To see the other types of publications on this topic, follow the link: Smartcard.

Dissertations / Theses on the topic 'Smartcard'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 40 dissertations / theses for your research on the topic 'Smartcard.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Vu, Hung V. "Healthcare Optimizing Patient Education Smartcard (H.O.P.E.S.)." Thesis, California State University, Long Beach, 2018. http://pqdtopen.proquest.com/#viewpdf?dispub=10752237.

Full text
Abstract:

The healthcare industry is ever-changing, with the significant advancement of technology compare to 30 years ago. Access to information has become quicker and paper chart has been reduced to the implementation and the creation of an EMR/EHR system. With patients obtaining a healthcare smartcard and acts as a portable EHR, this can help clinicians communicate better with other clinicians and be able to educate their patients on drug therapies, avoid administering duplicate testing, and thus, reduce cost for both the insurance and patients side. H.O.P.E.S. is making its way in the healthcare industry to alleviate burden for patients carrying papers and lab results, when it can be store using the smartcard system. This allows clinicians to access patients’ latest results if patients are seeing multiple clinicians (specialists) for their medical conditions. The smartcard allows physicians to educate their patients, getting them more involve and advocate for a healthier lifestyle.

APA, Harvard, Vancouver, ISO, and other styles
2

Henderson, Neil James. "Polymer thick film sensors for embedded smartcard biometrics and identity verification." Thesis, University of Southampton, 2002. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.268936.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Leahy, Christopher John. "Understanding the Mean-Variance framework through the application of Public Transport Smartcard data." Thesis, University of Leeds, 2017. http://etheses.whiterose.ac.uk/18706/.

Full text
Abstract:
Reliability is an important aspect of any transportation system, and there has been a substantial amount of research to bring it to the point where it can be accurately incorporated into established forecasting and appraisal frameworks. At the same time, emerging data sources, such as public transport smartcards, provide opportunities to understand more about the reliability of a particular transport system. This thesis conducts research on reliability using smartcard data. In the first instance the thesis provides a critique of the Mean-Variance framework for the treatment of transport reliability and finds room for adaptation. The thesis also provides a review of empirical research that estimates Mean-Variance variables and parameters, and finds evidence of methodological issues. In response to these issues, the thesis utilises smartcard data to investigate Mean-Variance in three ways. The key element is the development of an alternative method of estimating a value of reliability, treating smartcard data as a Revealed Preference data source and combining it with established discrete choice methods. The second element uses the smartcard data to identify the factors affecting reliability levels through estimation of a linear regression model. The third strand of investigation employs the data to understand more about possible alternative measures of reliability and compares the underlying utility function of Mean-Variance with a second reliability framework. The thesis therefore demonstrates that the application of public transport smartcard data has the potential to yield insights in the field of transport reliability. In particular, it establishes how this data source might be used to estimate the value of reliability. With development, it may have the potential to forecast future reliability levels. Application of the data also supports the status quo of utilising the standard deviation as an indicator of reliability.
APA, Harvard, Vancouver, ISO, and other styles
4

Kleist, Anders. "Theory of super power saving circuits and configurations for mixed signal CPU for smartcard application." Thesis, Linköping University, Department of Electrical Engineering, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2326.

Full text
Abstract:

Designing an application specific integrated circuit (ASIC) must be starting with careful preparations, otherwise the chip will not be as good as possible. The theoretical studies must cover everything from the chip circuits to the application structure. In mobile applications there is extremely important that the current consumption becomes minimized because the battery power is limited. The power reductions studies must include the most power costing circuits on the chip. When the whole circuit or segments of the circuit is not in use, they must switch fast and simple into another mode that consume nearly none power. This mode is called sleep-mode. If the sleep-mode has very low leakage currents, the lifetime of the application will dramatically increase.

This report studies the most power costing circuits in smartcard application ASIC. The chip should be used to control a LCD display on the smartcard. The circuits that have been investigated are level shifters, charge pumps and LCD drivers, also sleep-mode configuration possibilities have been investigated. Other small preparing work is also included in the thesis.

APA, Harvard, Vancouver, ISO, and other styles
5

Jilkén, Oskar. "Säkerhet och integritet i närfältskommunikation." Thesis, Blekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5010.

Full text
Abstract:
Context. In today’s society we use smart cards in many areas, NFC is a smart card technology that allows contactless interaction between a reader and the tag, the tag is often in the form of a card. NFC can be used for various payment methods or as access card to a building which makes life easier. In previous studies, the technique has proven to be weak to attacks using an NFC reader connected to a computer. Among today’s smartphones, there are phones that have built-in read and write support for NFC tags. Objectives. In this study, I examine the NFC tags that are frequently used in our society, entry cards and debit cards to determine the security against the increasing use of smartphones as a potential attack tool. If there is a threat I will try to remedy the found lack. Methods. My approach was to select a number of test items and analyze the objects using only a smartphone with NFC support to determine the risk for each of the items. The test conducted was the modification, cloning and unique copy. Results. Through this investigation, I concluded that four of the non-empty items was at risk of being intimidated. All four are used in public transport and the objects were vulnerable to unique copy. Conclusions. In order to remedy this vulnerability should be the management of the tag’s data is handled in a different way, perhaps by storing the data in a internal system or to replace the tags for a safer tag alternative.
I dagens samhälle används smartcards i många områden, NFC som är en smartcard teknik som tillåter kontaktlös interaktion mellan en läsare och taggen, taggen är ofta i form av ett kort. NFC kan användas till olika betalnings metoder eller som inpasseringskort vilket gör vardagen enklare. I tidigare studier har tekniken visat sig svag för attacker med hjälp av en NFC-läsare kopplad till en dator. Bland dagens smartphones finns det telefoner som har inbyggt läs- och skriv-stöd till NFC taggar. I den här studien ska jag undersöka de NFC taggar som används flitigast i vårt samhälle, inpasseringskort och betalkort för att fastställa säkerheten mot den ökade användningen av smartphones som ett potentiellt attackverktyg, om det finns en hotbild ska jag försöka avhjälpa den funna bristen. Mitt tillväga gångsätt var att välja ut ett antal testobjekt och analysera de objekten med hjälp av endast en smartphone med NFC-stöd som verktyg. För att fastställa risken för vart och ett av objekten, de test som utfördes var modifiering, kloning och unik kopiering. Genom denna undersökning kom jag fram till att fyra av de icke tomma objekten löper risk att bli utsatta för hot alla fyra används i kollektivtrafiken och objekten var sårbara för unik kopiering, för att avhjälpa denna sårbarhet bör hanteringen av taggens data hanteras på ett annat vis, kanske genom att lagra data i ett inre system eller att byta ut taggarna till ett säkrare alternativ.
APA, Harvard, Vancouver, ISO, and other styles
6

Yamori, Nobuyoshi, and Narunto Nishigaki. "Recent Developments of Digital Cash Projects in Japan." 名古屋大学大学院経済学研究科附属国際経済政策研究センター, 2005. http://hdl.handle.net/2237/11922.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kirk, Dean Frederick. "Development of a Small Envelope Precision Milling Machine." Thesis, University of Canterbury. Mechanical Engineering, 2006. http://hdl.handle.net/10092/2773.

