• Title/Summary/Keyword: Verification Service Model

Search Result 218, Processing Time 0.034 seconds

The Study on the Evaluation Factor for Security of Age Verification Information (연령 검증정보의 안정성을 위한 평가인자에 대한 연구)

  • Kim, Tae Kyung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.4
    • /
    • pp.127-132
    • /
    • 2014
  • Some laws and regulations may require internet service providers to provide services based on the age of users. Age verification in the online environment should be used as a tool to provide service that is appropriate to child based on age. Using the minimum attribute information, processes on age verification provides the proper guidance to the internet services. However, there is a lack of a globally accepted trust framework for age verification process including evaluation factors for age verification information. In this paper the federation model of user attributes were described and evaluation factors for the age verification information were suggested. Also using the suggested evaluation factors, performance evaluation of federation model of user evaluation was performed. To meet the requirements of evaluation factors, framework of federation model should consider the unlinkability pseudonym support, eavesdropping protection and cloning protection.

An Access Code Key for Verification Service Model on the Blockchain in a Door Security (출입문 보안을 위한 블록체인 기반의 출입코드키 검증 서비스 모델)

  • Hong, Ki Hyeon;Lee, Byung Mun
    • Journal of Korea Multimedia Society
    • /
    • v.25 no.10
    • /
    • pp.1416-1432
    • /
    • 2022
  • The access control system is a system that allows users to selectively enter the building by granting an access key to the user for security. Access keys with weak security are easily exposed to attackers and cannot properly perform the role that authenticates users. Access code keys should be protected from forgery or spoofing. For this reason, access key verification service models is important in security. However, most models manage all access keys on one central server. This method not only interrupts all services due to server errors, but also risks forgery and spoofing in the process of transmitting access keys. Therefore, blockchain algorithms are used to reduce this risk. This paper proposes a blockchain-based access key verification service model that used distributed stored blockchain gateways on storing access keys and authenticates the user's identity based on them. To evaluate the performance of this model, an experiment was conducted to confirm the performance of the access key forgery recovery rate and the blockchain network performance. As a result, the proposed method is 100% forgery recovery rate, and the registration and verification process is evaluated at 387.58 TPS and 136.66 TPS.

u-City service Model based on Implementation and Adaptability

  • Lee, Yeon-Ho;Ko, Seong-Sun;Lee, Nam-Yong;Kim, Jong-Bae
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.3
    • /
    • pp.251-257
    • /
    • 2010
  • The realization of u-City is coming near in some local governments by applying various city services, namely, u-City services to the city construction field to improve competitiveness of the city. But it is a reality that some local governments are experiencing many trial and errors in application of the u-City service in addition to the problem posing that the u-City service is not considering characteristics of development or application environment of an individual city. The present research proposes a service model for on-site application of the u-City service to solve this problem. The proposed model suggests a method for specifically conceptualizing and objectifying the on-site application that the existing concept-oriented model or an architecture-oriented model, etc. didn't provide. The verification system on effectiveness or effects of the u-City service model to remove ambiguity on the u-City service especially. The verification system of the u-City service model grasps the technology, function, procedure and target, etc. that the u-City service contains, evaluates whether the model satisfies conditions that the model should have, and secures objectivity and predictability of the u-City service model through confirmation on propriety, implementation and effectiveness, etc.

Verification of Precipitation Forecast Model and Application of Hydrology Model in Kyoungan-chun Basin (경안천 유역에 대한 강수예보모델의 검증 및 수문모형활용)

  • Choi, Ji-Hye;Kim, Young-Hwa;Nam, Kyung-Yeub;Oh, Sung-Nam
    • Journal of Korea Water Resources Association
    • /
    • v.39 no.3 s.164
    • /
    • pp.215-226
    • /
    • 2006
  • In this study, we performed verification of VSRF (Very Short Range Forecast of precipitation) model and application of NWSPC (National Weather Service PC) rainfall-runoff model in Kyoungan-chun basin. We used two methods for verification of VSRF model. The first method is a meteorological verification that evaluates the special quality feature for rain amount between AWS and VSRF model over Kyoungan-chun basin, while second method is a hydrological verification that compares the calculated Mean Area Precipitation (MAP) between AWS and VSRF Quantitatively. This study examines the usefulness of VSRF precipitation forecasting model data in NWSPC hydrological model. As a result, correlation coefficient is over 0.6 within 3 hour lead time. It represents that the forecast results from VSRF are useful for water resources application.

Voice Verification System for m-Commerce on CDMA Network

  • Kyung, Youn-Jeong
    • The Journal of the Acoustical Society of Korea
    • /
    • v.22 no.4E
    • /
    • pp.176-182
    • /
    • 2003
  • As the needs for wireless Internet service is increasing, the needs for secure m-commerce is also increasing. Conventional security techniques are reinforced by biometric security technique. This paper utilized the voice as biometric security techniques. We developed speaker verification system for m-commerce (mobile commerce) via wireless internet and wireless application protocol (WAP). We named this system the mVprotek. We implemented the system as client-server architecture. The clients are mobile phone simulator and personal digital assistant (PDA). The verification results are obtained by integrating the mVprotek system with SK Telecom's code dimension multiple access (CDMA) system. Utilizing f-ratio weighting and virtual cohort model normalization showed much better performance than conventional background model normalization technique.

