• Title/Summary/Keyword: Enhanced System Security

Search Result 250, Processing Time 0.03 seconds

An Implementation of Smart Card Identification System Using 1 vs. 1 Fingerprint Matching (1대1 지문매칭을 이용한 스마트 카드 인증 시스템의 구현)

  • 최순우;김영길
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.5 no.7
    • /
    • pp.1204-1209
    • /
    • 2001
  • According to the rapid development of information and communication, various services are offered using information and communication infrastructure for example e-commerce, internet banking, stock dealings, etc. This time, the most important problem is personal identification. But now secret number that is used to personal identification mostly can be misappropriated. To solve this problem, this paper proposes smart card identification system using 1 vs. 1 fingerprint matching. Information protection and security of smart card excel and use is convenient. And fingerprint becomes the focus of public attention in biometric field. Implemented system in this paper is based on PC. This system stores minutia that is fingerprint information into smart card and compare it with personal minutia. Therefore this system is sure to be on personal identification. If this system is applied to various services, safety degree of services will be enhanced.

  • PDF

Implementation of Smart Card Identification System Using 1 vs. 1 Fingerprint Matching (1대1 지문매칭을 이용한 스마트 카드 인증 시스템의 구현)

  • 최순우;김영길
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.10a
    • /
    • pp.517-520
    • /
    • 2001
  • According to the rapid development of information and communication, various services are offered using information and communication infrastructure for example e-commerce, internet banking stork dealings, etc. This time, the most important problem is personal identification. But now secret number that is used to personal identification mostly can be misappropriated. To solve this problem, this paper proposes smart card identification system using 1 vs. 1 fingerprint matching. Information protection and security of smart card excel and use is convenient. And fingerprint becomes the focus of public attention in biometric field. Implemented system in this paper is based on PC. This system stores minutia that is fingerprint information into smart card and compare it with personal minutia. Therefore this system is sure to be on personal identification. If this system is applied to various services, safety degree of services will be enhanced.

  • PDF

Action Plan of Security Service against a Fire case in a Tall Building Event (경호행사시 초고층건물 화재 대응방안)

  • Son, Kyung-Hwan
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.37-61
    • /
    • 2014
  • Nowadays the world is threatened because of terrors that take aim at Soft-Targets available and easy to access to the people rather than more secured Hard-Targets. The inspection department of the Presidential Security Service develops and acts a perfect safety plan wherever the President stays so that it is possible to get immediate actions for various contingencies. Some events, in which the President take part, could be held in a lower or higher store in a tall building. Additional to the routine work at this case it is to emphasize on a plan of fire precaution to check the spot and respond to a real fire situation, so that the damage could be minimized. First, the agents of the President Security Service should possess basic knowledge concerning to the fire accidents and be trained on their manuals, even in a busy events plan. An organization, whatever it is, could be improved in that it tries to develop not only the personal abilities, but also education programs of the organization continually. And enhanced abilities of the members lead to the driving force for the advance. The knowledge of fire accident should be able to adapt to the real situation. Second, related to the event, it should be cooperated with the relevant departments, so that it is possible to conduct and control the system. It is urgently required to know that the security event could not be done perfectly with only one part or department. Third, from the time of recognizing of the event it is necessary for the fire department to get an action plan with fire fighting measures, evacuation measures based of the instructions given by the Security Service. Fourth, on the knowledge of the action plan of the fire department the Security Service should inspect the safety activities of the spot and establish the practical operation plan through the fire fighting and evacuation plan. Fifth, the Security Service should share final informations and plan of fire fighting in a high-rise building with the other relevant departments. If not, it could cause a great confusion that could lead to a great damage.

