• Title/Summary/Keyword: Authorization System

Search Result 240, Processing Time 0.025 seconds

The secured mobile wallet system using by integrated ID (통합 아이디를 이용한 안전한 모바일 월렛 시스템)

  • Nam, Choon-Sung;Jeon, Min-Kyung;Shin, Dong-Ryeol
    • Journal of Internet Computing and Services
    • /
    • v.16 no.1
    • /
    • pp.9-20
    • /
    • 2015
  • Nowadays, Smart Wallet technology trend that is able to save users' consuming costs and also retain users' redundant behaviors such as Single-tapping, One-way communication, Integrated ID, has been issued in recent Mobile Industrial Fields. As one of Smart Wallet functions, Integrated ID is proposed for users' convenience, handiness, and immediate responses. It is designed for the effective management of users' IDs which are easy to be forgot because of its unusual structures. To be detail, instead of user, Integrated ID system can certificate users identification from various online sites (where user resisted) authorization requests via one-clicking, not putting identification data in each sites. So, this technology would be helpful much to a certain user who has lots ID and its Password in multiple Online shopping companies by establishing integrated ID. However, although Integrated ID has lots advantages to be used, most Mobile Service Companies has hesitated to apply Integrated ID service in their shopping systems because this technology requires them sharing their users' data. They have worried that this service would be not helpful to gain their profits. Furthermore, Users who join in multiple shopping companies and use Integrated ID services also are difficult to decide which company they have to save their points in before payment because this system could not show any financial benefit analysis data to their users. As following facts, via this paper majorly we propose the advanced Integrated ID system which concern shopping point management. Basically, this system has a strong security payment service and secure network services like other mobile Shopping systems. Additionally, this system is able to service (or to support) shopping -point -saving guide for customers' financial benefits and conveniences.

Development of the High_frequency and Low_strain Vibration Stimulation System for Stimulating Bone (고주파 저스트레인 골자극 인가용 진동 시스템 개발)

  • Yoo, Ju-Yeon;Park, Guen-Chul;Jeon, Ah-Young;Kim, Yun-Jin;Ro, Jung-Hoon;Jeon, Gye-Rok
    • Journal of Biomedical Engineering Research
    • /
    • v.32 no.2
    • /
    • pp.177-184
    • /
    • 2011
  • In this study, the system for application of the bone stimulation was implemented using high frequency and low strain method. The whole system consists of the high frequency and low strain vibration stimulation system 177 for stimulating bone, LVDT sensor, and wireless sensor based on tri-axial accelerometer. To evaluate the usefulness of the system, the frequencies and accelerations from function generator were applied to the vibration stimulation system. The range of frequency was 17 Hz, 30 Hz, 45 Hz, 50 Hz and the range of acceleration was set 0.3 g, 0.6 g, 1g, and 2 g. The measured frequencies and acceleration using LVDT (linear variable difference transformer) sensor and 3-axial accelerometer were estimated and compared. The range of frequencies average difference was from 0.0 to 0.004 Hz. As the standard deviation of frequencies estimated by LVDT sensor and accelerometer was below 0.03 Hz and the output frequencies of function generator were similar: Also the results of t-test were satisfied with conditions of p > 0.05. And the acquired frequencies and acceleration from vibration measuring device module were estimated and analyzed. As the mean of accelerations was similar to the acceleration applied from function generator. And the standard deviation of acceleration estimated from vibration measuring device module was ranged from 0.019 g to 0.038 g. Also the results of t-test were satisfied with conditions of p > 0.05. Therefore, these results were airy similar to the acceleration applied from function generator. As a result, the usefulness of the system was confirmed. n a further study, clinical experiment will be carried out with the authorization of IRB (institutional review board) so that appropriate frequency and strain would be investigated in clinical field.

