• Title/Summary/Keyword: Smart-key system

Search Result 519, Processing Time 0.021 seconds

The Development of a One-time Password Mechanism Improving on S/KEY (S/KEY를 개선한 일회용 패스워드 메커니즘 개발)

  • 박중길
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.9 no.2
    • /
    • pp.25-36
    • /
    • 1999
  • In this paper we propose a one-time password mechanism that solves the problems of the S/KEY: the limitation of a usage and the need of storage for keys. because of using a cryptographic algorithm the proposed mechanism has no the limitation of a usage. Also because of producing the key for an authentication from a user's password it is easy to manage the authentication key and is possible to share the session key between a client and a server after the authentication process. In addition the proposed mechanism is easy to protect and manage the authentication information because of using a smart card and is adopted by the system that needs a noe-way authentication from a client to a server without the challenge of a server.

A Design of Safe AKA Module for Adapted Mobile Payment System on Openness SMART Phone Environment (개방형 스마트 폰 환경에 적합한 모바일 결제 시스템을 위한 안전한 AKA(Authentication Key Agreement) 모듈 설계)

  • Jeong, Eun-Hee;Lee, Byung-Kwan
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.11
    • /
    • pp.1687-1697
    • /
    • 2010
  • The USIM-based AKA authentication process is essential to a mobile payment system on smart phone environment. In this paper a payment protocol and an AKA module are designed for mobile payment system which is suitable for openness smart phone environment. The payment protocol designs the cross authentication among components of the mobile payment system to improve the reliability of the components. The AKA module of mobile payment system based on 3GPP-AKA protocol prevents the exposure of IMSI by creating the SSK(Shared Secure Key) through advance registration and solves the SQN(SeQuence Number) synchronization problem by using timestamp. Also, by using the SSK instead of authentication vector between SN and authentication center, the existing bandwidth $(688{\times}N){\times}R$ bit between them is reduced to $320{\times}R$ bit or $368{\times}R$ bit. It creates CK and IK which are message encryption key by using OT-SSK(One-Time SSK) between MS and SN. In addition, creating the new OT-SSK whenever MS is connected to SN, it prevents the data replay attack.

Free vibrations of a two-cable network inter-supported by cross-links extended to ground

  • Zhou, H.J.;Wu, Y.H.;Li, L.X.;Sun, L.M.;Xing, F.
    • Smart Structures and Systems
    • /
    • v.23 no.6
    • /
    • pp.653-667
    • /
    • 2019
  • Using cross-ties to connect cables together when forming a cable network is regarded as an efficient method of mitigating cable vibrations. Cross-ties have been extended and fixed on bridge decks or towers in some engineering applications. However, the dynamics of this kind of system need to be further studied, and the effects of extending cross-links to bridge decks/towers on the modal response of the system should be assessed in detail. In this paper, a system of two cables connected by an inter-supported cross-link with another lower cross-link extended to the ground is proposed and analyzed. The characteristic equation of the system is derived, and some limiting solutions in closed form of the system are derived. Roots of cable system with special configurations are also discussed, attention being given to the case when the two cables are identical. A predictable mode behavior was found when the stiffness of inter-connection cross-link and the cross-link extended to the ground were the same. The vector of mode energy distribution and the degree of mode localization index are proposed so as to distinguish global and local modes. The change of mode behaviors is further discussed in the case when the two cables are not identical. Effects of cross-link stiffness, cross-link location, mass-tension ratio, cable length ratio and frequency ratio on $1^{st}$ mode frequency and mode shape are addressed.

A Study of a Secure Smart Car System using Attribute-based Delegation Method (속성 기반 권한위임 관리 기법을 사용한 스마트 자동차 안전성 검토에 관한 연구)

  • Kim, Jin-Mook;Moon, Jeong-Kyung;Hwang, Deuk-Young
    • Convergence Security Journal
    • /
    • v.19 no.3
    • /
    • pp.71-79
    • /
    • 2019
  • The demand of smart cars is increasing rapidly. International stand organize such as 3GPP and 5GAA are proposing standard communication protocvols for connected-car, and automotive network infrastructure. But Smart car network have many security threats and more dangerous against the existed wire communication network. Typically, peripheral devices of a smart car may disguise their identity and steal location information and personal information about the vehicle. In addition, the infrastructure elements around smart cars can conspire and put driving cars in danger, threatening lives. This is a very serious security threat. Therefore, in order to solve these problems, we proposed a system that is secure from collusion and tampering attacks using attribute-based authorize delegation method and threshold encryption algorithms. We have demonstrated using a semantic safety model that the proposed system can be safe from collusion attack.

Development of PIR Sensor Based Indoor Location Detection System for Smart Home (스마트 홈을 위한 PIR 센서 기반 댁내 위치 인식 시스템 개발)

  • Ha, Kyoung-Nam;Lee, Kyung-Chang;Lee, Suk
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.12 no.9
    • /
    • pp.905-911
    • /
    • 2006
  • Smart homes are expected to offer various intelligent services by recognizing the residents' life pattern, health, and feeling. One of the key issues for realizing the smart home is how to detect the locations of residents. Currently, the research effort is focused on two approaches: terminal-based and non-terminal-based method. The terminal-based method employs a type of device that should be carried by the resident while the non-terminal-based method has no such device. This paper presents a novel non-terminal-based approach using an array of pyroelectric infrared sensors (PIRs) that can detect residents. The feasibility of the system is evaluated experimentally on a test bed.