  • PDF

mVoIP Vulnerability Analysis And its Countermeasures on Smart Phone (스마트폰에서 mVoIP 취약성 분석 및 대응 방안)

  • Cho, Sik-Wan;Jang, Won-Jun;Lee, Hyung-Woo
    • Journal of the Korea Convergence Society
    • /
    • v.3 no.3
    • /
    • pp.7-12
    • /
    • 2012
  • mVoIP (mobile Voice over Internet Protocol) service is a technology to transmit voice data through an IP network using mobile device. mVoIP provides various supplementary services with low communication cost. It can maximize the availability and efficiency by using IP-based network resources. In addition, the users can use voice call service at any time and in any place, as long as they can access the Internet on mobile device easily. However, SIP on mobile device is exposed to IP-based attacks and threats. Observed cyber threats to SIP services include wiretapping, denial of service, and service misuse, VoIP spam which are also applicable to existing IP-based networks. These attacks are also applicable to SIP and continuously cause problems. In this study, we analysis the threat and vulnerability on mVoIP service and propose several possible attack scenarios on existing mobile VoIP devices. Based on a proposed analysis and vulnerability test mechanism, we can construct more enhanced SIP security mechanism and stable mobile VoIP service framework after eliminating its vulnerability on mobile telephony system.

Investigations into a Multipurpose Dam in Tasman District-New Zealand

  • Thomas, Joseph Theodore
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2008.05a
    • /
    • pp.40-48
    • /
    • 2008
  • The Waimea Basin is located on the northern tip of the South Island of New Zealand. It is a highly productive area with intense water use with multi-stakeholder interest in water. Irrigation from the underground aquifers here makes up the largest portion of used water; however the same aquifers are also the key urban and industrial sources of water. The Waimea/Wairoa Rivers are the main sources of recharge to the underlying aquifers and also feed the costal springs that highly valued by the community and iwi. Due to the location of the main rivers and springs close to the urban centre the water resource system here has high community and aesthetic values. Recent enhanced hydrological modelling work has shown the water resources in this area to be over allocated by 22% for a 1:10 year drought security for maintaining a minimalistic flow of 250 l/s in the lower Waimea River. The current irrigated land area is about 3700 hectares with an additional potential for irrigation of 1500 hectares. Further pressures are also coming on-line with significant population growth in the region. Recent droughts have resulted in significant water use cutbacks and the threat of seawater intrusion in the coastal margins. The Waimea Water Augmentation Committee (WWAC) initiated a three year stage 1 feasibility study in 2004/2005 into the viability of water storage in the upper parts of the catchment for enhancing water availability and its security of supply for consumptive, environmental, community and aesthetic benefits downstream. The project also sought to future proof water supply needs for the Waimea Plains and the surrounding areas for a 50 - 100 year planning horizon. The broad range stage 1 investigation programme has identified the Upper Lee Catchment as being suitable for a storage structure to provide the needs identified and also a possibility for some small scale hydro electricity generation as well. The stage 2 detailed feasibility investigations that are underway now (2007/2008), and to be completed in two years is to provide all details for progressing with the next stage of obtaining necessary permits for construction and commissioning a suitable dam.

  • PDF

A Design of Lightweight RFID Authentication Protocol Errors Correction Using Re-Counter (재카운터를 이용해 오류를 수정하는 경량화 RFID 인증 프로토콜 설계)

  • OH, Gi-Oug
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.4
    • /
    • pp.149-157
    • /
    • 2011
  • Passive tags are inferior to active tags in processing efficiency, so they have difficulty in largevolume processing. The proposed protocol reduces the volume of computation in passive tags and, at the same time, improves authentication for enhanced safety and security. That is, different from existing RFID protocols that return the same value even if an error happens when the reader reads a tag, the improved RFID security protocol returns a new value using a re-counter and processes the computation part of a tag in the reader or in a back.end system. Even if the information of a tag is acquired by an malicious way, it is not actual information but encrypted information that is not usable. In addition, even if tag information is read in sequence, it is changed in each read, so the protocol is safe from Location Tracking.

Design and Implementation of the Sinkhole Traceback Protocol against DDoS attacks (DDoS 공격 대응을 위한 Sinkhole 역추적 프로토콜 설계 및 구현)

