• Title/Summary/Keyword: 보호부담

Search Result 296, Processing Time 0.027 seconds

Shoulder-Surfing Resistant User Authentication Method Based on PIN and Pattern Image (어깨너머 공격에 강한 PIN과 패턴 이미지 기반의 사용자 인증 방법)

  • Kim, Young-Sam;Kim, Soo-Hyung;Jin, Seung-Hun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.11a
    • /
    • pp.1138-1141
    • /
    • 2010
  • 모바일 기기나 ATM에서의 사용자 인증에는 PIN(Personal Identification Number)이 주로 사용된다. 그 이유는, PIN은 사용자가 외우기 쉽고 단순한 UI(User Interface)로 구현이 가능하다는 장점이 있기 때문이다. 하지만 PIN은 어깨너머 공격에 취약하다는 단점이 있다. 기존의 연구들은 이미지 기반, 인식 기반, PIN과 이미지의 혼합방식을 이용한 다양한 사용자 인증 방법들을 제안하였다. 하지만 이들 연구는 모바일의 작은 화면을 고려하지 않아 구현이 어렵거나, 어깨너머 공격에 취약하거나, 사용자에게 기억에 대한 부담을 증가시키는 등의 문제점이 있다. 본 논문에서는 PIN과 패턴 이미지를 결합하여 모바일 기기에 적합하면서, 어깨너머 공격에 대해 기존의 방법들에 비해 안전하고 사용자가 외워야 하는 기호(숫자, 이미지 등)가 적은 사용자 인증 방법을 제안한다.

The Study on Modification Methods of Residents Registration Number System (주민등록번호제도 변경방안에 관한 연구 : 주요 쟁점에 대한 인식조사를 중심으로)

  • Choi, Seong-Rak;Lee, Hye-Young
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.11
    • /
    • pp.128-138
    • /
    • 2016
  • On 23th December in 2015, Constitutional court of Korea decided the Resident Registration Act which could not changed one's Resident Registration Number was Unconformable to Constitution. And declared that the Resident Registration Act had to amend the article. This study analyzes the issues and preferences of people about the modification methods of Resident Registration Number System. In result, the residents agree on the autonomy of residents registration number change and prefer not including personal information to including personal information in registration number system. And the residents want to operate the Second number system besides resident registration number. However, they don't want to pay the change cost of resident registration number system. This results give a few of implications when the change methods of resident registration system would be prepared.

A study on 112 crime call system (112 범죄신고체제에 관한 연구)

  • Hwang, Hyun Rak
    • Convergence Security Journal
    • /
    • v.12 no.5
    • /
    • pp.23-32
    • /
    • 2012
  • The police is responsible for protecting nation's property and life. Protecting nation from crime among the core duties is the most important activity of the police. But the big problem on reported crime system of the police was founded in the recent Suwon incident. Unfortunately, the unprofessional response made a toll of human sacrifice. Taking this opportunity, we need to consider closely the problems of the reported crime and system of the police and the solutions on the problems. This study analyzes the reported crime system of the police from the law and institutional and try to seek the solutions. This study searches the management status of the police system and arranges the problems in legal and institutional terms. And then, it arranges the solutions on the problems.

The caregiving experience of male family care worker and convergence policy implications (남성가족요양보호사의 돌봄 경험과 융복합 정책적 함의)

  • Lee, Min-Sook;Shin, Chang-Sik;Yang, So-Nam
    • Journal of Digital Convergence
    • /
    • v.13 no.4
    • /
    • pp.283-293
    • /
    • 2015
  • This study explores experiences of male family care worker who are caring for their family members with chronic health conditions at home. Qualitative methodologies were used; semi-structured in-depth interviews with seven participants. Data were analysed using thematic analysis. Results indicated that men are playing greater roles in the provision of care for family members. Findings are presented as three themes: adaptation of role transformations, development for new relationships, and learning to cope with the unexpected. The results suggest that male family care workers experience changes in the ways that they adapt their traditional roles to the new roles they assume as caregivers. Implications for social workers and other care providers are discussed.

Secure Location Information Protection Scheme from the Network Provider and the third party in Mobile Communication Environments (이동통신 환경에서 네트워크 제공자 및 제 3자로부터 안전한 위치정보 보호기법)

  • Kim, Soon-Seok;Lee, Chang-Hun
    • The KIPS Transactions:PartC
    • /
    • v.10C no.7
    • /
    • pp.867-878
    • /
    • 2003
  • In thls Paper, we Propose a new scheme, protecting information about the location of a mobile user against attacks from inside users of the mobile communication, especially the network providers. There have already been some proposals about how to protect location information of user in mobile communication environments〔1-5〕. Among them, Kesdogan et al.〔2, 3〕 proposed a new method, using so-called temporary pseudonyms and also described protection method against a passive and an active attack of network providers. However, the description of protection method against the active attack between the two is not clear. Moreover, there is an additional load that it should append a reachability manager〔1, 6〕 to the proposed system. Therefore, we propose a new scheme improving the above method of Kesdogan et al. and analyze its security and effectiveness.

