Abstract:
A method and a system for preventing location tracking for mobile phones and blocking denial for service usage in a mobile RFID(Radio Frequency Identification) service network are provided to guarantee the privacy of each individual by preventing a service provider from tracking the location of a mobile user and to revitalize a mobile RFID service by efficiently verifying a mobile user's service usage in case he denies it. A mobile service provider creates a pseudonym according to a request from a mobile phone which has acquired RFID information, and transmits the created pseudonym to the mobile phone(S210). Receiving the pseudonym, the mobile phone transmits the received pseudonym and the acquired RFID information to an RFID service provider(S220). The RFID service provider transmits contents equivalent to the RFID information to the mobile phone(S230).
Abstract:
An RFID security system and a method thereof are provided to enable a user to block access from illegal RFID readers by notifying a user of a use state of an RFID tag. A RFID tag(110) performs inter-authentication with the RFID reader(120) based on a service provision message including an RFID reader ID received from the RFID reader. An authentication server(130) authenticates the RFID reader and the service provided through the RFID reader based on a service authentication request message including the RFID reader ID received from the RFID reader. A user terminal determines validity of the service provided from the RFID reader by comparing the RFID reader ID received from the authentication server with the RFID reader ID received from the RFID tag. The authentication server includes a receiver receiving the service authentication request message, an authenticator authenticating the RFID reader and the service provided through the RFID reader based on the received message, and a transmitter transmitting ID information of the authentication RFID reader and service to the user terminal.
Abstract:
A system and method for controlling access to an RFID(Radio Frequency Identification) application level event service are provided to prevent a service from being provided to an unauthorized user without a permission, and a leakage of resources. An intrusion detecting unit(142) determines whether RFID middleware(13), which provides an RFID application level event service to a client host who has requested the corresponding service, has been illegally intruded or not by referring to audit information on the client host. An access control performing unit(143) receives a notification about the detection of an intrusion and controls access of the host to the event service. A security agreement unit(144) performs a security agreement with the host according to a security state of the middleware(13) communicating with the host.
Abstract:
본 발명은 팬시(Fancy) 스티커 타입의 RFID 태그, 및 그를 이용한 보안(프라이버시) 강화된 온/오프라인 연계 방법 및 그 단말기 장치에 관한 것이다. 이를 위하여 단말기 장치는 RFID리더를 포함하고, 프라이버시 관리시스템과 연계되어 원하는 사람만이 태그정보에 접근하도록 한다. 기존 RFID 또는 모바일 RFID 응용 서비스 모델은 사업자들이 RFID 태그를 상품에 부착하여 물류/유통 관리 및 상품의 광고, 정보의 전달 등의 목적으로 사용하는 것인데 반하여, 본 발명에서는 사용자들이 개인 용도로 RFID 태그를 활용할 수 있도록 하기 위해, 팬시(Fancy) 스티커 타입의 RFID 태그에 직접 자신의 프라이버시와 관계된 정보 또는 링크 정보를 저장하도록 한다. 이에 따라, 본 발명은 RFID 리더를 장착한 모바일 디바이스의 보급이 활성화 되고 태그의 값이 저렴해져 모바일 RFID 서비스가 활성화되는 경우, RFID 태그에 직접 자신의 프라이버시와 관계된 정보 또는 링크 정보를 저장하여 개인적으로 활용하고자 하는 소비자들의 욕구를 충족시킬 수 있으며, RFID 태그에 저장되는 프라이버시와 관계된 정보 또는 링크 정보에 사용자가 원하는 사람만이 접근할 수 있도록 하는 프라이버시 보호 메커니즘을 제공함으로써 신뢰성있고 안전한 서비스를 제공할 수 있다.
Abstract:
A finite operation device for ONB(Optimal Normal Basis) is provided to trade off an area and performance according to system requirement, and perform finite multiplication and finite reverse multiplication for the ONB with one operator by setting an operator mode with optimization of a finite multiplier and a finite reverse multiplier. The first multiplexer(100) selects a reverse multiplication input value or the first middle operation value. A register(200) stores the value selected by the first selector. A shifter(400) performs a cyclic shift operation of the selected value. The second multiplexer(300) selects multiplicand input of an ONB multiplier(600) by receiving output of the first register and the first middle operation value. The third multiplexer(500) selects multiplier input of the ONB multiplier by receiving the output of the shifter and the second middle operation value. The ONB multiplier performs the ONB finite multiplication by receiving the output of the second and third multiplexer. An output multiplexer(700) selects an output value of the ONB multiplier depending on the performed operation.
