• Title/Summary/Keyword: rapid authentication

Search Result 102, Processing Time 0.024 seconds

Prospects For The Development Of Distance Educational Learning Technologies During The Training Of Students Of Higher Education

  • Rohach, Oksana;Pryhalinska, Tetiana;Kvasnytsya, Iryna;Pohorielov, Mykhailo;Rudnichenko, Mykola;Lastochkina, Olena
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.9
    • /
    • pp.353-357
    • /
    • 2022
  • This article identifies the problems and substantiates the directions for the development of distance learning technologies in the training of personnel. An example of using digital media to create a remote access laboratory is given. The article is devoted to the definition of the main aspects of the organization of distance education. Rapid digitization, economic, political and social changes taking place in Ukraine necessitate the reform of the education system. First of all, it concerns meeting the educational needs of citizens throughout their lives, providing access to educational and professional training for all who have the necessary abilities and adequate training. The most effective solution to the above-mentioned problems is facilitated by distance learning. The article analyzes the essence and methods of distance learning organization, reveals the features of the use of electronic platforms for the organization of this form of education in different countries of the world. The positive characteristics of distance learning are identified, namely: extraterritoriality; savings on transport costs; the interest of modern youth in the use of information tools in everyday life; increase in the number of students; simplicity and accessibility of training; convenient consultation system; democratic relations between the student and the teacher; convenience for organizations in training their employees without interrupting their regular work; low level of payment for distance education compared to traditional education; individual learning pace; new teacher status. Among the negative features of online education, the author refers to the following problems: authentication of users during knowledge verification, calculation of the teacher's methodological load and copyright of educational materials; the high labor intensity of developing high-quality educational content and the high cost of distance learning equipment; the need to provide users with a personal computer and access to the Internet; the need to find and use effective motivation mechanisms for education seekers.

A Study on the Design of System Access Control Software For the Improvement of the Stability and Survivability of Naval Combat Management System

  • Jong-Hyeon Im
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.12
    • /
    • pp.137-145
    • /
    • 2023
  • In this paper, we propose system access control software that improves the survivability of the naval combat system while maintaining security and stability. The software was improved by improving the operating environment configuration and user authentication process of the system access control software that constitutes the naval combat system, defining the operating environment classification of the naval combat system, and applying a software parallel execution process considering the load rate. Through this, the waiting time required to configure the environment is shortened, providing rapid operation to the operator, and improving the fact that the naval combat system cannot be operated unless the environment configuration is completed even in emergency situations. In order to test the performance, a test environment was created by simulating the existing naval combat system, and the execution time for each operation category was measured and compared. Compared to the existing naval combat system, the execution time of the basic combat system was reduced by about 69.3%, the execution time of the combat system was reduced by about 54.9%, and the execution time of the integrated combat system was confirmed to be reduced by about 8.4%.

A Case Study on the Protection of Accounts and Assets on Cryptocurrency Exchanges: Focusing on the Processes of Related Institutions (가상통화거래소의 계정 및 자산 보호에 관한 사례연구: 유관기관의 프로세스를 중심으로)

  • Yoonjoo Lee;Dongwon Lee;Ingoo Han
    • Information Systems Review
    • /
    • v.22 no.4
    • /
    • pp.135-161
    • /
    • 2020
  • With the growth of blockchain and cryptocurrency-related markets, cryptocurrency exchanges are growing as a new industry. However, as the legal and regulatory definitions of cryptocurrencies are still in progress, unlike existing industrial groups, they are not under the supervision of regulatory agencies. As a result, users (i.e., cryptocurrency investors) have suffered two types of damage that could occur from hacking and other accidents on the exchanges. One type of the damage is the loss of assets caused by the extortion of personal information or account and the other is the damage from users who might be involved in external frauds. Both are analyzed in comparison with existing operators whose functions are like the exchanges. The results of this study show that membership (KYC: Know Your Client), log-in, and additional authentication in transactions are on the similar level to those of the operators while the fraud detection system (FDS) and anti-money laundering (AML) of fiat currencies and cryptocurrencies need rapid improvement.

Development of ITS sequence based SCAR marker and multiplex-SCAR assay for the rapid authentication of Tetrapanacis Medulla and Akebiae Caulis (통초(通草), 목통(木通) 신속 감별용 ITS 염기서열 기반 SCAR 마커 및 Multiplex-SCAR 분석법 개발)

