• Title/Summary/Keyword: Identity Verification

Search Result 137, Processing Time 0.025 seconds

A Study on Rural Landscape Planning Based on Rural Village Landscape - A Case Study on Yacksan at Wando - (농촌 마을경관을 고려한 지역경관계획 수립 방안 연구 - 완도군 약산권역을 사례로 -)

  • Kim, Seong-Hak;Yang, Byoung-E
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.37 no.3
    • /
    • pp.82-90
    • /
    • 2009
  • The aim of this study is to identify the spatial foundation units required to execute a rural village landscape plan. Though there have been various previous studies on spatial foundation units for rural space and landscape elements, they are limited in clarifying the landscape identity of a rural village unit in creating a feasible a rural village landscape plan. Therefore, it is necessary to identify the natural spatial features of a rural village and then establish a landscape identity for each space by exploring the landscape elements for each rural village unit set as the basic unit. Accordingly, the basic spatial unit was analyzed through a 1:5000 scale mapping by applying geomancy theory to the spatial landscape unit in a naturally generated rural village. The spatial limitations for a rural village landscape were set based on the analysis. Afterwards, a field study on the feasibility of whether or not setting a space as the basic unit for landscape could have a sense of identity as a single landscape unit for verification was processed, and the spatial limitations for the landscape were adjusted. Moreover, landscape elements were investigated by classifying landscape resources based on rural amenity resources which have been diversely researched in terms of the set spatial boundaries, and the sense of identity for each landscape foundation unit was looked into. While the numerous preceding studies focused on exploring the rural landscape value and findingout the sense of identity on landscape elements, it is high time for feasible and applicable studies in conducting region-specific landscape plans. In particular, similar outcomes from all landscape plans, even those with the same purpose established in various regions, is not a desirable outcome. Therefore, a basic framework is needed to discover the landscape identity generated by each plan in a rural area space. In this sense, this study is significant in that itcan be utilized to establish spatial identity of each region and landscape features of each rural village, and come up with realistic alternatives in landscape plans for each region by exploring the landscape identity in each specific space divided per watershed in a single zone.

Design of a Real-Time Certificate Status Validation Mechanism Using Identity Information Hash Value of Signer (서명자의 신원정보 해쉬값을 이용한 실시간 인증서 상태 검증 메커니즘의 설계)

  • Kim Hyun-Chul;Kim Jung-Jae;Lee Jong-Hee;Oh Hae-Seok;Jun Moon-Seog
    • The KIPS Transactions:PartC
    • /
    • v.13C no.2 s.105
    • /
    • pp.147-154
    • /
    • 2006
  • The certificate status validation mechanism is a critical component of a public key infrastructure based on certificate system. The most generally mechanisms used these days are the use of the certificate revocation list and the real-time certificate status protocol. But the certificate revocation list can not give the real-time certificate status because the certificate is being delivered periodically, and the real-time certificate status protocol method will generate a concentrated load to the server because the protocol in the central server will be accessed whenever a certification is necessary. It will also take a long time to validate the certificate because each trade has to send mass information through the network. This paper will present that real-time validation is guaranteed as the real-time certificate status protocol method and the traffic congestion in the network Is reduced in a way that the certification would be requested using the user information hash value and would be validated using the user information kept in the certification authorities and the service providers. Based on the this study, we suggest a real-time certificate status validation mechanism which can reduce the certificate status validation time using the signed user information hash value. And we confirm speed of certificate status verification faster than existing CRL(Certificate Revocation List) and OCSP(Online Certificate Status Protocol) method by test.

The Biometric based Mobile ID and Its Application to Electronic Voting

  • Yun, Sung-Hyun;Lim, Heui-Seok
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.1
    • /
    • pp.166-183
    • /
    • 2013
  • It requires a lot of costs and manpower to manage an election. The electronic voting scheme can make the election system economic and trustful. The widespread use of smart phones causes mobile voting to be a major issue. The smart phone can be used as a mobile voting platform since it can carry out many services in addition to basic telephone service. To make mobile voting practical and trustful, we analyzed two subjects of study. Firstly, the way to make a biometric based mobile ID, which has legal binding forces. In mobile voting, user identification is accomplished on line since the voter should be able to vote wherever they go. The digital ID conducts a similar role to the need for a resident card. The user's identity is bound to the resident card legally. To bind the user's identity to the smart phone, we use USIM. Biometric recognition is also needed to authenticate the user, since the user cannot prove him or her on line face-to-face. The proposed mobile ID can be reissued by means of introducing a random secret value. Secondly, the mobile voting scheme is proposed where candidates can accept election results without doubt. The goal of an election is to select a leader among two or more candidates. Existing electronic voting schemes mainly focus on the study of ballot verification accomplished by voters. These approaches are not safe against collusion attacks where candidates and the election administration center are able to collude to fabricate election results. Therefore, a new type of voting and counting method is needed where candidates can directly take part in voting and counting stages. The biometric based multi-signature scheme is used to make the undeniable multi-signed ballot. The ballot cannot be verified without the help of all candidates. If candidates accept election results without a doubt, the fairness of the election is satisfied.

