Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Wu Junjun is active.

Publication


Featured researches published by Wu Junjun.


ieee international conference on cyber technology in automation, control, and intelligent systems | 2011

An indoor location-based access control system by RFID

Zhang Xin-fang; Fang Ming-wei; Wu Junjun

With the rapid development of wireless and mobile network, traditional access control mechanisms face the new security risk that access data at any place may lead the leakage of the confidential data or bring new attack to the server. Location based access control is proposed to authorize user by consideration the location information of the user. In this paper, a novel indoor access control system is presented to protect the data security in mobile storage device. An Active tag is embedded into the storage device to implement location based access control. We make use of the limited penetration of RF signal to build the security zone, and get users location information from the tag and the reader. In order to protect the system and carry out authorization, an authenticate protocol is proposed. The protocol can ensure the anonymity of the tag, and protect the confidential of the data to prevent spoofing attack and replay attack. More important, our system can authorize the user according to users location information.


international workshop on computer science and engineering | 2009

A Secure Software Download Framework Based on Mobile Trusted Computing

Wu Junjun; Fang Ming-wei; Yu Peng-fei; Zhang Xin-fang

The number of software deployed on mobile terminals is dramatically increasing. However, this leads the mobile terminal facing a serious of security threats. In order to resolve these threat issues, several security requirements are proposed. Also, this paper introduces a secure software download framework and corresponding download protocol based on mobile trusted computing, designed to handle a collection of activities in software download. Such activities include authentication, download and installation of the software. The core part of the framework is a discretionary engine--Device Management Engine (DME), which provides entity authentication, integrity protection and remote attestation for the mobile device. By the introduction of software description file, we provide a mechanism to transfer Reference Integrity Metric (RIM), which makes up for the shortage of the specification.


Archive | 2014

System and method for initializing safety indicator of credible user interface

Xiong Chuanguang; Fang Ming-wei; Wu Junjun


Archive | 2013

Personal financial security terminal with Bluetooth

Wu Junjun; Fu Jicun; Chen Ji; Liu Duan; Yu Xiao


Archive | 2013

Radio frequency SIM card communication system and method for controlling effective distance thereof

Wang Tongyang; Wu Junjun; Fu Jicun; Xiong Jianjun; Liao Xuelong


Archive | 2014

Active non-contact intelligent card

Wu Junjun; Xiong Chuanguang; Fu Jicun; Yang Feifei


Archive | 2013

NFC combined antenna for mobile phone mobile payment

Wu Junjun; Fu Jicun; Yang Feifei


Archive | 2013

Multi-chip RF smart card and mobile terminal payment system

Wu Junjun; Fu Jicun; Xiao Zhongren; Peng Zhuwen


Archive | 2013

Hanging-type all-in-one machine supporting financial IC card consumption

Wu Junjun; Fu Jicun; Liu Duan; Tu Fei; Liu Jun


Archive | 2013

Reading device for IC card

Wu Junjun; Fu Jicun

Collaboration


Dive into the Wu Junjun's collaboration.

Top Co-Authors

Avatar

Fang Ming-wei

Huazhong University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Zhang Xin-fang

Huazhong University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Yu Peng-fei

Huazhong University of Science and Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge