• Title/Summary/Keyword: Personal Identification

Search Result 507, Processing Time 0.031 seconds

Safety Improvement Methods of Personal Identification Services using the i-Pin (아이핀 기반 본인확인서비스의 안전성 강화 방안)

  • Kim, Jongbae
    • Journal of Information Technology Services
    • /
    • v.16 no.2
    • /
    • pp.97-110
    • /
    • 2017
  • Due to development of IT, various Internet services via the non-face-to-face are increasing rapidly. In the past, the resident registration numbers (RRN) was used a mean of personal identification, but the use of RRN is prohibited by the relevant laws, and the personal identification services using alternative means are activated. According to the prohibition policy of RRN, i-PIN service appeared as an alternative means to identify a person. However, the user's knowledge-based i-PIN service continues to cause fraudulent issuance, account hijacking, and fraud attempts due to hacking accidents. Due to these problems, the usage rate of i-PIN service which performs a nationwide free personal identification service, is rapidly decreasing. Therefore, this paper proposes a technical safety enhancement method for security enhancement in the i-PIN-based personal identification service. In order to strengthen the security of i-PIN, this paper analyzes the encryption key exposure, key exchange and i-PIN authentication model problems of i-PIN and suggests countermeasures. Through the proposed paper, the i-PIN can be expected to be used more effectively as a substitution of RRN by suggesting measures to enhance the safety of personal identification information. Secured personal identification services will enable safer online non-face-to-face transactions. By securing the technical, institutional, and administrative safety of the i-PIN service, the usage rate will gradually increase.

Personal Identification Based on Radio Signal Strength for Ubiquitous Healthcare Systems

  • Lee, Jong-Shill;Park, Sang-Hae;Chee, Young-Joon;Kim, In-Young;Kim, Sun-I.
    • Journal of Biomedical Engineering Research
    • /
    • v.28 no.3
    • /
    • pp.325-331
    • /
    • 2007
  • Personal identification is essential for the automatic measurement of biosignal information in home healthcare systems. Personal identification is usually achieved with passive radio frequency identification (RFID), which does little more than store a unique identification number. However, passive RFID is not ideal for automatic identification. We present a user identification system based on radio signal strength indication (RSSI) using ZigBee for active RFID tags. Personal identification is achieved by finding the largest RSSI value from aggregated beacon messages that are periodically transmitted by active RFID tags carried by users. Obtaining reliable person!'.! identification without restricting the orientation requires a certain distance between the closest active RFID tag from the ZED and the second closest tag. The results show that the closest active RFID tag from the ZED and the second closest tag must be at least 70 cm apart to achieve reliable personal identification.

Identification of Chinese Personal Names in Unrestricted Texts

  • Cheung, Lawrence;Tsou, Benjamin K.;Sun, Mao-Song
    • Proceedings of the Korean Society for Language and Information Conference
    • /
    • 2002.02a
    • /
    • pp.28-35
    • /
    • 2002
  • Automatic identification of Chinese personal names in unrestricted texts is a key task in Chinese word segmentation, and can affect other NLP tasks such as word segmentation and information retrieval, if it is not properly addressed. This paper (1) demonstrates the problems of Chinese personal name identification in some If applications, (2) analyzes the structure of Chinese personal names, and (3) further presents the relevant processing strategies. The geographical differences of Chinese personal names between Beijing and Hong Kong are highlighted at the end. It shows that variation in names across different Chinese communities constitutes a critical factor in designing Chinese personal name Identification algorithm.

  • PDF

The Roles of Self-Expression and Identification on the Personal Community Commitment (개인 커뮤니티 몰입에 대한 자아표현 및 동일시의 역할)

  • Choi, Nak Hwan;Lee, Chang Won
    • Asia Marketing Journal
    • /
    • v.9 no.3
    • /
    • pp.117-149
    • /
    • 2007
  • It can be explained by congruity theory as a process that consumers engage in a matching process to identify personal community that is congruent with their self-images to find the identification between the self and the personal community. Personal community cues that evoke certain images are viewed as activating similar beliefs about the self (e.g., high status). Individuals prompt a comparison process to determine whether the personal community and self-image are congruent and imagine prototypical users of the personal community and select ones that maximize similarity to their actual or desired self-concept. Identity is devided into personal identity and social identity. Consumers are likely to be influenced by both personal identity and social identity. In this article the influencing factors of the commitment to on-line personal community are explored by the sources of both personal identification and social identification. The results are as follows. The maintenance expression and enhancement expression of personal self influence the level of personal identification positively and the maintenance expression and enhancement expression of social self influence the level of social identification positively. The level of both social and personal identification positively influence the commitment to on-line personal community which gives positive responses to the source enterprise that allows the cyberspace and the other benefits to be used.

  • PDF

Mutual Friendly Force Identification Protocol based on Hash-Chain for Personal Combat Systems

  • Lee, Jongkwan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.9
    • /
    • pp.3858-3869
    • /
    • 2020
  • In this paper, we propose a hash-chain based friendly force identification protocol for personal combatants equipped with a personal combat system in a tactical wireless network. It is imperative in military operations to effectively and quickly identify friendly forces. If the identification of friendly forces is not correct, this can cause friendly fire. In current ground operations, the identification of friendly forces by personal combatants is neither secure nor safe. To address this issue, the proposed protocol uses a hash-chain to determine if a detected person is friendly. Only friendly forces with the same materials that are assigned before they deploy can construct an initial hash-chain. Moreover, the hash-chain is changed at specific times. The performance of the proposed protocol is evaluated on the assumption that the secret key is leaked, which is the worst scenario in the security research field. We verify that the proposed protocol is secure for the various attack scenarios, such as message replay attack, fabrication attack, and Denial of Service attack.