  • Noh, Pureum;Kim, Wook Jin;Park, Inkyu;Yang, Sungyu;Choi, Goya;Moon, Byeong Cheol
    • The Korea Journal of Herbology
    • /
    • v.36 no.1
    • /
    • pp.9-17
    • /
    • 2021
  • Objectives : Tetrapanacis Medulla and Akebiae Caulis are one of the most frequently adulterated herbal medicines because of their confusability of terms in the ancient writings and the similarity of morphological features of dried herbal products. The major adulterant is Aristolochia manshuriensis (Guanmutong) which has a serious safety concern with its toxicity. To ensure the safety and quality of the two herbal medicines, it is necessary to discriminate the toxic adulterant from authentic species. The aim of this study is to develop SCAR markers and to establish the multiplex-SCAR assay for discrimination of four plant species related to Tetrapanacis Medulla and Akebiae Caulis. Methods : ITS regions of fifteen samples of four species (Tetrapanax papyrifer, Fatsia japonica, Aristolochia manshuriensis, and Akebia quinata) collected from different sites were amplified and sequenced. Fifteen obtained ITS sequences were aligned and analysed for the detection of species-specific sequence variations. The SCAR markers were designed based on the sequence alignments and then, multiplex-SCAR assay enhancing rapidity was optimized. Results : ITS sequences clearly distinguished the four species at the species level. The developed SCAR markers and multiplex-SCAR assay were successfully discriminated four species and detected the adulteration of commercial product samples by comparison of the amplified DNA fragment sizes. Conclusions : These SCAR markers and multiplex-SCAR assay are a rapid, simple, and reliable method to identify the authentic Tetrapanacis Medulla and Akebiae Caulis from adulterants. These genetic tools will be useful to ensure the safety and to standardize the quality of the two herbal medicines.

Development SCAR marker for the rapid authenticaton of Batryticatus Bombyx based on COI Sequences (COI 염기서열 기반 백강잠 신속 감별용 SCAR marker 개발 - 백강잠 유전자 감별 -)

  • Kim, Wook Jin;Yang, Sungyu;Noh, Pureum;Park, Inkyu;Choi, Goya;Song, Jun-Ho;Moon, Byeong Cheol
    • The Korea Journal of Herbology
    • /
    • v.34 no.5
    • /
    • pp.13-20
    • /
    • 2019
  • Objectives : To ensure the safety, quality and pharmacological efficacy of Batryticatus Bombyx, it is important to discriminate with adulterants. In Korean Herbal Pharmacopoeias (KHP), the authentic species of Batryticatus Bombyx is defined only Bombyx mori. Therefore, the aim of this study is establishment of PCR assay method using the sequence characterized amplified region (SCAR) marker based on COI DNA barcode for discriminating six species related to Batryticatus Bombyx. Methods : Seventeen samples of six species (Bombyx mori, Bombyx mandarina, Rhodinia fugax, Oberthueria caeca, Actias artemis, and Caligula japponica) were collected from different habitate and nucleotide sequences of cytochrome c oxidase subunit I(COI) barcode regions were analyzed by Sanger sequencing methods. To develop SCAR-based PCR assay method, we designed species-specific primers based on COI sequence variabilities and verified those specificities using 17 samples of six species as well as commercial herbal medicines. Results : In comparative multiple analysis of COI sequences, six species were distinguished by species-specific nucleotides at the species level. To develop rapid and reliable PCR assay method for genetic authentication of Batryticatus Bombyx, therefore, we designed species-specific SCAR primers based on these nucleotide sequences and confirmed those specificities. Using these SCAR primers, We also established simple conventional PCR assay method using these SCAR primers at the species level. Conclusions : The comparative analysis of COI sequences and SCAR-based PCR assay methods represented equal results for distinguishing authentic Batryticatus Bombyx and adulterations at the species level. Therefore, our results are expected protecting adulteration of herbal medicine Batryticatus Bombyx.

An analysis on invasion threat and a study on countermeasures for Smart Car (스마트카 정보보안 침해위협 분석 및 대응방안 연구)

  • Lee, Myong-Yeal;Park, Jae-Pyo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.3
    • /
    • pp.374-380
    • /
    • 2017
  • The Internet of Things (IoT) refers to intelligent technologies and services that connect all things to the internet so they can interactively communicate with people, other things, and other systems. The development of the IoT environment accompanies advances in network protocols applicable to more lightweight and intelligent sensors, and lightweight and diverse environments. The development of those elemental technologies is promoting the rapid progress in smart car environments that provide safety features and user convenience. These developments in smart car services will bring a positive effect, but can also lead to a catastrophe for a person's life if security issues with the services are not resolved. Although smart cars have various features with different types of communications functions to control the vehicles under the existing platforms, insecure features and functions may bring various security threats, such as bypassing authentication, malfunctions through illegitimate control of the vehicle via data forgery, and leaking of private information. In this paper, we look at types of smart car services in the IoT, deriving the security threats from smart car services based on various scenarios, suggesting countermeasures against them, and we finally propose a safe smart car application plan.

A Study on Big Data Based Non-Face-to-Face Identity Proofing Technology (빅데이터 기반 비대면 본인확인 기술에 대한 연구)

  • Jung, Kwansoo;Yeom, Hee Gyun;Choi, Daeseon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.10
    • /
    • pp.421-428
    • /
    • 2017
  • The need for various approaches to non-face-to-face identification technology for registering and authenticating users online is being required because of the growth of online financial services and the rapid development of financial technology. In general, non-face-to-face approaches can be exposed to a greater number of threats than face-to-face approaches. Therefore, identification policies and technologies to verify users by using various factors and channels are being studied in order to complement the risks and to be more reliable non-face-to-face identification methods. One of these new approaches is to collect and verify a large number of personal information of user. Therefore, we propose a big-data based non-face-to-face Identity Proofing method that verifies identity on online based on various and large amount of information of user. The proposed method also provides an identification information management scheme that collects and verifies only the user information required for the identity verification level required by the service. In addition, we propose an identity information sharing model that can provide the information to other service providers so that user can reuse verified identity information. Finally, we prove by implementing a system that verifies and manages only the identity assurance level required by the service through the enhanced user verification in the non-face-to-face identity proofing process.

