• Title/Summary/Keyword: Identity-based identification

Search Result 183, Processing Time 0.026 seconds

A Study on the Hazard Identification and Risk Mitigation for ATSRX Using Hazard and Operability Study (HAZOP Study를 사용한 ATSRX의 위험원도출 및 리스크 완화에 관한 연구)

  • LEE Jun-Ho;LEE Kang-Mi;KIM Yong-Kyu;SHIN Ducko
    • Journal of the Korean Society for Railway
    • /
    • v.8 no.6 s.31
    • /
    • pp.533-538
    • /
    • 2005
  • In this paper we identity the hazard using HAZOP study for ATSRX which is a subsystem of the ATP system, and we study a safety management method for the mitigation of the risk to the acceptable level. ATSRX is a device that make a train which has a ATP system operate in ATS line. For this ATSRX send a induction signal with ATS system to vehicle controller. Thus ATSRX can be said a safety equipment that makes a train operate safely. In order to identify the hazard for the internal faults in ATSRX system, we employ HAZOP study method which is recommended as hazard identification in IEC 62278, RAMS requirements in railway signal, and also it provide the detail activity in IEC 61882. Thus, in this paper we perform HAZOP study based on ATSRX related standards and using the assessment of the identified hazard we study a method to guarantee the system safety through the change of the design to mitigate the risk to the acceptable level.

Retail functions and skills of venture merchants: A case study of Lunuganga

  • CHO, Myungrae
    • Journal of Distribution Science
    • /
    • v.19 no.3
    • /
    • pp.5-14
    • /
    • 2021
  • Purpose: This study aims to clarify the behavioral extraction and ability of venture merchants, who actively challenge commerce in the face of harsh living environments. Research design, data and methodology: Adopting the concept of retail functions and retail skills, this study examines how venture merchants perform retail functions, and identifies the required retail skills. This study analyzed primary data obtained through an interview with a bookstore called Lunuganga. Results: The venture merchant purchases products based on his self-assertion and creates an original "store identification." Moreover, he draws a changing "own-store customers image" and acquires "own-store customers," that is, customers acquired by him by building an original store identity. He sells products to "own-store customers" who identify with the store. The retail skills identified as required by venture merchants to carry out such retail functions were "skill to draw a store identification" and "skill to draw own-store customer image." Conclusions: Venture merchants' unique retail functions and retail skills suggest a new basis for the existence of small and medium-sized retailers. It is necessary to build a generalized theoretical hypothesis model by refining the concept presented in this paper by repeating research targeting venture merchants in the same industry and different industries.

The Biometric based Mobile ID and Its Application to Electronic Voting

  • Yun, Sung-Hyun;Lim, Heui-Seok
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.1
    • /
    • pp.166-183
    • /
    • 2013
  • It requires a lot of costs and manpower to manage an election. The electronic voting scheme can make the election system economic and trustful. The widespread use of smart phones causes mobile voting to be a major issue. The smart phone can be used as a mobile voting platform since it can carry out many services in addition to basic telephone service. To make mobile voting practical and trustful, we analyzed two subjects of study. Firstly, the way to make a biometric based mobile ID, which has legal binding forces. In mobile voting, user identification is accomplished on line since the voter should be able to vote wherever they go. The digital ID conducts a similar role to the need for a resident card. The user's identity is bound to the resident card legally. To bind the user's identity to the smart phone, we use USIM. Biometric recognition is also needed to authenticate the user, since the user cannot prove him or her on line face-to-face. The proposed mobile ID can be reissued by means of introducing a random secret value. Secondly, the mobile voting scheme is proposed where candidates can accept election results without doubt. The goal of an election is to select a leader among two or more candidates. Existing electronic voting schemes mainly focus on the study of ballot verification accomplished by voters. These approaches are not safe against collusion attacks where candidates and the election administration center are able to collude to fabricate election results. Therefore, a new type of voting and counting method is needed where candidates can directly take part in voting and counting stages. The biometric based multi-signature scheme is used to make the undeniable multi-signed ballot. The ballot cannot be verified without the help of all candidates. If candidates accept election results without a doubt, the fairness of the election is satisfied.

A Model for Self-Authentication Based on Decentralized Identifier (탈중앙화 신원증명에 기반한 본인 인증 모델)

  • Kim, Ho-Yoon;Han, Kun-Hee;Shin, Seung-Soo
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.11
    • /
    • pp.66-74
    • /
    • 2021
  • With the development of the Internet, user authentication technology that proves me online is improving. Existing ID methods pose a threat of personal information leakage if the service provider manages personal information and security is weak, and the information subject is to the service provider. In this study, as online identification technology develops, we propose a DID-based self-authentication model to prevent the threat of leakage of personal information from a centralized format and strengthen sovereignty. The proposed model allows users to directly manage personal information and strengthen their sovereignty over information topics through VC issued by the issuing agency. As a research method, a self-authentication model that guarantees security and integrity is presented using a decentralized identifier method based on distributed ledger technology, and the security of the attack method is analyzed. Because it authenticates through DID Auth using public key encryption algorithms, it is safe from sniffing, man in the middle attack, and the proposed model can replace real identity card.

