• Title/Summary/Keyword: 생체 보안

Search Result 314, Processing Time 0.025 seconds

콘텐츠라인-시큐리티월드엑스포2005 개막

  • Gwon, Gyeong-Hui
    • Digital Contents
    • /
    • no.5 s.144
    • /
    • pp.100-101
    • /
    • 2005
  • ‘시큐리티월드엑스포2005’가 지난달 19일부터 21일까지 3일간 삼성동 코엑스에서 열렸다. 정보통신부가 주최하고 전자신문사가 주관한 이번 행사에는 영상보안·생체인식·무인 경비 시스템∙네트워크 보안 등 다양한 솔루션이 대거 선을 보였다. IP서베일런스와 여러 기능을 탑재한 다중 보안 시스템 등 차세대 디지털 보안장비들도 전시됐다.

  • PDF

U-헬스케어를 위한 IEEE 11073 기반 원격 생체정보 모니터링 보안 기술

  • Na, Jae-Uk;Yun, Eun-Jun;U, Yeon-Gyeong;Park, Jong-Tae
    • Information and Communications Magazine
    • /
    • v.29 no.10
    • /
    • pp.66-73
    • /
    • 2012
  • 전 세계적으로 노령인구가 급격히 증가하면서 만성질환자도 급증하고 있는 추세이다. 또한, 고도화된 현대사회와 과도한 업무, 서양화된 식습관, 그리고 운동부족은 젊은 층에서의 성인병 및 만성질환 증가를 부추기고 있다. 만성질환의 증가는 의료비 증가로 이어지고 결국은 국가재정 부담으로 돌아가게 된다. 만성질환자의 대부분은 지속적인 생체정보 측정과 이를 통한 관리가 필수적인데 매번 병원을 방문해 관리하는 것은 현실적으로나 비용적인 측면으로나 무리가 있는 것이 사실이다. 이러한 문제를 해결하고 언제 어디서나 시간과 공간에 구애받지 않고 생체정보를 원격에서 측정하고 관리 받을 수 있도록 하는 것이 U-헬스케어 서비스이다. U-헬스케어 서비스는 전통적인 의료 서비스에 정보통신 기술을 접목한 형태로 고령인구 및 만성질환자의 지속적인 관리를 위해 현재 주목 받고 있는 기술이다. U-헬스케어 서비스의 가장 중요하면서도 기본적인 요소는 원격지 사용자의 생체정보를 측정하고 수집할 수 있는 원격 생체정보 모니터링 기술이다. 이를 위해서는 다양한 종류의 생체정보 측정기기가 필요한데 장비나 시스템 간 통신 인터페이스의 상호 호환성이 매우 중요하다. 본 논문에서는 원격 생체정보 모니터링을 위한 표준 기술인 IEEE 11073 PHD를 소개하고 현재 IEEE 11073 PHD 표준에서 명시하고 있지 않은 보안 문제점과 필요 기술들을 분석하고자 한다. 또한, IEEE 11073 PHD에서 IEEE 11073-20601 표준 프로토콜을 이용한 사용자 인증 구조를 제안한다.

Biometrics for Person Authentication: A Survey (개인 인증을 위한 생체인식시스템 사례 및 분류)

  • Ankur, Agarwal;Pandya, A.-S.;Lho, Young-Uhg;Kim, Kwang-Baek
    • Journal of Intelligence and Information Systems
    • /
    • v.11 no.1
    • /
    • pp.1-15
    • /
    • 2005
  • As organizations search fur more secure authentication methods (Dr user access, e-commerce, and other security applications, biometrics is gaining increasing attention. Biometrics offers greater security and convenience than traditional methods of personal recognition. In some applications, biometrics can replace or supplement the existing technology. In others, it is the only viable approach. Several biometric methods of identification, including fingerprint hand geometry, facial, ear, iris, eye, signature and handwriting have been explored and compared in this paper. They all are well suited for the specific application to their domain. This paper briefly identifies and categorizes them in particular domain well suited for their application. Some methods are less intrusive than others.

  • PDF

Encryption of Biometrics data for Security Improvement in the User Authentication System (사용자 인증 시스템의 보안성 향상을 위한 생체인식 데이터의 암호화)

  • Park, Woo-Geun
    • Journal of IKEEE
    • /
    • v.9 no.1 s.16
    • /
    • pp.31-39
    • /
    • 2005
  • This paper presented new biometrics data transfer model, and use MD5 (Message Digest5) and RSA (Ron Rivest, Adi Shamir, Len Adleman) algorithm to improve biometrics data's security. So, did so that can run user authentication more safely. That is, do so that may input fingerprint among biometrics through client, and transmit processed fingerprint to server. When fingerprint information is transmitted, it uses MD5 algorithm to solve problem that get seized unlawful living body information from outside and information does Digest. And did to pass through process that transmit again this by RSA method. Also, experimented general text data and living body data that is not encoded, transmission speed and security of living body data that encoding and transmit each comparison. By running user authentication through such improved method, is expected to be applied in several. fields by method to simplify certification procedure and is little more correct and stable.

