• Title/Summary/Keyword: Personal Identification System

Search Result 209, Processing Time 0.021 seconds

RFID Mutual Autentication Protocol Using AES (AES를 이용한 RFID 상호인증 프로토콜)

  • Kim, Seok;Han, Seung-Jo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.9
    • /
    • pp.1963-1969
    • /
    • 2012
  • Recently use of RFID(Radio Frequency Identification) tends to be rapidly increased and will be also extended throughout the whole life. Using radio-frequency data can be recognized automatically in the RFID system is vulnerable to personal information protection or security. And passive tags have a hardware problem is the limit for applying cryptographic. This paper presents an authentication protocol using AES and Nounce. After completing mutual authentication server to access and strengthen security vulnerability to the use of the Nounce, because safety in denial of service attacks.

Parallel Processing based Image Identifier Generation (병렬처리 기반 정지영상 인식자 생성)

  • Ko, Mieun;Park, Je-Ho;Park, Young B.;Seo, Wontaek
    • Journal of the Semiconductor & Display Technology
    • /
    • v.16 no.1
    • /
    • pp.6-10
    • /
    • 2017
  • Recent enhancement in the still image acquisition devices has been widely perpetrated into the daily life of the common people. Due to this trend, the voluminous still images, that are produced and shared in the personal or the massive storage, need to controlled with effective and efficient management. The human-devised or system-generated still image identifiers used for the identification of the images are at risk in the situation of unexpected changing or eliminating of the identifiers. In this paper, we propose a parallel processing based method for still image identifier generation by utilizing the still image internal features.

  • PDF

Examination of Required Functions in the PBNM Scheme for Multiple Domains as Cyber Physical System that Utilizes Data Science and AI

  • Kazuya Odagiri;Shogo Shimizu;Naohiro Ishii
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.2
    • /
    • pp.31-38
    • /
    • 2023
  • In the current Internet system, there are many problems using anonymity of the network communication such as personal information leaks and crimes using the Internet system. This is why TCP/IP protocol used in Internet system does not have the user identification information on the communication data, and it is difficult to supervise the user performing the above acts immediately. As a study for solving the above problem, there is the study of Policy Based Network Management (PBNM). This is the scheme for managing a whole Local Area Network (LAN) through communication control for every user. In this PBNM, two types of schemes exist. As one scheme, we have studied theoretically about the Destination Addressing Control System (DACS) Scheme with affinity with existing internet. By applying this DACS Scheme to Internet system management, we will realize the policy-based Internet system management. In this paper, required functions in the PBNM Scheme for multiple domains as cyber physical system that utilizes data science and AI is examined.

Experiment in the PBNM Scheme for Multiple Domains as Cyber Physical System Using Data Science and AI

  • Kazuya Odagiri;Shogo Shimizu;Naohiro Ishii
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.8
    • /
    • pp.54-60
    • /
    • 2024
  • In the current Internet system, there are many problems using anonymity of the network communication such as personal information leaks and crimes using the Internet system. This is why TCP/IP protocol used in Internet system does not have the user identification information on the communication data, and it is difficult to supervise the user performing the above acts immediately. As a study for solving the above problem, there is the study of Policy Based Network Management (PBNM). This is the scheme for managing a whole Local Area Network (LAN) through communication control for every user. In this PBNM, two types of schemes exist. As one scheme, we have studied theoretically about the Destination Addressing Control System (DACS) Scheme with affinity with existing internet. By applying this DACS Scheme to Internet system management, we will realize the policy-based Internet system management. In this paper, basic system design for PBNM scheme for multi-domain management utilizing data science and AI is showed with experiment in feasibility.

Enhanced Authentication Protocol of RFID System (RFID 시스템의 개선된 인증 프로토콜)

  • Lee, Sang-Ryul
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.6
    • /
    • pp.193-200
    • /
    • 2007
  • There is an advantage that RFID system is better than previous bar code system in storage ability and noncontact property. But, everyone can easily receive the transmitting information by using RF signal. So, there is a problem that system security and personal privacy are threatened. In this paper, I propose RFID system that is secure against attacks like eavesdropping, replay, spoofing and location tracking and can efficiently provide mutual authentication services between reader and tag. The proposed RFID system can be used in various sections of ubiquitous computing environment.

