Soo
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.1
    • /
    • pp.103-111
    • /
    • 2011
  • Legacy Java card which adapts a Java platform loads and executes an application when electronics power is provided. However, recently the most Java cards are embedded into a mobile terminal as USIM cards, therefore the power is continually provided for the smart cards. In this case, operation of a Java card system needs to consider its operating system to be advanced in memory management, object management and transaction mechanism. In this paper, we present a high performance Java Card system which is able to have efficient installation, loading and execution of application by applying a new memory management of the smart card that has safe power system.

A Study on Design of Structure and Construction of Application for USIM in IMT 2000 (IMT 2000에서의 USIM을 위한 구조 설계 및 응용 프로그램 구축에 관한 연구)

  • Ha, Nam-Su;Hong, In-Sik
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2001.04b
    • /
    • pp.627-630
    • /
    • 2001
  • 제 3세대 이동통신인 IMT2000에서 단말기는 기존의 통신수단으로서의 역할과 함께 인증, 지불, 로열티 등 다양한 어플리케이션을 이용한 서비스를 가능하게 하는 수단이 될 것이다. 이것을 가능하게 하는 핵심요인은 USIM이라는 IC 카드가 단말기에 내장되기 때문이다. 본 논문에서는 USIM의 구조에 대한 관련 기술과 단말기와 USIM 사이의 프로토콜 형식 및 안전한 지불을 위한 Off-Line 결제 모델을 제안하였다. 제안한 모델은 하드웨어 자체의 제약으로 인해 적절한 크기의 어플리케이션 설계와 효율적인 프로토콜의 설계가 필요하다. 유효성을 입증하기 위해 관련표준을 고찰하였고 썬마이크로 시스템의 Java card 2.1.1 툴킷을 이용하여 시뮬레이션하였다.

  • PDF

Design and Implementation of User Authentication System Using USIM Information (USIM 정보를 이용한 사용자 인증 방안 설계 및 구현)

  • Lee, Jin-Woo;Kim, Seon-Joo;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.7
    • /
    • pp.571-578
    • /
    • 2017
  • In order to approach information system through smart device and pc, user has to authenticate him or herself via user authentication. At that time when user tries reaching the system, well-used user authentication technologies are ID/PW base, OTP, certificate, security card, fingerprint, etc. The ID/PWbased method is familiar to users, however, it is vulnerable to brute force cracking, keylogging, dictionary attack. so as to protect these attacks, user has to change the passwords periodically as per password combination instructions. In this paper, we designed and implemented a user authentication system using smartphone's USIM without using password while enhancing security than existing ID / PW based authentication technology.

A Study on USIM Card Based User and Device Authentication Scheme in the Smartwork (USIM을 활용한 스마트워크 사용자 및 디바이스 인증 기술 연구)

  • Wi, Yukyeong;Kwak, Jin
    • Journal of Korea Multimedia Society
    • /
    • v.16 no.3
    • /
    • pp.309-317
    • /
    • 2013
  • As the distribution rate of smart device increases, users of smartwork are increasingly able to work without constraints imposed by time and space. However, there are many security threats in smartwork environment. Security threats is illegal information for an unauthenticated device. Especially, smartwork environment is approach to users. Therefore, there are other matters concerning justifiable user and device authentication. However, the studies of smartwork are still in early stage of development, and the studies of user and device authentication also not enough to apply smartwork environment. In this paper, we proposed USIM based user and device authentication scheme in the smartwork environment.

The Trend of Smart Card Based Mobile Equipment Security (스마트카드 기반 휴대단말 보안기술 동향)

  • Kim, S.H.;Chung, B.H.
    • Electronics and Telecommunications Trends
    • /
    • v.17 no.3 s.75
    • /
    • pp.15-22
    • /
    • 2002
  • 본 고에서는 현재 개인용 보안장치로 가장 널리 사용되고 있는 스마트카드를 이용한 휴대단말기의 보안기술 동향에 대한 분석으로써, WAP 포럼에서의 WIM과 3GPP에서 논의되고 있는 USIM에 대한 기술과 향후 전망에 대해 기술하고자 한다.

