• Title/Summary/Keyword: Personal Identification Information

Search Result 339, Processing Time 0.028 seconds

Personal Identification System Using Directional Distribution of Fingerprints (지문의 방향분포를 이용한 개인 인증 시스템)

  • Lee, Jung-Moon;Kim, Jin-Sung
    • Journal of Industrial Technology
    • /
    • v.24 no.A
    • /
    • pp.59-65
    • /
    • 2004
  • Personal identification using fingerprints needs much calculational effort. Generally, there are various methods for fingerprint-based identification. In this paper, an identification method is proposed which is based on direction distribution of fingerprint ridges. An 8-directional Gabor filter bank is used for extracting the feature vector from the given fingerprint. Then, it is compared with those of registered fingerprints for matching. This method is simple and fast to implement because it uses the information of ridge directions only. An experiment on 532 fingerprints from NIST database and some other source shows its usefulness.

  • PDF

A Study on Reforming the National Personal Identification Number System : The Unconnected Random Personal Identification Number System (국가 개인식별번호체계 개선에 관한 연구 : 독립적 난수기반 개인식별번호체계로 전환)

  • Han, Mun-Jung;Jang, GyeHyun;Hong, Seokhie;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.4
    • /
    • pp.721-737
    • /
    • 2014
  • The Resident Registration Number(RRN) system has been effectively acted as a national identification system since it was enforced. On the other hand, there are some problems such as leakages of personal informations including RRNs on a large scale and each RRN makes a pair with each person in all areas of the society. Nevertheless leakages of them might cause a big damage, there is no radical countermeasure for they are never changed in actual fact. In Republic of Korea, a RRN acts as a primary key of a database, so it has to be protected by severing the connectivity between leaked RRNs and the other personal data. In this paper, the Unconnected Random Personal Identification Number system is proposed for preventing damage of data spills by removing a dependency which the RRN has. Furthermore, this paper suggests the solutions against some potential issues in the system.

A Method for Effective Mobile Electronic Notification Service of Private Institutions

  • Kim, JongBae
    • International Journal of Advanced Culture Technology
    • /
    • v.10 no.2
    • /
    • pp.194-200
    • /
    • 2022
  • Traditionally, postal services that produce and deliver paper-based notices have been the mainstream. The reason is that it has the function of distribution and proof of delivery in the postal delivery system as well as the advantage of information delivery through postal delivery. After all, for the purpose of distribution and proof of delivery, many organizations use paper-based postal notices. However, in recent years, it has been in the spotlight to produce a paper-based postal notice as an electronic notice and deliver information to a mobile device through the Internet. In this paper, we propose a safe interworking method for user identification information required for private institutions to transmit mobile electronic notices. In order for a private institution to accurately deliver an electronic notice to a mobile service subscriber, a means to confirm whether the private institution and the mobile device subscriber are the same person is required. In the mobile electronic notification service, the connecting information provided by the personal identity proofing agency is used as a means of user identification. Connecting information is called a resident registration number on the Internet and is one-way hash information that can only be created by the personal identity proofing agency designated by the government. In order to transmit a mobile electronic notice, it is necessary to share connecting information for the same user identification between the institution that requests the sending of the electronic notice and the institution that processes the sending of the electronic notice. Connecting information is personal information that can uniquely identify a user, and if it is disclosed, damage such as personal information infringement may occur. As such, it is necessary to prevent problems that may arise from misuse and abuse of connecting information as well as increase in the benefits of sending the mobile electronic notice. In this paper, a safe and effective mobile electronic notification service can be performed by suggesting a method for safe interworking of information related to the mobile electronic notification service.

A study on the method of measuring the usefulness of De-Identified Information using Personal Information

  • Kim, Dong-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.6
    • /
    • pp.11-21
    • /
    • 2022
  • Although interest in de-identification measures for the safe use of personal information is growing at home and abroad, cases where de-identified information is re-identified through insufficient de-identification measures and inferences are occurring. In order to compensate for these problems and discover new technologies for de-identification measures, competitions to compete on the safety and usefulness of de-identified information are being held in Korea and Japan. This paper analyzes the safety and usefulness indicators used in these competitions, and proposes and verifies new indicators that can measure usefulness more efficiently. Although it was not possible to verify through a large population due to a significant shortage of experts in the fields of mathematics and statistics in the field of de-identification processing, very positive results could be derived for the necessity and validity of new indicators. In order to safely utilize the vast amount of public data in Korea as de-identified information, research on these usefulness metrics should be continuously conducted, and it is expected that more active research will proceed starting with this thesis.

Image encryption using JTC architecture and fingerprint key (JTC 구조와 지문을 이용한 영상 암호화)

  • 서동환;이상수;신창목;박세준;김종윤;김수중
    • Proceedings of the IEEK Conference
    • /
    • 2001.06b
    • /
    • pp.75-78
    • /
    • 2001
  • In this paper, we proposed a personal identification method using binay image encryption technique and decryption system in JTC structure. Logo which represents the group symbol was encrypted with personal fingerprint and JTC structure decrypts this logo. The logo can not decrypted by other unused fingerprint even if the encrypted image was lost or stolen. So this method can give more safe personal identification.

