69 research outputs found

    An asynchronous java processor for smart card.

    Get PDF
    Yu Chun-Pong.Thesis (M.Phil.)--Chinese University of Hong Kong, 2003.Includes bibliographical references (leaves 60-61).Abstracts in English and Chinese.Abstract of this thesis entitled: --- p.i摘要 --- p.iiiAcknowledgements --- p.ivTable of contents --- p.vList of Tables --- p.viList of Figures --- p.viiChapter Chapter 1 --- Introduction --- p.1Chapter 1.1 --- Asynchronous design --- p.1Chapter 1.2 --- Java processor for contactless smart card [3] --- p.2Chapter 1.3 --- Motivation --- p.3Chapter Chapter 2 --- Asynchronous circuit design techniques --- p.5Chapter 2.1 --- Overview --- p.5Chapter 2.2 --- Handshake protocol --- p.5Chapter 2.3 --- Asynchronous pipeline --- p.7Chapter 2.4 --- Asynchronous control elements --- p.9Chapter Chapter 3 --- Asynchronous Java Processor --- p.15Chapter 3.1 --- Instruction Set --- p.15Chapter 3.2 --- Architecture of the java processor --- p.17Chapter 3.3 --- Basic building blocks of the java processor --- p.22Chapter 3.4 --- Token flow --- p.32Chapter Chapter 4 --- Results and Discussion --- p.37Chapter 4.1 --- Simulation Results of test programs --- p.37Chapter 4.2 --- Experimental result --- p.41Chapter 4.3 --- Future work --- p.42Chapter Chapter 5 --- Conclusion --- p.45Appendix --- p.47Chip micrograph for the java processor core --- p.47Pin assignment of the java processor --- p.48Schematic of the java processor --- p.52Schematic of the decoder --- p.54Schematic of the Stage2 of the java processor --- p.55Schematic of the stack --- p.56Schematic of the block of the local variables --- p.57Schematic of the 16-bit self-timed adder --- p.58The schematic and the layout of the memory cell --- p.59Reference --- p.6

    Realization of card-centric framework: a card-centric computer.

    Get PDF
    San, Chi Leung.Thesis (M.Phil.)--Chinese University of Hong Kong, 2005.Includes bibliographical references (leaves 81-82).Abstracts in English and Chinese.Abstract --- p.2摘要 --- p.3Acknowledgements --- p.4Table of Contents --- p.5List of Tables --- p.7List of Figures --- p.8Chapter Chapter 1. --- Introduction --- p.10Chapter 1.1 --- What is smart card? --- p.10Chapter 1.2 --- Classification of smart cards --- p.10Chapter 1.3 --- Smart card communication model --- p.12Chapter 1.4 --- Smart Card Applications --- p.14Chapter 1.5 --- Motivation --- p.16Chapter 1.6 --- Thesis Organization --- p.17Chapter Chapter 2. --- Card-Centric Framework --- p.18Chapter 2.1 --- Card-Centric Protocol --- p.19Chapter 2.2 --- Event-Driven Card-Centric Framework --- p.21Chapter Chapter 3. --- Design Methodology --- p.27Chapter 3.1 --- Platform based SOC design --- p.27Chapter 3.2 --- Event Driven model --- p.31Chapter Chapter 4. --- Development Platform --- p.33Chapter 4.1 --- Altera Nios development platform --- p.33Chapter 4.2 --- Development board --- p.37Chapter 4.3 --- Development Tools --- p.39Chapter Chapter 5. --- I/O peripherals --- p.40Chapter 5.1 --- VGA --- p.40Chapter 5.2 --- Mouse --- p.45Chapter 5.3 --- SPI --- p.47Chapter Chapter 6. --- Card-Centric Computer Realization --- p.53Chapter 6.1 --- Architecture --- p.53Chapter 6.2 --- Implementation --- p.54Chapter 6.3 --- Smart Card emulator-the processing unit --- p.55Chapter 6.4 --- Console-the interfacing unit --- p.56Chapter 6.5 --- Input- Mouse --- p.57Chapter 6.6 --- Output- VGA --- p.58Chapter 6.7 --- Demonstration --- p.59Chapter Chapter 7. --- Event-Driven Card-Centric Computer --- p.61Chapter 7.1 --- Architecture and implementation --- p.62Chapter 7.2 --- Demonstration --- p.65Chapter Chapter 8. --- Card-Centric Design Flow --- p.67Chapter 8.1 --- Architecture platform --- p.67Chapter 8.2 --- Design flow --- p.68Chapter 8.3 --- Type of interface of Card-Centric protocol --- p.72Chapter Chapter 9. --- Applications and Benefits --- p.75Chapter 9.1 --- Proposed applications --- p.75Chapter 9.2 --- Benefits --- p.76Chapter Chapter 10 --- . Conclusions and future works --- p.78References --- p.81Appendix --- p.83Appendix 1 Card-Centric Framework Console Diagram --- p.83Appendix 2 Event-Driven Card-Centric Framework Smart card --- p.84Appendix 3 Event-Driven Card-Centric Framework Console --- p.85Appendix 4 VGA core Registers table [22] --- p.8

