• Title/Summary/Keyword: Personal Identification System

Search Result 209, Processing Time 0.023 seconds

Improving Personal Data Protection in IoT Environments (사물인터넷(IoT) 환경에서 개인정보보호 강화를 위한 제도 개선 방안)

  • Lee, Ae Ri;Son, Soomin;Kim, Hyun Jin;Kim, Beomsoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.4
    • /
    • pp.995-1012
    • /
    • 2016
  • In Internet of Things (IoT) environments, devices or sensors everywhere can automatically collect data without the individual awareness, further combine and share data using ubiquitous network, and thus the development of IoT raises new challenges in respect of personal data protection and privacy. This study aims to identify main issues related to data protection in the IoT and propose adequate measures. We analyzed the types of personal data controllers and processors in IoT and figured out the issues regarding the processing of personal data and the rights to privacy of data subject. Accordingly, we suggested the institutional ways (e.g., establishment of user-friendly notice and flexible consent system, re-identification risk monitoring system, data protection in cross-border transfer, and user education) to improve the situation of personal data protection in IoT and finally proposed the improvement tasks to carry out first based on the degree of urgency and importance.

Improved Application Test Data Range Selection Method in a Non-Personal Information Identification Environment (개인정보 비식별 환경에서의 개선된 응용프로그램 테스트 데이터 범위 선정 방법)

  • Baek, Song-yi;Lee, Kyung-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.5
    • /
    • pp.823-834
    • /
    • 2020
  • In the past, when the personal information leakage incident of the three card companies, the computer program development was followed by the same strict electronic financial supervision regulations as the operating environment. However, when developing a computerized program, the application data is being verified with the integrity of the test data being compromised because the identification of the scope of conversion of the test data associated with the application is unclear. Therefore, in this paper, we proved by presenting a process and algorithm for selecting a range of sufficient test data conversion targets associated with a specific application.

A Review of Extended STR Loci and DNA Database

  • Cho, Yoonjung;Lee, Min Ho;Kim, Su Jin;Park, Ji Hwan;Jung, Ju Yeon
    • Biomedical Science Letters
    • /
    • v.28 no.3
    • /
    • pp.157-169
    • /
    • 2022
  • DNA typing is the typical technology in the forensic science and plays a significant role in the personal identification of victims and suspects. Short tandem repeat (STR) is the short tandemly repeated DNA sequence consisting of 2~7 bp DNA units in specific loci. It is disseminated across the human genome and represents polymorphism among individuals. Because polymorphism is a key feature of the application of DNA typing STR analysis, STR analysis becomes the standard technology in forensics. Therefore, the DNA database (DNA-DB) was first introduced with 4 essential STR markers for the application of forensic science; however, the number of STR markers was expanded from 4 to 13 and 13 to 20 later to counteract the continuously increased DNA profile and other needed situations. After applying expanded STR markers to the South Korean DNA-DB system, it positively affected to low copy number analysis that had a high possibility of partial DNA profiles, and especially contributed to the theft cases due to the high portion of touch DNA evidence in the theft case. Furthermore, STR marker expansion not only contributed to the resolution of cold cases but also increased kinship index indicating the potential for improved kinship test accuracy using extended STR markers. Collectively, the expansion of the STR locus was considered to be necessary to keep pace with the continuously increasing DNA profile, and to improve the data integrity of the DNA-DB.

A REID privacy protect scheme based on mobile (모바일 기반의 RFID 프라이버시 보호 기법)

  • Kim, Il-Jung;Choi, Eun-Young;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.1
    • /
    • pp.89-96
    • /
    • 2007
  • Radio Frequency Identification system based on EPC(Electronic Product Code) Network Environment can read or write information of tagged objects, using Rf signals without direct contact. This advantage which is to provide storage ability and contactless property is better than Bar-code system. Mobile RFID system which integrates Mobile system with RFID system will provide new additional service to users. However, an advantage for obtaining information of objects using RF signal causes personal privacy problem. In this paper, we propose techniques that can protect personal privacy based on mobile. Our scheme provides privacy protection of users and is more efficiently than another application service.

e-Passport Integrated Authentication Mechanisms with Improved Efficiency (효율성이 강화된 전자여권 통합 인증 메커니즘)

  • Lee, Dong-Bum;Go, Woong;Kwak, Jin
    • Journal of Internet Computing and Services
    • /
    • v.10 no.2
    • /
    • pp.53-63
    • /
    • 2009
  • e-Passport system is new type of emigration and immigration control system and it is a research to introduce the e-Passport Authentication Protocol with Improved Efficiency is lively proceeded over the entire world. The e-Passport's chip has a biometric information and personal identification information, Radio Frequency Identification(RFID) technology is used for communication with the Inspection System(IS). However, the feature of the RFID system may bring about various security threats such as eavesdropping, data forgeries, data alternation, cloning, biometric data-leakage. Therefore, in this paper, we analyse the e-Passport system's authentication protocol to protect vulnerability and proposed e-Passport system's authentication protocol reduce computation. Also, we compared their efficiency.

