• Title/Summary/Keyword: 개인 식별 번호

Search Result 68, Processing Time 0.028 seconds

Comparative Analysis between Concepts of 'work' in ERBR and in International Standard Numbers (FRBR에 의한 국제표준번호들의 저작개념 분석)

  • 김정현
    • Journal of Korean Library and Information Science Society
    • /
    • v.35 no.1
    • /
    • pp.215-235
    • /
    • 2004
  • FRBR(Functional Requirements for Bibliographic Records) provides a structured conceptual model for relating the data which are recorded in bibliographic records to identify information resources. FRBR has 4 bibliographic entities - the work, expression, manifestation, and item - in its conceptual model. In this paper, the difference in the 'work' conception between FRBR and international standard numbers is examined Consequently, the following points are observed: (1) The ISBN, ISSN, and ISMN identify manifestation level, as they refer to the physical expression of a work. The IARN, ISRC, and ISAN identify expression level, irrespective of its manifestation. The ISWC and ISTC identify work level - the unique artistic creation, whatever its expression or manifestation is. (2) ISWC and ISTC does not use the word 'work' in the same way as FRBR does. I think that the differences in meanings of the two usages 'work' come from the different positions to information resources.

  • PDF

Analysis of Personal Information Protection System in Korea - Focus on Certification & Evauation System and Personal Identification Number - (우리나라의 개인정보 보호제도 분석 - 인증 및 평가제도와 개인식별번호를 중심으로 -)

  • Kim, Min-Chen
    • Informatization Policy
    • /
    • v.23 no.4
    • /
    • pp.38-58
    • /
    • 2016
  • The ever-evolving Internet environment along with changes in the mass media has been creating a new way of communicating in the virtual cyber world. The Internet users have more services at their disposal to communicate with ease. Such a new way of communication styles, however, makes them vulnerable to personal information leakage, increasing the concerns of cyber security. A thorny issue is how we can control the disclosure of personal information. Lately, the Korean government implemented privacy policies to resolve and prevent personal information leakage incidents that incur social problems. Here, we seek to identify problems in the privacy policies for better solutions.

Privacy protection and non-repudiation security mechanisms for logistics (프라이버시 보호 및 부인방지를 위한 물류 운송 보안 기법)

  • Choi, Min-Seok;Lee, Dong-Hoon;Kang, Min-Soo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.04a
    • /
    • pp.695-698
    • /
    • 2012
  • 개인정보보호법이 제정 및 시행됨에 따라서 고유식별정보를 처리하는 경우 그 고유식별정보가 분실, 도난, 유출, 변조 또는 훼손 되지 않아야 한다[1]. 하지만 현재 운송업계의 택배 서비스를 이용 시 고유식별정보가 고스란히 노출 되어있으며, 위 변조 또한 가능하다. 이러한 주소, 성명, 전화번호 등 개인을 식별할 수 있는 개인정보를 악용하여, 명의 도용이나 피싱 등의 심각한 문제가 발생될 수 있다. 현재 택배 시스템은 발신, 수신, 배송에 대한 사고 및 논쟁 발생 시 그에 따른 증거자료가 부족하기 때문에 책임이 불명확하다. 이를 사전에 방지하기 위해서는 관련된 증거를 생성, 수집, 유지, 활용, 검사하는 절차와 그 역할을 담당할 신뢰된 제3의 기관이 필요하다. 본 논문에서는 현재의 택배 시스템을 점검해 보고 개인정보보호 차원에서의 해결방안을 모색하는 것과 발신, 수신, 배송의 부인방지 서비스 적용을 목표로 한다.

