• Title/Summary/Keyword: 생체정보 보호

Search Result 181, Processing Time 0.024 seconds

A Study on Acceptance Intentions to Use the Mobile Payment Service Based on Biometric Authentication: Focusing on ApplePay (생체 인증 기반 모바일 결제 서비스 수용의도 분석: 애플페이를 중심으로)

  • Kim, Kwanmo;Park, Yongsuk
    • Journal of Digital Convergence
    • /
    • v.18 no.7
    • /
    • pp.123-133
    • /
    • 2020
  • The aim of this study is to scrutinize acceptance intentions of Korean users and influences of information security related factors on mobile payment services based on biometric authentication methods, like finger print authentication or face recognition authentication, by focusing on ApplePay. Unlike previous studies on user acceptance of mobile payment which lack considerations on information security related factors, this study employs the UTAUT with detailed information security factors to create a research model and PLS(Partial Least Squares) method to analyze the model. Based on the analysis, gaining trust on service through company's efforts on information protection, personal characteristics and trust on applied security technologies are important factors to Korean users along with social awareness and service infrastructures. The result of this study would be helpful to companies or organizations, which provide biometric-based mobile payment services, to understand needs of Korean consumers. Based on this study, further analysis is expected to find impacts of user experiences on same company's or competitors' products to acceptance intentions.

Analysis of Optical Encryption System using JTC Architecture (JTC 구조를 사용하는 광암호화 시스템의 분석)

  • 주성현;유재성;정만호
    • Proceedings of the Optical Society of Korea Conference
    • /
    • 2003.02a
    • /
    • pp.68-69
    • /
    • 2003
  • 사회의 정보화가 진전됨에 따라 개인 정보의 보안이 중요한 문제로 대두되고 있고, 이를 위한 보안 시스템들이 활발하게 연구되고 있다. 이 중에서 지문인식이나 얼굴인식과 같은 생체인식을 이용한 시스템들이 차세대 보안시스템으로 채택되는 것은 거스를 수 없는 대세로 받아들여지고 있다. 또한 이러한 보안시스템들이 정상적으로 운영되기 위해서는 외부로 노출되는 반드시 생체패턴을 보호하기 위한 방법이 필요하게 된다. (중략)

  • PDF

Biometrics System for User Authentication in e-biz (전자상거래에서 사용자 인증을 위한 생체측정 시스템)

  • 조동욱;이내준;한길성
    • Journal of the Korea Computer Industry Society
    • /
    • v.2 no.10
    • /
    • pp.1329-1338
    • /
    • 2001
  • This paper describes the biometrics system for user authentication in electronic commerce. At present, social demands are increasing for information security techniques against the information wiretapping in open communications network. For this, these techniques such as anti-virus, firewall, VPN, authentication, cryptography, public key based systems and security management systems have been developed. This Paper discusses the user authentication for the implementation of efficient electronic payment systems. In particular. user authentication system has keen developed using biometrics techniques and the effectiveness of this paper is demonstrated by several experiments.

  • PDF

The biometric authentication technology, which makes overseas trip possible without passports (여권 없이도 외국 여행이 가능한 생체 측정 인증 기술)

  • Shim, Hyun Bo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.88-95
    • /
    • 2012
  • The passport is not only an officially proven document in order to identify the nationalities of travelers, but also request for protections of travelers. Since the overseas trips have been increased, the uses of forged or modulated passports are also now rapidly increasing. The forged or modulated passports are mainly used by international criminal organization or offenders, who are restricted by immigration control, in order to avoid under the radar and conceal their identities. The purpose of biometric authentication technology is to define one's unique identities through the comparative analysis one's unique finger prints, iris, sweat gland, blood vessel, palm pattern, vein distribution, voice, and etc. We have been studying about applicable and possibilities of the biometric authentication technology for overseas travel without passports. In hence, we have been also collected various of technical references of using biometric authentication, and have been analyzed what is the best biometric to be alternatively used instead of passports.

  • PDF

Danger Situations Alert System based U-Healthcare (유헬스케어 기반의 위험상황 알림 시스템)

  • Park, Byungdon;Yu, Donggyun;Jung, Hoekyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.1
    • /
    • pp.193-198
    • /
    • 2017
  • Recently, as interest in health increases, various wearable devices such as smart watch and smart band which can measure user's biometric information are being studied. Conventional wearable devices service the measured biometric information in a form that provides simple monitoring, disease prevention, and exercise amount. However, the user is Lack to deal with the dangerous situation. In this paper, we propose a hazard notification system to address these problems. The biometric information measured by the acceleration sensor and the heart rate sensor is transmitted to the application through the Arduino in real time. It identifies the risk situation through sensor priority measurement and risk situation identification algorithm. If a dangerous situation occurs, a notification message is sent to the guardian indicating the current location of the user. Therefore, it can be expected that if a dangerous situation occurs to a user who needs protection, he can respond promptly.

Study on Security Threat and Requirement for Personal Health Management in u-Health Environment (u-헬스 환경에서 개인건강관리를 위한 보안 위협 및 요구사항에 관한 연구)

  • Kim, Soon-Seok;Park, Hong-Jin
    • Journal of Advanced Navigation Technology
    • /
    • v.14 no.4
    • /
    • pp.504-511
    • /
    • 2010
  • The personal bio-information supplied from the PHD(Personal Health Device) for personal health management is very sensitive in relation to a personal living body in an aspect of privacy protection. On the assumption thai the information is about a patient, it is more serious problem if it is revealed to a third party. However. the established ISO (International Organizations for Standardization) standard protocol[1] in October 2009 has just considered a transmission part for mutual exchange of bio-information between individuals, but has never actually considered security elements. Accordingly, this paper is to show all sorts of security threats according to personal health management in the u-health environment and security requirements newly.

