• Title/Summary/Keyword: Association ID

Search Result 206, Processing Time 0.021 seconds

Convenient User Authentication Mechanism Using only User Identification (사용자 ID만을 활용한 간편한 사용자 인증 방안)

  • Kim, Seon-Joo;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.11
    • /
    • pp.501-508
    • /
    • 2015
  • Most web sites, information systems use the ID/Password technique to identify and authenticate users. But ID/Password technique is vulnerable to security. The user must remember the ID/Password and, the password should include alphabets, numbers, and special characters, not to be predicted easily. User also needs to change your password periodically. In this paper, we propose the user authentication method that the user authentication information stored in the external storage to authenticate a user. If another person knows the ID/Password, he can't log in a system without the external storage. Whenever a user logs in a system, authentication information is generated, and is stored in the external storage. Therefore, the proposed user authentication method is the traditional ID/Password security technique, but it enhances security and, increases user convenience.

Factors Influencing Use of Medical Alert Identification in Diabetic Patients Using Insulin (인슐린을 사용하는 당뇨병 환자의 당뇨인식표에 대한 인식, 소지실태 및 소지의 영향 요인)

  • Kwon, Eun Kyung;Lee, Chang Kwan;Sim, Kang Hee
    • Journal of Korean Clinical Nursing Research
    • /
    • v.23 no.3
    • /
    • pp.312-320
    • /
    • 2017
  • Purpose: The aim of this study was to identify perception, use status and factors influencing use of medical alert identification (ID) in diabetic patients who are on insulin. Methods: A survey was conducted from December 2013 to April 2014 with 198 people who were asked to participate in the survey. Results: The medical alert ID perception score was 3.54 on a 5-point scale. Most of respondents (82.8%) knew about the medical alert ID, but only 23.2% of respondents wore a medical alert ID and only 43.5% of respondents always wore a medical alert ID. Perception and frequency of possession were positively correlated (r=.41, p<.001). The most influential factor for the possession of a medical alert ID was the perception of the medical alert ID (${\beta}=.41$, p<.001). The perception of the medical alert ID explained 17% of variance in possession of a medical alert ID. Conclusion: Most of diabetic patients who take insulin received education about hypoglycemia and knew about the medical alert ID, but only few of them wore a medical alert ID. Findings from this study indicate that perception is an important variable related to possession of a medical alert ID in this population.

User Authentication Mechanism based on Authentication Information using One-time Sessions (일회용 세션을 활용한 인증정보 기반의 사용자 인증 방안)

  • Park, Yeong Su;Lee, Byoung Yup
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.7
    • /
    • pp.421-426
    • /
    • 2019
  • Nowadays, various type of technologies are used for user authentication, such as knowledge based(ID/PW, etc.) authentication, biometric based(Iris/fingerprint/vein recognition) authentication, ownership based(OTP, security card, etc.) authentication. ID/PW authentication technology, a knowledge based authentication, despite the advantages of low in implementation and maintenance costs and being familiar to users, there are disadvantages of vulnerable to hacking attacks, Other authentication methods solve the vulnerability in ID/PW authentication technology, but they have high initial investment cost and maintenance cost and troublesome problem of reissuance. In this paper, we proposed to improve security and convenience over existing ID/PW based authentication technology, and to secure user authentication without restriction on the devices used for authentication.

LATERAL CEPHALOMETRIC ANALYSIS OF ASYMPTOMATIC VOLUNTEERS AND SYMPTOMATIC PATIENTS WITH TEMPOROMANDIBULAR INTERNAL DERANGEMENT (악관절 내장증 환자와 정상인의 두부방사선규격사진의 분석비교)

  • Shin, Sang-Hun;Park, Sung-Jin
    • Journal of the Korean Association of Oral and Maxillofacial Surgeons
    • /
    • v.25 no.4
    • /
    • pp.330-336
    • /
    • 1999
  • Study of dentofacial structure relationships relative to TMJ internal derangement is required to increase the predictability of TMJ internal derangement. But few studies have been reported. The purpose of this study is to reveal any correlation of dentofacial characteristics with TMJ internal derangement by lateral cephalometric analysis. Patients were devided into two groups. (1) Symptomatic patients with TMJ internal derangement (2) Asymptomatic volunteers with no TMJ internal derangement. Twenty symptomatic patients with TMJ internal derangement(7male, 13female) were selected from our clinic and had undergone a standarized clinical examination, panorama, transcranical view, TMJ tomography. Twenty asymptomatic volunteers(9male, 11female) were selected from our clinic with no pain, no limitation of motion. All subjects had undergone lateral cephalometric analysis. The results were obtained as follows. 1. No significant difference between ID and normal group is detected in cranial base. 2. Maxilla position of ID group is located more posterioly than normal group. 3. Mandible position of ID group is located more posteriorly than normal group and facial profile is hyperdivergent. 4. Posterior facial height of ID group is less than normal group thus facial profile is hyperdivergent. The patients, as mentioned, have a high prevalance of ID thus it should be careful in TMJ ID diagnosis and treatment.

