• Title/Summary/Keyword: 사용자인증

Search Result 2,487, Processing Time 0.025 seconds

An analysis on invasion threat and a study on countermeasures for Smart Car (스마트카 정보보안 침해위협 분석 및 대응방안 연구)

  • Lee, Myong-Yeal;Park, Jae-Pyo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.3
    • /
    • pp.374-380
    • /
    • 2017
  • The Internet of Things (IoT) refers to intelligent technologies and services that connect all things to the internet so they can interactively communicate with people, other things, and other systems. The development of the IoT environment accompanies advances in network protocols applicable to more lightweight and intelligent sensors, and lightweight and diverse environments. The development of those elemental technologies is promoting the rapid progress in smart car environments that provide safety features and user convenience. These developments in smart car services will bring a positive effect, but can also lead to a catastrophe for a person's life if security issues with the services are not resolved. Although smart cars have various features with different types of communications functions to control the vehicles under the existing platforms, insecure features and functions may bring various security threats, such as bypassing authentication, malfunctions through illegitimate control of the vehicle via data forgery, and leaking of private information. In this paper, we look at types of smart car services in the IoT, deriving the security threats from smart car services based on various scenarios, suggesting countermeasures against them, and we finally propose a safe smart car application plan.

An Embedded System Design of Collusion Attack Prevention for Multimedia Content Protection on Ubiquitous Network Environment (유비쿼터스 네트워크 환경의 멀티미디어 콘텐츠 보호를 위한 공모공격 방지 임베디드 시스템 설계)

  • Rhee, Kang-Hyeon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.47 no.1
    • /
    • pp.15-21
    • /
    • 2010
  • This paper proposes the multimedia fingerprinting code insertion algorithm when video content is distributed in P2P environment, and designs the collusion codebook SRP(Small RISC Processor) embedded system for the collusion attack prevention. In the implemented system, it is detecting the fingerprinting code inserted in the video content of the client user in which it requests an upload to the web server and in which if it is certified content then transmitted to the streaming server then the implemented system allowed to distribute in P2P network. On the contrary, if it detects the collusion code, than the implemented system blocks to transmit the video content to the streaming server and discontinues to distribute in P2P network. And also it traces the colluders who generate the collusion code and participates in the collusion attack. The collusion code of the averaging attack is generated with 10% of BIBD code v. Based on the generated collusion code, the codebook is designed. As a result, when the insert quantity of the fingerprinting code is 0.15% upper in bitplane 0~3 of the Y(luminance) element of I-frame at the video compression of ASF for a streaming service and MP4 for an offline offer of video content, the correlation coefficient of the inserted original code and the detected code is above 0.15. At the correlation coefficient is above 0.1 then the detection ratio of the collusion code is 38%, and is above 0.2 then the trace ratio of the colluder is 20%.

Evaluation of the Usability of Micro-Sensors for the Portable Fine Particle Measurement (생활 속 미세먼지 영향평가를 위한 소형센서의 신뢰성 및 활용성 평가)

  • Kim, Jinsu;Jang, Youjung;Kim, Jinseok;Park, Minwoo;Bu, Chanjong;Lee, Yungu;Kim, Younha;Woo, Jung-Hun
    • Journal of Environmental Impact Assessment
    • /
    • v.27 no.4
    • /
    • pp.378-393
    • /
    • 2018
  • As atmospheric fine dust problems in Korea become more serious, there are growing needs to find the concentration of fine particles in indoor and outdoor areas and there are increasing demands for sensor-based portable monitoring devices capable of measuring fine dust concentrations instantly. The low-cost portable monitoring devices have been widely manufactured and used without the prescribed certification standards which would cause unnecessary confusion to the concerned public. To evaluate the reliability those devices and to improve their usability, following studies were conducted in this work; 1) The comparisons between sensor-based devices and comparison with more accurate devices were performed. 2) Several experiments were conducted to understand usefulness of the portable monitoring devices. As results, the absolute concentration levels need to be adjusted due to insensitivity of the tiny light scattering sensors in the portable devices, but their linearity and reproducibility seem to be acceptable. By using those monitoring devices, users are expected to have benefits of recognizing the changes of concentration more quickly and could help preventing themselves from the adverse health impacts.

