• Title/Summary/Keyword: Personal information control

Search Result 687, Processing Time 0.033 seconds

A Study of Effective Privacy Protection System on High Concurrent Transaction Database System (동시 트랜잭션이 많은 데이터베이스에서 효과적인 개인정보보호 시스템 연구)

  • Kang, Ji-Won
    • Convergence Security Journal
    • /
    • v.12 no.2
    • /
    • pp.107-113
    • /
    • 2012
  • Recently, according to the establishment of personal information protection Act, the public and private organizations are taking a step to protect personal information rights and interests by employing the technical methods such as the access control mechanism, cryptography, etc. The result of the personal information leakage causes a serious damage for the organization image and also has to face with the responsibility by law. However, applying access control and cryptographic approach on the personal information item for every connection to large database system causes significant performance degradation in a large database system. In this paper, we designed and implemented the light weight system using JVM (Java Virtual Machine) for the Oracle DBMS environment which the concurrent transaction occurs many, thereby the proposed system provides the minimum impact on the system performance and meets the need of personal information protection. The proposed system was validated on the personal information protection system which sits on a 'A' public organization's portal site and personnel information management system.

Personal Navigation System Using GPS and Dead Reckoning (GPS와 추축항법을 이용항 개인휴대 항법시스템)

  • Hong, Jin-Seok;Yoon, Seon-Il;Jee, Gyu-In
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.7 no.5
    • /
    • pp.454-464
    • /
    • 2001
  • In this paper, a personal navigation system is developed using GPS and dead reckoning sensors. This personal navigation system can be used to track a person inside a building, on an urban street, and in the mountain area. GPS can provide accurate absolute position information, but it cant be used without receiving enough satellite signals. Although the inertial sensors such as gyro an accelerometer and be used without this diggiculty, the inertial sensors severely suffer from their drift errors and the magne-tometer can be easily distorted by surrounding electromagnetic field. GPS and DR sensors can be inte-grated together to overcome these problems. A new personal navigation system that can be carried wit person is developed. A pedometer. actually vertically mounted accelerometer, detects ones footstep and gyro detects heading angle. These DR sensors are integrated with GPS and the humans walking pattern provides additional navigation information for compensating the DR sensors. The field testes are performed to evaluated the proposed navigation algorithm.

  • PDF

Design of an Authentication System Based on Personal Identity Verification Card (전자신분증 기반의 개인 신분확인을 위한 인증시스템 설계)

  • Park, Young-Ho;Kong, Byung-Un;Rhee, Kyung-Hyune
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.8
    • /
    • pp.1029-1040
    • /
    • 2011
  • Electronic identity (e-ID) card based on smartcard is a representative identity credential for on-line and off-line personal identification. The e-ID card can store the personal identity information securely, so that the information can be accessed fast, automated identity verification and used to determine the cardholder's authorization to access protected resources. Due to such features of an e-ID card, the number of government organizations and corporate enterprises that consider using e-ID card for identity management is increasing. In this paper, we present an authentication framework for access control system using e-ID cards by discussing the threat environment and security requirement against e-ID card. Specifically, to accomplish our purpose, we consider the Personal Identity Verification system as our target model.

Personal-usage Authentication of Broadcast Programs Using a Secure Portable Storage (휴대용 보안 저장매체 기반 방송프로그램 사적이용 인증 기법)

  • Lee, Joo-Young;Choo, Hyon-Gon;Nam, Je-Ho
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.2
    • /
    • pp.10-18
    • /
    • 2009
  • In this paper, we propose a novel method for authenticating a user's personal-usage using a secure portable storage, so that the user carrying the secure portable storage is able to consume his/her own broadcast programs freely, regardless of the location of the devices. The proposed authentication process is performed by a portable personal-usage authentication device, an access-control module for the portable personal-usage authentication device, and a player integrating the access control module. The portable personal-usage authentication device plays a role of secure storage in which domain authentication information is securely stored, while the access-control module is in charge of accessing the authentication information and, consequently, acquiring a decryption key. The player decrypts the broadcast programs in real time and processes the decrypted media streams. In this Paper, we describe the structure and procedure of the proposed model, and verify its feasibility by implementation.

A Study on the Evaluation of Internal Controls Factors in Information System : Focused on Auditors Personal Factors (정보시스템 내부통제요소 중요도 평가에 관한 연구 : 감사 개인적 요인을 충심으로)

  • 이명호;이우형;김재학
    • Korean Management Science Review
    • /
    • v.19 no.1
    • /
    • pp.39-54
    • /
    • 2002
  • With increasing use of the computers and rapid progress of system technology, the Judgment Process of information system auditors is exacerbated and the auditing environment is becoming very complex. Therefore, with limited resources, to achieve the ultimate goals of control & auditing, it is absolutely necessary for the auditors to Identify the relative importance and priority order of controls Accordingly. the auditors'review and evaluation of the internal control are becoming the Important issues in our modern auditing Process. The objectives of this paper are to identify the crucial and important control factors that are necessary for the control system, end to analyze the relative importance of the internal controls.

