• Title/Summary/Keyword: 전자카드

Search Result 563, Processing Time 0.076 seconds

Performance improvement of serial communication converter of train control computer (열차제어컴퓨터 시리얼통신변환장치(HADAX)의 성능개선에 관한 연구)

  • Cho, Bong-Kwan
    • Journal of The Korean Society For Urban Railway
    • /
    • v.6 no.4
    • /
    • pp.427-436
    • /
    • 2018
  • HADAX is a serial communication converter of train control computer. It is connected with various signal equipments such as wayside signal equipments, station signal equipments, train control computers, and transmits control information and signal condition information for train control. And transmits information to several electronic interlocking devices through a splitter interface. Since HADAX interfaces with many signaling devices through serial communication, frequent communication connection faults necessitate improvement of performance such as dual system configuration, integration of external splitter, and multi-channelization of communication card. The improved HADAX device should have compatibility with the dimensions of existing enclosure and enclosure, and verify the performance of dual system and splitter integration. Therefore, we verified the performance of HADAX through the route control test, dual system test, and multi-channel communication test with splitter integrated connection by connecting with the existing signal equipment.

New Simple Power Analysis on scalar multiplication based on sABS recoding (sABS 형태의 스칼라 곱셈 연산에 대한 새로운 단순전력 공격)

  • Kim, Hee-Seok;Kim, Sung-Kyoung;Kim, Tae-Hyun;Park, Young-Ho;Lim, Jong-In;Han, Dong-Guk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.2
    • /
    • pp.115-123
    • /
    • 2007
  • In cryptographic devices like a smart-card whose computing ability and memory are limited, cryptographic algorithms should be performed efficiently. Scalar multiplication is very important operation in Elliptic Curve Cryptosystems, and so must be constructed in safety against side channel attack(SCA). But several countermeasures proposed against SCA are exposed weaknesses by new un-dreamed analysis. 'Double-and-add always scalar multiplication' algorithm adding dummy operation being known to secure against SPA is exposed weakness by Doubling Attack. But Doubling Attack cannot apply to sABS receding proposed by Hedabou, that is another countermeasure against SPA. Our paper proposes new strengthened Doubling Attacks that can break sABS receding SPA-countermeasure and a detailed method of our attacks through experimental result.

A Study on Contents Sharing Mechanism based on Proxy Re-Encryption Scheme using the Smart Card (스마트카드를 이용한 프록시 재 암호화 기법 기반 콘텐츠 공유 메커니즘에 관한 연구)

  • Park, Seung-Hwan;Koo, Woo-Kwon;Kim, Ki-Tak;Mun, Hye-Ran;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.3
    • /
    • pp.131-141
    • /
    • 2011
  • OMA(Open Mobile Alliance) is one of the most active group about DRM technology in mobile device field. OMA announced an OMA-DRM v 2.1 standardization in 2007. After then OMA announced OMA-SRM(Secure Removable Media) and SCE(Secure Contents Exchanges) that are the extension of OMA-DRM v2.1. In SCE, a user can form user domain to share contents and rights. So the user can share contents and rights with not only the the OMA-DRM v2.1 but also home devices like mobile phones, personal computers and audios. In this paper, we analyze a sharing technology of OMA-DRM and SCE, and then propose key distribution method using proxy re-encryption and smart card to use shared contents and rights.

A Convergence Technology of IPTV-RFID against Clone Attack (Clone 공격에 강한 IPTV-RFID 융합 기술)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Cheol;Lee, Sang-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.2
    • /
    • pp.145-156
    • /
    • 2010
  • Now a days, the development of TV and internet like communicational technique makes IPTV service which combines internet with multimedia contents increase. But when a user gets service in specific place, the certification process and user's ID check in IPTV service is complicate so that there occurs communicational difficulty like increasing illegal users and service delay etc. This paper proposes communication security mechanism to prevent Clone attack which happens in wireless section by efficiently extracting illegal user. The proposed mechanism performs key distribution procedure, inter certification procedure, and key initiation procedure by putting security agent in RFID-USB for RFID tags users use to perform plug-and-plug function. Also, the proposed mechanism updates the hased token value by its ID and the random number which RFID-USB creates whenever a user accesses in the area of RFID-USB so that it protects reply attack and man-in-the-middle attack which happen often in the area of wireless section.