  • PDF

Intelligence E- Learning System (지능형 E-러닝 시스템)

  • Hong, You-Sik;Kim, Cheon-Shik;Yoon, Eun-Jun;Jung, Chang-Duk
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.1
    • /
    • pp.137-144
    • /
    • 2010
  • Cyber lectures have been popular with students as they are more accessible. In this thesis we also created a personal identification confirmation system with RFID as it is quite difficult to confirm who is taking a lecture. In the process of developing the confirmation system, an algorithm enabling real-time identification confirmation, as well as interactive virtual questioning system, was also developed. After the computer simulation test we proved the duplex on-line lecturing system is more effective than the current one-way cyber lecturing system which does not take into consideration students with less/no degree of understanding.

A Study of the Damage and the Countermeasure by Identification Card Loss (신분증 분실에 따른 피해 및 대응책에 관한 연구)

  • Lee, Younggyo;Ahn, Jeonghee
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.3
    • /
    • pp.53-64
    • /
    • 2017
  • Korean Identification card or driver license is usually used to verify one's identity in Korea. These are also used as an adult certification. Since the form of these ID card is an analog and it needs to be checked with naked eyes, it might be used maliciously. Someone who's got someone else's ID card can do other things. Therefore, it must be reported rapidly when ID card is lost or stolen. The most serious problem might be occurred when they do not recognize and report the loss. They might suffer from pecuniary or mental damage such as opening a mobile phone service, providing loan or credit card, opening a personal checking account, etc. Thus, this study suggests and compares the ways of avoiding these problems. First, the most effective way is to send the authorization code via mobile phones in consideration of build-up period and cost. The person in charge of business processing department using ID card sends the authorization code via registered mobile phone. The owners submits it to the person and their identifications are confirmed. Next effective way is that the person in charge of business processing department using ID card sends text messages via registered mobile phone. Lastly, the most ineffective way is to introduce and implement the electronic ID card ultimately even though it is expensive and takes a long time to build up the system.

Fiber Identification via the TISS and DELTA Systems (TISS system 및 DELTA system에 의한 섬유식별)

  • 전수경
    • Journal of the Korea Furniture Society
    • /
    • v.10 no.1
    • /
    • pp.1-12
    • /
    • 1999
  • Of the vast number of plant taxa in the world, the wood is one of the most useful resources. It is important to identify the fibers of wood and pulp for the plant taxonomy and for the uses, but we do not have enough information on them, on them, especially for the computerizd data. The fiber identification is one of the difficult tasks. In addition to the plant taxonomy and the fiber-using industries, such identification is also important in many other fields, including education. document examiners, etc. For these purpose, the fibers should be exactly distinguished. The TISS system I have programed to identify various woods would also be useful in the identification of fibers by the genus and species in the features of unknown samples and in searching the features of a species based on its scientific name. Such searching programs are being developed in many other countries with a view to searching for the species name by using the features of the cells of the woody materials. With the survey of all the available literature, the features of the fibers of 124 species both of softwood and hardwood were examined under the electron and optical microscopies. Each species were coded and carded by the feature, and the databases were built. The microscopic were inputted into a personal computer program called and by a slide film scanner. The new computer program called TISS 2 was developed using C computer language. Korean language fonts were added to the TISS 2. The TISS 2 can be in adding and searching a image of fiber features both of a known fiber and an unknown fiber. The databases were corded for the DELTA system with was developed by Dallwitz and Paine in Australia, 1986.

  • PDF

Implementation and Design of Artificial Intelligence Face Recognition in Distributed Environment (분산형 인공지능 얼굴인증 시스템의 설계 및 구현)

  • 배경율
    • Journal of Intelligence and Information Systems
    • /
    • v.10 no.1
    • /
    • pp.65-75
    • /
    • 2004
  • It is notorious that PIN(Personal Identification Number) is used widely for user verification and authentication in networked environment. But, when the user Identification and password are exposed by hacking, we can be damaged monetary damage as well as invasion of privacy. In this paper, we adopt face recognition-based authentication which have nothing to worry what the ID and password will be exposed. Also, we suggest the remote authentication and verification system by considering not only 2-Tier system but also 3-Tier system getting be distributed. In this research, we analyze the face feature data using the SVM(Support Vector Machine) and PCA(Principle Component Analysis), and implement artificial intelligence face recognition module in distributed environment which increase the authentication speed and heightens accuracy by utilizing artificial intelligence techniques.

  • PDF

A Study on the Principle of Application of Privacy by Design According to the Life Cycle of Pseudonymization Information (가명정보 생명주기에 따른 개인정보보호 중심 설계 적용 원칙에 관한 연구)

  • Kim, Dong-hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.2
    • /
    • pp.329-339
    • /
    • 2022
  • Recently, as personal information has been used as data, various new industries have been discovered, but cases of personal information leakage and misuse have occurred one after another due to insufficient systematic management system establishment. In addition, services that use personal information anonymously and anonymously have emerged since the enforcement of the Data 3 Act in August 2020, but personal information issues have arisen due to insufficient alias processing, safety measures for alias information processing, and insufficient hate expression. Therefore, this study proposed a new PbD principle that can be applied to the pseudonym information life cycle based on the Privacy by Design (PbD) principle proposed by Ann Cavoukian [1] of Canada to safely utilize personal information. In addition, the significance of the proposed method was confirmed through a survey of 30 experts related to personal information protection.