• Title/Summary/Keyword: Id-1

Search Result 1,043, Processing Time 0.03 seconds

The secured mobile wallet system using by integrated ID (통합 아이디를 이용한 안전한 모바일 월렛 시스템)

  • Nam, Choon-Sung;Jeon, Min-Kyung;Shin, Dong-Ryeol
    • Journal of Internet Computing and Services
    • /
    • v.16 no.1
    • /
    • pp.9-20
    • /
    • 2015
  • Nowadays, Smart Wallet technology trend that is able to save users' consuming costs and also retain users' redundant behaviors such as Single-tapping, One-way communication, Integrated ID, has been issued in recent Mobile Industrial Fields. As one of Smart Wallet functions, Integrated ID is proposed for users' convenience, handiness, and immediate responses. It is designed for the effective management of users' IDs which are easy to be forgot because of its unusual structures. To be detail, instead of user, Integrated ID system can certificate users identification from various online sites (where user resisted) authorization requests via one-clicking, not putting identification data in each sites. So, this technology would be helpful much to a certain user who has lots ID and its Password in multiple Online shopping companies by establishing integrated ID. However, although Integrated ID has lots advantages to be used, most Mobile Service Companies has hesitated to apply Integrated ID service in their shopping systems because this technology requires them sharing their users' data. They have worried that this service would be not helpful to gain their profits. Furthermore, Users who join in multiple shopping companies and use Integrated ID services also are difficult to decide which company they have to save their points in before payment because this system could not show any financial benefit analysis data to their users. As following facts, via this paper majorly we propose the advanced Integrated ID system which concern shopping point management. Basically, this system has a strong security payment service and secure network services like other mobile Shopping systems. Additionally, this system is able to service (or to support) shopping -point -saving guide for customers' financial benefits and conveniences.

Efficient Tag Authentication Scheme using Tag ID Identification Bits in RFID Environment (RFID 환경에서 태그 ID의 식별 비트를 이용한 효율적인 태그 인증 기법)

  • Jang, Bong-Im;Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Cheol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.1
    • /
    • pp.195-202
    • /
    • 2011
  • RFID(Radio Frequency IDentification) is a system to identify objects and its usage is being extended to distribution, healthcare, and air&port etc. RFID is a contactless system environment, and reducing tag authentication time is important because multiple tags are identified at the same time. Studies about RFID system so far is, however, mostly to improve security vulnerability in the tag authentication process. Therefore, this paper suggests an efficient scheme to decrease the time of tag authentication which is also safe for the security of tag authentication process. The proposed scheme cuts down on the tag ID search time because it searches only the classified relevant ID in the database, which is one of many components of RFID system, by using identification bits for tag ID search. Consequently, the suggested scheme decreases process time for tag ID authentication by reducing the processing time and the load of the database. It also brings performance improvement of RFID system as it improves the energy applicability of passive tag.

Construction of Hyperledger Fabric based Decentralized ID System (하이퍼레저 패브릭 기반 탈중앙화 신원 인증 시스템 구축)

  • Kwang-Man Ko
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.17 no.1
    • /
    • pp.47-52
    • /
    • 2024
  • Through the coronavirus pandemic, research on the use and advancement of blockchain-based decentralized identity authentication (Decentralized ID) technology is being actively conducted in various fields, centered on the central government, local governments, and private businesses. In this paper, we introduce the results of development based on Hyperledger Fabric to change the existing central server-based identity authentication to a decentralized one. These development results can strengthen the security and transparency of identity authentication systems for commercial purposes and provide stable services for user ID issuance, inquiry, and disposal. In addition, the decentralized identity authentication system verified performance results of DID creation of 262,000 rps and DID inquiry of 1,850 rps, DID VP creation of 200 rps, and DID VP inquiry of 220 rps or less through public authentication.

Analysis of Inadvertent Intradiscal Injections during Lumbar Transforaminal Epidural Injection

  • Hong, Ji Hee;Lee, Sung Mun;Bae, Jin Hong
    • The Korean Journal of Pain
    • /
    • v.27 no.2
    • /
    • pp.168-173
    • /
    • 2014
  • Background: Recently, there have been several case reports and retrospective studies about the incidence of intradiscal (ID) injection during transforaminal epidural steroid injection (TFESI). Inadvertent ID injection is not a rare complication, and it carries the risk of developing diskitis, although there has been no report of diskitis after TFESI. We prospectively evaluated the incidence of inadvertent ID injection during lumbar TFESI and analyzed the contributing factors. Methods: Ten patients received 2-level TFESI, and the remaining 229 patients received 1-level TFESI. When successful TFESI was performed, 2 ml of contrast dye was injected under real-time fluoroscopy to check for any inadvertent ID spread. A musculoskeletal radiologist analyzed all magnetic resonance images (MRIs) of patients who demonstrated inadvertent ID injection. When reviewing MRIs, the intervertebral foramen level where ID injection occurred was carefully examined, and any anatomical structure which narrowing the foramen was identified. Results: Among the 249 TFESI, we identified 6 ID injections; thus, there was an incidence of 2.4%. Four patients had isthmic spondylolisthesis, and the level of spondylolisthesis coincided with the level of ID injection. We further examined the right or left foramen of the spondylolisthesis level and identified the upward migrated disc material that was narrowing the foramen. Conclusions: Inadvertent ID injection during TFESI is not infrequent, and pain physicians must pay close attention to the type and location of disc herniation.

