• Title/Summary/Keyword: Mobile Communication system

Search Result 3,106, Processing Time 0.028 seconds

Virtual Credit Card Number Payment System with Stored Hash Value for Efficient Authentication (효율적인 인증을 위한 해시 저장방식의 가상카드번호 결제 시스템)

  • Park, Chan-Ho;Kim, Gun-Woo;Park, Chang-Seop
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.1
    • /
    • pp.5-15
    • /
    • 2015
  • Electronic transactions have been increasing with the development of the high-speed Internet and wireless communication. However, in recent years financial corporations and mobile carriers were attacked by hackers. And large numbers of privacy information have been leaked. In particular, in the case of credit card information can be misused in the online transaction, and the damage of this given to cardholder. To prevent these problems, it has been proposed to use a virtual card number instead of the actual card number. But it has security vulnerability and requires additional security infrastructure. In this paper, we analyzed the proposed virtual card number schemes. and we propose a new virtual credit card number scheme. In the newly proposed scheme, cardholder generates a key pair (public key/private key) and pre-register public key to the issuer. then, cardholder can pay no additional security infrastructure while still efficiently satisfy the security requirements.

A Study on User Authentication of Mobile Internet Environment Based on WPKI - (무선 인터넷 환경의 WPKI 기반 사용자 인증에 관한 연구)

  • Lee, Cheol-Seung;Park, Young-Ok;Lee, Ho-Young;Lee, Jeon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.05a
    • /
    • pp.560-563
    • /
    • 2003
  • In this paper describes for use Authentication with the WPKI and Kerberos protocol. this paper is the security structure that defined in a WAP forum and security and watches all kinds of password related technology related to the existing authentication system. It looks up weakness point on security with a problem on the design that uses wireless public key-based structure and transmission hierarchical security back of a WAP forum, and a server-client holds for user authentication of an application level all and all, and it provides one counterproposal. Therefore, We offer authentication way solution that connected X.509 with using WIM for complement an authentication protocol Kerberos and its disadvantages.

  • PDF

Hybrid Scheduling in Millimeter Wave Full-Duplex Systems (밀리미터파 전 이중 시스템에서의 혼성 스케줄링)

  • Mai, Vien V.;Kim, Juyeop;Choi, Sang Won;Shin, Won-Yong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.1
    • /
    • pp.52-57
    • /
    • 2016
  • We introduce a hybrid scheduling in a multi-path poor scattering full-duplex (FD) system, which consists of one multi-antenna FD base station and a large number of single-antenna half-duplex mobile stations. Our hybrid scheduling utilizes partial channel state information at the transmitter. In particular, unlike the conventional scheduling method using opportunistic transmission for both uplink and downlink, the proposed scheme combines a random transmit beamforming for downlink and a zero forcing beamforming for uplink. As our main result, via computer simulations, it is shown that the proposed scheme has a superior sum-rate performance than that of the conventional scheduling method beyond a certain signal-to-noise ratio regime.

Digital Satellite Radio Broadcast Channel Information Search Process Method (Digital Satellite Radio 방송의 채널 정보 Searching 처리 Method에 관한 연구)

  • Lee, Seung-Hun;Na, Sang-Sin;Kim, Young-Kil
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.4
    • /
    • pp.803-809
    • /
    • 2011
  • In this paper, we present a very useful method for updating digital satellite radio broadcast channel information. When a devices equipped with function to receive Digital Satellite Radio such as Home Theater, MP3 player, mobile phones, car audio system and various other types of Digital Devices, receives new Digital satellite radio (will be mentioned as XM radio onwards) broadcast channel information, only the current received XM radio broadcast channel and N number of pre/post nearby broadcast channels are scanned randomly in zigzag manner. Then the previous XM radio broadcast channel information updated with the newly received XM radio broadcast channel information. Since this method can prevent batch update for all XM radio channel, including some channels which less likely did not select by user, update process for real time frequently changed XM radio broadcast channel information can be performed efficiently with minimal or without delay.

An exact floating point square root calculator using multiplier (곱셈기를 이용한 정확한 부동소수점 제곱근 계산기)

  • Cho, Gyeong-Yeon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.8
    • /
    • pp.1593-1600
    • /
    • 2009
  • There are two major algorithms to find a square root of floating point number, one is the Newton_Raphson algorithm and GoldSchmidt algorithm which calculate it approximately by iterating multiplications and the other is SRT algorithm which calculates it exactly by iterating subtractions. This paper proposes an exact floating point square root algorithm using only multiplication. At first an approximate inverse square root is calculated by Newton_Raphson algorithm, and then an exact square root algorithm by reducing an error in it and a compensation algorithm of it are proposed. The proposed algorithm is verified to calculate all of numbers in a single precision floating point number and 1 billion random numbers in a double precision floating point number. The proposed algorithm requires only the multipliers without another hardware, so it can be widely used in an embedded system and mobile production which requires an efact square root of floating point number.

