• Title/Summary/Keyword: Identity Verification

Search Result 133, Processing Time 0.024 seconds

Implementation of Eddystone-EID verification system using independent authentication server (독립 인증 서버를 이용한 Eddystone-EID 검증 시스템 구현)

  • Kang, Jin Su;Seo, Jeong Hun;Song, Ho Jong;Won, Yoo Jae
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.11a
    • /
    • pp.1322-1325
    • /
    • 2017
  • 최근 비콘을 이용하여 근거리에 있는 사용자를 찾아 다양한 혜택을 지원해주는 서비스가 제공되고 있다. 2016년에 Google은 보안성 강화를 위해 비콘의 고유 ID를 사용하는 것이 아닌, 주기적으로 변경되는 임시 ID를 사용하여 이를 암호화하고 Broadcasting 하는 Eddystone-EID(Ephemeral Identity)를 공개하였다. EID를 사용하기 위해서는 Google에 비콘의 정보를 등록하는 과정과 EID를 수신 후 Google을 통해 검증하는 과정이 필요하다. 이러한 이유로 외부 업체들도 EID를 사용하기 위해서는 Google에 비콘을 등록해야 하는 문제점이 발생한다. 이러한 문제점을 해결하기 위해 본 논문에서는 Eddystone-EID를 Google을 이용하지 않고 자체적으로 검증하는 방법을 제시한다.

COP 보안기술 동향

  • Kim, Tae-Kyung
    • Review of KIISC
    • /
    • v.22 no.3
    • /
    • pp.13-18
    • /
    • 2012
  • 인터넷은 사회 경제적 상호작용을 위한 기본적인 인프라가 되어 사람들에게 많은 혜택을 주는 반면 여러 가지 다양한 위험들을 가져왔다. 또한 인터넷을 사용하는 어린이의 수가 증가하고, 그 연령이 더 어려지면서 어린이를 온라인상에서 보호하는 것은 중요한 이슈가 되고 있다. 본 논문에서는 온라인상에서 미성년자를 보호하기 위한 기술적인 대처 방안에 대한 분석을 수행하였다. COP의 다양한 기술들을 활용하여 어린이들을 위험으로부터 벗어나게 할 수 있으며(filtering technologies), 특정한 사이트에 어린이를 접근하지 못하게 하고(age or identity verification systems), 인터넷 상에 어린이들을 안전하게 할 수 있는 안전지대(walled garden)를 만들 수 있다. 이러한 기술적인 대처 방안들은 여러 기술들을 조합하여 사용해야 그 효과성을 높일 수 있으며, 특히 미성년자들의 개인정보 보안을 고려하여 균형적으로 사용해야 한다. 이외에도 COP에서 기술적인 대처방안의 발전적인 개발을 위해서는 보안기술 사이에 정보를 공유할 수 있는 표준이 개발되어야 하며, 보호 기술의 장점 및 기능을 파악할 수 있는 표준 성능 인자의 개발이 필요하다.

Cloning and Functional Verification of the Candida milleri HIS3 Gene Encoding Imidazoleglycerol Phosphate Dehydratase

  • Park, Eun-Hee;Kwun, Se-Young;Han, Seung-Ah;Lee, Jong-Sub;Kim, Myoung-Dong
    • Journal of Microbiology and Biotechnology
    • /
    • v.22 no.10
    • /
    • pp.1441-1445
    • /
    • 2012
  • The entire nucleotide sequence of the HIS3 gene encoding imidazoleglycerol phosphate dehydratase (IGPD) in yeast Candida milleri CBS 8195 was determined. Sequence analysis revealed an open-reading frame of C. milleri HIS3 that spans 678 bp, encodes 226 amino acids, and shares 80.5% amino acid identity to Torulaspora delbrueckii IGPD, followed by that to Saccharomyces cerevisiae (79.6%). The cloned HIS3 gene complemented a his3 mutation in S. cerevisiae, suggesting that it encodes a functional IGPD in C. milleri CBS 8195. A new auxotrophic marker is now available for acid-tolerant yeast C. milleri.

