• 제목/요약/키워드: User Identification

Search Result 574, Processing Time 0.029 seconds

The User Identification System Using Walking Pattern over the ubiFloor

  • Yun, Jae-Seok;Lee, Seung-Hun;Woo, Woon-Tack;Ryu, Je-Ha
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.1046-1050
    • /
    • 2003
  • In general, conventional user identification systems require users to carry a TAG or badge or to remember ID and password. Though biometric identification systems may relieve these problems, they are susceptible to environmental noise to some degree. We propose a natural user identification system, ubiFloor, exploiting user's walking pattern to identify the user. The system identifies a user, while tracking the user's location, with a set of simple ON/OFF switch sensors or equipments. Experimental results show that the proposed system can recognize the registered users at the rate of 92%. Future improvement in recognition rate may be achieved by combining other sensors such as camera, microphone, etc.

  • PDF

The Effects of User Experience-Based Design Innovativeness on User-Metaverse Platform Channel Relationships in South Korea

  • JEON, Joo-Eon
    • Journal of Distribution Science
    • /
    • v.19 no.11
    • /
    • pp.81-90
    • /
    • 2021
  • Purpose: The purpose of this research is that Metaverse platforms' UXBDI can be distinguished among Metaverse platform channel types. Metaverse platform represents a collective term signifying services that include augmented reality, lifelogging, mirror worlds, and virtual worlds. User Experience-Based Design Innovativeness (UXBDI) is characterized by novelty in product design and services that satisfy user experience. This study examined the effect of Metaverse platforms' UXBDI on user-Metaverse platform relationships. Research design, data and methodology: Metaverse platform users were selected as samples, and a marketing research institution known as a panel company conducted the survey. It used multiple regression to test the impact on platform identification and commitment based on a survey of 442 South Korean respondents. Results: The research confirmed that UXBDI sub-dimensional scales of attractiveness and interaction increased user-Metaverse platform identification and commitment. Also, a Metaverse platform identity increased user-Metaverse platform identification in virtual and mirror worlds. Conclusion: This study contributes to multiple academic fields. First, the UXBDI of Metaverse platforms appears to be a key component of ongoing user-Metaverse relationships. Second, UXBDI affects relationships differently based on the Metaverse platform type.

A Hardware Implementation for Real-Time Fingerprint Identification (실시간 지문식별을 위한 하드웨어 구현)

  • Kim Kichul;Kim Min;Chung Yongwha;Pan Sung Bum
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.6
    • /
    • pp.79-89
    • /
    • 2004
  • Fingerprint identification consists of user enrollment phase storing user's fingerprint in a database and user identification phase making a candidate list for a given fingerprint. straightforward approach to perform the user identification phase is to scan the entire database sequentially, and takes times for large-scale databases. In this paper, we develop a hardware design which can perform the user identification phase in real-time. Our design employs parallel processing techniques and has been implemented on a PCI-based platform containing an FPGA and SDRAMs. Based on the performance evaluation, our hardware implementation can provide a scalability and perform the fingerprint identification in real-time.

A Security Assessment on the Designated PC service

  • Lee, Kyungroul;Yim, Kangbin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.12
    • /
    • pp.61-66
    • /
    • 2015
  • In this paper, we draw a security assessment by analyzing possible vulnerabilities of the designated PC service which is supposed for strengthening security of current online identification methods that provide various areas such as the online banking and a game and so on. There is a difference between the designated PC service and online identification methods. Online identification methods authenticate an user by the user's private information or the user's knowledge-based information, though the designated PC service authenticates a hardware-based unique information of the user's PC. For this reason, high task significance services employ with online identification methods and the designated PC service for improving security multiply. Nevertheless, the security assessment of the designated PC service has been absent and possible vulnerabilities of the designated PC service are counterfeiter and falsification when the hardware-based unique-information is extracted on the user's PC and sent an authentication server. Therefore, in this paper, we analyze possible vulnerabilities of the designated PC service and draw the security assessment.

User Identification Using Real Environmental Human Computer Interaction Behavior

  • Wu, Tong;Zheng, Kangfeng;Wu, Chunhua;Wang, Xiujuan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.6
    • /
    • pp.3055-3073
    • /
    • 2019
  • In this paper, a new user identification method is presented using real environmental human-computer-interaction (HCI) behavior data to improve method usability. User behavior data in this paper are collected continuously without setting experimental scenes such as text length, action number, etc. To illustrate the characteristics of real environmental HCI data, probability density distribution and performance of keyboard and mouse data are analyzed through the random sampling method and Support Vector Machine(SVM) algorithm. Based on the analysis of HCI behavior data in a real environment, the Multiple Kernel Learning (MKL) method is first used for user HCI behavior identification due to the heterogeneity of keyboard and mouse data. All possible kernel methods are compared to determine the MKL algorithm's parameters to ensure the robustness of the algorithm. Data analysis results show that keyboard data have a narrower range of probability density distribution than mouse data. Keyboard data have better performance with a 1-min time window, while that of mouse data is achieved with a 10-min time window. Finally, experiments using the MKL algorithm with three global polynomial kernels and ten local Gaussian kernels achieve a user identification accuracy of 83.03% in a real environmental HCI dataset, which demonstrates that the proposed method achieves an encouraging performance.

