• Title/Summary/Keyword: Personal identification number

Search Result 108, Processing Time 0.022 seconds

A Cryptography Algorithm using Telescoping Series (망원급수를 이용한 암호화 알고리즘)

  • Choi, Eun Jung;Sakong, Yung;Park, Wang Keun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.4
    • /
    • pp.103-110
    • /
    • 2013
  • In Information Technology era, various amazing IT technologies, for example Big Data, are appearing and are available as the amount of information increase. The number of counselling for violation of personal data protection is also increasing every year that it amounts to over 160,000 in 2012. According to Korean Privacy Act, in the case of treating unique personal identification information, appropriate measures like encipherment should be taken. The technologies of encipherment are the most basic countermeasures for personal data invasion and the base elements in information technology. So various cryptography algorithms exist and are used for encipherment technology. Therefore studies on safer new cryptography algorithms are executed. Cryptography algorithms started from classical replacement enciphering and developed to computationally secure code to increase complexity. Nowadays, various mathematic theories such as 'factorization into prime factor', 'extracting square root', 'discrete lognormal distribution', 'elliptical interaction curve' are adapted to cryptography algorithms. RSA public key cryptography algorithm which was based on 'factorization into prime factor' is the most representative one. This paper suggests algorithm utilizing telescoping series as a safer cryptography algorithm which can maximize the complexity. Telescoping series is a type of infinite series which can generate various types of function for given value-the plain text. Among these generated functions, one can be selected as a original equation. Some part of this equation can be defined as a key. And then the original equation can be transformed into final equation by improving the complexity of original equation through the command of "FullSimplify" of "Mathematica" software.

A Study on Implementation of Finger-Print Identification System Using Optical Sensor (광센서를 이용한 지문인식 시스템의 구현에 관한 연구)

  • Shin, Gi-Bong;Jung, Kyong-Hun;Kang, Dong-Wook;Kim, Ki-Doo
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2005.11a
    • /
    • pp.67-69
    • /
    • 2005
  • 지문인식 시스템이란 저장되어서 가지고 있는 지문data와 지금 현재sensor로 입력받은 지문data의 유사도를 측정하는 system이다. 현 시대의 보안에 관한 요구가 많아지면서, 개인password나PIN(Personal Identification Number)같이 외워서 사용해야만 하는 불편함이 없고, 본인임을 쉽게 증명할 수 있는 생체정보를 이용한 ID system이 각광을 받고 있다. 이러한 상황 속에서 가장 손쉽게 접할 수 있는Finger-print Identification system을 구현할 것이다. 지문인식 시스템은 sensor의 방식에 따라 여러가지로 분류되는데, 본 논문에서는 광학방식 센서를 이용한 지문인식 시스템을 구현 하였다. 본 지문인식 시스템은 처음 지문영상을 센서로 입력 받고 그 입력된 영상을 전처리(pre-processing)해서 지문의 특징점을 추출한다. 이렇게 특징점들을 획득한 후, 후처리(post-processing)과정을 거쳐서 database에 저장 한다. 이렇게 지문영상의database를 구성한 후, 비교하고자 하는 지문영상을 센서로 입력 받아 지문영상을 획득할 때와 같은 processing과정을 거치고, 그 결과물과 database에 저장되어있는 지문과 1:N matching을 한다. 이렇게 해서 유사한 지문영상을 유사도에 따라 출력한다.

  • PDF

Real Time User Location Information Protection Model Using Anonymity (익명성을 활용한 사용자의 실시간 위치정보 보호모델)

  • Mun, Hyung-Jin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.10
    • /
    • pp.2316-2322
    • /
    • 2013
  • Due to the development of ICT, with using hardwares such as WiFi, 3G and GPS and so on, smartphone could have provided a lot of applications with novel functions rapidly. Through such applications, lots of personal information such as personal location, personal images, and list of phone calls is created, saved and widely used. Because there is lots of leakage of the stored personal information due to loss of phone and application, privacy violation have been important issue nowadays. Smartphone with GPS and Internet provides location information. To protect the information, the technologies that only the authorized user can access it while inquiring the location information have been proposed. In this paper, to minimize the identification information for location information subject and information user and anonymize the identifiable information such as phone number, we proposed a model that can reduce the leakage of information and avoid the wrong usage of the stored information in the server. This technique will be used for protecting privacy when developing the application that provides routing service through location history information.

