• Title/Summary/Keyword: 상황인식 인증

Search Result 84, Processing Time 0.035 seconds

A Study on The Improvement of User Authentication using the Facial Recognition and OTP Technique in the Mobile Environment (모바일 환경에서 OTP기술과 얼굴인식 기술을 이용한 사용자 인증 개선에 관한 연구)

  • Huh, Seung-Pyo;Lee, Dae-Sung;Kim, Kui-Nam
    • Convergence Security Journal
    • /
    • v.11 no.3
    • /
    • pp.75-84
    • /
    • 2011
  • With the rapid development of mobile technology the use of smartphone is spreading. In order to activate mobile banking and market in the future, the most important key is a secure financial transactoin. However, because many apps are developed without security check in proportional to the spread of smartphone, security threat is inevitably high. Current smartphone banking is processed as the way of the existing public certificate or OTP technique in the mobile environment, but many security hole about current technology is pointed out steadily. Therefore, in this paper we are to improve a existing security hole by reinforcing the security through multi-factor authentication and providing a physical non-repudiation.

Improved Authentication and Data Protection Protocol of Passive RFID Security Tag and Reader (개선된 수동형 RFID 보안태그와 리더의 인증 및 데이터 보호 프로토콜)

  • Yang, Yeon-Hyun;Kim, Sun-Young;Lee, Pil-Joong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.1
    • /
    • pp.85-94
    • /
    • 2010
  • As an automatic identification technology, in which electronic tags are attached to items and system auto-identifies informations of the items using wireless communication technology, use of RFID system is increasing in various fields. According to that, related security problems are becoming important issue. Up to now, many authentication protocols have been proposed to solve security problem of RFID system. In this paper, We show that the RFID authentication protocols in [9, 10], which are compatible with Type C RFID system in ISO 18000-6 Amd1[8], are vulnerable to a spoofing attack. In addition, we propose improved protocols having small additional cost over the original protocols.

Development of an Assistant Model for Child Care Accreditation (보육시설 평가인증 조력 현황분석 및 조력체계 개발)

  • Hwang, Ock Kyeung
    • Korean Journal of Childcare and Education
    • /
    • v.3 no.2
    • /
    • pp.123-146
    • /
    • 2007
  • This study has attempted to suggest an assistant model for systematic child care accreditation. This has been carried out from the current consciousness of such needs for child care accreditation as large regional disparity in assistant level, no indication to definite contents and method of assistance, demand for assistant professionals with intensified capacity and requirement for the support of financial and human resources. Six stages of assistant process: the stage of establishment and management of preparation class, the stage of application for assistance and consultation, the stage of assistant meeting, the stage of workshop and observation to exemplary institutions, and the stage of practical application and evaluation of visiting assistance have been suggested. Particularly in order to improve the efficiency of assistance, organization of a committee of expert advisors in each area has been indicated. For the guideline of assistant management, operation of preparation class for accreditation, security of assistant committee members, provision of systematic training and assistant manual, development of supervision program and financial support have been suggested. This assistant manual will contribute to systematic and efficient conduct of assistance program of child care accreditation.

  • PDF

System for Real-time Vissage Certification (실시간 얼굴인식 시스템)

  • Lee, In-Seong;Hong, Young-Min;Song, Young-Cheol;Kim, Ji-Chan;Hong, Jeongn-Jo
    • Proceedings of the KIEE Conference
    • /
    • 2011.07a
    • /
    • pp.1997-1998
    • /
    • 2011
  • 범용적으로 쓰여지고 있는 id카드를 이용한 출입방식의 경우 카드 분실, 미소지시 또는 손상시 불편함을 초래하며 실질적인 보안의 효과를 기대하기에는 부족한 부분이 많은 실정이다. 또한 전국에 사업장을 가지고 있는 기업의 경우는 보안업체별 소스코드를 공개하지 않음에 따라 id카드를 통일하기 위하여 최초 설치 업체에 종속되는 문제점도 가지고 있다. 그리고 지문인식, 홍체인식 및 정맥인식 등은 출입통제시스템 자체의 단점과 더불어 이용자들의 불편함 그리고 정보수집에 따른 불쾌감을 발생하는 문제점을 가지고 있다. 이러한 단점을 극복할수 있는 얼굴인식 시스템의 경우 다양한 상황에서의 얼굴 검출 및 정보 처리등에 대한 문제점이 있어 정지화상이나 신분증에 화상데이타를 입력하여 비교하는 방법등에 대한 실용화가 많이 되어지고 있는 실정이나 이 역시 id카드가 없으면 출입이 허가되지 않는다는 문제점이 있다. 이러한 문제점을 극복하고 자연스러운 상태에서 인증 및 출입이 허가된다면 가장 이상적이고 경제적인 출입통제시스템 구축이 가능하므로 본 논문에서는 위 문제점에 대한 대안을 제시하고 증명을 통하여 현장에서 충분이 적용될 수 있음을 입증하고자 한다.