A Secure Maintenance Scheme of Secret Data on Trusted Mobile Platform Environment (Trusted Mobile Platform 환경에서의 안전한 비밀 데이터 유지(이전) 방안)

  • Kang, Dong-Wan;Lee, Im-Yeong;Han, Jin-Hee;Jun, Sung-Ik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.4
    • /
    • pp.79-91
    • /
    • 2008
  • Modern society as an information society, a lot of information is communicated in on-line. Specially, mobile environment based on radio communication has a characteristic of flexibility compared with wire communication and is developed rapidly. However, the more mobile technology is developed the more security for sensitive information is needed. Therefore, MTM(Mobile Trusted Module) is developed and promoted by TCG(Trusted Computing Group), which is an industry standard body to enhance the security level in the mobile computing environment. MTM, hardware security module for mobile environment, offers user's privacy protection, platform integrity verification, and individual platform attestation. On the other hand, secure migration scheme is required in case secret data or key is transferred from one platform to the other platform. In this paper, we analyze migration schemes which were described in TCG standard and other papers and then propose security maintenance scheme for secret data using USIM(Universal Subscriber Identity Module).

The Effects of Adolescents' Truancy Experience on Self-awareness and Emotional Problems - Based on the Data of Korean Children and Youth Panel Survey(KCYPS) - (청소년의 무단결석 경험이 자아인식과 정서문제에 미치는 영향 - 한국아동·청소년패널 자료를 중심으로 -)

  • Jeon, Gu-Hun
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.6
    • /
    • pp.369-379
    • /
    • 2021
  • The purpose of this study was empirical verification of the effect of adolescents' truancy experience on the self-awareness and emotional problems. For this, using the data of 2016 in the Korean Children and Youth Panel Survey(KCYPS), we compared and analyzed using t-test and multiple regression analysis the self-awareness and emotional problems of adolescents who experienced truancy and adolescents who did not. As a result of the analysis, adolescents with truancy experience had relatively low self-awareness, and statistically significant but low scores in self-identity and career identity. However, there was a clear difference in emotional problems, and truancy adolescents scored high in attention, aggression, physical symptoms, and depression. This proved that adolescents with experience of truancy were more exposed to emotional problems, and it was necessary to develop a support system and program for this.

Reverse Engineering Procedure of Metal Brake Pad for Part 25 Aircraft (수송류 항공기용 금속계 제동패드의 역설계 절차)

  • Min-ji Kim;Kyung-il Kim;Kyung-taek Kim
    • Journal of Advanced Navigation Technology
    • /
    • v.27 no.5
    • /
    • pp.621-628
    • /
    • 2023
  • This study derived a reverse engineering procedure for verifying the design identity of original parts and developed parts for PMA(Parts Manufacturer Approval) and STC(Supplemental Type Certificate) of metal brake pads for transport aircraft, which are critical parts among aircraft parts and equipment. In Korea, the regulations for reverse engineering procedures are regulated by the Parts Manufacturer Approval Guidelines, and in the United States, AC No. 21. 303-4. In the reverse engineering for the brake pad, the detailed procedures for each component were determined by selecting verification test items to confirm identity based on sample quantity, dimensional tolerance, mechanical property measurement, material, weight and volume characteristics for each component. In addition, as a result of analyzing the regulation of Korea and United States, in the case of Korea, it is necessary to establish technical standards for braking systems for transport aircraft and regulations related to flight tests.

