• Title/Summary/Keyword: Electronic identification system

Search Result 413, Processing Time 0.029 seconds

Security Enhancement to an Biometric Authentication Protocol for WSN Environment (WSN 환경에서 Biometric 정보를 이용한 안전한 사용자 인증 스킴의 설계)

  • Lee, Youngsook
    • Convergence Security Journal
    • /
    • v.16 no.6_2
    • /
    • pp.83-88
    • /
    • 2016
  • Over recent years there has been considerable growth in interest in the use of biometric systems for personal authentication. Biometrics is a field of technology which has been and is being used in the identification of individuals based on some physical attribute. By using biometrics, authentication is directly linked to the person, rather than their token or password. Biometric authentication is a type of system that relies on the unique biological characteristics of individuals to verify identity for secure access to electronic systems. In 2013, Althobati et al. proposed an efficient remote user authentication protocol using biometric information. However, we uncovered Althobati et al.'s protocol does not guarantee its main security goal of mutual authentication. We showed this by mounting threat of data integrity and bypassing the gateway node attack on Althobati et al.'s protocol. In this paper, we propose an improved scheme to overcome these security weaknesses by storing secret data in device. In addition, our proposed scheme should provide not only security, but also efficiency since sensors in WSN(Wireless Sensor Networks) operate with resource constraints such as limited power, computation, and storage space.

Certificate-based SSO Protocol Complying with Web Standard (웹 표준을 준수하는 인증서기반 통합 인증 프로토콜)

  • Yun, Jong Pil;Kim, Jonghyun;Lee, Kwangsu
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.8
    • /
    • pp.1466-1477
    • /
    • 2016
  • Public key infrastructure(PKI), principle technology of the certificate, is a security technology providing functions such as identification, non-repudiation, and anti-forgery of electronic documents on the Internet. Our government and financial organizations use PKI authentication using ActiveX to prevent security accident on the Internet service. However, like ActiveX, plug-in technology is vulnerable to security and inconvenience since it is only serviceable to certain browser. Therefore, the research on HTML5 authentication system has been conducted actively. Recently, domestic bank introduced PKI authentication complying with web standard for the first time. However, it still has inconvenience to register a certification on each website because of same origin policy of web storage. This paper proposes the certificate based SSO protocol that complying with web standard to provide user authentication using certificate on several sites by going around same origin policy and its security proof.

A Knowledge-based System for Analyzing Sophisticated Geometric Structure of Document Images (문서 영상의 정교한 기하적 구조분석을 위한 지식베이스 시스템)

  • Lee, Kyong-Ho;Choy, Yoon-Chul;Cho, Sung-Bae
    • Journal of KIISE:Software and Applications
    • /
    • v.28 no.11
    • /
    • pp.795-813
    • /
    • 2001
  • Sophisticated geometric structure analysis must be preceded to create electronic document from logical components extracted from document image. this paper presents a knowledge-based method for sophisticated geometric structure analysis of technical journal pages. The proposed knowledge base encodes geometric characteristics that are not only common in technical journals but also publication-specific in the form rules. The method takes the hybrid of top-down and bottom-up techniques and consists of two phases: region segmentation and identification. Generally, the result of segmentation process does not have a one-to-one matching with composite layout components. Therefore, the proposed method identifies non-text objects such as image, drawing and table, as well as text objects such as text line and equation by splitting or grouping segmented regions into composite layout components. Experimental results with 372 images scanned from the IEEE Transactions on Pattern Analysis and Machine Intelligence show that the proposed method has performed geometrical structure analysis successfully on more than 99% of the test images, resulting in sophisticated performance compared with previous works.

  • PDF

A Study on the Online-based one-stop private health insurance claims (온라인 기반 원스톱 실손의료보험료 청구에 관한 연구)

  • Lee, Kyounghak;Kang, Min-Soo;Lee, Jae-Yeul
    • Journal of Digital Convergence
    • /
    • v.14 no.4
    • /
    • pp.231-237
    • /
    • 2016
  • The private health insurance covers areas that are not covered by the national health insurance to reinforce insurance guarantee. Realistically, however, many people renunciate small sum insurance claims because the inconvenient claim procedures require a certificate from the hospital for resubmission to the insurance company, which is very time consuming. Therefore, One-stop insurance payout claiming system that is capable of one stop processing of the issuance of e-page safer technology-based certification to claiming of insurance payout by utilizing authorized electronic address (#-mail) through the utilization of private information concealment technology and identification certification technology for the convenience of the subscribers and the simplification of operation was developed.

