• Title/Summary/Keyword: 1st Authentication

Search Result 9, Processing Time 0.025 seconds

A Dual Security Technique based on Beacon (비콘 기반의 이중 보안 기법)

  • Park, Sang-Min;Kim, Chul-Jin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.8
    • /
    • pp.311-317
    • /
    • 2016
  • Many services have been developed that are based on smart devices, and security between devices is emphasized. A beacon on the current IoT(Internet of Things) services has been utilized in the commercial field and is being applied to the services of the home IoT. On the other hand, the beacon is weak to security using Bluetooth-based services. Therefore, it is important to strengthen the security of the beacon. This paper proposes a dual security technique that can enhance the security of beacon-based services. The dual security architecture and security process is proposed based on beacon and authentication service. In addition, mobile application was developed and validated based on the beacon for proving the suitability of the proposed technique. The experimental method for verification are the authentication failure case, such as 1st authentication fail, and authentication success case, such as 1st authentication success and 2nd authentication success. The components of the verification experiments consists of two beacons (matched with Beacon ID, mismatched with Beacon ID), one mobile device and authentication application. This was tested to verify the compatibility of the dual security architecture and 1st/2nd authentication process.

Fingerprint Matching Algorithm using String-Based MHC Detector Set

  • Ko, Kwang-Eun;Cho, Young-Im;Sim, Kwee-Bo
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.7 no.2
    • /
    • pp.109-114
    • /
    • 2007
  • Fingerprints have been widely used in the biometric authentication because of its performance, uniqueness and universality. Lately, the speed of identification has become a very important aspect in the fingerprint-based security applications. Also, the reliability still remains the main issue in the fingerprint identification. A fast and reliable fingerprint matching algorithm based on the process of the 'self-nonself' discrimination in the biological immune system was proposed. The proposed algorithm is organized by two-matching stages. The 1st matching stage utilized the self-space and MHC detector string set that are generated from the information of the minutiae and the values of the directional field. The 2nd matching stage was made based on the local-structure of the minutiae. The proposed matching algorithm reduces matching time while maintaining the reliability of the matching algorithm.

The OAuth 2.0 Web Authorization Protocol for the Internet Addiction Bioinformatics (IABio) Database

  • Choi, Jeongseok;Kim, Jaekwon;Lee, Dong Kyun;Jang, Kwang Soo;Kim, Dai-Jin;Choi, In Young
    • Genomics & Informatics
    • /
    • v.14 no.1
    • /
    • pp.20-28
    • /
    • 2016
  • Internet addiction (IA) has become a widespread and problematic phenomenon as smart devices pervade society. Moreover, internet gaming disorder leads to increases in social expenditures for both individuals and nations alike. Although the prevention and treatment of IA are getting more important, the diagnosis of IA remains problematic. Understanding the neurobiological mechanism of behavioral addictions is essential for the development of specific and effective treatments. Although there are many databases related to other addictions, a database for IA has not been developed yet. In addition, bioinformatics databases, especially genetic databases, require a high level of security and should be designed based on medical information standards. In this respect, our study proposes the OAuth standard protocol for database access authorization. The proposed IA Bioinformatics (IABio) database system is based on internet user authentication, which is a guideline for medical information standards, and uses OAuth 2.0 for access control technology. This study designed and developed the system requirements and configuration. The OAuth 2.0 protocol is expected to establish the security of personal medical information and be applied to genomic research on IA.

Discrimination of Korean ginseng (Panax ginseng Meyer) cultivar Chunpoong and American ginseng (Panax quinquefolius) using the auxin repressed protein gene

  • Kim, Jong-Hak;Kim, Min-Kyeoung;Wang, Hongtao;Lee, Hee-Nyeong;Jin, Chi-Gyu;Kwon, Woo-Saeng;Yang, Deok-Chun
    • Journal of Ginseng Research
    • /
    • v.40 no.4
    • /
    • pp.395-399
    • /
    • 2016
  • Background: Korean ginseng (Panax ginseng) is one of the most important medicinal plants in the Orient. Among nine cultivars of P. ginseng, Chunpoong commands a much greater market value and has been planted widely in Korea. Chunpoong has superior quality "Chunsam" ($1^{st}$ grade ginseng) when made into red ginseng. Methods: A rapid and reliable method for discriminating the Chunpoong cultivar was developed by exploiting a single nucleotide polymorphism (SNP) in the auxin repressed protein gene of nine Korean ginseng cultivars using specific primers. Results: An SNP was detected between Chunpoong and other cultivars, and modified allele-specific primers were designed from this SNP site to specifically identify the Chunpoong cultivar and P. quinquefolius via multiplex polymerase chain reaction (PCR). Conclusion: These results suggest that great impact to prevent authentication of precise Chunpoong and other cultivars using the auxin repressed protein gene. We therefore present an effective method for the authentication of the Chunpoong cultivar of P. ginseng and P. quinquefolius.

Discrimination of Korean Domestic and Foreign Soybeans using Near Infrared Reflectance Spectroscopy (근적외선분광광도계(NIRS)를 이용한 국내산 콩과 수입콩의 판별분석)

  • Ahn, Hyung-Gyun;Kim, Yong-Ho
    • KOREAN JOURNAL OF CROP SCIENCE
    • /
    • v.57 no.3
    • /
    • pp.296-300
    • /
    • 2012
  • Discrimination of geographic origin of agricultural products is a important issue in Korea because the price difference between Korean domestic and imported cereals is a key among some reasons. NIRS (Near Infrared Reflectance Spectroscopy) has been applied to classify the geographical origin of soybeans. Total 135 samples (Korean domestic 92 and foreign 43) were used to obtain calibration equation through 400~2,500 nm wavelength. The math treatment with 1st derivative and 4 nm gap and the modified partial least squares(MPLS)regression was outstanding for calibration equation. The standard error of calibration and determination coefficient in calibration set(n=115) was 6.65 and 0.98, respectively. And it showed that the extra 20 samples for validation equation were identified their authentication correctly. This study describes that the application of NIRS would be possible for discrimination of geographical origin between Korean domestic and imported soybeans.

