• Title/Summary/Keyword: 사전 인증

Search Result 266, Processing Time 0.026 seconds

A Study on Face Recognition using Hierarchical Classification of Facial Principal Component (얼굴 주성분의 계층적 분류를 이용한 얼굴인식에 관한 연구)

  • Choi, Jae-Young;Kim, Nak-Bin
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.11a
    • /
    • pp.649-652
    • /
    • 2002
  • PCA 방법은 입력 차원을 수학적으로 줄일 수 있는 장점 때문에 패턴인식 부분에서 널리쓰이고 있다. 얼굴인식에서의 PCA는 학습 패턴의 분산을 최대로 하는 기저 벡터들인 고유얼굴을 만들어 얼굴인식이 필요한 영상을 이 기저 벡터에 투사시켜 이때 나온 인자들과 원래 각 개인의 대표 인자값과의 거리 비교로 얼굴을 인식하는 방법이다. 그러나 조명등의 영향에 매우 민감하며 거리값으로 얼굴을 인식하기 때문에 다양한 변화에 따라 오인식률이 높아진다. 이는 인식률을 높이고자 임계값을 높게 설정하는 과정에서 발생하는 오류이며, 이를 방지하기 위해 임계치를 낮게 설정하면 오거부율이 높아진다. 이에 본 연구에서는 PCA에 입력되는 패턴들을 사전에 비교, 분류하여 PCA 연산시에 분산과 변위를 최대한으로 가질 수 있도록 하였다. 그러하여, 기존의 PCA보다 상당히 낮은 임계값으로도 오거부율의 증가를 막았으며, 낮은 임계값 설정으로 인하여 오인식률을 낮추는 결과를 얻을 수 있었다. 이는 기존의 PCA 방법을 사용하는 인식시스템에서 종종 발생하는 허가되지 않아야 하는 외부인을 인증시키는 사례를 줄일 수 있다.

  • PDF

VPN Tunneling Protocol Design based on ECC (ECC기반 VPN 터널링 프로토콜 설계)

  • Choi, Eun-Sil;Lee, Byung-Kwan;Jung, Eun-Hee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.11c
    • /
    • pp.2001-2004
    • /
    • 2003
  • 본 논문은 네트워크계층에서 IP패킷을 송 수신자간에 사전에 합의된 알고리즘을 이용하여 암, 복호화 하는 통신 터널링 프로토콜로, 공유비밀키 생성을 위해 ECC((Elliptic Curve Cryptosystem)알고리즘을 사용함으로서 키 생성시간의 단축과 보안 강도을 강화시켰다. 또한, 공유비밀키 교환을 위해서 타원곡선을 이용한 EC-DH(Elliptic Curve Diffie Hellman)알고리즘을 사용하고, IP패킷의 무결성 검증과 인증을 위해 HMAC-SHA-1알고리즘, 패킷을 암 복호화하기 위한 대칭키 알고리즘인 DES를 사용하였다.

  • PDF

Key agreement protocol using one-way hash function (일 방향 해시함수를 이용한 키 교환 프로토콜)

  • Lee, Ji-Eun;Kim, Seung-Hwan;Chung, Tai-Myoung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.11a
    • /
    • pp.609-610
    • /
    • 2009
  • Diffie-Hellman의 키 교환 방식은 공개된 통신망에서 사전 정보 공유 없이 공통된 세션 키를 생성할 수 있는 획기적인 방법이었지만, 중간자 공격이 가능하다는 문제점을 가지고 있다. 이러한 문제를 해결하기 위해 Seo와 Sweeny가 제안한 SAKA(Simple Authenticated Key Agrement) 프로토콜은 간단한 패스워드를 사용함으로써 두 사용자들 사이의 인증과 공통 세션 키를 생성할 수 있는 프로토콜이다. 그러나 SAKA 프로토콜은 키 검증단계에서 많은 취약점을 가지고 있다. 본 논문에서는 SAKA 프로토콜의 취약점을 해결하기 위하여 새로운 키 교환 프로토콜을 제안한다. 제안한 프로토콜은 기존의 SAKA 프로토콜이 갖는 장점을 유지하고 일 방향 해시함수를 이용하여 취약점을 효율적으로 해결할 수 있다.

