• 제목/요약/키워드: Identity-based identification

검색결과 183건 처리시간 0.026초

An Improved Efficient Provable Secure Identity-Based Identification Scheme in the Standard Model

  • Tan, Syh-Yuan;Chin, Ji-Jian;Heng, Swee-Huay;Goi, Bok-Min
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제7권4호
    • /
    • pp.910-922
    • /
    • 2013
  • In 2008, Chin et al. proposed an efficient and provable secure identity-based identification scheme in the standard model. However, we discovered a subtle flaw in the security proof which renders the proof of security useless. While no weakness has been found in the scheme itself, a scheme that is desired would be one with an accompanying proof of security. In this paper, we provide a fix to the scheme to overcome the problem without affecting the efficiency as well as a new proof of security. In particular, we show that only one extra pre-computable pairing operation should be added into the commitment phase of the identification protocol to fix the proof of security under the same hard problems.

전자신분증 기반의 개인 신분확인을 위한 인증시스템 설계 (Design of an Authentication System Based on Personal Identity Verification Card)

  • 박영호;공병운;이경현
    • 한국멀티미디어학회논문지
    • /
    • 제14권8호
    • /
    • pp.1029-1040
    • /
    • 2011
  • 스마트카드 기반의 전자신분증은 오프라인과 온라인 신분확인을 위한 대표적인 개인 신분확인 수단으로, IC칩에 카드소유자의 신분확인 정보와 암호기법이나 전자인증서 관리를 위한 암호화 모듈을 포함하게 된다. 개인 식별정보에 대한 빠른 접근성과 신뢰성 및 보안성으로 인해 주요자산에 대한 접근통제를 위해 전자신분증을 도입하려는 공공기관이나 기업들이 증가하고 있다. 본 논문에서는 전자신분증을 이용한 접근통제에서 개인 신분확인을 위한 인증시스템의 구현방안에 대해 제안하고, 효과적인 인증시스템의 운영을 위한 기능적 요구사항들에 대해 논의한다. 이를 위해 본 논문에서는 Personal Identity Verification 시스템 모델을 대상으로 하여 연구하였다.

The Effects of Hispanics' Social TV Participation on Ethnic Identifications

  • Natascha Ginelia, Perez-Rios;Eunice (Eun-Sil), Kim
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제15권1호
    • /
    • pp.243-253
    • /
    • 2023
  • Social television encompasses the social media aspect of television viewing. This study attempts to investigate how social television influences Hispanic and national ethnic identification as well as social presence. Based on the theoretical framework of Tajfel and Turner's Social Identity Theory (SIT), this study focuses on the potential influence of social television on Hispanics' ethnic identifications and social presence. With a sample of 100 Hispanic students, we conducted a lab experiment to measure the effects of exposure to ethnic and non-ethnic related Twitter feeds on Hispanic and national ethnic identification along with social presence. Findings reveal that there was no significant difference between those exposed to the ethnic-identity related Twitter feed compared to those exposed to the non-ethnic identity related Twitter feed, followed by the control group not exposed to the Twitter feed at all. Implications were discussed.

Improvement of Digital Identify Proofing Service through Trend Analysis of Online Personal Identification

  • JongBae Kim
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제15권4호
    • /
    • pp.1-8
    • /
    • 2023
  • This paper analyzes the trends of identification proofing services(PIPSs) to identify and authenticate users online and proposes a method to improve PIPS based on alternative means of resident registration numbers in Korea. Digital identity proofing services play an important role in modern society, but there are some problems. Since they handle sensitive personal information, there is a risk of information leakage, hacking, or inappropriate access. Additionally, online service providers may incur additional costs by applying different PIPSs, which results in online service users bearing the costs. In particular, in these days of globalization, different PIPSs are being used in various countries, which can cause difficulties in international activities due to lack of global consistency. Overseas online PIPSs include expansion of biometric authentication, increase in mobile identity proofing, and distributed identity proofing using blockchain. This paper analyzes the trend of PIPSs that prove themselves when identifying users of online services in non-face-to-face overseas situations, and proposes improvements by comparing them with alternative means of Korean resident registration numbers. Through the proposed method, it will be possible to strengthen the safety of Korea's PIPS and expand the provision of more reliable identification services.

