• Title/Summary/Keyword: 전자카드

Search Result 563, Processing Time 0.026 seconds

The Trend of Smart Card Based Mobile Equipment Security (스마트카드 기반 휴대단말 보안기술 동향)

  • Kim, S.H.;Chung, B.H.
    • Electronics and Telecommunications Trends
    • /
    • v.17 no.3 s.75
    • /
    • pp.15-22
    • /
    • 2002
  • 본 고에서는 현재 개인용 보안장치로 가장 널리 사용되고 있는 스마트카드를 이용한 휴대단말기의 보안기술 동향에 대한 분석으로써, WAP 포럼에서의 WIM과 3GPP에서 논의되고 있는 USIM에 대한 기술과 향후 전망에 대해 기술하고자 한다.

A Countermeasures on Credit Card Crime Using Personal Credit Information (개인신용정보이용 신용카드범죄에 대한 대처방안)

  • Kim, Jong-Soo
    • Korean Security Journal
    • /
    • no.9
    • /
    • pp.27-68
    • /
    • 2005
  • Recently, because credit card crime using a personal credit information is increasing, professionalizing, and spreading the area, the loss occurring from credit card crime is enormous and is difficult to arrest and punish the criminals. At past, crime from forging and counterfeiting the credit card was originated by minority criminals, but at present, the types and appearance of credit card crime is very different to contrasting past crime. The numbers of people using credit card in the middle of 1990's was increasing and barometer of living conditions was evaluated by the number having credit card, therefore this bad phenomenon occurring from credit card crime was affected by abnormal consumption patterns. There is no need emphasizing the importance of personal credit card in this credit society. so, because credit card crime using personal credit card information has a bad effect, and brings the economic loss and harms to individuals, credit card company, and members joining credit card. Credit card crime using personal credit card information means the conduct using another people's credit card information(card number, expiring duration, secret number) that detected by unlawful means. And crime using dishonest means from another people's credit information is called a crime profiting money-making and a crime lending an illegal advance by making false documents. A findings on countermeasures of this study are as follows: Firstly, Diverting user's mind, improving the art of printing, and legitimating password from payment gateway was suggested. Secondly, Complementing input of password, disseminating the system of key-board protection, and promoting legitimations of immediate notification duty was suggested. Thirdly, Certificating the electronic certificates as a personal certificates, assuring the recognition by sense organ of organism, and lessening the ratio of crime occurrence, and restricting the ratio of the credit card crime was suggested.

  • PDF

Multi User-Authentication System using One Time-Pseudo Random Number and Personal DNA STR Information in RFID Smart Card (RFID 스마트카드내 DNA STR Information과 일회용 의사난수를 사용한 다중 사용자 인증시스템)

  • Sung, Soon-Hwa;Kong, Eun-Bae
    • The KIPS Transactions:PartC
    • /
    • v.10C no.6
    • /
    • pp.747-754
    • /
    • 2003
  • Thia paper suggests a milti user-authentication system comprises that DNA biometric informatiom, owner's RFID(Radio Frequency Identification) smartcard of hardware token, and PKI digital signqture of software. This system improved items proposed in [1] as follows : this mechanism provides one RFID smartcard instead of two user-authentication smartcard(the biometric registered seal card and the DNA personal ID card), and solbers user information exposure as RFID of low proce when the card is lost. In addition, this can be perfect multi user-autentication system to enable identification even in cases such as identical twins, the DNA collected from the blood of patient who has undergone a medical procedure involving blood replacement and the DNA of the blood donor, mutation in the DNA base of cancer cells and other cells. Therefore, the proposed system is applied to terminal log-on with RFID smart card that stores accurate digital DNA biometric information instead of present biometric user-authentication system with the card is lost, which doesn't expose any personal DNA information. The security of PKI digital signature private key can be improved because secure pseudo random number generator can generate infinite one-time pseudo randon number corresponding to a user ID to keep private key of PKI digital signature securely whenever authenticated users access a system. Un addition, this user-authentication system can be used in credit card, resident card, passport, etc. acceletating the use of biometric RFID smart' card. The security of proposed system is shown by statistical anaysis.

IC Card Security System for CEPS in Internet (CEPS 인터넷 서비스를 위한 IC카드 기반의 보안 시스템 구축)

  • Lee, Jong-Hoo;Ra, Eun-Ju;Baek, Sang-Soo;Ji, Seok-Jin;Lee, Yong;Ryu, Jae-Chul
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.3
    • /
    • pp.23-37
    • /
    • 2002
  • As the world-wide use of the Internet increases rapidly due to development of computer network the Electronic Commerce for business by treating it is growing as compared to the traditional one for the information exchange in the academic and research areas. The Electronic Payment System used for EC includes the Payment Broker System and the Electronic Purse System. And usually Electronic Purse System operates with IC cards. Saving the money in IC card has a high portability and security. Therefore, the Electronic purse System based on IC card is recently issued in the EC. In this paper, we design and implement of a IC card security system for Common Electronic Purse Specifications in Internet. CEPS is a Electronic Purse System proposed VISA, and conform EMV(Europay Mastercard VISA) security structure. With our system, users easily use Electronic Purse System with only Web browser and IC card. Original EMV paid no regard to using in the Internet. But our system, conforming to CEPS and EMV, is easily used in the Internet.