Design of Messenger RISK Detection System for Smishing Prevention Using Open API (메신저피싱 예방을 위한 Open API 활용 메신저 위험 인자 감지 시스템 설계)

  • Do-Yun Kim;Kwang-Young Park
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2023.05a
    • /
    • pp.237-238
    • /
    • 2023
  • 코로나 19 로 대면이 아닌 비대면이 일상이 되며 공공기관과 기업들이 사용자에게 보내는 메시지의 양이 증가하였다. 이에 따라 공공기관을 사칭하는 메신저피싱이 증가하였다. 본 논문에서는 OpenAPI 데이터를 활용한 메신저 위험 url 감지 시스템의 설계를 제시한다. 메신저피싱으로 인한 금전 피해 및 개인정보 탈취를 예방하기 위해 메시지의 포함된 피싱 url 과 기관, 기업의 사전 안전 인증을 통한 안전 url 을 구분한다. 이를 통해 사용자에게 안전하고 쾌적한 인터넷을 제공한다. 향후, 제안하는 시스템의 현실적인 검증과 성능 평가가 필요하다.

A Study of Innovation Policy regarding Technical Regulation and Conformity Assessment Procedure on ICT Equipments - Focused on Privatization Plan (CT 분야의 기술기준 및 적합성평가시스템의 혁신정책에 관한 연구: 민간화 방안을 중심으로)

  • Lee, Yong-Kyu
    • Journal of Korea Technology Innovation Society
    • /
    • v.19 no.3
    • /
    • pp.439-464
    • /
    • 2016
  • The technical regulation and conformity assessment procedure of our country on ICT equipments is currently required to have more innovation due to the request of main trade countries, the second phase conclusion of MRA, necessity of expansion of conformity assessment service market and demand of manufacturers. The world's leading advanced countries have already proceeded with innovation based on privatization plan. According to the comparative analysis of the level, it turned out that Japan obtained the highest level of privatization while South Korea ranked the lowest level. According to the research result of examination and certification ability of private institutions of our country, it turned out that our country is expected to have possibility of achieving higher level of privatization than that of the present. Moreover, according to the questionnaire survey conducted to the persons concerned regarding privatization direction, they gave positive response to all the indicated survey contents of privatization direction in terms of "delegation of certification services to private sectors (contracting-out)", "transformation of EMC into private voluntary standard" and "changeover of conformity assessment agent". However, from the view of acceptance and conflict model, it is estimated that starting from "delegation of certification services to private sectors (contracting-out)" seems to be the most advisable plan. Also, prior to privatization, it is required to improve relevant systems such as certification examiner system.

Analysis and Suggestion of Environment-friendly Interior Finishing Materials for Aged Apartment Remodeling (노후 공동주택 리모델링의 친환경 실내 마감재료 분석 및 제안)

  • Kim, Ki-Hyun;Kim, Kyung-Rai
    • Korean Journal of Construction Engineering and Management
    • /
    • v.8 no.2
    • /
    • pp.118-126
    • /
    • 2007
  • Environmentally Sound and Sustainable Development (ESSD)" is a key word in recent years. The construction industry, have put a great influence on ergonomic and sustainable environment. Recently, "green building certifications", such as Indoor Air Quality (IAQ) and eco-friendly material regulation have been established. With this regard, new construction and aged-housing remodeling projects are required to meet these certification criteria. Apartment residents have great concern on eco-product, since many cases are reported that Sick Building Syndrome is caused by toxic substance from building materials. Aged-housing remodeling construction has a unique characteristic in that the residents are already determined prior to construction execution. Therefore, the analysis of resident's need for building materials in aged-housing remodeling is relatively easy compared to new building construction. As such, it is very important to analyze their preferences for eco-friendly materials prior to project execution. The purpose of this study is to find the needs of residents and priority of their needs. Based on their needs and priority, this paper provides a new strategy in using environment-friendly materials and maximizing their satisfaction level when aged housing remodeling is constructed. In addition, this paper provide new criteria in selecting new developed environmental materials in remodeling projects for the purpose of improving the safety and health level in construction industry.

Burglary Prevention Effect of Target Hardening through Certified Security Products by WDQ Analysis (WDQ분석을 통한 타겟하드닝 CPTED의 침입범죄 예방효과 검증: 안산시 사례 중심으로)

  • Park, Hyeonho;Kim, Kang-Il;Cho, Joon-Tag
    • Korean Security Journal
    • /
    • no.56
    • /
    • pp.9-30
    • /
    • 2018
  • Crime prevention strategies are introduced to reduce the loss caused by crimes, and Target hardening against domestic burglary attacks is broadly accepted as one of such physical security strategies. In terms of business and home security, target hardening is one of the suite of protective measures that are included in crime prevention through environmental design(CPTED). This can include ensuring all doors and windows are sourced and fitted in such a way that they can resist forcible and surreptitious from the attack of intruder. Target hardening with certified security doors, security windows and secure locks are revealed to be much more effective to deter burglary attacks than other security devices, such as CCTV, lightings and alarms which have largely psychological and indirect impact. A pilot program of target hardening utilizing certified security window and locks was carried out in Ansan city, South Korea in 2016. This study is based on the quasi-experimental design of this program for a residential area. The researchers tried to verify the crime displacement effect of the target hardening program and the diffusion effects of crime prevention benefits by analysing the crime statistics. The evaluation utilized WDQ(Weighted Displacement Quotient) technique to analyze whether the crime displacement occurred, compared the crime statistics of the experimental area with that of buffer zone and controlled areas. The result showed that the target hardening program was significantly effective in crime prevention. The number of burglary in the experimental site with target hardening intervention reduced by 100%, although the areas without the intervention showed reduction in the burglary. The crime displacement was not found at all, and the number of burlary at the buffer zone also reduced significantly.