Design of an USB Security Framework for Double Use Detection (이중사용 방지를 위한 USB 보안 프레임워크의 설계)

  • Jeong, Yoon-Su;Lee, Sang-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.4
    • /
    • pp.93-99
    • /
    • 2011
  • Recently, the development of internet technology makes user's personal data used by being saved in USB. But there is a critical issue that personal data can be exposed with malicious purpose because that personal data doesn't need to be certificate to use. This paper proposes USB security framework to prevent a duplicate use of personal data for protecting the data which in USB. The proposed USB security framework performs certification process of user with additional 4bite of user's identification data and usage choice of USB security token before certification data when the framework uses USB security product in different network. It makes communication overhead and service delay increased. As a result of the experiment, packet certification delay time is more increased by average 7.6% in the proposed USB security framework than simple USB driver and USB Token, and procedure rate of certification server on the number of USB is also increased by average 9.8%.

Shoulder-Surfing Resistant Password Input Method for Mobile Environment (모바일 환경에서 엿보기 공격에 강한 패스워드 입력방법)

  • Kim, Chang-Soon;Youn, Sun-Bum;Lee, Mun-Kyu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.3
    • /
    • pp.93-104
    • /
    • 2010
  • The advent of various mobile devices and mobile services has caused diversification of information stored in a mobile device, e.g., SMS, photos, movies, addresses, e-mails, digital certificates, and so on. Because mobile devices are lost or stolen easily, user authentication is critical to protect the information stored in mobile devices. However, the current user authentication methods using Personal Identification Numbers (PINs) and passwords are vulnerable to Shoulder Surfing Attacks (SSAs), which enables an attacker to obtain user's information. Although there are already several SSA-resistant authentication methods in the literature, most of these methods lack of usability. Moreover, they are not suitable for use in mobile devices. In this paper, we propose a user friendly password input method for mobile devices which is secure against SSA. We also perform user tests and compare the security and usability of the proposed method with those of the existing password input methods.

Blockchain-based new identification system (블록체인 기반 새로운 신원확인 체계)

  • Jung, Yong-Hoon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.2
    • /
    • pp.452-458
    • /
    • 2021
  • The value and importance of personal information are increasing due to the increasing number of fields where the Internet environment and computing environment are used, and user authentication technology is also changing. Until now, accredited certificates, which are mainly used in the financial sector, are being replaced with biometric authentication technology due to the problem of revocation. However, another problem is that biometric information cannot be modified once it is leaked. Recently, with the advent of blockchain technology, research on user authentication methods has actively progressed. In this paper, both public certificate and blockchain-based user authentication can be used without system change, and a new DID issuance and reissuance method that can replace the resident registration number is presented. The proposed system can be used without restrictions in a blockchain. However, the currently used DID requires installation of an application at the Interworking Support Center for verification. Since a DID can be authenticated without registering as a member, indiscriminate information collection can be prevented. Security, convenience, and determinism are compared with the existing system, and excellence is proven based on various attack methods, its portability, and proxy use.

Systematic Review on Diagnosis of Children with ADHD: With Special Regard to School-Based Identification and Multi-method Assessment (ADHD 아동 진단과 판별: 학교기반 및 다중방법 평가를 중심으로)

  • Kim, Dongil;Go, Eun-Yeong;Kim, Eun-Hyang;Go, Hye-Jeong;An, Ji-Yeong
    • (The) Korean Journal of Educational Psychology
    • /
    • v.26 no.4
    • /
    • pp.1225-1248
    • /
    • 2012
  • The present study explored how ADHD assessment, identification, and diagnosis were conducted in research through an overview of research papers on ADHD in the last 10 years. The collected studies were categorized and analyzed by topics including data collection settings, assessment and identification, coexistence with other disabilities, considerable variables throughout evaluation, and biological basis. They were categorized and analyzed according to the identification methods, the number of assessment(s) and the number of informant(s). The results were as follows: First, the assessment and identifying studies on children with ADHD were excessively biased toward clinical settings. Second, the majority of the previous studies explored more the development or validation of tools for the assessment and identifying of ADHD than the other topics. Finally, a high preference for the use of a multiple assessment method in identifying ADHD was found. However, considering methodological aspects, there was a lack of practical application of multi-step process such as including a personal interview, reviewing school records or direct observing rating criteria. Considering these results, we discussed an urgent need for the diagnosis and identification guidelines of ADHD for teachers to effectively identifying ADHD children at schools. The implications of school-based ADHD assessment and diagnosis research were suggested.

