• Title/Summary/Keyword: Authorization System

Search Result 240, Processing Time 0.053 seconds

Smartphone Security Using Fingerprint Password (다중 지문 시퀀스를 이용한 스마트폰 보안)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.3
    • /
    • pp.45-55
    • /
    • 2013
  • Thereby using smartphone and mobile device be more popular the more people utilize mobile device in many area such as education, news, financial. In January, 2007 Apple release i-phone it touch off rapid increasing in user of smartphone and it create new market and these broaden its utilization area. Smartphone use WiFi or 3G mobile radio communication network and it has a feature that can access to internet whenever and anywhere. Also using smartphone application people can search arrival time of public transportation in real time and application is used in mobile banking and stock trading. Computer's function is replaced by smartphone so it involves important user's information such as financial and personal pictures, videos. Present smartphone security systems are not only too simple but the unlocking methods are spreading out covertly. I-phone is secured by using combination of number and character but USA's IT magazine Engadget reveal that it is easily unlocked by using combination with some part of number pad and buttons Android operation system is using pattern system and it is known as using 9 point dot so user can utilize various variable but according to Jonathan smith professor of University of Pennsylvania Android security system is easily unlocked by tracing fingerprint which remains on the smartphone screen. So both of Android and I-phone OS are vulnerable at security threat. Compared with problem of password and pattern finger recognition has advantage in security and possibility of loss. The reason why current using finger recognition smart phone, and device are not so popular is that there are many problem: not providing reasonable price, breaching human rights. In addition, finger recognition sensor is not providing reasonable price to customers but through continuous development of the smartphone and device, it will be more miniaturized and its price will fall. So once utilization of finger recognition is actively used in smartphone and if its utilization area broaden to financial transaction. Utilization of biometrics in smart device will be debated briskly. So in this thesis we will propose fingerprint numbering system which is combined fingerprint and password to fortify existing fingerprint recognition. Consisted by 4 number of password has this kind of problem so we will replace existing 4number password and pattern system and consolidate with fingerprint recognition and password reinforce security. In original fingerprint recognition system there is only 10 numbers of cases but if numbering to fingerprint we can consist of a password as a new method. Using proposed method user enter fingerprint as invested number to the finger. So attacker will have difficulty to collect all kind of fingerprint to forge and infer user's password. After fingerprint numbering, system can use the method of recognization of entering several fingerprint at the same time or enter fingerprint in regular sequence. In this thesis we adapt entering fingerprint in regular sequence and if in this system allow duplication when entering fingerprint. In case of allowing duplication a number of possible combinations is $\sum_{I=1}^{10}\;{_{10}P_i}$ and its total cases of number is 9,864,100. So by this method user retain security the other hand attacker will have a number of difficulties to conjecture and it is needed to obtain user's fingerprint thus this system will enhance user's security. This system is method not accept only one fingerprint but accept multiple finger in regular sequence. In this thesis we introduce the method in the environment of smartphone by using multiple numbered fingerprint enter to authorize user. Present smartphone authorization using pattern and password and fingerprint are exposed to high risk so if proposed system overcome delay time when user enter their finger to recognition device and relate to other biometric method it will have more concrete security. The problem should be solved after this research is reducing fingerprint's numbering time and hardware development should be preceded. If in the future using fingerprint public certification becomes popular. The fingerprint recognition in the smartphone will become important security issue so this thesis will utilize to fortify fingerprint recognition research.

Implementation of An Automatic Authentication System Based on Patient's Situations and Its Performance Evaluation (환자상황 기반의 자동인증시스템 구축 및 성능평가)

  • Ham, Gyu-Sung;Joo, Su-Chong
    • Journal of Internet Computing and Services
    • /
    • v.21 no.4
    • /
    • pp.25-34
    • /
    • 2020
  • In the current medical information system, a system environment is constructed in which Biometric data generated by using IoT or medical equipment connected to a patient can be stored in a medical information server and monitored at the same time. Also, the patient's biometric data, medical information, and personal information after simple authentication using only the ID / PW via the mobile terminal of the medical staff are easily accessible. However, the method of accessing these medical information needs to be improved in the dimension of protecting patient's personal information, and provides a quick authentication system for first aid. In this paper, we implemented an automatic authentication system based on the patient's situation and evaluated its performance. Patient's situation was graded into normal and emergency situation, and the situation of the patient was determined in real time using incoming patient biometric data from the ward. If the patient's situation is an emergency, an emergency message including an emergency code is send to the mobile terminal of the medical staff, and they attempted automatic authentication to access the upper medical information of the patient. Automatic authentication is a combination of user authentication(ID/PW, emergency code) and mobile terminal authentication(medical staff's role, working hours, work location). After user authentication, mobile terminal authentication is proceeded automatically without additional intervention by medical staff. After completing all authentications, medical staffs get authorization according to the role of medical staffs and patient's situations, and can access to the patient's graded medical information and personal information through the mobile terminal. We protected the patient's medical information through limited medical information access by the medical staff according to the patient's situation, and provided an automatic authentication without additional intervention in an emergency situation. We performed performance evaluation to verify the performance of the implemented automatic authentication system.