  • PDF

Multi-Factor Authentication System based on Software Secure Card-on-Matching For Secure Login (안전한 로그인을 위한 소프트 보안카드 기반 다중 인증 시스템)

  • Lee, Hyung-Woo
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.3
    • /
    • pp.28-38
    • /
    • 2009
  • Login process uses both ID and password information to authenticate someone and to permit its access privilege on system. However, an attacker can get those ID and password information by using existing packet sniffing or key logger programs. It cause privacy problem as those information can be used as a hacking and network attack on web server and web e-mail system. Therefore, a more secure and advanced authentication mechanism should be required to enhance the authentication process on existing system. In this paper, we propose a multi-factor authentication process by using software form of secure card system combined with existing ID/Password based login system. Proposed mechanism uses a random number generated from the his/her own handset with biometric information. Therefore, we can provide a one-time password function on web login system to authenticate the user using multi-factor form. Proposed scheme provide enhanced authentication function and security because it is a 'multi-factor authentication mechanism' combined with handset and biometric information on web login system.

Design and Implementation of User Authentication System Using USIM Information (USIM 정보를 이용한 사용자 인증 방안 설계 및 구현)

  • Lee, Jin-Woo;Kim, Seon-Joo;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.7
    • /
    • pp.571-578
    • /
    • 2017
  • In order to approach information system through smart device and pc, user has to authenticate him or herself via user authentication. At that time when user tries reaching the system, well-used user authentication technologies are ID/PW base, OTP, certificate, security card, fingerprint, etc. The ID/PWbased method is familiar to users, however, it is vulnerable to brute force cracking, keylogging, dictionary attack. so as to protect these attacks, user has to change the passwords periodically as per password combination instructions. In this paper, we designed and implemented a user authentication system using smartphone's USIM without using password while enhancing security than existing ID / PW based authentication technology.

Secure ID-based Strong Designated Verifier Signature Scheme Against Key-compromise Attack (키 노출 공격에 안전한 ID-기반의 강한 지정된 검증자 서명 기법)

  • Lee, Ji-Seon;Chang, Jik-Hyun;Lee, Dong-Hoon
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.10
    • /
    • pp.59-66
    • /
    • 2009
  • A strong designated verifier signature scheme is a special type of signature scheme which provides signer anonymity by enabling the specified recipient, called a designated verifier, to simulate a signature which is indistinguishable from the signer's signature. It has many applications such as software distribution or electronic voting. In this paper, we consider two important security properties of strong designated verifier signature scheme - source hiding and security against key-compromise attack. We show that the two properties cannot be achieved at the same time. Finally, we present a new ID-based strong designated verifier signature scheme which is secure against key-compromise attack.

Efficient Beam-Training Technique for Millimeter-Wave Cellular Communications

  • Ku, Bon Woo;Han, Dae Gen;Cho, Yong Soo
    • ETRI Journal
    • /
    • v.38 no.1
    • /
    • pp.81-89
    • /
    • 2016
  • In this paper, a beam ID preamble (BIDP) technique, where a beam ID is transmitted in the physical layer, is proposed for efficient beam training in millimeter-wave cellular communication systems. To facilitate beam ID detection in a multicell environment with multiple beams, a BIDP is designed such that a beam ID is mapped onto a Zadoff-Chu sequence in association with its cell ID. By analyzing the correlation property of the BIDP, it is shown that multiple beams can be transmitted simultaneously with the proposed technique with minimal interbeam interference in a multicell environment, where beams have different time delays due to propagation delay or multipath channel delay. Through simulation with a spatial channel model, it is shown that the best beam pairs can be found with a significantly reduced processing time of beam training in the proposed technique.