Comparative Analysis of Local Green Tea in Korea by STS-RFLP (STS-RFLP법을 이용한 국내지역 재배녹차의 비교분석)

  • Cho, Kiu-Hyung;Jo, Aruna;Tsuge, Tomohiko;Kim, Jong-Cheol;Kim, Ru-Mi;Yoon, Ho-Sung;Kim, Gyung-Tae
    • Journal of Life Science
    • /
    • v.20 no.9
    • /
    • pp.1415-1419
    • /
    • 2010
  • Consumption of green tea has increased along with increasing concern regarding healthier lifestyles, and many brands of green tea are sold with a label indicating the region of Korea in which the tea was produced. However, there is little information on identifying the difference between the green tea cultivars according to the region they were grown. Here, 9 green tea cultivars collected from Hadong region, Bosung region, China and Japan were subjected to the STS-RFLP analysis. Using the coding and noncoding DNA regions of genes related to the phenylpropanoid pathway, such as phenylalanine ammonia-lyase, chalcone synthase and dihydroflavonol 4-reductase, we have identified the differences between green tea cultivars according to the region they were grown in. In this study, we showed a STS-RFLP method of green tea analysis which easily distinguished different kinds of tea using the primers as described. In addition, we identified that the green tea cultivars from Hadong and Bosung displayed a different profile when PAL intron was digested with Dde I, suggesting that a rapid authentication system for green tea cultivars grown in different regions in Korea is available.

Fintech Trends and Mobile Payment Service Anlaysis in Korea: Application of Text Mining Techniques (국내 핀테크 동향 및 모바일 결제 서비스 분석: 텍스트 마이닝 기법 활용)

  • An, JungKook;Lee, So-Hyun;An, Eun-Hee;Kim, Hee-Woong
    • Informatization Policy
    • /
    • v.23 no.3
    • /
    • pp.26-42
    • /
    • 2016
  • Recently, with the rapid growth of the O2O market, Fintech combining the finance and ICT technology is drawing attention as innovation to lead "O2O of finance", along with Fintech-based payment, authentication, security technology and related services. For new technology industries such as Fintech, technical sources, related systems and regulations are important but previous studies on Fintech lack in-depth research about systems and technological trends of the domestic Fintech industry. Therefore, this study aims to analyze domestic Fintech trends and find the insights for the direction of technology and systems of the future domestic Fintech industry by comparing Kakao Pay and Samsung Pay, the two domestic representative mobile payment services. By conducting a complete enumeration survey about the tweets mentioning Fintech until June 2016, this study visualized topics extraction, sensitivity analysis and keyword analyses. According to the analysis results, it was found that various topics have been created in the technologies and systems between 2014 and 2016 and different keywords and reactions were extracted between topics of Samsung Pay based on "devices" such as Galaxy and Kakao Pay based on "service" such as KakaoTalk. This study contributes to analyzing the unstructured data of social media by period by using social media mining and quantifying the expectations and reactions of consumers to services through the sentiment analysis. It is expected to be the foundation of Fintech industry development by presenting a strategic direction to Fintech related practitioners.

Analysis of IoT Open-Platform Cryptographic Technology and Security Requirements (IoT 오픈 플랫폼 암호기술 현황 및 보안 요구사항 분석)

  • Choi, Jung-In;Oh, Yoon-Seok;Kim, Do-won;Choi, Eun Young;Seo, Seung-Hyun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.7
    • /
    • pp.183-194
    • /
    • 2018
  • With the rapid development of IoT(Internet of Things) technology, various convenient services such as smart home and smart city have been realized. However, IoT devices in unmanned environments are exposed to various security threats including eavesdropping and data forgery, information leakage due to unauthorized access. To build a secure IoT environment, it is necessary to use proper cryptographic technologies to IoT devices. But, it is impossible to apply the technologies applied in the existing IT environment, due to the limited resources of the IoT devices. In this paper, we survey the classification of IoT devices according to the performance and analyze the security requirements for IoT devices. Also we survey and analyze the use of cryptographic technologies in the current status of IoT open standard platform such as AllJoyn, oneM2M, IoTivity. Based on the research of cryptographic usage, we examine whether each platform satisfies security requirements. Each IoT open platform provides cryptographic technology for supporting security services such as confidentiality, integrity, authentication an authorization. However, resource constrained IoT devices such as blood pressure monitoring sensors are difficult to apply existing cryptographic techniques. Thus, it is necessary to study cryptographic technologies for power-limited and resource constrained IoT devices in unattended environments.