• 제목/요약/키워드: User Identity

검색결과 384건 처리시간 0.022초

인테리어 사무실 경영 전략을 위한 인터넷의 활용 제안 (A Proposal for Approaching Internet to Interior Design firm Management Strategy)

  • 최용수
    • 한국실내디자인학회논문집
    • /
    • 제33호
    • /
    • pp.99-105
    • /
    • 2002
  • As a new environment, the Internet proposes to us the innovation of our life. New information technologies(IT) have enabled and stimulated new organizational forms. Electronic Commerce is the new economy that changes the pattern of our life and the form of business transaction. Electronic Commerce is rapidly growing due to the increasing of internet user and the development of information technology. With the emergence of the Internet, a totally new business, the electronic commerce(EC) is emerging. Internet EC brings in many benifits to the organization such as reduced costs, fast turnaround, better customer service, and in some firms strategic advantage over their competitors. As a newly created interior design paradigm, this proposal presents its utmost advantage, interlocking interior design firm management with virtual reality of internet. Appropriately interacting on-line with off-line in virtual reality of internet improves the image of interior design firm and makes the best use of its identity in marketing. This application can rightly attract consumers' interest. Analyzing the market, the most important thing in marketing is to anticipate consumers' existing and possible demand in future. In other word, servicing consumers with idea efficiently is competence. As the point of management, to maximize managing value in interior design proposes the application of internet to management strategy of interior design firm

스마트폰 기반의 클라우드 컴퓨팅 보안 인증 연구 (A Study of Security Authentication for Cloud Computing Based on Smart Phone)

  • 정윤수;김용태
    • 한국통신학회논문지
    • /
    • 제37C권11호
    • /
    • pp.1027-1035
    • /
    • 2012
  • 클라우드 컴퓨팅의 편리성과 확장성을 기반으로 웹과 모바일의 기능을 결합한 스마트폰이 최근 큰 관심을 받고 있다. 그러나 현재 출시되고 있는 클라우드 서비스들은 대부분 모바일 단말과 서버간의 단순 데이터 동기화 기반 응용 서비스 수준에 그치고 있어 통신사들이 개발한 비즈니스 모델의 상호운용성에 문제가 있다. 본 논문에서는 클라우드 컴퓨팅의 편리성과 확장성을 유지하면서 스마트폰 간 서로 다른 비즈니스 모델을 사용하는 스마트폰의 사용자를 효율적으로 통합 관리할 수 있는 서비스 보안 인증 모델을 제안한다. 제안 모델은 현재 운영중인 클라우드 컴퓨팅 시스템에서 효과적으로 활용할 수 있도록 스마트폰 사용자의 신분확인 및 권한/접근제어 등을 연동하여 통합 커뮤니케이션 업무의 원활한 서비스가 유지될 수 있도록 스마트폰의 사용자 정보를 인증한다.

사회적 요인과 게임적 요인이 모바일 소셜 네트워크 게임 몰입에 미치는 영향 (Effects of Social Factors and Game Factors on Commitment of Mobile Social Network Games(M-SNG))

  • 한주영;이새봄;이상철;서영호
    • 품질경영학회지
    • /
    • 제44권3호
    • /
    • pp.601-616
    • /
    • 2016
  • Purpose: The purposes of this study are (1) to examine why users commit to M-SNG and (2) to understand what factors impact M-SNG users' enjoyment, motivation and commitment. Methods: We use a questionnaire survey to collect 190 data on users' perception on M-SNG. we also use a structural equation modeling method with Smart PLS 3.0 Results: Playfulness, design aesthetics, competition and social identity are found to be statistically significant factors affecting enjoyment and motivation. Also, enjoyment and motivation are found to be statistically significant factors affecting commitment. Conclusion: We suggest three points of view as game factors, socio-game factors, and social factors. Game factors are more important than other factors. Also, enjoyment is a more powerful factor than motivation in affecting user's commitment to using M-SNG.