  • PDF

A Servey on Improvement TCP Flow Performance for Vertical Handover (버티컬핸드오버에서 TCP Flow의 성능향상을 위한 연구동향)

  • Chu, Hyun-Dong;Seok, Seung-Joon
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2009.01a
    • /
    • pp.293-296
    • /
    • 2009
  • 최근에 다양한 네트워크의 기술들이 존재하고 개발되어지고 있다. 이러한 네트워크 기술들을 효과적으로 사용하기위해서 버티컬 핸드오버가 다양한 측면에서 연구되어지고 있다. 버티컬 핸드오버는 단말기가 이종망에서 더 나은 성능을 가진 네트워크로 끊김없는 서비스를 제공하는 핸드오버 기술이다. 버티컬 핸드오버를 수행하는 동안에 라우터간 시그널링의 지연과 더불어 인증과 등록절차에 대한 시간지연으로 인하여 혼잡한 상황이 아님에도 불구하고 TCP에서는 혼잡한 상황으로 인식하여 성능이 낮아지는 문제가 발생한다. 또한, 버티컬 핸드오버를 수행하는 중에 링크의 특성이 다르고 대역폭이 달라서 패킷의 순서번호가 일치하지 않아서 잘못된 빠른 재전송(false fast retransmission:FFR) 발생하고 이러한 현상들은 TCP 처리량의 저하를 가져온다. 논문에서는 이러한 문제를 해결하기 위한 방법들에 대한 동향을 조사 해보았다.

  • PDF

RFID Anonymization Mechanism for Privacy Protection (프라이버시 보호를 위한 RFID 익명화 메커니즘)

  • Lee Dong-Hyeok;Song You-Jin
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2006.06a
    • /
    • pp.574-578
    • /
    • 2006
  • 유비쿼터스 컴퓨팅 환경에서는 센서를 통하여 실시간의 상황인식 서비스를 제공하며, 이를 위해 사용자의 위치 정보 수집이 필요하다. NTT에서는 RFID에 대한 익명화를 통한 프라이버시보호 메커니즘을 제안하였다. 그러나, 불법적으로 접근하는 리더가 존재할 경우 i값의 비동기화를 통한 태그에 대한 Random Tampering공격이 가능하다. 본 논문에서는 NTT 연구소의 RFID 익명화 방법을 개선하여 태그의 Random Tampering 공격 방지가 가능하고, 태그와 리더 상호간 인증이 가능하며, 연산 과정을 절감시킨 새로운 RFID 익명화 프로토콜을 제안한다. 제안한 방법을 통하여 보다 안전하고 효율적으로 RFID기반 센서 네트워크 환경에서 사용자의 프라이버시를 보호할 수 있다.

  • PDF

Design and Development of An Image Monitoring System in Wire/Wireless Network (유/무선 네트워크 환경상에서의 영상 감시 시스템의 설계 및 구현)

  • Baek, Sung-Geun;Lee, Sang-Bum
    • Annual Conference of KIPS
    • /
    • 2005.11a
    • /
    • pp.747-750
    • /
    • 2005
  • 본 연구에서는 가정 내에서 사용할 수 있도록 PC 를 이용한 영상 감시시스템을 설계, 구현하였다. 구현 시스템은 PC 에 접속하여 영상장비인 4 대까지의 PC 카메라를 통해 영상을 입력 받도록 설계하였으며, 입력 받은 영상에 영상처리기법을 적용하여 영상 개선이 가능하도록 하였는데, 즉 내/외부 상황을 영상으로 모니터링 할 수 있으며, 확대 기능을 추가하여 목표물의 인식을 높였다. 또한 Motion Detection 감지를 통하여 영상 데이터를 확보할 뿐만 아니라 이를 별도의 저장매체에 저장할 수 있게 하였다. 초고속 인터넷을 통한 인증과 외부에서 가정 내 상황 확인, 그리고 영상 저장이 가능한 감시 시스템을 구축하였으며, 이는 앞으로 현재 이슈가 되고 있는 홈 네트워크 시스템에서 활용될 수가 있을 것이다.

