• Title/Summary/Keyword: time stamp

Search Result 152, Processing Time 0.026 seconds

A Design of Advanced Channel Creation in e-Passport (전자여권의 향상된 채널생성 기법 설계)

  • Lee, Gi-Sung;Jeon, Sang-Yeob;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.10
    • /
    • pp.4814-4821
    • /
    • 2012
  • An e-passport is equipped with bio information by adding the non-attachable IC chip with a smart function. In order to solve such a problem, the user's privacy is protected by using the BAC, PA, AA and EAC mechanisms. However, the password key used in the BAC mechanism is made of the combination of the MRZ values. As a result, it is possible to decode the password by using the indiscriminate attacking program after finding out the combined rules of MRZ. This thesis suggests the mechanism with an improved level of efficiency through the time-stamp values by using the information of images and fingerprints and checking the forge or falsification of the e-passport when establishing a safe channel between the chip of the e-passport and the decoding system.

RFID-based Authentication Protocol for Implantable Medical Device (체내삽입장치에 RFID 기술을 적용한 인증 프로토콜)

  • Jeong, Yoon-Su
    • Journal of Digital Convergence
    • /
    • v.10 no.2
    • /
    • pp.141-146
    • /
    • 2012
  • U-healthcare, which grafted advanced IT technology onto medical technology, is in the limelight because it can provide medical services at anytime and anywhere. U-healthcare system applied RFID technology for Implantable Medical Device (IMD), but patient's biometric information can be easily exposed to third parties. In this article, RFID-based U-healthcare authentication protocol is proposed to prevent illegal usage for personal biometric information exposed to the third patty. The proposed protocol guarantees patients' biometric information integrity as compounding random numbers between administrators and hospital/clinic managers, and uses continuous number SEQ and time stamp T to synchronize IMD/administrators and administrators/hospital managers. Also, to protect user's privacy from the third party, patients' biometric information can be safely guarded by managing patients' security identifiers by administrators.

Development of Guideline on Electronic Signatures for Electronic Medical Record (전자의무기록에 대한 공인전자서명 적용 지침 개발)

  • Park Jeong-Seon;Shin Yong-Won
    • The Journal of the Korea Contents Association
    • /
    • v.5 no.6
    • /
    • pp.120-128
    • /
    • 2005
  • One of the most secure ways of maintaining the confidentiality and integrity of electronic information is to use electronic signatures. So, in this paper, we developed guideline on electronic signatures for EMR(electronic medical record) based on the Medical Law and the Electronic Signature Act. This guideline is intended to introduce EMR easily in the medical field and to facilitate the promotion of EMR. We developed it through consulting from the advisory committee that was made up of experts in the fields of medical record, EMR system and electronic signatures. The contents of the guideline consist of subject and time stamp of electronic signatures, validity of a certificate, management of electronic signatures and custody and management of EMR. In the future, we will develop practical cases and promote educations and publicities of them to use in the medical institutes and EMR system related industries.

  • PDF

Implementation of a Remote Authentication System Using Smartcards to Guarantee User Anonymity to Third Party (제 3자에게 사용자 익명성을 제공하는 스마트 카드 기반 원격 인증 시스템 구현)

  • Baek, Yi-Roo;Oh, Doo-Hwan;Gil, Kwang-Eun;Ha, Jae-Cheol
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.10
    • /
    • pp.2750-2759
    • /
    • 2009
  • In this paper, we analyze vulnerabilities in a remote authentication protocol using smartcards which was proposed by Bindu et al. and propose an improved scheme. The proposed scheme can prevent from restricted replay attack and denial of service attack by replacing time stamp with random number. In addition, this protocol can guarantee user anonymity by transmitting encrypted user's ID using AES cipher algorithm. The computational load in our protocol is decreased by removing heavy exponentiation operations and user efficiency is enhanced due to addition of password change phase in which a user can freely change his password. Furthermore, we really implement the proposed authentication protocol using a STM smartcard and authentication server. Then we prove the correctness and effectiveness of the proposed remote authentication system.

Implementation of a Personal Exercise System for Growing Children using Kinect (키넥트를 이용한 성장기 아동을 위한 개인 운동 시스템 구현)

  • Kim, Yeon-Jun;Kim, Hyo-bin;Yeom, Yu-jin;Choi, Ye-jin;Lee, Sang-Ho
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.6
    • /
    • pp.127-132
    • /
    • 2019
  • Exercising and stretching are essential for the growth of children, but recently, children's outdoor activities are limited due to social risks such as fine dust and child crime. It has increased the need for children's programs that can be safely and easily followed indoors. In this paper, we developed a system to induce and manage children's voluntary stretching to support growth. The system developed in this paper recognizes the child's stretching motions in real-time using Kinect to evaluate the match rate with the standard motions. The system gives users the results with a calendar and check stamp to provide voluntary motivation for the child and to provide parents with systematic management of the child's progress.