Fabrication and Measurement of the ID tag and temperature sensor using surface acoustic wave (표면탄성파를 이용한 ID tag, 온도 센서 제작 및 측정)

  • Jo, Min-Uk;Lee, Ki-Jung;Song, Tae-Hyeon;Yang, Sang-Sik
    • Proceedings of the KIEE Conference
    • /
    • 2011.07a
    • /
    • pp.95-96
    • /
    • 2011
  • 본 논문은 표면탄성파(Surface Acoustic Wave)의 특성을 이용하여 반사되어 돌아오는 피크 신호를 통해 개체를 식별하며 온도 변화에 따른 위상의 변화를 갖는 ID 태그 및 온도 센서의 제작공정과 네트워크 분석기를 이용한 측정에 대해 소개한다. 표면탄성파 마이크로센서는 IDT(interdigital trancducer)와 ID 번호를 갖는 리플렉터, 온도 변화에 따른 위상 변위를 관찰하기 위한 리플렉터로 구성된다. 제작된 두 개의 소자는 49(0110001), 113(1110001)의 ID 번호를 가지고 있으며, 1 us에서 기준신호를 관찰할 수 있도록 한 개의 리플렉터를 추가적으로 포함한다. 또한 온도 변화에 따른 전파 속도의 변화로 인해 발생 하는 위상 변화를 관찰하기 위한 리플렉터를 포함한다. $41^{\circ}$YX $LiNbO_3$ 압전기판, AZ1512 감광제, 알루미늄을 이용하여 제작 되었고 네트워크 분석기를 통해 출력된 신호로 ID 번호를 식별하고 $30^{\circ}C$에서 $120^{\circ}C$까지의 온도 변화에 따른 위상 변화를 측정하였다.

  • PDF

A Case study f i-PIN Service for Information Security (보안성 강화를 위한 i-PIN 서비스 적용 사례 연구)

  • Kim, Hyunjoo;Lee, Soojong
    • Journal of Software Engineering Society
    • /
    • v.25 no.1
    • /
    • pp.19-28
    • /
    • 2012
  • Personal registration number has been used as a means of personal identification on existing internet. However, its use on internet sites has become a major factor increasing danger of leaking of personal information. Presently, the government recommends i-PIN to minimize the collection of personal registration numbers and leaking of personal information on internet. Original purpose of i-PIN is to recognize persons by its virtual number of 13 digits instead of using personal registration number on internet websites. These days, i-PIN continues to be used increasingly as a form of certification. This study seeks to explore software service methodology of using i-PIN as a form of certification on internet websites and examples in which its other forms of self certification are used than existing i-PIN services.

  • PDF

Vehicle License Plate Recognition Method Robuse to Changes in Lighting Conditions (빛의 변화에 강건한 차량번호판 인식방법)

  • Nam, Kee-Hwan;Bae, Cheol-Soo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.1
    • /
    • pp.160-164
    • /
    • 2005
  • The process of recognizing a vehicle involves detection of the vehicle, recognition of the vehicle model, and identification of the vehicle. The process of vehicle identification involves identification of the vehicle itself, such as by recognition of the license plate on the vehicle. In this paper the method involves the use of a beam splitter to divide incident rays into two directions, a transmitted beam and a reflected beam of different light intensities, and synthesizing two captured images using CCD devices from each beam, thus producing fluctuation-free images of a wide dynamic range even when the subject is moving. A prototype license plate recognition system was also developed using the experimental sensing device. The system achieved a 98.7% recognition rate on 466 images of moving vehicles, which demonstrates its effectiveness as a license plate recognition system.

Recognition of Numbers of Car Lisence Plate Using Phase Only Correlation (위상한정상관을 이용한 차량 번호판의 숫자 인식)

  • 이원경;이충호
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.10d
    • /
    • pp.514-516
    • /
    • 2002
  • 본 논문은 차량 번호판의 숫자인식 방법으로 위상한정상관을 이용하는 방법을 제안한다. 본 논문에서 이용하는 위상한정상관법은 푸리에변환을 이용한 상관함수의 계산과정에서 진폭을 고정치로 하여 위상정보의 값만으로 패턴 인식을 가능하게 한다. 제안하는 방법은 기존의 위상한정상관에서 진폭을 최적치 2.2로 하여 잡음화상의 식별을 더욱 명확히 하였다. 실험을 통하여 10개의 서로 다른 숫자화상을 비교하여 다른 숫자를 구분하고 잡음이 첨가된 숫자화상을 비교하여 동일 숫자임을 확인함으로써 패턴매칭에 효과적임을 보인다. 또한 화상을 이치화하는 전처리 과정을 거치지 않고도 다른 숫자화상에 대해 98%의 식별성능을 나타내므로 농담화상에 대한 성능도 우수하고 잡음에도 강함을 보여 준다.