Development of Identity-Provider Discovery System leveraging Geolocation Information (위치정보 기반 식별정보제공자 탐색시스템의 개발)

  • Jo, Jinyong;Jang, Heejin;Kong, JongUk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.9
    • /
    • pp.1777-1787
    • /
    • 2017
  • Federated authentication (FA) is a multi-domain authentication and authorization infrastructure that enables users to access nationwide R&D resources with their home-organizational accounts. An FA-enabled user is redirected to his/her home organization, after selecting the home from an identity-provider (IdP) discovery service, to log in. The discovery service allows a user to search his/her home from all FA-enabled organizations. Users get troubles to find their home as federation size increases. Therefore, a discovery service has to provide an intuitive way to make a fast IdP selection. In this paper, we propose a discovery system which leverages geographical information. The proposed system calculates geographical proximity and text similarity between a user and organizations, which determines the order of organizations shown on the system. We also introduce a server redundancy and a status monitoring method for non-stop service provision and improved federation management. Finally, we deployed the proposed system in a real service environment and verified the feasibility of the system.

Medical Information Dynamic Access System in Smart Mobile Environments (스마트 모바일 환경에서 의료정보 동적접근 시스템)

  • Jeong, Chang Won;Kim, Woo Hong;Yoon, Kwon Ha;Joo, Su Chong
    • Journal of Internet Computing and Services
    • /
    • v.16 no.1
    • /
    • pp.47-55
    • /
    • 2015
  • Recently, the environment of a hospital information system is a trend to combine various SMART technologies. Accordingly, various smart devices, such as a smart phone, Tablet PC is utilized in the medical information system. Also, these environments consist of various applications executing on heterogeneous sensors, devices, systems and networks. In these hospital information system environment, applying a security service by traditional access control method cause a problems. Most of the existing security system uses the access control list structure. It is only permitted access defined by an access control matrix such as client name, service object method name. The major problem with the static approach cannot quickly adapt to changed situations. Hence, we needs to new security mechanisms which provides more flexible and can be easily adapted to various environments with very different security requirements. In addition, for addressing the changing of service medical treatment of the patient, the researching is needed. In this paper, we suggest a dynamic approach to medical information systems in smart mobile environments. We focus on how to access medical information systems according to dynamic access control methods based on the existence of the hospital's information system environments. The physical environments consist of a mobile x-ray imaging devices, dedicated mobile/general smart devices, PACS, EMR server and authorization server. The software environment was developed based on the .Net Framework for synchronization and monitoring services based on mobile X-ray imaging equipment Windows7 OS. And dedicated a smart device application, we implemented a dynamic access services through JSP and Java SDK is based on the Android OS. PACS and mobile X-ray image devices in hospital, medical information between the dedicated smart devices are based on the DICOM medical image standard information. In addition, EMR information is based on H7. In order to providing dynamic access control service, we classify the context of the patients according to conditions of bio-information such as oxygen saturation, heart rate, BP and body temperature etc. It shows event trace diagrams which divided into two parts like general situation, emergency situation. And, we designed the dynamic approach of the medical care information by authentication method. The authentication Information are contained ID/PWD, the roles, position and working hours, emergency certification codes for emergency patients. General situations of dynamic access control method may have access to medical information by the value of the authentication information. In the case of an emergency, was to have access to medical information by an emergency code, without the authentication information. And, we constructed the medical information integration database scheme that is consist medical information, patient, medical staff and medical image information according to medical information standards.y Finally, we show the usefulness of the dynamic access application service based on the smart devices for execution results of the proposed system according to patient contexts such as general and emergency situation. Especially, the proposed systems are providing effective medical information services with smart devices in emergency situation by dynamic access control methods. As results, we expect the proposed systems to be useful for u-hospital information systems and services.