Joint Virtual User Identification and Channel Security En/Decoding Method for Ad hoc Network

  • Zhang, Kenan;Li, Xingqian;Ding, Kai;Li, Li
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.241-247
    • /
    • 2022
  • Ad hoc network is self-organized network powered by battery. The reliability of virtual user identification and channel security are reduced when SNR is low due to limited user energy. In order to solve this problem, a joint virtual user identification and channel security en/decoding method is proposed in this paper. Transmitter-receiver-based virtual user identification code is generated by executing XOR operation between orthogonal address code of transmitter and pseudo random address code of receiver and encrypted by channel security code to acquire orthogonal random security sequence so as to improve channel security. In order to spread spectrum as well as improve transmission efficiency, data packet is divided into 6-bit symbols, each symbol is mapped with an orthogonal random security sequence. Subspace-based method is adopted by receiver to process received signal firstly, and then a judgment model is established to identify virtual users according to the previous processing results. Simulation results indicate that the proposed method obtains 1.6dB Eb/N0 gains compared with reference methods when miss alarm rate reaches 10-3.

Diversification of User Authentication by Writing Applet on Java Card (자바카드 애플릿 설정에 따른 사용자 인증의 다각화)

  • Song, Young-Sang;Shin, In-Chul
    • Journal of IKEEE
    • /
    • v.13 no.4
    • /
    • pp.89-95
    • /
    • 2009
  • Recently, IC cards are used to protect personal information and to have user verification. Among them, the usage of Java Cards which can contain applications after issuing are increasing and installing several applets on Java card is possible. When Java Cards are used, applet works after completing user identification. In this paper, we designed, embodied and verified the mechanism of user identification process according to PIN setting of applets; Stored_PIN, Install_PIN and Update_PIN. These several applications of Java cards will be used for user identification independently or multiply, while using diverse user identification.

  • PDF

An Implementation of User Identification System Using Hrbrid Biomitic Distances (복합 생체 척도 거리를 이용한 사용자 인증시스템의 구현)

  • 주동현;김두영
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.3 no.2
    • /
    • pp.23-29
    • /
    • 2002
  • In this paper we proposed the user identification system using hybrid biometric information and non-contact IC card to improve the accuracy of the system. The hybrid biometric information consists of the face image, the iris image, and the 4-digit voice password of user. And the non-contact IC card provides the base information of user If the distance between the sample hybrid biometric Information corresponding to the base information of user and the measured biometric information is less than the given threshold value, the identification is accepted. Otherwise it is rejected. Through the result of experimentation, this paper shows that the proposed method has better identification rate than the conventional identification method.

  • PDF

A Novel Active User Identification Method for Space based Constellation Network

  • Kenan, Zhang;Xingqian, Li;Kai, Ding;Li, Li
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.12
    • /
    • pp.212-216
    • /
    • 2022
  • Space based constellation network is a kind of ad hoc network in which users are self-organized without center node. In space based constellation network, users are allowed to enter or leave the network at any given time. Thus, the number of active users is an unknown and time-varying parameter, and the performance of the network depends on how accurately this parameter is estimated. The so-called problem of active user identification, which consists of determining the number and identities of users transmitting in space based constellation network is discussed and a novel active user identification method is proposed in this paper. Active user identification code generated by transmitter address code and receiver address code is used to spread spectrum. Subspace-based method is used to process received signal and judgment model is established to identify active users according to the processing results. The proposed method is simulated under AWGN channel, Rician channel and Rayleigh channel respectively. Numerical results indicate that the proposed method obtains at least 1.16dB Eb/N0 gains compared with reference methods when miss alarm rate reaches 10-3.

Performance Evaluation Method of User Identification and User Tracking for Intelligent Robots Using Face Images (얼굴영상을 이용한 지능형 로봇의 개인식별 및사용자 추적 성능평가 방법)

  • Kim, Dae-Jin;Park, Kwang-Hyun;Hong, Ji-Man;Jeong, Young-Sook;Choi, Byoung-Wook
    • The Journal of Korea Robotics Society
    • /
    • v.4 no.3
    • /
    • pp.201-209
    • /
    • 2009
  • In this paper, we deal with the performance evaluation method of user identification and user tracking for intelligent robots using face images. This paper shows general approaches for standard evaluation methods to improve intelligent robot systems as well as their algorithms. The evaluation methods proposed in this paper can be combined with the evaluation methods for detection algorithms of face region and facial components to measure the overall performance of face recognition in intelligent robots.

  • PDF