• Title/Summary/Keyword: origin authentication

Search Result 40, Processing Time 0.026 seconds

Molecular Authentication of Schisandrae Fructus and Analysis of Phylogenetic Relationship based on nrDNA-ITS sequences (nrDNA-ITS 분자마커를 이용한 오미자(五味子) 종 감별 및 기원분석 -ITS 염기서열을 이용한 오미자(五味子) 감별-)

  • Moon, Byeong-Cheol;Ji, Yun-Ui;Seo, Hyeong-Seok;Lee, A-Young;Chun, Jin-Mi;Kim, Ho-Kyoung
    • The Korea Journal of Herbology
    • /
    • v.25 no.4
    • /
    • pp.47-54
    • /
    • 2010
  • Objectives : The original plant species of Schisandrae Fructus (O-mi-ja) is prescribed as Schisandra chinensis $B_{AILL.}$, in Korea, but S. chinensis $B_{AILL.}$ and S. sphenanthera $R_{EHD.}$ et $W_{ILS.}$ in China. Moreover, fruit of several other species in genus Schisandra also have been used as the same herbal medicines. To develop a reliable method for correct identification of Schisandrae Fructus and to evaluate the phylogenetic relationship of S. chinensis and its related species, we analyzed internal transcribed spacer (ITS) sequences of nuclear ribosomal DNA (nrDNA). Methods : Twenty-four plant samples of three Schisandra species and one Kadsura species, S. chinensis $B_{AILL.}$, S. spenanthera $R_{EHD.}$ et $W_{ILS.}$, S. nigra $M_{ax.}$ and Kadsura japonica $D_{UNAL}$ were collected from each different native habitate and farm in Korea and China. The nrDNA-ITS region of each samples were amplified using ITS1 and ITS4 primer and nucleotide sequences were determined after sub-cloning into the pGEM-Teasy vector. Authentic marker nucleotides were estimated by the analysis of ClastalW based on the entire nrDNA-ITS sequence. Results : In comparative analysis of the nrDNA-ITS sequences, we found specific nucleotide sequences including indels (insertions and deletions) and substitutions to distinguish C. chinensis, S. spenanthera, S. nigra, and K. japonica. These sequence differences at corresponding positions are avaliable nucleotide markers to determine the botanical origin of O-mi-ja. Moreover, we evaluated the phylogenetic relationship of four plant species by the analysis of nrDNA-ITS sequences. Conclusions : These marker nucleotides would be useful to identify the official herbal medicines by the providing of definitive information that can identify each plant species and distinguish it from unauthentic adulterants for O-mi-ja.

Practical application of the Bar-HRM technology for utilization with the differentiation of the origin of specific medicinal plant species (약용식물의 기원 판별을 위한 Bar-HRM 분석기술의 응용)

  • Kim, Yun-Hee;Shin, Yong-Wook;Lee, Shin-Woo
    • Journal of Plant Biotechnology
    • /
    • v.45 no.1
    • /
    • pp.9-16
    • /
    • 2018
  • The advent of available DNA barcoding technology has been extensively adopted to assist in the reference to differentiate the origin of various medicinal plants species. However, this technology is still far behind the curve of technological advances to be applied in a practical manner in the market to authenticate the counterfeit components or detect the contamination in the admixtures of medicinal plant species. Recently, a high resolution melting curve analysis technique was combined with the procedure of DNA barcoding (Bar-HRM) to accomplish this purpose. In this review, we tried to summarize the current development and bottleneck of processing related to the Bar-HRM technology for the practical application of medicinal plant species' differentiation in a viable global market. Although several successful results have been reported, there are still many obstacles to be resolved, such as limited number of DNA barcodes and single nucleotide polymorphisms, in particular, only one DNA barcode, internal transcribed sequence (ITS) of ribosomal DNA has been reported in the available nuclear genome. In addition, too few cases have been reported about the identification of counterfeit or contamination with processed medicinal plant products, in particular specifically the case of technology based infusion, jam and jelly products and components in which it is noted that DNA can be thereby degraded during the processing of these products and components.

Internal Transcribed Spacer Barcoding DNA Region Coupled with High Resolution Melting Analysis for Authentication of Panax Species (DNA 바코딩과 고해상 융해곡선분석에 기반한 인삼속 식물의 종 판별)

  • Bang, Kyong Hwan;Kim, Young Chang;Lim, Ji Young;Kim, Jang Uk;Lee, Jung Woo;Kim, Dong Hwi;Kim, Kee Hong;Jo, Ick Hyun
    • Korean Journal of Medicinal Crop Science
    • /
    • v.23 no.6
    • /
    • pp.439-445
    • /
    • 2015
  • Background : Correct identification of Panax species is important to ensure food quality, safety, authenticity and health for consumers. This paper describes a high resolution melting (HRM) analysis based method using internal transcribed spacer (ITS) and 5.8S ribosomal DNA barcoding regions as target (Bar-HRM) to obtain barcoding information for the major Panax species and to identify the origin of ginseng plant. Methods and Results : A PCR-based approach, Bar-HRM was developed to discriminate among Panax species. In this study, the ITS1, ITS2, and 5.8S rDNA genes were targeted for testing, since these have been identified as suitable genes for use in the identification of Panax species. The HRM analysis generated cluster patterns that were specific and sensitive enough to detect small sequence differences among the tested Panax species. Conclusion : The results of this study show that the HRM curve analysis of the ITS regions and 5.8S rDNA sequences is a simple, quick, and reproducible method. It can simultaneously identify three Panax species and screen for variants. Thus, ITS1HRM and 5.8SHRM primer sets can be used to distinguish among Panax species.

Implementation of Secure E-Mail System based on lava (자바기반의 안전한 전자 메일 시스템 구현)

  • 이원구;김성준;이희규;조한진;이재광
    • Journal of Internet Computing and Services
    • /
    • v.2 no.3
    • /
    • pp.51-62
    • /
    • 2001
  • Recently, as computers and networks become popular, distributing information on the Internet is common In our daily life. also, the explosion of the Internet. of wireless digital communication and data exchange on Internet has rapidly changed the way we connect with other people. The e-mail has been commonly used by users as well recognizing It as the standard of manners among users on the Internet. In the past, e-mail has been the primary choice of exchanging Information, but secure mail is gaining popularity abroad and domestically because of their nature of providing security. That is. it has been used a variety of fields such as general mail and e-mail for advertisement. But, As the data transmitted on network can be easily opened or forged with simple operations. most of existing e-mail system don't have any security on the transmitted information. Thus. security mail system need to provide security including message encryption, content Integrity, message origin authentication, and non-repudiation. In this paper, we design implement secure mail system with non-repudiation service and encryption capability to provide services for certification of delivery and certification of content as well as the basic security services. API.

  • PDF

Design and Implementation of a Secure E-Mail System using Elliptic Curve Cryptosystem (타원곡선 암호 시스템을 이용한 보안 메일 시스템의 설계 및 구현)

  • Lee, Won-Goo;Kim, Sung-Jun;Lee, Hee-Gyu;Mun, Ki-Young;Lee, Jae-Kwang
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.4
    • /
    • pp.333-345
    • /
    • 2002
  • As computers and networks become popular, distributing information on the Internet is common in our daily life. Also, the explosion of the Internet, of wireless digital communication and data exchange on Internet has rapidly changed the way we connect with other people. But secure mail is gaining popularity abroad and domestically because of their nature of providing security. That is. It has been used a variety of fields such as general mail and e-mail for advertisement. But, As the data transmitted on network can be easily opened or forged with simple operations. Most of existing e-mail system don't have any security on the transmitted information. Thus, security mail system need to provide security including message encryption, content integrity, message origin authentication, and non-repudiation. In this paper, we design and implement secure mail system with secure key agreement algorithm, non-repudiation service, and encryption capability to provide services for certification of delivery and certification of content as well as the basic security services.

Implementation and Analysis Performance of CCM-UW based AES, ARIA Blockcipher for Underwater Environment (수중무선통신 환경에 적합한 AES, ARIA 블록암호 기반 CCM-UW 구현 및 성능 분석)

  • Lee, Jae-Hoon;Park, Minha;Yun, Nam-Yeol;Yi, Okyeon;Park, Soo-Hyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.115-118
    • /
    • 2014
  • Underwater Wireless Communication System can be useful for research of quality of water, ocean resources exploration, analysis ocean environment and so on. However, there exist security threats including data loss, data forgery, and another variety of security threats, because of characteristics of water, various geographical factors, intended attack, etc. To solve these problem, in this paper, we propose a CCM-UW mode of operation modified form of CCM mode of operation, providing data confidentiality, integrity, origin authentication and anti-attack prevent, for the Underwater Wireless Communication System. By implementing CCM-UW in MACA protocol(Underwater Wireless Communication MAC Protocol) and measuring speed of communication, we confirm the applicability of the security and analyze the communication environment impact.

  • PDF

An Implementation of the Security Service on Internet Mail System (인터넷 메일 시스템에서의 정보보호 서비스 구현)

  • 강명희;신효영;유황빈
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.7 no.2
    • /
    • pp.107-122
    • /
    • 1997
  • Most of the currently used electronic mail system has the threat of security such as illegal leak of message, forgery, uncertain identity, denial of sending and receiving, and so forth. The security for this system is not satisfied yet, thus we explore these problems. In this thesis, we implement the security services for internet mail system which cover the weakness for traditional mail system. This system provides not only security services which PEM and PGP provides (i.e message confidentiality, message integrity, originator authentication, non-repudiation of origin), but also message replay prevention. and non-denial of recipient using certification of contents. In addition, this system increases security of the digital signature by signing with signature block formatting on the creation of it. And it increases security of the digital enveloping by encrypting with encryption block formatting of message encryption key.