  • PDF

A Way of Unusual Gait Cognition for Life Safety (생활안전 보장을 위한 보행자의 비정상 걸음 인지 방안)

  • Kim, Su-Hee
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.11 no.2
    • /
    • pp.215-222
    • /
    • 2016
  • Research on gait recognition and its use is actively underway. This study suggests a method to recognize abnormal gaits of pedestrians. The purposes of the existing research to recognize normal steps are to measure physical activities and to validate people by their walks, but the purpose to recognize abnormal steps in this study is to insure the safe life of pedestrians. There are situations in which pedestrians are unaware of themselves vulnerable and can not ask for help. The purpose of this research is that even if pedestrians are unaware of themselves and there are no spontaneous requests for helps, it is intended for them to escape from dangers and difficulties by adopting the recent IOT technology. Hence, this study analyzes normal pace of pedestrians using the triaxial acceleration sensors, and takes ranges of their normal walking. And then, the steps of pedestrians are measured using the triaxial acceleration sensors, contrasted with their normal walking ranges, and determine whether their steps are normal or not. When it is out of the state for normal paces, a method to determine as abnormal paces is suggested.

A Study on the Certification System for Offline Stores Selling Copyrighted Contents: Copyright OK Case (정품 콘텐츠 판매 오프라인 업체 인증제도 방안 연구: 저작권 OK 사례)

  • Gyoo Gun Lim;Jae Young Choi;Woong Hee Lee
    • Information Systems Review
    • /
    • v.19 no.4
    • /
    • pp.27-42
    • /
    • 2017
  • With the rapid development in network, graphic technology, and digital technology, content industry is emerging as an important industry for new cultural development and economic development. The development in digital content technology has remarkably expanded the generation and distribution of contents, thereby creating new value and extending into a large distribution market. However, the ease of distribution and duplication, which characterizes digital technology, has increased the circulation of illegal contents due to illegal copying, theft, and alteration. The damage caused by this illegal content is severe. Currently, a copyright protection system targeting online sites is available. By contrast, no system has been established for offline companies that sell offline genuine content, which compete with online companies. The demand for content of overseas tourists is increasing due to the Korean wave craze. Nevertheless, many offline content providers have lost competitiveness due to illegal content distribution with online companies. In this study, we analyzed the case and status of similar copyright certification systems in Korea and overseas through previous research and studied a system to certify the offline genuine contents business. In addition to the case analysis, we focused on interviews obtained through in-depth interviews with the copyright stakeholders. We also developed a certification framework by establishing the certification domain, certification direction, and incentive of the certification system for offline businesses with genuine content. Selected certification direction is ethical, open, inward, store, and rigid (post evaluation). This study aimed to increase awareness among consumers about the use of genuine content and establish a transparent trading order in a healthy content market.

Design for Access Control System based on Voice Recognition for Infectious Disease Prevention (전염성 확산 차단을 위한 음성인식 기반의 출입통제시스템 설계)

  • Mun, Hyung-Jin;Han, Kun-Hee
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.7
    • /
    • pp.19-24
    • /
    • 2020
  • WHO declared a global pandemic on March 11th for Corona 19. However, there is a situation where you have to go to building for face-to-face education or seminars for economic and social activities. The first check method of COVID-19 infection is to measure body temperature, so the primary entrance and exit is blocked for near-field body temperature measurement. However, since it is troublesome to check directly, thermal camera is installed at the entrance of the building, and body temperature is measured indirectly using the infrared camera to control access. In case of middle and high schools, universities, and lifelong education center, we need a system that is possible to interoperate with attendance checks and automatically recognizes whether to wear masks and can authenticate students. We proposed the system that is to confirm whether to wear a mask with a camera that is embedded in a smart mirror, and that authenticates the user through voice recognition of the user who wants to enter the building by using voice recognition technology and determines whether to enter them or not. The proposed system can check attendance if it is linked with near-field temperature measurement and attendance check APP of student's smart phone.