• Title/Summary/Keyword: 2nd Authentication

Search Result 5, Processing Time 0.019 seconds

A Dual Security Technique based on Beacon (비콘 기반의 이중 보안 기법)

  • Park, Sang-Min;Kim, Chul-Jin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.8
    • /
    • pp.311-317
    • /
    • 2016
  • Many services have been developed that are based on smart devices, and security between devices is emphasized. A beacon on the current IoT(Internet of Things) services has been utilized in the commercial field and is being applied to the services of the home IoT. On the other hand, the beacon is weak to security using Bluetooth-based services. Therefore, it is important to strengthen the security of the beacon. This paper proposes a dual security technique that can enhance the security of beacon-based services. The dual security architecture and security process is proposed based on beacon and authentication service. In addition, mobile application was developed and validated based on the beacon for proving the suitability of the proposed technique. The experimental method for verification are the authentication failure case, such as 1st authentication fail, and authentication success case, such as 1st authentication success and 2nd authentication success. The components of the verification experiments consists of two beacons (matched with Beacon ID, mismatched with Beacon ID), one mobile device and authentication application. This was tested to verify the compatibility of the dual security architecture and 1st/2nd authentication process.

Fingerprint Matching Algorithm using String-Based MHC Detector Set

  • Ko, Kwang-Eun;Cho, Young-Im;Sim, Kwee-Bo
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.7 no.2
    • /
    • pp.109-114
    • /
    • 2007
  • Fingerprints have been widely used in the biometric authentication because of its performance, uniqueness and universality. Lately, the speed of identification has become a very important aspect in the fingerprint-based security applications. Also, the reliability still remains the main issue in the fingerprint identification. A fast and reliable fingerprint matching algorithm based on the process of the 'self-nonself' discrimination in the biological immune system was proposed. The proposed algorithm is organized by two-matching stages. The 1st matching stage utilized the self-space and MHC detector string set that are generated from the information of the minutiae and the values of the directional field. The 2nd matching stage was made based on the local-structure of the minutiae. The proposed matching algorithm reduces matching time while maintaining the reliability of the matching algorithm.

Fingerprint Matching Algorithm using MHC Detector Set of String Structure (스트링 구조의 MHC 인식부를 이용한 지문 매칭알고리즘)

  • Sim, Kwee-Bo;Jeong, Jae-Won;Lee, Dong-Wook
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.14 no.3
    • /
    • pp.279-284
    • /
    • 2004
  • Fingerprints have been widely used in the biometric authentication because of its performance, uniqueness and universality. Recently, the speed of identification becomes a very important point in the fingerprint-based security applications. Also, the reliability still remains the main issue in the fingerprint identification. In this paper, we propose the fast and reliable fingerprint matching algorithm based on the process of the 'self-nonself' discrimination in the biological immune system. The proposed algorithm is organized by two-matching stage. The 1st matching stage does the matching process by the use of the 'self-space' and MHC detector string set that are generated from the minutiae and the values of the directional field. Then the 2nd matching stage is made based on the local-structure of the minutiae. The proposed two matching stage reduces matching time while the reliability of the matching algorithm is maintained.

Network based Anomaly Intrusion Detection using Bayesian Network Techniques (네트워크 서비스별 이상 탐지를 위한 베이지안 네트워크 기법의 정상 행위 프로파일링)

  • Cha ByungRae;Park KyoungWoo;Seo JaeHyun
    • Journal of Internet Computing and Services
    • /
    • v.6 no.1
    • /
    • pp.27-38
    • /
    • 2005
  • Recently, the rapidly development of computing environments and the spread of Internet make possible to obtain and use of information easily. Immediately, by opposition function the Hacker's unlawful intrusion and threats rise for network environments as time goes on. Specially, the internet consists of Unix and TCP/IP had many vulnerability. the security techniques of authentication and access controls cannot adequate to solve security problem, thus IDS developed with 2nd defence line. In this paper, intrusion detection method using Bayesian Networks estimated probability values of behavior contexts based on Bayes theory. The contexts of behaviors or events represents Bayesian Networks of graphic types. We profiled concisely normal behaviors using behavior context. And this method be able to detect new intrusions or modificated intrusions. We had simulation using DARPA 2000 Intrusion Data.

  • PDF

Investigation of the level difference of floor impact noises through the shape variation of EVA resilient materials with composite floor structure (EVA 완충재의 형상변환을 통한 복합구조의 바닥충격음 변이 조사)

  • Jakin Lee;Seung-Min Lee;Chan-Hoon Haan
    • The Journal of the Acoustical Society of Korea
    • /
    • v.43 no.1
    • /
    • pp.60-71
    • /
    • 2024
  • The present study aims to investigate the level difference of floor impact noises of composite floor structure using EVA resilient materials. In order to this, four different types of resilient materials were designed combining PET, PP sheet and EVA mount including Flat type, Deck type, Cavity type and Mount type. Totally 9 different samples were made for acoustic measurements which were carried out twice with bang-machine and impact ball as the heavy-weight floor impact noise sources. All the floor impact noise measurements were undertaken at the authentication institution. As a result, concerning Flat and Cavity types, it was found that 2 dB ~ 5 dB of heavy-weight floor impact noise was reduced supplementally when PET was added, while floor impact noise larger than 50 dB was acquired when single resilient material was used. Especially, most high performance was obtained for Mount type with 1st grade of light-weight floor impact noise and 2nd grade of heavy-weight floor impact noise. This is because of material property with low dense PET sound absorption materials which fill all around EVA mounts. Also, it was considered that this results are due to the sound impact absorption by the both EVA mounts and the air cavity between EVA mount and PP sheet. Also, it was found that at least 36 EVA mounts per 1m2 area of resilient panel make more noise reduction of heavy-weight floor impact noises.