Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników

Znaleziono wyników: 6

Liczba wyników na stronie
first rewind previous Strona / 1 next fast forward last
Wyniki wyszukiwania
Wyszukiwano:
w słowach kluczowych:  karta inteligentna
help Sortuj według:

help Ogranicz wyniki do:
first rewind previous Strona / 1 next fast forward last
EN
In the era of dynamic development of ICT and its increasingly common use in every aspect of life, automated fare collection systems in the public transport became a standard in large cities throughout the world. The systems implemented worldwide, including Poland, differ in assumptions and technologies used. A part of the solutions already implemented is based on the so-called Check-In and Check-Out model, which raises a lot of social fears. The aim of the paper is to present premises that are decisive for the implementation of e-ticket systems in urban public transport, which are based on the registration of the entry to and exit from a vehicle.
EN
The protection of information that reside in smart devices like IoT nodes is becoming one of the main concern in modern design. The possibility to mount a non-invasive attack with no expensive equipment, such as a Power Analysis Attack (PAA), remarks the needs of countermeasures that aims to thwart attacks exploiting power consumption. In addition to that, designers have to deal with demanding requirements, since those smart devices require stringent area and energy constraints. In this work, a novel analog-level approach to counteract PAA is presented, taking benefits of the current-mode approach. The kernel of this approach is that the information leakage exploited in a PAA is leaked through current absorption of a cryptographic device. Thanks to an on-chip measuring of the current absorbed by the cryptographic logic, it is possible to generate an error signal. Throughout a current-mode feedback mechanism, the data-dependent component of the overall consumption can be compensated, making the energy requirement constant at any cycle and thwarting the possibility to recover sensible information. Two possible implementations of the proposed approach are presented in this work and their effectiveness has been evaluated using a 40nm CMOS design library. The proposed approach is able to increase the Measurements to Disclosure (MTD) of at least three orders of magnitude, comparing to the unprotected implementation. It has to be pointed out that the on-chip current-mode suppressor, based on the proposed approach, is able to provide a very good security performance, while requiring a very small overhead in terms of silicon area (xl.007) and power consumption (xl.07).
3
Content available remote Testing fault susceptibility of Java Cards
EN
The paper presents a tool for fault injection in Java Card environment based on cref simulator. Using it we examine the problems related to faults sensitivity and the impact of these on security functions and proper Java Card applet execution. During experiments we have checked applets reliability and possible information leaks or security faults in the reference to the injected faults. In this article we describe our experiments and their results.
PL
W artykule przedstawiono narzędzie do wstrzykiwania błędów w środowisku Java Card przygotowane na podstawie symulatora cref. Z jego pomocą sprawdzona została wrażliwość apletów na zakłócenia tj. ich wpływ na zabezpieczenia oraz poprawne działanie aplikacji dla Java Card. Wykonane eksperymenty miały na celu zbadanie niezawodności działania apletów oraz możliwych wycieków informacji czy naruszeń bezpieczeństwa na skutek wprowadzonych błędów. W artykule zaprezentowano przeprowadzone eksperymenty i omówiono ich rezultaty.
4
Content available Modułowy system kontroli dostępu dla dydaktyki
PL
W artykule przedstawiono projekt i realizację praktyczną systemu dydaktycznego wspomaganego komputerowo dla praktycznego zaznajomienia studentów z głównymi konfiguracjami pracy systemów kontroli dostępu. Głównym celem systemów kontroli jest selekcja dostępu do bardzo różnorodnych obiektów i systemów technicznych. Zrealizowany system składa się z 4 indywidualnych stanowisk laboratoryjnych. Pojedyncze stanowisko laboratoryjne jest sterowane modułem kontrolera przejścia. W zależności od pożądanej konfiguracji moduł drzwiowy jest wyposażony w: czytnik kart inteligentnych z klawiaturą, czytnik pastylek Dallas, moduł przycisku otwarcia, manipulator. Indywidualne stanowiska mogą pracować niezależnie lub po kontrolą kontrolera nadrzędnego - wtedy odpowiadają małemu systemowi kontroli dostępu z czterema przejściami. Studenci mogą poznać różne sposoby identyfikacji, począwszy od użycia liczbowych kodów dostępu a skończywszy na kartach identyfikacyjnych i żetonach w postaci pastylek Dallas.
EN
This paper presents the design and implementation of a practical teaching computer-aided system for practical familiarization of students with the main configuration of access control systems work. The selection of access to a wide variety of technical objects and systems is the main purpose of control systems (Fig. 1). Identification of authorized persons is carried out with use of different techniques, ranging from presentation of saved access codes, identification cards and ending with biometric recognition. Understanding the technical solutions access control systems is one of the main stages of study on safety engineering. An educational access control system should enable the implementation of configuration transition from both sides access control, configuration of the lock, and operation of the master controller. The realized system consists of 4 individual laboratory stands. Each laboratory stand is a controlled door controller module and the main element is the door module shown in Fig. 2. Depending on the desired configuration, the door module is equipped with: a smart card reader with a keypad, a reader of Dallas pellets, an opening button module, a manipulator. The individual laboratory stands can work independently or under control of the master controller - then they correspond to a small access control system with four transitions (Figs. 4-6). There are defined access schedules for users - we have a weekly schedule, daily and the so called time frames. The setting of access hours is implemented in the time frames. It is possible to insert a number of time frames in a day (Fig. 7). Students can explore different ways of identification, from the use of numeric access codes and to identification cards and tokens in the form of Dallas pellets.
PL
W publikacji opisano proces uwierzytelniania użytkowników w systemach operacyjnych Microsoft Windows. Przedyskutowano obecne możliwości systemów w tym zakresie, ze szczególnym zwróceniem uwagi na możliwość zastosowania kart inteligentnych w procesie uwierzytelniania.
EN
The paper presents the process of user authentication on Windows operating systems. What is also discussed are current features of operating systems concerning this matter, with special attention to the possibility of using smart cards in the authentication process.
EN
The article presents solutions in health care, which were discussed and considered in Poland during the last period of time. Starting from traditional solutions, paper document based, EDI, chip card and virtual models are described and confronted.
first rewind previous Strona / 1 next fast forward last
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.