Design of COS for smart card user authentication using signature (서명을 이용한 스마트카드 사용자 인증을 위한 COS 설계)

  • 송영상;신인철
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.41 no.4
    • /
    • pp.103-112
    • /
    • 2004
  • This paper suggests the way to realize smart card security system by using handwritten signature instead of a password which is traditionally used for user authentication. Because of the familiarity of signature we don't need to try to remember the password and signature is difficult to be used by guess or illegal forced situation. The feature data of handwritten signature is large, so we designed COS which is consist of special commands for processing user's handwritten signature data, user authentication, and basic commands based on ISO 7816-3. Also protocol among user, smart card terminal and DB server is designed. In registration process, the feature data of user signature is saved in both a DB server and a smart card. User authentication is processed by comparing the user signature and the saved feature data in a smart card and in a DB server. And the authentication result and hash value of signature data in DB server are transferred to smart card. During this process the authentication between DB server and user is finished. The proposed security system has more higher level of security in user authentication of smart card and it will Provide safer and more convenient security services.

Mobile application for preventing card loss using the NFC technology (NFC 기술을 이용한 카드 분실을 방지하기 위한 모바일 앱)

  • Kang, Ki-Beom;Jwa, Jeong-Woo;Kim, Soon-Whan;Kim, Heung-Soo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.12 no.1
    • /
    • pp.181-188
    • /
    • 2017
  • As smart phone users increase the number of users who insert credit cards into wallet type smart phone cases is increasing. In this paper, we developed an Android application for preventing credit card loss in a wallet type smart phone case using the NFC (Near Field Communication) technology of smart phone. The developed android application uses the NFC reading and writing functions of the smart phone. When the credit card is inserted into the wallet type smart phone case, the android application detects the NFC tag in the credit card and registers credit card information. When the credit card is removed from the smart phone case, the Android application automatically detects the credit card loss and notifies to the user. The user can check and finds the location information of the lost credit card on the map of the Android application. We can easily develop the Android application for preventing credit card loss when a function that automatically detects an leaving NFC tag is added to Android.

Development of Application using Java Card in IMT-2000 (IMT-2000서비스 상에서의 Java Card를 이용한 M-commerce용 어플리케이션 개발)

  • 백장미;홍인식
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.04a
    • /
    • pp.427-429
    • /
    • 2002
  • 이동형 무선 단말기의 사용이 급증함에 따라, M-commerce 시대로 바뀌고 있다. 특히 USIM 카드가 내장되어 있는 IMT-2000 서비스가 시작되면, 무선 인터넷 시장은 급속도로 발전할 것이다. 본 논문은 무선 인터넷 응용 프로그램의 개발을 위하여 USIM 카드 상에서의 Java Card를 활용한다. Java Card는 자바 언어를 사용하여 프로그램을 개발할 수 있으며, 다양한 어플리케이션의 개발이 가능하다. 본 연구는 Java Card의 유용성을 증명하기 위하여 실제 생활에 적용 가능한 지불 솔루션으로서 전자화폐 시스템과 마일리지 시스템을 개발한다. 즉, One 카드 개념으로서 USIM 카드 하나로 다양한 기능을 제공할 수 있다는 것을 증명한다.

  • PDF

Implementation of APDU Auto-Analyzer for using applications on Java Card (자바카드 애플리케이션 활용을 위한 APDU 자동 분석기 구현)

  • 조증보;김도우;정민수
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2002.05d
    • /
    • pp.983-988
    • /
    • 2002
  • 전자 화폐에 대한 관심이 많이 증가한 요즘, 스마트 카드 기반의 자바 카드에 대한 연구가 활발히 진행되고 있다. 이에, 자바 카드 플랫폼으로 수행 가능한 다양한 애플리케이션을 실제로 생성해서 실행 가능한 파일로 변환하는 과정과 사용되는 파일들의 분석을 본 논문에서 중점으로 다룬다. 그리고 생성된 파일의 구조을 자동으로 분석해내는 APDU 자동 분석기에 대한 내용도 다룬다.

  • PDF

Implementation of SEED Using Java Card API (자바 카드 API를 이용한 SEED 알고리즘 구현)

  • 채철주;이성현;이재광
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2004.05a
    • /
    • pp.283-288
    • /
    • 2004
  • Authentication and digital signature make secured existing contract in remote spot. But, It required method of storing and managing secret, such as private key password. For this method, we make efforts solution of security with smart cart, such as java card. This paper implement SEED algorithm based on Java Card

  • PDF