A Study of the Problem Analysis and Solution about the Car Sharing Service (카쉐어링 서비스의 문제점 분석 및 해결 방안 연구)

  • Lee, Young-Gyo;Ahn, Jeong-Hee
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.12 no.6
    • /
    • pp.643-656
    • /
    • 2019
  • The development of hot social networking services, including the Internet, has transformed rental car services into IT-based car-sharing services. The car-sharing service is a service that allows people to rent cars online without having to face-to-face. It has become the preffered service among young people who are accustomed to drinking and eating alone. Users can use their smartphones to book their types of cars and hours of rent, and then go to a nearby designated parking lot to use their reserved cars. You can open a designated car door with a smart phone and drive. It is a very convenient service to pay for the distance you drive. However, the car-sharing service already in use in business has the following problems: underage who do not have a driver's license may drive a car borrowed by an acquaintance, the status of a license registered at the time of join membership with a car-sharing company may change to a suspension or cancellation of a license while renting and driving, or even a drunk person may rent a car and drive. In this paper, the method to solve these problems has been studied and proposed. The proposed method is to reduce the cost of investment by a car-sharing service provider and to minimize user inconvenience. And, it was compared and analyzed with the existing method. For the method to be used efficiently, the active operation of the car-sharing company and the government's policies will have to be supported.

Implementation of an Effective Educational Community Service System by using Metadata and Category (MetaData와 Category를 이용한 효과적인 교육용 커뮤니티 서비스 시스템(ECSS) 구현)

  • Yoon, Sun-Jung;Kim, Mi-Jin;Kim, Chee-Yong
    • Journal of Korea Multimedia Society
    • /
    • v.9 no.10
    • /
    • pp.1332-1343
    • /
    • 2006
  • This paper proposes an educational community service system that manages information of good quality intensively without overlapping, and that provides an effective searching function by using a personal community with many user layers. This system raises the efficiency of searching and management by using Metadata and Category. It is a self-leading educational community system that brings merits into relief and improves weak points. We constructed an autogenous Blog chain service as a tool which verifies this system, which is called 'EduLOG(Educational Blog) service' Especially we extracted Metadata suitable for this service, which is on the basis of worldfamous Dublin Core Metadata. And we made a new category on the basis of categories which were proposed by some educational community sites and public educational authorities, and we applied it to this system. To ascertain whether this service system provide adequate function or not, we made a questionnaire on the basis of the appraisal table in websites, and evaluated it at the request of experts. In view of the results so far achieved, it returned good scores (above 3.5/5.0) in accuracy of evaluation, low-end reappearance ratio, easiness of registering and approaching information, and intensive management of a categorical information, confirming the efficiency of the ECSS system. Therefore we believe firmly that the ECSS system will play a efficient information storing and searching roles in the near future.

  • PDF

A Study on the Expected Effect of Mobile Prepaid Payment for the Activation of Food Waste Volume-Rate System (음식물 종량제 활성화를 위한 모바일 선불결제 적용에 따른 기대효과 연구)

  • Kim, YongIl;Kim, SeungCheon
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.11
    • /
    • pp.47-54
    • /
    • 2020
  • This study proposes an NFC-based payment system that considers user convenience while expanding the existing payment method for RFID-based individual food and logistics waste equipment. In line with this trend, I proposed to apply NFC to the existing RFID-based food meter to release the food in the meantime and to address the problem of re-carrying due to card loss, card not possessed, and non-filling, and the question that could not be identified by various cumbersome procedures. NFC's function alone has been certified for its convenience, which led to its introduction and research in the period of time. Of course, we need to negotiate fees with the transportation card company, but if we see a market share related to transportation card soon, we think smooth negotiations will take place. NFC method will be expanded to all phones with iPhone NFC opening. Therefore, in the next study, we intend to apply the payment system in NFC by linking with local currency, mobile vouchers, and card companies, which are being paid as respective payment means according to the recent emergency support system for COVID-19.

A study of using quality for Radial Basis Function based score-level fusion in multimodal biometrics (RBF 기반 유사도 단계 융합 다중 생체 인식에서의 품질 활용 방안 연구)

  • Choi, Hyun-Soek;Shin, Mi-Young
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.45 no.5
    • /
    • pp.192-200
    • /
    • 2008
  • Multimodal biometrics is a method for personal authentication and verification using more than two types of biometrics data. RBF based score-level fusion uses pattern recognition algorithm for multimodal biometrics, seeking the optimal decision boundary to classify score feature vectors each of which consists of matching scores obtained from several unimodal biometrics system for each sample. In this case, all matching scores are assumed to have the same reliability. However, in recent research it is reported that the quality of input sample affects the result of biometrics. Currently the matching scores having low reliability caused by low quality of samples are not currently considered for pattern recognition modelling in multimodal biometrics. To solve this problem, in this paper, we proposed the RBF based score-level fusion approach which employs quality information of input biometrics data to adjust decision boundary. As a result the proposed method with Qualify information showed better recognition performance than both the unimodal biometrics and the usual RBF based score-level fusion without using quality information.

