• Title/Summary/Keyword: real name verification

Search Result 18, Processing Time 0.026 seconds

Advanced Mandatory Authentication Architecture Designed for Internet Bank (인터넷은행을 위한 개선된 본인확인 구조)

  • Hong, Ki-seok;Lee, Kyung-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.6
    • /
    • pp.1503-1514
    • /
    • 2015
  • Non-face-to-face real name verification policy that financial authorities announced, in order to secure a face-to-face or more of accuracy, are in principle of multi check. The business model and legal entities of Internet banks is different from existing Internet banking. Relpacing real name verification from face-to-facd to non-face-to-face while maintaining the structure of identification can not only cause inconvenience to a first time member, but also can be more vulnerable to verious security risks. In this study, to evaluate a service level of a bank of the Internet, and provide an improved identification of the structure such that the registration and use of differentiated services is performed in accordance with the evaluation. In addition, the security that may occur with respect to Bank of the Internet to establish a vulnerability and attack model, the results of the analysis of the safety of the step-by-step security attributes and services of the authentication medium of each attack model, existing the safer than Internet banking, confirmed the usefulness in user registration guide.

Effect of the Strength of Weak Ties & Emotional Perception on the Social Network Game's Diffusion (Strength of Weak Ties와 감성적 인식이 소셜네트워크게임(SNG)의 확산에 미치는 영향 연구)

  • Song, Myung-Bean;Yoo, Hyun-Gyu;Jo, Eun-Ae;Lee, Sang-Ho
    • Journal of Digital Convergence
    • /
    • v.12 no.5
    • /
    • pp.69-78
    • /
    • 2014
  • This study deals with the digital policy proposal through the path modeling study on the effect of the strength of weak ties & emotional perception leading to the user's satisfaction, WOM between game users, and the verification on the effect of the emotional real name SNS on the social network game's diffusion. Researcher confirmed that the effect of the strength of weak ties & emotional perception led to the user's satisfaction, WOM of SNG. Even though weak tie, researchers estimate that the users emotionally interact with the real name relation effect of SNS. And effective factors for WOM are not a tie relationship or emotional interactivity of weak tie antecedently but user's satisfaction. As a result, though antecedent factors (weak tie & interactivity) had a positive effect as real name SNS, eventually powerful factor of making buzz was the SNG user's satisfaction. Thus researchers expect the practical policy proposition for government & corporation, which means SNG service providers more carefully manage the service satisfaction for WOM with SNG user's experience.

Effectiveness of the Internet Real-Name Verification Law: Evidence from Self-censorship and Intention to Detour the Regulation (인터넷실명제와 우회로의 선택: 인터넷 공론장 참여자들의 자기검열과 우회로 선택의향을 중심으로)

  • Han, Hye-Kyung;Kim, Eu-Jong
    • Korean journal of communication and information
    • /
    • v.55
    • /
    • pp.50-73
    • /
    • 2011
  • This paper investigates the effectiveness of Real-Name System on Internet, which has been applied to some Internet service provider bulletin boards in Korea. The goal of the Real-Name system on the Internet is controlling expression of slanderous or abusive language. The effectiveness of the regulation is dependent on the people's perceptions and attitude toward to the legislation. This empirical study examines the antecedents that affect the perceptions and attitude toward the regulation. Further, we investigate the relationships among variables such as internet public sphere participation, attitude to the regulations, and intention to choose detours. Results of regression analysis show that the younger and the more progressive individuals are, the more they oppose the implementation of the law. Also, it was found that people who have more political interest and participate more actively in public sphere via internet, tend to oppose the law. Structural equation models reveal that participation in online public sphere drives negative attitudes about the regulation. In addition, people with negative perceptions about the law tend to choose the detours such as 'cyber asylum' and 'service asylum'.

