• Title/Summary/Keyword: Theft

Search Result 273, Processing Time 0.027 seconds

Analysis of the Five Major Crime Utilizing the Correlation·Regression Analysis with GIS (GIS와 상관·회귀분석을 활용한 5대 범죄의 특성분석)

  • Kim, Chang Kuy;Kang, In Joon;Park, Dong Hyun;Kim, Sang Seok
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.22 no.3
    • /
    • pp.71-77
    • /
    • 2014
  • People in the modern society want to live under safe and comfortable circumstances. As our society, however, is sharply developing, crimes are getting smarter and more difficult to treat. Above all, they often take place around us, and we are trying to cope with them variously in order to make our lives more comfortable and safer. In particular, five major crimes(Murde, Robber, Rape, Violence, Theft ) that most frequently occur in the real life are very threatening and fearful so it is necessary to deal with them with "the scientific method." In this study, therefore, we searched the frequency of crime by its type and analyzed spatial characteristics between crimes and criminal factors by using regression analysis and correlation analysis based on the crime data that has occurred around Geumjeng-gu, Busan so that we can confront five major crimes.

A Study on the Relationship between Urban Disaster and Urban Growth (도시재난과 도시성장과의 관계에 관한 연구)

  • Seo, Jonggook
    • Journal of the Society of Disaster Information
    • /
    • v.13 no.2
    • /
    • pp.221-232
    • /
    • 2017
  • We analyzed the effect of urban disaster on urban growth in 82 cities in Korea. It is interesting to note that violent crime has a positive (+) relationship with income growth, and other theft crime and violent crimes have a negative relationship with anticipated crime. Disaster accidents and incidents do not have a direct effect on employment and population growth, and are the result of rejecting hypotheses presented in previous studies. Finally, although the three indicators representing urban growth, that is, income, employment, and population, have different characteristics of statistical data basically, they show significant differences in explanatory power even though they use the same explanatory variables. This result suggests a new research task in addition to suggesting the use of the three indicators.

A Blockchain-based User Authentication Model Using MetaMask (메타마스크와 연동한 블록체인 기반 사용자 인증모델)

  • Choi, Nakhoon;Kim, Heeyoul
    • Journal of Internet Computing and Services
    • /
    • v.20 no.6
    • /
    • pp.119-127
    • /
    • 2019
  • This paper proposes a new authentication model to solve the problem of personal information takeover and personal information theft by service providers using centralized servers for user authentication and management of personal information. The centralization issue is resolved by providing user authentication and information storage space through a decentralize platform, blockchain, and ensuring confidentiality of information through user-specific symmetric key encryption. The proposed model was implemented using the public-blockchain Ethereum and the web-based wallet extension MetaMask, and users access the Ethereum main network through the MetaMask on their browser and store their encrypted personal information in the Smart Contract. In the future, users will provide their personal information to the service provider through their Ethereum Account for the use of the new service, which will provide user authentication and personal information without subscription or a new authentication process. Service providers can reduce the costs of storing personal information and separate authentication methods, and prevent problems caused by personal information leakage.

Authentication Method using Multiple Biometric Information in FIDO Environment (FIDO 환경에서 다중 생체정보를 이용한 인증 방법)

  • Chae, Cheol-Joo;Cho, Han-Jin;Jung, Hyun Mi
    • Journal of Digital Convergence
    • /
    • v.16 no.1
    • /
    • pp.159-164
    • /
    • 2018
  • Biometric information does not need to be stored separately, and there is no risk of loss and no theft. For this reason, it has been attracting attention as an alternative authentication means for existing authentication means such as passwords and authorized certificates. However, there may be a privacy problem due to leakage of personal information stored in the server. To overcome these weaknesses, FIDO solved the problem of leakage of personal information on the server by using biometric information stored on the user device and authenticating. In this paper, we propose a multiple biometric authentication method that can be used in FIDO environment. In order to utilize multiple biometric information, fingerprints and EEG signals can be generated and used in FIDO system. The proposed method can solve the problem due to limitations of existing 2-factor authentication system by authentication using multiple biometric information.

Automation of Inventory Checking System for Outdoor Warehouse (야외창고 재고실사 자동화를 위한 시스템 개발)

  • Bae, Sung Moon;Han, Kwan Hee;Lee, Hwa Yong;Hong, Kum Suk
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.41 no.3
    • /
    • pp.138-144
    • /
    • 2018
  • Inventory inspection is an important task to eliminate the inconsistency between real assets and inventory management systems, and it is performed periodically at the site. In the case of a large-sized property, it is mainly managed in an outdoor workshop or a warehouse. However, due to the large area of the outdoor area, it is relatively difficult to identify the quantity and location of the property and is also vulnerable to theft. To solve this problem, we proposed a method and system for performing a warehouse inventory inspection using an unmanned aerial vehicle (UAV) and Bluetooth low energy (BLE) beacons. The proposed method has the following advantages. First of all, if we carry out inventory inspection by utilizing UAV, we can minimize user's effort compared to existing methods. The method of recognizing the asset by attaching the BLE beacon is more costly than using the existing RFID technology, but it is advantageous because the recognition distance is increased and the battery life of the tag is drastically increased. We also designed a BLE beacon reader for the system and implemented a prototype to show the feasibility of the proposed system. The prototype is based on Genuino 101, which is a kind of arduino, and adds HM-10 and Neo-6m modules to provide Bluetooth and GPS functions. The BLE beacon reader was tested in outdoor, and attached in drone. We also developed an inventory checking system based on the web to display results of inventory checking. The proposed approach enables the users to automate the operation of inventory checking on an outdoor warehouse.