Authentication of Sesame Oil with Addition of Perilla Oil Using Electronic Nose Based on Mass Spectrometry (전자코-Mass spectrometry를 이용한 들기름이 혼합된 참기름의 판별 분석)

  • Son, Hee-Jin;Kang, Jin-Hee;Hong, Eun-Jeung;Lim, Chae-Lan;Choi, Jin-Young;Noh, Bong-Soo
    • Korean Journal of Food Science and Technology
    • /
    • v.41 no.6
    • /
    • pp.609-614
    • /
    • 2009
  • Sesame oil was sometimes replaced by mixed oil due to high price in Korean market. To find out authentic sesame oil, electronic nose (E-nose) based on mass spectrometer system was used. Sesame oil was blended with perilla oil at the ratio of 97:3, 94:6, 91:9, 88:12 and 85:15, respectively. Intensities of each fragment from sesame oil by E-nose based on MS were completely different from those of perilla oil. The obtained data was used for discriminant function analysis. For quantitative analysis, the partial least square algorithm was used. The added concentration of perilla oil to sesame oil was correlated with discriminant function first score (DF1) and second score (DF2). From this relationship it could be found out how much perilla oil added. DFA plot indicated a significant separation of pure sesame oil and pure perilla oil. The different geographical origin of sesame oil was used for blending with perilla oil were closed to that of sesame oil. Korean sesame oil mixture and Indian sesame oil one were well separated. And the correlation between mixing ratios and DF1 values was found at the ratio of 97:3, 91:9, and 85:15 (SE vs PE oil), respectively. But the added concentration of perilla oil to sesame oil was correlated with discriminant function first score (DF1). E-nose based on MS system could be used as an efficient method for purity of oil quality.

Construction of DNA Profile Data Base of Strawberry Cultivars Using Microsatellite Markers (Microsatellite 마커를 이용한 딸기 품종의 DNA Profile Database 구축)

  • Hong, Jee-Hwa;Choi, Keun-Jin;Kwon, Yong-Sham
    • Horticultural Science & Technology
    • /
    • v.32 no.6
    • /
    • pp.853-863
    • /
    • 2014
  • This study was carried out to construct a DNA profile database of 100 strawberry cultivars using microsatellite markers. Two hundred seventy four microsatellite primer pairs were screened with a set of 21 strawberry cultivars with different morphological traits. Twenty five primer pairs were selected because they produced reliable and reproducible fingerprints. These primer pairs were used to develop DNA profiles of 100 strawberry cultivars. Three to thirteen alleles were detected by each marker with an average of 7.50. The average polymorphism information content varied from 0.331 to 841 (average 0.706). Cluster analysis showed that the 100 cultivars were divided into 7 major groups reflecting geographic origin and pedigree information. Moreover, most of the cultivars could be discriminated by marker genotypes. These markers will be useful as a tool for the protection of plant breeders' intellectual property rights in addition to providing the means to intervene seed disputes relating to variety authentication.

Consurmer's Recognition for the Label System and Policy of Environment-Friendly Agricultural Products (친환경 농산물의 인증제도 및 정책에 대한 소비자 인지도 조사연구)

  • Sin, Chul-Ro;Kim, Jin-Suk
    • Journal of agriculture & life science
    • /
    • v.43 no.3
    • /
    • pp.63-75
    • /
    • 2009
  • The purpose of this study is to find out suggestions for government policy and expansion of consumption of environmental-friendly agricultural products(EFAP). For this purpose, we did research on purchasing pattern of EFAP and understanding of government environmental-friendly agricultural policy. First, the purchase of EFAP has been increased, because EFAP is safer. Consumers prefer department store because it is easier than any other marketing. Difficulties which consumers are facing when they purchase EFAP are price and credibility and small number of stores. Most favorable item is vegetable and the price of rice which consumers are willing to pay is really high. Second, not many consumers do recognize the label and system of EFAP. Third, most famous authentication institution agricultural products quality management service and other institutions are not recognized. Consumers recognize the certificate of origin. The government policy for safe food consumption is to intensify government supervision on foods. Suggestions from these results are as follow: First, the urgent problem to expand consumption of EFAP is credibility of EFAP. To make consumers trust EFAP, these are considered as useful solutions, i.e. recall, quality management service, standardization, and better quality. Second, government should be continue public relation, education and supervision of EFAP. Third, quality management should be continued. Not only central government but also local quality management institutions should continue quality management service. Last, local government should help farmers of EFAP to solve the difficulties of marketing.