Non-aqueous Zinc(Zn) Plating to Prevent Hydrogen Release from Test Specimens in Hydrogen Embrittlement Test (수소 취성 시험 평가를 위한 수소 방출 방지용 비수계 아연(Zn) 도금)

  • Jeon, Jun-Hyuck;Jang, JongKwan
    • Journal of the Korean Institute of Gas
    • /
    • v.26 no.3
    • /
    • pp.21-26
    • /
    • 2022
  • Zinc is emerging as a environment-friendly plating material to replace cadmium, which is harmful to the human body, to prevent hydrogen gas penetration or release from metal materials. Electroplating of Zn and Zn alloys, which is usually performed in an aqueous acidic atmosphere, has disadvantages such as low coulombic efficiency, corrosion, and hydrogen release, resulting in industrial use difficult. In this study, a deep-eutectic solvent was synthesized using choline chloride and ethylene glycol. Using this as a solvent, an electrolyte for Zn plating was prepared, and then zinc was plated on the STS 304 substrate. The surface microstructure and roughness were observed using SEM and AFM. The crystal structure of the electro-plated film was analyzed using XRD. Finally, the preventing effects of hydrogen release through Zn-based deep-eutectic plating on the STS 304 substrate were compared with the uncoated substrate.

Implementation and Utilization of Decentralized Identity-Based Mobile Student ID (분산 ID 기반 모바일 학생증 구현과 활용)

  • Cho, Seung-Hyun;Kang, Min-Jeong;Kang, Ji-Yun;Lee, Ji-Eun;Rhee, Kyung-Hyune
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.6
    • /
    • pp.1115-1126
    • /
    • 2021
  • In this paper, we developed a mobile student ID providing a self sovereignty identity (SSI) which replaces the conventional plastic-type student ID that includes private information of a student such as a name, a student number, a facial photo, etc. The implemented mobile student ID solves the problem of exposing student's identity due to a loss or a theft of a plastic-type student ID, and it has a structure and process of FRANCHISE model which is developed by a concept of a decentralized Identity(DID) of a Blockchain, in which specialized for convenience as an electronic student ID through an application on a smart phone device. In addition, it protects student's privacy by controlling personal information on oneself. By using a smartphone, not only it easily identifies the student but also it expands to several services such as participation in school events, online authentication, and a student's exchange program among colleges.

Synthesis of Cerium Doped Yttrium Aluminum Garnet Hollow Phosphor Based on Kirkendall Effect

  • Kim, Min-Jeong;Suphasis, Roy;Gong, Dal-Seong;Jeong, Hyeon-Seok
    • Proceedings of the Korean Vacuum Society Conference
    • /
    • 2012.08a
    • /
    • pp.185-185
    • /
    • 2012
  • 중공 발광 나노 물질은 특유의 구조적 특성(낮은 밀도, 높은 비표면적, 다공성 물질, 낮은 열팽창계수 등)과 광학적 성질을 이용하여 디스플레이 패널, 광결정, 약물전달체, 바이오 이미징 라벨 등의 다양한 적용이 가능하다. 이러한 적용에 있어 균일한 크기와 형태의 중공 입자는 필수 조건으로 여겨진다. 지금까지 합성된 중공 발광 입자에는 BaMgAl10O17 : Eu2+-Nd3+, Gd2O3 : Eu3+, $EuPO_4{\cdot}H_2O$과 같은 것들이 있으나 크기 조절이 어렵고, 그 균일성이 확보되지 못하였다. 균일한 크기의 중공 발광 입자를 만들기 위해 SiO2나 emulsion을 템플릿으로 이용하여 황화카드뮴, 카드뮴 셀레나이드 중공 입자를 합성한 예가 있으나, 양자점의 독성으로 인하여 바이오분야 응용에는 적합하지 않다. YAG는 모체로써 형광체에서 가장 많이 이용되는 물질로, 화학적 안정성과 낮은 독성, 높은 양자 효율 등 많은 장점을 갖고 있다. 특히 세륨이 도핑된 YAG형광체의 경우 WLED, 신틸레이터, 바이오산업에 적용이 가능하다. 그러나 지금까지 중공 YAG:Ce3+형광체를 합성한 예가 없었다. 본 연구에서는 단분산 수화 알루미늄 (Al(OH)3) 입자 위에 세륨이 도핑 된 이트륨 베이직 카보네이트 ($Y(OH)CO_3$)를 균일하게 코팅한 후 열처리를 하여 균일한 크기의 Y3Al5O12:Ce3+(YAG) 중공 입자를 합성하였다. 열처리 온도에 따른 고분해능 투과 전자 현미경(HRTEM), X-선 회절(XRD), 고분해능 에너지 분광법(HREDX) 분석결과, 중공 YAG: Ce3+입자는 Kirkendall 효과에 의해 형성됨을 확인하였다. 전계방사형 주사 전자 현미경(FE-SEM) 측정을 통해, 열처리 후에도 입자의 크기와 형태가 균일함을 확인하였으며, 공초점 현미경 관찰을 통해 중공 형태를 명확히 확인 할 수 있었다. Photoluminescence (PL) 분광법과 형광 수명 이미징 현미경(FLIM)을 이용한 광 특성 분석결과, 합성된 입자는 400-500 nm에서 흡수 파장 (456 nm에서 최대 강도)과 500-700 nm 범위의 발광 파장(544 nm에서 최대 강도)을 나타냈고, 상용 YAG: Ce3+(70 ns)에 준하는 74 ns의 잔광 시간(decay time)이 측정되었다. 단분산 수화 알루미늄 입자의 크기를 조절하여 최종 합성된 YAG: Ce3+의 크기를 조절할 수 있었다. 지름 약 600 nm의 Al(OH)3를 사용한 경우, $1,300^{\circ}C$에서 열처리를 한 후 평균 지름 590 nm의 중공입자를 합성하였고, 약 170 nm의 Al(OH)3를 이용하여, 더 낮은 온도인 $1,100^{\circ}C$에서의 열처리를 통해 평균지름 140 nm의 중공 YAG: Ce3+입자를 합성하였다. 본 연구를 통하여 합성된 균일한 크기의 YAG 중공입자는 LED와 같은 광전변환 소자 및 다기능성 바이오 이미징 등의 나노바이오 소자 분야에 활용될 수 있음이 기대된다.