빅데이터 기반 비대면 본인확인 기술에 대한 연구 (A Study on Big Data Based Non-Face-to-Face Identity Proofing Technology)

  • 정관수;염희균;최대선
    • 정보처리학회논문지:컴퓨터 및 통신 시스템
    • /
    • 제6권10호
    • /
    • pp.421-428
    • /
    • 2017
  • 최근 온라인 금융서비스의 성장과 금융 기술의 급격한 발전으로 인하여 온라인에서 사용자를 등록 및 인증하기 위한 비대면 본인확인기술에 대한 다양한 접근 방법의 필요성이 제기되고 있다. 일반적으로 비대면 방식은 대면방식에 비해서 많은 위협에 노출되어 있다. 따라서 최근에는 이런 위험성을 보완하고 보다 신뢰할 수 있는 비대면 본인확인 방법을 위해서 다양한 요소와 채널을 이용하여 사용자를 검증할 수 있는 정책과 기술이 연구되고 있다. 이러한 새로운 접근방법 중 하나는 다수의 사용자 개인정보를 수집하고 검증하는 기술이다. 따라서 본 논문은 사용자의 다양하고 많은 정보를 기반으로 온라인에서 본인확인을 수행하는 빅데이터 기반 비대면 본인확인 방법을 제안한다. 또한 제안방법은 서비스에서 요구하는 본인확인 등급에 필요한 사용자 정보만 수집하고 검증하는 세분화된 본인확인 정보관리 방법을 제안한다. 그리고 본 논문은 검증된 본인확인 정보를 사용자가 재사용할 수 있도록 다른 서비스 제공자들과 공유할 수 있는 본인확인 정보 공유 모델을 제안한다. 마지막으로 제안 방법이 비대면 본인확인 과정에서 강화된 사용자 검증을 통해서 서비스에서 요구하는 본인확인 등급만 검증하고 관리하는 시스템을 구현하여 실험 결과를 분석한다.

The Influence of Internet Use on Interpersonal Interaction among Chinese Urban Residents: The Mediating Effect of Social Identification

  • Chen, Hong;Qin, Jing;Li, Jing;Zheng, Guangjia
    • Asian Journal for Public Opinion Research
    • /
    • 제3권2호
    • /
    • pp.84-105
    • /
    • 2016
  • The instability of social norms on the Internet causes the diversity of social identification. Meanwhile, the anonymity of online social identity and the chaos of the role-playing among the interacting participants cause an ambiguity of identity recognition, which intensifies anxiety about interpersonal interaction. Methods that promote face-to-face interpersonal interaction through the reconstruction of the identification to the social system and intergroup trust is worth further research. Based on a telephone survey of urban residents in thirty-six cities in China (N=1080), the study focuses on the influence of Internet use on interpersonal interaction of urban residents and the mediation effect of social identification. The results show that Internet use has a negative effect on the interpersonal interactions of urban residents, and social identification plays a mediating effect between Internet use and interpersonal interaction. Implications of the results are discussed.

패션브랜드의 명품화를 위한 제품아이덴티티 개발전략 제시 - 밀워드브라운의 2015 명품브랜드 가치순위를 중심으로 - (A Proposal Develoment Strategy for the Luxury Brand of Fashion Brand)

  • 차유미;이진아;김인경
    • 한국의상디자인학회지
    • /
    • 제18권1호
    • /
    • pp.35-50
    • /
    • 2016
  • As the fashion industry increasingly fierce competition in the market we are elements of product quality can only be differentiated through a difficult period. Because academia and strengthen brand image and measures proposed business, a way to strengthen advertising and promotional marketing. However, this action reminds consumers that have a direct feel of the experience with the product is very easy to see, but counterproductive when advertising and contradictions. Korean fashion brand has sufficient capacity in this part of the judgment, because reason can not spread to the global luxury fashion brand. This study analyzed who help give identity to the domestic fashion luxury brand global strategy angry, it is part of the goal of the current development and product strategy features. Export capabilities, improve product identification components for their product development strategy has been carried out case studies and the recommendations based on this identity-based international luxury fashion brand analysis. The concept of product identification is not strong, the lack of previous studies of this study also adopted the international luxury fashion brand case studies, based on the country. The importance of product identification and product identification research methods derived from the characteristic side also granular component. Then there is the need to achieve national identity customized product development strategy for domestic enterprises to further expand the practice target. This will help enhance the competitiveness of the domestic apparel design.

