• Title/Summary/Keyword: 개인식별정보

Search Result 487, Processing Time 0.03 seconds

Issues on Privacy and Security of Health Information in u-Health IT Service Environment (u-Health IT 서비스 환경에서의 개인의료정보보호 수준제고 방안)

  • Kim, Dong-Soo;Kim, Min-Soo
    • 한국IT서비스학회:학술대회논문집
    • /
    • 2006.05a
    • /
    • pp.282-289
    • /
    • 2006
  • 의료기관의 정보화 수준이 높아짐에 따라 권한 없는 자의 정보 접근 및 유출, 진료정보 및 개인정보의 손실이나 파손, 환자 안전에 대한 위협 등 여러 가지 정보보호 리스크 요인이 대두되고 있다. 의료기관이 취급하고 있는 의료정보는 환자 개인을 식별할 수 있는 개인정보뿐만 아니라 개인의 사생활보호 차원에서 신중하게 취급해야 하는 매우 민감한 진료 정보를 포함하고 있으므로 정보보호의 중요성이 매우 크다고 볼 수 있다. 따라서 개인의료정보를 컴퓨터와 네트워크를 통해 처리하는 의료기관의 정보보호 수준 제고가 매우 중요하고 시급한 과제로 인식되고 있다. 본 연구에서는 의료기관 정보화의 진전과 원격의료/재택의료의 발전, 국가보건의료정보 인프라 구축, e-Health 및 유비쿼터스 건강관리 시대의 도래 등과 같은 중대한 의료정보 패러다임의 변화 속에서 정보보호의 이슈와 해결방안을 모색해 보았으며, 의료정보보호 수준제고를 위한 정책방향을 제시하였다. 개별 의료기관뿐만 아니라 국가 차원의 의료정보 인프라 구축 사업 추진 시에도 본 연구에서 제안한 의료정보 보호 수준제고 방안이 적용되어 정보화의 효율성과 정보보호가 균형을 이룰 수 있을 것으로 기대된다.

  • PDF

국제 개인정보보호 표준화 동향 분석 (2017년 4월 해밀턴 SC27 회의 결과를 중심으로)

  • Youm, Heung-Youl
    • Review of KIISC
    • /
    • v.27 no.5
    • /
    • pp.43-48
    • /
    • 2017
  • 개인정보관리체계 [1,2] 를 구축하기 위해서는 관리체계를 위한 요구사항과 프라이버시 통제가 필요하다. 국내에서 시행되고 있는 개인정보관리체계도 요구사항과 개인정보 전주기동안의 프라이버시 보호조치에 근거해 시행하고 있다. 빅데이터 환경에서는 개인정보를 처리하기 위한 비식별화 기법(de-identification technique)이 요구된다. 그리고 온라인 사용자 친화적 고지 및 통보 방법이 필요하다. 국제표준화위원회/전기위원회 합동위원회 1의 정보보호기술연구반 신원 관리 및 프라이버시 작업반 (ISO/IEC JTC 1/SC 27/WG 5)에서는 개인정보보호를 위한 여러 가지 국제표준을 개발하고 있다[20],[21],[22],[30]. 본 논문에서는 작업반 5에서 2017년 4월 뉴질랜드 해밀턴 SC27 회의에서 논의된 개인정보보호 관련 주요 표준화 이슈와 대응 방안을 제시한다.

Design and Implementation of Personal Information Identification and Masking System Based on Image Recognition (이미지 인식 기반 향상된 개인정보 식별 및 마스킹 시스템 설계 및 구현)

  • Park, Seok-Cheon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.5
    • /
    • pp.1-8
    • /
    • 2017
  • Recently, with the development of ICT technology such as cloud and mobile, image utilization through social networks is increasing rapidly. These images contain personal information, and personal information leakage accidents may occur. As a result, studies are underway to recognize and mask personal information in images. However, optical character recognition, which recognizes personal information in images, varies greatly depending on brightness, contrast, and distortion, and Korean recognition is insufficient. Therefore, in this paper, we design and implement a personal information identification and masking system based on image recognition through deep learning application using CNN algorithm based on optical character recognition method. Also, the proposed system and optical character recognition compares and evaluates the recognition rate of personal information on the same image and measures the face recognition rate of the proposed system. Test results show that the recognition rate of personal information in the proposed system is 32.7% higher than that of optical character recognition and the face recognition rate is 86.6%.

Hand Biometric Information Recognition System of Mobile Phone Image for Mobile Security (모바일 보안을 위한 모바일 폰 영상의 손 생체 정보 인식 시스템)

  • Hong, Kyungho;Jung, Eunhwa
    • Journal of Digital Convergence
    • /
    • v.12 no.4
    • /
    • pp.319-326
    • /
    • 2014
  • According to the increasing mobile security users who have experienced authentication failure by forgetting passwords, user names, or a response to a knowledge-based question have preference for biological information such as hand geometry, fingerprints, voice in personal identification and authentication. Therefore biometric verification of personal identification and authentication for mobile security provides assurance to both the customer and the seller in the internet. Our study focuses on human hand biometric information recognition system for personal identification and personal Authentication, including its shape, palm features and the lengths and widths of the fingers taken from mobile phone photographs such as iPhone4 and galaxy s2. Our hand biometric information recognition system consists of six steps processing: image acquisition, preprocessing, removing noises, extracting standard hand feature extraction, individual feature pattern extraction, hand biometric information recognition for personal identification and authentication from input images. The validity of the proposed system from mobile phone image is demonstrated through 93.5% of the sucessful recognition rate for 250 experimental data of hand shape images and palm information images from 50 subjects.