Analysis of Chaotic True Random Number Generator Using 0.18um CMOS Process (0.18um CMOS 공정을 사용한 카오스 난수 발생기 분석)

  • Jung, Ye-Chan;Jayawickra, Chamindra;Al-Shidaifat, AlaaDdin;Lee, Song-Wook;Kahrama, Nihan;Song, Han-Jung
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.24 no.5
    • /
    • pp.635-639
    • /
    • 2021
  • As times goes by, a ton of electric devices have been developing. Nowadays, there are many personal electric goods that are connected each other and have important private information such as identification, account number, passwords, and so on. As many people own at least one electric device, security of the electric devices became significant. To prevent leakage of the information, study of Chaotic TRNG, "Chaotic True Random Number Generator", protecting the information by generating random numbers that are not able to be expected, is essential. In this paper, A chaotic TRNG is introduced is simulated. The proposed Chaotic TRNG is simulated with Virtuoso &, a circuit design program of Cadence that is a software company. For simulating the mentioned Chaotic TRNG, setting values, 0V low and 3V high on Vpulse, 1.2V on V-ref, 3.3V on VDD, and 0V on VSS, are used.

Implementation and Design of Artificial Intelligence Face Recognition in Distributed Environment (분산형 인공지능 얼굴인증 시스템의 설계 및 구현)

  • 배경율
    • Journal of Intelligence and Information Systems
    • /
    • v.10 no.1
    • /
    • pp.65-75
    • /
    • 2004
  • It is notorious that PIN(Personal Identification Number) is used widely for user verification and authentication in networked environment. But, when the user Identification and password are exposed by hacking, we can be damaged monetary damage as well as invasion of privacy. In this paper, we adopt face recognition-based authentication which have nothing to worry what the ID and password will be exposed. Also, we suggest the remote authentication and verification system by considering not only 2-Tier system but also 3-Tier system getting be distributed. In this research, we analyze the face feature data using the SVM(Support Vector Machine) and PCA(Principle Component Analysis), and implement artificial intelligence face recognition module in distributed environment which increase the authentication speed and heightens accuracy by utilizing artificial intelligence techniques.

  • PDF

Identification and Selection the Mathematically Gifted on the Elementary School (초등 수학 영재의 판별과 선발)

  • Song Sang-Hun
    • Proceedings of the Korean Society for the Gifted Conference
    • /
    • 2001.05a
    • /
    • pp.43-72
    • /
    • 2001
  • Identification and discrimination the mathematical giftedness must be based on it's definition and factors. So, there must be considered not only IQ or high ability in mathematical problem solving, but also mathematical creativity and mathematical task commitment. Furthermore, we must relate our ideas with the programs to develop each student's hidden potential not to settle only. This study is focused on the discrimination of the recipients who would like to enter the elementary school level mathematical gifted education program. To fulfill this purpose, I considered the criteria, principles, methods, tools and their application. In this study, I considered three kinds of testing tools. The first was KEDI - WISC personal IQ test, the second is mathematical problem solving ability written test(1st type), and the third was mathematical creativity test(2nd type) which were giving out divergent products. The number of the participant of these tests were 95(5-6 grade). According to the test, students who had ever a prize in the level of national mathematical contest got more statistically significant higher scores on 1st and 2nd type than who had ever not, but they were not prominent on the phases of attitude, creative ability or interest and willing to study from the information of the behavior characteristics test. Using creativity test together with the behavior characteristics test will be more effective and lessen the possibility of exclusion the superior.

  • PDF