Full text
Abstract:
The credit card industry is huge with over two and a half billion cards shipped annually. A local card manufacturer, with a production volume in excess of forty million cards annually, approached the University of Canterbury to design and develop advanced card manufacturing technology. The motivation behind this development was the desire of the sponsoring company to keep abreast of new technologies and to have the ability to manufacture and supply cards with this new and emerging technology into a highly competitive world market. This thesis reports the research surrounding the development of a dedicated new machine tool explicitly designed to implement the emerging technologies found in the international credit card industry. The machine tool, a dedicated milling machine, was not developed in its entirety within these pages; however, three major constituents of the machine were researched and developed to a point where they could be implemented or become the subject of further research. The three areas of interest were; • A machine table system that avoided the increased zonal wear to which linear bearings are subject, typically due to short high frequency traversals, and also the high friction and mass generally found in dovetail slides. • Design requirements demanded the use of a single commercially available carbide cutter to produce 1500 components per hour. Therefore, a purpose built high (revs per minute) rpm spindle and drive system specifically for use with polymeric materials, (R-PVC in particular) was deemed necessary. • Tracking the cutter depth in relation to an RFID aerial track embedded within the credit card core. The aerial tracking was to be dynamic and occur during the machining process with the machine “remembering” the depth of cut at contact with the aerial. Each of the three areas was researched via an in-depth literature review to determine what and if any material had been published in these fields. For the development of the machine table a novel flexure hinge idea was considered. Considerable material was discovered about flexures, but very little was found to be relevant to the application of high displacement metal flexures necessary to meet the required levels of table movement. In effect the proposed machine table system and research in this field would be novel. The high performance spindle investigation became directed into a much narrower focus as it progressed; that of determining the power consumption required to machine the integrated circuit pockets in an R-PVC work piece. This was due to the lack of information pertaining to the physical properties of polymeric materials, in particular the specific cutting pressure. The depth following sensor array was configured using capacitance detection methods to determine the distance between the cutter?s end and the aerial tracks. Capacitance sensing methods, whilst not new, were developed into a novel arrangement to meet the specific cutter tracking requirements of the proposed new machine tool. Each of the respective development areas had concept designs completed and were prototyped before being tested to determine the effectiveness of the respective designs. The outcomes from the testing are reported herein, and show each constituent part to be basically feasible, in the application. The results were sufficient to indicate that each development showed distinct potential but further development and integration into the machine tool should ensue.
APA, Harvard, Vancouver, ISO, and other styles
8

Jensen, Jonas. "Säkerhetsutvärdering certifikatserver i stället för aktiva kort." Thesis, Linköping University, Department of Electrical Engineering, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2844.

Full text
Abstract:

Business and organizations use computer network in a greater extension than ever before, especially for business-critical use. That increase the demand of security for all systems, both against internal and external threats. The demand on the authentication method used today increases. Today they normally uses password or some kind of smart card.

I will performa literature study that will investigate the possibility to increase the security in authentication of users without the use of extra hardware. The method uses a server that stores all cryptographic keys for the user centrally to achieve stronger security. This report is based on a previous report which tested to implement this solution, in this report I will question the security of this system. I will then give an architecture proposal where this method is used to authenticate and allow cryptographic recourses for the user.

The conclusions you can get from this report is that the possibilities with comparable ease increase the security without investing in new hardware. But the solution will not be comparable by a ``smart card solution''in security levels. That means that the method described in this thesis is suitable for organizations that either do not need that strong security as smart card give or want a good solution without being forced to use some external hardware.

APA, Harvard, Vancouver, ISO, and other styles
9

Tiran, Sébastien. "Side Channels in the Frequency Domain." Thesis, Montpellier 2, 2013. http://www.theses.fr/2013MON20164/document.

Full text
Abstract:
De nos jours, l'emploi de la cryptographie est largement répandu et les circuits intègrent des primitives cryptographiques pour répondre à des besoins d'identification, de confidentialité, ... dans de nombreux domaines comme la communication, la PayTV, ...La sécurisation de ces circuits est donc un enjeu majeur. Les attaques par canaux cachés consistent à espionner ces circuits par différents biais comme le temps de calcul, la consommation en courant ou les émanations électromagnétiques pour obtenir des informations sur les calculs effectués et retrouver des secrets comme les clefs de chiffrement. Ces attaques ont l'avantage d'être indétectables, peu couteuses et ont fait l'objet des nombreuses études. Dans le cadre des attaques par analyse de la consommation en courant ou des émanations électromagnétiques l'acquisition de bonnes courbes est un point crucial. Malgré la forte utilisation de techniques de prétraitement dans la littérature, personne n'a tenté d'établir un modèle de fuite dans le domaine fréquentiel. Les travaux effectués durant cette thèse se concentrent donc sur cet aspect avec pour intérêt d'améliorer l'efficacité des attaques. De plus, de nouvelles attaques dans le domaine fréquentiel sont proposées, sujet peu étudié malgré l'intérêt de pouvoir exploiter plus efficacement la fuite éparpillée dans le temps
Nowadays, the use of cryptography is widely spread, and a lot of devices provide cryptographic functions to satisfy needs such as identification, confidentiality, ... in several fields like communication, PayTV, ...Security of these devices is thus a major issue.Side Channel Attacks consist in spying a circuit through different means like the computation time, power consumption or electromagnetic emissions to get information on the performed calculus and discover secrets such as the cipher keys.These attacks have the advantage to be cheap and undetectable, and have been studied a lot.In the context of attacks analysing the power consumption or the electromagnetic emissions, the acquisition of good traces is a crucial point.Despite the high use of preprocessing techniques in the literature, nobody has attempted to model the leakage in the frequency domain.The works performed during this thesis are focusing on this topic with the motivation of improving the efficiency of attacks.What's more, new frequency domain attacks are proposed, subject poorly studied despite the advantage of better exploiting the leakage spread in time
APA, Harvard, Vancouver, ISO, and other styles
10

Kilian-Kehr, Roger. "Mobile security with smartcards." Phd thesis, [S.l.] : [s.n.], 2002. http://elib.tu-darmstadt.de/diss/000214.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Drageryd, Lars. "Using public transport tap-in data to improve a travel demand model: A Norrköping case study." Thesis, Linköpings universitet, Kommunikations- och transportsystem, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-151065.

Full text
Abstract:
With reliable models to forecast travel demand, traffic planners and decision-makers can be assisted in choosing the best solutions to obtain traffic performance goals. Practitioners have traditionally been relying on infrequent, costly and respondent pressurized travel surveys as their main source of data for these models. The drawbacks of the data collection method highlight a need to search for alternative sources of data used for the purpose. One such source is public transport “tap-in” data. This thesis executed a case study with the target of improving the travel demand model of Norrköping via public transport data. An algorithm that estimates the alighting station of travellers was applied to a data set provided by the public transport operator of the city. By allocating the OD-demand from stations to the traffic analysis zones used in the model a straightforward integration method using the tap-in estimate as a reference matrix could be used. The target with the method was to redistribute the demand in such a way that the public transport demand approached the tap-in estimate but that the total demand for all modes for the OD-pair remained unchanged. The results gave some indication that the integration of tap-in data improved the model performance from the perspective of public transports. In a regression analysis comparing the number of entries per station the integration of tap-in data increased the correlation coefficient from 0,845 to 0,864. Further was the performance for other transport modes seemingly not worsened by the integration of tap-in data. Finding an allocation procedure that was generic but still accurate proved complex. Further were drawbacks with the integration procedure highlighted where the method executed affected the results of the model, not its behaviour. The consequence of this is that, though the model might be an accurate representation of the current state of traffic, it is difficult to execute the same procedure when investigating future states. Still, the thesis stressed some of the potential for public transport data in modelling contexts, where the role of the data, given the procedure executed, still is of complementary character to travel surveys.
APA, Harvard, Vancouver, ISO, and other styles
12

Faria, Gerson de Souza. "Novos ataques de canal secundário a dispositivos de entrada manual de dados confidenciais." Universidade de São Paulo, 2016. http://www.teses.usp.br/teses/disponiveis/3/3142/tde-22032017-080657/.

Full text
Abstract:
Esta tese apresenta três novos ataques a equipamentos de pagamento eletrônico que possuem teclado mecânico, conhecidos como \"PIN pads\". Mostramos de três formas distintas como tais equipamentos possuem vulnerabilidades de segurança na camada física que permitem o vazamento do PIN (Personal Identification Number) quando o mesmo é digitado. Demonstramos experimentalmente que é possível inferir com elevada taxa de acerto (100% em um dos ataques) a senha digitada, de forma não-invasiva. Os ataques desenvolvidos são baseados na introdução de sensores nos próprios equipamentos ou em seu ambiente de operação: acelerômetros para análise de vibração, microfones para análise acústica e células de carga para medição de forças do pressionamento. Devido à massificação no uso de sensores por dispositivos de consumo, o roubo de informação por meios não convencionais é atividade crescente. Os resultados dos ataques de baixo custo realizados expõem sérias deficiências no processo de certificação de segurança de tais equipamentos.
This thesis presents three new attacks on electronic payment equipment having mechanical keypads, known as \"PIN pads\". We show in three different ways how they have security vulnerabilities at the physical layer allowing the leak of the PIN (Personal Identification Number) when it is entered. We experimentally demonstrated that it is possible to infer with high success rate (100% in one of the attacks) the password entered on the device, in a non-invasive way. The attacks are based on the placement of sensors inside the equipment itself or in its operating environment: accelerometers for doing vibration analysis, microphones for acoustic analysis and load cells for measuring the pressing force. Due to massive deployment of sensors in consumer devices, information theft by unconventional means is increasing. The results of the low-cost attacks here developed expose serious shortcomings in the process of security certification of such equipment.
APA, Harvard, Vancouver, ISO, and other styles
13

Dureuil, Louis. "Analyse de code et processus d'évaluation des composants sécurisés contre l'injection de faute." Thesis, Université Grenoble Alpes (ComUE), 2016. http://www.theses.fr/2016GREAM068/document.

Full text
Abstract:
Dans le domaine des cartes à puce, les analyses de vulnérabilité demandent d’être à la pointe de l’art en termes d’attaques et de techniques de protection. Une attaque classique est l’injection de fautes, réalisée au niveau matériel notamment par des techniques laser. Pour anticiper les impacts possibles de ce type d'attaque, certaines analyses sont menées au niveau logiciel. Il est donc fortement d’actualité de pouvoir définir des critères et proposer des outils automatiques permettant d’évaluer la robustesse d’une application à ce type d’attaque, d’autant plus que les techniques d’attaques matérielles permettent maintenant d’enchaîner plusieurs attaques (spatiales ou temporelles) au cours d’une exécution. En effet, des travaux de recherche récents évaluent l'impact des contre-mesures face à ce type d'attaque[1], ou tentent de modéliser les injections de faute au niveau C[2]. Le sujet de thèse proposé s'inscrit dans cette problématique, avec néanmoins la particularité novatrice de s'intéresser au couplage des analyses statique et dynamique dans le cas des injections de fautes effectuées au niveau binaire. Un des objectifs de la thèse est d'offrir un cadre paramétrable permettant de simuler des attaques par faute telles qu'elles peuvent être réalisées par le laboratoire CESTI-LETI au niveau matériel. Il faudra donc proposer un modèle intermédiaire générique permettant de spécifier des contraintes réelles comme par exemple les différents types de mémoires (RAM, EEPROM, ROM), qui peuvent induire des fautes permanentes ou volatiles. Concilier les analyses statiques du code et l'injection de fautes dynamiques devra permettre de maîtriser la combinatoire des exécutions et de guider l'analyse à l'aide de patterns d'attaques. À ce titre, on sera amené à proposer une taxonomie des attaques et de nouvelles modélisations d'attaques. Il faudra également adapter les outils d'analyse statique aux conséquences de l'injection dynamique de fautes, qui peut modifier profondément le code en changeant l'interprétation des instructions, ce qui a un effet similaire à la génération de code à l'exécution. Ce sujet de thèse s'inscrit dans la stratégie d'innovation du CESTI-LETI et pourra aboutir à un vérificateur automatique de code utilisable par les évaluateurs du CESTI-LETI. [1] A. Séré, J-L. Lanet et J. Iguchi-Cartigny. « Evaluation of Countermeasures Against Fault Attacks on Smart Cards ». en. In : International Journal of Security and Its Applications 5.2 (2011). [2] Xavier Kauffmann-Tourkestansky. « Analyses sécuritaires de code de carte à puce sous attaques physiques simulées ». Français. THESE. Université d’Orléans, nov. 2012. url : http://tel.archives-ouvertes.fr/tel-00771273
Vulnerability detections for smart cards require state of the art methods both to attack and to protect the secure device. A typical type of attack is fault injection, most notably performed by means of laser techniques. To prevent some of the consequences of this kind of attacks, several analyses are conducted at the software level. Being able to define criteria and to propose automated tools that can survey the robustness of an application to fault injection is thus nowadays a hot topic, even more so since the hardware attack techniques allow today an attacker to perform several attacks in a single software execution. Indeed, recent research works evaluate the effectiveness of counter-measures against fault injection[1], or attempt to develop models of fault injection at the C level[2]. This thesis project addresses the issue of multiple faults injection, albeit by adding the distinctive aspect of static and dynamic analysis interaction in a context of binary-level fault injection. An objective of the thesis is to achieve a configurable framework to simulate fault injections in the way they are currently performed by the CESTI-LETI laboratory on the actual hardware. To do so we will develop a generic intermediate model that will allow us to specify hardware constraints, such as the various kinds of memories (RAM, EEPROM, ROM), whose different properties can induce either permanent or volatile faults. Combining the static code analysis with dynamic fault injections should prevent the combinatory explosion of the executiions while attack patterns will guide the analysis. A taxonomy of attacks and new attack modelisations could emerge from this work. An adaption of the tools for static analysis is also required, because dynamic fault injection can deeply change the code by modifying the interpretation of the instructions, in a similar manner to dynamic compilation. This thesis project falls within the CESTI-LETI's innovation strategy, et could lead to an automated code verifier that could be used by the CESTI-LETI evaluation specialists. [1] A. Séré, J-L. Lanet et J. Iguchi-Cartigny. « Evaluation of Countermeasures Against Fault Attacks on Smart Cards ». en. In : International Journal of Security and Its Applications 5.2 (2011). [2] Xavier Kauffmann-Tourkestansky. « Analyses sécuritaires de code de carte à puce sous attaques physiques simulées ». Français. THESE. Université d’Orléans, nov. 2012. url : http://tel.archives-ouvertes.fr/tel-00771273
APA, Harvard, Vancouver, ISO, and other styles
14

Gomes, Bruno Emerson Gurgel. "Desenvolvimento formal de aplica??es para smartcards." Universidade Federal do Rio Grande do Norte, 2012. http://repositorio.ufrn.br:8080/jspui/handle/123456789/17947.