  • PDF

블록체인 기반의 DID 문제점 분석 연구 (Blockchain-based DID Problem Analysis Research)

  • 이광규
    • 디지털산업정보학회논문지
    • /
    • 제18권3호
    • /
    • pp.25-32
    • /
    • 2022
  • DID(Decentralized Identity Identification) is a system in which users voluntarily manage their identity, etc., and control the scope and subject of submission of identity information based on a block chain. In the era of the 4th industrial revolution, where the importance of protecting personal information is increasing day by day, DID will surely be positioned as the industrial center of the Internet and e-business. However, when managing personal information, DID is highly likely to cause a large amount of personal information leakage due to electronic infringement, such as hacking and invasion of privacy caused by the concentration of user's identity information on global service users. Therefore, there are a number of challenges to be solved before DID settles into a stable standardization. Therefore, in this paper, we try to examine what problems exist in order to positively apply the development of DID technology, and analyze the improvement plan to become a stable service in the future.

Self-Sovereign Identity (SSI: 자기주권신원) 연구 동향 분석: 사회경제, 법률, 기술적 고찰을 중심으로 (Self-Sovereign Identity (SSI): Structured Literature Reviews with Socio-Technical Perspective)

  • 손영진;박민정;박정숙;황화정;채상미
    • 한국정보시스템학회지:정보시스템연구
    • /
    • 제30권4호
    • /
    • pp.119-152
    • /
    • 2021
  • The concept of Self-Sovereign Identity (SSI) has emerged to overcome the limitations of traditional centralized personal identity management systems in our society. Therefore, in this study, 36 seminal researches out of 112 collected studies were investigated with a systematic literature review method to deliver a core common definition as well as the research trends on SSI in the socioeconomic, legal and technological fields. SSI studies in the legal field have mainly considered the conflicts with relevant laws such as General Data Protection Regulation (GDPR) and privacy protection laws. The study of SSI in the technology field have looked at the trends of the technical components to implement SSI and discussed the necessities of establishing standards to increase interoperability for SSI diffusion worldwide. This study ultimately derived the core definition of SSI from a various academic fields as "a trust-based personal identity management system that enables autonomous self-identification by a identity owner without a centralized system or 3rd party intervention". The results of this study contribute to the understanding of the essential SSI concept which were varied on different research fields and industries. The results also provide a foundation for discovering various SSI-based business models, applications as well as future research opportunities. Furthermore, this study suggested that SSI must be developed with interdisciplinary manner among the socioeconomic, legal, and technological fields to be practically applicable system to enable autonomous self-identification by a identity owner in our society.

A Study on Efficient Data De-Identification Method for Blockchain DID

  • Min, Youn-A
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제13권2호
    • /
    • pp.60-66
    • /
    • 2021
  • Blockchain is a technology that enables trust-based consensus and verification based on a decentralized network. Distributed ID (DID) is based on a decentralized structure, and users have the right to manage their own ID. Recently, interest in self-sovereign identity authentication is increasing. In this paper, as a method for transparent and safe sovereignty management of data, among data pseudonymization techniques for blockchain use, various methods for data encryption processing are examined. The public key technique (homomorphic encryption) has high flexibility and security because different algorithms are applied to the entire sentence for encryption and decryption. As a result, the computational efficiency decreases. The hash function method (MD5) can maintain flexibility and is higher than the security-related two-way encryption method, but there is a threat of collision. Zero-knowledge proof is based on public key encryption based on a mutual proof method, and complex formulas are applied to processes such as personal identification, key distribution, and digital signature. It requires consensus and verification process, so the operation efficiency is lowered to the level of O (logeN) ~ O(N2). In this paper, data encryption processing for blockchain DID, based on zero-knowledge proof, was proposed and a one-way encryption method considering data use range and frequency of use was proposed. Based on the content presented in the thesis, it is possible to process corrected zero-knowledge proof and to process data efficiently.