• Title/Summary/Keyword: 공인 인증

Search Result 959, Processing Time 0.024 seconds

Core Point Detection using Orientation Pattern Labeling in Fingerprint (방향 패턴의 레이블링을 이용한 지문영상의 Core Point 검출)

  • 이경환;박철현;오상근;박길흠
    • Proceedings of the IEEK Conference
    • /
    • 2001.09a
    • /
    • pp.429-432
    • /
    • 2001
  • 지문영상의 특이점(Singularities) 중의 하나인 Core Point는 대부분의 지문인증 시스템에서 기준점(Reference Point)으로 사용되고 있다. 또한 Core Point의 검출은 전체 지문인증 시스템의 가장 기본적인 단계로서 전체 시스템의 성능에 많은 영향을 준다. 본 논문에서는 지문 영상의 방향 패턴(Orientation Pattern)과 이의 리레이블링(Re-labeling)을 이용한 Core Point 검출 방법을 제안하고, 기존의 Poincare Index를 이용하는 방법 및 Sine Map을 이응한 방법과 비교, 분석하였다.

  • PDF

Structural Analysis of Pressure Vessel for the ASME Nuclear Survey (ASME 원자력 인증을 위한 압력용기의 구조해석)

  • Ahn, Hee-Jae;Kim, Young-Ki;Lee, Choong-Dong
    • Proceedings of the Computational Structural Engineering Institute Conference
    • /
    • 1997.04a
    • /
    • pp.114-120
    • /
    • 1997
  • 원자력공사에 관련된 장치와 부속 기기를 설계 및 제작 또는 설치하려면 ASME에서 인증하는 자격이 필요하고, 자격을 취득하거나 갱신하기 위하여 시설, 품질보증 프로그램, 설계 및 제작능력등을 ASME 위원회의 실사를 받아야 한다. 이를 위한 일련의 과정 중에서 설계능력을 증명할 수 있는 설계해석 보고서를 제출하여야 하며 이를 위하여 현대중공업이 설계한 Chiler Surge Vessel의 설계조건 및 하중 및 하중조합에 대하여 Design Report를 작성하였으며, ASME Code의 요구조건을 모두 만족하는 것으로 평가되었다.

  • PDF

ISO/TC108/SC5/CDl8436 Part 1 Accreditation of organizations and training and certification of personnel. Part 1. General requirements for training and certification (ISO/TC108/SC5/CDl8436 Part 1 기구의 자격승인과 요원의 훈련 및 인증 제1편 : 훈련 및 인증을 위한 일반적인 필요조건)

  • 김건남;양보석
    • Proceedings of the Korean Society for Noise and Vibration Engineering Conference
    • /
    • 2001.11b
    • /
    • pp.1365-1369
    • /
    • 2001
  • ISO/TC 108은 진동, 기름 순도(purity), 열 변화 및 전류 변동과 같은 요소들을 이용한 기계상태의 전반적인 감시와 평가를 위한 지침을 제공하기 위한 의도로 일련의 규격을 개발하는 과정 중에 있다. (중략)

  • PDF

Authentication of a smart phone user using audio frequency analysis (음향 주파수 분석을 이용한 스마트폰 사용자 인증)

  • Kim, Jin-Bok;Song, Jeong-Eun;Lee, Mun-Kyu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.2
    • /
    • pp.327-336
    • /
    • 2012
  • In this paper, we propose user authentication methods using a microphone and a speaker in smart phones. The proposed methods guarantee that the user is located close to the target device by transmitting the challenge via an audio channel. We propose two authentication methods; user authentication for a PC or a website using a smart phone as a hardware token, and user authentication to log on to a smart phone using a PC as a token. Because our methods use typical peripheral devices such as a microphone and a speaker, they do not require any special-purpose hardware equipment. In addition, the elderly and the handicapped can easily use our methods because the methods are activated by simple operations.

A Development of an Adviser Tool for the ABEEK Accredited Program using Curriculum Flowchart (교과목 이수체계도를 이용한 공학교육인증 프로그램을 위한 교과 이수 지도 도구의 개발)

  • Lee, Tae-Ho;Lee, Myung-Joon;Lee, Jung-Chul
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.8
    • /
    • pp.97-106
    • /
    • 2009
  • ABEEK, an independent non-governmental organization, is the recognized accreditor for the educational programs in engineering and related disciplines. ABEEK has developed the standard accreditation criteria to meet diverse needs of the engineering and related communities in Korea. A student attending at the accredited program has to complete the required courses and elective courses according to the curriculum flowchart to meet the accreditation criteria for a bachelor. Therefore an efficient and effective tool is necessary to support the adviser to monitor the completion of the required courses and elective courses according to the curriculum flowchart. In this paper, we describe an adviser tool developed. To develop an adviser tool. we established databases which contain the information of courses and their relations according to the curriculum flowchart. Adviser tool was developed to analyze student's DegreeAudit and represent the current completion information on the curriculum flowchart for effective monitoring. A closed test was performed and showed the increase of efficiency to meet the accreditation criteria for a bachelor.

