• Title/Summary/Keyword: Personal Identity

Search Result 406, Processing Time 0.02 seconds

Biometric and Identity Reference Protection (개인식별정보와 바이오인식정보의 보호기법)

  • Shin, Yang-Nyuo;Kwan, Man-Jun;Lee, Yong-Jun;Park, Jin-Il;Chun, Myung-Geun
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.19 no.2
    • /
    • pp.160-167
    • /
    • 2009
  • This paper describes how to protect the personal information of a biometric reference provider wherein biometric reference and personally identifiable information are bounded in a biometric system. To overcome the shortcomings of the simple personal authentication method using a password, such as identify theft, a biometric system that utilizes physical and behavioral characteristics of each person is usually adopted. In the biometric system, the biometric information itself is personal information, and it can be used as an unique identifier that can identify a particular individual when combining with the other information. As a result, secure protection methods are required for generating, storing, and transmitting biometric information. Considering these issues, this paper proposes a method for ensuring confidentiality and integrity in storing and transferring personally identifiable information that is used in conjunction with biometric information, by extending the related X9.84 standard. This paper also outlines the usefulness of the proposition by defining a standard format represented by ASN.1, and implementing it.

A Study on the Collection Based on Personal History for the Archiving of Industrial Heritage (산업유산 아카이빙을 위한 개인 생애서사 기반 수집 연구)

  • Ryu, Hanjo
    • The Korean Journal of Archival Studies
    • /
    • no.66
    • /
    • pp.37-67
    • /
    • 2020
  • Recently, industrial heritages have been transformed into cultural facilities in the wake of urban Regeneration. This focus is mainly on appearance, and the explanation is often abbreviated as a master narrative, and the placeness is not sufficiently inherited. The placeness of industrial heritage contains not only historical but also personal memories. Place memory must be collected and managed in order for the placeness that can be the source of identity to be preserved and utilized. To this end, this study suggested collecting place memories based on personal life histories. Using the case of collecting Andong Station and Cheongju Tobacco Factory, the life narrative was broken down into an event and the process of reinterpreting it as a place memory was proposed to implement archiving of industrial heritage sites. This methodology means that it can be supplemented rather than replaced.

The Characteristics and Maintenance of Assemblypersons' Activity Records (국회의원 활동기록의 특성과 관리방향)

  • Han, Eun-Jeong;Yim, Jin-Hee
    • The Korean Journal of Archival Studies
    • /
    • no.21
    • /
    • pp.117-167
    • /
    • 2009
  • Assemblypersons' activities have organizational and individual nature. The activities of assemblypersons and their assistant staffs become a motive for major work performance of Korean legislature, and are also critical public services affecting contemporary political history, history of political parties and history of assemblyperson's hometown. Moreover, their activities are also characterized by work performance in favor of assemblyperson's personal interests to effectively communicate his or her achievements during term of office to electors with a view to winning reelection after the end of 4-year term of office. Assemblyperson's organization produces various types of record in the performance of these works. From the viewpoint of public archive as a product of assemblypersons' public service performance and from their own personal viewpoints, they can create their own identity by arranging their personal records that can demonstrate their own political philosophy, policy orientation, achievements during term of office, and personal features. In addition, their personal records can have much more values and significance in the sense that those records are available to electors to make it possible to highlight their own images in objective and reliable manner. Conclusively, this study underlined that the efforts for assemblypersons and their assistant staffs to keep their records well could be helpful to streamline their internal works and be also helpful for personal interests of assemblypersons. And this study proposed procedures and methods for deducing and screening a list of production archives to meet a viewpoint of streamlined internal works and needs for keeping personal records, ultimately with a view to giving practical helps for these works.