Individual Variable Step-Size Subband Affine Projection Algorithm (독립 가변 스텝사이즈 부밴드 인접투사 알고리즘)

  • Choi, Hun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.3
    • /
    • pp.443-448
    • /
    • 2022
  • This paper presents a subband affine projection algorithm with variable step size to improve convergence performance in adaptive filtering applications with long adaptive filters and highly correlated input signals. The proposed algorithm can obtain fast convergence speed and small steady-state error by using different step sizes for each adaptive sub-filter in the subband structure to which polyphase decomposition and noble identity are applied. The step size derived to minimize the mean square error of the adaptive filter at each update time shows better convergence performance than the existing algorithm using a variable step size. In order to confirm the convergence performance of the proposed algorithm, which is superior to the existing algorithm, computer simulations are performed for mean square deviation(MSD) for AR(1) and AR(2) colored input signals considering the system identification model.

Impedance Spectroscopy Analysis on the LaAlO3/SrxCa1-xTiO3/SrTiO3 Hetero-Oxide Interface System

  • Park, Da-Hee;Kwon, Kyoung-Woo;Park, Chan-Rok;Choi, Yoo-Jin;Bae, Seung-Muk;Baek, Senug-Hyub;Kim, Jin-Sang;Hwang, Jin-Ha
    • Proceedings of the Korean Vacuum Society Conference
    • /
    • 2015.08a
    • /
    • pp.188.2-188.2
    • /
    • 2015
  • The presence of the conduction interface in epitaxial $LaAlO_3/SrTiO_3$ thin films has opened up challenging applications which can be expanded to next-generation nano-electronics. The metallic conduction path is associated with two adjacent insulating materials. Such device structure is applicable to frequency-dependent impedance spectroscopy. Impedance spectroscopy allows for simultaneous measurement of resistivity and dielectric constants, systematic identification of the underlying electrical origins, and the estimation of the electrical homogeneity in the corresponding electrical origins. Such unique capability is combined with the intentional control on the interface composition composed of $SrTiO_3$ and $CaTiO_3$, which can be denoted by $SrxCa1-_xTiO_3$. The underlying $Sr_xCa1-_xTiO_3$ interface was deposited using pulsed-laser deposition, followed by the epitaxial $LaAlO_3$ thin films. The platinum electrodes were constructed using metal shadow masks, in order to accommodate 2-point electrode configuration. Impedance spectroscopy was performed as the function of the relative ratio of Sr to Ca. The respective impedance spectra were analyzed in terms of the equivalent circuit models. Furthermore, the impedance spectra were monitored as a function of temperature. The ac-based characterization in the 2-dimensional conduction path supplements the dc-based electrical analysis. The artificial manipulation of the interface composition will be discussed towards the electrical application of 2-dimensional materials to the semiconductor devices in replacement for the current Si-based devices.

  • PDF

Model Verification of a Safe Security Authentication Protocol Applicable to RFID System (RFID 시스템에 적용시 안전한 보안인증 프로토콜의 모델검증)

  • Bae, WooSik;Jung, SukYong;Han, KunHee
    • Journal of Digital Convergence
    • /
    • v.11 no.4
    • /
    • pp.221-227
    • /
    • 2013
  • RFID is an automatic identification technology that can control a range of information via IC chips and radio communication. Also known as electronic tags, smart tags or electronic labels, RFID technology enables embedding the overall process from production to sales in an ultra-small IC chip and tracking down such information using radio frequencies. Currently, RFID-based application and development is in progress in such fields as health care, national defense, logistics and security. RFID structure consists of a reader that reads tag information, a tag that provides information and the database that manages data. Yet, the wireless section between the reader and the tag is vulnerable to security issues. To sort out the vulnerability, studies on security protocols have been conducted actively. However, due to difficulties in implementation, most suggestions are concerned with theorem proving, which is prone to vulnerability found by other investigators later on, ending up in many troubles with applicability in practice. To experimentally test the security of the protocol proposed here, the formal verification tool, CasperFDR was used. To sum up, the proposed protocol was found to be secure against diverse attacks. That is, the proposed protocol meets the safety standard against new types of attacks and ensures security when applied to real tags in the future.