  • PDF

A Study of the Change Method of Korean Resident Registration Number (주민등록번호 변경 방법에 대한 연구)

  • Lee, Younggyo;Ahn, Jeonghee
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.3
    • /
    • pp.65-74
    • /
    • 2016
  • The Korean resident registration number has been used since 1962 as a personal identification number. The Korean government assigns this number to each korean citizen and it is not able to be changed. In 2000s, as the Internet was rapidly spreaded out, personal information such as the Korean resident registration number, name, home address, and phone number was leaked. The companies provide diverse internet service while collecting personal information. However, personal information was sometimes leaked because of hacking, poor information management and so on. As s results, some of citizens asked government and court of Korea to change the Korean resident registration number because they suffered material damage and emotional distress. The constitutional court decided to be able to change the number from 2018. In this study, the Korean resident registration number which is possible to change, serial number, public certificate, I-PIN, and My-PIN were analyzed comparatively. In addition, considerations when the Korean resident registration number was changed were discussed. The public certificate and I-PIN were appropriate to the case of on-line Korean resident registration number. The Korean resident registration number, serial number, My-PIN were appropriate to the case of off-line Korean resident registration number. Lastly, it would be efficient to manage the Korean resident registration number separately such as on-line and off-line.

A Study on De-Identification Methods to Create a Basis for Safety Report Text Mining Analysis (항공안전 보고 데이터 텍스트 분석 기반 조성을 위한 비식별 처리 기술 적용 연구)

  • Hwang, Do-bin;Kim, Young-gon;Sim, Yeong-min
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.29 no.4
    • /
    • pp.160-165
    • /
    • 2021
  • In order to identify and analyze potential aviation safety hazards, analysis of aviation safety report data must be preceded. Therefore, in consideration of the provisions of the Aviation Safety Act and the recommendations of ICAO Doc 9859 SMM Edition 4th, personal information in the reporting data and sensitive information of the reporter, etc. It identifies the scope of de-identification targets and suggests a method for applying de-identification processing technology to personal and sensitive information including unstructured text data.

An Empirical Study on the Factors that Affect the Continuous Use Intention of i-PIN (아이핀(i-PIN)의 지속적 사용의도에 영향을 미치는 요인에 관한 실증적 연구)

  • Im, Hyuk;Kim, Tae-Sung
    • Journal of Information Technology Applications and Management
    • /
    • v.22 no.4
    • /
    • pp.159-179
    • /
    • 2015
  • In 2005, Korean government created the Internet Personal Identification Number (i-PIN) for a new online personal identification system to protect citizens' personal information against criminal abuse. However, i-PINs have not been widely in use over a decade. Although many people joined the i-PIN service, its actual use rate has been low. This study intends to identify the factors necessary to boost the continuous use of i-PINs. It was shown that government support and perceived security had a positive effect on the perceived ease of use and perceived usefulness of the i-PIN, respectively. Perceived security also directly affected the continuous use intention of the i-PIN. The perceived ease of use significantly affected the perceived usefulness, but it did not affect the intention to continuously use the i-PIN. The factor that had the most significant influence on the continuous use intention of the i-PIN was perceived usefulness. To increase the i-PIN use rate, Korean government must reduce users' anxiety through strict security functions, and must attempt to help people use the i-PIN easily.

Implementation of GPS Based Location Management System (GPS를 이용한 위치관리시스템 구현)

  • Choi, Jae-Myeong;Kang, Heau-Jo;Lee, Sang-Heon
    • Journal of Advanced Navigation Technology
    • /
    • v.12 no.1
    • /
    • pp.15-21
    • /
    • 2008
  • In this paper, person monitoring and personal identification information management by using the location positioning device and the location management system based on GPS is analysed and developed. Mobile HTE(Mobile HTE : Mobile Home Terminal Equipment) of the developed system uses the module for transmitting PID(Personal Identification Device) information and the module based on GPS's location information. HTE transmits the received information from Mobile HTE to the Location Management System through the internet system. The Location Management System is developed for person location management and information management.

  • PDF

Considering on De-Identification Method of Personal Information for National Medical Institute by using correlation (상관도를 이용한 국내 의료기관용 개인정보 비식별화 방안에 관한 연구)

  • Yeo, Kwang Soo;Kim, Chul Jung;Lee, Jae Hyun;Kim, Soon Seok
    • Smart Media Journal
    • /
    • v.5 no.4
    • /
    • pp.83-89
    • /
    • 2016
  • Guidelines for protecting personal information are already in progress in USA, UK and other countries and announced many guideline like HIPPA. However In Our national environment, we does not have specialized guideline in national medical industries. This thesis suggest De-indentification method in South Korea by referring 'bigdata De-identification Guideline by Ministry of Science, ICT and Future Planning (2015)', ICO in U. K and IHE, NIST, HIPPA in U. S. A. We suggest also correlation between Guidelines. Corelation means common techniques in three guidelines (IHE, NIST, HIPPA in U. S. A). As Point becomes closer five points, We recommend that technique to national medical institute for De-Identification. We hope this thesis makes the best use of personal information's development in National medical institute.