The Influences of a Team System's Introduction to Hospital Organization, Regarding Job Satisfaction and Organization Commitment (병원조직에 팀제 도입이 팀직무만족과 팀조직 몰입에 미치는 영향)

  • Choi, Soon-Yeon;Nam, Eun-Woo
    • Korea Journal of Hospital Management
    • /
    • v.5 no.1
    • /
    • pp.232-271
    • /
    • 2000
  • The introduction of a team system to any organization is usually to improve that organizations dynamics, by increasing the proper adaptation to rapidly changing environments, by reducing approval procedures, and by promoting power authorization. In this regard, this study was carried out in an attempt to determine (1) whether or not the introduction of a team system can be as effective in hospital organizations as it has been in business organizations, and (2) what behavior factors influence such effectiveness. For the current study, questionnaires were distributed to the employees of a university hospital in Pusan. Four hundred eighty three of them(94.7%) were retrieved and analyzed through statistical processes. The three types of variables that were found to influence team effectiveness were: (1) independent variables of team organization characteristics, such as communication, organizational atmosphere, leadership and team knowledge, (2) intervening variables of team organization characteristics. such as job autonomy, technological variety, task subjectivity, task feedback and task importance, and(3) the dependent variables of team level effectiveness, such as job satisfaction and commitment to team organization. The gathered data were processed by using the 6.12 version of the statistical program SAS(Statistical Analysis System), and the reliance coefficient of those measured variables was then evaluated as an average of 0.78. The influence of team level effectiveness was analyzed by using multiple regression analysis. These differences in effectiveness were then analyzed on the basis of related mean values, while the differences among demo-sociological characteristics were analyzed by using the dispersion analysis(ANOVA) and the t-test. The results of the study can be summarized by the following. First, regarding the relationship between team organization characteristics and team level effectiveness, all of the factors including communication, organizational atmosphere, leadership and team knowledge were found to have a significant influence on effectiveness. Second, the factors of team job characteristics, such as technological variety, task importance and job autonomy, had significant effects on job satisfaction and organizational commitment among the teams members. Team level effectiveness was generally high, while team job satisfaction was higher the teams organizational commitment. Third, regarding the demo-sociological characteristics, team level effectiveness was found to be higher among those who were older, who had more job experience, and who had a higher position. Comparing the differences among job types, the effectiveness was relatively higher in the fields of nursing and administration/management then in other fields. Further study should be done towards the setting of variables for characteristics of hospital organization, developing suitable methods of measurement, and researching individual level effectiveness.

  • PDF

Design and Implementation of Blockchain Network Based on Domain Name System (블록체인 네트워크 기반의 도메인 네임 시스템 설계 및 구현)

  • Heo, Jae-Wook;Kim, Jeong-Ho;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.5
    • /
    • pp.36-46
    • /
    • 2019
  • The number of hosts connected to the Internet has increased dramatically, introducing the Domain Name System(DNS) in 1984. DNS is now an important key point for all users of the Internet by allowing them to use a convenient character address without memorizing a series of numbers of complex IP address. However, relative to the importance of DNS, there still exist many problems such as the authorization allocation issue, the disputes over public registration, security vulnerability such as DNS cache poisoning, DNS spoofing, man-in-the-middle attack, DNS amplification attack, and the need for many domain names in the age of hyper-connected networks. In this paper, to effectively improve these problems of existing DNS, we proposed a method of implementing DNS using distributed ledger technology, blockchain, and implemented using a Ethereum-based platform. In addition, the qualitative analysis performance comparative evaluation of the existing domain name registration and domain name server was conducted, and conducted security assessments on the proposed system to improve security problem of existing DNS. In conclusion, it was shown that DNS services could be provided high security and high efficiently using blockchain.

Rule-base Expert System for Privacy Violation Certainty Estimation (개인정보유출 확신도 도출을 위한 전문가시스템개발)

  • Kim, Jin-Hyung;Lee, Alexander;Kim, Hyung-Jong;Hwang, Jun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.4
    • /
    • pp.125-135
    • /
    • 2009
  • Logs from various security system can reveal the attack trials for accessing private data without authorization. The logs can be a kind of confidence deriving factors that a certain IP address is involved in the trial. This paper presents a rule-based expert system for derivation of privacy violation confidence using various security systems. Generally, security manager analyzes and synthesizes the log information from various security systems about a certain IP address to find the relevance with privacy violation cases. The security managers' knowledge handling various log information can be transformed into rules for automation of the log analysis and synthesis. Especially, the coverage of log analysis for personal information leakage is not too broad when we compare with the analysis of various intrusion trials. Thus, the number of rules that we should author is relatively small. In this paper, we have derived correlation among logs from IDS, Firewall and Webserver in the view point of privacy protection and implemented a rule-based expert system based on the derived correlation. Consequently, we defined a method for calculating the score which represents the relevance between IP address and privacy violation. The UI(User Interface) expert system has a capability of managing the rule set such as insertion, deletion and update.