  • PDF

Research on the development of automated tools to de-identify personal information of data for AI learning - Based on video data - (인공지능 학습용 데이터의 개인정보 비식별화 자동화 도구 개발 연구 - 영상데이터기반 -)

  • Hyunju Lee;Seungyeob Lee;Byunghoon Jeon
    • Journal of Platform Technology
    • /
    • v.11 no.3
    • /
    • pp.56-67
    • /
    • 2023
  • Recently, de-identification of personal information, which has been a long-cherished desire of the data-based industry, was revised and specified in August 2020. It became the foundation for activating data called crude oil[2] in the fourth industrial era in the industrial field. However, some people are concerned about the infringement of the basic rights of the data subject[3]. Accordingly, a development study was conducted on the Batch De-Identification Tool, a personal information de-identification automation tool. In this study, first, we developed an image labeling tool to label human faces (eyes, nose, mouth) and car license plates of various resolutions to build data for training. Second, an object recognition model was trained to run the object recognition module to perform de-identification of personal information. The automated personal information de-identification tool developed as a result of this research shows the possibility of proactively eliminating privacy violations through online services. These results suggest possibilities for data-based industries to maximize the value of data while balancing privacy and utilization.

  • PDF

Optical security system for protection of personal identification information (개인신원정보 보호를 위한 광 보호 시스템)

  • 윤종수;도양회
    • Korean Journal of Optics and Photonics
    • /
    • v.14 no.4
    • /
    • pp.383-391
    • /
    • 2003
  • A new optical security system for the protection of personal identification information is proposed. Personal identification information consisting of a pure face image and an identification number is used for verification and authentication. Image encryption is performed by a fully phase image encryption technique with two random phase masks located in the input and the Fourier plane of 4-f correlator. The personal information, however, can be leaked out in the decryption process. To cope with this possibility, the encrypted image itself is used in the identification process. An encrypted personal identification number is discriminated and recognized by using the proposed MMACE_p (multiplexed MACE_p) filter, and then authenticity of the personal information is verified by correlation of the face image using the optical wavelet matched filter (OWMF). MMACE_p filter is a synthetic filter with four MACE_p (minimum average correlation energy_phase encrypted) filters multiplexed in one filter plane to recognize 10 different encrypted-numbers at a time. OWMF can improve discrimination capability and SNR (signal to noise ratio). Computer simulations confirmed that the proposed security technique can be applied to the protection of personal identification information.

Real Time User Location Information Protection Model Using Anonymity (익명성을 활용한 사용자의 실시간 위치정보 보호모델)

  • Mun, Hyung-Jin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.10
    • /
    • pp.2316-2322
    • /
    • 2013
  • Due to the development of ICT, with using hardwares such as WiFi, 3G and GPS and so on, smartphone could have provided a lot of applications with novel functions rapidly. Through such applications, lots of personal information such as personal location, personal images, and list of phone calls is created, saved and widely used. Because there is lots of leakage of the stored personal information due to loss of phone and application, privacy violation have been important issue nowadays. Smartphone with GPS and Internet provides location information. To protect the information, the technologies that only the authorized user can access it while inquiring the location information have been proposed. In this paper, to minimize the identification information for location information subject and information user and anonymize the identifiable information such as phone number, we proposed a model that can reduce the leakage of information and avoid the wrong usage of the stored information in the server. This technique will be used for protecting privacy when developing the application that provides routing service through location history information.