Behavior Pattern Analysis and Design of Retrieval Descriptor based on Temporal Histogram of Moving Object Coordinates (이동 객체 좌표의 시간적 히스토그램 기반 행동패턴 분석 및 검색 디스크립터 설계)

  • Lee, Jae-kwang;Lee, Kyu-won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.4
    • /
    • pp.811-819
    • /
    • 2017
  • A behavior pattern analysis algorithm based on descriptors consists of information of a moving object and temporal histogram is proposed. Background learning is performed first for detecting, tracking and analyzing moving objects. Each object is identified using an association of the center of gravity of objects and tracked individually. A temporal histogram represents a motion pattern using positions of the center of gravity and time stamp of objects. The characteristic and behavior of objects are figured out by comparing each coordinates of a position history in the histogram. Behavior information which is comprised with numbers of a start and end frame, and coordinates of positions of objects is stored and managed in the linked list. Descriptors are made with the stored information and the video retrieval algorithm is designed. We confirmed the higher retrieval accuracy compare with conventional methods.

A Load Distribution System on P2P Online Game Based on RS Reconfiguration by Interesting Regions (P2P 온라인 게임에서의 관심영역별 영역관리자 재구성 기반 부하분산 시스템)

  • Jung, Mi-Sook;Kim, Seong-Hoo;Park, Kyoo-Seok
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.3
    • /
    • pp.345-353
    • /
    • 2009
  • It is for sure that a stable game managing system is absolutely needed to accept simultaneous interfacing of many users for P2P on-line game system. The proposed P2P on-line game system in this paper is able to get smart and stable game managing taking care of extensive players through reorganizing numerous RS(Region Server) and mutual communications among RS's which can be avoid congestion on one region. Moreover, it is possible to synchronize for game nodes in time stamp utilizing Global Zone Buffer of Monitoring Server which leads to breakup loads. The system manages middleware layers in the so-called sub area, and it is able to execute no matter how big the game sizes are. That means, in some ways, we got everything we try to ensure such as the problems of high cost server and stabilization of message transmission. This paper welcomes to prove efficiency of the suggested system through the simulation.

  • PDF

Optimistic Concurrency Control based on TimeStamp Intervals for Broadcast Environment: OCC/TI (방송환경에서 타임스탬프 구간에 기반을 둔 낙관적 동시성 제어 기법)

  • 이욱현;황부현
    • Journal of KIISE:Databases
    • /
    • v.29 no.6
    • /
    • pp.477-491
    • /
    • 2002
  • The broadcast environment has asymmetric communication aspect that is typically much greater communication bandwidth available from server to clients than in the opposite direction. In addition, mobile computing systems generate mostly read-only transactions from mobile clients for retrieving different types of information such as stock data, traffic information and news updates. Since previous concurrency control protocols, however, do not consider such a particular characteristics, the performance degradation occurs when previous schemes are applied to the broadcast environment. In this paper, we propose optimistic concurrency control based on timestamp interval for broadcast environment. The following requirements are satisfied by adapting weak consistency that is the appropriate correctness criterion of read-only transactions: (1) the mutual consistency of data maintained by the server and read by clients (2) the currency of data read by clients. We also adopt the timestamp Interval protocol to check the weak consistency efficiently. As a result, we improved a performance by reducing unnecessary aborts and restarts of read-only transactions caused when global serializability was adopted.

Mobile App Recommendation using User's Spatio-Temporal Context (사용자의 시공간 컨텍스트를 이용한 모바일 앱 추천)

  • Kang, Younggil;Hwang, Seyoung;Park, Sangwon;Lee, Soowon
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.2 no.9
    • /
    • pp.615-620
    • /
    • 2013
  • With the development of smartphones, the number of applications for smartphone increases sharply. As a result, users need to try several times to find their favorite apps. In order to solve this problem, we propose a recommendation system to provide an appropriate app list based on the user's log information including time stamp, location, application list, and so on. The proposed approach learns three recommendation models including Naive-Bayesian model, SVM model, and Most-Frequent Usage model using temporal and spatial attributes. In order to figure out the best model, we compared the performance of these models with variant features, and suggest an hybrid method to improve the performance of single models.

A Two-Way Authentication Protocol Based on Hash Collision for Unmanned Systems in Tactical Wireless Networks (전술 무선 네트워크에서 무인체계를 위한 해시 충돌 기반의 양방향 인증 프로토콜)

  • Lee, Jong-kwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.4
    • /
    • pp.729-738
    • /
    • 2019
  • In this paper, we propose two-way authentication protocol between unmanned systems in tactical wireless networks in which long distance communications are not guaranteed due to a poor channel conditions. It is assumed that every unmanned systems have same random data set before they put into combat. The proposed protocol generates authentication code(AC) using random data that causes hash collision. The requester for authentication encrypts the materials such as their identifier, time-stamp, authentication code with the secret key. After then the requester transmits the encrypted message to the receiver. The receiver authenticates the requester by verifying the authentication code included in the request message. The performance analysis of the proposed protocol shows that it guarantees the security for various attack scenarios and efficiency in terms of communication overhead and computational cost. Furthermore, we analyzed the effect of the parameter values of the proposed protocol on the performance and suggest appropriate parameter value selection guide according to the level of security requirement.