• Title/Summary/Keyword: eCard

Search Result 271, Processing Time 0.024 seconds

A Robust and Secure Remote User Authentication Scheme Preserving User Anonymity (사용자 익명성을 보장하는 안전하고 개선된 원격 사용자 인증스킴)

  • Shin, Kwang-Cheul
    • The Journal of Society for e-Business Studies
    • /
    • v.18 no.2
    • /
    • pp.81-93
    • /
    • 2013
  • Remote user authentication is a method, in which remote server verifies the legitimacy of a user over an common communication channel. Currently, smart card based remote user authentication schemes have been widely adopted due to their low computational cost and convenient portability for the mutual authentication. 2009 years, Wang et al.'s proposed a dynamic ID-based remote user authentication schemes using smart cards. They presented that their scheme preserves anonymity of user, has the feature of storing password chosen by the server, and protected from several attacks. However, in this paper, I point out that Wang et al.'s scheme has practical vulnerability. I found that their scheme does not provide anonymity of a user during authentication. In addition, the user does not have the right to choose a password. And his scheme is vulnerable to limited replay attacks. In particular, the parameter y to be delivered to the user is ambiguous. To overcome these security faults, I propose an enhanced authentication scheme, which covers all the identified weakness of Wang et al.'s scheme and an efficient user authentication scheme that preserve perfect anonymity to both the outsider and remote server.

A Study on Energy Savings in a Network Interface Card Based on Optimization of Interrupt Coalescing (인터럽트 병합 최적화를 통한 네트워크 장치 에너지 절감 방법 연구)

  • Lee, Jaeyoul;Han, Jaeil;Kim, Young Man
    • Journal of Information Technology Services
    • /
    • v.14 no.3
    • /
    • pp.183-196
    • /
    • 2015
  • The concept of energy-efficient networking has begun to spread in the past few years, gaining increasing popularity. A common opinion among networking researchers is that the sole introduction of low consumption silicon technologies may not be enough to effectively curb energy requirements. Thus, for disruptively boosting the network energy efficiency, these hardware enhancements must be integrated with ad-hoc mechanisms that explicitly manage energy saving, by exploiting network-specific features. The IEEE 802.3az Energy Efficient Ethernet (EEE) standard is one of such efforts. EEE introduces a low power mode for the most common Ethernet physical layer standards and is expected to provide large energy savings. However, it has been shown that EEE may not achieve good energy efficiency because mode transition overheads can be significant, leading to almost full energy consumption even at low utilization levels. Coalescing techniques such as packet coalescing and interrupt coalescing were proposed to improve energy efficiency of EEE, but their implementations typically adopt a simple policy that employs a few fixed values for coalescing parameters, thus it is difficult to achieve optimal energy efficiency. The paper proposes adaptive interrupt coalescing (AIC) that adopts an optimal policy that could not only improve energy efficiency but support performance. AIC has been implemented at the sender side with the Intel 82579 network interface card (NIC) and e1000e Linux device driver. The experiments were performed at 100 M bps transfer rate and show that energy efficiency of AIC is improved in most cases despite performance consideration and in the best case can be improved up to 37% compared to that of conventional interrupt coalescing techniques.

Toward Design and Implement to Multiple Schemes for Strong Authentication Mechanism - Case Studying : Secure Entrance System - (다단계 사용자 신분확인 메커니즘 설계와 구현 방안 : 출입통제 시스템 사례 중심으로)

  • Hong Seng-Phil;Kim Jae-Hyoun
    • Journal of Internet Computing and Services
    • /
    • v.7 no.2
    • /
    • pp.161-172
    • /
    • 2006
  • As the innovative technologies related to ubiquitous computing are being rapidly developed in recent IT trend, the concern for IT dysfunction(e.g., personal information abuse, information risk, threat, vulnerability, etc.) are also increasing. In our study, we suggested how to design and implement to multiple schemes for strong authentication mechanism in real system environments. We introduce the systematic and secure authentication technologies that resolve the threats incurring from the abuse and illegal duplication of financial transaction card in the public and financial institutions. The multiple schemes for strong authentication mechanism applied to java technology, so various application programs can be embedded, Independent of different platforms, to the smartcard by applying the consolidated authentication technologies based on encryption and biometrics(e.g., finger print identification). We also introduce the appropriate guidelines which can be easily implemented by the system developer and utilized from the software engineering standpoint of view. Further, we proposed ways to utilize java card based biometrics by developing and applying the 'smartcard class library' in order for the developer and engineers involved in real system environment(Secure entrance system) to easily understand the program. Lastly, we briefly introduced the potential for its future business application.

