• Title/Summary/Keyword: User Identifier

Search Result 66, Processing Time 0.026 seconds

Unified Identification for Event Driven Service in User-Centric Environments

  • Lee, Soong-Hee;Kim, Dong-Il;Jeon, Hyung-Goo;Jang, Jong-Wook
    • Journal of information and communication convergence engineering
    • /
    • v.9 no.2
    • /
    • pp.177-182
    • /
    • 2011
  • Considerations for user-centric environments are regarded as essential for the successful deployment of convergence services in BcN. Event driven service (EDS) is regarded as a typical convergence service converging different functions of multiple service providers to support user-centric environments. This paper first describes the deployment model and service scenario of EDS, a convergence service for user-centric environments in BcN. The user-centric environments stimulates the unified identifier management, namely unified identification (U-ID), to enable users to be provided convergence services without awareness of multiple providers. Then the designed structure and implementation results are given.

A Research on the Use of DID Using a Private Blockchain (프라이빗 블록체인을 사용한 DID 활용 연구)

  • Park, Jong-Gyu;Kwon, Seong-Geun;Kwon, Ki-Ryong;Lee, Suk-Hwan
    • Journal of Korea Multimedia Society
    • /
    • v.24 no.6
    • /
    • pp.760-767
    • /
    • 2021
  • The identity verification is one of the most important technologies in online services. Many services in society are provided online, and the service is provided after confirming the user's identity. Users can do a lot of things online, but they also have side effects. Online digital information is easily manipulated and it is difficult to verify its authenticity, causing social confusion. Accordingly, there has been a movement for individuals to directly manage their identity information using DID. In this paper, we propose a system that can authenticate identity by directly adding own personal information and issuing an identifier using DID technology based on a private blockchain. Then, to verify the proposed system, the scenario is executed and verified.

Design and Implementation of a QoS-Based Scheduling Algorithm Based on the LTE QCI Specifications

  • Ramneek, Ramneek;Choi, Wonjun;Seok, Woojin
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2014.11a
    • /
    • pp.227-230
    • /
    • 2014
  • LTE 3GPP standard defines several QCI (QoS Class Identifier) classes to provide differential QoS, depending on the requirements of different user applications.These QCI values have been characterized in terms of priority, packet loss and delay budget. In spite of the availability of this robust QoS framework in LTE, there is no such scheduling algorithm that has its working principle based on this framework. The responsibility of fulfilling the user requirements, while satisfying the service class requirements is left upon the cellular service provider and it is an open issue at present. To solve this problem, we have proposed a MAC scheduler, which defines the priority of different users based on their bearer specification and provides desired QoS in terms of the achieved throughput through the resource block allocation based on calculated user priority.

Analysis and Countermeasure of User Data Elements on 'RFID in Libraries'(ISO/DIS 28560) (`도서관에서의 RFID'(ISO/DIS 28560)에서 사용자 데이터 요소의 분석 및 대응)

  • Choi, Jae-Hwang;Cho, Hyen-Yang
    • Journal of Korean Library and Information Science Society
    • /
    • v.40 no.3
    • /
    • pp.25-47
    • /
    • 2009
  • The purpose of this study is to analyze ISO/DIS 28560 and to cope with the current developments in library RFID technologies. The user data elements in part 1 and encoding rules in part 2 and part 3 of ISO/DIS 28560 are explored. In addition, a few corresponding cases regarding user data elements on ISO/DIS 28560 are investigated. Based on the corresponding cases, four user data elements are selected. They are , , , and . This study expects to allow fertile ground for discussion on the selection of user data elements in Korea.

  • PDF

A Watermarking Technique for User Authentication Based on a Combination of Face Image and Device Identity in a Mobile Ecosystem

  • Al-Jarba, Fatimah;Al-Khathami, Mohammed
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.303-316
    • /
    • 2021
  • Digital content protection has recently become an important requirement in biometrics-based authentication systems due to the challenges involved in designing a feasible and effective user authentication method. Biometric approaches are more effective than traditional methods, and simultaneously, they cannot be considered entirely reliable. This study develops a reliable and trustworthy method for verifying that the owner of the biometric traits is the actual user and not an impostor. Watermarking-based approaches are developed using a combination of a color face image of the user and a mobile equipment identifier (MEID). Employing watermark techniques that cannot be easily removed or destroyed, a blind image watermarking scheme based on fast discrete curvelet transform (FDCuT) and discrete cosine transform (DCT) is proposed. FDCuT is applied to the color face image to obtain various frequency coefficients of the image curvelet decomposition, and for high frequency curvelet coefficients DCT is applied to obtain various frequency coefficients. Furthermore, mid-band frequency coefficients are modified using two uncorrelated noise sequences with the MEID watermark bits to obtain a watermarked image. An analysis is carried out to verify the performance of the proposed schema using conventional performance metrics. Compared with an existing approach, the proposed approach is better able to protect multimedia data from unauthorized access and will effectively prevent anyone other than the actual user from using the identity or images.

