• Title/Summary/Keyword: User Identification

Search Result 577, Processing Time 0.028 seconds

A System Unauthorized Access using MAC Address and OTP (MAC Address와 OTP를 이용한 비인가 접근 거부 시스템)

  • Shin, Seung-Soo;Jeong, Yoon-Su
    • Journal of Digital Convergence
    • /
    • v.10 no.3
    • /
    • pp.127-135
    • /
    • 2012
  • This study improves the existing user identification method using user ID and password. The new protocol protecting unauthorized access is designed and developed using user's ID, password, and OTP for user certification as well as MAC address for computer identification on networks. The safety on trials of unauthorized certification is tested and analyzed for four types following the criterion of information acquisition.

User Identification and Entrance/Exit Detection System for Smart Home (지능형 홈을 위한 사용자 식별 및 출입 감지 시스템)

  • Lee, Seon-Woo
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.14 no.3
    • /
    • pp.248-253
    • /
    • 2008
  • This paper presents a sensing system for smart home which can detect an location transition events such as entrance/exit of a member and identify the user in a group at the same time. The proposed system is compose of two sub-systems; a wireless sensor network system and a database server system. The wireless sensing system is designed as a star network where each of sensing modules with ultrasonic sensors and a Bluetooth RF module connect to a central receiver called Bluetooth access point. We propose a method to discriminate a user by measuring the height of the user. The differences in the height of users is a key feature for discrimination. At the same time, the each sensing module can recognize whether the user goes into or out a room by using two ultrasonic sensors. The server subsystem is a sort of data logging system which read the detected event from the access point and then write it into a database system. The database system could provide the location transition information to wide range of context-aware applications for smart home easily and conveniently. We evaluate the developed method with experiments for three subjects in a family with the installation of the developed system into a real house.

Effects of Character Identification on User Experience and Perceived Risk in Smoking Simulation Game (흡연 시뮬레이션 게임에서 사용자와 동일한 캐릭터의 사용이 실재감, 몰입, 위험인식에 미치는 효과)

  • Kim, Si-Sung;Lee, Jong-Wouk;Noh, Ghee-Young
    • Journal of Korea Game Society
    • /
    • v.15 no.3
    • /
    • pp.41-50
    • /
    • 2015
  • This study attempted to identify differences in user experience such as spatial presence, social presence, flow, empathy, anxiety, and perceived risk between simulating characters of animation and of actual userimage. The playtesting method was conducted on 60 male smokers using 'Smoking Sims', a simulation game produced by The Center for Health Communication Studies. The results found that the simulation of actual image character is higher in the level of perceived risks for smoking, spatial presence, social presence, flow, and empathy than the simulation of animation character. The study shows that identification with a game character affects user experience and enhances the effectiveness of perceived risks as well. It emphasizes the importance of game design to implement identification in serious game like a smoking cessation simulation.

Visible Light Identification System for Smart Door Lock Application with Small Area Outdoor Interface

  • Song, Seok-Jeong;Nam, Hyoungsik
    • Current Optics and Photonics
    • /
    • v.1 no.2
    • /
    • pp.90-94
    • /
    • 2017
  • Visible light identification (VLID) is a user identification system for a door lock application using smartphone that adopts visible light communication (VLC) technology with the objective of high security, small form factor, and cost effectiveness. The user is verified by the identification application program of a smartphone via fingerprint recognition or password entry. If the authentication succeeds, the corresponding encoded visible light signals are transmitted by a light emitting diode (LED) camera flash. Then, only a small size and low cost photodiode as an outdoor interface converts the light signal to the digital data along with a comparator, and runs the authentication process, and releases the lock. VLID can utilize powerful state-of-the-art hardware and software of smartphones. Furthermore, the door lock system is allowed to be easily upgraded with advanced technologies without its modification and replacement. It can be upgraded by just update the software of smartphone application or replacing the smartphone with the latest one. Additionally, wireless connection between a smartphone and a smart home hub is established automatically via Bluetooth for updating the password and controlling the home devices. In this paper, we demonstrate a prototype VLID door lock system that is built up with LEGO blocks, a photodiode, a comparator circuit, Bluetooth module, and FPGA board.

Ship Identification Using Acoustic Characteristic Extraction and Pattern Recognition (음파 특징 추출 및 패턴 인식을 통한 선박 식별)

  • Jang, Hong-Ju;Lee, Sang-Hoon
    • Journal of the military operations research society of Korea
    • /
    • v.33 no.1
    • /
    • pp.93-103
    • /
    • 2007
  • Ship identification systems currently employed provide the underwater sound analysis, analyzed data saving and user interface with comparison function. But final analysis and identification depend only on experts. Therefore, the reliability of these identification systems relies on user's ability on information recognition. This paper presents the method of recognition for the purpose of providing the basic data for an automatic ship class identification. we get the underwater sounds using the PC. We use Matlab in order to reduce ambient noises, take out an acoustic characteristics using the pattern recognition, and classify the ships.

