• Title/Summary/Keyword: 사용자 인증기능

Search Result 430, Processing Time 0.025 seconds

Design and Implementation of J2ME-based Wired/Wireless Interworking Mobile Wallet (J2ME 기반 유.무선 연동의 모바일 전자지갑 설계 및 구현)

  • Park, Nam-Je;Song, You-Jin
    • The KIPS Transactions:PartC
    • /
    • v.9C no.5
    • /
    • pp.687-698
    • /
    • 2002
  • Together with the activation of wireless Internet, the interest for various integrated methods of the existing wired and wireless e-commerces is on the rise. For the integrated wired and wireless e-commerce, firstly, the optimized security and authentication under the radio communication environment should be decided. And also the user-friendly usage is important. In this paper, we designed and implemented wired and wireless interworking Mobile Wallet on terminal that can be used through both wired and wireless methods by developing electronic wallet module for electronic payment using MIDP (Mobile Information Device Profile) based on J2ME (Java 2 Micro Edition). The characteristics of mobile wallet implemented in this paper provide the stability through encoding/decoding payment information and on-line usage on wired/wireless environments through downloading electronic wallet. In addition, we also present safe and convenient payment method for e-commerce based on wired/wireless Internet.

Design and Implementation of High Throughput Geographical Handoff Using GPS Information (GPS정보를 이용한 위치기반 핸드오프의 설계 및 구현)

  • Han, Seung-ho;Yang, Seung-chur;Kim, Jong-duok
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.80-83
    • /
    • 2009
  • The most popular communication protocol is those defined by the IEEE 802.11 WLAN to support broadband internet connection. The demand for real-time multimedia service is increasing through WLAN on the road. The Hand-off function of mobile terminal is essential to support mobility. But, the hand-off function of IEEE 802.11 WLANs has the latency up to 300ms, and recent research has focusing on channel scanning and reconnection to AP and certification process of AP. It is also the lack of consideration in related works that hand-off happens frequently when the mobile node is moving. This paper proposed the hand-off algorithm that guarantees high throughput and estimates the point which may occur hand-off using GPS information and RSSI. We implement the proposed hand-off function that achieves the best performance.

  • PDF

SoC Implementation of Fingerprint Feature Extraction System with Ridge Following (융선추적을 이용한 지문 특징점 추출기의 SoC 구현)

  • 김기철;박덕수;정용화;반성범
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.5
    • /
    • pp.97-107
    • /
    • 2004
  • This paper presents an System-on-Chip(SoC) implementation of fingerprint feature extraction system. Typical fingerprint feature extraction systems employ binarization and thinning processes which cause many extraction errors for low qualify fingerprint images and degrade the accuracy of the entire fingerprint recognition system. To solve these problems, an algorithm directly following ridgelines without the binarization and thinning process has been proposed. However, the computational requirement of the algorithm makes it hard to implement it on SoCs by using software only. This paper presents an implementation of the ridge-following algorithm onto SoCs. The algorithm has been modified to increase the efficiency of hardwares. Each function block of the algorithm has been implemented in hardware or in software by considering its computational complexity, cost and utilization of the hardware, and efficiency of the entire system. The fingerprint feature extraction system has been developed as an IP for SoCs, hence it can be used on many kinds of SoCs for smart cards.

A Role-Based Delegation Model Using Role Hierarchy with Restricted Permission Inheritance (권한상속제한 역할계층을 이용한 역할기반 위임 모델)

  • 박종순;이영록;이형효;노봉남;조상래
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.4
    • /
    • pp.129-138
    • /
    • 2003
  • Role-Based Access Control(RBAC) model is becoming a promising model for enterprise environments with various organization structures. In terms of role hierarchy, each senior role inherits all the permissions of its junior roles in the role hierarchy, and a user who is a member of senior role is authorized to carry out the inherited permissions as well as his/her own ones. But there is a possibility for senior role members to abuse permissions. Since senior role members need not have all the authority of junior roles in the real world, enterprise environments require a restricted inheritance rather than a unconditional or blocked inheritance. In this paper, we propose a new role-based delegation model using the role hierarchy model with restricted inheritance functionality, in which security administrator can easily control permission inheritance behavior using sub-roles. Also, we describe how role-based user-to-user, role-to-role delegations are accomplished in the model and the characteristics of the proposed role-based delegation model.