Full text
Abstract:
Made available in DSpace on 2014-12-17T15:46:59Z (GMT). No. of bitstreams: 1 BrunoEGG_TESE.pdf: 2215931 bytes, checksum: 5d86c012a04f884e6dec73c92c1d88ef (MD5) Previous issue date: 2012-06-01
Coordena??o de Aperfei?oamento de Pessoal de N?vel Superior
Smart card applications represent a growing market. Usually this kind of application manipulate and store critical information that requires some level of security, such as financial or confidential information. The quality and trustworthiness of smart card software can be improved through a rigorous development process that embraces formal techniques of software engineering. In this work we propose the BSmart method, a specialization of the B formal method dedicated to the development of smart card Java Card applications. The method describes how a Java Card application can be generated from a B refinement process of its formal abstract specification. The development is supported by a set of tools, which automates the generation of some required refinements and the translation to Java Card client (host) and server (applet) applications. With respect to verification, the method development process was formalized and verified in the B method, using the Atelier B tool [Cle12a]. We emphasize that the Java Card application is translated from the last stage of refinement, named implementation. This translation process was specified in ASF+SDF [BKV08], describing the grammar of both languages (SDF) and the code transformations through rewrite rules (ASF). This specification was an important support during the translator development and contributes to the tool documentation. We also emphasize the KitSmart library [Dut06, San12], an essential component of BSmart, containing models of all 93 classes/interfaces of Java Card API 2:2:2, of Java/Java Card data types and machines that can be useful for the specifier, but are not part of the standard Java Card library. In other to validate the method, its tool support and the KitSmart, we developed an electronic passport application following the BSmart method. We believe that the results reached in this work contribute to Java Card development, allowing the generation of complete (client and server components), and less subject to errors, Java Card applications.
As aplica??es para smart cards representam um mercado que cresce a cada ano. Normalmente, essas aplica??es manipulam e armazenam informa??es que requerem garantias de seguran?a, tais como valores monet?rios ou informa??es confidenciais. A qualidade e a seguran?a do software para cart?es inteligentes pode ser aprimorada atrav?s de um processo de desenvolvimento rigoroso que empregue t?cnicas formais da engenharia de software. Neste trabalho propomos o m?todo BSmart, uma especializa??o do m?todo formal B dedicada ao desenvolvimento de aplica??es para smart cards na linguagem Java Card. O m?todo descreve, em um conjunto de etapas, como uma aplica??o smart card pode ser gerada a partir de refinamentos em sua especifica??o formal. O desenvolvimento ? suportado por um conjunto de ferramentas, automatizando a gera??o de parte dos refinamentos e a tradu??o para as aplica??es Java Card cliente (host) e servidora (applet). Ressalta-se que o processo de especifica??o e refinamento descrito no m?todo foi formalizado e verificado utilizando o pr?prio m?todo B, com o aux?lio da ferramenta Atelier B [Cle12a]. Destaca-se que a aplica??o Java Card ? traduzida a partir do ?ltimo passo de refinamento, denominado de implementa??o. A especifica??o dessa tradu??o foi feita na linguagem ASF+SDF [BKV08]. Inicialmente, descreveu-se as gram?ticas das linguagens B e Java (SDF) e, em uma etapa posterior, especificou-se as transforma??es de B para Java Card atrav?s de regras de reescrita de termos (ASF). Essa abordagem foi um importante aux?lio durante o processo de tradu??o, al?m de servir ao prop?sito de document?lo. Cumpre destacar a biblioteca KitSmart [Dut06, San12], componente essencial ao m?todo BSmart, que inclui modelos em B de todas as 93 classes/interfaces da API Java Card na vers?o 2:2:2, dos tipos de dados Java e Java Card e de m?quinas que podem ser ?teis ao especificador, mas que n?o est?o presentes na API padr?o. Tendo em vista validar o m?todo, seu conjunto de ferramentas e a biblioteca KitSmart, procedeu-se com o desenvolvimento, seguindo o m?todo BSmart, de uma aplica??o de passaporte eletr?nico. Os resultados alcan?ados neste trabalho contribuem para o desenvolvimento smart card, na medida em que possibilitam a gera??o de aplica??es Java Card completas (cliente e servidor) e menos sujeitas a falhas.
APA, Harvard, Vancouver, ISO, and other styles
15

Andouard, Philippe. "Outils d'aide à la recherche de vulnérabilités dans l'implantation d'applications embarquées sur carte à puce." Thesis, Bordeaux 1, 2009. http://www.theses.fr/2009BOR13958/document.

Full text
Abstract:
Les travaux présentés dans cette thèse ont pour objectif de faciliter les évaluations sécuritaires des logiciels embarqués dans les cartes à puce. En premier lieu, nous avons mis au point un environnement logiciel dédié à l'analyse de la résistance d'implémentations d'algorithmes cryptographiques face à des attaques par analyse de la consommation de courant. Cet environnement doit être vu comme un outil pour rechercher des fuites d'information dans une implémentation en vue d'évaluer la faisabilité d'une attaque sur le produit réel. En second lieu, nous nous sommes intéressé à l'analyse de programmes écrits en langage d'assemblage AVR dans le but de vérifier s'ils sont vulnérables aux \textsl{timing attacks}. Nous avons donc développé un outil qui consiste à décrire des chemins du flot de contrôle d'un programme grâce à des expressions régulières qui seront par la suite interprétées par notre outil afin de donner leur temps exact d'exécution (en terme de cycles d'horloge). Enfin, nous avons étudié comment faciliter la compréhension de programmes écrits en langage C dans le but de vérifier si des politiques de sécurité sont correctement implémentées. D'une part, nous fournissons des assistants de navigation qui au travers d'informations concernant les variables et procédures rencontrées, facilitent la compréhension du programme. D'autre part, nous avons au point une manière de vérifier les politiques de sécurité sans modélisation préalable (e.g. avec un automate à états finis) au moyen de requêtes exprimées dans la logique CTL
The work presented in this thesis aims at easing the evaluation process of smartcards embedded software. On one hand, we set up a software environment dedicated to analyze the implementation resistance of cryptographic to power analysis attacks. This environment must be seen as a tool that facilitates a real attack by giving a way to find information leakages in an implementation. On the other hand, we focused on analyzing program written in AVR assembly language in order to check whether they are vulnerable to timing attacks. To achieve this goal we have developed a tool that makes possible the description of a path in the control flow of the program thanks to regular expressions. Those regular expressions will be interpreted by our tool in order to give the exact execution timing (expressed in clock cycles). Finally, we studied how to ease the global comprehension of a program written in C language in order to check whether security policies are well implemented. First, we provide graphical navigation assisants that helps to understand the progam being analyzed by giving information on variables and procedures. Then, we provide a way to check the security policies through the use of requests expressed with the CTL logic. This approach does not need prior modelisation of the program
APA, Harvard, Vancouver, ISO, and other styles
16

Kneip, Sascha. "Entwicklung effizienter Schaltungskomponenten für einen kryptographischen Koprozessor in Smartcards." Aachen Shaker, 2008. http://d-nb.info/994112629/04.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Kneip, Sascha [Verfasser]. "Entwicklung effizienter Schaltungskomponenten für einen kryptographischen Koprozessor in Smartcards / Sascha Kneip." Aachen : Shaker, 2009. http://d-nb.info/1161302638/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

So, Yiu-ching Abby. "Sequential uniform design and its application to quality improvement in the manufacture of smartcards." Click to view the E-thesis via HKUTO, 2005. http://sunzi.lib.hku.hk/hkuto/record/B35772025.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

So, Yiu-ching Abby, and 蘇耀正. "Sequential uniform design and its application to quality improvement in the manufacture of smartcards." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2005. http://hub.hku.hk/bib/B35772025.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Lesas, Anne-Marie. "Vers un environnement logiciel générique et ouvert pour le développement d'applications NFC sécurisées." Thesis, Aix-Marseille, 2017. http://www.theses.fr/2017AIXM0286/document.

Full text
Abstract:
Dans le domaine des transactions et du paiement électronique avec une carte à puce, le standard de communication en champ proche « Near Field Communication » (NFC) s’est imposé comme la technologie des transactions sans contact mobiles sécurisées pour le paiement, le contrôle d’accès, ou l’authentification. Les services sans contact mobiles sécurisés sont basés sur le mode émulation de carte du standard NFC qui implique une composante matérielle à accès restreint de type carte à puce appelée « Secure Element » (SE) dans laquelle sont stockées les données confidentielles et les fonctions sensibles. Malgré les efforts de standardisation de l'écosystème, les modèles proposés pour la mise en œuvre du SE sont complexes et souffrent du manque de généricité, à la fois pour offrir des mécanismes d’abstraction, pour le développement d’applications de haut niveau, et pour la mise en œuvre et la vérification des contraintes de sécurité des applications.L’objectif de la thèse est de concevoir et réaliser un environnement logiciel basé sur un modèle générique compatible avec les standards établis et peu sensible aux évolutions technologiques. Cet environnement devrait permettre à des non-experts de développer des applications multiplateformes, multimodes, multi-facteurs de forme, qui s’interfacent avec le SE dans un smartphone NFC
In the field of electronic transactions and payment with a smart card, the Near Field Communication (NFC) standard has stood out against other candidate technologies for secure mobile contactless transactions for payment, access control, or authentication. Secure mobile contactless services are based on the card emulation mode of the NFC standard which involves a smart card type component with restricted access called "Secure Element" (SE) in which sensitive data and sensitive functions are securely stored and run. Despite considerable standardization efforts around the SE ecosystem, the proposed models for the implementation of SE are complex and suffer from the lack of genericity, both to offer abstraction mechanisms, for the development of high-level applications, and for the implementation and verification of applications security constraints.The objective of the thesis is to design and realize a software environment based on a generic model that complies with established standards and which is not very sensitive to technological evolutions. This environment should enable non-experts to develop multi-platform, multi-mode, multi-factor SE-based applications running into the NFC smartphone
APA, Harvard, Vancouver, ISO, and other styles
21

Juras, Stanislav. "Autentizace pomocí smartkaret." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2010. http://www.nusl.cz/ntk/nusl-218350.

