• Title/Summary/Keyword: 주민등록번호

Search Result 86, Processing Time 0.025 seconds

A Study on Improvement method of designation criteria for Personal Proofing Service Based on Resident Registration Number (주민등록번호 기반의 온라인 본인확인서비스 기관 지정기준 개선방안 연구)

  • Kim, Jongbae
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.16 no.3
    • /
    • pp.13-23
    • /
    • 2020
  • Currently, online means of replacing resident registration numbers(RRN) include I-Pin, mobile phone, credit card, MyPin, and general-purpose certificate. In order to issue alternative means based on the RRN, it must be designated through the designation review by the Korea Communications Commission(KCC) through a designation review by personal proofing agency and be subject to annual management. However, the criteria for designation and follow-up of the designation of the personal proofing agency carried out by KCC have been used in 2010 without revision, and there are problems that do not conform to the evaluation standards of various alternative means. Therefore, in this paper, we propose a method for improving the designation criteria and management system of the personal proofing service agency. The proposed method analyzes the characteristics of the alternative identification-based personal proofing service and proposes a follow-up management standard that can appropriately evaluate the analyzed characteristics and improves the designation criteria according to the emergence of new alternatives. Through the proposed method, it can be seen that it is possible to strengthen the safety of the personal proofing service based on the alternative means of RRN provided online and face-to-face and to protect the user's personal information.

A Study on the Number Recognition of using Clustering and Thinning Method (클러스터링 방식과 세선화 기법을 이용한 숫자 인식에 관한 연구)

  • 윤진영;이영섭;임재홍
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.4
    • /
    • pp.838-845
    • /
    • 2004
  • After collecting the scanned images of practical identification licenses, it is attained to more accurate recognition of numbers in the identification licenses. As considering the process speed of the preprocess course for recognition, first, it is divided into eight equal parts of the identification license and then, removed the hologram of correspondent noises. It is run parallel template comparison method and teaming method for the number recognition and in order to extract a simple characteristics of the number the clustering method is used. Also, in case of misrecognized number because of external environment by run parallel with the thinning method, similar each numbers is sectioned by unique characteristics. From the results of number recognition, it is confirmed that the recognition rate of numbers is superior to other Studies.

The Integrated Identification Number Checking and Key Management Protocol with Certificates (인증서를 이용한 개인식별번호 확인 및 키분배 통합 프로토콜)

  • Kim Sung Duk;Jung Jae Dong;Won Dong Ho
    • The KIPS Transactions:PartC
    • /
    • v.12C no.3 s.99
    • /
    • pp.317-322
    • /
    • 2005
  • The existing certificate based authentication or identification just verifies whether the owner of private key corresponding to public key of certificate is the DN user set in the user field in the certificate or not, then we cannot find out who is the actual private key owner in a real world. To make up for this weak points, the method to insert the identification number like the resident registration number into the certificate extension field is applied as a technical standard to current domestic PKI system. In this paper, we propose the ECC based integrated identification, identification number checking and key management protocol providing user validation during the login.

Inference of birthplaces of users with public information in FaceBook (페이스북 공개 정보를 이용한 사용자 출생지 추론)

  • Choi, Daeseon;Lee, Younho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.2
    • /
    • pp.431-434
    • /
    • 2014
  • This paper shows the users' birthplace information can be inferred with only the public information in FaceBook SNS. Through experiments with various machine learning algorithms and various parameters, we have found that SVM algorithm with the location of the highschool, the current address, and the graduate year of highschool performs best for the inference, as this can infer 78% of users' birthplaces correctly. Since the birthplace information is used for various security purpose such as questions for getting the forgotten password and a part of korean residence registration number, this is a non-trival security breach and users need be cautious about it.

A Study of LBS Security Model in the Application Service using PKI based digital signature (PKI기반의 전자서명을 이용한 LBS 응용서비스에서의 보안 모델 연구)

  • 이진우;이민수;송오영;박세현
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2003.12a
    • /
    • pp.372-375
    • /
    • 2003
  • 위치기반 서비스(Location Based Service)는 이동통신망 또는 GPS 등을 기반으로 사람이나 사물의 위치를 정확하게 파악하고 이를 활용하여 다양한 응용이 가능한 서비스를 의미한다. 최근 위치기반 서비스는 이동통신 기지국이나 GPS를 통해 개인이나 차량등의 위치를 파악하여 긴급구조, 교통정보, 재난관리 등을 서비스하는 신산업 분야로서의 중요성이 증대됨에 따라 이에 대한 관심이 급증하고 있다. 그러나 이러한 산업 파급효과와 서비스 유형을 고려할 때, 공간정보의 활용과 위치기반서비스의 구현에서 핵심적인 역할을 하는 것이 위치정보인데 이러한 위치정보는 여타의 정보와 다른 특성을 가지게 된다. 즉, 위치정보는 개인정보보호 및 프라이버시(사생활)보호의 문제와 직결된다는 것이다. 특히 위치정보가 성명, 주민등록번호, 주소, 전화번호 등과 함께 직접적으로 사생활 침해의 문제를 강하게 발생시킬 수 있어 위치정보는 여타의 정보에 비하여 보다 강력한 보호를 필요로 한다. 본 논문에서는 LBS에 대한 전반적인 사항을 분석하여 문제점을 도출하고, LBS Privacy 문제점을 보호할 수 있는 방안을 제시한다. 최종적으로 제안된 모델은 차세대 LBS 시스템의 개인정보 및 Privacy 보호를 위한 기술적인 대안을 제시하였으며, 차세대 이동통신의 기반 기술이 될 것으로 기대한다.

