• Title/Summary/Keyword: Identity Verification

Search Result 133, Processing Time 0.048 seconds

Review of the suitability to introduce new identity verification means in South Korea : Focused on Block Chain and FIDO (우리나라의 본인확인수단에 관한 신규 인증수단의 도입 적합성 검토 : Block Chain과 FIDO를 중심으로)

  • Shin, Young-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.5
    • /
    • pp.85-93
    • /
    • 2018
  • This study investigates the suitability of the blockchain and FIDO among non-face-to-face authentication means in order to secure diversity of identfication means operated in South Korea. In order to do this, the study selected and analyzed seven conformance criteria (universality, persistence, uniqueness, convenience, security, applicability, and economics), and the results were appropriate. Accordingly, in order to apply the blockchain and FIDO as the identification means, the related regulations and notices should be revised to improve the identification procedure. In addition, differentiated certification standards should be established for each service field to apply various authentication means as well as existing identification means, and the authentication means should be continuously developed and linked with the service. In the future, the identification means will bring security of the information circulation environment in the IoT, so it should be implemented in a variety of services by supporting application of identification means.

Research Trends on Child Tea Ceremony Education (유아다례교육 연구의 동향분석)

  • Park, Young-Ja;Choi, Bae-Young
    • Journal of Family Resource Management and Policy Review
    • /
    • v.14 no.3
    • /
    • pp.143-163
    • /
    • 2010
  • The purpose of this study is to analyze the trend of research system and contents of thesis which was published with a theme of child tea ceremony education. Under this purpose we have searched the thesis related to the child tea ceremony education which was in the data base of the National Assembly Library, the National Library of Korea, Korea Education & Research Information Service and we have collected total of 22 analyzing subject data. The major results of this study are as followings: First, after analyzing the research system, the release year of child tea ceremony education study which was published from year 2000 to 2009 are shown as followings, 1 unit in year 2000, 2 units in year 2001, 2002 & 2003, 4 units in year 2004, 5 units in year 2005, 2 units in year 2006, 1 unit in year 2007, 2 units in year 2008, 1 unit in year 2009. The publishing type were 14 units of master's degree thesis, 6 units of academic journal, 2 units of doctor's degree thesis. The academic area of researchers are 8 units of propriety and tea culture, 5 units of early childhood education, 5 units of child welfare, 2 units of family culture and consumer, 1 each unit of counseling psychology and korean culture. As per the research method there were 15 units of experimental study, 6 units of reference research, and 1 unit of thesis which adopts both interview and case study. Second, as a result of analyzing the research contents, the goal of child tea ceremony education was shown to be a holistic child growth and development, a formation of basic living habit, a development of pride on traditional culture and an establishment of national identity. The contents of child tea ceremony education has been classified into 57 items. The activity of child tea ceremony education has been classified into 34 items. The vitalizations of child tea ceremony education is shown to be a education for parents and teachers, a development of systematic educational program, durability of child tea ceremony education, and a verification of effectiveness of child tea ceremony education.

  • PDF

Attribute-Based Signatures with DNF Policies (DNF 정책을 가지는 속성 기반 서명)

  • Lee, Kwang-Su;Hwang, Jung-Yeon;Kim, Hyoung-Joong;Lee, Dong-Hoon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.1
    • /
    • pp.78-87
    • /
    • 2009
  • An attribute-based signature scheme is a signature scheme where a signer's private key is associate with an attribute set and a signature is associated with an access structure. Attribute-based signature schemes are useful to provide anonymity and access control for role-based systems and attribute-based systems where an identity of object is represented as a set of roles or attributes. In this paper, we formally define the definition of attribute-based signature schemes and propose the first efficient attribute-based signature scheme that requires constant number of pairing operations for verification where a policy is represented as a disjunctive normal form (DNF). To construct provably secure one, we introduce a new interactive assumption and prove that our construction is secure under the new interactive assumption and the random oracle model.

An Exploratory Study on the Relationship between Country Image and the Evaluation of Fashion Products Influenced by the Ethnic Dress of Asians

  • Medvedev, Katalin;Lee, Yu-Ri;Choi, Yun-Jung
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.34 no.12
    • /
    • pp.2022-2038
    • /
    • 2010
  • Our study was designed to provide some insights on positive country image and the mechanisms of influence that Asian fashion industries can draw upon for future benefit. We focused on a country image and fashion products with Asian ethnic influence. Asian traditional costume elements reflected in contemporary fashion products may be important representative tools for national cultural identity. This study qualitatively investigated how and to what extent country image and additional information influence the evaluation of fashion products influenced by Chinese, Japanese, and Korean traditional dress. We conducted four focus-group interviews (FGI) with 30 students from a fashion program at a university in the United States. We analyzed the evaluation of fashion products influenced by Chinese, Japanese, and Korean traditional dress, and their associations with country image. Our qualitative analysis offered more developed empirical evidence for the various paths through which country image affects the evaluation of fashion products influenced by the ethnic dress of Asians. The results of our study showed that the more direct the source of prior knowledge, the larger the influence on product evaluation. This study showed that certain cues in the evaluation of fashion products with Asian ethnic influence induce changes in the affective state (that stem from the psychological and social nature of fashion products) and illustrate the necessity of considering the affective processes involved in the appropriate use of the country image. In the fashion industry, extrinsic properties such as the country image significantly influence the attitude and purchasing decisions of consumers. The significance of this study lies in its verification of the relationship between the country image and additional information. Modular and situational-contextual influences are also revealed as important factors that deserve more attention, as well as considerations regarding the dimensions of the country image described in attitude theory.

A Study on Premarital Adult of Sexuality (미혼성인남녀의 섹슈얼리티에 관한 기초연구)

  • 박수선;김명자
    • Journal of the Korean Home Economics Association
    • /
    • v.42 no.5
    • /
    • pp.53-76
    • /
    • 2004
  • This study conducted a survey on sexuality for the purpose of substantial verification, focusing on literature reviews of premarital sexuality. The Literature reviews included relevant studies of our society and its cultures such as premarital sexuality and behaviors, expressions of love or intimacy, contraception, abortion, sex education and sexuality in family contexts. The survey was conducted to 355 university students and 200 working premarital adults in Seoul, Gyeonggi and Gangwon areas. It has 21 questions to measure sexuality by sexual altitude sentence completion Scale (composed of 4 categories and options of the other items)which has been widely used by professional counsel institutes. Male and female students complete the sentence of this scale, then similar contents were classified. Love type test was developed by Hendrick & Hendrick (1986) was used to measure love and intimacy. Results from the sentence completion for sexuality attitudes are generally as follows: First of all, there was clear difference in male md female responses about each categories. For example, With regard to the questions on premarital sex with opposite sex friends of long time relationship, more than half of male students said it is all right, whereas more than half of female students answered to the same questions that it can never be possible, with many answering 'I don't know', or leaving them unanswered. The survey result, masturbation answered that Female is needed however many Females actually don't it. But Male is almost necessary and conduct himself. On questions regarding, Homosexuality is both male and Female answered opposed. These results of the study show that premarital adults clearly open to issues on sexuality compared with the past, but they have not established their own sexual identity, which can be seen with big gap between male and female perspectives, due to experiencing confusion under the changing environment of the society.

A study on speech disentanglement framework based on adversarial learning for speaker recognition (화자 인식을 위한 적대학습 기반 음성 분리 프레임워크에 대한 연구)

  • Kwon, Yoohwan;Chung, Soo-Whan;Kang, Hong-Goo
    • The Journal of the Acoustical Society of Korea
    • /
    • v.39 no.5
    • /
    • pp.447-453
    • /
    • 2020
  • In this paper, we propose a system to extract effective speaker representations from a speech signal using a deep learning method. Based on the fact that speech signal contains identity unrelated information such as text content, emotion, background noise, and so on, we perform a training such that the extracted features only represent speaker-related information but do not represent speaker-unrelated information. Specifically, we propose an auto-encoder based disentanglement method that outputs both speaker-related and speaker-unrelated embeddings using effective loss functions. To further improve the reconstruction performance in the decoding process, we also introduce a discriminator popularly used in Generative Adversarial Network (GAN) structure. Since improving the decoding capability is helpful for preserving speaker information and disentanglement, it results in the improvement of speaker verification performance. Experimental results demonstrate the effectiveness of our proposed method by improving Equal Error Rate (EER) on benchmark dataset, Voxceleb1.

Identity Verification in Financial Transactions Using a Stylus Pen (스타일러스 펜을 활용한 금융 거래에서의 본인 인증)

  • Kim, Hyun-Ji;Jang, Kyung-Bae;Kwon, Hyeok-Dong;Kim, Hyun-Jun;Seo, Hwa-Jeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.3
    • /
    • pp.379-388
    • /
    • 2020
  • As the use of credit cards increases, security threats increase. In particular, despite being vulnerable to related crimes, such as fraudulent use of credit cards and theft of names, there are virtually no security procedures to authenticate the validity of user while paying with the credit card. In order to overcome these limitations of current credit card payments, we add a process of signing payment using a stylus pen with built-in acceleration sensor in the existing transaction method, and classifying and comparing the image of the signature and signature information measured by the sensor through the convolutional neural network. we propose a method to improve security in financial transactions by performing the user authentication process through the possession of the stylus pen and the characteristic values of the signature.

User Authentication Mechanism using Smartphone (스마트폰을 이용한 사용자 인증 메커니즘)

  • Jeong, Pil-seong;Cho, Yang-hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.2
    • /
    • pp.301-308
    • /
    • 2017
  • With the popularization of smart phones and the development of the Internet, many people use smart phones to conduct identity verification procedures. smart phones are easier and faster to authenticate than personal desktop computers. However, as Internet hacking technology and malicious code distribution technology rapidly evolve and attack types become more diverse, authentication methods suitable for mobile environment are required. As authentication methods, there are methods such as possessive-based authentication, knowledge-based authentication, biometric-based authentication, pattern-based authentication, and multi-element authentication. In this paper, we propose a user authentication mechanism that uses collected information as authentication factor using smart phone. Using the proposed authentication mechanism, it is possible to use the smart phone information and environment information of the user as a hidden authentication factor, so that the authentication process can be performed without being exposed to others. We implemented the user authentication system using the proposed authentication mechanism and evaluated the effectiveness based on applicability, convenience, and security.

A Study on Establishment of Connecting Information Conversion Criteria for Mobile Electronic Notification Service of Private Institutions (민간기관 모바일 전자고지서비스를 위한 연계정보 변환기준 수립에 대한 연구)

  • Kim, JongBae
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.4
    • /
    • pp.735-743
    • /
    • 2021
  • The mobile electronic notice service (MENS) is a service that delivers a mobile electronic notice to a smartphone in the person's name through an authorized electronic document intermediary instead of a bill that was delivered by mail using paper. In order to provide the MENS, information is needed to identify the same user between the sending agency and the authorized electronic document relay. In this paper, we propose a standard for safe conversion and utilization of Connecting Information (CI) used as user identification information for MENS. In the proposed method, it is necessary for the requesting institution to send the electronic notice to provide the resident registration number to the identity verification institution and convert it into the CI. In this case, a safe and efficient MENS will be possible by proposing a review standard and processing method to verify the appropriateness of the conversion of CI. By applying the proposed method to the MENS, it can contribute to service activation and reinforcement of user privacy protection.

Autoencoder and Semi-Supervised GAN-based candidate identity verification system in qualifying examination (자격시험에서 오토인코더 및 Semi-Supervised GAN 기반의 응시자 본인 확인 시스템 제안)

  • Lim, Se-Jin;Kim, Hyun-Ji;Kang, Yea-Jun;Kim, Won-Woong;Song, Gyeong-Ju;Yang, Yu-Jin;Oh, Yu-Jin;Jang, Kyung-Bae;Seo, Hwa-Jeong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2021.11a
    • /
    • pp.659-662
    • /
    • 2021
  • 국내에서는 매년 많은 수의 자격시험이 치러지고 있다. 현재 대부분의 시험장에서 응시자 본인 확인 절차는 감독관이 응시자의 얼굴과 신분증 사진을 비교하는 방식으로 이루어진다. 하지만 이 방식은 사람에 따라 오차가 클 수 있으며, 사진과 눈에 띄는 차이가 없으면 동일인물로 판단하기 쉽다. 최근까지도 대리응시 이슈가 발생하고 있어 근절을 위한 보다 강력한 조치가 필요하다. 본 논문에서는 지문과 오토인코더, SGAN을 이용하여 대리응시방지를 강화할 수 있는 본인 확인 시스템을 제안한다. 이때 응시자의 지문정보가 그대로 인증 서버에 저장되면 응시자의 생체정보가 노출될 수 있다는 문제점이 존재한다. 따라서 오토인코더를 통해 지문의 특징점만 추출하여 인증용 이미지를 생성하고 이 이미지를 서버에 저장하여 학습시키도록 한다. 적은 학습데이터 환경에서 분류기로써 좋은 성능을 갖는 SGAN을 통해 인증 이미지와 응시자가 동일인물인지 확인할 수 있다. 서버가 공격을 받더라도 응시자의 지문데이터가 그대로 노출되지 않게 되어 보안 취약점을 극복할 수 있다.