• Title/Summary/Keyword: electronic ID

Search Result 194, Processing Time 0.031 seconds

A Tx-Rx Beam Tracking Technique for Cellular Communication Systems with a mmWave Link (밀리미터 웨이브 링크를 갖는 셀룰러 통신 시스템을 위한 송·수신 빔 추적 기법)

  • Kim, Kyu Seok;Lim, Tae Sung;Choi, Joo Hyung;Cho, Yong Soo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.12
    • /
    • pp.1327-1337
    • /
    • 2014
  • In cellular communication systems employing millimeter wave (mmWave) bands for a link, a large amount of training time and network resources will be required to find a serving BS with the best transmit and receive (Tx-Rx) beam pair if downlink control signals are used. In this paper, a tracking technique for OFDM-based cellular communication systems with a mmWave link, where an analog beamforer is used at the mobile station (MS) and a digital beamformer is used at the BS, is proposed using an uplink signal. A technique to select a serving BS with the best beam pair is described using the uplink preamble sequence based on Zadoff-Chu sequence and a metrics which can be used to identify parameters such as beam ID (BID), MS ID (MID), and direction-of-arrival (DoA). The effectiveness of the proposed technique is verified via simulation with the spatial channel model (SCM) for a moving MS in mmWave cellular systems.

U-helathcare system using the Electronic IDentity Purse (전자ID지갑을 이용한 U-healthcare 시스템)

  • Shin, Seon-hee;Lee, Young-Gu;Kim, Hyun-Chul;Jun, Moon-seog
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.04a
    • /
    • pp.772-775
    • /
    • 2009
  • 최근 유비쿼터스 시대에는 사용자의 편의성과 보안을 위주로 한 시스템들이 등장하고 있다. 병원에서는 컴퓨터를 이용하여 차팅을 하는 EMR 시스템을 도입하여 병원 내에서의 사용자 정보의 공유가 쉽게 이루어지고 있다. 사용자 중심의 전자ID지갑은 하나의 ID로 여러 사이트의 가입과 정보공유를 할 수 있다는 편리성과 개인정보보호 서버로 인한 피싱과 파밍으로부터 안전하다는 보안성을 지니고 있다. 이에 사용자는 전자ID지갑의 기능을 EMR시스템과 연동하여, 사용하는 측과 사용 받는 측 모두 효율적인 관리를 할 수 있는 기술이 필요하다. 본 논문에서는 이러한 전자ID지갑과 U-healthcare 시스템의 기능을 이용하여 사용자가 효율적인 서비스를 받기 위한 시스템과 보안관련 사항을 제안한다.

A Study of the Elements Analysis of Metadata for Electronic Resource Management (전자자원 관리용 메타데이터의 요소 분석에 관한 연구)

  • Nam, Young-Joon;Jang, Bo-Seong
    • Journal of the Korean Society for information Management
    • /
    • v.23 no.3 s.61
    • /
    • pp.241-264
    • /
    • 2006
  • This study suggested indispensable elements of metadata for electronic resource management and effectively manage of electronic resource in library. Therefore, this research analyzed into the data elements of DLF ERMI's ERMS data structure, foreign three universities. The Data elements are verified by domestic ERM specialist. As the result, trial categories are 12 elements, consortium categories are 15 elements, license categories are 33 elements, electronic resource information categories are 21 elements, access/administrative information categories are 20 elements, usage statistics categories are 13 elements, workflow categories are 14 elements, contact information categories are 18 elements.

Design of an Authentication System Based on Personal Identity Verification Card (전자신분증 기반의 개인 신분확인을 위한 인증시스템 설계)

  • Park, Young-Ho;Kong, Byung-Un;Rhee, Kyung-Hyune
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.8
    • /
    • pp.1029-1040
    • /
    • 2011
  • Electronic identity (e-ID) card based on smartcard is a representative identity credential for on-line and off-line personal identification. The e-ID card can store the personal identity information securely, so that the information can be accessed fast, automated identity verification and used to determine the cardholder's authorization to access protected resources. Due to such features of an e-ID card, the number of government organizations and corporate enterprises that consider using e-ID card for identity management is increasing. In this paper, we present an authentication framework for access control system using e-ID cards by discussing the threat environment and security requirement against e-ID card. Specifically, to accomplish our purpose, we consider the Personal Identity Verification system as our target model.