Connectivity of the GAODV Routing Protocol (GAODV 라우팅 프로토콜의 연결성)

  • Choi, Youngchol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.7
    • /
    • pp.1306-1312
    • /
    • 2017
  • The route request (RREQ) packet is selectively re-broadcasted in the routing protocols that improve the broadcast storm problem of the ad-hoc on-demand routing protocol (AODV). However, in a low node density scenario, the connectivity of these selective rebroadcast schemes becomes less than that of the AODV. In order to clarify the requirements of these selective re-broadcast routing protocols, it is necessary to investigate the relationship between the node density and the connectivity. In this paper, we drive a probability to preserve the connectivity of the GAODV at an intermediate rebroadcast node. In addition, we present an intuitive method to approximate the end-to-end connectivity of the GAODV. We draw the required node density to guarantee the connectivity of 0.9 and 0.99 through computer simulations, and verify the validity of the derived theoritical connectivity by comparing with the simulation results.

Smartphone User Authentication Algorithm based on Mutual Cooperation in Mobile Environment (모바일 환경에서 상호 협력 기반 스마트폰 사용자 인증 알고리즘)

  • Jeong, Pil-Seong;Cho, Yang-Hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.7
    • /
    • pp.1393-1400
    • /
    • 2017
  • As the number of smartphone users increases, vulnerability to privacy protection is increasing. This is because personal information is stored on various servers connected to the Internet and the user is authenticated using the same ID and password. Authentication methods such as OTP, FIDO, and PIN codes have been introduced to solve traditional authentication methods, but their use is limited for authentication that requires sharing with other users. In this paper, we propose the authentication method that is needed for the management of shared information such as hospitals and corporations. The proposed algorithm is an algorithm that can authenticate users in the same place in real time using smart phone IMEI, QR code, BLE, push message. We propose an authentication algorithm that can perform user authentication through mutual cooperation using a smart phone and can cancel realtime authentication. And we designed and implemented a mutual authentication system using proposed algorithm.

A Method to utilize Inner and Outer SNS Method for Analyzing Preferences (선호도 분석을 위한 내·외부 SNS 활용기법)

  • Park, Sung-Hoon;Kim, Jindeog
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.12
    • /
    • pp.2871-2877
    • /
    • 2015
  • Shopping patterns are changing with the emergence of SNS. Recently, it is also interested in providing the information based on the users' needs. Generally, the provided information is obtained from the history of users' simple browsing. Best selling hot item list is also provided in order to reflect the preferences of public users. However, the provided information is irrelevant to an individual preference. In this paper, we propose a method to utilize inner and outer SNS for analyzing public preferences about goods which are interested by individual users. The inner analyzing module collects and analyzes the preferences of community members about two goods designated by individual users. The outer analyzing module supports to analyze public preferences by using the tweeter SNS. The results of implementation show that it is possible to recommend goods based on the individual users' preferences unlike the existing shopping mall.

Design and Implementation of a Java-Based WAP Transaction Layer with Priority Policy (자바기반 WAP 상의 우선순위 트랜잭션 계층의 설계 및 구현)

  • 이준규;임경수;안순신
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.2
    • /
    • pp.244-251
    • /
    • 2003
  • As the Internet and wireless mobile communication is being widespread, the WAP (Wireless Application Protocol) that merges these two technologies has emerged. Also, the research of the WAP gateway that enables efficient processing of multiple user demands concurrently and prompt response to requests from various wireless devices has been performed in many working groups. The WAP stack is the most fundamental technology among these researches. In this paper, we implement the WAP container utilizing the JAVA's multithreading and applying to the connection pooling technique to manage the available resource in the container efficiently. Also, we design and implement the WTP(Wireless Transaction Protocol) layer and the UDP(User Datagram Protocol) layer based on the priority Policy. Our design and implementation showed the shorter waiting time than that of the existing FCFS(First-Come, First-Served) system in the transaction layer and its efficiency was proved through simulation.

A Study on the Cell Planning Simulation of Mobile Radio Communication Networks Using a Propagation Prediction Model (전파예측모델에 의한 이동통신 무선망 셀 계획의 시뮬레이션 연구)

  • 최정민;오용선
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2003.11a
    • /
    • pp.204-209
    • /
    • 2003
  • In an urban area telecommunication using wireless system, the accurate prediction and analysis of wave propagation characteristics are very important to determine the service area, optimized selection of base station, and cell design, etc. In the stage of these analyses, we have to present the propagation prediction model which is varied with the type of antenna, directional angle, and configuration of the ground in our urban area. In addition we need to perform an analysis of the conventional model which is similar to ours and dig out the parameters to evaluate the wave environment before the cell design for the selected area. In this paper, we propose a wave propagation prediction model concerning the topography and obstacles in our urban area. We extract the parameters and apply them to the proposed wave environment for the simulation analyzing the propagation characteristics. Throughout these analyzing procedure, we extracted the essential parameters such as the position of the base station, the height of topography, and adequate type and height of the antenna with our preferable correctness.

  • PDF