• Title/Summary/Keyword: Access Security System

Search Result 1,039, Processing Time 0.028 seconds

A Fast Iris Feature Extraction Method For Embedded System (Embedded 시스템을 위한 고속의 홍채특징 추출 방법)

  • Choi, Chang-Soo;Min, Man-Gi;Jun, Byoung-Min
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.1
    • /
    • pp.128-134
    • /
    • 2009
  • Iris recognition is a biometric technology which can identify a person using the iris pattern. Recently, using iris information is used in many fields such as access control and information security. But Perform complex operations to extract features of the iris. because High-end hardware for real-time iris recognition is required. This paper is appropriate for the embedded environment using local gradient histogram embedded system using iris feature extraction methods have implement. Experimental results show that the performance of proposed method is comparable to existing methods using Gabor transform noticeably improves recognition performance and it is noted that the processing time of the local gradient histogram transform is much faster than that of the existing method and rotation was also a strong attribute.

Development of Outage Data Management System to Calculate the Probability for KEPCO Transmission Systems (한전계통의 송전망 고장확률 산정을 위한 상정고장 DB 관리시스텀(ezCas) 개발)

  • Cha S. T.;Jeon D. H.;Kim T. K.;Jeon M. R.;Choo J. B.;Kim J. O.;Lee S .H
    • Proceedings of the KIEE Conference
    • /
    • summer
    • /
    • pp.88-90
    • /
    • 2004
  • Data are a critical utility asset. Collecting correct data on site leads to accurate information. Data, when gathered with foresight & properly formatted, are useful to both existing database and easily transferable to newer, more comprehensive historical outage data. However, when investigating data items options, the task, can be an arduous one, often requiring the efforts of entire committees. This paper firstly discusses the KEPCO's past 10 years of historical outage data which include meterological data, and also by several elements of the National Weather Service, failure rate, outage duration, and probability classification, etc. Then, these collected data are automatically stored in an Outage Data Management System (ODMS), which allows for easy access and display. ODMS has a straight-forward and easy-to-use interface. It lets you to navigate through modules very easily and allows insertion, deletion or editing of data. In particular, this will further provide the KEPCO that not only helps with probabilistic security assessment but also provides a platform for future development of Probability Estimation Program (PEP).

  • PDF

Shuffling of Elliptic Curve Cryptography Key on Device Payment

  • Kennedy, Chinyere Grace;Cho, Dongsub
    • Journal of Korea Multimedia Society
    • /
    • v.22 no.4
    • /
    • pp.463-471
    • /
    • 2019
  • The growth of mobile technology particularly smartphone applications such as ticketing, access control, and making payments are on the increase. Elliptic Curve Cryptography (ECC)-based systems have also become widely available in the market offering various convenient services by bringing smartphones in proximity to ECC-enabled objects. When a system user attempts to establish a connection, the AIK sends hashes to a server that then verifies the values. ECC can be used with various operating systems in conjunction with other technologies such as biometric verification systems, smart cards, anti-virus programs, and firewalls. The use of Elliptic-curve cryptography ensures efficient verification and signing of security status verification reports which allows the system to take advantage of Trusted Computing Technologies. This paper proposes a device payment method based on ECC and Shuffling based on distributed key exchange. Our study focuses on the secure and efficient implementation of ECC in payment device. This novel approach is well secure against intruders and will prevent the unauthorized extraction of information from communication. It converts plaintext into ASCII value that leads to the point of curve, then after, it performs shuffling to encrypt and decrypt the data to generate secret shared key used by both sender and receiver.

A Security SoC embedded with ECDSA Hardware Accelerator (ECDSA 하드웨어 가속기가 내장된 보안 SoC)

  • Jeong, Young-Su;Kim, Min-Ju;Shin, Kyung-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.7
    • /
    • pp.1071-1077
    • /
    • 2022
  • A security SoC that can be used to implement elliptic curve cryptography (ECC) based public-key infrastructures was designed. The security SoC has an architecture in which a hardware accelerator for the elliptic curve digital signature algorithm (ECDSA) is interfaced with the Cortex-A53 CPU using the AXI4-Lite bus. The ECDSA hardware accelerator, which consists of a high-performance ECC processor, a SHA3 hash core, a true random number generator (TRNG), a modular multiplier, BRAM, and control FSM, was designed to perform the high-performance computation of ECDSA signature generation and signature verification with minimal CPU control. The security SoC was implemented in the Zynq UltraScale+ MPSoC device to perform hardware-software co-verification, and it was evaluated that the ECDSA signature generation or signature verification can be achieved about 1,000 times per second at a clock frequency of 150 MHz. The ECDSA hardware accelerator was implemented using hardware resources of 74,630 LUTs, 23,356 flip-flops, 32kb BRAM, and 36 DSP blocks.

