• Title/Summary/Keyword: Device ID

Search Result 155, Processing Time 0.024 seconds

Proposal for a Custody and Federated Service Model for the Decentralized Identity (분산 ID 보관 및 연계 서비스 모델 제안)

  • Yeo, Kiho;Park, Keundug;Youm, Heung Youl
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.3
    • /
    • pp.513-525
    • /
    • 2020
  • Until today, the personal information of subjects has been centralized in many companies or institutions. However, in recent days, the paradigm has gradually changed in the direction that subjects control their personal information and persue their self-sovereignty. Globally, individual data sovereignty is strengthened by the European Union's General Data Protection Regulation(GDPR) and the US California Consumer Privacy Act(CCPA). In Korea, a few alliances consist of various companies are creating technology research and service application cases for decentralized ID service model. In this paper, the current decentralized ID service model and its limitations are studied, and a improved decentralized ID service model that can solve them is proposed. The proposed model has a function of securely storing decentralized ID to the third party and a linkage function that can be interoperated even if different decentralized ID services are generated. In addition, a more secure and convenient model by identifying the security threats of the proposed model and deriving the security requirements, is proposed. It is expected that the decentralized ID technology will be applied not only to the proof of people but also to the device ID authentication management of the IoT in the future.

Geometry Information-based Practical Device Identification for Local Device-to-device Communication

  • Park, Eun-hye;Lee, Kwang-Eog;Kang, Joon-hyuk
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.7 no.4
    • /
    • pp.159-167
    • /
    • 2014
  • Local device-to-device (D2D) communication between two smart mobile devices is becoming increasingly popular. The first key step in starting a D2D communication is to discover and identify the remote target device to establish a link. However, existing device discovery mechanisms either require users to explicitly identify the ID of the target device or rely on inaccurate beamforming technology. This paper presents two novel device identification algorithms using a variety of embedded sensors. The algorithms only require that users to point two devices towards each other. This paper describes the algorithms, analyzes their accuracy using analytical models, and verifies the results using simulations.

A Study on Home Device Authentication method based service using Java Card (자바카드를 이용한 서비스 기반 홈 디바이스 인증 기법에 관한 연구)

  • Lee, Yun-Seok;Kim, Eun;Lee, Geon-Hyeok;Jung, Min-Soo
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.2
    • /
    • pp.287-297
    • /
    • 2010
  • Authentication is needed to use safe devices in the home network environment. In this authentication, there are an ID base form and Certification base form. In case of an ID base form, it is difficult to apply to the multi domain environment and in case of an Certification base form, because the way that contains and stores the certificate demand on devices, additional setting of the user is needed for transfer of ownership and purchase of new devices, and more. Because both ways attend an individual authentication for devices, the ways exist overhead as the frequent authentication for a lot of devices in service aspects of user needs. To arrange these problems, in this paper, the authentication information of devices can be securely stored and managed in the java card and a processing time of the authentication could be improved better then the existing technique by authenticating a group of service.

Study on the Prediction of Absorption Performance by the Optimization of a Vertical Absorber (수직형 흡수기 최적화에 따른 흡수 성능 예측에 관한 연구)

  • Kim, Jung-Kuk;Cho, Keum-Nam
    • Journal of Energy Engineering
    • /
    • v.14 no.3 s.43
    • /
    • pp.194-202
    • /
    • 2005
  • The present study was analytically and experimentally carried out to predict the absorption characteristics on combined heat and mass transfer process in a vertical falling film of variable absorbers. Heat and mass transfer enhancements were analytically investigated. Effects of geometric parameters by insert device (spring) and corrugate, flow pattern on absorption performances has been also investigated. Especially, the optimal values of absorber geometry (ID=22.8mm, L=1150m) and kinetic variables (solution flow rate, flow pattern) for maximum absorption performance has been predicted by the numerical analysis. The maximum absorption performance in a numerical analysis and experiment was shown at the wavy-flow by insert device (spring).

Development of a System Security Unit using RFID (RFID를 이용한 시스템 보안 장치 개발)

  • Jang, Jae-Hyuk;Sim, Gab-Sig
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.1
    • /
    • pp.11-18
    • /
    • 2011
  • This study developed a digital security device which power is on/off by the RFID card. This device is based on the wireless data transmit/receive circuits, built in RS-232C chip and applied to computer and other digital devices. We can check whether this device is operated or not by connecting the LED. In this system, 13.56MHz frequency circuit supplies power with ID card, and DC inputs check the proximity operating distance of the card field for verifying the existence of a card. The security level of this system is much stronger than that of a compared system[13]. Anyone cannot use the system without RFID card. All illegal access is prevented except for authorized path.