A SOA Service Identification Model Based on Hierarchical Ontology (계층적 온톨로지 기반의 SOA서비스 식별 모델)

  • Park, Sei-Kwon;Choi, Ko-Bong
    • Journal of Information Technology Services
    • /
    • v.12 no.1
    • /
    • pp.323-340
    • /
    • 2013
  • As the importance of collaboration becomes critical in today's open and complex business environment network, the issues and solutions on compatibility and reusability between different kinds of applications are being increasingly important as well in systems analysis and design. And therefore, service-centered SOA is receiving attention in such business environment as a strategic approach that makes possible for prompt action according to the needs of users and business process. Various implementation methodologies have been proposed for SOA, however, in practical aspects most of them have some problems since they fail to propose specific policies in definition and identification of services for the exact user requirements and business situations. To solve or alleviate those problems, this paper suggests a new service identification model based on hierarchical ontology, where three different ontologies such as business ontology, context ontology and service ontology are proposed to define the relationship and design the link between user requirements, business process, applications and services. Through a suggested methodology in this paper, it would be possible to provide proactive services that meets a variety of business environments and demands of user. Also, since the information can be modified adaptively and dynamically by hierarchical ontology, this study is expected to play a positive role in increasing the flexibility of systems and business environments.

Identifying Topic-Specific Experts on Microblog

  • Yu, Yan;Mo, Lingfei;Wang, Jian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.6
    • /
    • pp.2627-2647
    • /
    • 2016
  • With the rapid growth of microblog, expert identification on microblog has been playing a crucial role in many applications. While most previous expert identification studies only assess global authoritativeness of a user, there is no way to differentiate the authoritativeness in a particular aspect of topics. In this paper, we propose a novel model, which jointly models text and following relationship in the same generative process. Furthermore, we integrate a similarity-based weight scheme into the model to address the popular bias problem, and use followee topic distribution as prior information to make user's topic distribution more precisely. Our empirical study on two large real-world datasets shows that our proposed model produces significantly higher quality results than the prior arts.

A Data Base for Identification of Pseudomonas syringae pv. actinidiae, the Pathogen of Kiwifruit Bacterial Canker, Using Biolog Program (Biolog Program을 이용한 참다래 궤양병균 동정용 Data Base)

  • 고영진
    • Korean Journal Plant Pathology
    • /
    • v.13 no.2
    • /
    • pp.125-128
    • /
    • 1997
  • Reactions of Pseudomonas syringae pv. actinidiae to 95 carbon sources in a 96-well microplate (BiOLOG GN MicroPlateTM) were investigated. The bacterium used 9 carbon sources such as D-mannitol, sucrose, etc., but did not use 62 carbon sources such as $\alpha$-cyclodextrin, dextrin, etc. Based on the reactions, a user data base for identification of P. syringae pv. actinidiae was constructed in Biolog program (BiOLOG MicroLogTM 2 system). P. syringae pv. actinidiae isolates collected from kiwifruits could be identified automatically with high similarity using the user data base, which could diagnose rapidly and easily whether the tree was infected with bacterial canker or not.

  • PDF

A Scheme of Identity Authentication and Anomaly Detection using ECG and Beacon-based Blockchain (ECG와 비콘 기반의 블록체인을 이용한 신원 인증 및 이상징후 탐지 기법)

  • Kim, Kyung-Hee;Lee, Keun-Ho
    • Journal of Internet of Things and Convergence
    • /
    • v.7 no.3
    • /
    • pp.69-74
    • /
    • 2021
  • With the recent development of biometric authentication technology, the user authentication techniques using biometric authentication are increasing. Various problems arised in certification techniques that use various existing methods such as ID/PW. Therefore, recently, a method of improving security by introducing biometric authentication as secondary authentication has been used. In this thesis, proposal of the user authentication system that can detect user identification and anomalies using ECGs that are extremely difficult to falsify through the electrical biometric signals from the heart among various biometric authentication devices is studied. The system detects user anomalies by comparing ECG data received from a wrist-mounted wearable device-type ECG measurement tool with identification and ECG data stored in blockchain form on the database and identifying the user's location through a beacon system.

Estimating Personal and Social Information for Mobile User (모바일 사용자의 개인 및 소셜 정보 추정)

  • Son, Jeong-Woo;Han, Yong-Jin;Song, Hyun-Je;Park, Seong-Bae;Lee, Sang-Jo
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.2 no.9
    • /
    • pp.603-614
    • /
    • 2013
  • The popularity of mobile devices provides their users with a circumstance that services and information can be accessed wherever and whenever users need. Accordingly, various studies have been proposed personalized methods to improve accessibility of mobile users to information. However, since these personalized methods require users' private information, they gives rise to problems on security. An efficient way to resolve security problems is to estimate user information by using their online and offline behavior. In this paper, for this purpose, it is proposed a novel user information identification system that identifies users' personal and social information by using both his/her behavior on social network services and proximity patterns obtained from GPS data. In the proposed system, personal information of a user like age, gender, and so on is estimated by analyzing SNS texts and POI (Point of Interest) patterns, while social information between a pair of users like family and friend is predicted with proximity patterns between the users. Each identification module is efficiently designed to handle the characteristics of user data like much noise in SNS texts and missing signals in GPS data. In experiments to evaluate the proposed system, our system shows its superiority against ordinary identification methods. This result means that the proposed system can efficiently reflect the characteristics of user data.