  • PDF

Real-Time Face Recognition System using PDA (PDA를 이용한 실시간 얼굴인식 시스템 구현)

  • Kwon Man-Jun;Yang Dong-Hwa;Go Hyoun-Joo;Kim Jin-Whan;Chun Myung-Geun
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.15 no.5
    • /
    • pp.649-654
    • /
    • 2005
  • In this paper, we describe an implementation of real-time face recognition system under ubiquitous computing environments. First, face image is captured by PDA with CMOS camera and then this image with user n and name is transmitted via WLAN(Wireless LAN) to the server and finally PDA receives verification result from the server The proposed system consists of server and client parts. Server uses PCA and LDA algorithm which calculates eigenvector and eigenvalue matrices using the face images from the PDA at enrollment process. And then, it sends recognition result using Euclidean distance at verification process. Here, captured image is first compressed by the wave- let transform and sent as JPG format for real-time processing. Implemented system makes an improvement of the speed and performance by comparing Euclidean distance with previously calculated eigenvector and eignevalue matrices in the learning process.

A Beverage Can Recognition System Based on Deep Learning for the Visually Impaired (시각장애인을 위한 딥러닝 기반 음료수 캔 인식 시스템)

  • Lee Chanbee;Sim Suhyun;Kim Sunhee
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.19 no.1
    • /
    • pp.119-127
    • /
    • 2023
  • Recently, deep learning has been used in the development of various institutional devices and services to help the visually impaired people in their daily lives. This is because not only are there few products and facility guides written in braille, but less than 10% of the visually impaired can use braille. In this paper, we propose a system that recognizes beverage cans in real time and outputs the beverage can name with sound for the convenience of the visually impaired. Five commercially available beverage cans were selected, and a CNN model and a YOLO model were designed to recognize the beverage cans. After augmenting the image data, model training was performed. The accuracy of the proposed CNN model and YOLO model is 91.2% and 90.8%, respectively. For practical verification, a system was built by attaching a camera and speaker to a Raspberry Pi. In the system, the YOLO model was applied. It was confirmed that beverage cans were recognized and output as sound in real time in various environments.

Study on a Real Time Based Suspicious Transaction Detection and Analysis Model to Prevent Illegal Money Transfer Through E-Banking Channels (전자금융 불법이체사고 방지를 위한 실시간 이상거래탐지 및 분석 대응 모델 연구)

  • Yoo, Si-wan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.6
    • /
    • pp.1513-1526
    • /
    • 2016
  • Since finance companies started e-banking services, those services have been diversified and use of them has continued to increase. Finance companies are implementing financial security policy for safe e-banking services, but e-Banking incidents are continuing to increase and becoming more intelligent. Along with the rise of internet banks and boosting Fintech industry, financial supervisory institutes are not only promoting user convenience through improving e-banking regulations such as enforcing Non-face-to-face real name verification policy and abrogating mandatory use of public key certificate or OTP(One time Password) for e-banking transactions, but also recommending the prevention of illegal money transfer incidents through upgrading FDS(Fraud Detection System). In this study, we assessed a blacklist based auto detection method suitable for overall situations for finance company, a real-time based suspicious transaction detection method linking with blacklist statistics model by each security level, and an alternative FDS model responding to typical transaction patterns of which information were collected from previous e-Banking incidents.

Clustering for Home Healthcare Service Satisfaction using Parameter Selection

  • Lee, Jae Hong;Kim, Hyo Sun;Jung, Yong Gyu;Cha, Byung Heon
    • International Journal of Advanced Culture Technology
    • /
    • v.7 no.2
    • /
    • pp.238-243
    • /
    • 2019
  • Recently, the importance of big data continues to be emphasized, and it is applied in various fields based on data mining techniques, which has a great influence on the health care industry. There are many healthcare industries, but only home health care is considered here. However, applying this to real problems does not always give perfect results, which is a problem. Therefore, data mining techniques are used to solve these problems, and the algorithms that affect performance are evaluated. This paper focuses on the effects of healthcare services on patient satisfaction and satisfaction. In order to use the CVParameterSelectin algorithm and the SMOreg algorithm of the classify method of data mining, it was evaluated based on the experiment and the verification of the results. In this paper, we analyzed the services of home health care institutions and the patient satisfaction analysis based on the name, address, service provided by the institution, mood of the patients, etc. In particular, we evaluated the results based on the results of cross validation using these two algorithms. However, the existence of variables that affect the outcome does not give a perfect result. We used the cluster analysis method of weka system to conduct the research of this paper.