안전한 전자화폐를 위한 정보보호 기술

  • Park, Seong-Jun
    • 정보화사회
    • /
    • s.111
    • /
    • pp.26-30
    • /
    • 1997
  • 정보사회가 고도화될수록 통신정보의 불법적인 도청과 함게, 원거리 엑세스에 발생되는 개인식별 문제, 컴퓨터 정보의 무단삭제 및 변조 등의 무결성 문제가 심각한 문제로 대두되고 있다. 이런 문제를 해결하는 암호기술이 정보보호 프로토콜(Cryptographic Protocol:또는 암호 프로토콜)분야이다.

  • PDF

The Application of the Forensic Dental Identification to Unidentified Individual Remains in Korea (신원불명 사망자의 개인식별에서 법치의학적 방법의 활용성에 관한 연구)

  • Park, Hee-Kyung
    • Journal of Oral Medicine and Pain
    • /
    • v.31 no.1
    • /
    • pp.27-36
    • /
    • 2006
  • The cases of unidentified individual remains submitted to Forensic dentistry section in National Institute of Scientific Investigation, Korea were analyzed to study the application of forensic dental identification into individual identification in the period 2002-2005. The identification cases of unidentified remains were 405 out of 493, which accounted about 82% of whole cases. The incidence of submission of skeletons at least including the skull was increased from 58% in 2002 to 80% in 2005. The numbers of cases for the full examinations were 4 times more than that for age estimation in 2005. Twenty-four cases were submitted for skull to photographic superimposition and 15 out of 24 cases were examined, and the other 9 cases were examined by DNA analysis only. The submitted cases for dental comparison were 23 cases, 9 cases were positively identified, 4 cases were possible, 7 cases were excluded, and 3 cases ended up with insufficient evidences. The proportion of positive identification by dental methods was increased gradually from 9% in 2002 to 46% in 2005. Forensic dental identification has become important and useful because the availability of dental records and radiographs has been increasing. Compared to DNA analysis, forensic dental identification has several advantages such as no needs for high cost equipments and low expenses. And the interpretation of results is straightforward and speedy. These advantages are based on using primary their own dental records of the individuals rather than secondary DNA reference samples from family members. The application of the forensic dental identification to unidentified individual remains will be increased because the dental comparison can complement the limitation of DNA analysis and skull to photographic superimposition in many cases. In order to obtain positive identifications of unidentified remains, a close collaboration between the police and forensic scientists is important. The systemic approach including legislation to preserve dental records of unidentified remains and missing persons for the identification of unidentified remains should be needed.

The Pattern Search and Complete Elimination Method of Important Private Data in PC (PC에서 중요개인정보의 패턴 검색과 완전삭제방법 연구)

  • Seo, Mi-Suk;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.213-216
    • /
    • 2013
  • Big data, the use of privacy has been increasing to the development of wireless network infrastructure or technology development and wired Internet. By the way, Enforcement of private data preservation law the infringement accident which is still caused by despite with private data outflow occurs. The private data outflow avoids finance and to become the fire tube. Analyzes the pattern of private data from search of private data and detection process and the research which it extracts and the research is necessary in about perfection elimination of the private data which is unnecessary. From the research which it sees it researched a pattern extraction research and a complete elimination method in about private data protection and it did the pattern extraction and a complete elimination experiment of private data.

  • PDF

Protecting Children's Online Privacy : Privacy Issues and Its Implications (아동 이용자에게 특화된 온라인 개인정보보호 이슈 : 사례연구를 중심으로)

  • Rha, Jong-Youn;Cho, EunSun;Lee, SeungEun
    • Journal of Digital Convergence
    • /
    • v.18 no.10
    • /
    • pp.23-31
    • /
    • 2020
  • As children's participation in online activities has recently increased, online services for children are also rapidly increasing, but children are not sufficiently guaranteed their rights. The purpose of this study is to classify and analyze issues related to the children's online privacy issues in Korea through the current status and case studies of application services mainly used by children. For this purpose, this research analyzed problems related to the children's online privacy protection according to the stage of using the application. As a result of the application content analysis, 1) issues of child identification, 2) effectiveness of notice and consent, and 3) issues of children's rights as subjects of information were derived. Based on the current status analysis, the policy implications were drawn based on the children's online privacy protection in the online environment, and suggestions were made for improvement.

An Impact and Problem by the Personal Information Protection Act. on the Financial Sector (개인정보보호법이 금융권에 미치는 영향과 문제점에 관한 고찰)

  • Han, Se Jin
    • Convergence Security Journal
    • /
    • v.13 no.1
    • /
    • pp.31-36
    • /
    • 2013
  • The personal information protection act has been enacted from 2011 for the protection of public and private privacy. Since the application area of the law is so broad, there is a limit to covers everything in the financial field. In this paper, I'll discuss an impact and problem by the personal information protection act. and propose some new task to build an efficient personal information protection governance on financial sector.

User Authentication Method Using Smartphone and Smartwatch (스마트폰과 스마트워치를 활용한 사용자 인증 기법)

  • Seo, Hwa-jeong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.11
    • /
    • pp.2109-2114
    • /
    • 2017
  • Personal Identification Number (PIN) is the most common user-authentication method for the access control of private and commercial applications. The users need to enter PIN information to the applications whenever the users get access to the private services. However, the process imposes a burden on the users and is vulnerable to the potential shoulder-surfing attacks. In order to resolve both problems, we present a continuous authentication method for both smartphone and smartwatch, namely, synchronized authentication. First we analyze the previous smartwatch based authentication and point-out some shortcomings. In the proposed method, we verify the validity of user by analyzing the combined acceleration data of both smartphone and smartwatch. If the monitored sensor data shows the high correlations between them, the user is successfully authenticated. For the authentication test, we used the Samsung Galaxy Note5 and Sony Smartwatch2.