• Title/Summary/Keyword: 인지된 보안

Search Result 349, Processing Time 0.029 seconds

A Study of Authentication Scheme using Biometric-Based Effectiveness Analysis in Mobile Devices (모바일 장치에서 신체정보기반의 효용성 분석을 이용한 인증기법에 관한 연구)

  • Lee, Keun-Ho
    • Journal of Digital Convergence
    • /
    • v.11 no.11
    • /
    • pp.795-801
    • /
    • 2013
  • As the life which existed only offline has changed into a life part of which is led online, it is an important problem to identify whether an online user is legitimate one or not. Biometric authentication technology was developed to identify the user more correctly either online or in offline daily life. Biometric authentication is a technology where a person is identified by his or her unique characteristics, and is highlighted as a next-generation authentication technology replacing password. There are various kinds of traits unique to each individual, and biometric authentication technologies drawing on such traits use various devices and algorithms. Firstly, this paper classified such various biometric authentication technologies, and analyzed the effects of them when they are applied on smartphone, smartwatch and M2M of the different devices platforms. Secondly, it suggested the effectiveness-based AIB(Authentication for Integrated Biometrics) authentication technique, a comprehensive authentication technique, which can be used in different devices platforms. We have successfully included the establishment scheme of the effectiveness authentication using biometrics.

Design & Construction of Korean Type Smart Work Center on the basis of User-Oriented Smart Work System (사용자를 지향한 스마트워크 시스템 기반의 한국형 스마트워크 센터 설계 및 구축)

  • Koo, Gun-Seo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.1
    • /
    • pp.73-81
    • /
    • 2013
  • This research proposes design and construction of Korean type SWC based on user oriented smart work system. To achieve this proposal, the research suggested improvements of related law, changes to working environment, and strengthening information security for users, stronger Korean ICT based; the study investigated for an efficient and suitable Korean type SWC by analyzing Korean government plans and foreign developed countries' cases. The user-oriented smart work service platform suggested in this study aims to offer a solution to national crisis and establish infrastructure to knowledge-industry and creative-industry by collaborative smart work environment of 'Context Awareness' and 'Tangible User Interface'. As a result, smart work suggests methods to produce creative work by IT workers and efficient work environment for better standing in world competition. In conclusion, Korean SWC system is proved to be superior in satisfaction rate at 75.41%, 20.18% higher than average score shown in 5 categories in 5 countries from USA, Japan, and EU's which was 55.23%.

An Exploratory Study on the Factors of Difference in Trust Levels for Internet-Only Banks by Age Groups (인터넷전문은행의 신뢰 결정요인의 연령대별 차이에 관한 탐색 연구)

  • Nam, Sang-Wook
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.3
    • /
    • pp.58-66
    • /
    • 2020
  • This paper aims to empirically analyze the factors of difference in trust level for Internet-only bank by age groups. The purpose of this study is to provide clues and a research data in developing differentiation strategies that can increase consumer's trust by age group. In this study, above all, the financial consumer group was divided into the 2030s and 4050s based on age. The study explored the trust determinants of the two groups and compared the differences between the two groups using a multi-group analysis method. As results, in all age groups, financial consumer's trust was seen as a determinant of convenience, security and benefit of financial transaction costs. The difference of the determinant of trust between 2030s and 4050s occurred in the factor of benefit. Moreover, it reconfirmed that consumer's trust is later strongly extended to relationship commitment. These findings suggest that trust is of paramount importance to the Internet-only bank, whose market competition will intensify in the future.

Two-Dimensional Face Recovery Algorithm Using Face Outline Information Based on the FDP (FDP기반의 얼굴윤곽 정보를 이용한 2차원 얼굴영상 복원기법)

  • Cho Nam-Chul;Lee Ki-Dong
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.6
    • /
    • pp.33-41
    • /
    • 2006
  • Nowadays, CCTV can be come across easily in public institutions, banks, and etc. These CCTV play very important roles for preventing many kinds of crimes and resolving those crime affairs. But in the case of recording image of a specific person far from the CCTV, the original image needs to be enlarged and recovered in order to identify the person more obviously. Interpolation is usually used for the enlargement and recovery of the image in this case. However, it has a certain limitation. As the magnification of enlargement is getting bigger, the quality of the original image can be worse. This paper uses FDP(Facial Definition Parameter) proposed by the MPEG-4 SNHC FBA group and introduces a new algorithm that uses face outline information of the original image based on the FDP, which makes it possible to recover better than the known methods until now.

  • PDF

Cloud-based malware QR Code detection system (클라우드 기반 악성 QR Code 탐지 시스템)

  • Kim, Dae-Woon;Jo, Young-Tae;Kim, Jong-Min
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.9
    • /
    • pp.1227-1233
    • /
    • 2021
  • QR Code has been used in various forms such as simple business cards and URLs. Recently, the influence of Corona 19 Fundemik has led to the use of QR Codes to track travel routes through visits and entry / exit records, and QR Code usage has skyrocketed. In this way, most people have come to use it in the masses and are constantly under threat. In the case of QR Code, you do not know what you are doing until you execute it. Therefore, if you undoubtedly execute a QR Code with a malicious URL inserted, you will be directly exposed to security threats. Therefore, this paper provides a cloud-based malware QR Code detection system that can make a normal connection only when there is no abnormality after determining whether it is a malicious QR Code when scanning the QR Code.

