• Title/Summary/Keyword: Identity-based identification

Search Result 183, Processing Time 0.026 seconds

Proposal for a Peer Decentralized Identity System Using Short-Range Wireless Communications (단거리 무선 통신을 이용한 개인 간 분산 신원증명 시스템 제안)

  • Yeo, Kiho;Park, Keundug;Youm, Heung Youl
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.5
    • /
    • pp.959-972
    • /
    • 2021
  • Decentralized Identity is based on the concept of self-sovereign identity, in which holders manage and provide their own credentials. However, a procedure is required to obtain credentials from issuers, and there is a risk of mess personal information leaking due to negligence of the issuers. In this paper, we propose a peer decentralized identity system based on Peer DID technology that allows only participants to verify their identity in 1:1 or 1:N small groups by matching the holder with the issuer. It is directly connected to a mobile device using short-range wireless communications such as bluetooth, and the holders create and provide their own credentials in person to the other party, thus fully realizing the self-sovereignty identity. The proposed system can simplify the identification process, improve security and privacy, and reduce costs. Furthermore, an extended architecture is possible to connect the proposed system and the distributed ledger to identify users in other domains. In the future, based on various technologies, it is also necessary to expand research on identity systems that can be utilized for human-to-thing and things-to-things authentication.

Optimal Identification of IG-based Fuzzy Model by Means of Genetic Algorithms (유전자 알고리즘에 의한 IG기반 퍼지 모델의 최적 동정)

  • Park, Keon-Jun;Lee, Dong-Yoon;Oh, Sung-Kwun
    • Proceedings of the KIEE Conference
    • /
    • 2005.05a
    • /
    • pp.9-11
    • /
    • 2005
  • We propose a optimal identification of information granulation(IG)-based fuzzy model to carry out the model identification of complex and nonlinear systems. To optimally identity we use genetic algorithm (GAs) sand Hard C-Means (HCM) clustering. An initial structure of fuzzy model is identified by determining the number of input, the selected input variables, the number of membership function, and the conclusion inference type by means of GAs. Granulation of information data with the aid of Hard C-Means(HCM) clustering algorithm help determine the initial parameters of fuzzy model such as the initial apexes of the membership functions and the initial values of polynomial functions being used in the premise and consequence part of the fuzzy rules. And the initial parameters are tuned effectively with the aid of the genetic algorithms(GAs) and the least square method. Numerical example is included to evaluate the performance of the proposed model.

  • PDF

A proposal of assurance model based on i-PIN assurance level (아이핀 보증 등급에 기반한 보증 모델)

  • Youm, Heung-Youl
    • Journal of Digital Convergence
    • /
    • v.14 no.9
    • /
    • pp.287-299
    • /
    • 2016
  • The electronic transactions over the Internet are growing across the world recently. There have been a lot of identity theft incidents during these online transactions nowaday. Therefore, a high level of identity proofing shall be carried out when using online services to deal with these matter. To prevent this kind of incident, i-PIN was introduced in Korea, which is used as an Internet Personal Identification Number. The i-PIN is designated to provide an online identification of the Internet users. As such, the unique identification numbers are provided to the internet service providers. This paper is to analyze the capabilities that the i-PIN provides, to propose the assurance security model for i-PIN. Furthermore, the security analysis results are presented. The result of this paper can be applicable to improve the applicabilities of the i-PIN.

Privacy-preserving credential smart contracts using Zokrates

  • Geunyoung Kim;Yunsik Ham;Jaecheol Ryou
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.8
    • /
    • pp.2417-2430
    • /
    • 2024
  • The need for secure user authentication in blockchain-based applications has been growing with the increased adoption of Decentralized Identity (DID) credentials in blockchain. Zokrates, a tool designed to protect user privacy within smart contracts, had a limitation in that it could not accept authenticated user information such as credentials, only allowing the use of manually inputted data. In this paper, we propose a smart contract system that securely validates DID credentials to overcome the limitations of traditional centralized authentication systems. This system ensures the safe identification of users within blockchain-based applications by authenticating their identities in a trusted manner within the blockchain. As the demand for user authentication in blockchain rises, this paper emphasizes the significance of a blockchain-based identity verification system that guarantees both privacy and security. Leveraging the Zero-Knowledge Proof method and utilizing the Zokrates tool, this innovative approach aims to provide solutions for the digital identity verification process, thereby expanding the scope of blockchain technology applications. Moreover, we also provide a CLI for each entity. We help anyone who wants to authenticate their identity using the tool to safely verify it on-chain.

ID-Based Cryptosystem and Digital Signature Scheme Using Discrete Logarithm Complexity (이산대수 문제를 이용한 ID 기본 암호시스템과 디지틀 서명방식에 관한 연구)

  • 염흥열
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.1 no.1
    • /
    • pp.3-15
    • /
    • 1991
  • in 1984 Shamir proposed the concept of ID(identity)-based cryptosystem and digital signature scheme wich does not require any public file for storing the user' s public keys. In this paper, the concept of the ID-based cryptosystem based on discrete logarithm problem using the conven-tional public-key cryptosystems is described, and the implementation method of the ID-based cryptosystem is also presented. The new digital signaturw schme based on the ID-based crypto-system is proposed and possible atacks are considered and analyzed for the security of digital signature scheme. The proposed ID-based schemes are particularrly useful for smart card and personal identification card application.

