• Title/Summary/Keyword: 개인 식별 번호

Search Result 68, Processing Time 0.027 seconds

A Study on Data Governance Maturity Model and Total Process for the Personal Data Use and Protection (개인정보의 활용과 보호를 위한 데이터 거버넌스 성숙도 모형과 종합이행절차에 관한 연구)

  • Lee, Youngsang;Park, Wonhwan;Shin, Dongsun;Won, Yoojae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.5
    • /
    • pp.1117-1132
    • /
    • 2019
  • Recently, IT technology such as internet, mobile, and IOT has rapidly developed, making it easy to collect data necessary for business, and the collected data is analyzed as a new method of big data analysis and used appropriately for business. In this way, data collection and analysis becomes easy. In such data, personal information including an identifier such as a sensor id, a device number, IP address, or the like may be collected. However, if systematic management is not accompanied by collecting and disposing of large-scale data, violation of relevant laws such as "Personal Data Protection Act". Furthermore, data quality problems can also occur and make incorrect decisions. In this paper, we propose a new data governance maturity model(DGMM) that can identify the personal data contained in the data collected by companies, use it appropriately for the business, protect it, and secure quality. And we also propose a over all implementation process for DG Program.

An Identification System Using QR Codes for Production and Disposal Information of Internet of Things Devices (QR코드 기반 사물인터넷 디바이스의 생산/폐기 정보 식별체계)

  • Lim, Jae-Hyun;Seo, Jeongwook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.664-665
    • /
    • 2016
  • This paper proposes an identification system based on QR (Quick Response) code for production and disposal information of Internet of Things (IoT) devices. Three thousands and five hundreds of electronic devices have replaced and discarded in South Korea in a year, and twenty millions to fifty millions tons of e-wastes have happened throughout the world every year. According to Gartner, market research institution, the number of IoT devices will increase from 2.3 billions in 2013 to 30 billions in 2020, however, the regulations and systems which take into account environment were not prepared. The identification systems for reflecting information of devices, which are produced or discarded, are required to resolve the problem. The proposed identification system based on QR code can store much more massive data such as the producer, product's model, serial number, recycling rate, recovering rate, recyclability rate, recoverability rate than RFID (Radio-Frequency Identification). Also, users can immediately recognize production and disposal information by a QR code application in a smartphone.

  • PDF

Risk of personal information for the sale of used goods in the online (온라인 중고물품판매에 대한 개인정보노출 위험)

  • Park, Jun-Bum;Kim, Seok-Hyun;Cho, Jin-Man;Choi, Dae-Seon;Jin, Seung-Hun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2014.11a
    • /
    • pp.482-485
    • /
    • 2014
  • 온라인 중고물품 거래의 장점은 인터넷을 사용하는 모든 사용자에게 자신이 팔고자 하는 물건을 쉽게 알릴수 있다는것이다. 하지만 온라인에서 중고물품 거래 시에 개인의 정보를 노출할 경우가 많아지게 되는데 이는 프라이버시를 침해할 수 있다. 온라인 중고물품거래시에 사용자들은 자신이 판매하는 물건과 함께 이메일 주소나 핸드폰 번호를 노출하게 되는데 이 정보를 소셜네트워크서비스에 연결하면 특정인에 정보를 획득할 수 있게 된다. 공격자는 온라인 중고물품거래가 진행되는 곳에서 특정인에 대한 정보를 획득한뒤 소셜네트워크서비스와 정보를 연결하여 특정인에 대한 스토킹이나 피싱, 금융사기같은 범죄를 할 가능성이 있다. 본 논문에서는 개인정보노출에 대한 위험성을 알아보기 위해 중고물품 사이트에서 획득한 개인정보를 소셜네트워크서비스에 연결하여 개인 식별가능성을 실험해 보았으며 이를 막기 위한 방법을 제안하였다.

A Study on Civil Complaint Communication Service Model Based on Public Data -Focusing on Communication Between Teacher and Student's Parents- (공공데이터 기반 민원 소통 서비스 모델에 관한 연구 - 교사와 학부모 간 소통을 중심으로 -)

  • ChangIk Oh;Taekryong Han;Jihoon Choi;Dongho Kim
    • Convergence Security Journal
    • /
    • v.23 no.4
    • /
    • pp.53-59
    • /
    • 2023
  • Various problems are occurring as teachers and student's parents communicate directly through mobile phones. In this study, a service model was proposed that allows teachers and student's parents to communicate through SNS platforms without knowing each other's mobile phone numbers. In the civil complaint communication service model proposed in this study provides, communication key sets are provided as public data, and a commonly used SNS platform uses the relevant relationship information to implement communication. This model also has expandability that can be applied not only to teachers, but also to ① officers who need to communicate with the parents of soldiers, ② nursing, health and nursing care personnel who frequently contact patient caregivers, and ③ welfare officials.