Research and consideration on the evaluation of usability formation of focused ultrasonic stimulation systems (집속형 초음파 자극 시스템의 사용적합성 형성평가에 대한 연구 및 고찰)

  • Kim, Jun-tae;Kim, Ju-hee;Joo, Kyu-tai;Kim, Kyung-ah;Ryu, Ok-su;Jo, Jae-hyun;Jeong, Jin-Hyoung
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.15 no.2
    • /
    • pp.164-177
    • /
    • 2022
  • Medical device usability evaluation refers to the evaluation of medical devices through actual users before the final prototype production is completed. IEC 62366, one of the international safety standards for electronic medical devices, is a standard that must be applied to obtain medical device licenses in major advanced countries such as Europe and the United States. In Korea, through the Ministry of Food and Drug Safety's notice, from January 2021, sequential application by grade has been implemented. In this study, 15 participant specialists were recruited through the Incheon G University Hospital Medical Device Convergence Center for formative evaluation during user suitability evaluation of the focused ultrasound stimulation system being developed by Icleo Co., Ltd., and the test was conducted through joint scenario development. . In the result of task performance, the performance rate was 90.67%, and after the completion of the performance, 86.67% of 'Easy user interface' and 94% of 'Identification/Readability/Understanding of information' questions in the participant survey results analysis by question. The response rate was above average.

Customer Relationship Management Techniques Based on Dynamic Customer Analysis Utilizing Data Mining (데이터마이닝을 활용한 동적인 고객분석에 따른 고객관계관리 기법)

  • 하성호;이재신
    • Journal of Intelligence and Information Systems
    • /
    • v.9 no.3
    • /
    • pp.23-47
    • /
    • 2003
  • Traditional studies for customer relationship management (CRM) generally focus on static CRM in a specific time frame. The static CRM and customer behavior knowledge derived could help marketers to redirect marketing resources fur profit gain at that given point in time. However, as time goes, the static knowledge becomes obsolete. Therefore, application of CRM to an online retailer should be done dynamically in time. Customer-based analysis should observe the past purchase behavior of customers to understand their current and likely future purchase patterns in consumer markets, and to divide a market into distinct subsets of customers, any of which may conceivably be selected as a market target to be reached with a distinct marketing mix. Though the concept of buying-behavior-based CRM was advanced several decades ago, virtually little application of the dynamic CRM has been reported to date. In this paper, we propose a dynamic CRM model utilizing data mining and a Monitoring Agent System (MAS) to extract longitudinal knowledge from the customer data and to analyze customer behavior patterns over time for the Internet retailer. The proposed model includes an extensive analysis about a customer career path that observes behaviors of segment shifts of each customer: prediction of customer careers, identification of dominant career paths that most customers show and their managerial implications, and about the evolution of customer segments over time. furthermore, we show that dynamic CRM could be useful for solving several managerial problems which any retailers may face.

  • PDF

GPR Development for Landmine Detection (지뢰탐지를 위한 GPR 시스템의 개발)

  • Sato, Motoyuki;Fujiwara, Jun;Feng, Xuan;Zhou, Zheng-Shu;Kobayashi, Takao
    • Geophysics and Geophysical Exploration
    • /
    • v.8 no.4
    • /
    • pp.270-279
    • /
    • 2005
  • Under the research project supported by Japanese Ministry of Education, Culture, Sports, Science and Technology (MEXT), we have conducted the development of GPR systems for landmine detection. Until 2005, we have finished development of two prototype GPR systems, namely ALIS (Advanced Landmine Imaging System) and SAR-GPR (Synthetic Aperture Radar-Ground Penetrating Radar). ALIS is a novel landmine detection sensor system combined with a metal detector and GPR. This is a hand-held equipment, which has a sensor position tracking system, and can visualize the sensor output in real time. In order to achieve the sensor tracking system, ALIS needs only one CCD camera attached on the sensor handle. The CCD image is superimposed with the GPR and metal detector signal, and the detection and identification of buried targets is quite easy and reliable. Field evaluation test of ALIS was conducted in December 2004 in Afghanistan, and we demonstrated that it can detect buried antipersonnel landmines, and can also discriminate metal fragments from landmines. SAR-GPR (Synthetic Aperture Radar-Ground Penetrating Radar) is a machine mounted sensor system composed of B GPR and a metal detector. The GPR employs an array antenna for advanced signal processing for better subsurface imaging. SAR-GPR combined with synthetic aperture radar algorithm, can suppress clutter and can image buried objects in strongly inhomogeneous material. SAR-GPR is a stepped frequency radar system, whose RF component is a newly developed compact vector network analyzers. The size of the system is 30cm x 30cm x 30 cm, composed from six Vivaldi antennas and three vector network analyzers. The weight of the system is 17 kg, and it can be mounted on a robotic arm on a small unmanned vehicle. The field test of this system was carried out in March 2005 in Japan.