  • Lee, Hyung-Woo;Kim, Tae-Su
    • Journal of Internet Computing and Services
    • /
    • v.11 no.2
    • /
    • pp.85-98
    • /
    • 2010
  • An advanced and proactive response mechanism against diverse attacks on All-IP network should be proposed for enhancing its security and reliability on open network. There are two main research works related to this study. First one is the SPIE system with hash function on Bloom filter and second one is the Sinkhole routing mechanism using BGP protocol for verifying its transmission path. Therefore, advanced traceback and network management mechanism also should be necessary on All-IP network environments against DDoS attacks. In this study, we studied and proposed a new IP traceback mechanism on All-IP network environments based on existing SPIE and Sinkhole routing model when diverse DDoS attacks would be happen. Proposed mechanism has a Manager module for controlling the regional router with using packet monitoring and filtering mechanism to trace and find the attack packet's real transmission path. Proposed mechanism uses simplified and optimized memory for storing and memorizing the packet's hash value on bloom filter, with which we can find and determine the attacker's real location on open network. Additionally, proposed mechanism provides advanced packet aggregation and monitoring/control module based on existing Sinkhole routing method. Therefore, we can provide an optimized one in All-IP network by combining the strength on existing two mechanisms. And the traceback performance also can be enhanced compared with previously suggested mechanism.

Design of Mobile-based Security Agent for Contents Networking in Mixed Reality (융합현실에서 콘텐츠 네트워킹을 위한 모바일 기반 보안 중계 설계)

  • Kim, Donghyun;Lim, Jaehyun;Kim, Seoksoo
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.3
    • /
    • pp.22-29
    • /
    • 2019
  • Due to the development of ICT technology, convergence reality contents are utilized as technology for providing services in various industrial fields by visualizing various information such as sensor information and shared information in a service platform showing only simple three-dimensional contents. Research is underway to reduce the weight of applications by transmitting the resources of the object to be enhanced to the network as the information and the contents to be provided increase. In order to provide resources through the network, servers for processing various information such as pattern information, content information, and sensor information must be constructed in a cloud environment. However, in order to authenticate data transmitted and received in real-time in a cloud environment, there is a problem in that the processing is delayed and a delay phenomenon occurs in the rendering process and QoS is lowered. In this paper, we propose a system to distribute cloud server which provides augmented contents of convergent reality service that provides various contents such as sensor information and three - dimensional model, and shorten the processing time of reliable data through distributed relay between servers Respectively.

Profile Management System for Contact Information Privacy in Social Network Service (소셜 네트워크 서비스에서 사용자 연락정보 프라이버시 강화를 위한 개인 프로필 관리 시스템 연구)

  • Youn, Taek-Young;Hong, Do-Won
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.5
    • /
    • pp.141-148
    • /
    • 2011
  • Recently, various social network services have been grown. Among them, personal relationships based social network services such as Facebook and Twitter make a remarkable growth of industry. In such services, users' profiles are very important for establishing the relationship between two users. However some information in a user's profile causes the leakage of the user's privacy, and thus we have to deal with the information in the profile. Especially, we have to treat contact information, such as the phone number and the e-mail address, very carefully since an adversary can use the information to violate the user's privacy in real life. In this paper, we propose two profile management systems that can enhance the privacy of users in social network services. We compare our systems with existing profile management techniques in well-known social network services such as Facebook and Twitter, and show that our systems provide enhanced privacy.

Diabetes Detection and Forecasting using Machine Learning Approaches: Current State-of-the-art

  • Alwalid Alhashem;Aiman Abdulbaset ;Faisal Almudarra ;Hazzaa Alshareef ;Mshari Alqasoumi ;Atta-ur Rahman ;Maqsood Mahmud
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.10
    • /
    • pp.199-208
    • /
    • 2023
  • The emergence of COVID-19 virus has shaken almost every aspect of human life including but not limited to social, financial, and economic changes. One of the most significant impacts was obviously healthcare. Now though the pandemic has been over, its aftereffects are still there. Among them, a prominent one is people lifestyle. Work from home, enhanced screen time, limited mobility and walking habits, junk food, lack of sleep etc. are several factors that have still been affecting human health. Consequently, diseases like diabetes, high blood pressure, anxiety etc. have been emerging at a speed never witnessed before and it mainly includes the people at young age. The situation demands an early prediction, detection, and warning system to alert the people at risk. AI and Machine learning has been investigated tremendously for solving the problems in almost every aspect of human life, especially healthcare and results are promising. This study focuses on reviewing the machine learning based approaches conducted in detection and prediction of diabetes especially during and post pandemic era. That will help find a research gap and significance of the study especially for the researchers and scholars in the same field.