Proposal of Hostile Command Attack Method Using Audible Frequency Band for Smart Speaker (스마트 스피커 대상 가청 주파수 대역을 활용한 적대적 명령어 공격 방법 제안)

  • Park, Tae-jun;Moon, Jongsub
    • Journal of Internet Computing and Services
    • /
    • v.23 no.4
    • /
    • pp.1-9
    • /
    • 2022
  • Recently, the functions of smart speakers have diversified, and the penetration rate of smart speakers is increasing. As it becomes more widespread, various techniques have been proposed to cause anomalous behavior against smart speakers. Dolphin Attack, which causes anomalous behavior against the Voice Controllable System (VCS) during various attacks, is a representative method. With this method, a third party controls VCS using ultrasonic band (f>20kHz) without the user's recognition. However, since the method uses the ultrasonic band, it is necessary to install an ultrasonic speaker or an ultrasonic dedicated device which is capable of outputting an ultrasonic signal. In this paper, a smart speaker is controlled by generating an audio signal modulated at a frequency (18 to 20) which is difficult for a person to hear although it is in the human audible frequency band without installing an additional device, that is, an ultrasonic device. As a result with the method proposed in this paper, while humans could not recognize voice commands even in the audible band, it was possible to control the smart speaker with a probability of 82 to 96%.

Experimental verification of inverter's optimal controller for driving 150kW SPMSM of EGR blower of Green-ships (친환경 선박 EGR 블로워용 150kW SPMSM 구동 인버터 최적제어기의 실험적 검증)

  • Sehwan, Kim;Yeonwoo, Kim;Minjae, Kim;Uihyung, Yi;Sungwon, Lee
    • Journal of IKEEE
    • /
    • v.26 no.4
    • /
    • pp.596-601
    • /
    • 2022
  • The application of the EGR system is increasing according to the recent trend of conversion to green-ships. EGR blower, one of the core parts of the EGR, consists of aerodynamic system and e-motor and inverter and etc. For the e-motor, a permanent magnet type synchronous motor with high energy density and excellent efficiency is applied recently. Small and medium-sized enterprises trying to develop the e-motors, however, for marine inverters mostly developed by global advanced companies due to the rigid classification certification and technical difficulties. One of disadvantage of universal inverters is that when optimal control fails, it is difficult to find the cause from user's point of view. Therefore, in this study, optimal controllers(Current vector contol and Tracking observer) for SPMSM for EGR blower was designed and verified to analyze the causes of failure of optimal control of universal inverter.

Contactless Access Certification Management System for Infection Control in Special Rooms in Medical Institutions (의료기관 특수실 감염관리를 위한 비접촉 출입인증 관리 시스템)

  • Lee, Hyo-Seung;Choi, Woo-Jin
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.17 no.2
    • /
    • pp.387-392
    • /
    • 2022
  • In addition to complying with access standards for facilities that require infection control (operating rooms, delivery rooms, intensive care units, etc.) in accordance with the 2019 Medical Care Act Enforcement Regulations, entry, exit, contact information, etc. for entry and exit, the criteria for entering and exiting special rooms of medical institutions have been revised so that records of facts are kept for one year. However, even now, the inconvenience continues due to the fact that such contents are created by hand or due to errors. For this reason, this study designed and implemented a system that provides automatic opening, closing, and accessing record storage functions for authorized users using IoT devices and UWB technology, and we expected that the convenience of the visitors and systemized access control will be possible.