  • PDF

A Study on Improvement of Personal Identity Proofing Service(PIPS) Based on Alternative Methods of Resident Registration Number (온라인에서 주민등록번호 대체수단 기반의 본인확인서비스의 개선 방안 연구)

  • Kim, Jongbae
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.15 no.2
    • /
    • pp.29-42
    • /
    • 2019
  • As online services become more and more popular due to the development of IT, non-face-to-face transactions are continuously increasing rather than face-to-face transactions. The personal identity proofing service(PIPS) based on the alternative method of the resident registration number is used for the purpose of confirming the identity of the other party on the Internet. However, in the case of the current PIPS, the personal information of the PIPS user is excessively provided to the online service provider. As a result, privacy problems of online users, shortage of choice of information providing options, and lack of differentiation of authentication methods are becoming problems. Therefore, this paper proposes a method to improve the PIPS based on the current resident registration number alternative method and to provide a method to differentiate the provision of excessive personal information. In the proposed method, we analyze trends and current status of overseas online PIPS in order to provide a method of providing differentiation of personal information and proposes an effective improvement method applicable to domestic.

Policy-based Query Translator Design and Implementation for the Privacy Protection in Database (데이터베이스에서 개인정보보호를 위한 정책기반 쿼리 변환기 설계 및 구현)

  • Kim, Mi-Yeong;Lee, Young-Lok;Lee, Hyung-Hyo;Noh, Bong-Nam
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2008.05a
    • /
    • pp.1112-1115
    • /
    • 2008
  • 인터넷으로 대표되는 정보통신망 및 컴퓨터를 이용한 개인 정보 수집과 활용이 일반화됨에 따라 수집된 개인정보의 불법적인 접근 유출 사례가 증가하고 있다. 현재의 개인정보 이용 환경은 데이터 접근 시 사용자의 질의 내용과 그에 대한 결과가 그대로 노출되어 사용자의 프라이버시를 침해하는 문제를 안고 있다. 본 논문에서는 데이터베이스에서 개인정보보호를 위해 접근제어 정책 기반 쿼리 처리시스템인 보안 게이트웨이를 설계하고 구현한다. 이 시스템은 클라이언트가 TDS 프로토콜을 이용하여 DBMS에 접근해 정보를 요청할 때 보안 정책을 반영함으로써 단순한 차단은 물론 변환된 쿼리 응답을 한다. 본 시스템은 불법적인 접근에 대한 제어는 물론이고, 정당한 인증자의 실수나 고의적인 개인정보 유출로 인한 경제적, 사회적 손실을 방지할 수 있다. 또한 주민등록번호 등 보안 대상 정보를 제외한 기타 정보에 대한 접근을 허용함으로써 데이터베이스 가용성을 보장한다.

Flexible USIM Authentication System for Next Generation Mobile Radio Communication Systems (차세대 이동통신 시스템에서 유동적 USIM 카드를 이용한 인증 시스템)

  • Choi, Dong-Wook;Hwang, Jae-Young;Chung, Yeon-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.11
    • /
    • pp.2340-2346
    • /
    • 2011
  • This paper presents a user-friendly authentication system using a flexible USIM. In the proposed method and its system, the flexible USIM utilizes personalized data such as Mobile Directory Number(MDN) and social security number as the key to user authentication. The authentication method proposed in this paper permits limited times of use and/or limited duration of use. A simple simulation model shows that the proposed algorithm works well and shows high compatibility with existing authentication methods. In addition, an alternative or more advanced authentication system can be developed with the proposed flexible USIM card. It is seen that this simple alternative method will eventually be able to make wireless communication networks more easily accessible for subscribers, irrespective of user environments.

Image Watermarking for Identification Forgery Prevention (신분증 위변조 방지를 위한 이미지 워터마킹)

  • Nah, Ji-Hah;Kim, Jong-Weon;Kim, Jae-Seok
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.12
    • /
    • pp.552-559
    • /
    • 2011
  • In this paper, a new image watermarking algorithm is proposed which can hide specific information of an ID card's owner in photo image for preventing ID's photo forgery. Proposed algorithm uses the image segmentation and the correlation peak position modulation of spread spectrum. The watermark embedded in photo ensures not only robustness against printing and scanning but also sufficient information capacity hiding unique number such as social security numbers in small-sized photo. Another advantage of proposed method is extracting accurate information with error tolerance within some rotation range by using $2^h{\times}2^w$ unit sample space not instead $1{\times}1$ pixels for insertion and extraction of information. 40 bits information can be embedded and extracted at $256{\times}256$ sized ID photo with BER value of 0 % when the test condition is 300dpi scanner and photo printer with 22 photos. In conclusion, proposed algorithm shows the robustness for noise and rotational errors occured during printing and scanning.

Attorney's Duty to Protect Personal Information (변호사의 개인정보 보호의무)

  • Hah, Jung Chul
    • Journal of Digital Convergence
    • /
    • v.12 no.7
    • /
    • pp.1-10
    • /
    • 2014
  • In February 2014 Korean Bar Association has amended Professional Ethics Code as to stipulate attorney's duty to protect personal information. While existing Korean law and Professional Ethics Code has made attorney to keep client's confidential information, attorney's newly promulgated obligation has its meaning in that personal information of subject other than client is not protected through confidentiality rules, given that confidentiality obligation is interpreted to protect only client's information relating to representation. Moreover, duty to protect personal information deals with not only disclosure and use of information, which confidentiality rules is about, but also collection and retention process, access to and correction and care of information and even destruction of information. Amid unprecedented theft of personal data in several national banks and other serious leakage reported recently, this paper is going to contemplate the scope and application of the duty to protect personal information with hope to contribute to starting discussion on it.