• Title/Summary/Keyword: User Identity

Search Result 377, Processing Time 0.024 seconds

Pseudonym-based Anonymous PKI with Short Group Signature (Short Group Signature를 이용한 가명 기반 PKI)

  • Lee, Sok-Joon;Han, Seung-Wan;Lee, Yun-Kyung;Chung, Byung-Ho
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.703-707
    • /
    • 2008
  • Nowadays, Internet becomes an essential element in our life. We can make use of numerous on-line services through Internet such as information search, on-line shopping, e-mail service, etc. But, while getting the benefits of Internet service, invasion of our privacy frequently occurs because on-line service providers tend to request excessive or unnecessary personal information. So, there have been some researches on anonymous authentication, which means that user can authenticate herself, not revealing her identity or personal information. But, most of the researches are not somewhat applicable to current authentication infrastructure. In this paper, we propose a pseudonym-based anonymous PKI with short group signature. Using our proposed scheme, we can provide anonymity with conditional traceability to current PKI.

  • PDF

Virtuality in Digital Fashion Images (디지털 패션영상에 나타난 가상성 연구)

  • Kim, Hyang-Ja;Kim, Young-Sam
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.39 no.2
    • /
    • pp.233-246
    • /
    • 2015
  • Focus on Digital Fashion Image, the conceptual framework for the thesis is established from Virtuality in Digital Art. Formative characteristics and aesthetic characteristics were studied by classifying the Digital Fashion Image applied and expressed by digital media and technology. A detective research method was used for a case study. A literature study for case-by-case data was analyzed with focus on the works expressing fashion that utilized digital media and technology since the 2000s. Through this study, the Digital revolution has created the socio-cultural impact of a Virtual representation to implement technology and fashion culture that finds ways to take advantage of the image shown in a Digital Fashion Media by understanding Virtuality. The results are as follows. First, it was a re-formation of the fashion culture through the experience of virtuality with mental zone parameters between the media 'Mediation Code'. Reflect the reality of the virtual environment as represented by a cultural image of fashion brands and fashion that reset the team relationship and formed a Homo Ludens cultural code. Second, 'Interactive Exchange' acts on the exchange interaction between the method of digital technology, the human and the machine as well as the technical interoperability of network elements and techniques. This exchange is applied to fashion images that express emotion. Forming personalized fashion items and the user interactively storage that expresses the interactive exchange to forward the identity of the emotional fashion by a change in the message delivery system fashion. Third, the emphasis on intuitive artistic expression 'Synesthesia Immersion' induces a sense of immersion and excitement through the fusion of the interconnected. Enhance a visual image in fashion sensory representation and maximize a tactile and visual virtual reality involvement.

A Study on the information architecture and menu design in the type of web sites (웹사이트의 유형 분류에 따른 정보 설계 및 메뉴디자인의 특성 연구)

  • 배윤선;이현주
    • Archives of design research
    • /
    • v.16 no.1
    • /
    • pp.241-250
    • /
    • 2003
  • With the increasing number and variety of internet users as well as the development of internet technology, web contents have been taking a more comprehensive, integrated, and practical form. This change has brought to our attention the importance of the information architecture and menu design, both of which are required for the users to navigate vast amount of data promptly, correctly and easily for effective communication in the web sites. In this study, web sites were categorized by the service levels provided to the users, and sampling was performed accordingly. Then, information architecture, the layout and the presentation of the menu design were analyzed. The result of the analysis show that there are distinguishable characteristics in how the menus were expressed and designed, and that these characteristics reflect the users' characteristics in the web interface menu design. With the result of this study, we present a guideline for information architecture and web interface menu design, which reflects user characteristics thereby strengthening usability. Using this guideline, we expect the development of web interface design which should support more efficient communication on the web.

  • PDF

OTP-Based Transaction Verification Protocol Using PUFs (PUF를 이용한 OTP 기반 거래 검증 프로토콜)

  • Lee, Jonghoon;Park, Minho;Jung, Souhwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.6
    • /
    • pp.492-500
    • /
    • 2013
  • The One-Time Password(OTP) Generator is used as a multi-factor authentication method to ensure secure transaction during e-Financial transaction in the bank and securities company. The OTP based e-Financial Transaction Verification Protocol ensures secure e-financial transaction through confirming the user's identity using OTP authentication information and counters not only Man-in-the-Browser(MITB) attacks but also memory hacking attacks. However, it is possible to generate correct OTPs due to potential of stealing sensitive information of the OTP generator through intelligent phishing, pharming, social engineering attacks. Therefore, it needs another scheme to prevent from above threats, and this paper proposes advanced scheme using Physical Unclonable Functions(PUFs) to solve these problems. First, it is impossible to generate the same OTP values because of the hysically unclonable features of PUFs. In addition, it is impossible to clone OTP generator with hardware techniques. Consequently, the proposed protocol provides stronger and more robust authentication protocol than existing one by adding PUFs in the OTP generator.

The Study of Facebook Marketing Application Method: Facebook 'Likes' Feature and Predicting Demographic Information (페이스북 마케팅 활용 방안에 대한 연구: 페이스북 '좋아요' 기능과 인구통계학적 정보 추출)

  • Yu, Seong Jong;Ahn, Seun;Lee, Zoonky
    • The Journal of Bigdata
    • /
    • v.1 no.1
    • /
    • pp.61-66
    • /
    • 2016
  • With big data analysis, companies use the customized marketing strategy based on customer's information. However, because of the concerns about privacy issue and identity theft, people start erasing their personal information or changing the privacy settings on social network site. Facebook, the most used social networking site, has the feature called 'Likes' which can be used as a tool to predict user's demographic profiles, such as sex and age range. To make accurate analysis model for the study, 'Likes' data has been processed by using Gaussian RBF and nFactors for dimensionality reduction. With random Forest and 5-fold cross-validation, the result shows that sex has 75% and age has 97.85% accuracy rate. From this study, we expect to provide an useful guideline for companies and marketers who are suffering to collect customers' data.