High-Speed Korean Address Searching System for Efficient Delivery Point Code Generation (효율적인 순로코드 발생을 위한 고속 한글 주소검색 시스템 개발)

  • Kim, Gyeong-Hwan;Lee, Seok-Goo;Shin, Mi-Young;Nam, Yun-Seok
    • The KIPS Transactions:PartD
    • /
    • v.8D no.3
    • /
    • pp.273-284
    • /
    • 2001
  • A systematic approach for interpreting Korean addresses based on postal code is presented in this paper. The implementation is focused on producing the final delivery point code from various types of address recognized. There are two stages in the address interpretation : 1) agreement verification between the recognized postal code and upper part of the address and 2) analysis of lower part of the address. In the agreement verification procedure, the recognized postal code is used as the key to the address dictionary and each of the retrieved addresses is compared with the words in the recognized address. As the result, the boundary between the upper part and the lower part is located. The confusion matrix, which is introduced to correct possible mis-recognized characters, is applied to improve the performance of the process. In the procedure for interpreting the lower part address, a delivery code is assigned using the house number and/or the building name. Several rules for the interpretation have been developed based on the real addresses collected. Experiments have been performed to evaluate the proposed approach using addresses collected from Kwangju and Pusan areas.

  • PDF

ICS RF Repeater for Marine NB-IoT Service (해상 NB-IoT 서비스를 위한 ICS RF 중계기)

  • Cho, Sin-ho;Lee, Seong-Real
    • Journal of Advanced Navigation Technology
    • /
    • v.25 no.5
    • /
    • pp.390-396
    • /
    • 2021
  • In this research, design and fabrication of marine repeater capable to extend communication coverage in monitoring system of fishing gear automatic identification, which is one of implementation method of the real-name electric fishing gear system declared by Ministry of Oceans and Fisheries in 2016, is reported. The proposed marine repeater is fabricated in a form of RF repeater with interference cancellation system (ICS), which can cancel the oscillation due to feedback signal between service antenna and link antenna. In design process, we secure the isolation of 30 dB between service antenna and link antenna. It is confirmed that when the level of feedback signal into repeater input be lower of 15 dB than repeater gain, error vector magnitude due to oscillation can be lower than the performance criterion of 6%, from the test verification. It is expected that the service coverage will be extended by applying the developed marine ICS RF repeater into marine IoT network including monitoring system of fishing gear automatic identification.

A Process Algebra for Modeling Secure Movements of Distributed Mobile Processes (분산 이동 프로세스 이동의 안전성 모델링을 위한 프로세스 대수)

  • Choe, Yeongbok;Lee, Moonkun
    • Journal of KIISE
    • /
    • v.43 no.3
    • /
    • pp.314-326
    • /
    • 2016
  • Some process algebras were applied to enterprise business modelling for formal specification and verification. ${\pi}$-calculus and mobile ambient can be considered for the distributed and mobile, especially to represent the movements of distributed real-time business processes. However there are some limitations to model the movements: 1) ${\pi}$-calculus passes the name of port for indirect movements, and 2) mobile ambient uses ambient to synchronize asynchronous movements forcefully. As a solution to the limitations, this paper presents a new process algebra, called ${\delta}$-calculus, to specify direct and synchronous movements of business processes over geo-temporal space. Any violation of safety or security of the systems caused by the movements can be indicated by the properties of the movements: synchrony, priority and deadline. A tool, called SAVE, was developed on ADOxx metamodelling platform to demonstrate the concept.