• 제목/요약/키워드: User Identification

검색결과 574건 처리시간 0.028초

Security in the Password-based Identification

  • Park, Byung-Jun;Park, Jong-Min
    • Journal of information and communication convergence engineering
    • /
    • 제5권4호
    • /
    • pp.346-350
    • /
    • 2007
  • Almost all network systems provide an authentication mechanism based on user ID and password. In such system, it is easy to obtain the user password using a sniffer program with illegal eavesdropping. The one-time password and challenge-response method are useful authentication schemes that protect the user passwords against eavesdropping. In client/server environments, the one-time password scheme using time is especially useful because it solves the synchronization problem. It is the stability that is based on Square Root Problem, and we would like to suggest PBSI(Password Based Secure Identification), enhancing the stability, for all of the well-known attacks by now including Off-line dictionary attack, password file compromise, Server and so on. The PBSI is also excellent in the aspect of the performance.

Human Memorable Password based Efficient and Secure Identification

  • Park Jong-Min
    • Journal of information and communication convergence engineering
    • /
    • 제3권4호
    • /
    • pp.213-216
    • /
    • 2005
  • Almost all network systems provide an authentication mechanism based on user ID and password. In such system, it is easy to obtain the user password using a sniffer program with illegal eavesdropping. The one-time password and challenge-response method are useful authentication schemes that protect the user passwords against eavesdropping. In client/server environments, the one-time password scheme using time is especially useful because it solves the synchronization problem. It is the stability that is based on Square Root Problem, and we would like to suggest PBI(password Based Identification), enhancing the stability, for all of the well-known attacks by now including Off-line dictionary attack, password file compromise, Server and so on. The PBI is also excellent in the aspect of the performance.

Unified Identification for Event Driven Service in User-Centric Environments

  • Lee, Soong-Hee;Kim, Dong-Il;Jeon, Hyung-Goo;Jang, Jong-Wook
    • Journal of information and communication convergence engineering
    • /
    • 제9권2호
    • /
    • pp.177-182
    • /
    • 2011
  • Considerations for user-centric environments are regarded as essential for the successful deployment of convergence services in BcN. Event driven service (EDS) is regarded as a typical convergence service converging different functions of multiple service providers to support user-centric environments. This paper first describes the deployment model and service scenario of EDS, a convergence service for user-centric environments in BcN. The user-centric environments stimulates the unified identifier management, namely unified identification (U-ID), to enable users to be provided convergence services without awareness of multiple providers. Then the designed structure and implementation results are given.

다중 에이전트 기반 웹서비스와 RFID를 활용한 유비쿼터스 상기 서비스 구축

  • 권오병;김성한;최성철;박규로
    • 한국지능정보시스템학회:학술대회논문집
    • /
    • 한국지능정보시스템학회 2004년도 추계학술대회
    • /
    • pp.242-248
    • /
    • 2004
  • Personalized reminder systems have to identify the user's current needs dynamically and proactively based on the user's current context. However, need identification methodologies and their feasible architectures for personalized reminder systems have so far been rare. Hence, this paper aims to propose a proactive need identification mechanism by applying agent and semantic web technologies and RFID-based context subsystem for a personalized reminder system, which is one of the supporting systems for a robust ubiquitous service support environment. We have created a prototype system, RFID-based NAMA (Need Aware Multi-Agent), to demonstrate the feasibility of the methodology and of the mobile settings framework that we propose in this paper. NAMA considers the context, user profile with preferences, and information about currently available services, to discover the user's current needs and then link the user to a set of services, which are implemented as web services.