  • PDF

Factors Affecting Continuous Intention to Use Mobile Wallet : Based on Value-based Adoption Model (모바일 지갑의 가치와 지속사용의도의 영향요인 : VAM 모형을 기반으로)

  • Lee, Chungah;Yun, Haejung;Lee, Chunghun;Lee, Choong C.
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.1
    • /
    • pp.117-135
    • /
    • 2015
  • Mobile wallet that can keep coupons and membership cards for mobile is one of rapidly growing services due to its usability and financial benefit. However, in spite of its rapid growth, the increase of users who do not use continuously it is an important consideration to service providers for making a profit. This study aims to test the effects of factors affecting the continuous use intention of mobile wallet based on VAM (Value-based Adoption Model) which can analyse them in both benefit and sacrifice aspects, so as to suggest considerations to increase the use period of mobile wallet for service providers. The research findings supported the hypotheses regarding to the effects of usefulness, value-expression, perceived security and enjoyment in the benefit aspect and technicality in the sacrifice aspect on perceived value. In addition, the causal path from perceived value to continuous use intention was significant. The study results are expected to be used in marketing or service improvement for short-term users by taking account of emotional factors as well as functional factors.

A Study on Releasing Cryptographic Key by Using Face and Iris Information on mobile phones (휴대폰 환경에서 얼굴 및 홍채 정보를 이용한 암호화키 생성에 관한 연구)

  • Han, Song-Yi;Park, Kang-Ryoung;Park, So-Young
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.44 no.6
    • /
    • pp.1-9
    • /
    • 2007
  • Recently, as a number of media are fused into a phone, the requirement of security of service provided on a mobile phone is increasing. For this, conventional cryptographic key based on password and security card is used in the mobile phone, but it has the characteristics which is easy to be vulnerable and to be illegally stolen. To overcome such a problem, the researches to generate key based on biometrics have been done. However, it has also the problem that biometric information is susceptible to the variation of environment, whereas conventional cryptographic system should generate invariant cryptographic key at any time. So, we propose new method of producing cryptographic key based on "Biometric matching-based key release" instead of "Biometric-based key generation" by using both face and iris information in order to overcome the unstability of uni-modal biometries. Also, by using mega-pixel camera embedded on mobile phone, we can provide users with convenience that both face and iris recognition is possible at the same time. Experimental results showed that we could obtain the EER(Equal Error Rate) performance of 0.5% when producing cryptographic key. And FAR was shown as about 0.002% in case of FRR of 25%. In addition, our system can provide the functionality of controlling FAR and FRR based on threshold.

A Study on Development of Voice and SMS Alarm System Based on MODBUS Protocol (MODBUS 프로토콜에서 작동되는 음성 및 SMS 경보 시스템 개발에 관한 연구)

  • Seol, Jun-Soo;Lee, Seung-Ho
    • Journal of IKEEE
    • /
    • v.19 no.3
    • /
    • pp.311-318
    • /
    • 2015
  • This dissertation proposes method for development technology of voice and SMS(Short Message Service) alarming system based on modbus protocol. The proposed technology is composed of the following 3 stages; hardware development based on microprocessor, development of input and output driver for modem, mp3 decoder, making modbus protocol stack. In the stage of hardware development based on microprocessor, we develop hardware which receives alarm from modbus master and transmit sms message, play mp3. In the stage of development of input / ouput device driver such as modem, mp3 decoder, we develop program which control each devices. In the stage of making modbus protocol stack, voice and sms alarm system is made for receiving alarm via modbus protocol. To evaluate performance of proposed technology, we issued alarm to voice and sms alarming system on purpose. As a result, response speed of detecting alarm was 10.7ms, communication distance was 1.2Km, operating temperature was from $-25^{\circ}C$ to $70^{\circ}C$, we confirmed supporting modbus protocol. And we verified that proposed voice and sms alarming system in the thesis has a performance to be used as an industrial building alarming system.