Abstract:
A system and a method for hiding an RFID(Radio Frequency IDentification) tag ID are provided to secure security of a mobile RFID service by hiding the RFID tag ID attached to an article, as the RFID tag ID is continuously changed by using a mobile terminal embedded with an RFID reader. A temporary ID generator(202) generates a temporary ID for hiding a unique ID of the RFID tag(101) attached to the article from the outside by encoding the unique ID of the RFID tag. An ID recoding controller(203) records the generated temporary ID to a tag ID recording area of the RFID tag. An ID decoder(204) decodes the recorded temporary ID in case that a situation for using the unique ID is generated after the temporary ID is recorded to the recording area. The temporary ID is generated by concatenating a random number to the unique ID.
Abstract:
PURPOSE: A public key encryption apparatus based on the prime field is provided, which improves the efficiency of the system as well is commonly utilized in various system required to operate encryption operation. CONSTITUTION: A public key encryption apparatus(100) based on the prime field includes a register(110), an RSA operational block(160), a modular inverse element calculation block(175), an ellipse curve calculation block(180), a modular operational block(170) and a controller(130). The register(110) stores the various data for the encryption operation. The RSA operational block(160) performs the RSA public key encryption operation. The modular inverse element calculation block(175) calculates the inverse element of the data based on the prime field. The ellipse curve calculation block(180) performs the ellipse curve public key encryption operation. The modular operational block(170) performs the repeat operation in the unit of the 32 bits so as to perform the RSA/ellipse curve encryption operations. And, the controller(130) reads/writes the data required to the encryption operation from the register(110) and controls the operations of each block to perform the encryption operation.
Abstract:
PURPOSE: An encryption system for an F8 encryption algorithm and an F9 integrity verification algorithm of IMT(International Mobile Telecommunication)-2000 system is provided to enhance the security of data by using a data encryption calculator between a terminal and an RNC system. CONSTITUTION: An encryption system includes an input/output system bus(10), a register file(11), a memory portion(13), and an F8_F9 calculator(12). The register file is used for storing input variables of an F8 encryption algorithm and an F9 integrity verification algorithm. The memory portion stores encoded output data and authentication code generation object data of the F8 encryption algorithm and the F9 integrity verification algorithm. The F8_F9 calculator performs selectively the F8 encryption algorithm and the F9 integrity verification algorithm in order to provide a message authentication code to the register file and output the encoded output data to the memory portion.
Abstract:
PURPOSE: An ellipse curve encryption device is provided to have a high security with maintaining a short key so as to authenticate a user in a system restricted in area such as an integrated(IC) card and to exchange the key values of the symmetric key system. CONSTITUTION: An ellipse curve encryption device includes a first storing register(201) for storing operational coefficient values of an ellipse curve encryption, a second storing register(202) for storing input values of operation for the ellipse curve encryption, an ellipse curve encryption operation module(205) for implementing the ellipse curve encryption operation by using the valued stored at the first and the second registers(201,202), a third register(203) for inputting to the ellipse curve encryption operation module(205) so as to use the following operation after the output value form the ellipse curve encryption operation module is stored at the register and an ellipse curve encryption controller(204) for controlling the ellipse curve encryption operation module(205) in response to the value stored the first register(201) and for managing the transmission of the operation result.
Abstract:
PURPOSE: An encryption processing apparatus for a high speed radio network switch is provided to process much data at a time with high throughput and little response time and to process little data rapidly with a little delay time. CONSTITUTION: According to the encryption processing apparatus for a high speed radio network switch performing security processing and integrity verification encryption algorithm processing in the high speed radio network switch, a memory memorizing device part(101) stores input/output protocol packet or data and command and control signals extracted from the packet. A shared memory memorizing device part(102) stores a packet and a control signal and command and data extracted from the packet. A memory control part(105) performs input/output control and synchronization of the memory memorizing device part and the shared memory memorizing device part. An encryption processing device part(107) processes security and integrity verification encryption algorithm. An external input/output control part(108) controls external input/output. An external network interface block(109) performs packet analysis operation as to a packet received from an external network connection network, and transmits the analyzed packet to the encryption processing device part or the memory memorizing device part or the shared memory memorizing device part. And a central processing part(100) performs basic protocol analysis and packet processing, memory management, shared memory management and encryption processor control.