  • PDF

Identification of user's Motion Patterns using Motion Capture System

  • Jung, Kwang Tae;Lee, Jaein
    • 대한인간공학회지
    • /
    • 제33권6호
    • /
    • pp.453-463
    • /
    • 2014
  • Objective:The purpose of this study is to identify motion patterns for cellular phone and propose a method to identify motion patterns using a motion capture system. Background: In a smart device, the introduction of tangible interaction that can provide new experience to user plays an important role for improving user's emotional satisfaction. Firstly, user's motion patterns have to be identified to provide an interaction type using user's gesture or motion. Method: In this study, a method to identify motion patterns using a motion capture system and user's motion patterns for using cellular phone was studied. Twenty-two subjects participated in this study. User's motion patterns were identified through motion analysis. Results: Typical motion patterns for shaking, shaking left and right, shaking up and down, and turning for using cellular phone were identified. Velocity and acceleration for each typical motion pattern were identified, too. Conclusion: A motion capture system could be effectively used to identify user's motion patterns for using cellular phone. Application: Typical motion patterns can be used to develop a tangible user interface for handheld device such as smart phone and a method to identify motion patterns using motion analysis can be applied in motion patterns identification of smart device.

무선 센서네트워크 기반 신호강도 맵을 이용한 재택형 위치인식 및 사용자 식별 시스템 (Position Recognition and User Identification System Using Signal Strength Map in Home Healthcare Based on Wireless Sensor Networks (WSNs))

  • 양용주;이정훈;송상하;윤영로
    • 대한의용생체공학회:의공학회지
    • /
    • 제28권4호
    • /
    • pp.494-502
    • /
    • 2007
  • Ubiquitous location based services (u-LBS) will be interested to an important services. They can easily recognize object position at anytime, anywhere. At present, many researchers are making a study of the position recognition and tracking. This paper consists of postion recognition and user identification system. The position recognition is based on location under services (LBS) using a signal strength map, a database is previously made use of empirical measured received signal strength indicator (RSSI). The user identification system automatically controls instruments which is located in home. Moreover users are able to measures body signal freely. We implemented the multi-hop routing method using the Star-Mesh networks. Also, we use the sensor devices which are satisfied with the IEEE 802.15.4 specification. The used devices are the Nano-24 modules in Octacomm Co. Ltd. A RSSI is very important factor in position recognition analysis. It makes use of the way that decides position recognition and user identification in narrow indoor space. In experiments, we can analyze properties of the RSSI, draw the parameter about position recognition. The experimental result is that RSSI value is attenuated according to increasing distances. It also derives property of the radio frequency (RF) signal. Moreover, we express the monitoring program using the Microsoft C#. Finally, the proposed methods are expected to protect a sudden death and an accident in home.

키스트로크 인식을 위한 패턴분류 방법 (Pattern Classification Methods for Keystroke Identification)

  • 조태훈
    • 한국정보통신학회논문지
    • /
    • 제10권5호
    • /
    • pp.956-961
    • /
    • 2006
  • 키스트로크 시간간격은 컴퓨터사용자의 검증 및 인식에서 분별적인 특징이 될 수 있다. 본 논문은 키스트로크 시간간격을 특징으로, 신경망의 역전파 알고리즘과 Bayesian 분류기, 그리고 k-NN을 이용한 분류기의 사용자 인식 성능을 비교 실험하였다. 실험 결과, 사용자당 샘플의 개수가 작을 경우에는 k-NN 알고리즘이 가장 성능이 좋았고, 사용자당 샘플의 개수가 많을 경우에는 Bayesian 분류기의 성능이 가장 뛰어난 결과를 보였다. 따라서 웹기반 온라인 사용자인식을 위해서는 사용자별 키스트로크 샘플의 수에 따라 k-NN이나 Bayesian 분류기를 선택적으로 사용하는 것이 바람직할 것으로 보인다.

SMART CARD 기반 생체인식 사용자 인증시스템의 구현 (Implementation for the Biometric User Identification System Based on Smart Card)

  • 주동현;고기영;김두영
    • 융합신호처리학회논문지
    • /
    • 제5권1호
    • /
    • pp.25-31
    • /
    • 2004
  • 본 논문은 Smart Card의 일종인 비 접촉 IC 카드의 내부 데이터를 사용하여, 생체인식 요소인 홍채폐턴을 이용한 사용자 인증 시스템의 인증률 향상을 도모한 연구이다. 먼저, CCD 카메라로 입력 받은 안구영상에서 홍채영역을 추출하고, GHA(Generalized Hebbian Algorithm)웨이트를 이용하여 PCA(Principal Component Analysis) Coefficient를 Smart Card 내부에 저장한다. 사용자 인증시에는 실시간으로 입력되는 사용자의 생체 인식 정보와 카드 내부의 사용자 생체 인식 정보를 비교하여, 동일한 경우에 그 인식 정보를 SVM(Support Vector Machine)을 사용하여 분류하였다. 본 논문에서는 실시간 테스트 실험 결과 이전에 개발된 시스템보다 사용자의 인증률이 우수해 짐을 보였다.

