• Title/Summary/Keyword: Identity card

Search Result 64, Processing Time 0.02 seconds

Design of an Authentication System Based on Personal Identity Verification Card (전자신분증 기반의 개인 신분확인을 위한 인증시스템 설계)

  • Park, Young-Ho;Kong, Byung-Un;Rhee, Kyung-Hyune
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.8
    • /
    • pp.1029-1040
    • /
    • 2011
  • Electronic identity (e-ID) card based on smartcard is a representative identity credential for on-line and off-line personal identification. The e-ID card can store the personal identity information securely, so that the information can be accessed fast, automated identity verification and used to determine the cardholder's authorization to access protected resources. Due to such features of an e-ID card, the number of government organizations and corporate enterprises that consider using e-ID card for identity management is increasing. In this paper, we present an authentication framework for access control system using e-ID cards by discussing the threat environment and security requirement against e-ID card. Specifically, to accomplish our purpose, we consider the Personal Identity Verification system as our target model.

Android Based Mobile Student Identity Card (안드로이드 기반 모바일 학생증)

  • Choi, Sungjik;Kim, Minji;Han, Jeungwook;An, Beongku
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.2
    • /
    • pp.209-215
    • /
    • 2013
  • Currently Plastic Student Identity Card has not been used frequently because it is inconvenient to possess. In this paper, we propose and develope Mobile Student Identity Card(MSIC) which consists of combination of smart phone and student identity card to support convenient campus life for students in school. The main features of the developed MSIC are as follows. First, it can confirm student identity and offer MSIC to each students by using Database. Second, it can support convenient campus life for students by adequate layout. In the performance evaluation, we use development kit based on Android and AVD(Android Virture Device) for simulation.

A Case Study of Brand Experience through Credit Card Design (신용카드 디자인을 통한 브랜드 경험 사례 연구)

  • Kim, Gi-Lim;Kim, Seung-In
    • Journal of Digital Convergence
    • /
    • v.18 no.11
    • /
    • pp.477-483
    • /
    • 2020
  • Credit cards are becoming an important marketing tool that reveals brand identity beyond payment methods. The purpose of this study is to suggest an effective design strategy plan by analyzing credit card design case that provided a positive brand experience among the cases of implementing the brand identity of a domestic credit card. The design of a representative credit card brand in Korea was analyzed according to Schmidt's experience type. As a result of analysis, when designing a credit card, it maximizes the visual effect with colors suitable for each theme, presents a multi-faceted experience that stimulates the five senses of the consumer, and provides an active brand experience that can reminisce the benefits of a credit card. It was found to be effective in revealing the brand identity. This study is meaningful in that local credit card companies offer design directions that can positively imprint brands on consumers through credit card designs.

An Exploratory Study on the Effects of Relational Benefits and Brand Identity : mediating effect of brand identity (관계혜택과 브랜드 동일시의 역할에 관한 탐색적 연구: 브랜드 동일시의 매개역할을 중심으로)