Full text
Abstract:
The master’s thesis outlines the problem of authentication. It describes authentication factors like ownership, knowledge and inherent. There are described properties of each of that. Authentication based on ownership focuses on authenticators - the smartcards. The thesis also describes different types of smartcards (contact, contactless and hybrid smartcards) and refers to their basic properties. Emphasis is placed on the description of contact and contactless smartcard, specifically focusing on .NET smartcards. It describes their internal components such as memory (RAM, ROM, EEPROM), crypto processor etc. Smartcards are also examined in terms of support for cryptographic primitives. The thesis also introduces the cryptographic methods and principles describing symmetric and asymmetric ciphers. Symmetric ciphers are divided in to stream and block ciphers. There is description of asymmetric cipher, digital signature etc. This work also touches on the fundamental principles required for safe programming. Part of this work is also practical implementation (programs). Practical part aims to implement the communication between the user and AC (Access Control) AASR system. The first suite of applications provides encrypted communication between the PC and smartcards. These applications should create on smartcard services that will be able to perform operations on the client side, which are necessary to authenticate in the AASR system. The paper also presents algorithms for working with big numbers - addition, subtraction, multiplication, and Montgomery's algorithm for multiplication. The second application implements the functionality of AC components (Access Control). This functionality is for example – authenticate received token, digital signature authentication, generating random numbers, logging etc.
APA, Harvard, Vancouver, ISO, and other styles
22

Galia, Fabrice. "Supervision automatique de la ventilation artificielle en soins intensifs : investigation d'un système existant et propositions d'extensions." Phd thesis, Université Paris-Est, 2010. http://tel.archives-ouvertes.fr/tel-00627248.

Full text
Abstract:
Les objectifs de la thèse sont l'a nalyse approfondie d'un système de supervision automatique de la ventilation artificielle des patients hospitalisés en soins intensifs et l'élaboration de solutions pour améliorer et étendre son fonctionnement. Ce système adapte l'assistance en pression de la ventilation spontanée avec aide inspiratoire (AI) par un rétrocontrôle basé sur la fréquence respiratoire du patient et, comme variables de "sécurité", le volume courant et le CO2 de fin d'expiration (etCO2). Il établit ainsi une classification ventilatoire et règle un niveau de pression d'AI.Sur la base d'études publiées rapportant des limitations, d'analyses d'une base de données rétrospectives acquises sur patient, d'études sur banc-test et d'études observationnelles prospectives réalisées chez les patients, nous avons étudié précisément le fonctionnement du système. Pour la plupart des limitations, une solution a été proposée et évaluée sur banc. A partir d'une étude clinique, nous avons proposé une amélioration de la procédure de traitement du signal etCO2 par le système. En nous basant sur les observations de la base de données, nous avons décrit une procédure automatisée de sevrage de la PEP dont un niveau supérieur à 5 mbar entrave le sevrage par le système. Sur le même principe, nous avons souhaité, en amont de l'AI, tenter d'automatiser un changement de mode depuis la ventilation assistée contrôlée. Au travers d'une étude clinique, nous avons déterminé des critères ventilatoires qui pourraient permettre d'automatiser cette procédure. L'ensemble a permis la définition d'une méthodologie d'évaluation et d'amélioration d'un système automatisé de ventilation artificielle
APA, Harvard, Vancouver, ISO, and other styles
23

Thuillet, Céline. "Implantations cryptographiques sécurisées et outils d’aide à la validation des contremesures contre les attaques par canaux cachés." Thesis, Bordeaux 1, 2012. http://www.theses.fr/2012BOR14508/document.

Full text
Abstract:
Depuis plusieurs années, les composants dédiés à la sécurité comme les cartes à puce sont soumises à des attaques dites par canaux cachés. Ces attaques permettent d'exhiber les secrets en analysant des caractéristiques physiques comme la consommation du composant ou encore son temps d'exécution. Dans le cadre de cette thèse, deux contremesures ont été réalisées et appliquées à l'AES (algorithme de chiffrement symétrique). De plus, afin d'aider les développements futurs des contremesures et la validation de celles-ci, un simulateur a été développé. Il permet de réaliser des attaques grâce à un modèle de consommation défini dans les phases amont de développement. Enfin, j'ai pu participer aux groupes de travail qui ont proposé Shabal à la compétition SHA-3, qui vise à définir un nouveau standard pour les fonctions de hachage. Des implantations matérielles ont été réalisées par la suite
For several years, the security components such as smart cards are subject to side channel attacks. These attacks allow to exhibit secrets by analyzing the physical characteristics such as power consumption or execution time. As part of this thesis, two countermeasures were carried out and applied to the AES (symmetric cipher). In addition, to help future development of countermeasures and their validation, a simulator was developed. It realizes attacks using a power consumption model defined in the early phases of development. Finally, I participated in working groups that have proposed Shabal to SHA-3 competition, which aims to define a new standard for hash functions. Hardware implementations have been made thereafter
APA, Harvard, Vancouver, ISO, and other styles
24

Pettinari, Federico. "Un Framework per Simulazione e Sviluppo di Sistemi Aggregati di Smart-Camera." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2019. http://amslaurea.unibo.it/19092/.

Full text
Abstract:
Le smartcam sono telecamere capaci di rilevare entità di interesse, e sono generalmente impiegate nella sorveglianza. Con l'avanzamento della tecnologia si è creata la possibilità di renderle mobili e dotarle di mezzi trasmissivi. Questo ha aperto grandi opportunità per la coordinazione di reti di smartcam con lo scopo di aumentarne l'efficienza. Lo sviluppo di tali sistemi può beneficiare dall'impiego di specifici strumenti per la simulazione e programmazione in modo da facilitarne l'implementazione e la valutazione. Nell'ambito di questa tesi viene adottato Alchemist, uno degli ambienti che consentono simulazioni di Collective Adaptive System. Vengono quindi illustrate e discusse la fasi di sviluppo di un nuovo modulo software volto ad estendere Alchemist con il supporto alle smartcam. Inoltre vengono riprodotti alcuni algoritmi presenti in letteratura ed implementati di nuovi con l'ausilio dell'Aggregate Programming, un paradigma per la programmazione di sistemi distribuiti. Questi algoritmi hanno lo scopo di creare un sistema adattativo di smartcam che comunicano fra di esse per coordinarsi nei movimenti, e nella decisione degli obiettivi da raggiungere. L'obiettivo è l'incremento del livello di copertura della zona alla quale sono preassegnate, ed il raggiungimento di un certo livello di ridondanza nell'osservazione di eventuali entità di interesse. Infine viene effettuata una validazione empirica degli algoritmi attraverso la simulazione di alcuni scenari.
APA, Harvard, Vancouver, ISO, and other styles
25

Ngueya, Wandji Steve. "Conception de circuits mémoires flash pour plateforme ultra faible consommation." Thesis, Aix-Marseille, 2017. http://www.theses.fr/2017AIXM0586.