    Embedded Systems Based on Open Source Platforms

    Get PDF
    Ways and possibilities for design, implementation and application of microcomputer-based embedded systems using open source hardware and software platforms are considered, proposed and described. It is proposed to use open source hardware and software microcomputer-based technologies for design and implementation of embedded systems in many practical needs and applications. Main advantages and possibilities of application and implementation of such embedded systems are considered and described. Two practically designed and implemented systems performing needed data acquisition and control are presented and described. Used technologies for realization of the systems and embedded applications of the solutions are described. Open source microcomputer boards, appropriate sensors, actuators and additional electronics are used for implementation of the systems hardware. Open source tools and programs and LINUX operating system are used for implementation of the systems software. Modular approach is applied in the systems design and realization. Easy system expandability, simplifying maintenance and adaptation of the system to user requirements and needs are enabled with such approach. Balance between functionality and cost of the systems was also achieved. Optimization according to user requirements and needs, low consumption of electrical energy and low cost of the system are main advantages of such systems compared with standard embedded systems. These systems are optimized and specialized systems for specific needs and requirements of users

    Securing Multi-Application Smart Cards by Security-by-Contract

    Get PDF
    La tecnología de Java Card ha evolucionado hasta el punto de permitir la ejecución de servidores y clientes Web en una tarjeta inteligente. Sin embargo, desarrollos concretos de tarjetas inteligentes multiaplicación no son aún muy corrientes dado el modelo de negocio de descarga asíncrona y actualización de aplicaciones por diferentes partes que requiere que el control de las interacciones entre las aplicaciones sea hecho después de la expedición de la tarjeta. Los modelos y técnicas de seguridad actuales no soportan dicho tipo de evolución en la tartjeta. Un enfoque prometedor para resolver este problema parece ser la idea de Seguridad-mediante-Contrato (SxC). SxC es un entorno en el que se hace obligatorio que cualquier modificación de una aplicación tras la expedición de la tarjeta traiga consigo una especificación de su comportamiento en lo que concierne a seguridad, llamado contrato. Este se debe ajustar a la política de seguridad de la tarjeta multiaplicación. A causa de los recursos limitados de estos dispositivos, el enfoque de SxC puede ser aplicado a diferentes niveles de abstracción, según un jerarquía de modelos la cual proporciona beneficios en términos de complejidad computacional o expresividad del lenguaje. El nivel de más detalle (mayor expresividad) requiere algoritmos demasiado complejos para ser ejecutados en la tarjeta, por lo que es necesario enviar datos de forma privada a una tercera parte de confianza que será la responsable de realizar la comparación del contrato y la política de la tarjeta (proceso llamado Comparación Contrato-Política) con objeto de decidir si la modificación se ajusta a la política de seguridad o no; es decir, si el cambio es aceptable según el comportamiento esperado por la tarjeta y expresado en su política. El propósito del proyecto es desarrollar un sistema el cual resuelva el problema de externalizar el proceso de Comparación Contrato-Política a una entidad externa para tarjetas inteligentes multiaplicación de Java. Este sistema debe garantizar una comunicación segura entre la tarjeta y alguna tercera parte de confianza sobre un medio inseguro. La comunicación tiene que ser segura en términos de autenticación, integridad y confidencialidad. Lograr este objetivo requiere resolver problemas tales como la gestión de identidades y claves y el uso de funciones criptográficas para hacer segura la comunicación de datos privados almacenados en la tarjeta inteligente. Es por ello que los objetivos del proyecto son: Diseñar un sistema que resuelva el problema, implementar un prototipo que demuestre la validez del sistema y validar el prototipo y valorar su idoneidad en cuestión de espacio

