• Title/Summary/Keyword: Identity card

Search Result 64, Processing Time 0.024 seconds

ID-Based Cryptosystem and Digital Signature Scheme Using Discrete Logarithm Complexity (이산대수 문제를 이용한 ID 기본 암호시스템과 디지틀 서명방식에 관한 연구)

  • 염흥열
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.1 no.1
    • /
    • pp.3-15
    • /
    • 1991
  • in 1984 Shamir proposed the concept of ID(identity)-based cryptosystem and digital signature scheme wich does not require any public file for storing the user' s public keys. In this paper, the concept of the ID-based cryptosystem based on discrete logarithm problem using the conven-tional public-key cryptosystems is described, and the implementation method of the ID-based cryptosystem is also presented. The new digital signaturw schme based on the ID-based crypto-system is proposed and possible atacks are considered and analyzed for the security of digital signature scheme. The proposed ID-based schemes are particularrly useful for smart card and personal identification card application.

An Extended Multi-Server-Based User Authentication and Key Agreement Scheme with User Anonymity

  • Li, Chun-Ta;Lee, Cheng-Chi;Weng, Chi-Yao;Fan, Chun-I
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.1
    • /
    • pp.119-131
    • /
    • 2013
  • With the explosive growth of computer networks, many remote service providing servers and multi-server network architecture are provided and it is extremely inconvenient for users to remember numerous different identities and passwords. Therefore, it is important to provide a mechanism for a remote user to use single identity and password to access multi-server network architecture without repetitive registration and various multi-server authentication schemes have been proposed in recent years. Recently, Tsaur et al. proposed an efficient and secure smart card based user authentication and key agreement scheme for multi-server environments. They claimed that their scheme satisfies all of the requirements needed for achieving secure password authentication in multi-server environments and gives the formal proof on the execution of the proposed authenticated key agreement scheme. However, we find that Tsaur et al.'s scheme is still vulnerable to impersonation attack and many logged-in users' attack. We propose an extended scheme that not only removes the aforementioned weaknesses on their scheme but also achieves user anonymity for hiding login user's real identity. Compared with other previous related schemes, our proposed scheme keeps the efficiency and security and is more suitable for the practical applications.

An Approach on the Scheme Interactive of Electronic Trade Payment System Type (전자무역결제 유형의 제도적 상호관계성에 따른 접근방안)

  • Lee, Je-Hong
    • International Commerce and Information Review
    • /
    • v.9 no.1
    • /
    • pp.149-168
    • /
    • 2007
  • e-Trade Payment system has been transformed by quickly and effectively. The e-trade Payment system such as TradeCard System, Bolero Surf, Identrus Eleanor and e-Escrow and e-letter of Credit issued by SWIFT System enable partly sellers, buyers and service providers. This paper studies for SWIFT, Surf, TradeCard, Eleanor, e-Escrow as international trade payment, As reason following : The First, Bolero is a neutral secure platform enabling paperless trading between exporter, importer, and their logistics service and bank partners, insurance company. The Second, TradeCard is to manage procurement-to-payment worldwide, that is exporter, importer and connected partners, paperless platform. The Third, Identrus is the global leader in trusted identity solutions, recognized by global financial institutions, commercial organizations and bank partners around the world. The Forth, Escrow payment have effect to L/C issue and enter into electronic contracts in internet bank. Trader practice use Escrow Bank as the same bank that rules to Issuing Bank and Advising Bank and payment, acceptance. This paper of these electronic payment have studies new international trade payment to approach such as eUCP rules and TradeCard System, Surf of bolero, eleanor of Identrus, SWIFT.

  • PDF

SVM-Based Speaker Verification System for Match-on-Card and Its Hardware Implementation

  • Choi, Woo-Yong;Ahn, Do-Sung;Pan, Sung-Bum;Chung, Kyo-Il;Chung, Yong-Wha;Chung, Sang-Hwa
    • ETRI Journal
    • /
    • v.28 no.3
    • /
    • pp.320-328
    • /
    • 2006
  • Using biometrics to verify a person's identity has several advantages over the present practice of personal identification numbers (PINs) and passwords. To gain maximum security in a verification system using biometrics, the computation of the verification as well as the storing of the biometric pattern has to take place in a smart card. However, there is an open issue of integrating biometrics into a smart card because of its limited resources (processing power and memory space). In this paper, we propose a speaker verification algorithm using a support vector machine (SVM) with a very few features, and implemented it on a 32-bit smart card. The proposed algorithm can reduce the required memory space by a factor of more than 100 and can be executed in real-time. Also, we propose a hardware design for the algorithm on a field-programmable gate array (FPGA)-based platform. Based on the experimental results, our SVM solution can provide superior performance over typical speaker verification solutions. Furthermore, our FPGA-based solution can achieve a speed-up of 50 times over a software-based solution.

  • PDF

Discussion on the Establishment of Identity of Fisheries Cooperatives as Solution of the Problems of Comprehensive Measures for a Soft Landing of Household Debts (가계부채 연착륙 종합대책의 문제점과 그 해법으로써 수산업협동조합의 정체성 확립에 관한 논의)

  • Jeon, Hyeong-Soo
    • The Journal of Fisheries Business Administration
    • /
    • v.42 no.3
    • /
    • pp.95-107
    • /
    • 2011
  • The Comprehensive Measures for a soft landing of Household Debts affecting the credit service of Fisheries Cooperative (FC) have been known to the public in June 2011. Its essential points are as follows: 1) Abolition of Tax-free Regulation, 2) Set limit of loans, etc. per person, 3) Introduce leverage regulations for credit-specialized financial sector i. e. FC, 4) Gradually strengthen loan-loss reserve requirements for card-loan and other credit loans. However, the Financial Policy Measures seem to pay no attention to the Cooperative's Values, Principles and Identity. In this paper, emphasis is be placed on the task of the regulators i. e. Financial Services Commission and Financial Supervice Service to lift the Financial Measures negatively affecting the operation of fund of FCs, and on the establishment of Cooperative identity in order to further develop FCs.