A Wireless AP Power Saving Algorithm by Applying Sleep Mode and Transmission Power Coordination in IoT Environments (사물 인터넷 환경에서 무선 AP의 수면 모드 운영 및 송출 전력 조절을 통한 전력 소비 절감 알고리즘)

  • Jeong, Kyeong Chae;Choi, Won Seok;Choi, Seong Gon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.11
    • /
    • pp.393-402
    • /
    • 2014
  • We have experienced an explosive increase of the IoT(Internet of Things) technology based devices including smart phones and the wireless communications. Also the growing power consumption in IEEE 802.11 WLANs(Wireless LANs) driven by these dramatic increases in not only mobile users and but also wireless APs(Access Points). To reduce the power consumption, this paper proposes a wireless AP power saving algorithm, which minimizes the transmission power without decrease the transmission and carrier sense ranges. A wireless AP which is use in our algorithm checks its own original coverage periodically for whether there is a new STA(Station) or not when its transmission power is decreased. Moreover, if there are no signaling message to connect the wireless AP, it changes its operation mode Wake-up to sleep. A Result shows that the proposed AP algorithm can reduce the total power consumption of the wireless AP approximated 18% and 35% compared to the conventional wireless AP with and without the existing power saving algorithm, respectively.

A Method for Determining Face Recognition Suitability of Face Image (얼굴영상의 얼굴인식 적합성 판정 방법)

  • Lee, Seung Ho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.11
    • /
    • pp.295-302
    • /
    • 2018
  • Face recognition (FR) has been widely used in various applications, such as smart surveillance systems, immigration control in airports, user authentication in smart devices, and so on. FR in well-controlled conditions has been extensively studied and is relatively mature. However, in unconstrained conditions, FR performance could degrade due to undesired characteristics of the input face image (such as irregular facial pose variations). To overcome this problem, this paper proposes a new method for determining if an input image is suitable for FR. In the proposed method, for an input face image, reconstruction error is computed by using a predefined set of reference face images. Then, suitability can be determined by comparing the reconstruction error with a threshold value. In order to reduce the effect of illumination changes on the determination of suitability, a preprocessing algorithm is applied to the input and reference face images before the reconstruction. Experimental results show that the proposed method is able to accurately discriminate non-frontal and/or incorrectly aligned face images from correctly aligned frontal face images. In addition, only 3 ms is required to process a face image of $64{\times}64$ pixels, which further demonstrates the efficiency of the proposed method.

Proposal of Promotion Strategy of Mobile Easy Payment Service Using Topic Modeling and PEST-SWOT Analysis (모바일 간편 결제 서비스 활성화 전략 : 토픽 모델링과 PEST - SWOT 분석 방법론을 기반으로)

  • Park, Seongwoo;Kim, Sehyoung;Kang, Juyoung
    • Journal of Intelligence and Information Systems
    • /
    • v.28 no.4
    • /
    • pp.365-385
    • /
    • 2022
  • The easy payment service is a payment and remittance service that uses a simple authentication method. As online transactions have increased due to COVID-19, the use of an easy payment service is increasing. At the same time, electronic financial industries such as Naver Pay, Kakao Pay, and Toss are diversifying the competition structure of the easy payment market; meanwhile overseas fintech companies PayPal and Alibaba have a unique market share in their own countries, while competition is intensifying in the domestic easy payment market, as there is no unique market share. In this study, the participants in the easy payment market were classified as electronic financial companies, mobile phone manufacturers, and financial companies, and a SWOT analysis was conducted on the representative services in each industry. The analysis examined the user reviews of Google Play Store via a topic modeling analysis, and it employed positive topics as strengths and negative topics as weaknesses. In addition, topic modeling was conducted by dividing news articles into political, economic, social, and technology (PEST) articles to derive the opportunities and threats to easy payment services. Through this research, we intend to confirm the service capabilities of easy payment companies and propose a service activation strategy that allows gaining the upper hand in the market.