Fingerprint Matching Algorithm using MHC Detector Set of String Structure (스트링 구조의 MHC 인식부를 이용한 지문 매칭알고리즘)

  • Sim, Kwee-Bo;Jeong, Jae-Won;Lee, Dong-Wook
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.14 no.3
    • /
    • pp.279-284
    • /
    • 2004
  • Fingerprints have been widely used in the biometric authentication because of its performance, uniqueness and universality. Recently, the speed of identification becomes a very important point in the fingerprint-based security applications. Also, the reliability still remains the main issue in the fingerprint identification. In this paper, we propose the fast and reliable fingerprint matching algorithm based on the process of the 'self-nonself' discrimination in the biological immune system. The proposed algorithm is organized by two-matching stage. The 1st matching stage does the matching process by the use of the 'self-space' and MHC detector string set that are generated from the minutiae and the values of the directional field. Then the 2nd matching stage is made based on the local-structure of the minutiae. The proposed two matching stage reduces matching time while the reliability of the matching algorithm is maintained.

A Study on Countermeasures using Moire Recognition and Vulnerability of Cryptographic Transaction Protocol (암호화폐 거래 프로토콜의 취약점과 무아레 인식을 이용한 대응방안에 관한 연구)

  • Kim, Jin-Woo;Lee, Keun-Ho;Yun, Sunghyun
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.1
    • /
    • pp.86-91
    • /
    • 2019
  • Block chains began by recognizing the danger of centralized control of financial systems after the 2008 financial crisis. From the beginning of 2008, blockchain has been developing a lot of attention and technology, starting with a tremendous innovation called cryptographic destruction based on technology, a block chain called Bitcoin. However, the vulnerability has also been discovered over time and the damage has been repeated. But in the fourth industry of the 21st century, many advances and technologies based on them are expected to emerge. Therefore, this paper proposes new analytical transaction protocols for vulnerabilities in cryptographic currency transactions. The proposed transaction protocol is a way to authenticate once again at the end of the transaction and the transaction is concluded with this authentication. It presents countermeasures by adding security elements between users to the transaction process rather than internal security to transaction vulnerabilities.

Investigation of the level difference of floor impact noises through the shape variation of EVA resilient materials with composite floor structure (EVA 완충재의 형상변환을 통한 복합구조의 바닥충격음 변이 조사)

  • Jakin Lee;Seung-Min Lee;Chan-Hoon Haan
    • The Journal of the Acoustical Society of Korea
    • /
    • v.43 no.1
    • /
    • pp.60-71
    • /
    • 2024
  • The present study aims to investigate the level difference of floor impact noises of composite floor structure using EVA resilient materials. In order to this, four different types of resilient materials were designed combining PET, PP sheet and EVA mount including Flat type, Deck type, Cavity type and Mount type. Totally 9 different samples were made for acoustic measurements which were carried out twice with bang-machine and impact ball as the heavy-weight floor impact noise sources. All the floor impact noise measurements were undertaken at the authentication institution. As a result, concerning Flat and Cavity types, it was found that 2 dB ~ 5 dB of heavy-weight floor impact noise was reduced supplementally when PET was added, while floor impact noise larger than 50 dB was acquired when single resilient material was used. Especially, most high performance was obtained for Mount type with 1st grade of light-weight floor impact noise and 2nd grade of heavy-weight floor impact noise. This is because of material property with low dense PET sound absorption materials which fill all around EVA mounts. Also, it was considered that this results are due to the sound impact absorption by the both EVA mounts and the air cavity between EVA mount and PP sheet. Also, it was found that at least 36 EVA mounts per 1m2 area of resilient panel make more noise reduction of heavy-weight floor impact noises.

A Study on Combustion Characteristics in terms of the Type of Fuel Supply Device (Feeder) of a Wood Pellet Boiler (목재펠릿보일러의 연료공급 장치의 형태에 따른 연소특성에 관한 연구)

  • Choi, Yun Sung;Euh, Seung Hee;Oh, Kwang Cheol;Kim, Dae Hyun;Oh, Jae Heun
    • Journal of Energy Engineering
    • /
    • v.24 no.2
    • /
    • pp.120-128
    • /
    • 2015
  • This study reports the combustion characteristics, such as burner temperature and the concentration of exhausted gas ($O_2$, $CO_x$, $NO_x$) due to the different types and pitches of the fuel supply feeder of the wood pellet boiler. The 1st grade wood pellets composed of mainly larch have been used for the experiment. In case of using the spring feeder, mean temperature of burner was approximately $821.76^{\circ}C$, and the mean concentration of oxygen, carbon monoxide, carbon dioxide and nitrogen oxide were approximately 8.88%, 93.35ppm, 12.15% and 139.83 ppm, respectively. The test result with the spring feeder was shown to approach the condition of complete combustion compared to that of a screw feeder and were in good agreement with authentication judgement standard. Furthermore, the combustion efficiency was improved according to the growth of screw pitch. The control of air flow rate from the blower and ventilator is needed to achieve the complete combustion.