• Title/Summary/Keyword: Mobile ticketing

Search Result 15, Processing Time 0.028 seconds

A Study on Network Service Using Authorization Ticket in AAA system (AAA시스템의 인가 티켓을 이용한 네트워크 서비스에 관한 연구)

  • Kang, Seo-Il;Lee, Im-Yeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.4
    • /
    • pp.11-19
    • /
    • 2007
  • A ubiquitous network environment is a system where the user can avail of the network's services anytime, anywhere. To establish such an environment, studies continue being conducted on wireless communication technology and mobile terminals. The company that provides such services should have an established system for authentication, authorization and charging for users. This service is referred to as Authentication, Authorization, Accounting(AAA), and its aspects have been consistently studied. On the other hand, existing studies have been promoted with regard to the authentication and efficiency of the mobile terminal. One of the method is that the mobile terminal contacts to the home authentication server through the external authentication server every time it is required and; another one is to use a medium server to provide authentication in the middle between them. Thus, this study aims to determine the best method to use ticketing, where tickets are provided through a mobile terminal, complete with authentication and authorization features. Also, as it uses ticket, it can efficiently provide mobile verification processing.

Mobile Payment and Operation System for the Local Area Festival (지역 기반 문화축제를 위한 모바일 결제 및 운영 시스템)

  • Park, Kiung;Lee, Jae-Won
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.9
    • /
    • pp.402-410
    • /
    • 2019
  • Local area festivals have grown on a scale for the past 20 years, but have suffered ups and downs. Through the trial and error of the festival operation, problems such as prediction of the number of visitors, planning of event scale, calculation and expansion of sales volume, and management of various participants in the duration were highlighted. To solve, this study designed and developed a mobile payment system and festival operation management system for local scale festivals as a platform operating system of web and app combined. The results of this study presents four basic functions. It includes ticketing management, attendance identification and entrance control, charge of festival currency and use of payments, real-time provision and management of related information, and performance reporting for each role. It was applied to local festivals in practice as to enable local shop owners to participate in advertisements or sponsorships and confirmed their contribution to local commercial market and the revitalization of festivals through this system.

A Study on the NFC Services for Social Networking Applications (소셜 네트워킹 응용을 위한 NFC 서비스에 관한 연구)

  • Roh, Jae-Sung;Kim, Wan-Tae;Lee, Man-Hee
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.568-570
    • /
    • 2013
  • NFC represents the 2nd generation of the proximity contact-less technology, which beyond the RFID, supports peer-to-peer communication, and enables consumer access to aggregated services, anytime, anywhere, with any type of consumer stationary and mobile devices. NFC is a short range device wireless technology designed to exchange data, initiate connections with other wireless networks and act as a secured smart key for access to services such as cashless payment, ticketing, on-line entertainment and access control. In this paper, the NFC services for social networking applications are studied, and the signal flow of SNS application based on NFC P2P for smart devices and server model is proposed.

  • PDF

Study on NFC Security Analysis and UICC Alternative Effect (NFC 보안 기술 분석 및 UICC 적용 효과 연구)

  • Lim, Sun-Hee;Jeon, Jae-Woo;Jung, Im-Jin;Yi, Ok-Yeon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.1B
    • /
    • pp.29-36
    • /
    • 2011
  • Near Field Communication is an emerging short-range wireless connectivity technology that offers proximity and different operating modes. Particularly, NFC technology has the potential to revolutionize mobile applications like payment and ticketing because NFC is more complex and mutual connectivity than RFID as the simple tag reader. Finally, NFC security technology defines the robust security protocols. This paper will specify and analyze the NFC security technology, and study the chance and its beneficial effect of the UICC card as the NFC Secure Element.

Shuffling of Elliptic Curve Cryptography Key on Device Payment

  • Kennedy, Chinyere Grace;Cho, Dongsub
    • Journal of Korea Multimedia Society
    • /
    • v.22 no.4
    • /
    • pp.463-471
    • /
    • 2019
  • The growth of mobile technology particularly smartphone applications such as ticketing, access control, and making payments are on the increase. Elliptic Curve Cryptography (ECC)-based systems have also become widely available in the market offering various convenient services by bringing smartphones in proximity to ECC-enabled objects. When a system user attempts to establish a connection, the AIK sends hashes to a server that then verifies the values. ECC can be used with various operating systems in conjunction with other technologies such as biometric verification systems, smart cards, anti-virus programs, and firewalls. The use of Elliptic-curve cryptography ensures efficient verification and signing of security status verification reports which allows the system to take advantage of Trusted Computing Technologies. This paper proposes a device payment method based on ECC and Shuffling based on distributed key exchange. Our study focuses on the secure and efficient implementation of ECC in payment device. This novel approach is well secure against intruders and will prevent the unauthorized extraction of information from communication. It converts plaintext into ASCII value that leads to the point of curve, then after, it performs shuffling to encrypt and decrypt the data to generate secret shared key used by both sender and receiver.