• Title/Summary/Keyword: Digital card

Search Result 271, Processing Time 0.024 seconds

Security Analysis of a Biometric-Based User Authentication Scheme (Biometric 정보를 기반으로 하는 사용자 인증 스킴의 안전성 분석)

  • Lee, Young Sook
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.1
    • /
    • pp.81-87
    • /
    • 2014
  • Password-based authentication using smart card provides two factor authentications, namely a successful login requires the client to have a valid smart card and a correct password. While it provides stronger security guarantees than only password authentication, it could also fail if both authentication factors are compromised ((1) the user's smart card was stolen and (2) the user's password was exposed). In this case, there is no way to prevent the adversary from impersonating the user. Now, the new technology of biometrics is becoming a popular method for designing a more secure authentication scheme. In terms of physiological and behavior human characteristics, biometric information is used as a form of authentication factor. Biometric information, such as fingerprints, faces, voice, irises, hand geometry, and palmprints can be used to verify their identities. In this article, we review the biometric-based authentication scheme by Cheng et al. and provide a security analysis on the scheme. Our analysis shows that Cheng et al.'s scheme does not guarantee any kind of authentication, either server-to-user authentication or user-to-server authentication. The contribution of the current work is to demonstrate these by mounting two attacks, a server impersonation attack and a user impersonation attack, on Cheng et al.'s scheme. In addition, we propose the enhanced authentication scheme that eliminates the security vulnerabilities of Cheng et al.'s scheme.

Design and Implementation of Embedded Contactless (Type-B) Protocol Module for RFID (RFID를 위한 내장형 비접촉(Type-B) 프로토콜 지원 모듈 설계 및 구현)

  • Jeon, Yong-Sung;Park, Ji-Mann;Ju, Hong-Il;Jun, Sung-Ik
    • The KIPS Transactions:PartA
    • /
    • v.10A no.3
    • /
    • pp.255-260
    • /
    • 2003
  • In recent, as a typical example of RFID, the contactless IC card is widely used in traffic, access control system and so forth. And its use becomes a general tendency more and more because of the development of RF technology and improvement of requirement for user convenience. This paper describes the hardware module to process embedded contactless protocol for implementation contactless IC card. And the hardware module consists of analog circuits and specific digital logic circuits. This paper also describes more effective design method of contactless IC card, which method separates into analog circuit parts, digital logic circuit part, and software parts according to the role of the design parts.

ID-Based Cryptosystem and Digital Signature Scheme Using Discrete Logarithm Complexity (이산대수 문제를 이용한 ID 기본 암호시스템과 디지틀 서명방식에 관한 연구)

  • 염흥열
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.1 no.1
    • /
    • pp.3-15
    • /
    • 1991
  • in 1984 Shamir proposed the concept of ID(identity)-based cryptosystem and digital signature scheme wich does not require any public file for storing the user' s public keys. In this paper, the concept of the ID-based cryptosystem based on discrete logarithm problem using the conven-tional public-key cryptosystems is described, and the implementation method of the ID-based cryptosystem is also presented. The new digital signaturw schme based on the ID-based crypto-system is proposed and possible atacks are considered and analyzed for the security of digital signature scheme. The proposed ID-based schemes are particularrly useful for smart card and personal identification card application.

Secure Mobile Credit Card Payment Protocol based on Certificateless Signcryption (무인증서 서명 암호화 기법을 이용한 안전한 모바일 신용카드 결제 프로토콜)

  • Choi, Hui-Jin;Kim, Hyung-Jung
    • Journal of Digital Contents Society
    • /
    • v.14 no.1
    • /
    • pp.81-88
    • /
    • 2013
  • The increase of the smartphone users has popularized the mobile payment and the mobile credit card users are rapidly getting increased. The mobile credit cards that currently used provide its users with the service through downloading mobile credit card information into USIM. The mobile credit card saved in USIM has the minimized information for the security and is based on PKI. However certificate-based payment system has a complicated procedure and costs a lot of money to manage the certificates and CRL(Certificate Revocation List). Furthermore, It can be a obstacle to develop local e-commerce in Korea because it is hard for foreigners to use them. We propose the secure and efficient mobile credit card payment protocol based on certificateless signcryption which solve the problem of certificate use.

A Study on the Effect of Credit Card Usage on the Intention to Use Mobile Payment (신용카드 사용이 모바일 간편결제 이용의도에 미치는 영향에 관한 연구)

  • Lee, Eun-Mi;Goo, Jayoung James
    • Journal of Digital Convergence
    • /
    • v.18 no.4
    • /
    • pp.149-161
    • /
    • 2020
  • This paper aims to explore the question of whether the environment in Korea where credit card use is prevalent affects the intention to accept Fintech-based mobile payment. The institution that encourages the credit card use such as credit card receipt obligation may lead to the lock-in and build infrastructures to influence the acceptance of new payment acceptance. This paper investigates how the perceived of use, usefulness, accessibility and stability affect the intention to use mobile payment based on the Technology Acceptance Model(TAM) model with the mediator of lock-in and moderator of credit card receipt obligation. In the results, we found that the perceived usefulness, perceived ease of use and accessibility positively impact on the intention of mobile payment usages. It is also observed that the usefulness and accessibility of credit cards positively mediate to the intention of mobile payment use.