Fingerprint Pattern Recognition Algorithm (지문 Pattern 인식 Algorithm)

  • 김정규;김봉일
    • Korean Journal of Remote Sensing
    • /
    • v.3 no.1
    • /
    • pp.25-39
    • /
    • 1987
  • The purpose of this research is to develop the Automatic Fingerprint Verfication System by digital computer based on specially in PC level. Fingerprint is used as means of personal identity verification in view of that it has the high reliability and safety. Fingerprint pattern recognition algorithm is constitute of 3 stages, namely of the preprocessing, the feature extraction and the recognition. The preprocessing stage includes smoothing, binarization, thinning and restoration. The feature extraction stage includes the extraction of minutiae and its features. The recognition stage includes the registration and the matching score calculation which measures the similarity between two images. Tests for this study with 325 pairs of fingerprint resulted in 100% of separation which which in turn is turned out to be the reliability of this algorithm.

Study On Masked Face Detection And Recognition using transfer learning

  • Kwak, NaeJoung;Kim, DongJu
    • International Journal of Advanced Culture Technology
    • /
    • v.10 no.1
    • /
    • pp.294-301
    • /
    • 2022
  • COVID-19 is a crisis with numerous casualties. The World Health Organization (WHO) has declared the use of masks as an essential safety measure during the COVID-19 pandemic. Therefore, whether or not to wear a mask is an important issue when entering and exiting public places and institutions. However, this makes face recognition a very difficult task because certain parts of the face are hidden. As a result, face identification and identity verification in the access system became difficult. In this paper, we propose a system that can detect masked face using transfer learning of Yolov5s and recognize the user using transfer learning of Facenet. Transfer learning preforms by changing the learning rate, epoch, and batch size, their results are evaluated, and the best model is selected as representative model. It has been confirmed that the proposed model is good at detecting masked face and masked face recognition.

Behavioral Analysis Zero-Trust Architecture Relying on Adaptive Multifactor and Threat Determination

  • Chit-Jie Chew;Po-Yao Wang;Jung-San Lee
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.9
    • /
    • pp.2529-2549
    • /
    • 2023
  • For effectively lowering down the risk of cyber threating, the zero-trust architecture (ZTA) has been gradually deployed to the fields of smart city, Internet of Things, and cloud computing. The main concept of ZTA is to maintain a distrustful attitude towards all devices, identities, and communication requests, which only offering the minimum access and validity. Unfortunately, adopting the most secure and complex multifactor authentication has brought enterprise and employee a troublesome and unfriendly burden. Thus, authors aim to incorporate machine learning technology to build an employee behavior analysis ZTA. The new framework is characterized by the ability of adjusting the difficulty of identity verification through the user behavioral patterns and the risk degree of the resource. In particular, three key factors, including one-time password, face feature, and authorization code, have been applied to design the adaptive multifactor continuous authentication system. Simulations have demonstrated that the new work can eliminate the necessity of maintaining a heavy authentication and ensure an employee-friendly experience.

Verification of the longitudinal relationship between mothers' cultural adaptation patterns, multicultural acceptability of multicultural adolescents, and national identity: Focusing on the mediating effect of the autoregressive cross-lagged model (어머니의 문화적응유형과 다문화청소년의 다문화수용성, 국가정체성 간 종단관계 검증: 자기회귀교차지연모형의 매개효과를 중심으로)

  • Lee, Hyoung-Ha;Yun, Jin-Mi;Han, Ji-Yun
    • Journal of Digital Convergence
    • /
    • v.19 no.10
    • /
    • pp.453-467
    • /
    • 2021
  • In this study, the autoregressive cross-lagged model was applied to verify the longitudinal correlation between the three factors and the pattern of changes over time in the mother's cultural adaptation type, the multicultural acceptability of multicultural adolescents, and national identity. For the study, longitudinal data from the 2nd, 4th, 6th, and 8th years of the MAPS tracked from the 5th grade of elementary school to the 2nd grade of high school were used for analysis. As a result of the analysis, all four types of mother's acculturation were analyzed to have a significant longitudinal effect over time. The four types of mothers' cultural adaptation were analyzed to have a longitudinal mediating effect on the relationship between the national identity of multicultural youth. Based on these analysis results, it is necessary to provide a continuous acculturation support program. In order to have a sense of belonging and solidarity with the country, it was suggested that education to increase multicultural receptivity should be carried out in parallel.

A Study on Rural Landscape Planning Based on Rural Village Landscape - A Case Study on Yacksan at Wando - (농촌 마을경관을 고려한 지역경관계획 수립 방안 연구 - 완도군 약산권역을 사례로 -)

  • Kim, Seong-Hak;Yang, Byoung-E
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.37 no.3
    • /
    • pp.82-90
    • /
    • 2009
  • The aim of this study is to identify the spatial foundation units required to execute a rural village landscape plan. Though there have been various previous studies on spatial foundation units for rural space and landscape elements, they are limited in clarifying the landscape identity of a rural village unit in creating a feasible a rural village landscape plan. Therefore, it is necessary to identify the natural spatial features of a rural village and then establish a landscape identity for each space by exploring the landscape elements for each rural village unit set as the basic unit. Accordingly, the basic spatial unit was analyzed through a 1:5000 scale mapping by applying geomancy theory to the spatial landscape unit in a naturally generated rural village. The spatial limitations for a rural village landscape were set based on the analysis. Afterwards, a field study on the feasibility of whether or not setting a space as the basic unit for landscape could have a sense of identity as a single landscape unit for verification was processed, and the spatial limitations for the landscape were adjusted. Moreover, landscape elements were investigated by classifying landscape resources based on rural amenity resources which have been diversely researched in terms of the set spatial boundaries, and the sense of identity for each landscape foundation unit was looked into. While the numerous preceding studies focused on exploring the rural landscape value and findingout the sense of identity on landscape elements, it is high time for feasible and applicable studies in conducting region-specific landscape plans. In particular, similar outcomes from all landscape plans, even those with the same purpose established in various regions, is not a desirable outcome. Therefore, a basic framework is needed to discover the landscape identity generated by each plan in a rural area space. In this sense, this study is significant in that itcan be utilized to establish spatial identity of each region and landscape features of each rural village, and come up with realistic alternatives in landscape plans for each region by exploring the landscape identity in each specific space divided per watershed in a single zone.

Design of a Real-Time Certificate Status Validation Mechanism Using Identity Information Hash Value of Signer (서명자의 신원정보 해쉬값을 이용한 실시간 인증서 상태 검증 메커니즘의 설계)

  • Kim Hyun-Chul;Kim Jung-Jae;Lee Jong-Hee;Oh Hae-Seok;Jun Moon-Seog
    • The KIPS Transactions:PartC
    • /
    • v.13C no.2 s.105
    • /
    • pp.147-154
    • /
    • 2006
  • The certificate status validation mechanism is a critical component of a public key infrastructure based on certificate system. The most generally mechanisms used these days are the use of the certificate revocation list and the real-time certificate status protocol. But the certificate revocation list can not give the real-time certificate status because the certificate is being delivered periodically, and the real-time certificate status protocol method will generate a concentrated load to the server because the protocol in the central server will be accessed whenever a certification is necessary. It will also take a long time to validate the certificate because each trade has to send mass information through the network. This paper will present that real-time validation is guaranteed as the real-time certificate status protocol method and the traffic congestion in the network Is reduced in a way that the certification would be requested using the user information hash value and would be validated using the user information kept in the certification authorities and the service providers. Based on the this study, we suggest a real-time certificate status validation mechanism which can reduce the certificate status validation time using the signed user information hash value. And we confirm speed of certificate status verification faster than existing CRL(Certificate Revocation List) and OCSP(Online Certificate Status Protocol) method by test.

The Biometric based Mobile ID and Its Application to Electronic Voting

  • Yun, Sung-Hyun;Lim, Heui-Seok
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.1
    • /
    • pp.166-183
    • /
    • 2013
  • It requires a lot of costs and manpower to manage an election. The electronic voting scheme can make the election system economic and trustful. The widespread use of smart phones causes mobile voting to be a major issue. The smart phone can be used as a mobile voting platform since it can carry out many services in addition to basic telephone service. To make mobile voting practical and trustful, we analyzed two subjects of study. Firstly, the way to make a biometric based mobile ID, which has legal binding forces. In mobile voting, user identification is accomplished on line since the voter should be able to vote wherever they go. The digital ID conducts a similar role to the need for a resident card. The user's identity is bound to the resident card legally. To bind the user's identity to the smart phone, we use USIM. Biometric recognition is also needed to authenticate the user, since the user cannot prove him or her on line face-to-face. The proposed mobile ID can be reissued by means of introducing a random secret value. Secondly, the mobile voting scheme is proposed where candidates can accept election results without doubt. The goal of an election is to select a leader among two or more candidates. Existing electronic voting schemes mainly focus on the study of ballot verification accomplished by voters. These approaches are not safe against collusion attacks where candidates and the election administration center are able to collude to fabricate election results. Therefore, a new type of voting and counting method is needed where candidates can directly take part in voting and counting stages. The biometric based multi-signature scheme is used to make the undeniable multi-signed ballot. The ballot cannot be verified without the help of all candidates. If candidates accept election results without a doubt, the fairness of the election is satisfied.