The Secure Key Store to prevent leakage accident of a Private Key and a Certificate (인증서와 개인키 유출 방지를 위한 보안키 저장소 Secure Key Store)

  • Park, Young-Jin;Kim, Seon-Jong;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.1
    • /
    • pp.31-40
    • /
    • 2014
  • In Korea, the Public Key Infrastructure (PKI) has been introduced. For secure information transmission and identification, the electronic signature authorization system of a certificate-based is built, and then the service provide.The certificate is stored in location what users can easily access and copy. Thus, there is a risk that can be stolen by malware or web account hacking. In addition, private key passwords can be exposed by the logging tool, after keyboard security features are disabled. Each of these security weaknesses is a potential conduit for identity theft, property/asset theft, and theft of the actual certificates. The present study proposes a method to prevent the private key file access illegally. When a certificate is stored, the private key is encrypted by the dependent element of the device, and it is stored securely. If private key leakage occurs, the retrieved key could not be used on other devices.

Improving the Reliability of the National Database for Chemical Hazard Information (국가 화학물질 유해성정보 데이터베이스 구축 과정의 신뢰도 제고 방안에 관한 연구)

  • Lee, Somin;Lee, Minhyeok;Kang, Mijin;Kwon, Soon-Kwang;Ra, Jin-Sung;Park, Beaksoo
    • Journal of Environmental Health Sciences
    • /
    • v.46 no.4
    • /
    • pp.410-422
    • /
    • 2020
  • Objectives: According to the Act on Registration, Evaluation, Etc. of Chemicals, new and existing chemicals must be registered by 2030. In addition, industries need to submit hazard data as an attachment during the registration process. Therefore, we constructed a nationwide chemical database to support small industry by providing hazard data and original sources. During the process, we developed a new standard procedure for minimizing errors and increasing reliability. Methods: We analyzed the categories of errors and the cause of the errors through the verification results of the 2019 project. We present an improved database construction methodology and system. Results: Errors are categorized according to their causative factors into simple, technical, and structural type errors. Simple errors arise simply because of decreased concentration or negligence in following the instructions. Technical errors are caused by a discrepancy between the professional field and the type of data. Structural errors indicate systemic errors such as incomplete forms on the excel database or ambiguity in the guidelines. Lessons from the errors collected in the 2019 project are used to update the procedures for database authorization and technical guidelines. The main update points are as follows; 'supplementation of review process', 'giving regular training to external reviewers', 'giving additional information to authors, like physico-chemical properties of substances, degradability, etc.', 'amendment of excel form', and 'guideline upgrades'. Conclusions: We conducted this study with the aim of improving the accuracy and reliability of the database of hazard information for chemical substances. The new procedures and guidelines are now being used in the 2020 project for construction of a hazard information database for Korea.

Detection of Faces with Partial Occlusions using Statistical Face Model (통계적 얼굴 모델을 이용한 부분적으로 가려진 얼굴 검출)

  • Seo, Jeongin;Park, Hyeyoung
    • Journal of KIISE
    • /
    • v.41 no.11
    • /
    • pp.921-926
    • /
    • 2014
  • Face detection refers to the process extracting facial regions in an input image, which can improve speed and accuracy of recognition or authorization system, and has diverse applicability. Since conventional works have tried to detect faces based on the whole shape of faces, its detection performance can be degraded by occlusion made with accessories or parts of body. In this paper we propose a method combining local feature descriptors and probability modeling in order to detect partially occluded face effectively. In training stage, we represent an image as a set of local feature descriptors and estimate a statistical model for normal faces. When the test image is given, we find a region that is most similar to face using our face model constructed in training stage. According to experimental results with benchmark data set, we confirmed the effect of proposed method on detecting partially occluded face.