  • PDF

RTTC System through Fusion of Dynamic and Static Game Elements (동적·정적 게임 요소의 퓨전을 통한 RTTC 시스템 )

  • Chang-Jo, Sung;Kyung-Soo, Park;Seo-Hyun, Kim;Chae-Lim, Lee;Ji-Hye, Huh;Sung-Jun, Park
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.1
    • /
    • pp.183-189
    • /
    • 2023
  • Most of the games in the RTS genre, including games such as Starcraft and LOL, which are considered the most successful works in E-sports, have become increasingly uniform and boring. In order to make more changes in a uniform and boring system, I thought it could be solved through a combination of genres that have been fully developed and verified, so I tried to present a new game paradigm. To this end, let's focus on the genres of RTS andt TCG among the popular game genres and present a new paradigm by combining the dynamic and static features of these two genres. The new Real-Time Trading Card (RTTC) genre of game system proposed in this paper refers to a new type of game system that fuses the dynamic and static elements of the game. This mixed genre can be a new paradigm for games that can satisfy both gamers and viewers by minimizing the uniformity of the game while adding the randomness of cards to the characteristics of RTS called real-time warfare.

Metro Station Clustering based on Travel-Time Distributions (통행시간 분포 기반의 전철역 클러스터링)

  • Gong, InTaek;Kim, DongYun;Min, Yunhong
    • The Journal of Society for e-Business Studies
    • /
    • v.27 no.2
    • /
    • pp.193-204
    • /
    • 2022
  • Smart card data is representative mobility data and can be used for policy development by analyzing public transportation usage behavior. This paper deals with the problem of classifying metro stations using metro usage patterns as one of these studies. Since the previous papers dealing with clustering of metro stations only considered traffic among usage behaviors, this paper proposes clustering considering traffic time as one of the complementary methods. Passengers at each station were classified into passengers arriving at work time, arriving at quitting time, leaving at work time, and leaving at quitting time, and then the estimated shape parameter was defined as the characteristic value of the station by modeling each transit time to Weibull distribution. And the characteristic vectors were clustered using the K-means clustering technique. As a result of the experiment, it was observed that station clustering considering pass time is not only similar to the clustering results of previous studies, but also enables more granular clustering.

A Secure Micro-Payment Protocol based on Credit Card in Wireless Internet (무선인터넷에서 신용카드기반의 안전한 소액 지불 프로토콜)

  • Kim Seok mai;Kim Jang Hwan;Lee Chung sei
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.12C
    • /
    • pp.1692-1706
    • /
    • 2004
  • Recently, there are rapid development of information and communication and rapid growth of e-business users. Therefore we try to solve security problem on the internet environment which charges from wire internet to wireless internet or wire/wireless internet. Since the wireless mobile environment is limited, researches such as small size, end-to-end and privacy security are performed by many people. Wireless e-business adopts credit card WPP protocol and AIP protocol proposed by ASPeCT. WAP, one of the protocol used by WPP has weakness of leaking out information from WG which conned wire and wireless communication. certification chain based AIP protocol requires a lot of computation time and user IDs are known to others. We propose a Micro-Payment protocol based on credit card. Our protocol use the encryption techniques of the public key with ID to ensure the secret of transaction in the step of session key generation. IDs are generated using ECC based Weil Paring. We also use the certification with hidden electronic sign to transmit the payment result. The proposed protocol solves the privacy protection and Non-repudiation p개blem. We solve not only the safety and efficiency problem but also independent of specific wireless platform. The protocol requires the certification organization attent the certification process of payment. Therefore, other domain provide also receive an efficient and safe service.