Personal Biometric Identification based on ECG Features (ECG 특징추출 기반 개인 바이오 인식)

  • Yoon, Seok-Joo;Kim, Gwang-Jun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.10 no.4
    • /
    • pp.521-526
    • /
    • 2015
  • Research on how to use the biological characteristics of human to confirm the identity of the individual is being actively conducted. Electrocardiogram(: ECG) based biometric system is difficult to counterfeit and does not cause skin irritation on the subject. It can be easily combined with conventional biometrics such as fingerprint and face recognition to give multimodal biometric systems. In this thesis, biometric identification method analysing ECG waveform characteristics from Discrete Wavelet Transform(DWT) coefficients is suggested. Feature selection is performed on the 9 coefficients of DWT using the correlation analysis. The verification is achieved by using the error back propagation neural networks. Using the proposed approach on 24 subjects of MIT-BIH QT Database, 98.88% verification rate has been obtained.

Dynamic Reservation Scheme of Physical Cell Identity for 3GPP LTE Femtocell Systems

  • Lee, Poong-Up;Jeong, Jang-Keun;Saxena, Navrati;Shin, Ji-Tae
    • Journal of Information Processing Systems
    • /
    • v.5 no.4
    • /
    • pp.207-220
    • /
    • 2009
  • A large number of phone calls and data services will take place in indoor environments. In Long Term Evolution (LTE), femtocell, as a home base station for indoor coverage extension and wideband data service, has recently gained significant interests from operators and consumers. Since femtocell is frequently turned on and off by a personal owner, not by a network operator, one of the key issues is that femtocell should be identified autonomously without system information to support handover from macrocell to femtocell. In this paper, we propose a dynamic reservation scheme of Physical Cell Identities (PCI) for 3GPP LTE femtocell systems. There are several reserving types, and each type reserves a different number of PCIs for femtocell. The transition among the types depends on the deployed number of femtocells, or the number of PCI confusion events. Accordingly, flexible use of PCIs can decrease PCI confusion. This reduces searching time for femtocell, and it is helpful for the quick handover from macrocell to femtocell. Simulation results show that our proposed scheme reduces average delay for identifying detected cells, and increases network capacity within equal delay constraints.

A Study on the Tartan and Scotland Costume (TARTAN과 스코틀랜드 복식에 관한연구)

  • 임영자
    • Journal of the Korean Society of Costume
    • /
    • v.35
    • /
    • pp.281-292
    • /
    • 1997
  • Tatan is a symbol of kinship and belonging in Scotland and a badge of identity recognized all over the world. Alongside the powerful historical and national resonance to Tartan for Scots it has been borrowed repeatedly by fashion. The pattern compositionof Tartan check is formed as a typical cross stripes that vertical line and hrizontal line meets rectangulary. And its color is much various and rich than other check pattern. So its magnificient spec-tacle that various all kinds of colors is dyed in cloth is second to name. Today we are as likely to meet tartan in a couturier dress as in a kilt or plaid. Tartan is distinctive in colour style and de-sign. It conveys personality ceremony and drama. All these aspects of its character have contributed to tartan being one of the best-known and best-loved fabrics in the world. In other parts of Europe traditional checked patterns declined and disappeared but in Scotland tartan survived strongly jist as the bagpipes also European flourished Due to geographical and cultural circumstances Scots were able to develop and enhance tartan and its remarkable individuality ensured its sur-vival in spite of adverse political and economic pressures. Tartan has been adopted as the national dress of all Scots. Lowland and High-land providing a powerful form of national cultural and personal identity. Whether tra-ditional or a recent creation whether tra-ditional or a recent creation whether a symbol of nationality or a substitute for nationhood tartan is no mean achievement.

  • PDF

A Lightweight Authentication Mechanism for Acknowledgment Frame in IEEE 802.15.4 (IEEE 802.15.4에서 확인 프레임을 위한 경량 인증 메커니즘)

  • Heo, Joon;Hong, Choong-Seon
    • Journal of KIISE:Information Networking
    • /
    • v.34 no.3
    • /
    • pp.175-185
    • /
    • 2007
  • In IEEE 802.15.4 (Low-Rate Wireless Personal Area Network) specification, a successful reception and validation of a data or MAC command frame can be confirmed with an acknowledgment. However, the specification does not support security for acknowledgment frame; the lack of a MAC covering acknowledgments allows an adversary to forge an acknowledgment for any frame. This paper proposes an identity authentication mechanism at the link layer for acknowledgment frame in IEEE 802.15.4 network. With the proposed mechanism there is only three bits for authentication, which can greatly reduce overhead of device. The encrypted bit stream for identity authentication will be transmitted to device by coordinator within association process. Statistical method and simulation results prove that our mechanism is successful in handling MAC layer attack.