Full text
Abstract:
Le marché des objets connectés sécurisés est en plein essor et nécessite des plateformes de développement faible consommation pour des applications sans contact dans des facteurs de forme réduits. La réduction du facteur de forme impacte l’antenne et entraîne une baisse de l’énergie disponible dans la puce, qui, pour travailler à performances égales, doit voir sa consommation diminuer drastiquement. Un des principaux contributeurs à la consommation est la mémoire non-volatile embarquée (eNVM) utilisée pour le stockage et l’exécution du code. Il faut donc, pour une technologie donnée, être capable de concevoir des blocs périphériques du plan mémoire de manière à réduire la consommation au maximum. L’objectif de la thèse est donc de sélectionner une technologie eNVM très faible consommation compatible avec le procédé technologie CMOS classique, d’identifier les blocs critiques lors des opérations de la mémoire, et enfin de proposer des solutions de minimisation de la consommation pour chaque bloc critique. Pour ce faire, une étude de toutes les mémoires non volatiles embarquées disponibles sur le marché est réalisée. Il en ressort que la technologie Flash, en particulier la Flash NOR embarquée de type SuperFlash® ESF3, est la mieux adaptée pour les systèmes télé-alimentés. L’étude de la macro Flash NOR montre que durant l’écriture et l’effacement, la consommation du système est en partie liée à la génération de la haute tension par les pompes de charge. Par contre, durant la lecture, les performances globales du système sont déterminées par l’amplificateur de lecture. Ainsi, un travail de conception de chaque bloc individuel est mis en oeuvre pour réduire la consommation
The market of secure connected devices is booming and requires low power development platforms for contactless applications in reduced form factors. The reduction in the form factor impacts the antenna size and thus leads to a decrease of the energy available in the chip, which should reduce drastically its consumption while keeping performances. One of the main contributors to the chip consumption is the embedded non-volatile memory (eNVM) used for storage and code execution. Therefore, for a given technology, it is necessary to design peripheral blocks of the memory array under strong consumption constraints. The aim of the thesis is to select a very low-power embedded nonvolatile memory technology compatible with the classical CMOS process, to identify the critical blocks during the operations of the memory, and finally to propose solutions to minimize the power consumption of each critical block.In order to do this, a study of all the embedded non-volatile memories available on the market is carried out. It emerges that the Flash technology, in particular the SuperFlash® ESF3 based NOR Flash technology, is best suited for remote-powered systems. The study of the NOR Flash macrocell shows that during write and erase operations, the system consumption is mainly related to the high voltage generation by charge pumps. However, during a read operation, overall performances of the system is determined by the sense amplifier. A design work for each individual block is then implemented to reduce consumption
APA, Harvard, Vancouver, ISO, and other styles
26

"An asynchronous DES in contactless smartcard." 2004. http://library.cuhk.edu.hk/record=b5891905.

Full text
Abstract:
Siu, Pui-Lam.
Thesis submitted in: August 2003.
Thesis (M.Phil.)--Chinese University of Hong Kong, 2004.
Includes bibliographical references (leaves 104-109).
Abstracts in English and Chinese.
list of figures --- p.5
list of tables --- p.7
acknowledgements --- p.8
abstract --- p.9
Chapter 1. --- introduction --- p.12
Chapter 1.1 --- Smart Card --- p.12
Chapter 1.1.1 --- What is a smart card? --- p.12
Chapter 1.1.2 --- How is a smart card different from the magnetic stripe card that I carry in my wallet? --- p.13
Chapter 1.1.3 --- Why are interoperability and enforced standards crucial to widespread adoption of smart cards? --- p.13
Chapter 1.1.4 --- Contact vs Contactless --- p.14
Chapter 1.1.5 --- How secure and confidential contactless smart cards are? --- p.14
Chapter 1.1.6 --- Contactless Smart Card Application Contactless smart cards are widely used in commercial fields as stored-value and secure storage cards --- p.14
Chapter 1.1.7 --- What are the major benefits that Contactless smart cards offer to consumers? --- p.16
Chapter 1.2 --- Design Motivation --- p.16
Chapter 1.3 --- RF Part Interface --- p.17
Chapter 1.4 --- Potential Advantages of Using Asynchronous Circuit --- p.19
Chapter 1.5 --- Design Methodology for Asynchronous Circuit --- p.23
Chapter 1.5.1 --- Difficulty and limitation of asynchronous design --- p.27
Chapter 1.5.2 --- Asynchronous pipeline --- p.28
Chapter 2. --- background theory --- p.32
Chapter 2.1 --- Description of DES --- p.32
Chapter 2.1.1 --- Outline of the Algorithm --- p.33
Chapter 2.1.2 --- Initial Permutation --- p.35
Chapter 2.1.3 --- Key Transformation --- p.35
Chapter 2.1.4 --- Expansion Permutation --- p.37
Chapter 2.1.5 --- S-box Substitution --- p.38
Chapter 2.1.6 --- P-Box Permutation --- p.41
Chapter 2.1.7 --- Final Permutation --- p.42
Chapter 2.1.8 --- Decrypting DES --- p.43
Chapter 2.1.9 --- Security of DES --- p.43
Chapter 2.1.10 --- Weak Keys --- p.43
Chapter 2.1.11 --- Algebraic Structure --- p.46
Chapter 2.1.12 --- Key Length --- p.46
Chapter 2.1.13 --- Number of Rounds --- p.48
Chapter 2.1.14 --- Design of the S-Boxes --- p.48
Chapter 3. --- rf part --- p.50
Chapter 3.1 --- Power On --- p.51
Chapter 3.2 --- Power Induction --- p.52
Chapter 3.3 --- Limiter and Regulator --- p.54
Chapter 3.4 --- Demodulation --- p.56
Chapter 3.5 --- Modulation --- p.57
Chapter 4. --- asynchronous circuit theory --- p.58
Chapter 4.1 --- Potential Problem of Classical Asynchronous Pipeline --- p.58
Chapter 4.2 --- The New Handshake Cell --- p.58
Chapter 4.3 --- The Modified Asynchronous Pipeline Architecture --- p.60
Chapter 4.4 --- Asynchronous Circuit Comparison --- p.65
Chapter 5 --- implementation --- p.67
Chapter 5.1 --- DES Implementation --- p.67
Chapter 5.1.1 --- Power estimation of the asynchronous DES --- p.70
Chapter 5.1.2 --- Modified Circuit --- p.73
Type One --- p.73
Type two --- p.76
Chapter 5.1.3 --- Interface --- p.79
Chapter 5.1.4 --- Shift Unit --- p.80
Chapter 5.1.5 --- Multiplexer Unit --- p.82
Chapter 5.1.6 --- Compression Unit --- p.83
Chapter 5.1.7 --- Expansion Unit --- p.84
Chapter 5.1.8 --- Xor Unit --- p.85
Chapter 5.1.9 --- S_box Unit --- p.86
Chapter 5.1.10 --- P-box unit --- p.88
Chapter 5.1.11 --- Latch unit --- p.89
Chapter 5.1.12 --- Transmission Unit --- p.90
Chapter 5.2 --- Floor Plan Design --- p.90
Chapter 6. --- result and discussion --- p.93
Chapter 6.1 --- Simulation Result --- p.93
Chapter 6.2 --- Measurement --- p.97
Chapter 6.3 --- Comparison --- p.101
Chapter 6.4 --- Conclusion --- p.101
Chapter 7. --- reference --- p.104
Chapter 8. --- appendix --- p.110
Chapter 8.1 --- RF Part Implementation --- p.110
Chapter 8.1.1 --- Full wave rectifying circuit --- p.110
Chapter 8.1.2 --- "Limiting Circuit," --- p.111
Chapter 8.1.3 --- Regulator circuit --- p.113
Chapter 8.1.4 --- Demodulation circuit --- p.113
Chapter 8.1.5 --- Simulation of the RF part --- p.115
Chapter 8.2 --- New Technology for Designing a RF Interface --- p.117
Chapter 8.2 --- Block Diagrams --- p.118
APA, Harvard, Vancouver, ISO, and other styles
27

Chen, Kuei-Fu, and 陳癸夫. "SecCap:Automatically Securing Personal Documents with Smartcard Authentication." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/77387438045175474089.

Full text
Abstract:
碩士
國立交通大學
資訊科學與工程研究所
96
Document security is now an important issue on personal computer. According to the statistics show[25], as high as 92% of end-users are using Microsoft Windows operating system of the world. In which, 90% of users will not encrypt to protect their confidential documents in their computers. More than 80% of security threats are issued from internal of company[20]. If the attacker, who think to steal data, can obtain the computer entity, all unencrypted documents are exposed. The user will not encrypt his confidential documents because he thinks it needs more complex procedure to encrypt them manually, or does not understand the importance of encryption protection. In view of this, in this paper, we propose a software system: SecCap, which is based on NTFS file system, Windows user and key management. SecCap authenticates the user by smartcard, and automatically encrypts the confidential documents with acceptable overhead. This is the main hope to solve above problem, so that users can more easily reach to goal of personal document security.
APA, Harvard, Vancouver, ISO, and other styles
28

Yen-Hung, Chen. "An Implementation of PMI+ on Low-Cost SmartCard." 2005. http://www.cetd.com.tw/ec/thesisdetail.aspx?etdun=U0001-2707200503092200.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Yang, Shih-Sian, and 楊士賢. "Design and Implementation of a Security Mechanism for Smartcard." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/78768w.

Full text
Abstract:
碩士
國立中山大學
電機工程學系研究所
97
In this thesis, we used a encryption mechanism based on AES(Advenced Encryption Standard). Except for this mechanism, we also combine RS-232 Serial Communication Control, Smartcard and EM card which originally used in the Entrance Guard System to implement a new system. Eventually, this new system applies to a certain rental system practically. We also introduce some functions of this rental system based on the encryption mechanism, station initialization, bike rental, bike allocation and bike rental for credit card for example. In addition, we will describe what problems we met and the solutions we introduced to the problems finally.
APA, Harvard, Vancouver, ISO, and other styles
30

Kuo, Wei-Chih, and 郭韋志. "A Study of Authorization Mechanisms with SmartCard in WebATM." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/90457863745690583255.

Full text
Abstract:
碩士
世新大學
資訊管理學研究所(含碩專班)
94
With the vigorous development of Internet nowadays, people increasingly rely on it and have various Internet-based transactions at their convenience, for example, electronic auction, electronic cash, electronic payment and electronic bid. As regards personal transaction, people now can utilize the on-line bank to check the balance of their account, to settle payments and to do investments. Those on-line functions save the user’s transportation cost & waiting time at the back counters. To provide those on-line services, however, the banks have plenty of cost to cover because every on-line user needs to be authenticated as that bank’s customer and get the security certificate. In the past few years, the fraud group has run amuck to cheat many people financially. The government then implement the usage of IC card in 2005 to replace the easily duplicated bar magnet card. The rollout of the IC card has enhanced the transactions security greatly and provides the platform for WebATM. Comparing to a physical ATM, the only function that the WebATM does not support is to withdraw really cash from it. Except for it, people can operate much more transactions on WebATM with the punishment of various functions provided by the bank. The concept of authorization has become very important due to the trend of increasingly on-line transactions and the idea of AAA. This research is based on the how the authorization mechanism of the Smart card can be utilized on the current WebATM system in order to meet the needs of the customers, the bank and the merchants in the future to perform diversified transactions.
APA, Harvard, Vancouver, ISO, and other styles
31

邱詩淳. "Exploring Smartcard and Data Mining to Improve Bus Operation Strategies." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/52028853440650314502.

Full text
Abstract:
碩士
中華大學
運輸科技與物流管理學系(所)
95
In the past, the researches about bus operation have had the same shortage, which was always without complete and reliable OD Table. Fortunately, after the popularity of Taipei Smartcard, the data of rider pay can be recorded by Smartcard at the same time. Gradually, the public transportation has become a large database industry, which has many useful concealed information. In addition, data mining is also a good technique to analyze the stored data in large databases to discover potential information and knowledge. This research constructs real passenger OD Table by Taipei Smartcard System’s data and Taipei County e-bus System’s data. As well as explore real OD Table to generate bus operation strategies. This research discusses the short-turn service route and express service route. It applied Data Mining technology about clustering and association rules to figure out optimal short-turn service route and optimal express service route, with the objective to save maximum the sum of operator’s cost (including traveling time cost and distance cost)and passengers’ travel time cost (including in-vehicle time cost and waiting time cost). A case study by 802 route shows an optimal condition. By this research, the result shows that the best improving effect of short-turn service is the afternoon peak time period, and the best improving effect of express service is the morning peak time period. It also reflects that operators should base on passengers’ demand to adjust their operational strategies. Overall, the effect of short-turn service is better than express service. However, the performance of optimal short-turn service route solution surpasses the present short-turn service. By the sensitive analysis, excluding from the cost of passenger’s waiting time, we could save more total cost if other factors’ costs arise. It implies that providing customized service not only the passengers may get more suitable bus service but also the operator may save more cost.
APA, Harvard, Vancouver, ISO, and other styles
32

Chiu, Shih-Chun, and 邱詩淳. "Exploring Smartcard and Data Mining to Improve Bus Operation Strategies." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/03279307704703251563.

Full text
Abstract:
碩士
中華大學
運輸科技與物流管理學系碩士班
94
In the past, the researches about bus operation have had the same shortage, which was always without complete and reliable OD Table. Fortunately, after the popularity of Taipei Smartcard, the data of rider pay can be recorded by Smartcard at the same time. Gradually, the public transportation has become a large database industry, which has many useful concealed information. In addition, data mining is also a good technique to analyze the stored data in large databases to discover potential information and knowledge. This research constructs real passenger OD Table by Taipei Smartcard System’s data and Taipei County e-bus System’s data. As well as explore real OD Table to generate bus operation strategies. This research discusses the short-turn service route and express service route. It applied Data Mining technology about clustering and association rules to figure out optimal short-turn service route and optimal express service route, with the objective to save maximum the sum of operator’s cost(including traveling time cost and distance cost)and passengers’ travel time cost(including in-vehicle time cost and waiting time cost). A case study by 802 route shows an optimal condition. By this research, the result shows that the best improving effect of short-turn service is the afternoon peak time period, and the best improving effect of express service is the morning peak time period. It also reflects that operators should base on passengers’ demand to adjust their operational strategies. Overall, the effect of short-turn service is better than express service. However, the performance of optimal short-turn service route solution surpasses the present short-turn service. By the sensitive analysis, excluding from the cost of passenger’s waiting time, we could save more total cost if other factors’ costs arise. It implies that providing customized service not only the passengers may get more suitable bus service but also the operator may save more cost.
APA, Harvard, Vancouver, ISO, and other styles
33

Chen, Chien-Hung, and 陳建宏. "The study of consumers’ use intention on contactless smartcard —the case of Taipei EasyCard." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/70701178153263725014.

Full text
Abstract:
碩士
國立成功大學
交通管理學系碩博士班
92
The contactless smartcard is a new ticketing medium used in public transport. Besides satisfying the consumers’ convience, it could promote the rate of use. The purpose of this study therefore is to investigate the determinants of use intention. Data for this study was collected from the questionnaire survey, and the questionnaires were distributed to 300 consumers at public transport locations in Taipei, 194 vaild questionnaires were returned with a response rate of 65%.   By the factor analysis, the results indicate that the most important nine determinants are correctness, ticket appearance, cost, security, generality, consumers service, advertisement, diversification, and service coverage. It is also found that the consumers could be divided into three segments, all-importance oriented, all-non importance oriented, and pursuing newfangled oriented.   The Structual Equation Model (SEM) was used to examine the effect of Product Performance, Infrastructure, Marketing, and Function Values on consumers’ use intention. The results showed the Product Performance, Marketing and Function Values influenced the use intention directly. Finally, some useful suggestions were provided to the EasyCard company, subsequent studies and future ticket systems, to prevent the same mistatkes from happening again.
APA, Harvard, Vancouver, ISO, and other styles
34

"Exploring socio-technical relations : perceptions of Saskatoon Transit’s go-pass smartcard and electronic fare system." Thesis, 2012. http://hdl.handle.net/10388/ETD-2012-12-915.

