• Title/Summary/Keyword: Biometric System

Search Result 361, Processing Time 0.028 seconds

Integrated Authentication Protocol of Financial Sector that Modified OAuth2.0 (OAuth2.0을 변형한 금융권 통합인증 프로토콜)

  • Jung, Kyu-Won;Shin, Hye-seong;Park, Jong Hwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.2
    • /
    • pp.373-381
    • /
    • 2017
  • Currently, various types of user authentication methods based on public certificates are used in domestic financial transactions. Such an authorized certificate method has a problem that a different security module must be installed every time a user connects an individual financial company to a web server. Also, the financial company relying on this authentication method has a problem that a new security module should be additionally installed for each financial institution whenever a next generation authentication method such as biometric authentication is newly introduced. In order to solve these problems, we propose an integrated authentication system that handles user authentication on behalf of each financial institution in financial transactions, and proposes an integrated authentication protocol that handles secure user authentication between user and financial company web server. The new authentication protocol is a modified version of OAuth2.0 that increases security and efficiency. It is characterized by performing a challenge-response protocol with a pre-shared secret key between the authentication server and the financial company web server. This gives users a convenient and secure Single Sign-On (SSO) effect.

PKI-based Registration Authority using Efficient Human Iris Recognition Information (홍채 패턴 정보를 이용한 공개키 기반의 등록기관)

  • Lee, Kwan-Yong;Lim, Shin-Young
    • Journal of KIISE:Software and Applications
    • /
    • v.28 no.11
    • /
    • pp.864-873
    • /
    • 2001
  • In this paper, a new approach to building a registration authority for issuing PKI-based certificates is presented to make the process of identifying an individual more secure and reliable by utilizing human iris recognition technology. The tasks of the proposed system associated with the manipulation of irises except for the general functions of registration authorities can be categorized into three modules, the acquisition of iris images, the registration of iris information, and the verification of users by means of iris patterns. The information among the three modules is safely exchanged through encryption and decryption with a symmetric cryptographic method. As a feature extraction method for a given iris image, a wavelet transform is applied to represent a feature vector with a small dimension of information obtained by subsampling an image corresponding to lower frequency bands successively without loss of information. Through the experiments on human iris recognition technology we proposed and applied to the registration authority, the potential of biometric technology in various applications is confirmed.

  • PDF

Embedded-based Power Monitoring Security Module Design (임베디드 전력 모니터링 보안 모듈 설계)

  • Yoon, Chan-Ho;Kim, Gwang-Jun;Jang, Chang-Soo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.10
    • /
    • pp.1485-1490
    • /
    • 2013
  • The demonstration project of the electrical grid for Smart grid is progressed, the smart digital appliances AV technology, Smart home energy management technology charging the management function of complex energy for the automation management of air conditioning and heating, humidity and air, the health care technology charging the design of housing for the elderly and disabled and the measurement of individual bio information, and the Smart home security technology dealing with the biometric security and motion sensors, etc. have been studied. The power monitoring terminal which uses a variety of wired and wireless networks and protocol is the target additionally to be considered in addition to the security vulnerabilities that was occurred in the existing terminal. In this research paper, the author analyzes the cryptographic techniques corresponding to the smart meter occurred by the problems that are exposed on the outside which are vulnerable to physical attacks, and intends to propose the design of the security systems for the Smart meter terminal being able to maximize the efficiency of the terminal.

A study on face area detection using face features (얼굴 특징을 이용한 얼굴영역 검출에 관한 연구)

  • Park, Byung-Joon;Kim, Wan-Tae;Kim, Hyun-Sik
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.13 no.3
    • /
    • pp.206-211
    • /
    • 2020
  • It is Face recognition is a very important process in image monitoring and it is a form of biometric technology. The recognition process involves many variables and is highly complex, so the software development has only begun recently with the development of hardware. Face detection technology using the CCTV is a process that precedes face analysis, and it is a technique that detects where the face is in the image. Research in face detection and recognition has been difficult because the human face reacts sensitively to different environmental conditions, such as lighting, color of skin, direction, angle and facial expression. The utility and importance of face recognition technology is coming into the limelight over time, but many aspects are being overlooked in the facial area detection technology that must precede face recognition. The system in this paper can detect tilted faces that cannot be detected by the AdaBoost detector and It could also be used to detect other objects.

User Authentication Mechanism using Smartphone (스마트폰을 이용한 사용자 인증 메커니즘)

  • Jeong, Pil-seong;Cho, Yang-hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.2
    • /
    • pp.301-308
    • /
    • 2017
  • With the popularization of smart phones and the development of the Internet, many people use smart phones to conduct identity verification procedures. smart phones are easier and faster to authenticate than personal desktop computers. However, as Internet hacking technology and malicious code distribution technology rapidly evolve and attack types become more diverse, authentication methods suitable for mobile environment are required. As authentication methods, there are methods such as possessive-based authentication, knowledge-based authentication, biometric-based authentication, pattern-based authentication, and multi-element authentication. In this paper, we propose a user authentication mechanism that uses collected information as authentication factor using smart phone. Using the proposed authentication mechanism, it is possible to use the smart phone information and environment information of the user as a hidden authentication factor, so that the authentication process can be performed without being exposed to others. We implemented the user authentication system using the proposed authentication mechanism and evaluated the effectiveness based on applicability, convenience, and security.

Fingerprint Matching Algorithm using MHC Detector Set of String Structure (스트링 구조의 MHC 인식부를 이용한 지문 매칭알고리즘)

  • Sim, Kwee-Bo;Jeong, Jae-Won;Lee, Dong-Wook
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.14 no.3
    • /
    • pp.279-284
    • /
    • 2004
  • Fingerprints have been widely used in the biometric authentication because of its performance, uniqueness and universality. Recently, the speed of identification becomes a very important point in the fingerprint-based security applications. Also, the reliability still remains the main issue in the fingerprint identification. In this paper, we propose the fast and reliable fingerprint matching algorithm based on the process of the 'self-nonself' discrimination in the biological immune system. The proposed algorithm is organized by two-matching stage. The 1st matching stage does the matching process by the use of the 'self-space' and MHC detector string set that are generated from the minutiae and the values of the directional field. Then the 2nd matching stage is made based on the local-structure of the minutiae. The proposed two matching stage reduces matching time while the reliability of the matching algorithm is maintained.

The Framework for Cost Reduction of User Authentication Using Implicit Risk Model (내재적 리스크 감지 모델을 사용한 사용자 인증 편의성 향상 프레임워크)

  • Kim, Pyung;Seo, Kyongjin;Cho, Jin-Man;Kim, Soo-Hyung;Lee, Younho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.5
    • /
    • pp.1033-1047
    • /
    • 2017
  • Traditional explicit authentication, which requires awareness of the user's authentication process, is a burden on the user, which is one of main reasons why users tend not to employ authentication. In this paper, we try to reduce such cost by employing implicit authentication methods, such as biometrics and location based authentication methods. We define the 4-level security assurance model, where each level is mapped to an explicit authentication method. We implement our model as an Android application, where the implicit authentication methods are touch-stroke dynamics-based, face recognition based, and the location based authentication. From user experiment, we could show that the authentication cost is reduced by 14.9% compared to password authentication-only case and by 21.7% compared to the case where 6-digit PIN authentication is solely used.

Semantic Representation of Concept of Bio-signal Data (생체 신호 데이터의 의미 관계 표현)

  • Moon, Kyung-Sil;Park, Su-Hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.2
    • /
    • pp.292-298
    • /
    • 2011
  • In order to acquire new information and biological meaning of the signal data by defining the relationships between them, new modeling technique, ontology, has been proposed. The data of bio-signal can be represented as a systematic and logical to manage continuously bio-signal data using ontology. Furthermore, knowledge of which resources are utilized to provide improved service quality in medical information, health services in various fields. However, relevant studies have not been performed actively to compare importance of relationships between bio-signals. Therefore semantic representation of biometric information should be by defining the relationship between bio-signals. In this paper, we have developed bio-signal ontology to use as a model for using domain knowledge. We verified the usefulness of the ontology by using scenarios.

The effect of Smart Care ubiquitous health service on hypertension management (고혈압관리에서의 스마트케어 서비스의 효과)

  • Chung, Young-Soon;Moon, Mikyung;Lee, Chang Hee
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.3
    • /
    • pp.1213-1220
    • /
    • 2013
  • The purpose of this study was to identify the effect of the Smart Care ubiquitous healthcare service on hypertension management. Fifty one patients with inadequately controlled blood pressure (Systolic Blood Pressure ${\geq}$ 140 mmHg despite prescribed antihypertensive medication) from 4 local clinics participated in this study. Remote biometric monitoring and healthcare consultation via videophone was provided to the participants during 24 week - Smart Care service. The average number of blood pressure monitoring and the average day of remote consult using Smart Care Service system was 121 and 14.8 per participant. As a result of analyzing change in blood pressure during 24 weeks, there was a significant difference in blood pressure between baseline and 24 weeks. Systolic blood pressures of 86.3% participants were dropped within a normal range at 24 week. Smart Care u-health service could be effective in reducing blood pressure.

A Iris Recognition Using Zernike Moment and Wavelet (Zernike 모멘트와 Wavelet을 이용한 홍채인식)

  • Choi, Chang-Soo;Park, Jong-Cheon;Jun, Byoung-Min
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.11
    • /
    • pp.4568-4575
    • /
    • 2010
  • Iris recognition is a biometric technology that uses iris pattern information, which has features of stability, security etc. Because of this reason, it is especially appropriate under certain circumstances of requiring a high security. Recently, using the iris information has a variety uses in the fields of access control and information security. In extracting the iris feature, it is desirable to extract the feature which is invariant to size, lights, rotation. We have easy solutions to the problem of iris size and lights by previous processing but there is still problem of iris feature extract invariant to rotation. In this paper, To improve an awareness ratio and decline in speed for a revision of rotation, it is proposed that the iris recognition method using Zernike Moment and Daubechies Wavelet. At first step, the proposed method groups rotated iris into similar things by statistical feature of Zernike Moment invariant to a rotation, which shortens processing time of iris recognition and looks equal to an established method in the performance of recognition too. therefore, proposed method could confirm the possibility of effective application for large scale iris recognition system.