  • PDF

Research on Emotional Factors and Voice Trend by Country to be considered in Designing AI's Voice - An analysis of interview with experts in Finland and Norway (AI의 음성 디자인에서 고려해야 할 감성적 요소 및 국가별 음성 트랜드에 관한 연구 - 핀란드와 노르웨이의 전문가 인뎁스 인터뷰를 중심으로)

  • Namkung, Kiechan
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.9
    • /
    • pp.91-97
    • /
    • 2020
  • Use of voice-based interfaces that can interact with users is increasing as AI technology develops. To date, however, most of the research on voice-based interfaces has been technical in nature, focused on areas such as improving the accuracy of speech recognition. Thus, the voice of most voice-based interfaces is uniform and does not provide users with differentiated sensibilities. The purpose of this study is to add a emotional factor suitable for the AI interface. To this end, we have derived emotional factors that should be considered in designing voice interface. In addition, we looked at voice trends that differed from country to country. For this study, we conducted interviews with voice industry experts from Finland and Norway, countries that use their own independent languages.

A Study on the Characteristics of Information Design in Multimedia Design (멀티미디어디자인에서 정보디자인 특성에 관한 연구)

  • 류시천
    • Archives of design research
    • /
    • v.17 no.1
    • /
    • pp.63-76
    • /
    • 2004
  • Although information design principles had originated from the graphic design field including publishing design in 1970s, information design have taken one of the most important positions in multimedia design fields as the present since Richard Saul Wurmn started his researches on information design and its practical application on internet environments. However, relatively little researches have been performed for building identity of information design in multimedia design fields so far and moreover in some cases, information design is likely to be narrowly viewed as 'the representation of a piece of information and its visualization' which was defined in traditional graphic design field. This research circumstance leads the study to investigate characteristics of information design in current multimedia design with contingent perspective which is compared to the traditional information design. The study results suggest 5 characteristics of information design including 'suggesting context & finding out information hierarchy', 'access of integrated consideration & share of information control', 'using of multi-dimensional media & content first', 'stabilization of information quality & combinational understanding of meaning', 'bilateral information representation & user's knowledge expansion'. Future researches, based on the results of the study, are expected to be expanded to a degree with argument for inter-dependent and/or exclusive characteristics of adjacent fields of information design such as interface design, interaction design and experience design.

  • PDF

An Efficient Revocable Group Signature Scheme in Vehicular Ad Hoc Networks

  • Zhao, Zhen;Chen, Jie;Zhang, Yueyu;Dang, Lanjun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.10
    • /
    • pp.4250-4267
    • /
    • 2015
  • Although many revocable group signature schemes has been proposed in vehicular ad hoc networks (VANETs), the existing schemes suffer from long computation delay on revocation that they cannot adapt to the dynamic VANETs. Based on Chinese remainder theorem and Schnorr signature algorithm, this paper proposes an efficient revocable group signature scheme in VANETs. In the proposed scheme, it only need to update the corresponding group public key when a member quits the group, and in the meanwhile the key pairs of unchanged group members are not influenced. Furthermore, this scheme can achieve privacy protection by making use of blind certificates. Before joining to the VANETs, users register at local trusted agencies (LTAs) with their ID cards to obtain blind certificates. The blind certificate will be submitted to road-side units (RSUs) to verify the legality of users. Thus, the real identities of users can be protected. In addition, if there is a dispute, users can combine to submit open applications to RSUs against a disputed member. And LTAs can determine the real identity of the disputed member. Moreover, since the key pairs employed by a user are different in different groups, attackers are not able to track the movement of users with the obtained public keys in a group. Furthermore, performance analysis shows that proposed scheme has less computation cost than existing schemes.

A Case Study on Urban Regeneration Projects for Declined Industrial Districts in Downtown Area (도심 노후산업지구 도시재생사업 사례연구)

  • Choi, Kang-Rim
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.10
    • /
    • pp.129-142
    • /
    • 2019
  • It is needed to regenerate declined industrial districts in downtown area through to invite new industry and to improve urban environment. The purpose of this paper was to make suggestions on the urban regeneration for the districts. I have taken a literature research and a site analysis with cases of 'the South Lake Union' in Seattle and 'Pearl District' in Portland, USA. The result of the analysis was as follows: (1) The land use was changed to mixed use of business-commerce-recreation. The building use was changed to facilities for work, play and live. (2) Infrastructures were improved for user oriented facilities such as pedestrian friendly street, public parks & open spaces, public transportation system, and life supporting facilities. (3) The place identity was enhanced through the preservation of urban structure-tissues, renovation of existing buildings, and preservation of historical heritages.

Development of SAML Software for JAVA Web Applications in Korea (국내 자바 웹 응용을 위한 SAML 소프트웨어의 개발)

  • Jo, Jinyong;Chae, Yeonghun;Kong, JongUk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.9
    • /
    • pp.1160-1172
    • /
    • 2019
  • Federated authentication is a user authentication and authorization infrastructure that spans multiple security domains. Many overseas Web applications have been adopting SAML-based federated authentication. However, in Korea, it is difficult to apply the authentication because of the high market share of a specific Web (application) server, which is hard to use open-source SAML software and the high adoption of Java-based standard framework which is not easy to integrate with SAML library. This paper proposes the SAML4J, which is developed in order to have Web applications easily and safely integrated with the Java-based framework. SAML4J has a developer-friendly advantage of using a session storage independent of the framework and processing Web SSO flows through simple API. We evaluate the functionality, performance, and security of the SAML4J to demonstrate the high feasibility of it.