    Trusted Collaborative Real Time Scheduling in a Smart Card Exokernel

    Get PDF
    This paper presents the work we have conducted concerning real time scheduling in Camille, an exokernel dedicated to smart cards. We show that it is possible to embedded a flexible real-time operating system despite the important hardware limitations of the smart card platform. We present the major difficulties one has to face when integrating real time support in an exokernel embedded on a very resource-limited platform. We first present a naive solution consisting in allocating an equal time slice to every system extensions and letting each one share it as needed amongst its tasks. We show that this solution does not account for loading of new extensions in the system, and that it can fail if some extensions have much more work to carry out than the others. We then present a more complex solution based upon collaborative schedulers grouped as virtual extensions. We show that this solution supports dynamic loading of new extensions and works even for very unbalanced task repartitions. We finally address the issue of trust between the collaborating extensions and we propose a solution based on exhaustive testing and formal proving of the plan functions

    RFID LOGIN SYSTEM For COMPUTERS

    Get PDF
    This report covers the implementation of RFID Login System for computers. The objective of this project is to replace the existing smart card used to login to a computer, with RFID technology. RFID technology is identified as the best alternative for smart card, due to its high level of security. The project scope is to fabricate RFID tag and reader for computer login. The transponder will transmit the signal containing user's information upon activation and the reader will process the information for verification purposes. The scope of the study is mainly about the architecture of RFID and how to develop hardware related to RFID. A prototype mainly consists of microcontroller application, radio frequency data transmission circuitry and graphical user interface was successfully developed. The prototype can be effectively used for computer login, based on RFID technology.

    PERFORMANCE ANALYSIS OF SECURITY MEASURES IN NEAR FIELD COMMUNICATION

    Get PDF
    Nowadays near field communication are largely used in so many different applications for the convenience and ease of use they provide. They store and exchange many personal data, some of them requires more security than others, due to the value they poses, such as banking information and personal identification. And maintaining high level of security is task of the utmost priority. The main focus of this thesis is establishing a knowledge base for different NFC/RFID devices. Evaluating the different encryption algorithms used currently, based on their encryption/decryption time, their immunity to brute force attack, and the amount of power needed to execute them. The encryption algorithms will be implemented using Python programing language and tested on a windows computer in order to test their immunity against brute force attack. Encryption/decryption time and the power usage will be tested on a Raspberry Pi, for the similarities it has with modern mobile devices.fi=Opinnäytetyö kokotekstinä PDF-muodossa.|en=Thesis fulltext in PDF format.|sv=Lärdomsprov tillgängligt som fulltext i PDF-format

    Cryptographic functions in a smart card

    Full text link
    Bustos Rodríguez, AJ. (2010). Cryptographic functions in a smart card. http://hdl.handle.net/10251/10194.Archivo delegad

    Fast Hash-Based Signatures on Constrained Devices

    Full text link

    The potential use of smart cards in vehicle management with particular reference to the situation in Western Australia

    Get PDF
    Vehicle management may be considered to consist of traffic management, usage control, maintenance, and security. Various regulatory authorities undertake the first aspect, fleet managers will be concerned with all aspects, and owner-drivers will be interested mainly in maintenance and security. Car theft poses a universal security problem. Personalisation, including navigational assistance, might be achieved as a by-product of an improved management system. Authorities and fleet managers may find smartcards to be key components of an improved system, but owners may feel that the need for improved security does not justify its cost. This thesis seeks to determine whether smartcards may be used to personalise vehicles in order to improve vehicle management within a forseeable time and suggest when it might happen. In the process four broad questions are addressed. • First, what improvements in technology are needed to make any improved scheme using smartcards practicable, and what can be expected in the near future? • Second, what problems and difficulties may impede the development of improved management? • Third, what non-vehicle applications might create an environment in which a viable scheme could emerge? • Finally, is there a perceived need for improved vehicle management? The method involved a literature search, the issue of questionnaires to owner drivers and fleet managers, discussions with fleet managers, the preparation of data-flow and state diagrams, and the construction of a simulation of a possible security approach. The study concludes that although vehicle personalisation is possible- and desirable it is unlikely to occur within the next decade because the environment needed to make it practicable will not emerge until a number of commercial and standardisation problems that obstruct all smartcard applications have been solved
    corecore