BCON : Blockchain-based Content Management Service Using DID

  • Kim, Hye-Won;Lee, Young-Eun;Kwon, Min-Ho;Lee, Myung-Joon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.6
    • /
    • pp.97-105
    • /
    • 2021
  • In this paper, we propose BCON, a service that allows individuals to store personal contents safely, and reliably guarantee their ownership of contents, certifying their identities with DIDs(Decentralized identifiers). DID technology, which supports decentralized identification service based on a blockchain that cannot forgery or alter data, allows users to selectively provide their information, controlling personal information and reinforcing their sovereignty over their identity. BCON stores information about the content specified by a user on the blockchain and Authenticates the user's identity based on DID technology. It also provides functions for the user to safely upload and download the user's content to a distributed database. BCON consists of the content service verifier, the content storage service, the content management contract, and the user application, administrating rhe DID registry for Authority management.

A Study on the Recognition of Face Based on CNN Algorithms (CNN 알고리즘을 기반한 얼굴인식에 관한 연구)

  • Son, Da-Yeon;Lee, Kwang-Keun
    • Korean Journal of Artificial Intelligence
    • /
    • v.5 no.2
    • /
    • pp.15-25
    • /
    • 2017
  • Recently, technologies are being developed to recognize and authenticate users using bioinformatics to solve information security issues. Biometric information includes face, fingerprint, iris, voice, and vein. Among them, face recognition technology occupies a large part. Face recognition technology is applied in various fields. For example, it can be used for identity verification, such as a personal identification card, passport, credit card, security system, and personnel data. In addition, it can be used for security, including crime suspect search, unsafe zone monitoring, vehicle tracking crime.In this thesis, we conducted a study to recognize faces by detecting the areas of the face through a computer webcam. The purpose of this study was to contribute to the improvement in the accuracy of Recognition of Face Based on CNN Algorithms. For this purpose, We used data files provided by github to build a face recognition model. We also created data using CNN algorithms, which are widely used for image recognition. Various photos were learned by CNN algorithm. The study found that the accuracy of face recognition based on CNN algorithms was 77%. Based on the results of the study, We carried out recognition of the face according to the distance. Research findings may be useful if face recognition is required in a variety of situations. Research based on this study is also expected to improve the accuracy of face recognition.

SVM-Based Speaker Verification System for Match-on-Card and Its Hardware Implementation

  • Choi, Woo-Yong;Ahn, Do-Sung;Pan, Sung-Bum;Chung, Kyo-Il;Chung, Yong-Wha;Chung, Sang-Hwa
    • ETRI Journal
    • /
    • v.28 no.3
    • /
    • pp.320-328
    • /
    • 2006
  • Using biometrics to verify a person's identity has several advantages over the present practice of personal identification numbers (PINs) and passwords. To gain maximum security in a verification system using biometrics, the computation of the verification as well as the storing of the biometric pattern has to take place in a smart card. However, there is an open issue of integrating biometrics into a smart card because of its limited resources (processing power and memory space). In this paper, we propose a speaker verification algorithm using a support vector machine (SVM) with a very few features, and implemented it on a 32-bit smart card. The proposed algorithm can reduce the required memory space by a factor of more than 100 and can be executed in real-time. Also, we propose a hardware design for the algorithm on a field-programmable gate array (FPGA)-based platform. Based on the experimental results, our SVM solution can provide superior performance over typical speaker verification solutions. Furthermore, our FPGA-based solution can achieve a speed-up of 50 times over a software-based solution.

  • PDF

Differentiation of Signature Traits $vis-\grave{a}-vis$ Mobile- and Table-Based Digitizers

  • Elliott, Stephen J.
    • ETRI Journal
    • /
    • v.26 no.6
    • /
    • pp.641-646
    • /
    • 2004
  • As the use of signatures for identification purposes is pervasive in society and has a long history in business, dynamic signature verification (DSV) could be an answer to authenticating a document signed electronically and establishing the identity of that document in a dispute. DSV has the advantage in that traits of the signature can be collected on a digitizer. The research question of this paper is to understand how the individual variables vary across devices. In applied applications, this is important because if the signature variables change across the digitizers this will impact performance and the ability to use those variable. Understanding which traits are consistent across devices will aid dynamic signature algorithm designers to create more robust algorithms.

  • PDF

An Analytic Study on the Theory of Place and System of Compositional Elements in Architecture and Interior Design (건축에서 장소의 이론과 구성체계 요소의 분석 연구)

  • 이일형
    • Korean Institute of Interior Design Journal
    • /
    • no.3
    • /
    • pp.78-84
    • /
    • 1994
  • The theory of Place is based on the relations of human being, environment and architecture in the view of the existentialism and phenomenology. A place has two respects, the one is Natural place as landscape and the other is Man-made place as city, public building , private house. These properties of place are appeared through axis , directions, boundaries, centers , enclosures that are basic elements in architecture . Therefore these elements embody sense of place as orientation , identification , identity. imageability, stabilitas loci, heirarchy. And these sensually compositional elements of poace concretize district, landmark, node, path, edge that ceate a setting into work and place in architecture & interior design.

  • PDF

Perceptual Bound-Based Asymmetric Image Hash Matching Method

  • Seo, Jiin Soo
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.10
    • /
    • pp.1619-1627
    • /
    • 2017
  • Image hashing has been successfully applied for the problems associated with the protection of intellectual property, management of large database and indexation of content. For a reliable hashing system, improving hash matching accuracy is crucial. In order to improve the hash matching performance, we propose an asymmetric hash matching method using the psychovisual threshold, which is the maximum amount of distortion that still allows the human visual system to identity an image. A performance evaluation over sets of image distortions shows that the proposed asymmetric matching method effectively improves the hash matching performance as compared with the conventional Hamming distance.