Indigenous Fungivorous Nematodes Affect the Biocontrol Efficacy of Trichoderma harzianum through Reducing the Hyphal Density

  • Kim, Tae Gwan;Knudsen, Guy R.
    • Journal of Microbiology and Biotechnology
    • /
    • v.31 no.6
    • /
    • pp.815-822
    • /
    • 2021
  • Indigenous fungus-feeding nematodes may adversely affect the growth and activity of introduced biocontrol fungi. Alginate pellets of the biocontrol fungus Trichoderma harzianum ThzID1-M3 and sclerotia of the fungal plant pathogen Sclerotinia sclerotiorum were added to nonsterile soil at a soil water potential of -50 or -1,000 kPa. The biomass of ThzID1-M3, nematode populations, and extent of colonization of sclerotia by ThzID1-M3 were monitored over time. The presence of ThzID1-M3 increased the nematode population under both moisture regimes (p < 0.05), and fungivores comprised 69-75% of the nematode population. By day 5, the biomass of ThzID1-M3b and its colonization of sclerotia increased and were strongly correlated (R2 = 0.98), followed by a rapid reduction, under both regimes. At -50 kPa (the wetter of the two environments), fungal biomass and colonization by ThzID1-M3 were less, in the period from 5 to 20 days, while fungivores were more abundant. These results indicate that ThzID1-M3 stimulated the population growth of fungivorous nematodes, which in turn, reduced the biocontrol ability of the fungus to mycoparasitize sclerotia. However, colonization incidence reached 100% by day 5 and remained so for the experimental period under both regimes, although hyphal fragments disappeared by day 20. Our results suggest that indigenous fungivores are an important constraint for the biocontrol activity of introduced fungi, and sclerotia can provide spatial refuge for biocontrol fungi from the feeding activity of fungivorous nematodes.

Decreased Expression of Inhibitor of DNA-binding (Id) Proteins and Vascular Endothelial Growth Factor and Increased Apoptosis in Ovarian Aging

  • Park, Min Jung;Park, Sea Hee;Moon, Sung Eun;Koo, Ja Seong;Moon, Hwa Sook;Joo, Bo Sun
    • Development and Reproduction
    • /
    • v.17 no.1
    • /
    • pp.17-24
    • /
    • 2013
  • This study examined the expression of inhibitor of DNA-binding (Id) proteins and vascular endothelial growth factor (VEGF) in the ovary according to female age using a mice model as the first step in investigating the potential role of Ids and VEGF in ovarian aging. C57BL inbred female mice of three age groups (6-9, 14-16, and 23-26 weeks) were injected with 5 IU pregnant mare's serum gonadotropin (PMSG) in order to synchronize the estrus cycle. After 48 h, ovarian expression of Ids and VEGF was analyzed by reverse transcriptase-polymerase chain reaction (RT-PCR), western blot and immunohistochemistry. Ovarian apoptosis was examined by ovarian expression of Bcl-2 and Bcl-xL. Expression of Id-1 and VEGF was decreased with advancing female age, but not Id-2, Id-3, and Id-4. In particular, their expressions were significantly decreased in aged mice of 23-26 weeks compared with the young mice of 6-9 weeks (p < 0.05). In contrast, ovarian apoptosis was greatly increased in the aged mice compared to the young mice. This result suggests that Id-1 may have an implicated role in ovarian aging by associating with VEGF.

LATERAL CEPHALOMETRIC ANALYSIS OF ASYMPTOMATIC VOLUNTEERS AND SYMPTOMATIC PATIENTS WITH TEMPOROMANDIBULAR INTERNAL DERANGEMENT (악관절 내장증 환자와 정상인의 두부방사선규격사진의 분석비교)

