• Title/Summary/Keyword: Java Card

Search Result 89, Processing Time 0.03 seconds

Certificate Issureing Method based on JavaCard with ECC/ECDSA Cryptography Algorithms (ECC/ECDSA 암호 알고리즘을 장착한 자바 카드 기반의 인증서 발행 방법)

  • Kim, Eun-Hwan;Park, Mi-Og;Jun, Moon-Seog
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.04b
    • /
    • pp.891-894
    • /
    • 2002
  • 최근 일반인들을 대상으로 인터넷 서비스가 보편화되면서 인터넷 뱅킹이나 전자 상거래등을 통해 구매정보나 지불 정보 혹은 개인 신상 정보 등과 같은 중요한 정보의 전송에 보안의 중요성이 더욱 증대되어지고 있는 실정이다. 본 논문에서는 자바 카드와 ECC/ECDSA 알고리즘을 소개하고, 현재 자바 카드에서 지원하지 않는 ECC/ECDSA 알고리즘을 설계하여 자바 카드에 장착하였다. 그러므로 자바 카드를 이용하여 중요한 정보를 암호화/복호화 할 수 있도록 구현하였다. 또한, 인증서에서 사용하는 키들을 자바 스마트 카드를 사용하여 제공하는 방법을 제안하였다.

  • PDF

Remote Method Invocation in Java Card (자바 카드에서의 원격 메소드 호출)

  • Kim, Young-Jin;Chung, Yong-Wha;Chung, Kyo-Il
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.04b
    • /
    • pp.1223-1226
    • /
    • 2002
  • 자바 카드 기술은 자바 기술을 스마트 카드에 최적화시키면서 자바 카드 플랫폼을 상위 자바 플랫폼에 접합시키는 방향으로 발전하고 있는 추세이다. 최근 발표된 SUN의 자바 카드 2.2 에서 지원되는 카드(서버)와 카드 리더(클라이언트)간의 원격 메소드 호출 인터페이스가 대표적인 예이다. 자바의 원격 메소드 호출은 서버와 클라이언트간의 상호 정의된 원격 객체의 메소드 호출에 대한 인터페이스를 제공하여, 다른 주소에 존재하는 자바 가상 기계들 사이에 메소드 호출이 가능하게 하는 것이다. 본 논문에서는 자바 카드에서의 원격 메소드 호출 인터페이스에 대해 살펴보고 구현 및 이용 방법에 대해서도 살펴보고자 한다.

  • PDF

A Study on the Implementation of Java Card Verification Systems Using the Biometric Information (생체인식 정보를 이용한 자바카드 인증시스템 구현에 관한 연구)

  • Bae, Seong-Hwan;Bae, Ji-Hyae;Jo, Han-Shin;Park, Yoon-Young;Jeon, Seong-Ik
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2004.05a
    • /
    • pp.1115-1118
    • /
    • 2004
  • 최근 자바카드 기술이 기존의 스마트카드 기술의 문제점들을 해결할 수 있는 새로운 대안으로 등장하고 있고, 카드 소유자의 사용자 인증은 자바카드의 활용을 위해 필수적인 부분이다. 이에 본 논문에서는 스마트카드 상에서 자바카드 실행 환경을 위한 바이오메트릭 API의 구현을 통해 사용자 인증 시스템 구축 방법에 관하여 기술하였다. 본 논문은 먼저 자바카드에 관한 기술 동향 및 분석 등을 기술하였고, 자바카드 바이오메트릭 API에 관하여 설명하였다. 또한, 구현된 바이오메트릭 API를 사용하여 기존의 스마트카드에서 사용되었던 다양한 인증 수단 외에 다양한 생체 정보들을 이용하여 사용자 인증을 제공할 수 있도록 하였다.

  • PDF

Mutual Authentication between the mobile node in Ad-hoc Network (Ad-hoc 망에서 이동 노드 간 상호 인증)

  • Choi, Woo-Jin;Seok, Gyeong-Hyu
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.10 no.10
    • /
    • pp.1087-1092
    • /
    • 2015
  • It was diversified demand for a wireless network to the rapid growth of the Internet, the time and space that are not in the new level of Internet technology, limits the Ad-hoc networks are needed. Ad-hoc networks do not communicate with the central station, each of the mobile nodes included in the network communicate with each other by the relay role. In recent years, the Ad-hoc wireless networks in a variety of routing protocols and network security, research is actively underway for the authentication method, but the security of wireless Internet and Ad-hoc networks, certification is incomplete situation. This paper considers the authentication and key agreement technique applicability of the USIM card using the DSR routing protocol of the Java Card and Ad-hoc networks, we propose a secure authentication mechanism between the mobile node.

Analysis and simulator implementation of Mighty, an advanced imperfect information game

  • Lee, Jeongwon;Kim, Kwihoon;Kim, Seung-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.1
    • /
    • pp.9-21
    • /
    • 2022
  • Mighty is an imperfect information game, similar to the internationally popular four-player card game Bridge, but more complex in terms of game rules and operation. An environment for exploring and analyzing the strategy of the Mighty Game is required, but compared to the development of many simulators for strategy analysis of other card games such as Bridge, there is no analysis tool for the Mighty Game. Even the definition and understanding of the Mighty game at the academic level is lacking. To solve these problems, this paper systematically defined the procedures and rules of the Mighty Game. And based on this definition, we implemented a simulator that can learn Mighty game and analyze various strategies. For the usability and accessibility of the service, the simulator was developed with JavaScript, and various analysis functions are provided in the web environment. Lastly, comparative analysis with other trick-taking games dealt with in the related research domain showed that the Mighty game has its value as an incomplete information game and that there are many characteristics that make it easy to apply AI-based learning methods.