Key Distribution Protocol Appropriate to Wireless Terminal Embedding IC Chip (IC 칩을 내장한 무선 단말기에 적용 가능한 키 분배 프로토콜)

  • 안기범;김수진;한종수;이승우;원동호
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.4
    • /
    • pp.85-98
    • /
    • 2003
  • Computational power of IC chip is improved day after day producing IC chips holding co-processor continuously. Also a lot of wireless terminals which IC chip embedded in are produced in order to provide simple and various services in the wireless terminal market. However it is difficult to apply the key distribution protocol under wired communication environment to wireless communication environment. Because the computational power of co-processor embedded in IC chip under wireless communication environment is less than that under wired communication environment. In this paper, we propose the hey distribution protocol appropriate for wireless communication environment which diminishes the computational burden of server and client by using co-processor that performs cryptographic operations and makes up for the restrictive computational power of terminal. And our proposal is satisfied with the security requirements that are not provided in existing key distribution protocol.

Efficient and Secure User Authentication and SDP Encryption Method in SIP (일회성 암호를 이용한 효율적이고 안전한 SIP 사용자 인증 및 SDP 암호화 기법)

  • Kim, Jung-Je;Chung, Man-Hyun;Cho, Jae-Ik;Shon, Tae-Shik;Moon, Jong-Sub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.3
    • /
    • pp.463-472
    • /
    • 2012
  • This paper propose a security method that performs mutual authentication between the SIP UA and the server, check for integrity of the signaling channel and protection of SDP information for VoIP using a One-Time Password. To solve the vulnerability of existing HTTP Digest authentication scheme in SIP, Various SIP Authentication schemes have been proposed. But, these schemes can't meet security requirements of SIP or require expensive cryptographic operations. Proposed method uses OTP that only uses hash function and is updated each authentication. So Proposed method do not require expensive cryptographic operations but performs user authentication efficiently and safely than existing methods. In addition, Proposed method verifies the integrity of the SIP messages and performs SDP encryption/decryption through OTP that used for user authentication. So Proposed method can reduce communication overhead when applying S/MIME or TLS.

Nursing in Family and Welfare: Political Meanings of the 'Pflegeversicherung' (가족내 간병과 간병보험의 복지정책적 함의)

  • 이진숙
    • Korea journal of population studies
    • /
    • v.24 no.1
    • /
    • pp.183-202
    • /
    • 2001
  • Traditionally the women have had responsibility for homework, blinding-up of the children and caring of the aged in the family. But in models society the women would like to take jobs much more than in the past, and therefore women who have jobs are in the condition of mental and physical stress very heavily. So it is urgently needed of the social-political arrangements for caring-worker in the family (generally the women). This paper examines this problem, especially problem of the nursing of the aged in the family, and compares the political arrangements between in Korea and Germany.

  • PDF

A Study on Risk Analysis Methode Using Case-Based Reasoning (사례기반 추론을 이용한 위험분석방법 연구)

  • Lee, Hyeak-Ro;Ahn, Seong-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.4
    • /
    • pp.135-141
    • /
    • 2008
  • The risk enlargement of cyber infringement and hacking is one of the latest hot issues. To solve the problem, the research for Security Risk Analysis, one of Information Security Technique, has been activating. However, the evaluation for Security Risk Analysis has many burdens; evaluation cost, long period of the performing time, participants’ working delay, countermeasure cost, Security Management cost, etc. In addition, pre-existing methods have only treated Analyzing Standard and Analyzing Method, even though their scale is so large that seems like a project. the Analyzing Method have no option but to include assessors’ projective opinion due to the mixture using that both qualitative and quantitative method are used for. Consequently, in this paper, we propose the Security Risk Analysis Methodology which manage the quantitative evaluation as a project and use Case-Based Reasoning Algorithm for define the period of the performing time and for select participants.

Mobile 3D Content Watermarking Scheme Based on Anonymous Buyer-Seller Watermarking Protocol (익명 Buyer-Seller 워터마킹 프로토콜 기반의 모바일 3D 콘텐츠 워터마킹 기법)

  • Seung, Teak-Young;Lee, Suk-Hwan;Park, Seung-Seop;Kwon, Ki-Ryong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.04a
    • /
    • pp.1539-1542
    • /
    • 2009
  • 최근 모바일 단말 기술과 정보통신 기술의 급격한 발달로 국내외 이동통신사들은 새로운 킬러 콘텐츠로 주목받고 있는 모바일 3D 게임을 앞 다투어 제작 및 서비스하고 있다. 모바일 3D 게임의 경우, 용량 증가로 인한 데이터 통신비 부담을 줄이기 위하여 PC 다운로드 S/W을 통한 다운로드 방법이 제공되면서 불법 복제 우려에 대한 관심이 높아지고 있다. 현재 불법 복제 방지와 관련하여 GVM/GNEX 인증 모듈이 적용되고 있으나, 모바일 3D 콘텐츠에 대한 저작권 보호 기술 및 워터마킹 기술을 적용함으로써 콘텐츠 접근제어 및 불법배포 추적을 동시에 달성할 수 있다. 따라서 본 논문에서는 모바일 3D 콘텐츠의 저작권 보호를 위하여 익명 Buyer-Seller 워터마킹 프로토콜 상에서 3D 콘텐츠 내의 공간영역 및 암호화 영역 내에 다중 워터마크를 삽입하는 방법을 제안한다. 성능평가를 위한 비가시성 및 강인성 실험을 통하여 본 제안 기법의 콘텐츠 접근제어가 가능하며 비가시성, 강인성 면에서 우수함을 확인하였다.