Implementation of authentication mechanism for 3GPP, 3GPP2 on java card (자바 카드상에서의 3GPP, 3GPP2 인증 메커니즘 구현)

  • 조승환;전성익;이정우;이옥연;한진희;이세광
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.6
    • /
    • pp.67-75
    • /
    • 2003
  • The development of mobile phone is growing fast in the all over the world. Besides the basic voice communication, many multimedia services and global roaming service are capable in the 3rd generation mobile telecommunication. Because mobile phone has been the essential tool to communicate, the protection of privacy and the safe transmission are critical ones. In synchronous, asynchronous mode IMT2000 service, the mechanism of mutual authentication and generation of cipher key and integrity key are implemented in smart card chip called UIM, USIM. In this paper, we describe the authentication mechanism of 3GPP and 3CPP2 and its implementation results. Then, we specify a few problems which are not defined in standard.

Passwordless Protection for Private Key Using USIM Information (USIM 정보를 활용한 패스워드리스 방식의 개인키 보호 방안)

  • Kim, Seon-Joo
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.6
    • /
    • pp.32-38
    • /
    • 2017
  • Despite the opinion that certificate is useless, half of the population in Korea (approx. 35 million) get an certificate, and use it for internet banking, internet shopping, stock trading, and so on. Most users store their certificates on a usb memory or smartphone, and certificates or passwords stored on such storage media can be easily attacked and used to disguise as legitimate users. Due to these security problem of certificate, a various authentication technologies has been proposed such as smartphone owner authentication using SMS, and a personal authentication using biometric authentication. However, a safe technique is not presented yet without user password, and certificate. In this paper, I proposed a method to secure certificate/private key without a user password using a combination of USIM card and smartphone's information. Even if a hacker gets the user password, the certificate, and the private key, he can not use the certificate. User do not need to remember complex password which is a combination of alphabetic / numeric / special characters, and use his certificate safely.

Design and Implementation of User Authentication Protocol for Wireless Devices based on Java Card (자바카드 기반 무선단말기용 사용자 인증 프로토콜의 설계 및 구현)

  • Lee, Ju-Hwa;Seol, Kyoung-Su;Jung, Min-Soo
    • The KIPS Transactions:PartC
    • /
    • v.10C no.5
    • /
    • pp.585-594
    • /
    • 2003
  • Java card is one of promising smart card platform with java technology. Java card defines necessary packages and classes for Embedded device that have small memory such as smart card Jana card is compatible with EMV that is Industry specification standard and ISO-7816 that is international standard. However, Java card is not offers user authentication protocol. In this paper, We design and implement an user authentication protocol applicable wireless devices based on Java Card using standard 3GPP Specification (SMS), Java Card Specification (APDU), Cryptography and so on. Our Java Card user authentication techniques can possibly be applied to the area of M-Commerce, Wireless Security, E-Payment System, Mobile Internet, Global Position Service, Ubiquitous Computing and so on.

Mutual Authentication between the mobile node in Ad-hoc Network (Ad-hoc 망에서 이동 노드 간 상호 인증)

  • Choi, Woo-Jin;Seok, Gyeong-Hyu
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.10 no.10
    • /
    • pp.1087-1092
    • /
    • 2015
  • It was diversified demand for a wireless network to the rapid growth of the Internet, the time and space that are not in the new level of Internet technology, limits the Ad-hoc networks are needed. Ad-hoc networks do not communicate with the central station, each of the mobile nodes included in the network communicate with each other by the relay role. In recent years, the Ad-hoc wireless networks in a variety of routing protocols and network security, research is actively underway for the authentication method, but the security of wireless Internet and Ad-hoc networks, certification is incomplete situation. This paper considers the authentication and key agreement technique applicability of the USIM card using the DSR routing protocol of the Java Card and Ad-hoc networks, we propose a secure authentication mechanism between the mobile node.