A Study on the Importance of Measures for Improving PLM System Usage (PLM 시스템 활용도 향상 방안의 중요도에 관한 연구)

  • Yoo, Jong Kwang;Rim, Seong Taek;Min, Dai Hwan
    • The Journal of Information Systems
    • /
    • v.31 no.1
    • /
    • pp.239-269
    • /
    • 2022
  • Purpose This paper attempts to identify items for improving the usage of PLM(Product Lifecycle Management) systems and suggests ways to prioritize improvement items on the basis of importance. It also tries to find out differences in the importance of improvement items due to the company size, the industry, the job, or the PLM solution. Design/methodology/approach Through a survey from participants to a PLM System Conference, data were collected from a sample of 181 users who had the previous experience in using a PLM system. In order to figure out the differences in the importance among user groups, the F-test with the Scheffe test as a post-hoc analysis was used in case of equal variances and the Welch test with the Dunnett T3 test was used in case of unequal variances. Findings This study sorted out 25 improvement ideas according to their importance assessed by the PLM system users. The top five ideas are improving data consistency, error minimization, fast system response time, enhancing user recognition, and business process improvement. The support group puts higher importance than the general user group in data consistency, fast system response time, enhancing user recognition, business process improvement, dedicated team for data consistency, continuous support from management, hardware performance upgrade, output linkage to other systems, and shortening problem solving duration. The largest company group attaches significantly higher weights than the smallest company group to data consistency, error minimization, fast system response time, business process improvement, dedicated team for data consistency, security with proper access management, output linkage to other systems, and better user interface.

Multi User-Authentication System using One Time-Pseudo Random Number and Personal DNA STR Information in RFID Smart Card (RFID 스마트카드내 DNA STR Information과 일회용 의사난수를 사용한 다중 사용자 인증시스템)

  • Sung, Soon-Hwa;Kong, Eun-Bae
    • The KIPS Transactions:PartC
    • /
    • v.10C no.6
    • /
    • pp.747-754
    • /
    • 2003
  • Thia paper suggests a milti user-authentication system comprises that DNA biometric informatiom, owner's RFID(Radio Frequency Identification) smartcard of hardware token, and PKI digital signqture of software. This system improved items proposed in [1] as follows : this mechanism provides one RFID smartcard instead of two user-authentication smartcard(the biometric registered seal card and the DNA personal ID card), and solbers user information exposure as RFID of low proce when the card is lost. In addition, this can be perfect multi user-autentication system to enable identification even in cases such as identical twins, the DNA collected from the blood of patient who has undergone a medical procedure involving blood replacement and the DNA of the blood donor, mutation in the DNA base of cancer cells and other cells. Therefore, the proposed system is applied to terminal log-on with RFID smart card that stores accurate digital DNA biometric information instead of present biometric user-authentication system with the card is lost, which doesn't expose any personal DNA information. The security of PKI digital signature private key can be improved because secure pseudo random number generator can generate infinite one-time pseudo randon number corresponding to a user ID to keep private key of PKI digital signature securely whenever authenticated users access a system. Un addition, this user-authentication system can be used in credit card, resident card, passport, etc. acceletating the use of biometric RFID smart' card. The security of proposed system is shown by statistical anaysis.

A Study on Analysis of Collaborative Governance in the Process of Local Government Co-evaluation Based on Virtual Policy Studio (지방행정 평가정보 시스템을 활용한 지방자치단체 합동평가 과정의 협력적 거버넌스 분석에 관한 연구)

  • Mun, Young Hoon
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.3
    • /
    • pp.191-201
    • /
    • 2010
  • The Korean central government has been investing a lot of efforts to promote performance of local governments. For example, the Ministry of Public Administration and Security (MOPAS) supported the local governments to develop and provide with a 'balanced score card' and a 'customer satisfaction innovation. ' Many other central ministries also conducted individual evaluations for local governments in their substantive policy areas. These evaluation systems of 78 appraisals for local governments conducted by the MOPAS and other ministries had made the local governments to work harder. However, most local governments have appealed their 'reform fatigue' caused by the overlapping evaluation systems. In this context, the MOPAS initiated merging the evaluations into a co-evaluation system under the new Government Performance Evaluation Act of 2006. In this process of introduction of new evaluation system, there are two significant movements. Firstly, as Korean Government has strong information technology, MOPAS has developed 'Virtual Policy Studio (VPS)' which evaluates the performance of each local government with on line. In other words, in the co-evaluation system for local government performance most evaluation steps are implemented by computer and Internet. So most stakeholder can access and work on the VPS in real time when they want to. And the other thing is that cooperation among stakeholders has been occurred in the co-evaluation system. Furthurmore the cooperative governance is systemized and sustain for a long time because MOPAS made IT based co-evaluation system. Therefore this paper intends to illustrate the process of introduction of VPS, main process of co-evaluation system based on VPS and analyze collaborative governance of the co-evaluation system.

A Design of Internet-Based Safety Guarantee Global Integrated Logistics Management System Framework (인터넷 기반의 안전보장 글로벌 통합물류관리시스템 프레임워크 설계)

  • Hong, Ho-Seon;Hong, Ki-Sung;Lee, Chulung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.5
    • /
    • pp.103-111
    • /
    • 2013
  • This paper provide a framework for an IGILMS(internet-based global integrated logistics management system) which can access and mediate cargo transportations among small- and medium-sized domestic/international logistics corporations as regards cargo, registration and search for space, public tender and negotiation, contract, payment and safety-guarantee, transportation through the internet, wireless communication means, or smart phone etc. In addition, we describe a model to provide customized services in the B2B e-market for IGILMS and the structure and the control of its fulfillment process, and provide technical architecture of the IGILMS for an internet-based global logistics management system. To validate an efficiency of the proposed system, we develop a simulation model and analyze the performance of the proposed system.

A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues (사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰)

  • Han, Hee-Won
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.319-353
    • /
    • 2014
  • Cyber-based technologies are now ubiquitous around the glob and are emerging as an "instrument of power" in societies, and are becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. The globe-spanning range of cyberspace and no national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies. Through cyberspace, competitive powers will target industry, academia, government, as well as the military in the air, land, maritime, and space domains of our nations. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Cyberthreats to the infrastructure and other assets are a growing concern to policymakers. In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities posing a significant threat to the cybersecurity of critical infrastructure assets include cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists. These malefactors may access cyber-based technologies in order to deny service, steal or manipulate data, or use a device to launch an attack against itself or another piece of equipment. However because the Internet offers near-total anonymity, it is difficult to discern the identity, the motives, and the location of an intruder. The scope and enormity of the threats are not just focused to private industry but also to the country's heavily networked critical infrastructure. There are many ongoing efforts in government and industry that focus on making computers, the Internet, and related technologies more secure. As the national intelligence institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. However one of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable". Considering all these cyber security problems, this paper examines closely cyber security issues through the lessons from that of U.S experience. For that purpose I review the arising cyber security issues considering changing global security environments in the 21st century and their implications to the reshaping the government system. For that purpose this study mainly deals with and emphasis the cyber security issues as one of the growing national security threats. This article also reviews what our intelligence and security Agencies should do among the transforming cyber space. At any rate, despite of all hot debates about the various legality and human rights issues derived from the cyber space and intelligence service activity, the national security should be secured. Therefore, this paper suggests that one of the most important and immediate step is to understanding the legal ideology of national security and national intelligence.

  • PDF

A Study on the Application of the Cyber Threat Management System to the Future C4I System Based on Big Data/Cloud (빅데이터/클라우드 기반 미래 C4I체계 사이버위협 관리체계 적용 방안 연구)

  • Park, Sangjun;Kang, Jungho
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.27-34
    • /
    • 2020
  • Recently, the fourth industrial revolution technology has not only changed everyday life greatly through technological development, but has also become a major keyword in the establishment of defense policy. In particular, Internet of Things, cloud, big data, mobile and cybersecurity technologies, called ICBMS, were selected as core leading technologies in defense information policy along with artificial intelligence. Amid the growing importance of the fourth industrial revolution technology, research is being carried out to develop the C4I system, which is currently operated separately by the Joint Chiefs of Staff and each military, including the KJCCS, ATCIS, KNCCS and AFCCS, into an integrated system in preparation for future warfare. This is to solve the problem of reduced interoperability for joint operations, such as information exchange, by operating the C4I system for each domain. In addition, systems such as the establishment of an integrated C4I system and the U.S. military's Risk Management Framework (RMF) are essential for efficient control and safe operation of weapons systems as they are being developed into super-connected and super-intelligent systems. Therefore, in this paper, the intelligent cyber threat detection, management of users' access to information, and intelligent management and visualization of cyber threat are presented in the future C4I system based on big data/cloud.