Real-time Context Service Model Based on RFID for u-Conference (u-Conference를 위한 RFID 기반의 실시간 상황 서비스 모델)

  • Kang, Min-Sung;Kim, Do-Hyeun;Lee, Kwang-Man
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.2 no.2
    • /
    • pp.95-100
    • /
    • 2007
  • Recently ubiquitous application services are developed plentifully using RFID techniques in the field of distribution and security industries. However, except these field the applications using RFID are not mature yet. In this study, we proposed a real-time context service model of the u-conference based on the real-time contextual information acquired from conference and exposition. With collection of real-time contextual information for u-conference, the model can provide a lot of information services on the state of session attendee, doorway control, affairs, user certification, presentation progress etc. For the verification of proposed real-time context service model of u-conference, we design and implement the conference progress state service included the state of session attendee, user certification and presentation progress etc. This service provides the presentation state information included the current presenter, the paper list, the number of session attendee, the schedule and place of each session using the collecting RFID tag and the related information.

  • PDF

A Study on the Influence Factors of the Continuance Intention of Foodservice O2O Platform : IS Success Model and Post Acceptance Model (외식 O2O 플랫폼의 지속사용의도 영향 요인 연구 : 정보시스템성공모델과 후기수용모델)

  • Park Jaeyun;Seo Jungwoon
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.20 no.2
    • /
    • pp.159-174
    • /
    • 2024
  • Recently, as demand for delivery services has increased rapidly due to COVID-19, the food service O2O(Online to Offline) platform has also grown significantly. This study aimed to verify the influencing factors on continuance use intention of O2O platform using the Information Service Success Model and Post Acceptance Model. An online survey was conducted on 379 consumers who used the food service O2O platform in the past six months, and the collected survey was analyzed using SPSS 26.0 and AMOS 24.0. As a result of the verification, in the influence relationship between the Information Service Success Model and Post Acceptance Model, system quality was found to have an effect on perceived usefulness, but information quality and service quality were rejected for perceived usefulness and were partially adopted, The rest were all found to have a significant effect. In the moderating effect according to the amount used, the intention to continue using was stronger when the group who spent more than 30,000 won was satisfied. These results support previous research on O2O platforms and provide academic implications as well as practical implications for practitioners in the food service industry.

User Experience Validation Using the Honeycomb Model in the Requirements Development Stage

  • Kim, Neung-Hoe
    • International journal of advanced smart convergence
    • /
    • v.9 no.3
    • /
    • pp.227-231
    • /
    • 2020
  • Recently, the importance of user experience (UX) has been rapidly increasing. Its utilization is emphasized for development of systems, products, and services. User experience is widely used across industries including services, products, processes, society, and culture. Therefore, if it is unsatisfactory, it is likely to have a direct negative impact on the corresponding system, product, or service. The failure to analyze user experience causes significant damage to the project, which may lead to its failure or redevelopment; it is hence necessary to prioritize the verification of UX in the earliest stages of development. The requirements development stage, which is a preceding stage, is an appropriate stage for the verification of user experience because the identification of user needs is completed and prototypes can be implemented. In this paper, we proposed a systematic requirements development stage; it adds user experience verification activities to the requirements development stage, using the Honeycomb model, which is a widely used tool for verifying the overall UX. User experience verification was added to the existing requirements development activities, which consisted of three steps: model definition and requirements placement, discussions between external and internal stakeholders, and review by internal stakeholders. By easily validating the user experience through this systematic requirements development stage, we expect to minimize the damage to the project due to the failure of the user experience analysis and increase the possibility of success.

A Study on FRACAS-based Dependability Control Platform for Domestic Urban Railway Trains (국내 도시철도 차량을 위한 FRACAS 기반의 신인성 관리 플랫폼 연구)

  • Jang, Geon;Chung, Chang Woo;Shim, Dongha
    • Journal of Information Technology Services
    • /
    • v.19 no.3
    • /
    • pp.151-163
    • /
    • 2020
  • This paper describes a study on the FRACAS(Failure Reporting Analysis and Corrective Action System)-based dependability control platform for domestic urban railway trains. There are more demands for the verification of the dependability of trains as it becomes a regulation for train manufacturers to verify the dependability recently. Train manufacturers as well as railway operators need a effective FRACAS solution to perform the verification of the dependability. Yet current FRACAS solutions have limitations to support the verification processes effectively. This paper addresses the issues of current FRACAS solutions and suggests a FRACAS framework designed for the domestic urban railway trains. Service failure scenarios are standardized using the proposed availability model to implement a more user-friendly and reliable platform. A new FRACAS-based platform for the dependability control (SCARF®) has been developed to implement the suggested framework. The detail interfaces and functions of the platform are explained. The SCARF® platform is expected to engage the increasing demands for the dependability control successfully enhancing the reliability, maintainability, availability and safety of domestic urban railway trains eventually.

Accuracy Verification of the SBAS Tropospheric Delay Correction Model for the Korean Region (한반도 지역 SBAS 대류층 지연 보정 모델의 정확도 검증)

  • Kim, Dong-uk;Han, Deok-hwa;Kee, Chang-don;Lee, Chul-soo;Lee, Choong-hee
    • Journal of Advanced Navigation Technology
    • /
    • v.20 no.1
    • /
    • pp.23-28
    • /
    • 2016
  • In this paper, we verified accuracy of the satellite based augmentation system (SBAS) tropospheric delay correction model for the Korean region. We employed the precise data of the tropospheric zenith path delay (ZPD) which is provided by the international GNSS service (IGS). In addition, we compared the verification results with that of the Saastamoinen model and the Hopfield model. Consequently, the bias residual error of the SBAS tropospheric delay correction model is about 50 mm, whereas the Saastamoinen model and the Hopfield model are more accurate. This residual error by the tropospheric delay model can affect the SBAS user position accuracy, but there is no problem in SBAS accuracy requirement. If we modified the meteorological parameters for SBAS tropospheric model to appropriate in Korean weather environment, we can provide better SBAS service to the Korean user.