Full text
Abstract:
It is essential to consider what new technologies mean to the people who use them and the ways in which they are experienced and used. In the context of public transit services in Saskatoon, understanding what the recent changes from a manual to an electronic/automated system means to users and the broader community is critically important to the overall assessment of the service. Investigating users’ lived experiences and interpretations of technical artifacts is valuable to understanding socio-technical relations or the embodied interactions of humans and machines as “technologies-in-practice.” Research into socio-technical relations has primarily focused on large scale technological systems and expert practices while less attention has been paid to “seemingly mundane” technologies or technical artifacts routinely used in everyday life. At the same time, this preoccupation has overshadowed or downplayed the importance of exploring users’ experiences and interpretations of technologies. The goal of this research is to contribute to the sociological understanding of mundane technologies-in-practice and socio-technical relations more broadly. In order to gain insight into this relationship, this thesis focuses on bus riders’ (users) and the community’s perceptions of the Go-Pass smartcard and electronic fare system used by the public transit service in Saskatoon. The perspectives of Go-Pass users and community stakeholders (n=15) were investigated using qualitative semi-structured interviews to gain deeper understanding into the complex relationship between users and technologies. Drawing from Science and Technology Studies (STS) and the sociology of technology literature, I propose that a sociomaterial theoretical perspective following a mutual shaping framework offers insight into socio-technical relations. Both critical and feminist technology studies literature has been helpful for developing an understanding of the wider social and political contexts of technical use which underscores this study. In particular, the conceptual insights of “socio-technical assemblages” (Suchman, 2007) and “intra-action” (Barad, 2003) have been helpful tools for exploring agency, subjectivity and power which is key to uncovering the intricacies of socio-technical relations and human-machine interaction. The four main themes emerging from this study were: 1) shifting human-machine roles and relationships; 2) the socio-technical construction of the bus rider; 3) configuring users’ and technologies; and 4) structural issues and social justice implications of technologies-in-practice. The findings demonstrate that the use of this new system is mutually co-constructed by both social and technical factors whereby both the users and the technology inform perceptions and use. There was also the unexpected connection between users’ everyday situated uses, experiences and interpretations of the Go-Pass technologies to wider social-political contexts. There were a number of issues raised in relation to the implementation of the Go-Pass system which had negative effects or unintended social and technical consequences particularly for those most marginalized economically. At the same time, there were important benefits and positive effects on riders’ quality of life and use of the service. Finally, participants’ perspectives have contributed to understanding what the Go-Pass technologies mean to them, the ways in which they are used in practice and the ways in which the mixing of people and seemingly mundane technologies shape relations in everyday settings.
APA, Harvard, Vancouver, ISO, and other styles
35

Malungana, Lario. "A framework for the implementation of smartcard system for grant payments in rural South Africa." 2015. http://encore.tut.ac.za/iii/cpro/DigitalItemViewPage.external?sp=1001929.

Full text
Abstract:
M. Tech. Business Information Systems
The South African government provides grants for social assistance as an income. The Social Grant is paid by South African Social Security Agency (SASSA) using the Smartcard System for distribution of funds to beneficiaries who are classified as: Old Age Grant; Child Grant; War Veteran Grant; Foster Care Grant; Disability Grant; Care Dependency Grant; and Grant-in-Aid. Smartcard System was implemented for the developed countries and developing countries, however, in South Africa, the implementation appears to have some deficiencies. The implementation in the rural areas is not the same as the one in the urban areas due to technical infrastructure and training. The main objective of this study is to determine factors that contribute to successful implementation of Smartcard System and to develop an appropriate framework for the implementation of the Smartcard System in rural South Africa. aim of this research.
APA, Harvard, Vancouver, ISO, and other styles
36

Rensleigh, Christopher William. "Veilige indentifikasietegnieke vir gebruikers van rekenaarstelsels." Thesis, 2014. http://hdl.handle.net/10210/12329.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

林明憲. "以健保申報制度與SmartCard為基礎之病史查詢及醫療資訊交換安全機制." Thesis, 2002. http://ndltd.ncl.edu.tw/handle/49797582831235628439.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Kilian-Kehr, Roger [Verfasser]. "Mobile security with smartcards / von Roger Kilian-Kehr." 2002. http://d-nb.info/964581590/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Lin, Li-Chu, and 林麗珠. "Integrating Smartcards in to The Fare System in Buses and Rapid Transportation Systems in Taipei Metropolitan Area." Thesis, 1997. http://ndltd.ncl.edu.tw/handle/42094790623926763817.

Full text
Abstract:
碩士
國立交通大學
交通運輸研究所
85
Integrating Smartcards in to The Fare System in BusesAnd Rapid Transportation Systems in TaipeiMetropolitan AreaStudent: Li-Chu Lin Advisor: Dr. Cheng-ch''uan HuangInstitute of Traffic and TransportationNational Chiao Tung UniversityABSIRACTThe application of smartcards is increasing. In transportation, we use it in systems including railroads, buses, MRT, Taxis, parking, tolls, etc. To solve the problem of fare system in buses and MRT systems in Taipei effectively, we integrate smartcards into the fare system. Therefore, the goal in this stage is to reach the point where "one single cards can need to get around in Taipei".The purpose of this study is to discuss the development and application in automatic electronic fare collection systems in MT systems all over the world, and examine the present fare system in buses and MRT systems in Taipei metropolitan area. Secondary, to analyze the effect of the fare integration system and the need of users, operators, and governmental managers. The establishment of appropriate type of organization is also discussed and evaluated. According to the result, the best alternative selling Center clearing center, multiple cards and selling units. According to the results of benefit/cost analysis, this alternative will provide IRR (internal rate of return) higher than the reasonable rate of return on investment used by the operators of buses and MRT systems. The present value of annual net benefit is positive which means this is a feasible solution.Keyword: smartcard, fare integration, benefit/cost analysisii
APA, Harvard, Vancouver, ISO, and other styles
40

CHEN, JIA-PING, and 陳家平. "Explore Electronic Cash Cards (Smartcards) to Consume-Behavior of ConsumersThrough Technology Acceptance Model- as the Case of IPASS." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/kfk28c.

Full text
Abstract:
碩士
國立屏東大學
資訊科學系碩士班
104
IPASScard is an electronic ticket which generally used in Southern Taiwan. Electronic tickets are equipped with a micropayment. With this function, it may apply on banks, convenience stores, restaurants, department stores, tourism using, local commercial district, and horizontal alliances in hospitals. Furthermore, the iPASS Corporation has issued over 9.6 million iPASS cards. It is now available on nearly 20,000 places such as public transportation (Taipei Metro, Kaohsiung Mass Rapid Transit, buses, public bikes), convenience stores, Px Marts, CPC Corporation, department stores, supermarkets, and chain tea shops in Taiwan. With the electronic tickets or co-branded credit cards involving the micropayment, the feature of consumption of automatic small-sums deposit and payment, users may make small-sums payments around Taiwan. The study was recognized as a new product, discussed with Technology Acceptance Model. The method to carry out this study was using a survey – “Explore electronic cash cards (smartcards) to consume-behavior of consumers through technology acceptance model-as the case of IPASS” designed by the researcher. Most of the participants in this study were universities students in Kaohsiung, and 482 questionnaires were returned. The researcher served SPSS as modeling tools of data collect and statistical analysis, containing a behavioral intention to use, a cognitive sensory, a perceived ease of use, and a perceived usefulness, of Technology Acceptance Model. The researcher collected the data to describe statistics, t test, analysis of variance , and other analysis. In order to realize the acceptance of iPASS card of consumers from universities students in Kaohsiung, and analyze the consumption level and the behavioral intention of iPASS of those students, the researcher analyzed those circumstances of using iPASS of the consumers with variable background, such as subjects’ genders, ages, academic years, residences, modes of transport, experiences of taking part-time jobs, and personal economic situation per month. The researcher further discussed about differences between each variable background, and the adding values, acceptance, behavioral intention of iPASS impacting on consumer behaviors. Furthermore, the study analyzed the key factor impacting users accepted iPASS. The conclusions of the study are as follows: 1.The behavioral intention of using iPASS cards for the micropayment of the students of universities in Kaohsiung reached a positive significant level. 2.There is a positive correlation between the perceived ease of use and the behavioral intention, of the students of universities in Kaohsiung. 3.There is a positive correlation between the perceived usefulness and the behavioral intention, of the students of universities in Kaohsiung. 4.There is a positive correlation between the cognitive sensory and the behavioral intention, of the students of universities in Kaohsiung. 5.The various life habits, residences, modes of transport and experiences of taking part-time jobs between the students of universities in Kaohsiung made the differences of ways of using iPASS cards for micropayment. However, the difference of personal usable money per month made a significance difference.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography