• Title/Summary/Keyword: 개인식별

Search Result 611, Processing Time 0.029 seconds

New Method of Protecting Against Blackmailing in Electronic Cash System (전자화폐 시스템에서 블랙메일링 공격을 막는 새로운 방법)

  • 한동국;박혜영;박영호;김창한;임종인
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2001.11a
    • /
    • pp.432-436
    • /
    • 2001
  • 본 논문에서는 XTR을 이용해 Schnorr 개인식별 프로토콜을 구성하여 블랙메일링 공격이 있을 경우에 은행에게 블랙메일링 공격에 대한 정보를 개인식별 과정에서 알려주는 방법을 제안한다. 본 논문에서 제안한 XTR 버전의 Schnorr 개인식별 프로토콜을 사용하면 기존의 방법들이 블랙메일링 공격을 막기 위해 필요로 하는 가정들을 사용하지 않고도 효과적으로 블랙메일링 공격을 막을 수 있는 새로운 방법이 된다.

  • PDF

The Integrated Identification Number Checking and Key Management Protocol with Certificates (인증서를 이용한 개인식별번호 확인 및 키분배 통합 프로토콜)

  • Kim Sung Duk;Jung Jae Dong;Won Dong Ho
    • The KIPS Transactions:PartC
    • /
    • v.12C no.3 s.99
    • /
    • pp.317-322
    • /
    • 2005
  • The existing certificate based authentication or identification just verifies whether the owner of private key corresponding to public key of certificate is the DN user set in the user field in the certificate or not, then we cannot find out who is the actual private key owner in a real world. To make up for this weak points, the method to insert the identification number like the resident registration number into the certificate extension field is applied as a technical standard to current domestic PKI system. In this paper, we propose the ECC based integrated identification, identification number checking and key management protocol providing user validation during the login.

A Study on the Development of Super-Impose ID System (Super-Impose 개인식별 영상시스템 개발 및 감정연구)

  • 송현교;이진행;이양원;강민구
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 1998.05a
    • /
    • pp.216-221
    • /
    • 1998
  • 슈퍼임포즈는 개인식별 방법으로 신원 미상의 두개골의 발견 시, 두개골의 사진과 용의자 생전 사진의 동일 비율로 확대, 축소 후 두 영상을 중첩하므로서 동일인 여부를 비교, 판별하는 기법이다. 삼풍백화점 붕괴사고와 Guam KAL기 추락사고와 같이 대형사건에서의 개인식별에 매우 중요한 문제이다. 본 연구는 비디오 카메라로 입력한 두개골 영상과 스캐너로 입력한 생전 사진의 중첩을 위한 H/W 시스템의 구축과 영상처리 기법을 응용한 응용 프로그램을 개발하였다 슈퍼임포즈의 영상처리 기법으로는 두개골 및 생전 사진의 윤곽선 추출, 중첩점 조정, 상,하,좌,우 각도조정, 윤곽선보정, Hue 조정, 히스토그램 조정 등 다양한 영상처리 기법을 응용하였다. 또한, 이들 영상처리기법은 법의학 체제에 입각한 슈퍼임포즈 영상합성이 개인식별 감정시 필요한 최적의 영상 비교가 가능하도록 DB 시스템 구축과 분석시스템을 개발하였다. 그리고, 실제 감정시 본 영상시스템으로 감정해 본 결과로 보다 정확하고 실시간으로 감정이 가능하다. 본 슈퍼 임포즈 영상시스템은 슈퍼 임포즈 영상자료의 처리와 축적 기술의 발전으로, 두개골 영상과 생전 사진을 이용한 생전의 3차원 실 영상의 복원연구가 가능하리라 사료된다.

  • PDF

The Role of Teeth in Determination of Unidentified Human Body (신원불상자의 개인식별에서의 치아의 역할)

  • Ahn, Yong-Woo;Jeon, Hee-Sun;Huh, Gi-Yeong;Tae, Il-Ho;Ko, Myung-Yun
    • Journal of Oral Medicine and Pain
    • /
    • v.33 no.2
    • /
    • pp.177-186
    • /
    • 2008
  • Forensic odontology can be defined in many ways. One of definitions is simply that forensic odontology represents the overlap between the dental and the legal professions. The most important function of forensic odontology to determine of human identity from dental character. We had found 7 unidentified human bodies in Busan metro politan city, 2007 and we have identified 5 bodies among them.

Consideration to The Role of Forensic Odontology in Determination of Unidentified Human Body (신원불상자의 개인식별에서의 치아의 역할에 대한 고찰)

  • Ahn, Yong-Woo;Ko, Chul-Hee;Huh, Ki-Yeong;Lee, Sang-Seob;Ok, Soo-Min;Huh, Joon-Young;Ko, Myung-Yun;Jeong, Sung-Hee
    • Journal of Oral Medicine and Pain
    • /
    • v.35 no.2
    • /
    • pp.111-117
    • /
    • 2010
  • Forensic odontology in individual identification has been progressing rapidly and its significance has been increasing. But not all individual identification can be done single method solely. Therefore, understanding the advantage and disadvantage of each method is necessary to achieve forensic individual identification properly in each case for it to be applied promptly, economically and precisely. Now We have identified almost 20 case in Busan and Kyeong Nam area in 2008, 2009 and we would like to report some of cases. Finally We will consider role of forensic odontology.

A Study on Reforming the National Personal Identification Number System : The Unconnected Random Personal Identification Number System (국가 개인식별번호체계 개선에 관한 연구 : 독립적 난수기반 개인식별번호체계로 전환)

  • Han, Mun-Jung;Jang, GyeHyun;Hong, Seokhie;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.4
    • /
    • pp.721-737
    • /
    • 2014
  • The Resident Registration Number(RRN) system has been effectively acted as a national identification system since it was enforced. On the other hand, there are some problems such as leakages of personal informations including RRNs on a large scale and each RRN makes a pair with each person in all areas of the society. Nevertheless leakages of them might cause a big damage, there is no radical countermeasure for they are never changed in actual fact. In Republic of Korea, a RRN acts as a primary key of a database, so it has to be protected by severing the connectivity between leaked RRNs and the other personal data. In this paper, the Unconnected Random Personal Identification Number system is proposed for preventing damage of data spills by removing a dependency which the RRN has. Furthermore, this paper suggests the solutions against some potential issues in the system.

Realtime Individual Identification based on EOG Algorithm for Customized Sleep Care Service (맞춤형 수면케어 서비스를 위한 EOG 기반의 실시간 개인식별 알고리즘)

  • Hong, Ki Hyeon;Lee, Byung Mun;Park, Yang Jae
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.12
    • /
    • pp.8-16
    • /
    • 2019
  • Customized sleep care service needs to be provided differently for individuals since individual has different degree of sleep disorder. Because the brainwave data shows unique waveform characteristics for each person, this characteristic can be used to identify individuals. Personal identification provides an important role in enabling customized services. When you blink, you can obtain brain wave characteristics by measuring the area of the frontal lobe. Therefore, a real-time personal identification algorithm based on blinking EOG for customized sleep care service is proposed in this paper. For evaluation, 10 individuals were tested for personal identification accuracy. The results of the experiment confirmed that a maximum accuracy of 93% were taken. Algorithms can be developed by reflecting characteristics such as changes in the external environment in the future.

A Study on Reinforcing Non-Identifying Personal Sensitive Information Management on IoT Environment (IoT 환경의 비식별 개인 민감정보관리 강화에 대한 연구)

  • Yang, Yoon-Min;Park, Soon-Tai;Kim, Yong-Min
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.8
    • /
    • pp.34-41
    • /
    • 2020
  • An era of stabilizing IoT markets and rapid expansion is coming. In an IoT environment, communication environments where objects take the lead in communication can occur depending on the situation, and communication with unspecified IoT environments has increased the need for thorough management of personal sensitive information. Although there are benefits that can be gained by changing environment due to IoT, there are problems where personal sensitive information is transmitted in the name of big data without even knowing it. For the safe management of personal sensitive information transmitted through sensors in IoT environment, the government plans to propose measures to enhance information protection in IoT environment as the use of non-identifiable personal information in IoT environment is expected to be activated in earnest through the amendment of the Data 3 Act and the initial collection method.

The Application of the Forensic Dental Identification to Unidentified Individual Remains in Korea (신원불명 사망자의 개인식별에서 법치의학적 방법의 활용성에 관한 연구)

  • Park, Hee-Kyung
    • Journal of Oral Medicine and Pain
    • /
    • v.31 no.1
    • /
    • pp.27-36
    • /
    • 2006
  • The cases of unidentified individual remains submitted to Forensic dentistry section in National Institute of Scientific Investigation, Korea were analyzed to study the application of forensic dental identification into individual identification in the period 2002-2005. The identification cases of unidentified remains were 405 out of 493, which accounted about 82% of whole cases. The incidence of submission of skeletons at least including the skull was increased from 58% in 2002 to 80% in 2005. The numbers of cases for the full examinations were 4 times more than that for age estimation in 2005. Twenty-four cases were submitted for skull to photographic superimposition and 15 out of 24 cases were examined, and the other 9 cases were examined by DNA analysis only. The submitted cases for dental comparison were 23 cases, 9 cases were positively identified, 4 cases were possible, 7 cases were excluded, and 3 cases ended up with insufficient evidences. The proportion of positive identification by dental methods was increased gradually from 9% in 2002 to 46% in 2005. Forensic dental identification has become important and useful because the availability of dental records and radiographs has been increasing. Compared to DNA analysis, forensic dental identification has several advantages such as no needs for high cost equipments and low expenses. And the interpretation of results is straightforward and speedy. These advantages are based on using primary their own dental records of the individuals rather than secondary DNA reference samples from family members. The application of the forensic dental identification to unidentified individual remains will be increased because the dental comparison can complement the limitation of DNA analysis and skull to photographic superimposition in many cases. In order to obtain positive identifications of unidentified remains, a close collaboration between the police and forensic scientists is important. The systemic approach including legislation to preserve dental records of unidentified remains and missing persons for the identification of unidentified remains should be needed.

Facial Triangle and Histogram Analysis for Automatic Super-impose Individual Recognition (자동 개인식별을 위한 안면삼각법과 히스토그램분석)

  • 이진행;송현교;강민구
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.3 no.2
    • /
    • pp.321-327
    • /
    • 1999
  • In this progressed super-impose individual recognition system, the photograph of a skull was caught by CCD-camcoder with the MPEG, and an ante-mortem photograph was read by scanner. These two images were processed and superimposed using horizontal angle and vertical angle of face using the forensic dental medicine theory. The enhancement of super-impose individual recognition by anatomical references was performed on the two superimposed images of the same angle using the facial triangle and histogram analysis scheme.

  • PDF