A proposal of assurance model based on i-PIN assurance level (아이핀 보증 등급에 기반한 보증 모델)

  • Youm, Heung-Youl
    • Journal of Digital Convergence
    • /
    • v.14 no.9
    • /
    • pp.287-299
    • /
    • 2016
  • The electronic transactions over the Internet are growing across the world recently. There have been a lot of identity theft incidents during these online transactions nowaday. Therefore, a high level of identity proofing shall be carried out when using online services to deal with these matter. To prevent this kind of incident, i-PIN was introduced in Korea, which is used as an Internet Personal Identification Number. The i-PIN is designated to provide an online identification of the Internet users. As such, the unique identification numbers are provided to the internet service providers. This paper is to analyze the capabilities that the i-PIN provides, to propose the assurance security model for i-PIN. Furthermore, the security analysis results are presented. The result of this paper can be applicable to improve the applicabilities of the i-PIN.

Biometric and Identity Reference Protection (개인식별정보와 바이오인식정보의 보호기법)

  • Shin, Yang-Nyuo;Kwan, Man-Jun;Lee, Yong-Jun;Park, Jin-Il;Chun, Myung-Geun
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.19 no.2
    • /
    • pp.160-167
    • /
    • 2009
  • This paper describes how to protect the personal information of a biometric reference provider wherein biometric reference and personally identifiable information are bounded in a biometric system. To overcome the shortcomings of the simple personal authentication method using a password, such as identify theft, a biometric system that utilizes physical and behavioral characteristics of each person is usually adopted. In the biometric system, the biometric information itself is personal information, and it can be used as an unique identifier that can identify a particular individual when combining with the other information. As a result, secure protection methods are required for generating, storing, and transmitting biometric information. Considering these issues, this paper proposes a method for ensuring confidentiality and integrity in storing and transferring personally identifiable information that is used in conjunction with biometric information, by extending the related X9.84 standard. This paper also outlines the usefulness of the proposition by defining a standard format represented by ASN.1, and implementing it.

Secure Binding of Identity Reference and Biometric Reference (개인식별정보와 바이오인식정보의 안전한 결합방법)

  • You, Mi-Kyeong;Kwon, Man-Jun;Lee, Sang-Ho;Chun, Myung-Geun
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.20 no.5
    • /
    • pp.610-616
    • /
    • 2010
  • This paper describes how to securely bind the identity reference and biometric reference for satisfying security requirements. To overcome the shortcomings of the simple personal authentication method using a password, such as identify theft, a biometric system that utilizes physical and behavioral characteristics of each person has been adopted. In the biometric system, the biometric information itself is personal information, and it can be used as an unique identifier that can identify a particular it vidual when combining with other identity information. As a result, a son, anb it canmethod is required for manipulat canthese information. Consider canthese issues, this paper proposes a biit canmethod uiter son, anand uisecure channels for generating the common identifier and ensuring security of identity reference and biometric reference that are stored in the separated DBs.

Building bicycle management system using Blockchain (블록체인을 활용한 자전거 관리 시스템 구축)

  • An, Kyu-hwang;Seo, Hwajeong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.8
    • /
    • pp.1139-1145
    • /
    • 2018
  • According to the prosecutors' office's statistics for 2014, 53% of a bicycle users have experienced theft. The reason for the high rate of bicycle stolen in Korea is that there is no bicycle management system. This is because they do not use bicycle numbers to manage bikes like cars do. Most people do not know if they have a VIN(Vehicle Identification Number) on their bike. If the buyer registers the bicycle in the bicycle management blockchain system, anyone can view the information registered in the chain, so that if the bicycle number is filled in, the bicycle can be identified. In addition, when an accident occurs, blockchain will record what kind of equipment it is replacing, like an automobile, to manage all the information about the bicycle. In this way, consumers can inquire whether they have a history of accident when they make a second-hand transaction. In this paper, we propose a method to construct bicycle management system using bicycle VIN.

Chameleon Hash-Based Mutual Authentication Protocol for Secure Communications in OneM2M Environments (OneM2M 환경에서 안전한 통신을 위한 카멜레온 해쉬 기반의 상호인증 프로토콜)

  • Kim, Sung-soo;Jun, Moon-seog;Choi, Do-hyeon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.10
    • /
    • pp.1958-1968
    • /
    • 2015
  • Things intelligence communication (M2M or IoT) service activation and global company of OneM2M-related business on aggressive investing and has led to the acceleration of change in the ICT market. But a variety of hacking security technology because of the possibility of secure communication (data exposure, theft, modification, deletion, etc.) has been issued as an important requirement. In this paper, we propose a mutual authentication protocol for secure communications chameleon hash based on the M2M environment. The results of performance analysis efficiency is encryption and decryption an average of 0.7%, calculated rate showed good results as compared to the target algorithm, equivalent to a 3%(Average 0.003 seconds) difference, mutual authentication and encryption region by using the key update advantage of ECC(Elliptic Curve Cryptography)based Chameleon hash function is signed of the operational efficiency, using a collision message verifiable properties demonstrated strong security of the communication section.