Pet Bioscanning App (반려동물 생체인식 앱)

  • Park, Ju-Yeon;Yun, Ji-Yun;Lee, Ye-Jin;Bak, Seo-Yeong;Kim, Doo-Yeol;Lee, Ki Seog
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2021.07a
    • /
    • pp.351-354
    • /
    • 2021
  • 본 연구에서는 기존 업체들이 활용하고 있는 반려동물 생체인식 기술 기반 통합 서비스 앱을 제안한다. 이 앱은 반려동물 미등록자의 미등록 사유를 바탕으로, 접근성 및 노출 빈도가 높은 스마트폰 앱으로, 등록 방식은 안면, 비문, 홍채, DNA 등록을 활용한다. 하나의 생체인식 방법을 사용하는 것이 아닌 다중 인식 방법을 제공하고, 각 인식 방법별 정확도의 비중을 달리하여 오차를 줄이고, 기존의 등록 방식 및 앱과의 차별화를 시도하고자 한다. 또한, CUPET 앱은 단순 등록에 그치지 않고, 실종 및 유기 동물 찾기, 예방접종 주기 및 반려동물 생애주기 정보 제공, 사용자들의 데이터 및 병원 연계를 통해 반려동물 유형별 병원 추천 등의 서비스를 제공하고자 한다. 본 연구에서 제안하는 CUPET 앱을 통하여, 등록 방식의 간략화로 반려동물 등록률 증가, 개인의 반려동물 인식 장치 소유 가능으로 실종 및 유기 동물에 대한 신속한 보호가 가능할 것으로 사료된다.

  • PDF

Inserting Chaff Points into Fuzzy Fingerprint Vault for Protecting Correlation Attack (지문 퍼지볼트의 상관공격에 강인한 거짓 특징점 삽입 방법)

  • Choi, Hanna;Lee, Sungju;Chung, Yongwha;Choi, Woo-yong;Moon, Daesung;Moon, Kiyoung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.11a
    • /
    • pp.645-646
    • /
    • 2009
  • 지문 템플릿(Fingerprint Template)을 보호하기 위해 암호학적 기법인 퍼지볼트(Fuzzy Vault)가 적용되었다. 퍼지볼트 기법은 지문으로 부터 추출되는 특징점을 은닉하기 위하여 지문 템플릿에 다수의 거짓 특징점을 "임의"로 삽입하는 방법이다. 그러나 최근 이러한 지문 퍼지볼트를 효과적으로 크래킹 할 수 있는 상관공격(Correlation Attack)에 관한 연구가 발표되었는데, 이것은 동일한 지문으로 부터 생성되는 두 개의 지문 템플릿을 획득함으로써 진짜와 거짓 특징점을 쉽게 구별하는 방법이다. 본 논문에서는 상관공격에 강인도록 지문 퍼지볼트를 생성하는 방법을 제안한다. 제안한 방법은 특징점의 각도 정보를 이용하여 거짓선분(Chaff Line)을 생성한 후 "규칙적"으로 거짓특징점을 삽입함으로써, 두 개 지문 템플릿을 획득하더라도 동일한 지문에 대해 삽입된 거짓 특징점의 위치와 각도가 유사하기 때문에 진짜와 거짓 특징점을 구별하기 어려워 상관공격을 피할 수 있다. 실험을 통하여 거짓 특징점을 규칙적으로 저장하는 방법을 적용함으로써 기존 방법의 인식 성능을 유지하면서, 상관 공격에 강인함을 확인하였다.

Implementation of u-Healthcare Security System by applying High Speed PS-LFSR (고속 병렬형 PS-LFSR을 적용한 u-헬스케어 보안 시스템 구현)

  • Kim, Nack-Hyun;Lee, Young-Dong;Kim, Tae-Yong;Jang, Won-Tae;Lee, Hoon-Jae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.1
    • /
    • pp.99-106
    • /
    • 2011
  • The emerging of ubiquitous computing and healthcare technologies provides us a strong platform to build sustainable healthcare applications especially those that require real-time information related to personal healthcare regardless of place. We realize that system stability, reliability and data protection are also important requirements for u-healthcare services. Therefore, in this paper, we designed a u-healthcare system which can be attached to the patient's body to measure vital signals, enhanced with USN secure sensor module. Our proposed u-healthcare system is using wireless sensor modules embedded with NLM-128 algorithm. In addition, PS-LFSR technique is applied to the NLM-128 algorithm to enable faster and more efficient computation. We included some performance statistical results in term of CPU cycles spent on NLM-128 algorithm with and without the PS-LFSR optimization for performance evaluation.

Self-Change Detection Algorithms using the Artificial Immune System (인공 면역계를 이용한 자기변경 검사 알고리즘)

  • 선상준;심귀보
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.11 no.4
    • /
    • pp.320-324
    • /
    • 2001
  • According to the rapid growth of computer and internet recently, A hacking to steal infonnations and the computer vinls to destroy the data in computer are now prevailing in the whole world. A study of methods to protect the data of computer is in progress. One of the study is constmction of computer immune system using biological immune system tbat has ability of removal and protection from extemal invasion. In this paper, we make a change detection algorithm which is based on ability of distinction between self and nonself in T-cytotoxic cell that is one of biological immune cell. In algorithm, MHC receptors are composed of a part of self-file that is recognized as itself and those shall distinguish self-file from the changed file. As a result of applying this algorithm to the changed self-files, we prove the efficacy of detection of the self-files changed by computer virus and hacking.

  • PDF