A Research on RC3(RMF-CMMC Common Compliance) meta-model development in preparation for Defense Cybersecurity (국방 사이버보안을 위한 RMF-CMMC 공통규정준수 메타모델 개발방안 연구)

  • Jae-yoon Hwang;Hyuk-jin Kwon
    • Journal of Internet Computing and Services
    • /
    • v.25 no.1
    • /
    • pp.123-136
    • /
    • 2024
  • The U.S. Department of Defense, leading global cybersecurity policies, has two main cybersecurity frameworks: the Cybersecurity Maturity Model Certification (CMMC) for external defense industry certification, and the Risk Management Framework (RMF) for internal organizational security assessments. For Republic of Korea military, starting from 2026, the Korean version of RMF (K-RMF) will be fully implemented. Domestic defense industry companies participating in projects commissioned by the U.S. Department of Defense must obtain CMMC certification by October 2025. In this paper, a new standard compliance meta-model (R3C) development methodology that can simultaneously support CMMC and RMF security audit readiness tasks is introduced, along with the implementation results of a compliance solution based on the R3C meta-model. This research is based on practical experience with the U.S. Department of Defense's cybersecurity regulations gained during the joint project by the South Korean and U.S. defense ministries' joint chiefs of staff since 2022. The developed compliance solution functions are being utilized in joint South Korean-U.S. military exercises. The compliance solution developed through this research is expected to be available for sale in the private sector and is anticipated to be highly valuable for domestic defense industry companies that need immediate CMMC certification.

A Comparative Pedagogical Approach to Lifelong Education: Possibilities and Limitations (평생교육의 비교교육학적 접근: 가능성과 한계)

  • Choi, DonMin
    • Korean Journal of Comparative Education
    • /
    • v.28 no.3
    • /
    • pp.291-307
    • /
    • 2018
  • As the value of lifelong learning becomes important, states are making efforts to build a system of lifelong learning. According to this tendency, this paper intends to compare the participation rate of lifelong learning, learning outcomes, learning support infrastructure, support of learning expenses, and recognition of lifelong learning. For the comparative pedagogical approach, Bray and Thomas' cubes such as geographical / regional level, non - geographical demographic statistics, social and educational aspects were utilized. The participation rate of lifelong learning in Korea is 34.4% in 2017, which is lower than the OECD average of 46%. The competency scores of Korean adults were lower than the OECD national averages of the PIAAC survey which measured adult competence, language ability, numeracy, and computer-based problem solving ability. In order to recognize prior learning, EU countries have developed EQFs to evaluate all non-formal and informal learning outcomes, while Korea recognizes qualification as a credit banking credit under the academic credit banking system. International comparisons of lifelong learning can be used as an important tool for diagnosing the actual conditions of lifelong learning in a country and establishing future lifelong learning policies. Therefore, it is necessary to maintain that the comparative pedagogical approach of lifelong learning differs according to the historical context, socioeconomic characteristics, and population dynamics, including the formation process and characteristics of modern countries.

The Password base System for the safe and Efficient Identification (안전하고 효율적인 신원확인을 위한 암호기반 시스템)

  • Park, Jong-Min;Park, Byung-Jun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.1
    • /
    • pp.81-86
    • /
    • 2009
  • Almost all network systems provide an authentication mechanism based on user ID and password. In such system, it is easy to obtain the user password using a sniffer program with illegal eavesdropping. The one-time password and challenge-response method are useful authentication schemes that protect the user passwords against eavesdropping. In client/server environments, the one-time password scheme using time is especially useful because it solves the synchronization problem. In this paper, we propose a new identification scheme One Pass Identification. The security of Password base System is based on the square root problem, and Password base System is secure against the well known attacks including pre-play attack, off-line dictionary attack and server comprise. A number of pass of Password base System is one, and Password base System processes the password and does not need the key. We think that Password base System is excellent for the consuming time to verify the prover.