• 제목/요약/키워드: User Identity

Search Result 384, Processing Time 0.027 seconds

A Study on the Uniform Design for Corporate Identity of College -With a focus on G College Uniform Design- (이미지 통합을 위한 대학의 유니폼 디자인 연구 -G 대학 사례연구를 통하여-)

  • 권윤경;채선미
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.28 no.6
    • /
    • pp.842-853
    • /
    • 2004
  • This research was conducted to develop uniform designs as a part of CIP(Corporate Identity Program) for Corporate Identify of G College. A uniform is the dress of a distinctive design or a fashion worn by members of a particular group. Therefore, the uniform should provide the user with pride and distinction for a company or a college in wearing the uniform. The method and procedure of this research was as follows: First]y, we examined CIP(Corporate Identity Program) expressing 'visual Image' of G College such as symbolic marks and colors and logos and investigated the actual conditions of G College uniform and the others. Secondly, we decided the direction of the design concept to reflect the investigated results. Thirdly, we designed the new uniforms by the design process considering of the essential factors of a uniform. for example functional, beautiful, symbolic aspects.

An Efficient Biometric Identity Based Signature Scheme

  • Yang, Yang;Hu, Yupu;Zhang, Leyou
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.8
    • /
    • pp.2010-2026
    • /
    • 2013
  • The combination of biometrics and cryptography gains a lot of attention from both academic and industry community. The noisy biometric measurement makes traditional identity based cryptosystems unusable. Also the extraction of key from biometric information is difficult. In this paper, we propose an efficient biometric identity based signature scheme (Bio-IBS) that makes use of fuzzy extractor to generate the key from a biometric data of user. The component fuzzy extraction is based on error correction code. We also prove that the security of suggested scheme is reduced to computational Diffie-Hellman (CDH) assumption instead of other strong assumptions. Meanwhile, the comparison with existing schemes shows that efficiency of the system is enhanced.

A Research on the Use of DID Using a Private Blockchain (프라이빗 블록체인을 사용한 DID 활용 연구)

  • Park, Jong-Gyu;Kwon, Seong-Geun;Kwon, Ki-Ryong;Lee, Suk-Hwan
    • Journal of Korea Multimedia Society
    • /
    • v.24 no.6
    • /
    • pp.760-767
    • /
    • 2021
  • The identity verification is one of the most important technologies in online services. Many services in society are provided online, and the service is provided after confirming the user's identity. Users can do a lot of things online, but they also have side effects. Online digital information is easily manipulated and it is difficult to verify its authenticity, causing social confusion. Accordingly, there has been a movement for individuals to directly manage their identity information using DID. In this paper, we propose a system that can authenticate identity by directly adding own personal information and issuing an identifier using DID technology based on a private blockchain. Then, to verify the proposed system, the scenario is executed and verified.

Enhancing Identity Privacy Using Identity-Based Encryption in Access Networks of 3GPP (3GPP 접속 망에서 ID 기반 암호를 이용한 신원 프라이버시 개선 연구)

  • Jung, Yonghyun;Lee, Dong Hoon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.10
    • /
    • pp.361-372
    • /
    • 2016
  • Identity Privacy issues such as exposures of IMSIs(International Mobile Subscriber Identities) in access network have been consistently raised throughout GSM, UMTS, LTE in 3GPP. The 3GPP specification uses temporary identities instead of IMSI to ensure anonymity of the user. Even if temporary identities are disclosed, Identity Privacy may be maintained at a safe level by security policies such as no linkability and periodic update. But in case of IMSI, it cannot be changed even though it is exposed. There still exist some situations that IMSI is used in clear text for the authentication. Therefore, a protective mechanism for the identity confidentiality is needed. In this paper we propose a protocol based on IBE(Identity-based Encryption) to protect permanent identities in access network. By simplifying the scheme, this protocol has minimized the system impact on current 3GPP environment. And this scheme can be applied to all kind of permanent identities and 3GPP AKA(Authentication and Key Agreement) protocols in access network.

Applicability and Adaptability of Gait-based Biometric Security System in GCC

  • S. M. Emdad Hossain
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.9
    • /
    • pp.202-206
    • /
    • 2024
  • Robust system may not guaranty its applicability and adaptability. That is why research and development go together in the modern research concept. In this paper we are going to examine the applicability and adaptability of gait-based biometric identity verification system especially in the GCC (Gulf Cooperation Council). The system itself closely involved with human interaction where privacy and personality are in concern. As of 1st phase of our research we will establish gait-based identity verification system and then we will explain them in and out of human interaction with the system. With involved interaction we will conduct an extensive survey to find out both applicability and adoptability of the system. To conduct our experiment, we will use UCMG databased [1] which is readily available for the research community with more than three thousand video sequences in different viewpoint collected in various walking pattern and clothing. For the survey we will prepare questioners which will cover approach of data collection, potential traits to collect and possible consequences. For analyzing gait biometric trait, we will apply multivariate statistical classifier through well-known machine learning algorithms in a ready platform. Similarly, for the survey data analysis we will use similar approach to co-relate the user view point for such system. It will also help us to find the perception of the user for the system.