A Study on the Electromagnetic Card System of Arcade Games within the Framework of Relieving Speculation (사행성 완화 관점에서 아케이드게임의 전자카드제에 관한 연구)

  • Park, Jong-Il;Kim, Dong-Hyun;Huh, Moon-Haeng
    • Journal of Korea Game Society
    • /
    • v.11 no.6
    • /
    • pp.181-191
    • /
    • 2011
  • This study establishes the theory of minimizing the Speculation occurring and creates the promotion of the domestic Arcade Game. The study analyzed the present Game Rating of speculation standard in this field and compared the domestic instances with international ones. The study therefore proposes that the domestic game industry should adopt the future model of electromagnetic-card that will lead to the basis of the industry that is not under the system at present. The new system will also verify the useful alternative that will enhance the domestic Arcade Game.

Development of a Hydraulic Servo System Real-Time Simulator Using a One-board Microprocessor and Personal Computer (원보드 마이크로 프로세서 제어기 및 PC를 이용한 유압서보시스템의 실시간 시뮬레이터 개발)

  • Chang, Sung-Ouk;Lee, Jin-Kul
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.17 no.8
    • /
    • pp.94-99
    • /
    • 2000
  • In this study applied the general controller into th 16bit ordinary controller and recommand the simulator features the real system's propeties without DSP(Digital Signal Processing)-card. This simulator is designed to be synchronized in real time using A/D(Analog-Digital) convert and D/A(Digital-Analong) convert. In this study DSP card which is usually used for complex calculation is replaced with personal computer and designed to control, control-force using with the 16-bit micro processor.

  • PDF

A Study on Multi-Media Contents Security Using Android Phone for Safety Distribution (멀티미디어 콘텐츠의 안전한 유통을 위한 안드로이드 폰에 기반을 둔 보안에 관한 연구)

  • Shin, Seung-Soo;Kim, Yong-Young
    • Journal of Digital Convergence
    • /
    • v.10 no.6
    • /
    • pp.231-239
    • /
    • 2012
  • This paper tries to solve the problems which previous methods have such as the WCDRM(Watermark and Cryptography DRM) and the model using smart card for protecting digital contents. This study provides a contents distribution model to protect the rights of author, distributor, and user as well as user's information by using technologies such as cryptography, DRM(Digital Right Management), access control, etc. The proposed system is evaluated as the most safety model compared with previous methods because it not only solves the problems which the previous methods have, but also protects four type of risks such as use of contents which other mobile devices download, the attack on the key to decode the message, the attack on leaking the contents, and the internal attack such as an illegal reproduction.

Design and Implementation of Multimedia Functional Module for Digital TV (디지털 TV용 멀티미디어 부가기능 모듈의 설계 및 구현)

  • 김익환;최재승;임영철;남재열;하영호
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.41 no.6
    • /
    • pp.231-237
    • /
    • 2004
  • Current paper introduces the multimedia functional module and related interface development for digital TV. The module is developed for displaying the image captured by digital still camera, camcorder, or PC in the digital TV. For these purposes, the module has the interface circuit for accessing five media type of memory cards. It decodes JPEG, BMP, or TIFF image date saved in the memory card and converts the image data to analog RGB signal. It also supports three types of output image size from HD(High Definition) to WXGA(Wide Extended Graphics Array) resolution. So the introduced module could be adopted in all kinds of digital TV set.

Implementation of the Electronic Prescription Security System Using by an If Card (IC 카드에 의한 원외 전자처방전 보안을 위한 시스템 구축)

  • Kang, Se-Na;Lee, Ki-Han
    • The KIPS Transactions:PartC
    • /
    • v.10C no.3
    • /
    • pp.281-286
    • /
    • 2003
  • Nowadays, a patient's private medical data which is exposed to the outside world has a severe effect on not only the patient's private life but also his/her social activities and environment. So, it is important to securely protect the patient's private medical data from the illegal manipulation. This paper studies the method to store the electronic prescription information in an IC card. For that, an access control for users, such as a doctor, a nurse, a medical institute member, a pharmacy, a pharmacist, or a patient, is proposed to access the data stored in an IC card. The certificate is issued using the Crypto API of a certificate management model supported by Windows 2000. The public/private key is created by the Cryptographic Service Provider program, and the electronic prescription is signed using the digital signature. The proposed system, therefore, can improve the quality of medical services by securing the safety and integrity of the electronic prescription, stored in an IC card.