Finger-Knuckle Print Recognition Using Gradient Orientation Feature (그레이디언트 방향 특징을 이용한 손가락 관절문 인식)

  • Kim, Min-Ki
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.12
    • /
    • pp.517-523
    • /
    • 2012
  • Biometrics is a study of identifying individual by using the features of human body. It has been studied for an alternative or complementary method for the classical method based on password, ID card, etc. In comparison with the fingerprint, iris, ear, palmprint, finger-knuckle print has been recently studied. This paper proposes an effective method for recognizing finger-knuckle print based on the feature of Gradient orientation. The main features of finger-knuckle print are the size and direction of winkles. In order to extract these features stably, we make a feature vector consisted of Gradient orientations after the preprocessing of enhancing non-uniform brightness and low contrast. Total 790 images acquired from 158 persons have been used at the experiment for evaluating the performance of the proposed method. The experimental results show the recognition rate of 99.69% and the relatively high decidability index of 1.882. These results demonstrate that the proposed method is effective in recognizing finger-knuckle print.

Proposal of Safe PIN Input Method on VR (VR 상에서의 안전한 PIN 입력 방법 제안)

  • Kim, Hyun-jun;Kwon, Hyeok-dong;Kwon, Yong-bin;Seo, Hwa-jeong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.5
    • /
    • pp.622-629
    • /
    • 2019
  • VR(Virtual Reality), which provides realistic services in virtual reality, provides a similar experience using a Head Mounted Display(HMD) device. When the HMD device is worn, it can not recognize the surrounding environment and it is easy to analyze the input pattern of the user with the Shoulder Surfing Attack(SSA) when entering the Personal Identification Number(PIN). In this paper, we propose a method to safeguard the user's password even if the hacker analyzes the input pattern while maintaining the user's convenience. For the first time, we implemented a new type of virtual keypad that deviates from the existing rectangle shape according to the VR characteristics and implemented the lock object for intuitive interaction with the user. In addition, a smart glove using the same sensor as the existing input devices of the VR and a PIN input method suitable for the rotary type are implemented and the safety of the SSA is verified through experiments.

Image Preprocessing in Container Identifier Recognition System Using Multiple Threshold Regions (컨테이너 식별자 영상 인식 시스템에서 다중 임계영역을 이용한 영상 전처리)

  • Woo, Chong-Ho
    • Journal of Korea Multimedia Society
    • /
    • v.16 no.5
    • /
    • pp.549-557
    • /
    • 2013
  • This paper proposes a method using the multiple threshold regions in the image preprocessing procedure for container identifier recognition system. The multiple threshold regions are set by considering the container image characteristics and used as the candidates for the final one, The image is transformed to black and white images using these threshold regions, then labeling, panelling and panels merging are executed for each candidate, respectively. Finally the best threshold region is selected through this procedure and the character region can be extracted. Applying the similar method the noises are removed and the characters of identifier are segmented from the extracted region. In the experiments with 162 different images the success rates for extracting of the character region and segmenting the characters are 99.04% and 98.09%, respectively.

New Sequence Number(SN*) Algorithm for Cell Loss Recovery in ATM Networks (ATM 네트워크에서 셀손실 회복을 위한 새로운 순서번호($SN^{\ast}$) 알고리즘)

  • 임효택
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.7B
    • /
    • pp.1322-1330
    • /
    • 1999
  • The major source of errors in high-speed networks such as Broadband ISDN(B-ISDN) is buffer overflow during congested conditions. These congestion errors are the dominant sources of errors in high-speed networks and result in cell losses. Conventional communication protocols use error detection and retransmission to deal with lost packets and transmission errors. As an alternative, we have presented a method to recover consecutive cell losses using forward error correction(FEC) in ATM(Asynchronous Transfer Mode) networks to reduce the problem. The method finds the lost cells by observing new cell sequence number($SN^{\ast}$). We have used the LI field together with SN and ST fields to consider the $SN^{\ast}$ which provides more correcting coverage than SN in ATM standards. The $SN^{\ast}$ based on the additive way such as the addition of LI capacity to original SN capacity is numbered a repeatedly 0-to-80 cycle. Another extension can be based on the multiplicative way such that LI capacity is multiplied by SN capacity. The multiplicative $SN^{\ast}$ is numbered in a repeatedly 0-to-1025 cycle.

  • PDF

A Study on the Broadcasting Statistics using the Wireless Internet Phones (무선 인터넷폰을 이용한 방송통계 시스템)

  • 김형교;강민구;박구만;송관호
    • Journal of Broadcast Engineering
    • /
    • v.7 no.1
    • /
    • pp.66-75
    • /
    • 2002
  • In this paper, a new wireless internet service for TV is proposed using the detection of a mobile agent of each mobile company Especially. new broadcasting programs like as music charts. quiz games can be serried by a mobile internet phone. In this proposed system, all mobile protocols( WAP, ME. W3C) are supported by one server based on the mobile agent detection of URL over the existed wire and wireless internees.

Implementation of Secur ed Remote EMR Medical Information using Encryption Algorithm (암호화 알고리즘을 이용한 안전한 원격 EMR 의료정보 구현)

  • Yang, Jaesoo;Lee, You-Sik;Hong, Yousik
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.4
    • /
    • pp.133-139
    • /
    • 2014
  • Nowadays, telemedicine and remote prescription has been operating as a pilot basis. However, in case of remote hospitals without encrypting the biometric data transmission and its contents, the patient prescription data hacked from hackers who changed prescription medications can be serious obstacles to the patient. Therefore, in this paper, to solve this problem, password encryption, personal identification information, biometric data security on the patient's prescription and remote medical information system, and implementation of the encryption algorithm are proposed.