A study on the impact of fashion brand Metaverse platform characteristics on perceived avatar identity and user purchase intention

  • Jihye Jeon;Eun-Jung Lee
    • International Journal of Advanced Culture Technology
    • /
    • v.12 no.3
    • /
    • pp.406-418
    • /
    • 2024
  • In line with the rapid spread of Metaverse in various marketing areas, fashion companies have also begun to devise various activities using the Metaverse. Fashion experiences within the Metaverse platform must be conducted considering the characteristics of the Metaverse itself. However, there has yet to be any research on Metaverse fashion based on the characteristics of the Metaverse platform itself. Accordingly, this study sought to empirically analyze the impact of various characteristics of the Metaverse platform on consumers' virtual fashion experience within the platform. In particular, this study focused on the relationships among the Metaverse platform characteristics, perceived avatar identity, and the purchase intention of actual fashion products. In order to test the hypotheses, a survey was conducted on 300 Korean male and female consumers with an average age of 39.3 who had experience with virtual fashion through the Metaverse platform. In response to the recent increase in domestic and foreign brands' attempts to experience fashion using ZEPETO, the questionnaire provided an experience scenario that included detailed captured images of the use of avatars in the ZEPETO world. Data was subjected to statistical analysis using the SPSS 28.0 program. The results confirmed that the characteristic factors of the Metaverse platform (i.e., presence, social interactivity, anonymity) had a significant impact on the user's perceived avatar identification. Additionally, perceived avatar identity significantly affected users' purchase intention. Theoretical and managerial implications and study limitations are discussed.

The Effects of User Experience-Based Design Innovativeness on User-Metaverse Platform Channel Relationships in South Korea

  • JEON, Joo-Eon
    • Journal of Distribution Science
    • /
    • v.19 no.11
    • /
    • pp.81-90
    • /
    • 2021
  • Purpose: The purpose of this research is that Metaverse platforms' UXBDI can be distinguished among Metaverse platform channel types. Metaverse platform represents a collective term signifying services that include augmented reality, lifelogging, mirror worlds, and virtual worlds. User Experience-Based Design Innovativeness (UXBDI) is characterized by novelty in product design and services that satisfy user experience. This study examined the effect of Metaverse platforms' UXBDI on user-Metaverse platform relationships. Research design, data and methodology: Metaverse platform users were selected as samples, and a marketing research institution known as a panel company conducted the survey. It used multiple regression to test the impact on platform identification and commitment based on a survey of 442 South Korean respondents. Results: The research confirmed that UXBDI sub-dimensional scales of attractiveness and interaction increased user-Metaverse platform identification and commitment. Also, a Metaverse platform identity increased user-Metaverse platform identification in virtual and mirror worlds. Conclusion: This study contributes to multiple academic fields. First, the UXBDI of Metaverse platforms appears to be a key component of ongoing user-Metaverse relationships. Second, UXBDI affects relationships differently based on the Metaverse platform type.

Trends in Implicit Continuous Authentication Technology (무자각 지속인증 기술 동향)

  • Kim, S.H.;Kim, S.H.;Jin, S.H.
    • Electronics and Telecommunications Trends
    • /
    • v.33 no.1
    • /
    • pp.57-67
    • /
    • 2018
  • Modern users are intensifying their use of online services every day. In addition, hackers are attempting to execute advanced attacks to steal personal information protected using existing authentication technologies. However, existing authentication methods require an explicit authentication procedure for the user, and do not conduct identity verification in the middle of the authentication session. In this paper, we introduce an implicit continuous authentication technology to overcome the limitations of existing authentication technology. Implicit continuous authentication is a technique for continuously authenticating users without explicit intervention by utilizing their behavioral and environmental information. This can improve the level of security by verifying the user's identity during the authentication session without the burden of an explicit authentication procedure. In addition, we briefly introduce the definition, key features, applicable algorithms, and recent research trends for various authentication technologies that can be used as an implicit continuous authentication technology.

BioCovi: A Visualization Service for Comparative Genomics Analysis

  • Lee, Jungsul;Park, Daeui;Bhak, Jong
    • Genomics & Informatics
    • /
    • v.3 no.2
    • /
    • pp.52-54
    • /
    • 2005
  • Visualization of the homology information is an important method to analyze the evolutionary and functional meanings of genes. With a database containing model genomes of Homo sapiens, Mus muculus, and Rattus norvegicus, we constructed a web­based comparative analysis tool, BioCovi, to visualize the homology information of mammalian sequences on a very large scale. The user interface has several features: it marks regions whose identity is greater than that specified, it shows or hides gaps from the result of global sequence alignment, and it inverts the graph when total identity is higher than the threshold specified.

User Interface Management - Qualitative Analysis Based on Mobile Phone User Interface Applications - (유저인터페이스 매니지먼트 - Mobile Phone User Interface를 중심으로 한 정성적 고찰 -)

  • Kweon, O-Seong
    • Journal of the Ergonomics Society of Korea
    • /
    • v.26 no.3
    • /
    • pp.53-57
    • /
    • 2007
  • The User Interface (UI) in the company is more important than ever. But the application of UI for the industry use is restricted by various constraints such as delivery, technical limitation, etc. User Interface designers in the company have thought how to set up the UI organization, how to define identity and goal, how to communicate with other teams, what is the best UI process, and many other issues. In this paper, the author discuss the practical issues arisen when User Interface organization is formed and managed based on the mobile phone manufacture's perspective. The pros and cons of location of UI organization, advanced UI organization, UI member formation, UI role, UI output, UI evaluation, and understanding of UI in the society and company are discussed. This discussion will help UI designers in industry to set up and manage UI organization.