• Title/Summary/Keyword: 개인 인증

Search Result 1,546, Processing Time 0.039 seconds

Analytical Model for Reducing Authentication Signaling Traffic in 3GPP Networks (인증 시그널링 트래픽 최소화를 위한 수학적 분석에 관한 연구)

  • Han, Chan-Kyu;Song, Sehwa;Choi, Hyoung-Kee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.04a
    • /
    • pp.1155-1158
    • /
    • 2009
  • 모바일 서비스는 사용자보호를 위해 인증 및 암호화 기능이 필수적으로 제공되어야만 한다. 3GPP는 3 세대 이동통신 (UMTS)를 위한 인증보안구조인 AKA를 정의하였다. AKA에서는 인증벡터를 다수 개 생성하여 처리하는 기법을 채택하고 있으나 이러한 기법이 인증서버의 load 증가 및 방문서버의 저장공간 소모라는 문제점을 야기한다. 하지만 인증벡터를 다수 개 생성하는 기법은 단말의 핸드오버를 위한 필수불가결한 기법이다. 따라서 본 논문에서는 사용자의 이동패턴 및 인증요청 처리 속도에 따른 인증벡터의 동적 선택 알고리즘을 제안하여 이동통신 네트워크의 signaling load를 최소화하고자 한다. 이를 위해 확률 및 큐잉 이론이 도입되었으며, 시뮬레이션을 통해 수학적 분석을 검증한다. 또한 기존 관련연구에서 제안 하는 알고리즘과 비교 평가하였다.

Privacy Assurance and Consumer Behaviors in e-Business Environments (e-비즈니스 환경에서 기업의 개인정보보호 활동이 소비자 행위에 미치는 영향)

  • Park, JaeYoung;Jung, Woo-Jin;Lee, SangKeun;Kim, Beomsoo
    • The Journal of Society for e-Business Studies
    • /
    • v.23 no.4
    • /
    • pp.1-17
    • /
    • 2018
  • Recently, most online firms are trying to provide personalized services based on customer's data. However, customers are reluctant to give their information to online firm because of concerns about data breach. Online firms are seeking to increase their trust by ensuring the protection of personal information for customers through privacy seal (e.g. e-privacy) or data breach insurance. This research examines the effects of privacy assurance(i.e. privacy seal, data breach insurance) on consumer behavior in online environment. An experiment based on the hypothetical scenario was conducted using a between-subjects 2 (type of privacy assurance) + 1 (control) design. We found that both privacy seal and data breach insurance increased perceived privacy trust. In addition, privacy seal has a positive effect on the intention to provide personal information through perceived privacy trust. Finally, in the case of the group with a high (low) disposition to trust, higher perceived privacy trust is formed through privacy seal (data breach insurance). Theoretical and practical implications are discussed.

Certification system of individual Mobile terminal that using by Mobile barcode (모바일 바코드를 이용한 개인 모바일 단말기의 인증 시스템)

  • Lee, Kyung-Hwan;Song, Jeong-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.141-144
    • /
    • 2005
  • Contents of this paper strengthen security of data by applying encryption algorithm to use cellular phone and settlement by Mobile that is used synchronization method and quotes and prevent damage of bar-code peculation etc.. If divide system step by step to execute this, step that create Mobile bar-code and transmits by individual terminal after encryption, step displaying to individual Mobile terminal, step that above individual Mobile terminal and main server form assimilation and these are consisted of step that quote confirming above information confirmation and motive availability. For the actual example, confirm effectiveness of certification system through simulation.

  • PDF

A human identification scheme using visual cryptography (시각암호에 의한 개인 인증 방식)

  • 김미라;박지환
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.23 no.6
    • /
    • pp.1546-1553
    • /
    • 1998
  • In this paper, we investigate a human identification scheme using visual cryptography, which can decode concealed images without and crytographic computations. T.Katoh & H.Imai proposed a secret sharing scheme which can conceal two query images into one displayed image for the identification. the generalized construction of the share matrix is proposed to conceal the multiple query images by stacking user slides o the displayed image. Furthermore, an extended methodis proposed in which group of slides can conceal an independent secret image as well as the pairs of slides can.

  • PDF

인터넷 모범상점 인증 실시

  • Jo, Yeong-Hun
    • 정보화사회
    • /
    • s.130
    • /
    • pp.54-61
    • /
    • 1999
  • 개인정보 유출 및 소비자 피해를 최소화 할 수 있는 민간 자율적인 인터넷 모범 상점 인증제도가 시행됨에 따라, 비대면 거래로 인한 소비자의 개인정보 유출 등의 우려가 해소될 것으로 보여 국내 전자상거래 산업의 급성장이 가시화되고 있다.

  • PDF

Study on Deriving Improvements through Analysis of BF Certification Evaluation Indicators for Parks and Park Facilities (공원 및 공원시설 BF인증 평가지표 분석을 통한 개선방향 도출 연구)

