• Title/Summary/Keyword: ID Card

Search Result 130, Processing Time 0.03 seconds

A Study on the Design and Implementation of Algorithm for Next Generation Cyber Certificate Security (차세대 사이버 인증 보안을 위한 알고리즘의 설계 및 구현에 관한 연구)

  • Lee, Chang-Jo;Kim, Sang-Bok
    • Convergence Security Journal
    • /
    • v.6 no.3
    • /
    • pp.69-78
    • /
    • 2006
  • ID security policy is generally formulated from the input of many members of an organization, including security officials, line managers, and ID resource specialists. However, policy is ultimately approved and issued by the organization's senior management. In environments where employees feel inundated with policies, directives, guidelines and procedures, an ID security policy should be introduced in a manner that ensures that management's unqualified support is clear. This paper will discuss Next Generation Cyber Certificate security policy in terms of the different types program-level and issue-specific, components, and Design and Implementation of Security Algorithm Simulation based on 4GL, PowerBuilder7.0.

  • PDF

Development of Automatic Data Transmitting System of Arterial Blood Gas Results via Local Area Network( LAN) (LAN을 이용한 혈액가스 검사결과 전송시스템)

  • 김남현;김원기
    • Journal of Biomedical Engineering Research
    • /
    • v.14 no.4
    • /
    • pp.327-332
    • /
    • 1993
  • Automatic transmission of data from the blood analyzer to the request site is one of the most important part in hospital computerization. We have developed a system that transmits data from the arterial blood gas analyzer to the request site automatically In this system HOST computer, FILE server,'LAN(Local Area Network) , 3270 Emulator and bfulti-port card are integrated with 3 blood gas analyzers(NOVA Inc., USA) which are connected to a single multi-port card in a personal computer. When specimen are collected from tramp)inly sites, they are transferee to the laboratory In the Yonsei Cardiovascular Center After analysis, the result is transmitted to the personal computer via serial commnunication between machine and multi-port card using interrupt method. Then, the patient's information (Name, Patient ID No., etc.) is obtained from the HOST computer througth the emulator. The combined data (patient information & lab data) is transmitted to each request site via LAN automatically These results are stored in the File Server for one year and they can be reviewed anytime. Also, it could be used for the various statistics and the flow chart for clinical research. Additionally, we found thal this system reduces the personal labor.

  • PDF

Design Flaws and Cryptanalysis of Cui et al's User Authentication Scheme

  • Park, Mi-Og
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.10
    • /
    • pp.41-48
    • /
    • 2019
  • In 2018, Cui et al proposed a three-factor remote user authentication scheme using biometrics. Cui et al claimed that their authentication scheme is vulnerable to eavesdropping attack, stolen smart card attack, and especially Dos(denial-of-service) attack. Also they claimed that it is safe to password guessing attack, impersonation attack, and anonymity attack. In this paper, however, we analyze Cui et al's authentication scheme and show that it is vulnerable to replay attack, insider attack, stolen smart card attack, and user impersonation attack, etc. In addition, we present the design flaws in Cui et al's authentication scheme as well.

Automatic Reporting System through ID Number Recognition at ID Card Image (주민등록증 이미지의 숫자 인식을 통한 보고서 자동 기입 시스템)

  • Lea, Jong-Ho
    • Annual Conference on Human and Language Technology
    • /
    • 2002.10e
    • /
    • pp.57-61
    • /
    • 2002
  • 대부분의 공문서들이 주민등록증에 기입된 정보들을 반복적으로 기입하도록 요구하는 경우가 많다. 자동으로 주민 정보들을 기입하기 위해서 기계적으로 해독 가능한 정보로는 현재 주민등록증의 이미지만이 가능하다. 본 연구에서는 주민등록증을 스캐닝해서 얻은 이미지에서 주민번호를 추출하여, 개인신용정보의 조회나 반복적인 서류 작성에 개인정보들이 자동으로 기입되는 시스템을 개발하였다. 주민증의 이미지에는 사진과 위조 방지 문양, 그리고 성명, 주소, 주민번호 등의 문자 정보들이 들어있는데, 이 중에서 주민번호 숫자만 추출하였다. 이렇게 인식된 주민번호를 이용해서, 전산화가 되어 있는 주민 정보와의 대조를 할 수 있게 하였고, 개인 정보들을 XML로 정리하여 각종 문서 양식에 자동으로 기입될 수 있도록 하였다. 위조방지문양과 스캐너의 잡음 등에 기인한 왜곡을 해소하기 위해, 히스토그램 기법을 이용하여 숫자영역을 분리하고, 이진화한 다음, 특징점(끝점, 교차점, 분기점)의 정보와 ART1를 사용하여 숫자들을 분류하였다.

