• Title/Summary/Keyword: Login

Search Result 154, Processing Time 0.029 seconds

LAB color illumination revisions for the improvement of non-proper image (비정규 영상의 개선을 위한 LAB 컬러조명보정)

  • Na, Jong-Won
    • Journal of Advanced Navigation Technology
    • /
    • v.14 no.2
    • /
    • pp.191-197
    • /
    • 2010
  • Many does an application and application but the image analysis of face detection considerably is difficult. In order for with effect of the illumination which is irregular in the present paper America the illumination to range evenly in the face which is detected, detects a face territory, Complemented the result which detects only the front face of existing. With LAB color illumination revisions compared in Adaboost face detection of existing and 32% was visible the face detection result which improves. Bought two images which are input and executed Glassfire label rings. Compared Area critical price and became the area of above critical value and revised from RGB smooth anger and LAB images with LCFD system algorithm. The operational conversion image which is extracted like this executed a face territory detection in the object. In order to extract the feature which is necessary to a face detection used AdaBoost algorithms. The face territory remote login with the face territory which tilts in the present paper, until Multi-view face territory detections was possible. Also relationship without high detection rate seems in direction of illumination, With only the public PC application is possible was given proof user authentication field etc.

Implementation of Accessibility and Usability Enhancement Scheme for a WebRTC VC Application (WebRTC VC응용의 접근성 및 편의성 향상기술 구현)

  • Lee, KyoungMin;Jo, Jinyong;Kong, JongUk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.8
    • /
    • pp.1478-1486
    • /
    • 2016
  • This paper introduces technical methods to improve the accessibility and usability of a WebRTC video conference (VC) application. Simplified login is essential, by applying such as single sign-on (SSO) to improve the accessibility of VC applications. High usability and manageability are also necessary to attract more users, enhance user experiences, and save service management cost. The proposed VC application leverages SAML-based federated identity management (FIM) to enable higher service accessibility. Users can access the application with their organizational ID and SSO authentication. The FIM eases user ID management and indirectly strengthens privacy information protection. Proposed web application has high usability and manageability because users and/or administrators can easily create, join, monitor, or tear down VC sessions through RESTful web service (REST API). We verify the feasibility of the VC application after illustrating the SAML-based identity federation and the designed REST API.

Improved Dynamic ID-based Remote User Authentication Scheme Using Smartcards (스마트카드를 이용한 향상된 동적 ID기반 원격 사용자 인증 기술)

  • Shim, Hee-Won;Park, Joonn-Hyung;Noh, Bong-Nam
    • Journal of Internet Computing and Services
    • /
    • v.10 no.4
    • /
    • pp.223-230
    • /
    • 2009
  • Among the remote user authentication schemes, password-based authentication methods are the most widely used. In 2004, Das et al. proposed a "Dynamic ID Based Remote User Authentication Scheme" that is the password based scheme with smart-cards, and is the light-weight technique using only one-way hash algorithm and XOR calculation. This scheme adopts a dynamic ID that protects against ID-theft attack, and can resist replay attack with timestamp features. Later, many flaws of this scheme were founded that it allows any passwords to be authenticated, and can be vulnerable to impersonation attack, and guessing attack. By this reason many modifications were announced. These scheme including all modifications are similarly maintained security against replay the authentication message attack by the timestamp. But, if advisory can replay the login immediately, this attempt can be succeeded. In this paper, we analyze the security vulnerabilities of Das scheme, and propose improved scheme which can resist on real-time replay attack using the counter of authentication. Besides our scheme still secure against impersonation attack, guessing attack, and also provides mutual authentication feature.

  • PDF

A Design and Implementation of Mobile E-mail Transmission System Using PC Remote Control Technique (PC 원격 제어 기법을 사용한 모바일 이메일 전송 시스템 설계 및 구현)

  • Song, Hye-Ju;Kim, Hyun-Ju;You, Hyun-Jung;Lee, Jong-Woo
    • Journal of Digital Contents Society
    • /
    • v.8 no.1
    • /
    • pp.17-25
    • /
    • 2007
  • Recently, the ubiquitous computing environment being able to connect all kinds of computing elements at anytime anywhere becomes widespread in human life. In this paper, we focus on a PC remote control system using cellular phones. Especially, we design and implement an mobile e-mail transmission system using PC remote control technique. By using our remote controller, cellular phone users can login into their own PC, and then send any file to others by e-mail attachment. To show the correct running of our system, real demonstration results are presented. We are sure that by opening our source code to the public our results can play an important role to encourage development of the various mobile remote control functionalities.

  • PDF

Development of a Smart Oriental Medical System Using Security Functions

  • Hong, YouSik;Yoon, Eun-Jun;Heo, Nojeong;Kim, Eun-Ju;Bae, Youngchul
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.14 no.4
    • /
    • pp.268-275
    • /
    • 2014
  • In future, hospitals are expected to automatically issue remote transcriptions. Many general hospitals are planning to encrypt their medical database to secure personal information as mandated by law. The electronic medical record system, picture archiving communication system, and the clinical data warehouse, amongst others, are the preferred targets for which stronger security is planned. In the near future, medical systems can be assumed to be automated and connected to remote locations, such as rural areas, and islands. Connecting patients who are in remote locations to medical complexes that are usually based in larger cities requires not only automatic processing, but also a certain amount of security in terms of medical data that is of a sensitive and critical nature. Unauthorized access to patients' transcription data could result in the data being modified, with possible lethal results. Hence, personal and sensitive data on telemedicine and medical information systems should be encrypted to protect patients from these risks. Login passwords, personal identification information, and biological information should similarly be protected in a systematic way. This paper proposes the use of electronic acupuncture with a built-in multi-pad, which has the advantage of being able to establish a patient's physical condition, while simultaneously treating the patient with acupuncture. This system implements a sensing pad, amplifier, a small signal drive circuit, and a digital signal processing system, while the use of a built-in fuzzy technique and a control algorithm have been proposed for performing analyses.