Design of a Data Analysis System with Wireless LAN for a Train Operating (열차운행시 무선LAN을 적용한 데이터 분석시스템의 설계)

  • 이우철;서상준;박계서
    • Proceedings of the KSR Conference
    • /
    • 2000.05a
    • /
    • pp.180-187
    • /
    • 2000
  • This paper presents the system of analyzing data in memory of TCMS. This system can show physical data in memory to text and graphic : format. To transfer data from TCMS to this system, a large number of system have used to memory IC card. the method of using memory IC card as a intermediation has many points at issue, that is a speed of transmitting data, life time of IC card and identity of train system each other. So this paper proposes that the method of wireless LAM be adopted by this system to improve the week point of previous method and other method to better the method of wireless LAN.

  • PDF

The Study on the Influence of Domestic Credit Card Design Elements on Credit Card Selection -Focusing on 30, 40 Housewives- (국내 신용카드디자인요소가 신용카드 선택에 미치는 영향에 관한 연구 -전업주부 30, 40대를 중심으로-)

  • Cho, Hye-Ryung;Kim, Seung-In
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.11
    • /
    • pp.263-269
    • /
    • 2017
  • Credit card holders are showing a higher level of psychology to show their identity beyond the means of payment. The purpose of this study is to investigate which design factors affect the 30th and 40th generation housewives when issuing credit cards. A total of 200 people in the 30s and 40s housewives who live in Seoul and the metropolitan area were selected from among the customers who use the credit card, and the effect of the design factors of the domestic credit card on the selection of the credit card, Based on previous studies, questionnaires were prepared and surveyed. As a result of the survey, it was found that the color design of the credit card design element was the achromatic system and the main image was the simple design which only used the color without emphasizing the image or the logo, and then the character type was preferred. I prefer not to have a card decoration, and I have found that a metal-like card material is the most preferred. Through this, I would like to suggest directions for the design development for 30 and 40 housewives in credit card companies.

A Study on Authentication Process in Smartphone Electronic Financial Services (스마트폰 전자금융서비스에서의 인증과정에 관한 연구(앱카드를 중심으로))

  • Kim, Hanwoo;Lee, Keun Young;Lim, Jong In;Kwon, Hun Yeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.3
    • /
    • pp.579-590
    • /
    • 2018
  • In May 2014, AppCard(Which is a smartphone application designed to register and use a credit card in a mobile phone by credit card company.) was attacked by smshing and a vulnerability which could not obtainable phone number. After that, credit card companies have supplemented and operated by introducing additional authentication methods to supplement the vulnerability. However, The analysis of the authentication environments, purposes and methods is not enough to lower the level of vulnerability and risk from existing accidents. This study analyzes the authentication process of the AppCard in the electronic financial service by applying the NIST's authentication guidelines, identifies the problems and suggests improvement directions. The method analyzed in this study can be applied to the analysis of the authentication method in addition to the application card, so that it will be highly utilized.

A Memory-Efficient Fingerprint Verification Algorithm Using a Multi-Resolution Accumulator Array

  • Pan, Sung-Bum;Gil, Youn-Hee;Moon, Dae-Sung;Chung, Yong-Wha;Park, Chee-Hang
    • ETRI Journal
    • /
    • v.25 no.3
    • /
    • pp.179-186
    • /
    • 2003
  • Using biometrics to verify a person's identity has several advantages over the present practices of personal identification numbers (PINs) and passwords. At the same time, improvements in VLSI technology have recently led to the introduction of smart cards with 32-bit RISC processors. To gain maximum security in verification systems using biometrics, verification as well as storage of the biometric pattern must be done in the smart card. However, because of the limited resources (processing power and memory space) of the smart card, integrating biometrics into it is still an open challenge. In this paper, we propose a fingerprint verification algorithm using a multi-resolution accumulator array that can be executed in restricted environments such as the smart card. We first evaluate both the number of instructions executed and the memory requirement for each step of a typical fingerprint verification algorithm. We then develop a memory-efficient algorithm for the most memory-consuming step (alignment) using a multi-resolution accumulator array. Our experimental results show that the proposed algorithm can reduce the required memory space by a factor of 40 and can be executed in real time in resource-constrained environments without significantly degrading accuracy.

  • PDF

Design Flaws and Cryptanalysis of Cui et al's User Authentication Scheme

  • Park, Mi-Og
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.10
    • /
    • pp.41-48
    • /
    • 2019
  • In 2018, Cui et al proposed a three-factor remote user authentication scheme using biometrics. Cui et al claimed that their authentication scheme is vulnerable to eavesdropping attack, stolen smart card attack, and especially Dos(denial-of-service) attack. Also they claimed that it is safe to password guessing attack, impersonation attack, and anonymity attack. In this paper, however, we analyze Cui et al's authentication scheme and show that it is vulnerable to replay attack, insider attack, stolen smart card attack, and user impersonation attack, etc. In addition, we present the design flaws in Cui et al's authentication scheme as well.