  • PDF

A Study on Improving Subway Crowding Based on Smart Card Data : a Focus on Early Bird Policy Alternative (교통카드 자료를 활용한 지하철 혼잡도 개선 연구 : Early Bird 정책대안을 중심으로)

  • Lee, Sang Jun;Shin, Sung Il
    • Journal of Information Technology Services
    • /
    • v.19 no.2
    • /
    • pp.125-138
    • /
    • 2020
  • Currently, subway crowding is estimated by observing a specific point at specific hours once or twice every 1 or 2 years. Given the extensive subway network in Seoul Metropolitan Area covering 588 stations, 11 lines and 80 transfer stations as of 2017, implementing crowding mitigation policy may have its limitations due to data uncertainty. A proposal has recently been made to effectively use smart card data, which generates big data on the overall subway traffic related to an estimated 8 million passengers per day. To mitigate subway crowding, this study proposes two viable options based on data related to smart card used in Seoul Metropolitan Area. One is to create a subway passenger pattern model to accurately estimate subway crowding, while the other is to prove effectiveness of early bird policy to distribute subway demand that is concentrated at certain stations and certain time. A subway passenger pattern model was created to estimate the passenger routes based on subway terminal ID at the entrance and exit and data by hours. To that end, we propose assigning passengers at the routes similar to the shortest routes based on an assumption that passengers choose the fastest routes. In the model, passenger flow is simulated every minute, and subway crowding level by station and line at every hour is analyzed while station usage pattern is identified by depending on passenger paths. For early bird policy, highly crowded stations will be categorized based on congestion level extracted from subway passenger pattern model and viability of a policy which transfers certain traveling demands to early commuting hours in those stations will be reviewed. In particular, review will be conducted on the impact of policy implemented at certain stations on other stations and lines from subway network as a whole. Lastly, we proposed that smart card based subway passenger pattern model established through this study used in decision making process to ensure effective implementation of public transport policy.

Access Control of Pay TV Program in Digital Satellite Broadcasting System (디지털 위성방송 시스템에서 유료 TV방송 프로그램 접근제어)

  • Park, Jeong-Hyun;Lee, Sang-Ho
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.12
    • /
    • pp.3123-3132
    • /
    • 1997
  • In this paper, we describe access control system for protection of pay TV program in digital DBS(Direct Broadcast satellite) system. We also propose a possible access control system and operation scenario for scrambling and descrambling which are important in access control system. Transport stream structure and option, entitlement checking message and entitlement management message for access control on digital broadcasting system are described in this paper. Especially, the authentication based on Flat-Shamir and Gulllou-Quisquater schemes required for verification of proper subscriber as access control is oriented to smart card number and subscriber ID(Identity). It has less restriction than scheme oriented to descrambler number.

  • PDF

The Algorithm Implementation Of One′s own Verification Using National ID Card and Fingerprint (주민등록증과 지문을 이용한 본인확인 알고리즘 구현)

  • 방걸원;조완현;김병기
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2002.05d
    • /
    • pp.585-589
    • /
    • 2002
  • 본 논문은 주민등록증의 정보와 본인 생체 지문으로 본인임을 확인하는 알고리즘을 제안한다. 기존의 본인 확인 방법은 주민등록증의 사진과 실물사진을 육안으로 판별한다. 이러한 판별 방법의 문제점은 주민등록증 발급 시의 사진과 현재의 본인 얼굴과의 차이점이 많을 때 본인임에도 판별이 불가능한 경우도 발생하고 주민등록중의 훼손으로 판별이 불가능할 수 가 있다. 이러한 단점을 본 알고리즘에서는 생체인식기술인 지문인식과 문자인식기술을 접목하여 주민등록상의 지문이미지와 지문입력기에서 입력받은 생체지문을 비교판별하고 주민등록증 발급 시 입력한 지문과도 비교 판별함으로써 보다 확실한 본인 확인방법을 제공한다.

  • PDF

Design and Analysis of RF Smart Card System (RF-ID 스마트 카드 시스템의 설계 및 분석)

  • 양경록;진인수;류형선;김양모
    • Proceedings of the IEEK Conference
    • /
    • 2000.06e
    • /
    • pp.203-206
    • /
    • 2000
  • Depending upon the existence of the battery, transponder is divided into active and passive transponder. The passive transponder operates without the inner battery and so has no limitation in its operating range and life time. But the power consumption in the smartcard should be low. In this paper, the analysis and design of the passive smartcard system oerated at 125kHz is presented and is confirmed by simulation and experiment.

  • PDF

Bio Profiler using Smart Card File management System (바이오 프로파일러를 이용한 스마트카드 파일 매니지먼트 시스템)

  • Kyung, Jin-Hui;Cho, Dong-Sub
    • Annual Conference of KIPS
    • /
    • 2005.11a
    • /
    • pp.611-614
    • /
    • 2005
  • 스마트카드는 현재 신분확인용 ID 카드, 교통, 신용카드, 위성방송 수신 카드 등 다양한 분야에 응용 되고 있다. 하지만 좀 더 개인의 생활에 밀접한 분야의 응용은 아직 부족한 현실이다. 본 논문은 다양한 분야에서 응용되고 있는 스마트카드를 개인의 신체정보를 이용하여 구입하고자 하는 물품의 구매에 도움을 주고자 하는 취지에서 연구하게 되었다.

  • PDF

Implementation of Embedded Biometrics Technologies : A Case of a Security Token for Fingerprints (임베디드 생체 인식 기술 구현 : 지문 보안 토큰 사례)

  • 김영진;문대성;반성범;정용화;정교일
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.40 no.6
    • /
    • pp.39-46
    • /
    • 2003
  • Biometric technologies using biometric information like fingerprints features are in wide use for the secure user authentication in many services including log-in of computer systems, entrance ID and E-commercial security. Nowadays, biometric technologies are ported into small embedded systems like security tokens or smart cards due to the merit of being secure and automatic in comparison with the previous method in user authentication such as using a PIN. In this paper, the security token developed as an embedded system and tile user authentication system implemented and tested using fingerprints information are described. Communications between the security token and tile host are tested and verified with USB. And, execution time and runtime memory on tile security token board was measured and performance improvement was described. In addition, requisites for the transit from the security token to the match-on-card was mentioned.