A RBAC-based Access Control Framework in OSGi Service Platform (OSGi 서비스 플랫폼에서 RBAC 기반의 사용자 접근제어 프레임워크)

  • Cho, Eun-Ae;Moon, Chang-Joo;Baik, Doo-Kwon
    • Journal of KIISE:Information Networking
    • /
    • v.34 no.5
    • /
    • pp.405-422
    • /
    • 2007
  • Recently, according to the network environment, there are many researches for home network. Nowadays, in home network, the method that access control policy is managed for each home device by using ACL is popular, and EAM (Extranet access management) is applied as a solution. In addition, the research about secure OS is ongoing based on open operating system and the research of user authentication mechanisms for home network using home server is also in progress. However, these researches have some problems as follows; First, the transmission scope of expected access technology in home network is wide, so unauthenticated outside terminal can access the home network. Second, user is inconvenient because user need to set the necessary information for each device. Third, user privacy and convenience are not considered. OSGi provides a service platform for heterogeneous technologies in home network environment. Here, user access control is one of the core parts which should have no problems such as above items, but there are no concrete researches yet. Thus in this paper, we propose an access control policy management framework and access control operation based on RBAC for user access control in home network environment in which OSGi service platform is operated. First, we list the consideration which is not clearly mentioned in OSGi standard, and then we solve these above problems through new framework. In addition, we propose the effective and economical operation method which reduces the policy change frequency for user access control by using RBAC concept though limited resource of home gateway. Besides, in this paper, these proposed policies are defined separately as user-role assignment policy and permission-role assignment policy, and user decide their own policies. In conclusion, we provide the scheme to enhance the user convenience and to solve the privacy problem.

Practical Arts(Technology.Home Economics) Textbook Evaluation Criterion based on Perspectives of the National Curriculum (교과 교육과정에 제시된 관점에 근거한 실과(기술.가정) 교과서 평가기준 방향 탐색)

  • Kwon, Yoojin
    • Journal of Korean Home Economics Education Association
    • /
    • v.25 no.3
    • /
    • pp.61-77
    • /
    • 2013
  • Developing textbook evaluation criterion is as important as textbook development in education. Home economics subject has been involved in textbook evaluation since 1995, at which the first home economics textbook was under the national authorization system in South Korea. There has been little research on home economics textbook evaluation criterion even though there were more studies using textbook analysis. The purposes of this study were to explore the reason why subject perspectives were reflected on the textbook evaluation criterion, the relationships between the perspectives presented by national curriculum and technology home economics textbook evaluation criterion, and the future direction for developing textbook evaluation criterion. So this study was related to analyze practical arts(technology home economics) textbook evaluation criterion and the meaning of subject perspectives in textbook evaluation criterion, to drive perspectives consistently presented by the 2007 revised and 2011 revised national curriculum, to analyze the relationships between the perspectives in national curriculum and textbook evaluation criterion, and to provide the future direction for textbook evaluation criterion development. Textbook evaluation criterion is very important because it provides subject perspectives for developing textbook, delivers the core concepts and unique values of our subject, and provides the direction for teacher education. According to the analysis of both national curriculum, the perspectives such as management competency, life competency, practical experience, integrative competency for understanding individual and family, career and life planning, and life problem-solving were presented in this study. Implication for future research would be needed to develop the factors of textbook evaluation criterion based on the perspective presented by national curriculum.

  • PDF

The Performance of the National Authorization System of Private Qualification (강건설계방법을 활용한 창의적 문제해결 실습과정)

  • Kim, Tai-Oun
    • Journal of Engineering Education Research
    • /
    • v.11 no.1
    • /
    • pp.64-75
    • /
    • 2008
  • A new product development and product realization process (PRP) is a circulating and feedback process by generating ideas through creative problem solving process. The early stages of PRP correspond to conceptual design and product development, in which a large portion of product life cycle cost can be saved. The optimal design method for this stage is a robust design suggested by Taguchi. Quality must be 'engineered in' since it can not be 'inspected out.' A robust design is an engineering methodology to improve the quality of a product by minimizing the efforts of variations without eliminating the causes. The objective of this study is to propose a scheme and a case study of robust design for exploring design parameters, and introduce a creative problem solving process. Major research subjects include a creative problem solving process, robust design procedure and their implementation. For the experiment of Taguchi method, a toy catapult is adopted. For the creativity development, a short project is assigned to devise a similar tool with the toy catapult. A reference model is suggested to compare and evaluate their ideas.

Technical Review on Methodology of Generating Exposure Scenario in eSDS of EU REACH (유럽 신화학물질관리제도의 eSDS에 첨부되는 노출시나리오 작성법 개발 동향)

  • Choe, Eun-Kyung;Kim, Jong-Woon;Kim, Sang-Hun;Byun, Sung-Won
    • Clean Technology
    • /
    • v.17 no.4
    • /
    • pp.285-299
    • /
    • 2011
  • As one of the REACH obligations, the extended safety data sheet (eSDS) should be communicated within the supply chain under the REACH Regulation. Based on technical guidance documents published on the ECHAs website and survey of EU's recent REACH-related informations, this paper includes a study on details of how to develop exposure scenarios (ES) such as structure of ES, process of ES develpoment, standard workflows and key input data to develop ES with an introduction of eSDS concept. This paper also contains an overview on operational conditions (OCs) and risk management measures (RMMs) that are what to consider when building an ES. The structure of Chesar (Chemical Safety Assessment and Report tool) developed by European Chemicals Agency (ECHA) is studied with a review of the available exposure estimation tools for workers, environment and consumers. Case example of generic exposure scenario (GES) for organic solvent is presented. To guide Korean EU-exporting companies, their participating roles in three steps of preparing ES are addressed.

Improvement Devices of Urban Center′s Green Function of the Public Open Space Attached Building in Incheon, Korea (인천시 공개공지의 도심 녹지 기능 개선 방안)

  • Cho, Woo;Lee, Yong-Joo;Lee, Kyung-Jae
    • Korean Journal of Environment and Ecology
    • /
    • v.17 no.3
    • /
    • pp.258-267
    • /
    • 2003
  • The purpose of this study is to present improvement devices of urban center's green function in the Public Open Space Attached Building(P.O.S.) in Incheon, Korea. Study sites were the P.O.S. of office building(10 place), transportation facility building(3 places), government office building(2 places) that were made up 1994∼2002 and analyzed establishment, using and planting status. And P.O.S.'s planting area structure of Osaka and Kawasaki in Japan that is operating P.O.S. system similar to Korea was compared with study sites of Incheon. P.O.S. of Incheon is not managing as valuable urban center's green and establishing to satisfy legal requirement. The strengthening devices of P.O.S. function are as follows. First, it is desirable that planting area rate of P.O.S. in order to develop small park in urban center is increasing by 40% that is children's park level. Second, it must be conferred about planting basis, tree selection and planting method etc. of P.O.S. with green and park development department at building authorization. Third, by the 'landscape planting standard of plottage' that is becoming planting standard of P.O.S is heightened and must increase quality and amount of green. Fourth, it is required mandatory establishing of sign so that citizens can search easily and utilize of P.O.S. Fifth, legal regulation should be decided to prevent that P.O.S. is used unlike purpose originally.

The Chosun Governor General Office's Administration regarding Official Documents (조선총독부 공문서(公文書) 제도 -기안(起案)에서 성책(成冊)까지의 과정을 중심으로-)

  • Lee, Seung-il
    • The Korean Journal of Archival Studies
    • /
    • no.9
    • /
    • pp.3-40
    • /
    • 2004
  • In this article, the elements usually included in the official documents issued by the Chosun Governor General office, the process of a certain document being put together and legally authorized, and its path of circulation and preservation are all examined. In order to create an official document of the Governor General office with legal authorization, a draft of a bill had to go through several discussions and a subsequent agreement before it was finally approved. Personnels involved in the discussion stage had the authority to ask for modifications and retouching of the draft, and the modifying process were all recorded in order to make clear who was responsible for a certain change or who objected to what at any given stage of the process. The approved version of an official document was called the 'Completed one(成案), and it was issued after the contents were turned into a fair copy by the office that originated the draft in the first place. With the original finalized version left in custody of that office, the fair copy was handed over to the Document department which was responsible for issuing outgoing documents. After the document was issued and the contained orders were carried out, the originally involved offices began to classify the documents according to their own standards and measures for safekeeping, but it was the Document department that was mainly responsible for document preservation. The Document department classified the documents according to related offices, nature of the documents(편찬류별), and most suitable preservation methods(보존종별). The documents were made into books, and documents to be permanently destroyed were handed over to the Account office where they would be demolished. The manners of document processing of the Chosun Governor General office was in fact a modified version of the manners of the Japanese government. Modifications were made so that the process would be more suitable to the situations and environment of the Chosun society. The office's managing process was inherited by the Chosun government after the Liberation, and cast a significant impact upon the document managing manners of the Korean authorities. The official document administration of the Chosun Governor General office marked both the beginning of the colony document administration, and also the beginning of a modernized document managing system.

A Study on Unauthorized Anchoring of Foreign-flag Vessels in Internal Waters and Territorial Sea (외국선박의 내수 및 영해 무단정박에 관한 연구)

  • Lim, Chae-Hyun;Lee, Chang-Hee;Jeong, Dae-Deuk
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.28 no.2
    • /
    • pp.280-289
    • /
    • 2022
  • Internal Waters refer to the waters located at the landward side of a baseline and is completely under the sovereignty of a coastal state. However, the right of innocent passage of foreign-flag vessels is recognized in internal waters that are newly incorporated by establishing a straight baseline. Korea has a massive Internal Waters on its south-western coast where the straight baseline is adopted and has a wide Internal Waters that allows innocent passage. A foreign-flag vessel navigating the internal waters must be properly managed according to the interest of the coastal states such as the fishing·safety·security·environment around the Korean coast. Additionally, Territorial Sea comes under the sovereignty of a coastal state and it is a very important sea area for managing the interests of the coastal states. However, several collision accidents involving illegally anchored or drifted foreign-flag vessels have been occurring recently in the Korean Internal Waters and Territorial Sea, and such accidents are a threat to its interests. Thus, this paper analyzes the cases of collision of foreign-flag vessels that anchored or drifted without authorization, and examines domestic·international laws on the passage of foreign-flag vessel through Internal Waters and Territorial Waters. Finally, this paper suggests that unauthorized anchoring of foreign-flag vessels in Korean Internal Waters and Territorial Water violates the requirements for innocent passage and this violation is punishable according to related Acts; a desirable improvement plan for the legal system of passage through Internal Waters and Territorial Waters.

A Study on Measures to Strengthen National Authorized Qualification (국가공인 민간자격 활용성 강화 방안 연구)

  • Kim, Sang-Jin;Park, Jong-Sung;Jung, Hyang-Jin
    • Journal of Engineering Education Research
    • /
    • v.12 no.1
    • /
    • pp.3-16
    • /
    • 2009
  • The purpose of this study is to prepare diverse measures to enhance the utilization of national authorized qualification. The detail objectives of this study are first, to re-establish the utilization scope and range of national authorized qualification through analysis of advance research and theory in various fields of learning on the function of qualification; and second, to set the direction to strengthen the utilization of national authorized qualification. Based on discussions on the various fields of learning on the function of qualification, this study divided the utilization scope of qualification into personal utilization for the benefit of the qualification acquirer him or herself and public utilization for the social and economic benefits. And according to this distinction, we prepared measures to strengthen the utilization of national authorized qualification. First of all, as a way to strengthen personal utilization of the national authorized qualification, we prepared measures to enhance accessibility and facilitate further improvement. As a means to enhance accessibility, we proposed restriction on setting the application condition, diversification of qualification authorization method, facilitation of partial qualification system and minimization of expense required to acquire qualification. Also for the further improvement, we proposed creation of job-level centered grade system and development of job-level centered qualification item by stage. For strengthening the public utilization of national authorized qualification, we come up with ways of strengthening flexibility, transparency, public trust and compatibility. As a way to strengthen flexibility, we proposed establishment of qualification demand monitoring system, expansion of direct participation of users on qualification management, establishment of qualification expiration period and its renewal. For the strengthening of transparency, we proposed to build general qualification information system and to utilize qualification recommendation system. To strengthen public trust, we proposed to strengthen the management of qualification management regulation, secure independency, establish internal audit system and strengthen post management of national authorized qualification. And lastly, we suggested that compatibility comparison standard between qualification and qualification level standard be developed for the strengthening of compatibility.