  • Kim, Mi Hye;Koo, Bonhak
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.50 no.5
    • /
    • pp.13-29
    • /
    • 2022
  • According to the revision of the Convenience Act for Persons with Disabilities, parks and park facilities where the first park development plan is established after December 4, 2021 are mandatory, and parks must be equipped with convenience facilities for the disabled. Hence, this study aims to derive the improvements of the park evaluation index by analyzing the park certification evaluation index, the building certification evaluation index of park facilities, and the evaluation reports of the current certification status cases. As a research method, first, the certification of parks and park facilities were compared and reviewed with the Park Green Act, and differences in the certification process and certification performance were compared and analyzed. Second, differences and common items were derived by analyzing barrier free (BF)-certification evaluation indicators for parks and buildings. Third, improvement plans were derived after analyzing differences and problems in 4 BF-certified parks and four building certification cases of park facilities in certified parks, focusing on the self-evaluation report and examination results. As a result of analyzing the park and building evaluation indicators, the items for which the evaluation purpose, evaluation method, and evaluation items were commonly applied to 7 access roads for each facility, 5 parking areas for the disabled, 2 guide facilities for information facilities, 14 in 5 categories of sanitation facilities, and 1 for other facilities. In the case of sanitation facilities, there is no case where it was evaluated as a park. If the park does not have an attached toilet, the park is certified as a building. Hence, it would be essential to establish the concept of an attached toilet and discuss the application of the evaluation index on the park sanitation facility. The score of buildings in parks and park facilities was lower than that of the self-evaluation results, and the certification grades of buildings declined in three cases. The items with the highest standard deviation were BF walking continuity for parks and the path to the main entrance among access roads for buildings. As a result of analyzing the park and building evaluation results of 19 common evaluation items except for sanitary facilities, the difference in the grades of the evaluation items for each case site except for one item appeared. Therefore, applying common detailed calculation criteria for items evaluated in common with parks and buildings is needed. Since sanitation facilities have no cases of park certification and are not certified as buildings, it is essential to establish the concept of attached toilets and discuss the application of park sanitation evaluation indicators. It is necessary to develop an evaluation index suitable for the characteristics of the park, such as adjusting the items that are not evaluated in parks and establishing an evaluation index considering the ones of parks. It expects that this study would be used as primary data for improving park certification indicators.

An Implementation of Web Site Login System Using Fingerprint Identification (지문인증을 이용한 웹 사이트 로그인 시스템의 구현)

  • 최순우;김영길
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.6 no.2
    • /
    • pp.207-213
    • /
    • 2002
  • Fingerprint has the characteristics that do not change with time and is unique to an individual. And fingerprint identification is considered the best choice for most biometric applications because of its accuracy, speed, reliability, non-intrusive interfaces and cost-effectiveness. In this paper, we applies fingerprint Identification to web site login to raise the quality of personal identification when we use e-commerce, internet banking, stock dealings, shopping mali, etc. The system implemented in this paper consists of embedded module to carry out fingerprint identification, web server and web site. Existing system carries out fingerprint identification in the web server, but the system Implemented in this paper carries out it in client. Therefore the loads of server are reduced and the confidence of internet service is improved because login is forbidden without fingerprint identification success.

An Implementation of Multimodal Speaker Verification System using Teeth Image and Voice on Mobile Environment (이동환경에서 치열영상과 음성을 이용한 멀티모달 화자인증 시스템 구현)

  • Kim, Dong-Ju;Ha, Kil-Ram;Hong, Kwang-Seok
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.45 no.5
    • /
    • pp.162-172
    • /
    • 2008
  • In this paper, we propose a multimodal speaker verification method using teeth image and voice as biometric trait for personal verification in mobile terminal equipment. The proposed method obtains the biometric traits using image and sound input devices of smart-phone that is one of mobile terminal equipments, and performs verification with biometric traits. In addition, the proposed method consists the multimodal-fashion of combining two biometric authentication scores for totally performance enhancement, the fusion method is accompanied a weighted-summation method which has comparative simple structure and superior performance for considering limited resources of system. The performance evaluation of proposed multimodal speaker authentication system conducts using a database acquired in smart-phone for 40 subjects. The experimental result shows 8.59% of EER in case of teeth verification 11.73% in case of voice verification and the multimodal speaker authentication result presented the 4.05% of EER. In the experimental result, we obtain the enhanced performance more than each using teeth and voice by using the simple weight-summation method in the multimodal speaker verification system.

Study on the Connection with Public Authentication and Bio Authentication (공인인증서와 바이오인증 연계를 위한 연구)

  • Ryu, Gab-Sang
    • Journal of Internet of Things and Convergence
    • /
    • v.1 no.1
    • /
    • pp.39-44
    • /
    • 2015
  • Organization is increasing the authorizing process to use public certificate and bio information. Certificate, has evolved to be able to parallel distributes the bio authentication and portable bio-authentication device. Authentication using an individual's PC and smart devices continue to generalize, while convenience for authentication is increased by comparison Study on cooperation with the security at the network level's a weak situation. If ask authentication method through the cooperation of the public certificate and bio information work with current network access control, there is a possibility to develop a more powerful security policy. by cooperation weaknesses against vulnerable personal authentication techniques on security token in a reliable and secure personal authentication techniques, such as bio-recognition, Bio Information for identification and to prevent exposing a methodology suggest to validate whether or not to carry out in this paper. In addition, organize the scenario that can work with the 802.1x network authentication method, and presented a proposal aimed at realization.

Location-Based Authentication Mechanism for Server Access Control (서버 접근 통제를 위한 위치기반 인증 기법)

  • Choi, Jung Min;Cho, Kwantae;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.6
    • /
    • pp.1271-1282
    • /
    • 2012
  • Recently, security incidents occur continuously, resulting in the leakages of a large amount of the company's confidential and private information. For these reasons, the security technologies such as the authentication and the access control in order to prevent the information leakage are attracting attention. In particular, location-based authentication that utilizes the user's current location information which is used an authentication factor. And it provides more powerful authentication by controlling the users who attempt to access and blocks internal information leakage path. However, location information must be handled safely since it is the personal information. The location based authentication scheme proposed in this paper enhances the stability of the process location information compared with existing relevant location-based authentication protocol. Also it strengthens the end-user authentication by using one-time password. In addition, the proposed scheme provides authentication to prevent information leakage and employs the concept of the user's physical access control. Resultingly, the proposed scheme can provide higher security than the previous studies, while guarantee to low communication cost.