Advanced SearchSearch Tips
Implementation of Adult Authentication System Using Smartphone and Near-Field Communication
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
  • Journal title : Journal of IKEEE
  • Volume 19, Issue 4,  2015, pp.617-624
  • Publisher : Institude of Korean Electrical and Electronics Engineers
  • DOI : 10.7471/ikeee.2015.19.4.617
 Title & Authors
Implementation of Adult Authentication System Using Smartphone and Near-Field Communication
Lee, Chongho; Lee, Seongsoo;
  PDF(new window)
In this paper, an adult authentication system based on authentication certificate was designed and implemented using smartphone and near-field communication. It has three advantages. First, it achieves easy, convenient, and fast authentication by using smartphone and near-field communication. Second, it achieves extremely high security and reliability by exploiting authentication certificate. Third, it achieves extremely low risk of personal information leakage by generating and sending only virtual identification code. Finally, it has a proper legal basis by Digital Signature Act. It consists of adult authentication module, near-field communication control module, policy server module, and database server module. A prototype of the proposed system was designed and implemented, and it was verified to have correct operation.
adult authentication;authentication certificate;smartphone;NFC;virtual ID;
 Cited by
J. Lee, "Applications and Problems of Authentication Certificate in Smart Environment", Internet & Security Focus, pp. 23-53, Mar. 2013.

Y. Jung, S. Lee, H. Oh, and T. Jeon, "Research on the Influence of Absorbing Sheet for Electrical Performance of NFC Antenna", Journal of IKEEE, vol. 16, no. 3, pp. 167-172, Sep. 2013.

ITU-T Recommendation X.509, "Information Technology - Open Systems Interconnection - The Directory: Public-key and attribute certificate frameworks", 2012.

OASIS PKCS#11, "Cryptographic Token Interface Base Specification, Interface Profiles, Current Mechanisms Specification, and Historical Mechanisms Specification", 2014.

IETF RFC 4683, "Internet X.509 Public Key Infrastructure Subject Identification Method", 2006.

B. Kim and I. Shin, "Implementation of Authentication Algorithm for CDMA Digital Mobile Communication System", Journal of IKEEE, vol. 3, no. 2, pp. 204-214, Dec. 1999.