  • Bang, Jounghae;Jung, Jiyeon;Lee, Eunhyung;Kang, Hyunmo
    • Asia Marketing Journal
    • /
    • v.12 no.2
    • /
    • pp.155-175
    • /
    • 2010
  • Most of the service industries including finance and telecommunications have become matured and saturated. The competitions have become severe while the differences among brands become smaller. Therefore maintaining good relationships with customers has been critical for the service providers. In case of credit card and debit card, the similar patterns are shown. It is important for them to maintain good relationships with customers, and therefore, they have used marketing program which provides customized services to customers and utilizes the membership programs. Not only do they build and maintain good relationships, but also highlight their brands from the emotional aspects. For example, KB Card or Hyundai Card uses well-known designers' works for their credit card design. As well, they differentiate the designs of credit cards to stress on their brand personalities. BC Card introduced the credit card with perfume that a customer would like. Even though the credit card is small and not shown to public easily, it becomes more important for those companies to touch the customers' feelings with the brand personalities and their images. This is partly because of changes in consumers' lifestyles. Y-generations becomes highly likely to express themselves in many different ways and more emotional than X-generations. For the Y-generations, therefore, even credit cards in the wallet should be personalized and well-designed. In line with it, credit cards with good design can be seen as an example of brand identity, where different design for each customer can be used to recognize the membership groups that customers want to belong. On the other hand, these credit card companies offer the special treatment benefits for those customers who are heavy users for the cards. For example, those customers who love sports will receive some special discounts when they use their credit cards for sports related products. Therefore this study attempted to explore the relationships between relational benefits, brand identification and loyalty. It has been well known that relational benefits and brand identification lead to loyalty independently from many other studies, but there has been few study to review all the three variables all together in a research model. Furthermore, as reviewed above, in the card industry, many companies attempt to associate the brand image with their products to fit their customers' lifestyles while relational benefits are still playing an important role for their business. Therefore in our research model, relational benefits, brand identification, and loyalty are all included. We focus on the mediating effect of brand identification. From the relational benefits perspective, only special treatment benefit and confidence benefit are included. Social benefit is not applicable for this credit card industry because not many cases of face-to-face interaction can be found. From the brand identification perspective, personal brand identity and social brand identity are reviewed and included in the model. Overall, the research model emphasizes that the relationships between relational benefits and loyalty will be mediated by the effect of brand identification. The effects of relational benefits which are confidence benefit and special treatment benefits on loyalty will be realized when they fit to the personal brand identity and social brand identity. In the research model, therefore, the relationships between confidence benefit and social brand identity, and between confidence benefit and personal identity are hypothesized while the effects of special treatment benefit on social brand identity and personal brand identity are hypothesized. Loyalty, then, is hypothesized to have positive relationships with personal brand identity and social brand identity. In addition, confidence benefit among the relational benefits is expected to have a direct, positive relationship with loyalty because confidence benefit has been recognized as a critical factor for good relationships and satisfaction. Data were collected from college students who have been using either credit cards or debit cards. College students were regarded good subjects because they are in Y-generation cohorts and have tendency to express themselves more. Total sample size was two hundred three at the beginning, but after deleting those data with many missing values, one hundred ninety-seven data points were remained and used for the model testing. Measurement items were brought from the previous literatures and modified for this research. To test the reliability, using SPSS 14, chronbach's α was examined and all the values were from .874 to .928 exceeding over .7. Using AMOS 7.0, confirmatory factor analysis was conducted to investigate the measurement model. The measurement model was found good fit with χ2(67)=188.388 (p= .000), GFI=.886, AGFI=.821, CFI=.941, RMSEA=.096. Using AMOS 7.0, structural equation modeling has been used to analyze the research model. Overall, the research model fit were χ2(68)=188.670 (p= .000), GFI=.886, AGFI=,824 CFI=.942, RMSEA=.095 indicating good fit. In details, all the paths hypothesized in the research model were found significant except for the path from social brand identity to loyalty. Personal brand identity leads to loyalty while both confidence benefit and special treatment benefit have a positive relationships with personal and social identities. As well, confidence benefit has a direct positive effect on loyalty. The results indicates the followings. First, personal brand identity plays an important role for credit/debit card usage. Therefore even for the products which are not shown to public easy, design and emotional aspect can be important to fit the customers' lifestyles. Second, confidence benefit and special treatment benefit have a positive effects on personal brand identity. Therefore it will be needed for marketers to associate the special treatment and trust and confidence benefits with personal image, personality and personal identity. Third, this study found again the importance of confidence and trust. However interestingly enough, social brand identity was not found to be significantly related to loyalty. It can be explained that the main sample of this study consists of college students. Those strategies to facilitate social brand identity are focused on high social status groups while college students have not been established their status yet.

  • PDF

A Study of the Damage and the Countermeasure by Identification Card Loss (신분증 분실에 따른 피해 및 대응책에 관한 연구)

  • Lee, Younggyo;Ahn, Jeonghee
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.3
    • /
    • pp.53-64
    • /
    • 2017
  • Korean Identification card or driver license is usually used to verify one's identity in Korea. These are also used as an adult certification. Since the form of these ID card is an analog and it needs to be checked with naked eyes, it might be used maliciously. Someone who's got someone else's ID card can do other things. Therefore, it must be reported rapidly when ID card is lost or stolen. The most serious problem might be occurred when they do not recognize and report the loss. They might suffer from pecuniary or mental damage such as opening a mobile phone service, providing loan or credit card, opening a personal checking account, etc. Thus, this study suggests and compares the ways of avoiding these problems. First, the most effective way is to send the authorization code via mobile phones in consideration of build-up period and cost. The person in charge of business processing department using ID card sends the authorization code via registered mobile phone. The owners submits it to the person and their identifications are confirmed. Next effective way is that the person in charge of business processing department using ID card sends text messages via registered mobile phone. Lastly, the most ineffective way is to introduce and implement the electronic ID card ultimately even though it is expensive and takes a long time to build up the system.

Implementation of the T:1 protocol based on lava Card for USIM (자바 카드를 기반으로 한 UISM 용 T=1 프로토콜의 구현)

  • 주홍일;한종욱
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.800-803
    • /
    • 2004
  • This paper describes the design and implementation of the T=1 protocol based on lava Card. The T=1 protocol implemented in this paper complies with ISO/IEC 7816 standard. Also, JCOS(Java Card Operating Systems) including the contactless card protocol conforms to Java Card 2.2.1 specification and is running on 32-bit ARM7/TDMI processor. The protocol stack proposed and implemented in this paper is easy to maintenance of protocol independently. To verify the T=1 protocol implemented in this paper we tested the T=1 protocol scenarios defined in ISO/IEC 7816-3 Annex A. And we tested using USIM(Universal Subscriber Identity Module) cards, which include the implemented T=1 protocol. The T=1 protocol was tested and passed all against the specification 3GPP TS 31.122, which was the Conformance Test Specification for USIM cards including the test suites of both transmission protocols.

  • PDF

Brand Concept Elaboration Strategy for an Extended Brand: a Case Study for KB Kookmin Card

  • Chun, Seungwoo;Yoo, Changjo;Lee, Sukekyu;Lee, Seon Min
    • Asia Marketing Journal
    • /
    • v.14 no.3
    • /
    • pp.153-167
    • /
    • 2012
  • KB Kookmin Card has separated as an independent corporation from KB Kookmin Bank Credit Card Business Group on March, 2011. Ever since, KB Kookmin Card worked to build its own brand identity. The strategic preparation and conscientious implementations made KB Kookmin Card position in consumer's mind with a strong and unique brand image. Its new brand image was rooted in the inherited strengths of reliable and sincere image. However, it faced the challenge to compete in credit card industry in which most competitors had an advanced and sophisticated image. The strengths of KB Kookmin Card were also at the same time their limitations. KB Kookmin Card took a strategy that strengthened the strengths and improved the weaknesses. It focused on the core competence of being a people's sincere life supporter that helps people make savings from everyday events to make a good sum rather than being a lump sum benefit. The brand introduction strategy was implemented in 2011. The implementation focused on the activities that made internal as well as external customers be aware of the brand. Communication programs using a variety of media were executed to attain this goal. In 2012, second phase communication programs were introduced to elaborate the newly established brand image. It introduced many extended products as well as accessory programs which targeted the segments. Also, various CSR activities in many social domains helped consumers and the public to consider KB Kookmin Card an authentic, caring, trustworthy, and consistently-developing supporter in their everyday lives.

  • PDF

Analysis of Internet Identity Management 2.0 and Perspective of 3.0 (인터넷 신원 관리 2.0에 대한 분석과 3.0에 대한 전망)

  • Park, Seung-Chul
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.7
    • /
    • pp.1501-1509
    • /
    • 2011
  • Current identity management 1.0 model, which is service provider-centric and isolated, has several problems such as low usability, high cost structure, difficulty in privacy protection, and lack of trust infrastructure. Though various SSO-based identity management 2.0 models including Passport/Live ID, Liberty Alliance/SAML, CardSpace, and OpenID have been recently developed in order to overcome those problems, they are not widely accepted in real Internet environment so as to replace the existing identity management 1.0 model. This paper firstly analyzes the widely-known identity 2.0 models in a comparative way, and then presents a perspective on the development direction of identity management 3.0 model for future Internet.

A Lightweight Three-Party Privacy-preserving Authentication Key Exchange Protocol Using Smart Card

  • Li, Xiaowei;Zhang, Yuqing;Liu, Xuefeng;Cao, Jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.5
    • /
    • pp.1313-1327
    • /
    • 2013
  • How to make people keep both the confidentiality of the sensitive data and the privacy of their real identity in communication networks has been a hot topic in recent years. Researchers proposed privacy-preserving authenticated key exchange protocols (PPAKE) to answer this question. However, lots of PPAKE protocols need users to remember long secrets which are inconvenient for them. In this paper we propose a lightweight three-party privacy-preserving authentication key exchange (3PPAKE) protocol using smart card to address the problem. The advantages of the new 3PPAKE protocol are: 1. The only secrets that the users need to remember in the authentication are their short passwords; 2. Both of the users can negotiate a common key and keep their identity privacy, i.e., providing anonymity for both users in the communication; 3. It enjoys better performance in terms of computation cost and security. The security of the scheme is given in the random oracle model. To the best of our knowledge, the new protocol is the first provably secure authentication protocol which provides anonymity for both users in the three-party setting.

A Study on Measures for Preventing Credit Card Fraud (신용카드 부정사용 방지 방안에 관한 연구)

  • Jeong, Gi Seog
    • Convergence Security Journal
    • /
    • v.16 no.5
    • /
    • pp.33-40
    • /
    • 2016
  • Credit card is means of payment used like cash in terms of function and its users have increased consistently. With development of Internet and electronic commerce a role as payment method of credit card has been growing. But as the risk which results from centralized information and online increases, credit card fraud is also growing. Card theft and loss are decreasing due to countermeasure of card companies and financial supervisory authorities, while card forge and identity theft are increasing. Recently because of frequent personal information leakage and deregulation of financial security following easy-to-use payment enforcement, customer's anxiety about card fraud is growing. And the increase of card fraud lowers trust on credit system as well as causes social costs. In this paper, the security problems of card operating system are addressed in depth and the measures such as immediate switch to IC card terminals, introduction of new security technology, supervision reinforcement of the authorities are proposed.