주민등록번호 기반의 온라인 본인확인서비스 기관 지정기준 개선방안 연구 (A Study on Improvement method of designation criteria for Personal Proofing Service Based on Resident Registration Number)

  • 김종배
    • 디지털산업정보학회논문지
    • /
    • 제16권3호
    • /
    • pp.13-23
    • /
    • 2020
  • Currently, online means of replacing resident registration numbers(RRN) include I-Pin, mobile phone, credit card, MyPin, and general-purpose certificate. In order to issue alternative means based on the RRN, it must be designated through the designation review by the Korea Communications Commission(KCC) through a designation review by personal proofing agency and be subject to annual management. However, the criteria for designation and follow-up of the designation of the personal proofing agency carried out by KCC have been used in 2010 without revision, and there are problems that do not conform to the evaluation standards of various alternative means. Therefore, in this paper, we propose a method for improving the designation criteria and management system of the personal proofing service agency. The proposed method analyzes the characteristics of the alternative identification-based personal proofing service and proposes a follow-up management standard that can appropriately evaluate the analyzed characteristics and improves the designation criteria according to the emergence of new alternatives. Through the proposed method, it can be seen that it is possible to strengthen the safety of the personal proofing service based on the alternative means of RRN provided online and face-to-face and to protect the user's personal information.

Self-Updating One-Time Password Mutual Authentication Protocol for Ad Hoc Network

  • Xu, Feng;Lv, Xin;Zhou, Qi;Liu, Xuan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권5호
    • /
    • pp.1817-1827
    • /
    • 2014
  • As a new type of wireless network, Ad hoc network does not depend on any pre-founded infrastructure, and it has no centralized control unit. The computation and transmission capability of each node are limited. In this paper, a self-updating one-time password mutual authentication protocol for Ad hoc network is proposed. The most significant feature is that a hash chain can update by itself smoothly and securely through capturing the secure bit of the tip. The updating process does not need any additional protocol or re-initialization process and can be continued indefinitely to give rise to an infinite length hash chain, that is, the times of authentication is unlimited without reconstructing a new hash chain. Besides, two random variable are added into the messages interacted during the mutual authentication, enabling the protocol to resist man-in-the-middle attack. Also, the user's identity information is introduced into the seed of hash chain, so the scheme achieves anonymity and traceability at the same time.

Certificateless multi-signer universal designated multi-verifier signature from elliptic curve group

  • Deng, Lunzhi;Yang, Yixian;Chen, Yuling
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권11호
    • /
    • pp.5625-5641
    • /
    • 2017
  • Certificateless public key cryptography resolves the certificate management problem in traditional public key cryptography and the key escrow problem in identity-based cryptography. In recent years, some good results have been achieved in speeding up the computation of bilinear pairing. However, the computation cost of the pairing is much higher than that of the scalar multiplication over the elliptic curve group. Therefore, it is still significant to design cryptosystem without pairing operations. A multi-signer universal designated multi-verifier signature scheme allows a set of signers to cooperatively generate a public verifiable signature, the signature holder then can propose a new signature such that only the designated set of verifiers can verify it. Multi-signer universal designated multi-verifier signatures are suitable in many different practical applications such as electronic tenders, electronic voting and electronic auctions. In this paper, we propose a certificateless multi-signer universal designated multi-verifier signature scheme and prove the security in the random oracle model. Our scheme does not use pairing operation. To the best of our knowledge, our scheme is the first certificateless multi-signer universal designated multi-verifier signature scheme.

PEC: A Privacy-Preserving Emergency Call Scheme for Mobile Healthcare Social Networks

  • Liang, Xiaohui;Lu, Rongxing;Chen, Le;Lin, Xiaodong;Shen, Xuemin (Sherman)
    • Journal of Communications and Networks
    • /
    • 제13권2호
    • /
    • pp.102-112
    • /
    • 2011
  • In this paper, we propose a privacy-preserving emergency call scheme, called PEC, enabling patients in life-threatening emergencies to fast and accurately transmit emergency data to the nearby helpers via mobile healthcare social networks (MHSNs). Once an emergency happens, the personal digital assistant (PDA) of the patient runs the PEC to collect the emergency data including emergency location, patient health record, as well as patient physiological condition. The PEC then generates an emergency call with the emergency data inside and epidemically disseminates it to every user in the patient's neighborhood. If a physician happens to be nearby, the PEC ensures the time used to notify the physician of the emergency is the shortest. We show via theoretical analysis that the PEC is able to provide fine-grained access control on the emergency data, where the access policy is set by patients themselves. Moreover, the PEC can withstandmultiple types of attacks, such as identity theft attack, forgery attack, and collusion attack. We also devise an effective revocation mechanism to make the revocable PEC (rPEC) resistant to inside attacks. In addition, we demonstrate via simulation that the PEC can significantly reduce the response time of emergency care in MHSNs.

UX 관점에서의 스마트 런처 특징연구 (A study on smart launcher features in terms of UX)

  • 이정애;정진헌
    • 디지털융복합연구
    • /
    • 제13권1호
    • /
    • pp.463-468
    • /
    • 2015
  • 모바일 플랫폼시장이 확산함에 따라 홈화면의 확보는 기업의 브랜드커뮤니케이션 활동에 있어서 중요한 의미로 받아들여지고 있다. 이에 본 연구는 디바이스 브랜드별 UI차별화를 위해 기본으로 탑재했던 런처의 기본 기능을 넘어서 브랜드 커뮤니케이션 기능을 수행하는 어플리케이션의 확대된 기능으로 변화될 수 있는 특징적 요소를 도출함으로써 스마트폰 어플리케이션으로서의 런처가 브랜드커뮤니케이션으로 어떻게 활용되어지는지를 연구하였다. 런처 구성요소를 속성에 따라 홈구성요소와 개인화기능요소로 구분하여 각 상세 항목에서 나타나는 브랜드 커뮤니케이션의 항목과 특징을 분석한 결과 (1)브랜드 이미지 통합적 요소 (2)서비스마케팅 몰입적 요소로 도출 되었다.

P2P 네트워크에서 익명성 보장을 위한 패킷 대치 기법 (Packet Replacement Technique for Securing Anonymity in P2P Network)

  • 김병룡;김기창
    • 정보처리학회논문지C
    • /
    • 제12C권3호
    • /
    • pp.331-338
    • /
    • 2005
  • 플러딩 기반 P2P 시스템은 기본적으로는 익명성을 제공하고 있다. 그리고 익명의 상태에서 사용자와 제공자가 정보를 교환하고 있다. 노드에서 노드로 전달되는 대부분의 패킷들은 패킷을 보낸 노드의 신원정보를 포함하고 있지 않다. 그리고 이러한 패킷들은 중간 노드들이 동적으로 구성하고 있는 라우팅 시스템에 의해서 목적지로 전송되어진다. 따라서 누가 최초로 전송했는지, 누가 지정된 수신지인지 아는 것은 불가능하다. 그러나 다운로드와 업로드 하는 호스트의 IP주소가 외부로 드러나기 때문에 익명성을 제공하지 못하고 있다. 본 논문에서는 익명성이 문제가 될 수 있는 시스템에서 검색질의 응답 패킷의 교체를 통해서 사용자와 리소스 제공자의 신원 보호를 위해 익명성을 제공할 수 있는 기법을 제안한다.

롤랑 바르트의 텍스트로 본 렘 콜하스, SANAA, 소우 후지모토 건축의 특성 (A Study on the Works of Rem Koolhaas, SANAA, Sou Fujimoto through the Text of Roland Barthes)

  • 박주석;김동진
    • 한국실내디자인학회논문집
    • /
    • 제26권1호
    • /
    • pp.13-24
    • /
    • 2017
  • The semiotics philosopher Roland Barthes declared 'the death of the author'. This means a sense of skepticism about author-centered writing in literature, and that readers and critics must also change their reading attitudes. In architecture, too, author-centered design appears. Architects sometimes try to express their will and concepts strongly through their work. However, this architecture is oriented toward identity, self-revealing, self-centered, and eventually without inspiration. On the other hand, the signifier does not result in a single meaning, and it is architecture as text that allows readers to enjoy the pleasure of deciphering. The purpose of this study is to investigate that unilateral by the will of the architect. Or whether there is a potential for non-intelligence and the possibility of generating meaning. In particular, we will analyze the works of Rem Koolhaas, SANAA and Sou Fujimoto to see if they are free from the will of the architect and can obtain the user's true freedom. As a result, we want to reveal the potential of various interpretations by users in contemporary architecture.