A Study on Characteristics of Wet Gate Oxide and Nitride Oxide(NO) Device (Wet 게이트 산화막과 Nitride 산화막 소자의 특성에 관한 연구)

  • 이용희;최영규;류기한;이천희
    • Proceedings of the IEEK Conference
    • /
    • 1999.06a
    • /
    • pp.970-973
    • /
    • 1999
  • When the size of the device is decreased, the hot carrier degradation presents a severe problem for long-term device reliability. In this paper we fabricated & tested the 0.26${\mu}{\textrm}{m}$ NMOSFET with wet gate oxide and nitride oxide gate to compare that the characteristics of hot carrier effect, charge to breakdown, transistor Id_Vg curve and charge trapping using the Hp4145 device tester As a result we find that the characteristics of nitride oxide gate device better than wet gate oxide device, especially a hot carrier lifetime(nitride oxide gate device satisfied 30years, but the lifetime of wet gate oxide was only 0.1year), variation of Vg, charge to breakdown and charge trapping etc.

  • PDF

A remote device authentication scheme in M2M communications (M2M 통신에서 원격장치 인증 기법)

  • Lee, Song-Hee;Park, Nam-Sup;Lee, Keun-Ho
    • Journal of Digital Convergence
    • /
    • v.11 no.2
    • /
    • pp.309-316
    • /
    • 2013
  • Machine-to-machine (M2M) communication occurs when devices exchange information independent of human intervention. Prominent among the technical challenges to M2M communication are security issues, such as eavesdropping, spoofing, modification, and privacy violation. Hence, it is very important to establish secure communication. In this paper, we propose a remote authentication scheme, based on dynamic ID, which provides secure communication while avoiding exposure of data through authentication between the M2M domain and the network domain in the M2M architecture. We then prove the correctness and security of the proposed scheme using a logic-based formal method.

Indoor positioning system of 50 cm resolution based on LED (50cm의 resolution을 가지는 LED 조명 기반의 실내 측위 시스템)

  • Jung, Soo-Yong;Hann, S-Wook;Park, Chang-Soo
    • Journal of Satellite, Information and Communications
    • /
    • v.5 no.2
    • /
    • pp.69-74
    • /
    • 2010
  • In this paper, we present an indoor positioning system based on light emitting diode (LED). Because LED is a semiconductor light emitting device, we can easily switch and modulate electrical signals into lightwave signals at high speed using LEDs. We assigned unique 8-bit ID address to each LED lights. Photo diode receives data from 16-LED lights and takes correlation coefficient beteween received data and each LED-ID. Using correlation coefficient, proposed positioning system shows resolution of 50 cm in dimensions of $4\;m\;{\times}\;4\;m\;{\times}\;2\;m$.

Interface Construction for Printout Security Management System (출력물 보안 관리 시스템을 위한 인터페이스 구축)

  • Hon, Jung-Soo;Kim, Gui-Jung
    • Journal of Digital Convergence
    • /
    • v.16 no.10
    • /
    • pp.235-241
    • /
    • 2018
  • The printout management system should analyze the pattern of existence of personal information (resident number, card number) in the output log and users should be provided with functions such as warning message pop-up, forced printing termination, mailing to administrator, independently logs management. Authentication management can also be performed only by registered users by installing an agent on a user PC, and it should have a restriction function to permit or deny work according to user information. In addition, when printing/copying/scanning using this equipment, it is possible to use document printing and multifunction copier after ID card authentication and ID/PW should be input to device when ID card is not used. In this study, we developed these interfaces with WOWSOFT co., Ltd, a security company that has better technology than the existing printout security methods, to construct the printout management system. Also we designed the interface of basic functions necessary for printout management and contributed to the establishment of printout management system.

Factors affecting success and failure of Internet company business model using inductive learning based on ID3 algorithm (ID3 알고리즘 기반의 귀납적 추론을 활용한 인터넷 기업 비즈니스 모델의 성공과 실패에 영향을 미치는 요인에 관한 연구)

  • Jin, Dong-su
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.2
    • /
    • pp.111-116
    • /
    • 2019
  • New technologies such as the IoT, Big Data, and Artificial Intelligence, starting from the Web, mobile, and smart device, enable new business models that did not exist before, and various types of Internet companies based on these business models has been emerged. In this research, we examine the factors that influence the success and failure of Internet companies. To do this, we review the recent studies on business model and examine the variables affecting the success of Internet companies in terms of network effect, user interface, cooperation with actors, creating value for users. Using the five derived variables, we will select 14 Internet companies that succeeded and failed in seven commercial business model categories. We derive decision tree by applying inductive learning based on ID3 algorithm to the analysis result and derive rules that affect success and failure based on derived decision tree. With these rules, we want to present the strategic implications for actors to succeed in Internet companies.