(A User Authentication System Using Geometric Analysis and Similarity Comparison) (얼굴의 기하학적 분석과 유사도 비교를 이용한 사용자 인증 시스템)

  • 최내원;류동엽;지정규
    • Journal of the Korea Computer Industry Society
    • /
    • v.3 no.9
    • /
    • pp.1269-1278
    • /
    • 2002
  • The more high growth of knowledge, the more need personal identity technique. Fingerprint or iris of the eye identity techniques are already commercialized and used various field. Using human face recognition or authentication are not high performance yet. But application for an organism or face recognition are expected getting important. We propose a user recognition system by verifying similarity comparison of eye and lip component images which are splitted, calculated characteristic rate of each facial components and added weight to special formula. Through test proposed methods and analysis the result, we got a high recognition rate.

  • PDF

Bi-ethnic Socialization of Marriage Migrant Women from Vietnam: The Five Practices at the Intersection of Hierarchies (베트남 출신 결혼이주여성들의 이중민족사회화: 위계의 교차가 만들어내는 다섯 가지 실천 유형)

  • Lee, Jiyeon;Chung, Grace H.
    • Human Ecology Research
    • /
    • v.58 no.3
    • /
    • pp.375-390
    • /
    • 2020
  • This paper explored the marriage migrant mothers' experiences of parenting bi-ethnic children in South Korea based on the concepts of ethnic socialization and intersectionality. We analyzed in-depth interviews of 22 marriage migrant women from Vietnam residing in the capital region of South Korea. They had at least one child whose biological father is Korean. Children were 5 years old or older, attending preschool or elementary school. Five types of bi-ethnic socialization strategies were identified, which provide portraits of different situations in which marriage migrant women were placed. The five strategies that emerged from the data were 1) "Natural practice of bi-ethnic socialization" including two heterogeneous groups, "Coexistence of two cultures" and "Mixture of two cultures", 2) "Active practice of bi-ethnic socialization", 3) "Struggling practice of bi-ethnic socialization", 4) "Silence on bi-ethnic socialization", and 5) "Suppressed bi-ethnic socialization". The strategies of bi-ethnic socialization that marriage migrant women chose to raise their children reflected personal perceptions of Korean society and individual ethnic identity formed within Korean society. This study complements existing research on ethnic socialization by examining how ethnic socialization practices are shaped by multiple contexts marriage migrant women embedded in Korean society.

A Study of the Damage and the Countermeasure by Identification Card Loss (신분증 분실에 따른 피해 및 대응책에 관한 연구)

  • Lee, Younggyo;Ahn, Jeonghee
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.3
    • /
    • pp.53-64
    • /
    • 2017
  • Korean Identification card or driver license is usually used to verify one's identity in Korea. These are also used as an adult certification. Since the form of these ID card is an analog and it needs to be checked with naked eyes, it might be used maliciously. Someone who's got someone else's ID card can do other things. Therefore, it must be reported rapidly when ID card is lost or stolen. The most serious problem might be occurred when they do not recognize and report the loss. They might suffer from pecuniary or mental damage such as opening a mobile phone service, providing loan or credit card, opening a personal checking account, etc. Thus, this study suggests and compares the ways of avoiding these problems. First, the most effective way is to send the authorization code via mobile phones in consideration of build-up period and cost. The person in charge of business processing department using ID card sends the authorization code via registered mobile phone. The owners submits it to the person and their identifications are confirmed. Next effective way is that the person in charge of business processing department using ID card sends text messages via registered mobile phone. Lastly, the most ineffective way is to introduce and implement the electronic ID card ultimately even though it is expensive and takes a long time to build up the system.