86,920 research outputs found

    Security Check-In Station

    Get PDF
    The major qualifying project is the culmination of lab and courses over four years. The Security Check-In Station is a device which communicates with a central server to give access to guards based on RFID badge verification and voice authentication. The device is designed to have guards check in with the central server showing the patrolled area. By using RFID tags and scanners, and using signal analysis techniques like frequency comparing and signal covariance, the device is able to distinguish guards from imposters

    Platform independent web-based telecardiology for connected heart care

    Get PDF
    Most of the commercial telecardiology systems are platform-dependent and operating system (OS)-dependent. This causes inconvenience to medical officer for retrieving data from database and hence reduce the work efficiency. In this paper, a platformindependent and OS-independent web-based telecardiology system, named VirtualDave System, is proposed based on client-server model and developed in Hypertext Markup Language 5 (HTML5), Active Server Pages (ASP) scripting and C# languages. This system allows users to log on and access the patient medical data from any technology devices that equipped with web browser and internet access. Besides, it also allows targeted users to communicate and get remote medical consultation without long distance traveling and long-time queuing. Verification result shows that this proposed system could be executed in any platform regardless the OS. This web-based telecardiology could significantly help to improve the health care services especially in rural area

    AMS-AC (Authorization Management System) and databases for access control

    Get PDF
    The concept for AMS-AC (Authorization Management System for Access Control) was developed in 1996/1997 with the participation of the Divisions AS, DSU, PE, PPE, ST and TIS. It covers the entrance rules to CERN, the types of CERN cards, and the access authorizations to controlled areas. The former paper-based procedure to obtain an access authorization has been transferred to a database driven system with electronic signatures. All necessary information are stored in the human resource database (HR). From there, the data is distributed to all card readers at CERN. A UNIX server controls the updating of the authorization data and performs automatic data transfers. Additionally, several procedures have been developed: 1) HTML-based on-line database checks for immediate data control; 2) Database verification procedures; 3) Automatic information distribution

    On Non-Parallelizable Deterministic Client Puzzle Scheme with Batch Verification Modes

    Get PDF
    A (computational) client puzzle scheme enables a client to prove to a server that a certain amount of computing resources (CPU cycles and/or Memory look-ups) has been dedicated to solve a puzzle. Researchers have identified a number of potential applications, such as constructing timed cryptography, fighting junk emails, and protecting critical infrastructure from DoS attacks. In this paper, we first revisit this concept and formally define two properties, namely deterministic computation and parallel computation resistance. Our analysis show that both properties are crucial for the effectiveness of client puzzle schemes in most application scenarios. We prove that the RSW client puzzle scheme, which is based on the repeated squaring technique, achieves both properties. Secondly, we introduce two batch verification modes for the RSW client puzzle scheme in order to improve the verification efficiency of the server, and investigate three methods for handling errors in batch verifications. Lastly, we show that client puzzle schemes can be integrated with reputation systems to further improve the effectiveness in practice

    S-Mbank: Secure Mobile Banking Authentication Scheme Using Signcryption, Pair Based Text Authentication, and Contactless Smartcard

    Get PDF
    Nowadays, mobile banking becomes a popular tool which consumers can conduct financial transactions such as shopping, monitoring accounts balance, transferring funds and other payments. Consumers dependency on mobile needs, make people take a little bit more interest in mobile banking. The use of the one-time password which is sent to the user mobile phone by short message service (SMS) is a vulnerability which we want to solve with proposing a new scheme called S-Mbank. We replace the authentication using the one-time password with the contactless smart card to prevent attackers to use the unencrypted message which is sent to the user's mobile phone. Moreover, it deals vulnerability of spoofer to send an SMS pretending as a bank's server. The contactless smart card is proposed because of its flexibility and security which easier to bring in our wallet than the common passcode generators. The replacement of SMS-based authentication with contactless smart card removes the vulnerability of unauthorized users to act as a legitimate user to exploit the mobile banking user's account. Besides that, we use public-private key pair and PIN to provide two factors authentication and mutual authentication. We use signcryption scheme to provide the efficiency of the computation. Pair based text authentication is also proposed for the login process as a solution to shoulder-surfing attack. We use Scyther tool to analyze the security of authentication protocol in S-Mbank scheme. From the proposed scheme, we are able to provide more security protection for mobile banking service.Comment: 6 page
    corecore