Smart Grid-The next Generation Electricity Grid with Power Flow Optimization and High Power Quality

  • Hu, Jiefeng;Zhu, Jianguo;Platt, Glenn
    • Journal of international Conference on Electrical Machines and Systems
    • /
    • v.1 no.4
    • /
    • pp.425-433
    • /
    • 2012
  • As the demand for electric power increases rapidly and the amount of fossil fuels decreases year by year, making use of renewable resources seem very necessary. However, due to the discontinuous nature of renewable resources and the hierarchical topology of existing grids, power quality and grid stability will deteriorate as more and more distributed generations (DGs) are connected to the grids. It is a good idea to combine local utilization, local consumption, energy storage and DGs to form a grid-friendly micro grid, these micro grids can then assembled into an intelligent power system - the smart Grid. It can optimize power flow and integrate power generation and consumption effectively. Most importantly, the power quality and grid stability can be improved greatly. This paper depicts how the smart grid addresses the current issues of a power system. It also figures out the key technologies and expectations of the smart grid.

An Anonymous Rights Trading System using group signature schemes (그룹서명을 이용하여 익명성이 보장되는 디지털 권한 전달 시스템)

  • 주학수;김대엽;이동훈
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.1
    • /
    • pp.3-13
    • /
    • 2004
  • E-Commerce is suddenly spreading in a daily life. A rights trading system is a system that circulates digital-tickets such as plane tickets, software license, coupon. There are two main approaches so far account-based and smart-card based systems. The NTT Proposed FlexToken, a new smart card based copy prevention scheme for digital rights. They Proposed using pseudonymous self certified keys of Petersen and Horster in order to ensure anonymity of users. However. Petersen and Holster's scheme should register a pseudonymous key pair at TTP (One-time) every time so that users create the signature which is satisfied with unlinkability property In this paper, we propose a new anonymous rights trading system using group signature. This paper has a meaning having applied to digital rights trading system an efficient smart card based group signature.

A Study on Improving the Accuracy of Wafer Align Mark Center Detection Using Variable Thresholds (가변 Threshold를 이용한 Wafer Align Mark 중점 검출 정밀도 향상 연구)

  • Hyeon Gyu Kim;Hak Jun Lee;Jaehyun Park
    • Journal of the Semiconductor & Display Technology
    • /
    • v.22 no.4
    • /
    • pp.108-112
    • /
    • 2023
  • Precision manufacturing technology is rapidly developing due to the extreme miniaturization of semiconductor processes to comply with Moore's Law. Accurate and precise alignment, which is one of the key elements of the semiconductor pre-process and post-process, is very important in the semiconductor process. The center detection of wafer align marks plays a key role in improving yield by reducing defects and research on accurate detection methods for this is necessary. Methods for accurate alignment using traditional image sensors can cause problems due to changes in image brightness and noise. To solve this problem, engineers must go directly into the line and perform maintenance work. This paper emphasizes that the development of AI technology can provide innovative solutions in the semiconductor process as high-resolution image and image processing technology also develops. This study proposes a new wafer center detection method through variable thresholding. And this study introduces a method for detecting the center that is less sensitive to the brightness of LEDs by utilizing a high-performance object detection model such as YOLOv8 without relying on existing algorithms. Through this, we aim to enable precise wafer focus detection using artificial intelligence.

  • PDF

Design of Secure Internet Phone using Smart Card (스마트카드를 이용한 안전한 인터넷 전화 설계)

  • 박진호;정진욱
    • Convergence Security Journal
    • /
    • v.2 no.1
    • /
    • pp.59-68
    • /
    • 2002
  • The smart card including memory and processor is able to simple process such as privilege unauthorized access and used to Authentication System for security. In this paper, we propose using the smart card in the key exchange phase when secure Internet phones conversation, so certainly guarantee to mutual authentication and secret communication.

  • PDF

Effective Hand Gesture Recognition by Key Frame Selection and 3D Neural Network

  • Hoang, Nguyen Ngoc;Lee, Guee-Sang;Kim, Soo-Hyung;Yang, Hyung-Jeong
    • Smart Media Journal
    • /
    • v.9 no.1
    • /
    • pp.23-29
    • /
    • 2020
  • This paper presents an approach for dynamic hand gesture recognition by using algorithm based on 3D Convolutional Neural Network (3D_CNN), which is later extended to 3D Residual Networks (3D_ResNet), and the neural network based key frame selection. Typically, 3D deep neural network is used to classify gestures from the input of image frames, randomly sampled from a video data. In this work, to improve the classification performance, we employ key frames which represent the overall video, as the input of the classification network. The key frames are extracted by SegNet instead of conventional clustering algorithms for video summarization (VSUMM) which require heavy computation. By using a deep neural network, key frame selection can be performed in a real-time system. Experiments are conducted using 3D convolutional kernels such as 3D_CNN, Inflated 3D_CNN (I3D) and 3D_ResNet for gesture classification. Our algorithm achieved up to 97.8% of classification accuracy on the Cambridge gesture dataset. The experimental results show that the proposed approach is efficient and outperforms existing methods.