• Title/Summary/Keyword: personal development

Search Result 2,895, Processing Time 0.027 seconds

Technical Architecture for Implementation and Adoption of Database Encryption Solution (데이터베이스 암호화 솔루션 구현 및 도입을 위한 기술적 아키텍처)

  • Lee, Byoung-Yup;Lim, Jongtae;Yoo, Jaesoo
    • The Journal of the Korea Contents Association
    • /
    • v.14 no.6
    • /
    • pp.1-10
    • /
    • 2014
  • Through the development of internet mobile devices and online business activation, sensitive data of unspecified user is being easily exposed. In such an open business environment, the outflow of sensitive personal information has often been remarked on recently for which adoption of encryption solution for database became top priority in terms of importance. In 2011, government also legislated for the protection of personal information as an information network law, and is now applying the law to a variety of industries. Firms began to comply with these regulations by establishing various measures for protection of personal information and are now quickly introducing encryption solution to reinforce security of personal information they are managing. In this paper, I present architecture and technological parts that should be considered when introducing security solution.

An Implementation of Smart Card Identification System Using 1 vs. 1 Fingerprint Matching (1대1 지문매칭을 이용한 스마트 카드 인증 시스템의 구현)

  • 최순우;김영길
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.5 no.7
    • /
    • pp.1204-1209
    • /
    • 2001
  • According to the rapid development of information and communication, various services are offered using information and communication infrastructure for example e-commerce, internet banking, stock dealings, etc. This time, the most important problem is personal identification. But now secret number that is used to personal identification mostly can be misappropriated. To solve this problem, this paper proposes smart card identification system using 1 vs. 1 fingerprint matching. Information protection and security of smart card excel and use is convenient. And fingerprint becomes the focus of public attention in biometric field. Implemented system in this paper is based on PC. This system stores minutia that is fingerprint information into smart card and compare it with personal minutia. Therefore this system is sure to be on personal identification. If this system is applied to various services, safety degree of services will be enhanced.

  • PDF

Development of a Personal Robot Considering Standardization

  • Choi, Moo-Sung;Yang, Kwang-Woong;Won, Dae-Heui;Park, Joon-Woo;Park, Sang-Duk;Lee, Ho-Gil
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.2243-2247
    • /
    • 2005
  • If a personal robot is popularized like a personal computer in the future, many kinds of robots will appear and the number of manufacturers will increase as a matter of course. In such circumstances, it can be inefficient, in case each manufacturer makes a whole platform individually. The solutions for this problem are to modularize a robot component (hardware and software) functionally and to standardize each module. Each module is developed and sold by each special maker and an end-product company purchases desired modules and integrates them. The standardization of a module includes the unification of the electrical, mechanical and software interface. In this paper, a few prototypes developed based on the concept of this study are introduced and possibility which can be standard platform is verified. Each prototype has merits and demerits, and a new structure of the hardware platform considered them is proposed Also the software architecture to develop the standardized and modularized platform is introduced and its detailed structure is described. The name of a method and the way to use that are defined dependently on the standard interfaces in order to use a module in other modules. Each module consists of a distributed object and that can be implemented in the random programming language and platform. It is necessary to study on the standardization of a personal robot after this steadily.

  • PDF

The Application for the Protection System of Location-based Information on a Smart-phone Environment (스마트폰 환경에서 개인위치정보 보호시스템 응용방안)

  • Kim, In-Jai;Choi, Jae-Won;Kim, Woon-Yoeng
    • The Journal of Society for e-Business Studies
    • /
    • v.17 no.3
    • /
    • pp.129-147
    • /
    • 2012
  • In this paper, we research on the personal information protection system in smart-phone based on mobile environment. This paper proposes the enhanced personal location privacy mechanism in location-based service environment of a smart phone operating system(iOS, Android) for the relevant regulations on location-based protection and utilization. Also, the result verified that possibility on a self-control mechanism of the personal information protection system's subject in the window platform throughout the experiment. Therefore, this study have drew a method that user positively can cope with a protection of personal location information by having a user's self-control method in the system under development or done by illegal location-based service providers and illegal application developer.

Development of a Management Tool of CCD/CCR-centric Standard Clinical Document (CCD/CCR 중심의 표준진료문서 관리 도구의 개발)

  • Lee, In-Keun;Cho, Hune;Kim, Hwa-Sun
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.22 no.4
    • /
    • pp.507-514
    • /
    • 2012
  • XML-based standards such as CCD(Continuity of Care Document) and CCR(Continuity of Care Record) have been developed for representation, integration, and exchange of personal health record(PHR), and various of researches on PHR based on the standards have been conducted. These researches have developed and used CCD/CCR parsers each with their own different ways, but it can be hard to develop and update the parsers because of the structural complexity of the standards. Moreover, inter-exchange between CCD and CCR documents in the PHR-related medical information systems should be possible for the interoperability of the systems. Therefore, we proposed a designing method to develop the tools treating XML-based CCD/CCR documents. And we implemented CCD/CCR parser based on the proposed method and developed a converter from CCD to CCR using the parsers. To confirm the usefulness of the developed tool, we performed an experiment of creating CCD documents using the personal health data gathered from chronically ill patients in Kyungpook National University Hospital and of converting from the CCD documents to CCR documents.