The Design and Implementation of Secure-ReXpis System with Internet Environment (인터넷 환경 하에서의 Secure-ReXpis 시스템 설계 및 구현)

  • 안경림;박상필;백혜경;임병찬;박준홍;고대식
    • The Journal of Society for e-Business Studies
    • /
    • v.6 no.3
    • /
    • pp.101-113
    • /
    • 2001
  • Security is very important in EC(Electronic Commerce) environment because exchanged information(that is transaction details, private data, charges data(card-no, accounts), etc) is various and is very sensitive. So, In this paper, we propose Secure-ReXpis(Reliable St excellent Xh3 Processing Infrastructure) System that transfer message and support Message Level Security(Encryption/Decryption and Digital Signature). And we implement Message Confidentiality Service, User Authentication & Message Integrity Service and Non-Repudiation Service among the various Security Services. This system support XML message format and EDI message, WEB Data and Private Format Data, etc.

  • PDF

Discussion on the Establishment of Identity of Fisheries Cooperatives as Solution of the Problems of Comprehensive Measures for a Soft Landing of Household Debts (가계부채 연착륙 종합대책의 문제점과 그 해법으로써 수산업협동조합의 정체성 확립에 관한 논의)

  • Jeon, Hyeong-Soo
    • The Journal of Fisheries Business Administration
    • /
    • v.42 no.3
    • /
    • pp.95-107
    • /
    • 2011
  • The Comprehensive Measures for a soft landing of Household Debts affecting the credit service of Fisheries Cooperative (FC) have been known to the public in June 2011. Its essential points are as follows: 1) Abolition of Tax-free Regulation, 2) Set limit of loans, etc. per person, 3) Introduce leverage regulations for credit-specialized financial sector i. e. FC, 4) Gradually strengthen loan-loss reserve requirements for card-loan and other credit loans. However, the Financial Policy Measures seem to pay no attention to the Cooperative's Values, Principles and Identity. In this paper, emphasis is be placed on the task of the regulators i. e. Financial Services Commission and Financial Supervice Service to lift the Financial Measures negatively affecting the operation of fund of FCs, and on the establishment of Cooperative identity in order to further develop FCs.

Technical Notes on Radio Navigation Services, Including MSI

  • Guk, Seung-Gi;Card, Michael D.
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2017.11a
    • /
    • pp.230-231
    • /
    • 2017
  • 극동지역에서 Loran-C 국제협력 체인의 구성에 따란 한국, 중국, 러시아 3개국에 상호호혜원칙에 따라 이용범위의 증대 및 전파표지의 연구 발전을 도모하는 등 전파표지분야의 협력과 발전을 위하여 협정서에 명시된 정책수행과 협정 체약국간 활동을 조정하는 역할을 하며 초기('92.9.7)에는 기관간의 협정으로 시작하였으나 '00.12.22에 정부간 협정으로 변경되어 그동안 Loran-C 국제 협력체인을 구성하는 한편 전파표지에 관한 정보 교환 및 운영절차 마련 등으로 해상교통안전에 크게 기여하고 있다. 최근 해사안전정보(MSI) 제공과 GNSS 전파간섭에 대비한 위치정보 제공에 관한 관심이 대두되면서 향후 FENRS에서 협력하고 발전해나갈 방향을 제시하고자 한다.

  • PDF

Research on the Development of the Electronic Money System in Korea (한국의 전자화폐 시스템 구축 방안에 관한 연구)

  • 이현제;정일주
    • The Journal of Society for e-Business Studies
    • /
    • v.4 no.2
    • /
    • pp.115-132
    • /
    • 1999
  • It is expected that the electronic money will be a major payment method in the forthcoming electronic finacial system. However, in order for the electronic money to have a widespread use among general public in their dialy life there are many properties that should be satisfied beforehand. In this study, we first analyze the characteristics of the existing electronic money systems, compare various proposals on the electronic money system so far, and then suggest a desirable model of developing an electronic money system for Korean financial institutions. It has been found that the model we propose satisfies the general requirements of the electronic money system. The results of this study will aid in various activities of technology development and standardization. Furthermore, this study will support the initiative effort of Korea in developing inter-country electronic money system.

  • PDF