Hong-Il Ju
Electronics and Telecommunications Research Institute
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Hong-Il Ju.
international conference on consumer electronics | 2010
Mooseop Kim; Hong-Il Ju; Young-Sae Kim; Jiman Park; Youngsoo Park
This paper presents the design and implementation of a Mobile Trusted Module (MTM), which should satisfy small area and low-power condition. Unlike the general Trusted Platform Module (TPM) for PCs, the MTM, that is to be employed in mobile devices, has very stringent limitations with respect to available power, circuit area and so on. Therefore, MTM needs the spatially-optimized architecture and design method. We firstly introduce the design requirements for MTM and then implement a compact and power efficient MTM chip based-on the introduced requirements. The designed MTM can support all the necessary functions for trusted computing using 400K logic gates and consumes at most 10mA.
international conference on information and communication technology convergence | 2012
Hong-Il Ju; Jeong-Nyeo Kim
In this paper, we described security threats on smart devices and proposed the security architecture for smart devices. The proposed security architecture for smart devices is the separated and hardware-based security solution which is strong more than only software-based solutions. In recent, smart devices have been widely used and are becoming an important and serious issue of security. For protecting from security threats, various security solutions have been studied and provided, but they still have security vulnerabilities and limitations for smart devices. Therefore, for the more efficient security solutions for smart devices, we described the analysis of current mobile security solutions and recommended the security architecture for building secure execution environment on smart devices.
The Kips Transactions:parta | 2003
Yong-Sung Jeon; Jimann Park; Hong-Il Ju; Sung-Ik Jun
In recent, as a typical example of RFID, the contactless IC card is widely used in traffic, access control system and so forth. And its use becomes a general tendency more and more because of the development of RF technology and improvement of requirement for user convenience. This paper describes the hardware module to process embedded contactless protocol for implementation contactless IC card. And the hardware module consists of analog circuits and specific digital logic circuits. This paper also describes more effective design method of contactless IC card, which method separates into analog circuit parts, digital logic circuit part, and software parts according to the role of the design parts.
international conference on computational science | 2015
Hong-Il Ju; Yong-Sung Jeon; Jeong-Nyeo Kim
For enhanced secure services on smart devices, hardware-based security solutions are required. To this end, the hardware security module is required and it should be physically separated from a smart device. In this paper, we describe the considerations for applying a hardware security module on smart devices. In particular, as smart devices have a limited resource and use a battery, a hardware security module for smart devices should be considered above mobile environment. In this paper, we implemented the hardware security chip for smart devices. In addition, in order to test and equip the implemented chip to a smart device, we implemented the smartphone and verified the secure service on the smart device based on the chip.
Archive | 2015
Hong-Il Ju; Yong-Sung Jeon; Jeong-Nyeo Kim
This paper describes the issue of data transfer for the embedded SE(Secure Element) on mobile devices. To enhance their security, current mobile devices provide the separate physical secure storage that contains the important and sensitive data for various security services. On the other hand, there is the problem of data migration for above secure storages such as the embedded SE. It is critical and essential problem in the embedded SEs because they cannot be removed from mobile devices. Thus, we explain the above problem in detail and would like to share the problem with service provider and mobile device manufacturers. To this end, we describe the security requirement for the secure data transfer of all data stored in embedded SEs. We also propose the secure data transfer schemes, which meet the proposed security requirements.
IEEE Transactions on Consumer Electronics | 2015
Hong-Il Ju; Young-Sae Kim; Yong-Sung Jeon; Jeong-Nyeo Kim
The purpose of this study is to suggest a solution to recently emerging security threats to mobile devices and enable users to use mobile services in a secure manner. To that end, this paper presents the design and implementation method for a hardware security chip required for providing advanced mobile security services. The proposed method could be the fastest and most efficient approach among various approaches. This study implements a Mobile Trusted Module (MTM) chip as a hardware security chip and confirms its commercial potential through interface testing with a smartphone. The implemented MTM chip is based on a smart card IC, and it includes an interface conversion chip that supports the I/O interface with a mobile device. The chip size is 5mm × 5mm, and the chip does not consume more than 10 mA of current. In addition, it provides additional security functions, including the required functions for an MTM chip. Therefore, with the proposed hardware security chip, it is possible to establish a secure service execution environment for mobile devices.
Archive | 2002
Ji Man Park; Yong-Sung Jeon; Hong-Il Ju; Youngsoo Park; Sung-Ik Jun; Kyo-ill Chung
ITC-CSCC :International Technical Conference on Circuits Systems, Computers and Communications | 2004
Hong-Il Ju; Sung-Ik Jun
Archive | 2014
Seungyong Yoon; Young-Sae Kim; Jeong-Nyeo Kim; Hyun-Sook Cho; Hong-Il Ju
Archive | 2013
Hong-Il Ju; Yong-Sung Jeon; Young-Sae Kim; Seungyong Yoon; Jeong-Nyeo Kim