The Status of the Korean Image Consulting Industry, and Related Education Programs (국내의 이미지 컨설팅 산업과 교육 현황)

  • Chung, Su-In;Shin, Sae-Young;Kim, Yoo-Jung;Kim, Young-In
    • Journal of the Korean Society of Costume
    • /
    • v.61 no.2
    • /
    • pp.47-59
    • /
    • 2011
  • This study provides a systematic investigation about objective personal image consulting, tool development and image-making research by analyzing the status of the Korean image-consulting industry and education. For the research, we carried out literature surveys of books on image consulting and previous research reports. In particular, we surveyed image consulting businesses that have internet web sites, and educational institutes. The results of the survey are as follows: First, domestic image consulting businesses in Korea are investigated about 93 private companies and 4 associations. They do the image making, color consulting, and education for individuals and business. Second, professional image consulting education is carried out not only in the 93 private companies, but also in the continuing and professional studies for adults of 10 universities. Furthermore, more then 90 universities have specific academic programs related to the image consulting such as facial management, beauty coordination, cosmetology, stylists, fashion events, broadcasting stylists, and so on. Third, a typical image consulting job is the personal shoppers who assists VIP customers in department stores. Professionals and politicians have personal fashion stylists for their image making. Today, the job has expanded to public fashion therapist. Fourth, the contents of an image consulting education have appeared in similar industries and educations. These contents include fashion styles, personal color analysis, make-up, facial expressions, gestures, perfumes, accessories, etc. This study is based on research on the current Korean image-consulting industry, and will enable follow-up details to be implemented. using the basis of this study for a strategic self-image formation system.

Design of an USB Security Framework for Double Use Detection (이중사용 방지를 위한 USB 보안 프레임워크의 설계)

  • Jeong, Yoon-Su;Lee, Sang-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.4
    • /
    • pp.93-99
    • /
    • 2011
  • Recently, the development of internet technology makes user's personal data used by being saved in USB. But there is a critical issue that personal data can be exposed with malicious purpose because that personal data doesn't need to be certificate to use. This paper proposes USB security framework to prevent a duplicate use of personal data for protecting the data which in USB. The proposed USB security framework performs certification process of user with additional 4bite of user's identification data and usage choice of USB security token before certification data when the framework uses USB security product in different network. It makes communication overhead and service delay increased. As a result of the experiment, packet certification delay time is more increased by average 7.6% in the proposed USB security framework than simple USB driver and USB Token, and procedure rate of certification server on the number of USB is also increased by average 9.8%.

Materialize the Checklist through Type of Classification analysis for the Regulatory Compliance and Database Encryption, Access Control (데이터베이스 규제 준수, 암호화, 접근제어 유형 분류에 따른 체크리스트 구현)

  • Lee, Byoung-Yup;Park, Jun-Ho;Kim, Mi-Kyoung;Yoo, Jae-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.2
    • /
    • pp.61-68
    • /
    • 2011
  • Due to the rapid development of the Internet, many companies in a variety of applications to users open an unspecified number of the current business environment, security of personal information about recent issues are often mentioned in terms of its importance may be the company's top priority. The government recently on personal information strengthening measures on information communications network law enacted into law which is applicable to various industries. Companies to protect the personal information of various measures to comply with these regulations, and arrange your personal information for internal management to enhance security fast security solution has been introduced. The number of used data is stored in the DBMS in terms of compliance with these regulations at the same time effectively to ensure data security and encryption measures, access control, audit, each separated by an implementation of the solution and how it compares with the best Database security plan allows you to explore as a this paper's security checklist.

Development of Moving Objects Monitoring and Transforming Personal Robot System Based on Remote Controls (원격제어기반 이동체 감지 및 변형 퍼스널 로봇시스템 설계 및 구현)

  • Lee, Dong-Myung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.1
    • /
    • pp.159-165
    • /
    • 2010
  • The moving object monitoring and transforming personal robot system based on remote controls is designed and implemented, and the performance of the system is analyzed in this paper. The major considering factors in the system design are such as 1) the control scheme design (button based and the remote control schemes); 2) the operation modes design (wheel driving mode/pedestrian mode/auto driving mode/observation mode); 3) the remote control function design; 4) the design of the monitoring function of the changes in neighbor environments; 5) the design of the detection of obstruction. From the experiments, it is assured that the developed personal robot can walk to the grounds that covered with doorsill or electric wires in indoors by control the leg articulations, and can escape from the obstruction using three infrared sensors in the 30cm*30cm obstruction styled space under the auto driving mode.

Considering on De-Identification Method of Personal Information for National Medical Institute by using correlation (상관도를 이용한 국내 의료기관용 개인정보 비식별화 방안에 관한 연구)

  • Yeo, Kwang Soo;Kim, Chul Jung;Lee, Jae Hyun;Kim, Soon Seok
    • Smart Media Journal
    • /
    • v.5 no.4
    • /
    • pp.83-89
    • /
    • 2016
  • Guidelines for protecting personal information are already in progress in USA, UK and other countries and announced many guideline like HIPPA. However In Our national environment, we does not have specialized guideline in national medical industries. This thesis suggest De-indentification method in South Korea by referring 'bigdata De-identification Guideline by Ministry of Science, ICT and Future Planning (2015)', ICO in U. K and IHE, NIST, HIPPA in U. S. A. We suggest also correlation between Guidelines. Corelation means common techniques in three guidelines (IHE, NIST, HIPPA in U. S. A). As Point becomes closer five points, We recommend that technique to national medical institute for De-Identification. We hope this thesis makes the best use of personal information's development in National medical institute.