Computerization of Quality Information System Using Personal Computers (PC를 이용한 품질정보시스템의 전산화)

  • Park, Chul-Joo;Oh, Yon Woo
    • Journal of Korean Society for Quality Management
    • /
    • v.24 no.2
    • /
    • pp.113-127
    • /
    • 1996
  • A various quality data are produced during nuclear fuel fabrication. In order to control quality data efficiently, Computerization of Quality Information System(QIS) using personal computer was established. Database control software and analysis software were developed for QIS. QIS was applied the fuel manufacturing and quality inspection. Quality trend analysis, process control, process capability and quality history docket for nuclear fuel manufacturing were performed by QIS. Through the Quality Information System, quality assurance, quality control, process control and manufacturing engineering were performed efficiently in nuclear fuel manufacturing.

  • PDF

A desing of personal communication system based on wideband CDMA (광대역 CDMA 방식을 이용한 개인휴대통신 시스템 설계)

  • 최안나;홍인기;안병철;김동호;박용완
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.21 no.5
    • /
    • pp.1283-1293
    • /
    • 1996
  • This paper descries design concepts, structure and charracteristics of personal communications system based on wideband CDMA under developing for general low-tier mobile telecommunications services as the first step of the next generation mobile telecommunications systems that provide timely exchange of various types of information with anyone, from anywhere, at anytime. Also, wedesign a reverse linktransmitter/receiver structure for personal communications system based on wideband CDMA and validata the performance of the designed structure and establish the each parameter via computer simulation. Simulaation results on the effects of reverse link synchronous transmission and the effects of power control and control and channel coding in pedestrian environment for low-tier services are presented.

  • PDF

Design and Implementation of Personal Communicator based on Embedded Single Board Computer for Controlling of Remote Devices (원격 장치 제어를 위한 임베디드 기술 기반의 개인용 커뮤니케이터 설계 및 구현)

  • Jang, Seong-Sik;Byun, Tae-Young
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.16 no.2
    • /
    • pp.99-109
    • /
    • 2011
  • This paper presents implementation details of home appliance control system using personal communicator based on LN2440 single board computer, which recognizes hand-gesture of user, controls remote moving device such as mobile home server, robot etc. through delivery of proper control commands. Also, this paper includes details of design and implementation of home gateway and mobile home server. The implemented prototype can be utilized to develop various remote control system including a remote exploration robot, intelligent wheelchair based on general purpose embedded system.

Quantizing Personal Privacy in Ubiquitous Computing

  • Ma, Tinghuai;Tian, Wei;Guan, Donghai;Lee, Sung-Young
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.9
    • /
    • pp.1653-1667
    • /
    • 2011
  • Privacy is one of the most important and difficult research issues in ubiquitous computing. It is qualitative rather than quantitative. Privacy preserving mainly relies on policy based rules of the system, and users cannot adjust their privacy disclosure rules dynamically based on their wishes. To make users understand and control their privacy measurement, we present a scheme to quantize the personal privacy. We aim to configure the person's privacy based on the numerical privacy level which can be dynamically adjusted. Instead of using the traditional simple rule engine, we implement this scheme in a complex way. In addition, we design the scenario to explain the implementation of our scheme. To the best of our knowledge, we are the first to assess personal privacy numerically to achieve precision privacy computing. The privacy measurement and disclosure model will be refined in the future work.

A Study on the Conflict between the Use of Personally non-Identifiable Information and the Protection of Personal Information in Digital Behavioral Advertising: Focusing on the Domestic and Foreign Status and System (디지털 맞춤형 광고에서 비식별개인정보의 활용과 개인정보 보호와의 갈등에 관한 연구: 국내외 현황과 제도를 중심으로)

  • Choi, Min-Wook
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.1
    • /
    • pp.71-79
    • /
    • 2021
  • This study looked at the conflict between the aspect of the use of personally non-identifiable information for the development of the big data industry and the digital advertising industry and the aspect of personal information protection. In order to achieve the research purpose, this study focused on literature research such as thesis, legal texts, administrative regulations, and recent media articles. As a result of this study, the main issues related to the protection of personally non-Identifiable Information in digital behavioral advertising were 'conflict between freedom of advertising expression and personal rights', 'personalization of unidentifiable information', 'information imbalance'. In this regard, as measures to protect personally non-identifiable information in digital behavioral advertising, it was proposed to 'harmonize with freedom of advertising expression and personal rights, 'improve notification and consent. process', and 'reinforce the right to control personal information'.