Three Steps Polyalphabetic Substitution Cipher Practice Model using Vigenere Table for Encryption (Vigenere 테이블을 이용한 3단계 다중 알파벳 치환 암호화 모델)

  • Nguyen Huu Hoa;Dang Quach Gia Binh;Do Yeong Kim;Young Namgoong;Si Choon Noh
    • Convergence Security Journal
    • /
    • v.22 no.3
    • /
    • pp.33-39
    • /
    • 2022
  • Recently, cyberattacks on infrastructure have been continuously occurring with the starting of neutralizing the user authentication function of information systems. Accordingly, the vulnerabilities of system are increasing day by day, such as the increase in the vulnerabilities of the encryption system. In this paper, an alternative technique for the symmetric key algorithm has been developed in order to build the encryption algorithm that is not easy for beginners to understand and apply. Vigenere Cipher is a method of encrypting alphabetic text and it uses a simple form of polyalphabetic substitution. The encryption application system proposed in this study uses the simple form of polyalphabetic substitution method to present an application model that integrates the three steps of encryption table creation, encryption and decryption as a framework. The encryption of the original text is done using the Vigenère square or Vigenère table. When applying to the automatic generation of secret keys on the information system this model is expected that integrated authentication work, and analysis will be possible on target system. ubstitution alphabets[3].

A Study on Releasing Cryptographic Key by Using Face and Iris Information on mobile phones (휴대폰 환경에서 얼굴 및 홍채 정보를 이용한 암호화키 생성에 관한 연구)

  • Han, Song-Yi;Park, Kang-Ryoung;Park, So-Young
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.44 no.6
    • /
    • pp.1-9
    • /
    • 2007
  • Recently, as a number of media are fused into a phone, the requirement of security of service provided on a mobile phone is increasing. For this, conventional cryptographic key based on password and security card is used in the mobile phone, but it has the characteristics which is easy to be vulnerable and to be illegally stolen. To overcome such a problem, the researches to generate key based on biometrics have been done. However, it has also the problem that biometric information is susceptible to the variation of environment, whereas conventional cryptographic system should generate invariant cryptographic key at any time. So, we propose new method of producing cryptographic key based on "Biometric matching-based key release" instead of "Biometric-based key generation" by using both face and iris information in order to overcome the unstability of uni-modal biometries. Also, by using mega-pixel camera embedded on mobile phone, we can provide users with convenience that both face and iris recognition is possible at the same time. Experimental results showed that we could obtain the EER(Equal Error Rate) performance of 0.5% when producing cryptographic key. And FAR was shown as about 0.002% in case of FRR of 25%. In addition, our system can provide the functionality of controlling FAR and FRR based on threshold.

Design and Implementation of Library Information System Using Collective Intelligence and Cloud Computing (집단지성과 클라우드 컴퓨팅을 활용한 도서관 정보시스템 설계 및 구현)

  • Min, Byoung-Won
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.11
    • /
    • pp.49-61
    • /
    • 2011
  • In recent, library is considered as an integrated knowledge convergence center that can respond to various requests about information service of users. Therefor it is necessary to establish a novel information system based on information communications technologies of the era. In other words, it is currently required to develop mobile information service available in portable devices such as smart phones or tablet PCs, and to establish information system reflecting cloud computing, SaaS, Annotation, and Library 2.0 etc. In this paper we design and implement a library information system using collective intelligence and cloud computing. This information system can be adapted for the varieties of mobile service paradigm and abruptly increasing amount of electronic materials. Advantages of this concept model are resource sharing, multi-tenant supporting, configuration, and meta-data supporting etc. In addition it can offer software on-demand type user services. In order to test the performance of our system, we perform an effectiveness analysis and TTA authentication test. The average response time corresponding to variance of data reveals 0.692 seconds which is very good performance in timing effectiveness point of view. And we detect maturity level-3 or 4 authentication in TTA tests such as SaaS maturity, performance, and application programs.