• Title/Summary/Keyword: Unique identification information

Search Result 141, Processing Time 0.028 seconds

Effective measures for the regulation and supervision of encryption of unique identification information of financial companies (금융회사의 고유식별정보 암호화 규제·감독에 대한 실효성 확보 방안)

  • Lee, Seung Yun;Kim, In Seok
    • Convergence Security Journal
    • /
    • v.18 no.5_1
    • /
    • pp.3-9
    • /
    • 2018
  • The purpose of this study is to propose effective countermeasures against the regulation and supervision of unique identification information for financial institutions and present the present problems and future directions. In financial institutions, it is investigated that DB system of many personal information processing systems is in order to comply with the law, and additional measures such as encryption are required for data files containing unique identification information in many other application systems. In this paper, the conclusions of institutional, administrative, and technological feasibility are presented.

  • PDF

A Security Assessment on the Designated PC service

  • Lee, Kyungroul;Yim, Kangbin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.12
    • /
    • pp.61-66
    • /
    • 2015
  • In this paper, we draw a security assessment by analyzing possible vulnerabilities of the designated PC service which is supposed for strengthening security of current online identification methods that provide various areas such as the online banking and a game and so on. There is a difference between the designated PC service and online identification methods. Online identification methods authenticate an user by the user's private information or the user's knowledge-based information, though the designated PC service authenticates a hardware-based unique information of the user's PC. For this reason, high task significance services employ with online identification methods and the designated PC service for improving security multiply. Nevertheless, the security assessment of the designated PC service has been absent and possible vulnerabilities of the designated PC service are counterfeiter and falsification when the hardware-based unique-information is extracted on the user's PC and sent an authentication server. Therefore, in this paper, we analyze possible vulnerabilities of the designated PC service and draw the security assessment.

Design of IPv6 based UFID(Unique feature Identification) Communication Systems (IPv6기반의 UFID(지형지물유일식별자)통신시스템 설계)

  • Kang, Min-Goo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.3
    • /
    • pp.437-443
    • /
    • 2007
  • In this paper, the design of URL structures and managements for UFID(Unique feature Identification) based wireless communications is presented with the combination of GIS and URL address informations. As a result of IPv6 based UFID wireless communications, new methods for URI(Uniform Resource Identifier) informations and UFID communication systems are proposed with a 6byte coded 128-bit IPv6 DNS system for the presentation of 1,500,000 korean buildings.

A Study on the Use of Parcel Identification Number in Developing the Korean Land Information System (한국형 토지정보체계 구축에 있어서 지번의 효과적 관한 연구)

  • 이규석;황국웅
    • Spatial Information Research
    • /
    • v.2 no.1
    • /
    • pp.85-92
    • /
    • 1994
  • This study examines the unique characteristics of the parcel identification number especially in developing the Korean land information system(KLIS). There are several limitations in establishing KLIS in terms of the location identification. Therefore, it is necessary to develop the appropriate parcel identification number system in Korea including the road identification systym and the three dimensional parcel identification system. The exact parcel bounary also needs accurate surveying and registration.

  • PDF

A Study on Developing the Identification Code System for Korean Sci-Tech Journals for KSCI (KSCI 구축을 위한 국내 학술지 식별체계 연구)

  • 김선호;김태중
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.37 no.3
    • /
    • pp.57-77
    • /
    • 2003
  • The objective of the study is to develop the identification code of the Korean sci-tech journals for KSCI. To achieve the purpose, the study has researched and analyzed a variety of the major international and national serials or information objects identification code systems. And then, KOJIC(KOrean Journal Identification Code) has been developed. KOJIC is unique, unambiguous identifiers for titles of Korean journals in all subject areas. The concepts of KOJIC are simplicity, mnemonics, internationalization, and extensibility of its use. KOJIC is a six-character and alphanumeric code and has one check character.

  • PDF

Data Protocol and Air Interface Communication Parameters for Radio Frequency Identification (RFID의 프로토콜 및 인터페이스 파라미터)

  • Choi, Sung-Woon
    • Proceedings of the Safety Management and Science Conference
    • /
    • 2007.11a
    • /
    • pp.323-328
    • /
    • 2007
  • This paper introduces radio frequency identification(RFID) information technologies for item management such as application interface of data protocol, data encoding rules and logical memory functions for data protocol, and, unique identification for RF tags. This study presents reference architecture and definition of parameters to be standardized, various parameters for air intreface communications, and, application requirements profiles.

  • PDF

Analyses of Security and Privacy Issues in Ultra-weight RFID Protocol

  • Kim, Jung-Tae
    • Journal of information and communication convergence engineering
    • /
    • v.9 no.4
    • /
    • pp.441-446
    • /
    • 2011
  • Radio frequency identification (RFID) tags are cheap and simple devices that can store unique identification information and perform simple computation to keep better inventory of packages. Security protocol for RFID tags is needed to ensure privacy and authentication between each tag and their reader. In order to accomplish this, in this paper, we analyzed a lightweight privacy and authentication protocol for passive RFID tags.

INVERSE PROBLEM FOR A HEAT EQUATION WITH PIECEWISE-CONSTANT CONDUCTIVITY

  • Gutman, S.;Ramm, A.G.
    • Journal of applied mathematics & informatics
    • /
    • v.28 no.3_4
    • /
    • pp.651-661
    • /
    • 2010
  • We consider the inverse problem of the identification of a piecewise-constant conductivity in a bar given the extra information of the heat flux through one end of the bar. Our theoretical results show that such an identification is unique. This approach utilizes a "layer peeling" argument. A computational algorithm based on this method is proposed and implemented. The advantage of this algorithm is that it requires only 3D minimizations irrespective of the number of the unknown discontinuities. Its numerical effectiveness is investigated for several conductivities.

A Study on the Preparation of Standardized Operation Criteria for Enhancement of Safety and Convenience of Mobile Electronic Notice Service

  • JongBae, Kim
    • International Journal of Advanced Culture Technology
    • /
    • v.10 no.4
    • /
    • pp.547-554
    • /
    • 2022
  • Due to the expansion of non-face-to-face services, the demand for user identification for mobile devices is increasing. Recently, mobile resident registration cards, mobile driver's licenses, etc. are installed in mobile phones and used for user identification and authentication services. In order to identify a user online, unique identification information of the online user is required. In particular, in order to provide information only to online users, it is necessary to accurately deliver information to a mobile device owned by the user. To make this service possible, it was realized with the advent of mobile electronic notice service. However, the identification of online service users and information on mobile devices owned or subscribed by the relevant users require safe management as personal information, and it is also necessary to increase the convenience of online service users. In this paper, we propose an operating standard for providing a mobile electronic notice service that sends electronic notice using a mobile device owned by the user. The mobile electronic notice service is a service that provides notices expressed in electronic information to the recipient's cell phone, mobile app, e-mail, etc. Therefore, as the use of mobile electronic notification service increases and the provision and use of connecting information to identify users increases, it is necessary to expand the mobile electronic notification service while safely protecting users' personal information.

Comparison of Memoryless Anti-collision Protocols for Tag Identification (태그 인식을 위한 무기억 충돌 방지 프로토콜의 비교 분석)

  • Yang, Eui-Sik;Lim, In-Taek
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.565-568
    • /
    • 2005
  • RFID system allows contactless identification of objects, where small tags are attached to objects and information of objects are transferred using radio frequency. In recent years, industries have incorporated several identification systems to its production processes, which allow collecting automatically information about goods. In order to communicate with a single tag out of a group of tags, the target tag has to be identified. Therefore the read has to attempt to obtain the unique identification code of each tag within its read range. This paper presents performance results of QT and QT-sl protocols, which are tag identification protocols incorporating memoryless property. The memoryless property is that the current response of each tag only depends on the current query of the reader but not on the past history of the reader's queries.

  • PDF