Building a Digital Repository Platform for Academic Department Records (대학 학과기록의 디지털 리포지터리 플랫폼 구축)

  • Jo, Yong-Hun;Seo, Eun-Gyoung
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.16 no.3
    • /
    • pp.209-233
    • /
    • 2016
  • This study aims to propose a digital repository platform for academic department records in order to optimize the efficiency of collecting and utilizing academic department records in the absence of university archives and/or in circumstances of overlooking academic department records. First, the study conducted a survey on 70 staffs working in the departments of public and private universities as well as on 32 record managers in university archives about their awareness of and the situations related to academic department record management. Second, it designed the database and interface of a digital repository platform that registers and preserves academic department records effectively, and that proposes 26 essential metadata for managing academic department records. Third, this study built an academic department record repository named "Department Records Repository in the University (DRRU)" based on the OAK repository environment, with four core functions such as login, upload, search, and browse.

Design and Implementation of Distance Learner's Attendance Checking System Based on PC Camera (PC 카메라 기반 원격교육 학습자 출석 확인 시스템의 설계 및 구현)

  • Koo, DukHoi
    • Journal of The Korean Association of Information Education
    • /
    • v.16 no.3
    • /
    • pp.283-289
    • /
    • 2012
  • A distance learning is diffusing rapidly in society. It is more difficult to confirm a learner's identity and learning processing in a distance learning. Distance learning has a checking attendance system because a teacher and student do not meet face to face. There are some checking attendance systems such as login check, SMS authenticating system, unexpected quiz, and so on. However, existing checking attendance system has some problems to check learner's attendance in a whole lesson. Therefore, this study designed and developed learner's attendance system based on PC camera's shot of certification in a whole lesson. This attendance checking system can judge real attendance of learners in a distance learning and distance evaluation. The system is expected to make trust of a distance learning higher.

  • PDF

Mutual Authentication Protocol for Preserving Privacy of Mobile RFID User using Random Key Division (랜덤 키 분할을 이용한 모바일 RFID 사용자의 프라이버시를 보호하는 상호 인증 프로토콜)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Cheol;Lee, Sang-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.3B
    • /
    • pp.220-230
    • /
    • 2011
  • Mobile RFID which integrates mobile network with RFID technique is the technique to get the information of products by transmitting the identifier through mobile network after reading the identifier of RFID tag. It attached on the equipment as the mobile phone. However, mobile RFID has the privacy-related problem among requested secure problems required from the existing RFID. In this paper, the random key created by mobile RFID reader and Tag during the inter-certificating and initialization procedure for mobile RFID users to receive tag information from backend server securely is divided into random sizes and any information on the tag which requires the protection of privacy shouldn't be provided to anyone. In performance analysis, previous protocol used modulo operation in registration and login computation. But the proposed protocol has higher efficiency in saving space and computation volume than MARP scheme and Kim. et. al scheme because our protocol is accomplished by mutual authentication and registering user information through one-way hash function.

A Key Recovery Mechanism for Reliable Group Key Management (신뢰성 있는 그룹키 관리를 위한 키 복구 메커니즘)

  • 조태남;김상희;이상호;채기준;박원주;나재훈
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.6
    • /
    • pp.705-713
    • /
    • 2003
  • For group security to protect group data or to charge, group keys should be updated via key update messages when the membership of group changes. If we lose these messages, it is not possible to decrypt the group data and so this is why the recovery of lost keys is very significant. Any message lost during a certain member is logged off can not be recovered in real-time. Saving all messages and resending them by KDC (Key Distribution Center) not only requests large saving spaces, but also causes to transmit and decrypt unnecessary keys. This paper analyzes the problem of the loss of key update messages along with other problems that may arise during member login procedure, and also gives an efficient method for recovering group keys and auxiliary keys. This method provides that group keys and auxiliary keys can be recovered and sent effectively using information stored in key-tree. The group key generation method presented in this paper is simple and enable us to recover any group key without storing. It also eliminates the transmissions and decryptions of useless auxiliary keys.

Asymmetric distributed multi server architecture for efficient method of client connection process at online game servers (온라인게임 서버에서의 효율적인 클라이언트 접속 처리를 위한 비대칭 분산형 다중 서버 구조)

  • Hwang Doh-Yeun;Lee Nam-Jae;Kwak Hoon-Sung
    • The KIPS Transactions:PartB
    • /
    • v.12B no.4 s.100
    • /
    • pp.459-464
    • /
    • 2005
  • The online game system could be largely divided into two parts: servers and clients. Clients accesses to a game server and analyzes the packets transmitted from a server. A game server manages users information and database. U a game server allows a new client to access the server to execute a game, it should accept the access request of the new client maintaining the online connection of the existing users. In this paper, we compare Process method and Thread method within the multiple jobs process methods of a server. Then we propose an asymmetric distributed multi server architecture that is adequate to asymmetric distributed architecture that is widely applied to most game servers. The proposed asymmetric distributed multi server architecture includes login server, game server, communication server and database server to perform its own feature independently. Comparing its other architectures, it shows better performance economically and technically. Especially it improves the stability and expandability of a server.