Electronic Settlement System Model Using an Indirect Authentication Method by Interrelationship (상호 관계성을 가진 간접 인증 방법을 이용한 전자 결제 시스템)

  • Park, Young-Ho;Lee, Keum-Suk
    • Journal of the Korean Institute of Telematics and Electronics T
    • /
    • v.35T no.2
    • /
    • pp.93-99
    • /
    • 1998
  • There is only authentication of end-to-end in electronic commerce technique. But in a distributed system, an authentication that is ensured users and computers has a big threats which an identify of those is unbelievable because it can be occurred an fabrication or a false personation. Authentication for other elements included customers and vendors is required in the case that there is many a broker connecting customers with vendors as well. In authentication like above, many elements playing different role participated, were performed by the known techniques, processing was more complicated. In this paper, the Mutual Indirect Authentication technique is used to solve and avoid that condition and the generalized electronic commerce using a mobile agent is accomplished with this technique.

  • PDF

Session Key Exchange and Authentication Scheme between Communication Members in Ubiquitous Networks (유비쿼터스 네트워크 환경에서 커뮤니티 멤버간 인증 및 세션키 교환 기법)

  • Roh, Hyo-Sun;Jung, Sou-Hwan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.2
    • /
    • pp.81-88
    • /
    • 2009
  • This paper proposed a session key exchange and authentication scheme on non-interactive key distribution algorithm using a community member's ID in ubiquitous networks. In ubiquitous network environment, User's context-awareness information is collected and used to provide a context-awareness service for someone who need it. However, in ubiquitous network environment, this kind of the Context-awareness information could be abused by a malicious nodes. The proposed scheme using the community member ID provides a session key exchange and mutual authentication between community members, and supports secure data communication. Also, when exchanging the session key and authenticating each other, this scheme reduces communication overhead and authentication delay compared to the AAA server scheme.

A Design for Unified Web Authentication at Network Service Foundation (네트워크 서비스 기반의 단일 웹 인증설계)

  • Ban, Kyung-Sig;Lee, Jae-Wan;Kim, Hyoung-Jin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.12
    • /
    • pp.2171-2178
    • /
    • 2008
  • Recently, Network companies have introduced security solutions to protect the network from intrusions, attacks and viruses but the network has still weakness and vulnerability. It is time to bring more stable and reliable authentication system that would meet the Internet user's need. In this study, Current broadband networks don't have hierarchic and stable authentication solutions. And so, an integrated and hierarchic system is needed to provide a various kinds of application services. I'd like to present a new authentication system which is based on unified web authentication design. It will unit various authentication systems that have been deployed in various network environment and reinforce network security to provice a various kinds of application services in a stable and safe environment. that is a simple and more secure method for fighting a rise in card-not-present fraud.

A Design of DA_UDC(Double Authentication User.Device.Cross) Module using OTA(One Time Authentication) Key in Home Network Environment (홈 네트워크 환경에서 OTA(One Time Authentication)키를 이용한 DA_UDC(Double Authentication User.Device.Cross) 모듈 설계)

  • Jeong, Eun-Hee;Lee, Byung-Kwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.4B
    • /
    • pp.419-427
    • /
    • 2009
  • This paper propose DA-UDC(Double Authentication User, Device, Cross) Module which solves the cost problem and the appropriation of Certificate using User Authentication, Device Authentication and Cross Authentication with OTA(One Time Authentication) Key, and which is designed not to subscribe to the service of Home network business. Home Server transmits its public key which is needed to create OTA to the user which passed the first step of authentication which verifies User ID, Device ID and Session Key. And it performs the second step of authentication process which verifies the OTA key created by a user. Whenever the OTA key of DA-UDC module is generated, the key is designed to be changed. Therefore, DA-UDC Module prevents the exposure of User and Device ID by performing the two steps of authentication and enhances the authentication security of Home Network from malicious user with OTA key. Also, DA-UDC Module is faster than the existing authentication system in processing speed because it performs authentication calculation only once. Though DA-UDC Module increases data traffic slightly because of the extra authentication key, it enhances the security more than the existing technique.

An Implementation of Multimodal Speaker Verification System using Teeth Image and Voice on Mobile Environment (이동환경에서 치열영상과 음성을 이용한 멀티모달 화자인증 시스템 구현)

  • Kim, Dong-Ju;Ha, Kil-Ram;Hong, Kwang-Seok
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.45 no.5
    • /
    • pp.162-172
    • /
    • 2008
  • In this paper, we propose a multimodal speaker verification method using teeth image and voice as biometric trait for personal verification in mobile terminal equipment. The proposed method obtains the biometric traits using image and sound input devices of smart-phone that is one of mobile terminal equipments, and performs verification with biometric traits. In addition, the proposed method consists the multimodal-fashion of combining two biometric authentication scores for totally performance enhancement, the fusion method is accompanied a weighted-summation method which has comparative simple structure and superior performance for considering limited resources of system. The performance evaluation of proposed multimodal speaker authentication system conducts using a database acquired in smart-phone for 40 subjects. The experimental result shows 8.59% of EER in case of teeth verification 11.73% in case of voice verification and the multimodal speaker authentication result presented the 4.05% of EER. In the experimental result, we obtain the enhanced performance more than each using teeth and voice by using the simple weight-summation method in the multimodal speaker verification system.