• Title/Summary/Keyword: User Identification

Search Result 576, Processing Time 0.025 seconds

Security in the Password-based Identification

  • Park, Byung-Jun;Park, Jong-Min
    • Journal of information and communication convergence engineering
    • /
    • v.5 no.4
    • /
    • pp.346-350
    • /
    • 2007
  • Almost all network systems provide an authentication mechanism based on user ID and password. In such system, it is easy to obtain the user password using a sniffer program with illegal eavesdropping. The one-time password and challenge-response method are useful authentication schemes that protect the user passwords against eavesdropping. In client/server environments, the one-time password scheme using time is especially useful because it solves the synchronization problem. It is the stability that is based on Square Root Problem, and we would like to suggest PBSI(Password Based Secure Identification), enhancing the stability, for all of the well-known attacks by now including Off-line dictionary attack, password file compromise, Server and so on. The PBSI is also excellent in the aspect of the performance.

Human Memorable Password based Efficient and Secure Identification

  • Park Jong-Min
    • Journal of information and communication convergence engineering
    • /
    • v.3 no.4
    • /
    • pp.213-216
    • /
    • 2005
  • Almost all network systems provide an authentication mechanism based on user ID and password. In such system, it is easy to obtain the user password using a sniffer program with illegal eavesdropping. The one-time password and challenge-response method are useful authentication schemes that protect the user passwords against eavesdropping. In client/server environments, the one-time password scheme using time is especially useful because it solves the synchronization problem. It is the stability that is based on Square Root Problem, and we would like to suggest PBI(password Based Identification), enhancing the stability, for all of the well-known attacks by now including Off-line dictionary attack, password file compromise, Server and so on. The PBI is also excellent in the aspect of the performance.

Unified Identification for Event Driven Service in User-Centric Environments

  • Lee, Soong-Hee;Kim, Dong-Il;Jeon, Hyung-Goo;Jang, Jong-Wook
    • Journal of information and communication convergence engineering
    • /
    • v.9 no.2
    • /
    • pp.177-182
    • /
    • 2011
  • Considerations for user-centric environments are regarded as essential for the successful deployment of convergence services in BcN. Event driven service (EDS) is regarded as a typical convergence service converging different functions of multiple service providers to support user-centric environments. This paper first describes the deployment model and service scenario of EDS, a convergence service for user-centric environments in BcN. The user-centric environments stimulates the unified identifier management, namely unified identification (U-ID), to enable users to be provided convergence services without awareness of multiple providers. Then the designed structure and implementation results are given.

다중 에이전트 기반 웹서비스와 RFID를 활용한 유비쿼터스 상기 서비스 구축

  • 권오병;김성한;최성철;박규로
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2004.11a
    • /
    • pp.242-248
    • /
    • 2004
  • Personalized reminder systems have to identify the user's current needs dynamically and proactively based on the user's current context. However, need identification methodologies and their feasible architectures for personalized reminder systems have so far been rare. Hence, this paper aims to propose a proactive need identification mechanism by applying agent and semantic web technologies and RFID-based context subsystem for a personalized reminder system, which is one of the supporting systems for a robust ubiquitous service support environment. We have created a prototype system, RFID-based NAMA (Need Aware Multi-Agent), to demonstrate the feasibility of the methodology and of the mobile settings framework that we propose in this paper. NAMA considers the context, user profile with preferences, and information about currently available services, to discover the user's current needs and then link the user to a set of services, which are implemented as web services.

  • PDF

Identification of user's Motion Patterns using Motion Capture System

  • Jung, Kwang Tae;Lee, Jaein
    • Journal of the Ergonomics Society of Korea
    • /
    • v.33 no.6
    • /
    • pp.453-463
    • /
    • 2014
  • Objective:The purpose of this study is to identify motion patterns for cellular phone and propose a method to identify motion patterns using a motion capture system. Background: In a smart device, the introduction of tangible interaction that can provide new experience to user plays an important role for improving user's emotional satisfaction. Firstly, user's motion patterns have to be identified to provide an interaction type using user's gesture or motion. Method: In this study, a method to identify motion patterns using a motion capture system and user's motion patterns for using cellular phone was studied. Twenty-two subjects participated in this study. User's motion patterns were identified through motion analysis. Results: Typical motion patterns for shaking, shaking left and right, shaking up and down, and turning for using cellular phone were identified. Velocity and acceleration for each typical motion pattern were identified, too. Conclusion: A motion capture system could be effectively used to identify user's motion patterns for using cellular phone. Application: Typical motion patterns can be used to develop a tangible user interface for handheld device such as smart phone and a method to identify motion patterns using motion analysis can be applied in motion patterns identification of smart device.