Implementation of A Security Token System using Fingerprint Verification (지문 인증을 이용한 보안 토큰 시스템 구현)

  • 문대성;길연희;안도성;반성범;정용화;정교일
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.4
    • /
    • pp.63-70
    • /
    • 2003
  • In the modern electronic world, the authentication of a person is an important task in many areas of online-transactions. Using biometrics to authenticate a person's identity has several advantages over the present practices of Personal Identification Numbers(PINs) and passwords. To gain maximum security in the verification system using biometrics, the computation of the verification as well as the store of the biometric pattern has to be taken place in the security token(smart card, USB token). However, there is an open issue of integrating biometrics into the security token because of its limited resources(memory space, processing power). In this paper, we describe our implementation of the USB security token system having 206MHz StrongARM CPU, 16MBytes flash memory, and 1MBytes RAM. Also, we evaluate the performance of a light-weighted In-gerprint verification algorithm that can be executed in the restricted environments. Based on experimental results, we confirmed that the RAM requirement of the proposed algorithm was about 6.8 KBytes and the Equal Error Rate(EER) was 1.7%.

OTP-Based Transaction Verification Protocol Using PUFs (PUF를 이용한 OTP 기반 거래 검증 프로토콜)

  • Lee, Jonghoon;Park, Minho;Jung, Souhwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.6
    • /
    • pp.492-500
    • /
    • 2013
  • The One-Time Password(OTP) Generator is used as a multi-factor authentication method to ensure secure transaction during e-Financial transaction in the bank and securities company. The OTP based e-Financial Transaction Verification Protocol ensures secure e-financial transaction through confirming the user's identity using OTP authentication information and counters not only Man-in-the-Browser(MITB) attacks but also memory hacking attacks. However, it is possible to generate correct OTPs due to potential of stealing sensitive information of the OTP generator through intelligent phishing, pharming, social engineering attacks. Therefore, it needs another scheme to prevent from above threats, and this paper proposes advanced scheme using Physical Unclonable Functions(PUFs) to solve these problems. First, it is impossible to generate the same OTP values because of the hysically unclonable features of PUFs. In addition, it is impossible to clone OTP generator with hardware techniques. Consequently, the proposed protocol provides stronger and more robust authentication protocol than existing one by adding PUFs in the OTP generator.

Robust Fuzzy Fingerprint Vault System against Correlation Attack (상관관계 공격에 강인한 지문퍼지볼트 시스템)

  • Moon, Dae-Sung;Chae, Seung-Hoon;Chung, Yong-Wha;Kim, Sung-Young;Kim, Jeong-Nyeo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.2
    • /
    • pp.13-25
    • /
    • 2011
  • Biometric-based authentication can provide strong security guarantee about the identity of users. However, security of biometric data is particularly important as the compromise of the data will be permanent. The fuzzy fingerprint vault system is one of the most popular solutions for protecting the fingerprint template stored in the database. Recently, however, this system is very susceptible to a correlation attack that finds the real minutiae using multiple fingerprint vaults enrolled for different applications. To solve this problem, we propose a robust fuzzy fingerprint vault system against the correlation attack. In this paper, we add chaff minutiae based on the relative information of minutiae such as direction, coordinate instead of adding randomly. Also, our proposed approach allow to add multiple chaff minutiae within tolerance box for enhanced security level. Experimental results show that the proposed approach can protect the correlation attack and achieve enhanced verification accuracy.

A Study on the Exhibition 《Women_Independence Movement_Gimhae》 from a Psychoanalytic Feminist Point of View: Based on the Theories of L. Irigaray and J. Kristeva (정신분석학적 페미니즘 관점에서의 《어와 만세 백성들아, 여성_독립운동_김해》전시 연구 - L. 이리가레이와 J. 크리스테바의 이론을 중심으로 -)

  • Choi, Jeong Eun
    • Korean Association of Arts Management
    • /
    • no.55
    • /
    • pp.155-184
    • /
    • 2020
  • This paper aims to reveal the merits and demerits of the exhibition by examining whether the subject intended at the exhibition planning stage was finally persuasively implemented throughout the work and exhibition, along with the theoretical verification of the way the exhibition dealing with the history of the women's independence movement from the psychoanalytic feminist point of view. To this end, a more fundamental approach to the theme of the Women's Independence Movement calls for the search for a feminine language that can capture women's unique identity rather than a masculine language such as the existing independence movement exhibition method, and for finding such feminine language, a feminine speech, art and poetic language, maternal genealogy, and women's solidarity are presented, along with theories. This paper, which expounds the role of art works in exhibitions dealing with history through theoretical verification of actual exhibition cases, has significance as communication between theory and field.