A study on the impact of fashion brand Metaverse platform characteristics on perceived avatar identity and user purchase intention

  • Jihye Jeon;Eun-Jung Lee
    • International Journal of Advanced Culture Technology
    • /
    • v.12 no.3
    • /
    • pp.406-418
    • /
    • 2024
  • In line with the rapid spread of Metaverse in various marketing areas, fashion companies have also begun to devise various activities using the Metaverse. Fashion experiences within the Metaverse platform must be conducted considering the characteristics of the Metaverse itself. However, there has yet to be any research on Metaverse fashion based on the characteristics of the Metaverse platform itself. Accordingly, this study sought to empirically analyze the impact of various characteristics of the Metaverse platform on consumers' virtual fashion experience within the platform. In particular, this study focused on the relationships among the Metaverse platform characteristics, perceived avatar identity, and the purchase intention of actual fashion products. In order to test the hypotheses, a survey was conducted on 300 Korean male and female consumers with an average age of 39.3 who had experience with virtual fashion through the Metaverse platform. In response to the recent increase in domestic and foreign brands' attempts to experience fashion using ZEPETO, the questionnaire provided an experience scenario that included detailed captured images of the use of avatars in the ZEPETO world. Data was subjected to statistical analysis using the SPSS 28.0 program. The results confirmed that the characteristic factors of the Metaverse platform (i.e., presence, social interactivity, anonymity) had a significant impact on the user's perceived avatar identification. Additionally, perceived avatar identity significantly affected users' purchase intention. Theoretical and managerial implications and study limitations are discussed.

Forecast and Present Technology of Hand Vascular Pattern Recognition System (손혈관 인식 시스템의 경쟁기술현황과 전망)

  • Kim, Jae-Woo;Yeo, Woon-Dong;Bae, Sang-Jin;Seong, Kyung-Mo
    • Proceedings of the KIEE Conference
    • /
    • 2004.05a
    • /
    • pp.114-116
    • /
    • 2004
  • Biometrics consist of technologies that support automatic identification or verification of identity based on behavioral or physical traits. Biometrics can authenticate identities since they measure unique individual characteristics including fingerprints, hand geometry, iris, hand vascular patterns and facial characteristics. we review the state of the hand vascular patterns identification technology and compare other competitive authentication technologies such as cryptography, electronic signature and PKI.

  • PDF

A Study on the Improvement of Personal Identity Proofing Service Using an Alternative Method for Resident Registration Number Based on Electronic Signature (전자서명 기반의 주민등록번호 대체수단을 사용한 본인확인서비스 개선 방안에 대한 연구)

  • Kim, Jong Bae
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.3
    • /
    • pp.453-462
    • /
    • 2021
  • As the status of public certificates expired due to the recent revision of the Electronic Signature Act, electronic signature-based public certificates were also lost in the means of replacing resident registration numbers(RRN). As a result, public certification institutions have recently been designated by the Korea Communications Commission as identity verification service providers through a review of the designation of personal identity proofing agency based on alternative means of RRN. However, unlike existing RRN replacements such as i-PIN, mobile phones, and credit cards, the personal identity proofing process for applicants for certificates is different from existing alternatives. The proposed method shows that it is possible to protect users' personal information and provide universal, reasonable, and safe identification services by applying improvements to electronic signature-based personal identity proofing services.

The Effect of Ethnic Identification and Social Group Affiliation on Body Image Satisfaction among Asian-American College Students

  • Lee, Yoon-Jung
    • International Journal of Human Ecology
    • /
    • v.8 no.1
    • /
    • pp.9-18
    • /
    • 2007
  • This study focuses on the relationship between ethnic identity of Asian-Americans and their appreciation of their ethnic body features, based on reference group theory. A convenience sample of 60 male and 52 female students from various Asian ethnicities attending a mid-western university was used for the study. A 2 (gender) by 2 (ethnic identification) by 2 (socializing group) analysis of covariance (ANCOVA) on body image satisfaction as dependent variable and Body Mass Index score as a covariate was conducted. A significant main effect of ethnic identification was found, which indicates the more respondents identified with their ethnic group, the more likely they were to be satisfied with their appearance. The social group affiliation main effect was not significant. The impact of ethnic identification was significant only for those respondents who socialize more with Americans than with Asians. The results support the idea that one's ethnic group functions as a reference group, which influences body image appraisals.

Analyzing Creativity of Early Childhood Preservice Teacher based on Gender Roles Identity (예비유아교사의 성역할 정체감에 따른 창의성의 차이)

  • Youn, Jeong-Jin;Seo, Hyun-Ah
    • The Korean Journal of Community Living Science
    • /
    • v.21 no.2
    • /
    • pp.191-200
    • /
    • 2010
  • The purpose of this study was to research the differences between gender roles and creativity. This study was done based on 178 pre-service teachers who were from the Department of Early Childhood Education in Universities around the Busan area. The researchers have collected statistical data by questioning pre-service teachers about creative thinking tests, creative personality tests, and gender role identification awareness tests. The data was interpreted by the Paerson's Simple Product-moment Correlation Coefficient method, the one-way ANOVA method, and the $Sch\acute{e}ffe$ Post-hoc comparison method. According to this study, the group perceived of high androgyny type group showed the highest level in important factors of creative thinking, such as fluency, elaborateness, ness, and openness. This result meant that the more a pre-service teacher was aware of the identity of gender roles, the more she or he thought creatively. Additionally, the acceptance of authority, an element of the creative personality factor, showed the highest level in a high feminity type group. On the other hand, self confidence, inquisitiveness, and disciplined imagination showed the highest level in a group which perceived the identity of androgyny type roles.