A Study on Open API of Securities and Investment Companies in Korea for Activating Big Data

  • Ryu, Gui Yeol
    • International journal of advanced smart convergence
    • /
    • v.8 no.2
    • /
    • pp.102-108
    • /
    • 2019
  • Big data was associated with three key concepts, volume, variety, and velocity. Securities and investment services produce and store a large data of text/numbers. They have also the most data per company on the average in the US. Gartner found that the demand for big data in finance was 25%, which was the highest. Therefore securities and investment companies produce the largest data such as text/numbers, and have the highest demand. And insurance companies and credit card companies are using big data more actively than banking companies in Korea. Researches on the use of big data in securities and investment companies have been found to be insignificant. We surveyed 22 major securities and investment companies in Korea for activating big data. We can see they actively use AI for investment recommend. As for big data of securities and investment companies, we studied open API. Of the major 22 securities and investment companies, only six securities and investment companies are offering open APIs. The user OS is 100% Windows, and the language used is mainly VB, C#, MFC, and Excel provided by Windows. There is a difficulty in real-time analysis and decision making since developers cannot receive data directly using Hadoop, the big data platform. Development manuals are mainly provided on the Web, and only three companies provide as files. The development documentation for the file format is more convenient than web type. In order to activate big data in the securities and investment fields, we found that they should support Linux, and Java, Python, easy-to-view development manuals, videos such as YouTube.

An Integrated Management Method of Mileage in Mobile Smart Phone Environment (모바일 스마트폰 환경에서 마일리지의 통합적관리방법)

  • Kang, Yeon Ah;Lee, Sun Young;Kim, Min Seok;Lee, Seok Lyong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.11a
    • /
    • pp.1674-1677
    • /
    • 2010
  • 고객관리가 대두되면서 고객유지 및 관리를 위한 마케팅 기법 중에서 중요한 것이 마일리지 적립마케팅이며, 대표적인 방식으로 자바 카드(Java card)와 같은 스마트 카드 방식 및 스티커 또는 쿠폰, 도장을 이용한 방식을 들 수 있다. 그러나 현재 많은 업계에서 도입한 마일리지 관리가 오히려 다수의 마일리지 카드 소지로 인해 고객에게 불편함을 주고 있다. 몇몇 기업에서는 같은 계열사의 마일리지를 통합 관리하는 방식을 선보였으나, 불편함을 줄이기엔 역부족이었다. 본 논문에서는 현재 국내 및 전 세계에서 스마트폰 이용이 확산되고 있는 시점에서 스마트 폰의 한 종류인 애플사의 아이폰 어플리케이션, 즉 앱(App)을 활용하여 개인의 마일리지를 보다 효율적으로 관리할 수 있는 마일리지 통합 관리 시스템을 제안한다.

User Authentication Mechanism for using a Secure IPTV Service in Mobile Device (이동 장비에서 안전한 IPTV 서비스를 사용하기 위한 사용자 인증 메커니즘)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Cheol;Lee, Sang-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.4B
    • /
    • pp.377-386
    • /
    • 2009
  • IPTV technology for providing multimedia content with high-speed is the network which combines existing network, multimedia and internet technology etc. But internet, broadcasting and web technologies which is now being used is not optimized to IPTV because the security problem between user who gets content service through mobile units and content server is not guaranteed. This paper proposes user certification mechanism between mobile device and content server to receive the service which the user for the content chooses by mobile device safely. The proposed mechanism uses the random number which user creates and certification token for preventing illegal user who uses other's service that already paid. Also the proposed protocol encrypts the delicate data like user's information or profile using shared-key between java card attached on user's mobile device and grant sewer and then prevents reply attack which happens often in wireless section and man-in-the-middle attack by MAC.

Spatio-temporal Analysis of Population Distribution in Seoul via Integrating Transportation and Land Use Information, Based on Four-Dimensional Visualization Methods (교통과 토지이용 정보를 결합한 서울 인구분포의 시공간적 분석: 4차원 시각화 방법을 토대로)

  • Lee, Keumsook;Kim, Ho Sung
    • Journal of the Economic Geographical Society of Korea
    • /
    • v.21 no.1
    • /
    • pp.20-33
    • /
    • 2018
  • Population distribution in urban space varies with transportation flow changing along time of day. Transportation flow is directly affected by the activities of urbanites and the distribution of related facilities, since the flow is the result of moving to the point where the facilities associated with their activities are located. It is thus necessary to analyze the spatio-temporal characteristics of the urban population distribution by integrating the distribution of activity spaces related to the daily life of urbanites and the flow of transportation. The purpose of this study is to analyze the population distribution in urban space with daily and weekly time bases using the building database and T-card database in the city of Seoul, which is rich in information on land use and transportation flow. For a time-based analysis that is difficult to grasp by general statistical techniques, a four-dimensional visualization method combining time and space using a Java program is devised. Dynamic visualization in the four-dimensional space and time allows intuitive analysis and makes it possible to understand more effectively the spatio-temporal characteristics of population distribution. For this purpose, buildings are classified into three activity groups: residential, working, and commercial according to their purpose, and the number of passengers traveling to and from each stop site of bus and subway networks in the T-card database for one week is calculated in one-minute increments, Visualizing these and integrating transportation and land use, we analyze spatio-temporal characteristics of the population distribution in Seoul. As a result, it is found that the population distribution of Seoul displays distinct spatio-temporal characteristics according to land use. In particular, there is a clear difference in the population distribution pattern along the time axis according to the mixed aspects of working, commercial, and residential activities. The results of this study can be very useful for transportation and location planning of city facilities.