Object classification and the number of pixels compared with children protection (화소 수 비교를 통한 성인과 유아 구분 방법)

  • Kang, ji-hun;Kim, chang-dae;Ryu, sung-pil;Kim, dong-woo;Ahn, jae-hyeong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.725-728
    • /
    • 2014
  • Continue to have an increasingly violent crimes against children every year, and as you know all seriousness is classified as a felony. However, efforts to reduce the underlying crime is low. Therefore, it is necessary to solve this problem, the security system. Is to protect the children and adults that exist that can pose a threat to children to identify and monitor tracking method in this paper. Was based on a Korean standard body size of a person, such as keys, arm length, leg length, head vertical length, head width proposed method. Also, separate the adults and children through the comparison of the reference value, the ratio and the ratio of the number of pixels of the detected object, the proposed method. Processing speed is fast because it detects only a specific object region in the entire image in the handling method in the proposed method the five nine minutes. The advantage is to enable comparison of the specific object, through which there is.

  • PDF

An Empirical Study on Factors Affecting the University Students' Software Piracy Intention (대학생들의 S/W 불법복제 의도에 영향을 미치는 요인에 관한 연구)

  • Jeon, Jin-Hwan;Kim, Jong-Ki
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.2
    • /
    • pp.127-140
    • /
    • 2009
  • Recently, software piracy is one of the serious crimes for the digital materials. It makes economically devasting to the software industry and the market. In particular, it is a widespread phenomenon among university students in Korea and negative affects in measuring social and cultural level. Many studies have been focused on the users' intention of the software piracy for making anti-piracy policy. The purpose of this study is to investigate the factors affecting university students' software piracy intention. The survey includes responses from 271 university students in a school of business adminstration. The research model was estimated with multiple regression. The analysis showed results that user's characteristics, subjective norms, and perceived software quality were significantly related to intention of software piracy, but security policy was not. Perceived importance of intellectual property has negative impact on user's software piracy intention. Based on the findings, we suggest the implications for developing and implementing appropriate policies for anti-piracy.

Design of Fault-tolerant MA Migration Scheme based on Encrypted Checkpoints (암호화된 체크포인트를 이용한 결함 허용성을 가지는 이동 에이전트의 이주 기법 설계)

  • 김구수;엄영익
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.6
    • /
    • pp.77-84
    • /
    • 2003
  • A mobile agent is a program which represents a user in a network and is capable of migrating from one node to another node, performing computations on behalf of the user. In this paper, we suggest a scheme that can safely recover mobile agent using the checkpoint that is saved at the platform that it visited previously and restart its execution from the abnormal termination point of the mobile agent. For security, mobile agent uses its public key to encrypt the checkpoint and the home platform uses the private key of the mobile agent to decrypt the encrypted checkpoints at the recovery stage. When home platform receives the checkpoint of the mobile agent, home platform verifies the checkpoint using message digest. Home platform verifies the correctness of the checkpoint by comparing the message digest generated at checkpoint mention time with the message digest generated at mobile agent recovery time.

Analysis of Psychological Factors Inducing Cybercrime (사이버범죄를 유발하는 심리적요인 분석)

  • Lim, HeonWook
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.2
    • /
    • pp.157-163
    • /
    • 2021
  • This study attempted to find individual reasons for inducing cybercrime. The survey was conducted targeting investigators and security experts on 11 types of cybercrime. There are 16 internal factors that cause crime and classified according to Maslow's 5 steps. As a result of the survey on a total of 176 items, the credibility of the Cronbach's Alpha coefficient was 0.925. The result of the factor analysis is as follows. Factor analysis results are maslow phase 1 physiological desire is commercial, sykes. Phase 2 safety desires are not punishable and crowd. The three-stage social desire is impulsiveness, indifference, etc. The fourth stage of respect is anonymity and honor. The desire for self-reality in stage 5 has been reduced to indesity, a loss of moderation, morality, and media effects. In conclusion, the physiological desire, the desire for respect for the crime of infringing on the information and communication network, the desire for menstruation, the desire for self-realization for the crime of using information and communication networks, the desire for self-actualization for the crime of illegal content. It was in the order of desire.

2-Stage Detection and Classification Network for Kiosk User Analysis (디스플레이형 자판기 사용자 분석을 위한 이중 단계 검출 및 분류 망)

  • Seo, Ji-Won;Kim, Mi-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.5
    • /
    • pp.668-674
    • /
    • 2022
  • Machine learning techniques using visual data have high usability in fields of industry and service such as scene recognition, fault detection, security and user analysis. Among these, user analysis through the videos from CCTV is one of the practical way of using vision data. Also, many studies about lightweight artificial neural network have been published to increase high usability for mobile and embedded environment so far. In this study, we propose the network combining the object detection and classification for mobile graphic processing unit. This network detects pedestrian and face, classifies age and gender from detected face. Proposed network is constructed based on MobileNet, YOLOv2 and skip connection. Both detection and classification models are trained individually and combined as 2-stage structure. Also, attention mechanism is used to improve detection and classification ability. Nvidia Jetson Nano is used to run and evaluate the proposed system.