A Study on the Development of Reference Linking System Based on Digital Object Identifier for Korean Journal Articles (국내 학술지 논문의 DOI 기반 연계시스템 구축에 관한 연구)

  • 한혜영;정동열
    • Journal of the Korean Society for information Management
    • /
    • v.17 no.4
    • /
    • pp.207-227
    • /
    • 2000
  • Recenily, major internalional STM(Science, Trchnical, and Mcdivine) Publichers have been developing prototype systems that can provide the refeence linking of jouinal articles within the scholarly literature on a cross-publisher basis using the URN(Universal Resouree Name). In Korea, it is hard to find the efforts to link the scattered digitalized documents to an individual user through a unified web. In this study, a linking model for an inergrated gatewny fro, bibliographic information to full tcxt has been desugned and 'Electronic Research Resourced Linking system (E3R/LS)' has been developed as a prototype for centralized static reference linking system. There are three major components for constructing refrernce linking systems. The firsl componcnt the Digital Object Identifiet(DO1). is introduced as the public identifier inrended to be applied wherever thr item needs to be identified. For denl~iymg Korean journal articles, llie extended SICI(Serlal Ilem and Conlribut~on Idealifier) has becn newly dehed in 1111s study and is used as a suiiia on DOI. The reierence datubasc conlams the second com~onenl, metadiltil, linkcd to implemenied by all information providers. The CnRI resolution system is used for resolving a DOI into a URL as the third component.

  • PDF

A Robust Biometric-based User Authentication Protocol in Wireless Sensor Network Environment (무선센서네트워크 환경에서 생체기반의 개선된 사용자 인증 프로토콜)

  • Shin, Kwang-Cheul
    • The Journal of Society for e-Business Studies
    • /
    • v.18 no.3
    • /
    • pp.107-123
    • /
    • 2013
  • In a wireless sensor network environment, it is required to ensure anonymity by keeping sensor nodes' identifiers not being revealed and to support real-time authentication, lightweight authentication and synchronization. In particular, there exist possibilities of location information leakage by others, privacy interference and security vulnerability when it comes to wireless telecommunications. Anonymity has been an importance issue in wired and wireless network environment, so that it has been studied in wide range. The sensor nodes are interconnected among them based on wireless network. In terms of the sensor node, the researchers have been emphasizing on its calculating performance limit, storage device limit, and smaller power source. To improve of biometric-based D. He scheme, this study proposes a real-time authentication protocol using Unique Random Sequence Code(URSC) and variable identifier for enhancing network performance and retaining anonymity provision.

A Model for Self-Authentication Based on Decentralized Identifier (탈중앙화 신원증명에 기반한 본인 인증 모델)

  • Kim, Ho-Yoon;Han, Kun-Hee;Shin, Seung-Soo
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.11
    • /
    • pp.66-74
    • /
    • 2021
  • With the development of the Internet, user authentication technology that proves me online is improving. Existing ID methods pose a threat of personal information leakage if the service provider manages personal information and security is weak, and the information subject is to the service provider. In this study, as online identification technology develops, we propose a DID-based self-authentication model to prevent the threat of leakage of personal information from a centralized format and strengthen sovereignty. The proposed model allows users to directly manage personal information and strengthen their sovereignty over information topics through VC issued by the issuing agency. As a research method, a self-authentication model that guarantees security and integrity is presented using a decentralized identifier method based on distributed ledger technology, and the security of the attack method is analyzed. Because it authenticates through DID Auth using public key encryption algorithms, it is safe from sniffing, man in the middle attack, and the proposed model can replace real identity card.

Study on History Tracking Technique of the Document File through RSID Analysis in MS Word (MS 워드의 RSID 분석을 통한 문서파일 이력 추적 기법 연구)

  • Joun, Jihun;Han, Jaehyeok;Jung, Doowon;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.6
    • /
    • pp.1439-1448
    • /
    • 2018
  • Many electronic document files, including Microsoft Office Word (MS Word), have become a major issue in various legal disputes such as privacy, contract forgery, and trade secret leakage. The internal metadata of OOXML (Office Open XML) format, which is used since MS Word 2007, stores the unique Revision Identifier (RSID). The RSID is a distinct value assigned to a corresponding word, sentence, or paragraph that has been created/modified/deleted after a document is saved. Also, document history, such as addition/correction/deletion of contents or the order of creation, can be tracked using the RSID. In this paper, we propose a methodology to investigate discrimination between the original document and copy as well as possible document file leakage by utilizing the changes of the RSID according to the user's behavior.

Extended-CAN Mechanism to Support Keyword Search (키워드 검색 지원을 위한 확장 CAN 메커니즘)

  • Lee, Myoung-Hoon;Park, Jung-Soo;Cho, In-June
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.3
    • /
    • pp.421-429
    • /
    • 2006
  • Recently, DHT-based Structured P2P System have a attention to scalability and providing efficient lookup by routing. Retrieving content of DHT-based P2P require knowledge of the exact identifier of sharing file. But user may wish to search for sharing file using descriptive keyword or content. To resolve the problem, this paper propose Extended-CAN mechanism to support keyword search. We defined content-based keyword and identifier of sharing file, and PLS extended to KID and CKD for keyword, common keyword processing. As a result, Extended-CAN mechanism provide efficient keyword search for DHT-based Structured P2P System.