  • PDF

Measurement of Time/Location for Personal Exposure Assessment of Air Pollutants (대기오염물질 개인노출 평가를 위한 시간/장소 조사방법의 고찰)

  • Lee, Boram;Ban, Hyunkyung;Jang, Yelim;Lee, Kiyoung
    • Journal of Environmental Health Sciences
    • /
    • v.42 no.5
    • /
    • pp.314-323
    • /
    • 2016
  • Objectives: Time location data are critical for accurately estimating personal exposures. This review papers summarized various measurement methods of time location pattern for air pollution exposure assessment. Methods: Forty manuscripts (papers, books and reports) were reviewed to comprehensively describe time location measurement methods. Results: This review included traditional methods such as time activity diary, questionnaire, observation, focus group and newly developed technical methods including global positioning system, web, radio frequency identification and ultrasound detection. Some research applied a combination of methods. Conclusion: Although various methods have been used to collect time location data, further development of accurate measurement methods for time location data is needed.

A Study on the Health Information Management Practice Program Model for EMR Certification System Education -Focus on Patient Information Management- (EMR 인증제 교육을 위한 보건의료정보관리 실습 프로그램 모델 연구 -환자정보관리 중심-)

  • Choi, Joon-Young
    • Journal of the Health Care and Life Science
    • /
    • v.9 no.1
    • /
    • pp.1-9
    • /
    • 2021
  • In this study, a model in which certification standards were added to the health information management practice program was studied and presented in order to understand the EMR certification standards implemented by the Korea Health and Medical Information Service. In the practice program, the certification standard function for patient information management was added to the health information management education system to practice and understand patient information management that corresponds to the functional standard of the EMR certification system. The EMR certification standard practice program for patient information management is composed of the following certification standards. registration number and personal information management, treatment reservation schedule management, personal information revision history management, identification of people with the same name, integrated management of multiple registration numbers, patient search by identification information, patient search by health care type, surgical procedure consent record and inquiry, record/inquiry of consent form for personal information use, display of life-sustaining medical decision information, registration/inquiry of external medical institution documents, registration and inquiry of external examination results. In this way, by operating and practicing the functions of the health information system according to the certification standards, it is possible to understand and practice the certification standards and details of patient information management in the functional area of the certification standards. In addition, since the function of the EMR certification standard can be checked, it will be possible to improve the management ability of the electronic medical record system of the health information manager in the medical institution.

Concept of the Cloud Type Virtual Policy Based Network Management Scheme for the Whole Internet

  • Kazuya, Odagiri;Shogo, Shimizu;Naohiro, Ishii
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.1
    • /
    • pp.71-77
    • /
    • 2023
  • In the current Internet system, there are many problems using anonymity of the network communication such as personal information leaks and crimes using the Internet system. This is why TCP/IP protocol used in Internet system does not have the user identification information on the communication data, and it is difficult to supervise the user performing the above acts immediately. As a study for solving the above problem, there is the study of Policy Based Network Management (PBNM). This is the scheme for managing a whole Local Area Network (LAN) through communication control for every user. In this PBNM, two types of schemes exist. As one scheme, we have studied theoretically about the Destination Addressing Control System (DACS) Scheme with affinity with existing internet. By applying this DACS Scheme to Internet system management, we will realize the policy-based Internet system management. In this paper, to realize it, concept of the Internet PBNM Scheme is proposed as the final step.

Extraction of Iris Codes for Personal Identification Using an Iris Image (홍채를 이용한 생체인식 코드 추출)

  • Yang, Woo Suk
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.8 no.6
    • /
    • pp.1-7
    • /
    • 2008
  • In this paper, we introduce a new technology to extract the unique features from an iris image, which uses scale-space filtering. Resulting iris code can be used to develop a system for rapid and automatic human identification with high reliability and confidence levels. First, an iris part is separated from the whole image and the radius and center of the iris are evaluated. Next, the regions that have a high possibility of being noise are discriminated and the features presented in the highly detailed pattern are then extracted. In order to conserve the original signal while minimizing the effect of noise, scale-space filtering is applied. Experiments are performed using a set of 272 iris images taken from 18 persons. Test results show that the iris feature patterns of different persons are clearly discriminated from those of the same person.

  • PDF

Design of Seal Imprint Identification System for Personal Verification (본인확인을 위한 인감조합시스템의 설계)

  • 조기형;이대영
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.16 no.8
    • /
    • pp.793-800
    • /
    • 1991
  • In this paper, proposed the seal imprint verification system that could add on the redident information system. In the positioning process, used ring data and in the matching process, used XY pixel distribution. As a result of the verification experiment, the error verification ratio is about 1%. But could verify that this system could be added and operated on the resident information system through the eye-decision after subtacting and adding process.

  • PDF