Position Recognition and User Identification System Using Signal Strength Map in Home Healthcare Based on Wireless Sensor Networks (WSNs) (무선 센서네트워크 기반 신호강도 맵을 이용한 재택형 위치인식 및 사용자 식별 시스템)

  • Yang, Yong-Ju;Lee, Jung-Hoon;Song, Sang-Ha;Yoon, Young-Ro
    • Journal of Biomedical Engineering Research
    • /
    • v.28 no.4
    • /
    • pp.494-502
    • /
    • 2007
  • Ubiquitous location based services (u-LBS) will be interested to an important services. They can easily recognize object position at anytime, anywhere. At present, many researchers are making a study of the position recognition and tracking. This paper consists of postion recognition and user identification system. The position recognition is based on location under services (LBS) using a signal strength map, a database is previously made use of empirical measured received signal strength indicator (RSSI). The user identification system automatically controls instruments which is located in home. Moreover users are able to measures body signal freely. We implemented the multi-hop routing method using the Star-Mesh networks. Also, we use the sensor devices which are satisfied with the IEEE 802.15.4 specification. The used devices are the Nano-24 modules in Octacomm Co. Ltd. A RSSI is very important factor in position recognition analysis. It makes use of the way that decides position recognition and user identification in narrow indoor space. In experiments, we can analyze properties of the RSSI, draw the parameter about position recognition. The experimental result is that RSSI value is attenuated according to increasing distances. It also derives property of the radio frequency (RF) signal. Moreover, we express the monitoring program using the Microsoft C#. Finally, the proposed methods are expected to protect a sudden death and an accident in home.

Pattern Classification Methods for Keystroke Identification (키스트로크 인식을 위한 패턴분류 방법)

  • Cho Tai-Hoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.5
    • /
    • pp.956-961
    • /
    • 2006
  • Keystroke time intervals can be a discriminating feature in the verification and identification of computer users. This paper presents a comparison result obtained using several classification methods including k-NN (k-Nearest Neighbor), back-propagation neural networks, and Bayesian classification for keystroke identification. Performance of k-NN classification was best with small data samples available per user, while Bayesian classification was the most superior to others with large data samples per user. Thus, for web-based on-line identification of users, it seems to be appropriate to selectively use either k-NN or Bayesian method according to the number of keystroke samples accumulated by each user.

Implementation for the Biometric User Identification System Based on Smart Card (SMART CARD 기반 생체인식 사용자 인증시스템의 구현)

  • 주동현;고기영;김두영
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.5 no.1
    • /
    • pp.25-31
    • /
    • 2004
  • This paper is research about the improvement of recognition rate of the biometrics user identification system using the data previously stored in the non contact Ic smart card. The proposed system identifies the user by analyzing the iris pattern his or her us. First, after extracting the area of the iris from the image of the iris of an eye which is taken by CCD camera, and then we save PCA Coefficient using GHA(Generalized Hebbian Algorithm) into the Smart Card. When we confirmed the users, we compared the imformation of the biometrics of users with that of smart card. In case two kinds of information was the same, we classified the data by using SVM(Support Vector Machine). The Experimental result showed that this system outperformed the previous developed system.

  • PDF

A Study On The Structural Relationship Between Utilization Motivation Of Online Brand Community And The Flow, Community Identification, Brand Attachment (온라인 브랜드 커뮤니티의 이용 동기, 플로우(Flow), 커뮤니티 동일시, 브랜드 애착 간의 구조적 관계에 관한 연구)

  • Han, Kwang-Seok
    • Management & Information Systems Review
    • /
    • v.29 no.2
    • /
    • pp.27-52
    • /
    • 2010
  • Research on the user motivation of online brand community, the flow, community identification, brand attachment and the structural relationships between them This study is focused on the utilization motives of online brand community (emotional motivation, social motivation, informational motives), and their influences on each motivation on the flow and structural relationships between the brand identification and attachment. For the research, hierarchical chi-squal analysis, was used among Structural Equation Models, to statistically verify the size between the two paths. First, the research has proven the positive influence of user motivation of online brand community on flow. Especially on this research, user motivation of online brand community on flow was divided and analyzed into three motivations; emotional motivation, social motivation, informational motivation, the social and emotional motivation are proven to have the biggest influence on the flow and informational motivation has comparatively low influence on the flow. Secondly, this research will prove that the type of flow built on user motivation of online brand community can give positive influence on community identification and brand attachment. And third, the influence of community identification on brand attachment is very high on the flow. Result will clearly shows the flow built on user motivation of online brand community can help build brand attachment through community identification.

  • PDF

A Study on the Optimal User/Librarian Interface in Information Searching (정보탐색에 있어서 이용자/사서의 최적화 접속에 관한 연구)

  • Kim Sun-Ho
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.26
    • /
    • pp.167-185
    • /
    • 1994
  • The purpose of this study is to develop the optimal user/librarian interface in information searching. In order to achive the purpose, the 150 unskilled students as subjects have participated in the study. According to the change of the subjects' psychological information states by the access points within the library system, the subjects have been classified into the five types of model: the initial information state, the accepted identification information state, the bibliographic information state, the stack information state, and the location information state. Librarian's searching support is done for 10 minutes at the each access points. To develop the optimal user/librarian interface, the expected values of the models are calculated. The resultants are as follows: 1) The expected value of the initial information states model is 18.94: 2) The expected value of the accepted identification information model is 27.06: 3) The expected value of the bibliographic information state model is 27.06: 4) The expected value of the stack information state model is 22.38: 5) The expected value of the location information state model is 22.38. Those expected values are compared with each other. The model with the lowest expected value is chosen as the optimal user/librarian interface model. In the result, the user's initial information state model of the optimal user/librarian interface in information searching is developed. In order to search the information with the most effect, user must be interfaced with the librarian at his/her own initial information state.

  • PDF