The Impact of Green Corporate Identity and Green Personal-Social Identification on Green Business Performance: A Case Study in Thailand

  • ONPUTTHA, Suraporn;SIRIWICHAI, Chalermporn
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.8 no.5
    • /
    • pp.157-166
    • /
    • 2021
  • This study aims to investigate the impact of green corporate identity and employees' green identification on green business performance of international automobile manufacturers in Thailand. It involves 400 employees from the target study area, using questionnaires to collect data from January to February 2021, with purposive and convenient sampling methods. Data analysis employed structural equation modeling (SEM). The results show that green corporate identity has a significant impact on employees' green personal-social identification and green business performance; meanwhile, employees' green social identification has a significant impact on green business performance. However, employees' green personal identification has a significant impact on green business performance only through employees' green social identification. Green corporate identity can increase the corporate' green business performance via economic, environmental and social aspects through employees' green personal-social identification. The findings suggest that green corporate communication through visual identity, employee behaviors, culture, policy products and services in response to environmental forces and drivers to create the green corporate identity is deemed to systematically work. Furthermore, the findings also suggest that employees' green identification on both personal and social levels can be a significant issue that the managers in automobile manufacturers should pay attention as well.

Unconscious Personal Recognition Method using Personal Footprint (발자국 정보를 이용한 무의식적 개인 식별 방법)

  • 정진우;김대진;박광현;변증남
    • Proceedings of the IEEK Conference
    • /
    • 2002.06e
    • /
    • pp.137-140
    • /
    • 2002
  • We introduce a personal identification method which can find user's ID without any help of the user. To do this, there has been two approaches, vision-based and pressure-based. Pressure-based approach has some advantages compared than vision-based one in the aspects of illumination, occlusion, and the amount of data. In the previous study about pressure-based personal identification, there are some restrictions about human body posture for extracting normalized footprints. Since this approach cannot be extended unconscious and continuos identification, we suppose more natural method and verified it by experiments.

  • PDF

Optical security system for protection of personal identification information (개인신원정보 보호를 위한 광 보호 시스템)

  • 윤종수;도양회
    • Korean Journal of Optics and Photonics
    • /
    • v.14 no.4
    • /
    • pp.383-391
    • /
    • 2003
  • A new optical security system for the protection of personal identification information is proposed. Personal identification information consisting of a pure face image and an identification number is used for verification and authentication. Image encryption is performed by a fully phase image encryption technique with two random phase masks located in the input and the Fourier plane of 4-f correlator. The personal information, however, can be leaked out in the decryption process. To cope with this possibility, the encrypted image itself is used in the identification process. An encrypted personal identification number is discriminated and recognized by using the proposed MMACE_p (multiplexed MACE_p) filter, and then authenticity of the personal information is verified by correlation of the face image using the optical wavelet matched filter (OWMF). MMACE_p filter is a synthetic filter with four MACE_p (minimum average correlation energy_phase encrypted) filters multiplexed in one filter plane to recognize 10 different encrypted-numbers at a time. OWMF can improve discrimination capability and SNR (signal to noise ratio). Computer simulations confirmed that the proposed security technique can be applied to the protection of personal identification information.

A pilot study of an automated personal identification process: Applying machine learning to panoramic radiographs

  • Ortiz, Adrielly Garcia;Soares, Gustavo Hermes;da Rosa, Gabriela Cauduro;Biazevic, Maria Gabriela Haye;Michel-Crosato, Edgard
    • Imaging Science in Dentistry
    • /
    • v.51 no.2
    • /
    • pp.187-193
    • /
    • 2021
  • Purpose: This study aimed to assess the usefulness of machine learning and automation techniques to match pairs of panoramic radiographs for personal identification. Materials and Methods: Two hundred panoramic radiographs from 100 patients (50 males and 50 females) were randomly selected from a private radiological service database. Initially, 14 linear and angular measurements of the radiographs were made by an expert. Eight ratio indices derived from the original measurements were applied to a statistical algorithm to match radiographs from the same patients, simulating a semi-automated personal identification process. Subsequently, measurements were automatically generated using a deep neural network for image recognition, simulating a fully automated personal identification process. Results: Approximately 85% of the radiographs were correctly matched by the automated personal identification process. In a limited number of cases, the image recognition algorithm identified 2 potential matches for the same individual. No statistically significant differences were found between measurements performed by the expert on panoramic radiographs from the same patients. Conclusion: Personal identification might be performed with the aid of image recognition algorithms and machine learning techniques. This approach will likely facilitate the complex task of personal identification by performing an initial screening of radiographs and matching ante-mortem and post-mortem images from the same individuals.

Personal Identification Using Inner Face of Fingers from Contactless Hand Image (비접촉 손 영상에서 손가락 면을 이용한 개인 식별)

  • Kim, Min-Ki
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.8
    • /
    • pp.937-945
    • /
    • 2014
  • Multi-modal biometric system can use another biometric trait in the case of having deficiency at a biometric trait. It also has an advantage of improving the performance of personal identification by using multiple biometric traits, so studies on new biometric traits have continuously been performed. The inner face of finger is a relatively new biometric trait. It has two major features of knuckle lines and wrinkles, which can be used as discriminative features. This paper proposes a finger identification method based on displacement vector to effectively process some variation appeared in contactless hand image. At first, the proposed method produces displacement vectors, which are made by connecting corresponding points acquired by matching each pair of local block. It then recognize finger by measuring the similarity among all the detected displacement vectors. The experimental results using pubic CASIA hand image database show that the proposed method may be effectively applied to personal identification.