PayWord System using ID-based tripartite Key Agreement Protocol (ID 기반 키동의 프로토콜을 이용한 PayWord 시스템)

  • 이현주;이충세
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.2C
    • /
    • pp.348-353
    • /
    • 2004
  • Development of an efficient and secure payment system is prerequisite for the construction of electronic payment mechanism in mobile environment. Since current PayWord protocol system generates vendor's certificate for each transaction, it requires lot of operation for transaction. In this paper, we use a session key generated by ID-based tripartite Key agreement protocol which use an Elliptic Curve Cryptosystem over finite field $F_{q}$ for transactions. Therefore, our protocol reduces algorithm operations. In particular, proposed protocol using ID-based public key cryptosystem has the advantages over the existing systems in speed and it is more secure in Man-in-the-middle attacks and Forward secrecy.

Secure ID-based Strong Designated Verifier Signature Scheme Against Key-compromise Attack (키 노출 공격에 안전한 ID-기반의 강한 지정된 검증자 서명 기법)

  • Lee, Ji-Seon;Chang, Jik-Hyun;Lee, Dong-Hoon
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.10
    • /
    • pp.59-66
    • /
    • 2009
  • A strong designated verifier signature scheme is a special type of signature scheme which provides signer anonymity by enabling the specified recipient, called a designated verifier, to simulate a signature which is indistinguishable from the signer's signature. It has many applications such as software distribution or electronic voting. In this paper, we consider two important security properties of strong designated verifier signature scheme - source hiding and security against key-compromise attack. We show that the two properties cannot be achieved at the same time. Finally, we present a new ID-based strong designated verifier signature scheme which is secure against key-compromise attack.

A Study of the Damage and the Countermeasure by Identification Card Loss (신분증 분실에 따른 피해 및 대응책에 관한 연구)

  • Lee, Younggyo;Ahn, Jeonghee
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.3
    • /
    • pp.53-64
    • /
    • 2017
  • Korean Identification card or driver license is usually used to verify one's identity in Korea. These are also used as an adult certification. Since the form of these ID card is an analog and it needs to be checked with naked eyes, it might be used maliciously. Someone who's got someone else's ID card can do other things. Therefore, it must be reported rapidly when ID card is lost or stolen. The most serious problem might be occurred when they do not recognize and report the loss. They might suffer from pecuniary or mental damage such as opening a mobile phone service, providing loan or credit card, opening a personal checking account, etc. Thus, this study suggests and compares the ways of avoiding these problems. First, the most effective way is to send the authorization code via mobile phones in consideration of build-up period and cost. The person in charge of business processing department using ID card sends the authorization code via registered mobile phone. The owners submits it to the person and their identifications are confirmed. Next effective way is that the person in charge of business processing department using ID card sends text messages via registered mobile phone. Lastly, the most ineffective way is to introduce and implement the electronic ID card ultimately even though it is expensive and takes a long time to build up the system.

Construction of Hyperledger Fabric based Decentralized ID System (하이퍼레저 패브릭 기반 탈중앙화 신원 인증 시스템 구축)

  • Kwang-Man Ko
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.17 no.1
    • /
    • pp.47-52
    • /
    • 2024
  • Through the coronavirus pandemic, research on the use and advancement of blockchain-based decentralized identity authentication (Decentralized ID) technology is being actively conducted in various fields, centered on the central government, local governments, and private businesses. In this paper, we introduce the results of development based on Hyperledger Fabric to change the existing central server-based identity authentication to a decentralized one. These development results can strengthen the security and transparency of identity authentication systems for commercial purposes and provide stable services for user ID issuance, inquiry, and disposal. In addition, the decentralized identity authentication system verified performance results of DID creation of 262,000 rps and DID inquiry of 1,850 rps, DID VP creation of 200 rps, and DID VP inquiry of 220 rps or less through public authentication.

A Study on Preprocessing Improvement Method for Face Recognition

  • Lim, Yang-Koo;Chae, Duck-Jae;Rhee, Sang-Bum
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.1782-1787
    • /
    • 2003
  • A face recognition is currently the field which many research have been processed actively. But many problems must be solved the previous problem. First, We must recognize the face of the object taking a location various lighting change and change of the camera into account. In this paper, we proposed that new method to find feature within fast and correct computation time after scanning PC camera and ID card picture. It converted RGB color space to YUV. A face skin color extracts which equalize a histogram of Y ingredient without the Luminance. After, the method use V' ingredient which transforms V ingredient of YUV and then find the face feature. The result of the experiment shows getting correct input face image from ID Card picture and camera.

  • PDF