  • Shin, Sang-Hun;Park, Sung-Jin
    • Journal of the Korean Association of Oral and Maxillofacial Surgeons
    • /
    • v.25 no.4
    • /
    • pp.330-336
    • /
    • 1999
  • Study of dentofacial structure relationships relative to TMJ internal derangement is required to increase the predictability of TMJ internal derangement. But few studies have been reported. The purpose of this study is to reveal any correlation of dentofacial characteristics with TMJ internal derangement by lateral cephalometric analysis. Patients were devided into two groups. (1) Symptomatic patients with TMJ internal derangement (2) Asymptomatic volunteers with no TMJ internal derangement. Twenty symptomatic patients with TMJ internal derangement(7male, 13female) were selected from our clinic and had undergone a standarized clinical examination, panorama, transcranical view, TMJ tomography. Twenty asymptomatic volunteers(9male, 11female) were selected from our clinic with no pain, no limitation of motion. All subjects had undergone lateral cephalometric analysis. The results were obtained as follows. 1. No significant difference between ID and normal group is detected in cranial base. 2. Maxilla position of ID group is located more posterioly than normal group. 3. Mandible position of ID group is located more posteriorly than normal group and facial profile is hyperdivergent. 4. Posterior facial height of ID group is less than normal group thus facial profile is hyperdivergent. The patients, as mentioned, have a high prevalance of ID thus it should be careful in TMJ ID diagnosis and treatment.

  • PDF

Privacy-Preserving ID-based Service in Anonymity-based Ubiquitous Computing Environment (익명기반 유비쿼터스 환경의 프라이버시 보장 ID기반 서비스)

  • Kim Hak-Joon;Hwang Kyoung-Soon;Lee Keon Myung
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.15 no.1
    • /
    • pp.65-68
    • /
    • 2005
  • Privacy preservation is crucial in ubiquitous computing environment in which lots of privacy- sensitive information can be collected and distributed without appropriate control. The anonymity-based approach is a famous one used for privacy preservation communication, which allows users to use pseudonyms instead of real ID so as not to reveal their identities. This approach is effective in that it can hide the identity of users. However, it makes it difficult to provide ID-based services like buddy service, dangerous area alert, P2P communication in the ubiquitous computing. We proposes a system architecture which enables ID-based services in the ubiquitous computing environment employing anonymity - based privacy - preserving approach.

An ID-based entity-authentication and authenicated key exchange protocol with ECDSA (ECDSA를 적용한 ID 기반의 사용자 인증 및 키 교환 프로토콜)

  • 박영호;박호상;정수환
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.1
    • /
    • pp.3-10
    • /
    • 2002
  • This paper proposes an ID-based entity-aunthentication and authenticated key exchange protocol with ECC via two-pass communications between two parties who airs registered to the trusted third-party KC in advance. The proposed protocol developed by applying ECDSA and Diffie-Hellman key exchange scheme to the ID-based key distribution scheme over ECC proposed by H. Sakazaki, E. Okamoto and M. Mambo(SOM scheme). The security of this protocol is based on the Elliptic Curve Discrete Logarithm Problem(ECDLP) and the Elliptic Curve Diffie-Hellman Problem(ECDHP). It is strong against unknown key share attack and it provides the perfect forward secrecy, which makes up for the weakness in SOM scheme,

Differential Selection by Nematodes of an Introduced Biocontrol Fungus vs. Indigenous Fungi in Nonsterile Soil

  • Kim, Tae Gwan;Knudsen, Guy R.
    • Journal of Microbiology and Biotechnology
    • /
    • v.28 no.5
    • /
    • pp.831-838
    • /
    • 2018
  • Trophic interactions of introduced biocontrol fungi with soil animals can be a key determinant in the fungal proliferation and activity. This study investigated the trophic interaction of an introduced biocontrol fungus with soil nematodes. The biocontrol fungus Trichoderma harzianum ThzID1-M3 and the fungivorous nematode Aphelenchoides sp. (10 per gram of soil) were added to nonsterile soil, and microbial populations were monitored for 40 days. Similar results were obtained when the experiment was duplicated. ThzID1-M3 stimulated the population growth of indigenous nematodes (p < 0.05), regardless of whether Aphelenchoides sp. was added. Without ThzID1-M3, indigenous nematodes did not increase in number and the added Aphelenchoides sp. nematodes almost disappeared by day 10. With ThzID1-M3, population growth of nematodes was rapid between 5 and 10 days after treatment. ThzID1-M3 biomass peaked on day 5, dropped at day 10, and then almost disappeared at day 20, which was not influenced by the addition of nematodes. In contrast, a large quantity of ThzID1-M3 hyphae were present in a heat-treated soil in which nematodes were eliminated. Total fungal biomass in all treatments peaked on day 5 and subsequently decreased. Addition of nematodes increased the total fungal biomass (p < 0.05), but ThzID1-M3 addition did not affect the fungal biomass. Hyphae of total fungi when homogenously distributed did not support the nematode population growth; however, hyphae of the introduced fungus did when densely localized. The results suggest that soil fungivorous nematodes are an important constraint on the hyphal proliferation of fungal agents introduced into natural soils.