  • PDF

온라인 브랜드 커뮤니티의 이용 동기, 플로우(Flow), 커뮤니티 동일시, 브랜드 애착 간의 구조적 관계에 관한 연구 (A Study On The Structural Relationship Between Utilization Motivation Of Online Brand Community And The Flow, Community Identification, Brand Attachment)

  • 한광석
    • 경영과정보연구
    • /
    • 제29권2호
    • /
    • pp.27-52
    • /
    • 2010
  • 본 연구는 온라인 브랜드 커뮤니티에 대한 이용 동기(정서적 동기, 사회적 동기, 정보적 동기)가 플로우에 미치는 영향력 차이는 어떻게 나타나며, 플로우를 매개하여 브랜드 애착과 브랜드 몰입에는 어떠한 구조적 관계가 나타나는지를 살펴보고자 하였다. 이를 위해 구조방정식 모형(Structural Equation Model) 중에서 두 경로 간 크기를 통계적으로 검증할 수 있는 위계적 카이스퀘어 분석(hierarchical chi-squal analysis)을 통해 가설을 검증하였다. 첫째, 온라인 브랜드 커뮤니티의 이용 동기가 플로우에 긍정적인 영향을 미칠 수 있음을 확인하였다. 특히 본 연구에서는 온라인 브랜드 커뮤니티의 이용 동기를 정서적 동기, 사회적 동기, 정보적 동기 나누어 살펴보았는데, 사회적 동기와 정서적 동기가 플로우에 가장 많은 영향력을 행사하였으며, 정보적 동기가 플로우에 미치는 영향은 이들 두 이용 동기보다 상대적으로 미약하였다. 둘째, 온라인 브랜드 커뮤니티의 이용 동기를 통해 형성된 플로우는 커뮤니티 동일시와 브랜드 애착에 긍정적인 영향을 미칠 수 있음을 확인하였다. 셋째, 커뮤니티 동일시가 브랜드 애착에 미치는 영향은 매우 높은 것으로 나타났다. 이는 온라인 브랜드 커뮤니티의 이용 동기를 통해 형성된 플로우는 커뮤니티 동일시를 통해 브랜드에 애착된다고 볼 수 있다.

  • PDF

정보탐색에 있어서 이용자/사서의 최적화 접속에 관한 연구 (A Study on the Optimal User/Librarian Interface in Information Searching)

  • 김선호
    • 한국문헌정보학회지
    • /
    • 제26권
    • /
    • pp.167-185
    • /
    • 1994
  • The purpose of this study is to develop the optimal user/librarian interface in information searching. In order to achive the purpose, the 150 unskilled students as subjects have participated in the study. According to the change of the subjects' psychological information states by the access points within the library system, the subjects have been classified into the five types of model: the initial information state, the accepted identification information state, the bibliographic information state, the stack information state, and the location information state. Librarian's searching support is done for 10 minutes at the each access points. To develop the optimal user/librarian interface, the expected values of the models are calculated. The resultants are as follows: 1) The expected value of the initial information states model is 18.94: 2) The expected value of the accepted identification information model is 27.06: 3) The expected value of the bibliographic information state model is 27.06: 4) The expected value of the stack information state model is 22.38: 5) The expected value of the location information state model is 22.38. Those expected values are compared with each other. The model with the lowest expected value is chosen as the optimal user/librarian interface model. In the result, the user's initial information state model of the optimal user/librarian interface in information searching is developed. In order to search the information with the most effect, user must be interfaced with the librarian at his/her own initial information state.

  • PDF