  • PDF

Design and Implementation of the Security System using RFID and Biometric Information (RFID 및 생체정보를 이용한 보안시스템의 설계 및 구현)

  • Choi, Jae-Kwan;Lee, Ki-Young
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.6
    • /
    • pp.251-256
    • /
    • 2010
  • In times past, simple numeric password was the commonly used method in security system. For complement this method, the security system using biometric information is appeared. But it usually uses the scheme to utilize portion of biometric information, and has limited application fields. This biometric security system has low reliability because of some problems such as steal, robbery, and so on. Furthermore, it is associated secondary crime as leaking personal information. For this reason new security system using the unique individual biometric is required. In this paper, we propose the security scheme which used face image and iris analysis. While face image processing for specific person identification, it calculate some feature points of face image and iris's features in our proposed scheme. After person identification applying RFID tags in doorway, several feature information is extracted from camera image, and these compare with registered information of our system for final identification.

User Authentication Scheme based on Security-enhanced Biometric Information for C/S System (C/S 시스템에 적합한 보안성이 강화된 생체정보 기반의 사용자 인증 스킴)

  • Yang, Hyung-Kyu
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.4
    • /
    • pp.43-53
    • /
    • 2015
  • Password-based authentication schemes for server-client system are convenient to use, but vulnerable to dictionary attack or brute-force attack. To solve this vulnerability, Cryptographic secret key is used for security, but difficult to memorize. So, for the first time, Das proposed a biometric-based authentication scheme to solve various problems but it has various vulnerabilities. Afterwards, Jiping et al. improved Das's scheme, but some vulnerabilities remain. In this paper, we analyze the cryptanalysis of Jiping et al.'s authentication scheme and then propose improved biometric based user authentication scheme to resolve the analyzed problem. Moreover, we conduct a security analysis for the proposed scheme and make a comparison between the proposed scheme and other biometric based user authentications.

Study on Security Threat and Requirement for Personal Health Management in u-Health Environment (u-헬스 환경에서 개인건강관리를 위한 보안 위협 및 요구사항에 관한 연구)

  • Kim, Soon-Seok;Park, Hong-Jin
    • Journal of Advanced Navigation Technology
    • /
    • v.14 no.4
    • /
    • pp.504-511
    • /
    • 2010
  • The personal bio-information supplied from the PHD(Personal Health Device) for personal health management is very sensitive in relation to a personal living body in an aspect of privacy protection. On the assumption thai the information is about a patient, it is more serious problem if it is revealed to a third party. However. the established ISO (International Organizations for Standardization) standard protocol[1] in October 2009 has just considered a transmission part for mutual exchange of bio-information between individuals, but has never actually considered security elements. Accordingly, this paper is to show all sorts of security threats according to personal health management in the u-health environment and security requirements newly.

The improved pre-treatment method for the finger vein pattern (지정맥 패턴 인식을 위한 개선된 전처리 방법)

  • Lee, Sunbum;Kang, Bongsoon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.365-367
    • /
    • 2016
  • Recently, the importance of personal information security has emerged. In particular, the importance of biometrics such as voice recognition, fingerprint recognition, face recognition has been highlighted in various fields such as access control, banking security, personal PC security and so on. But if such conventional security techniques are likely to be recognized by an external factor failure. In contrast, if the vein recognition is impossible to copy and counterfeit. Therefore less likely to fail due to external factors has the advantage. In this paper, propose a preprocessing method to improve on the existing vein pattern recognition with high reliability than existing biometric technologies.

  • PDF

Design and Implementation of Public Key-based u-Healthcare Transport System (공개키기반 u-Healthcare 전송 시스템의 구현 및 테스트)

  • Jung Sun-Hwa;Baek Jong-Hyuk;Park Seok-Cheon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2006.05a
    • /
    • pp.1065-1068
    • /
    • 2006
  • u-Healthcare는 의료 장비 및 센서 등을 이용하여 획득된 생체 신호 및 의료정보를 유 무선의 통신수단을 통해 지식 기반의 의료정보로 구축하고 이를 언제, 어디서, 누구든지 이용 가능한 실시간 u-Healthcare 지원 환경을 구축하여 지능형 의료정보 웹 포털 서비스를 제공하는데 목적을 두고 있는 서비스이다. 하지만 현시점에서의 시스템은 생체 신호 및 의료 정보 제공시에 보안에 대한 고려가 이루어지고 있지 않다. 이러한 자원들은 개인 프라이버시에 직결되는 것으로 보안의 필요성이 대두된다. 따라서 본 논문에서는 IP망에서 생체신호 전송을 위한 전송시스템을 설계하고 전송시 생체신호정보에 대해 사용자 인증과 암호화를 적용하여 u-Healthcare 전송시스템을 설계하고 구현하였다.

  • PDF

The implementation of Access Control System using Biometric System (생체인식 시스템을 이용한 Access Control System 구현에 관한 연구)

  • 김광환;김영길
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.2
    • /
    • pp.494-498
    • /
    • 2004
  • In this paper, a system that implementation of Access Control System Using Biometric System. Biometries is science which deals with verifying or recognizing using physiological or behavioral characteristic Access Control System uses Bionietric system to make an access control system. Biometrics goes under the study of bio-recognition or bio-measurement. It is a technology or study that identifies individuals using one's Biometric character. Access control system is a system used to identify one's entrance and exit, personal management, and security. Access control system can be joined with Biometric system to produce easier use and more sufficient effects. Access control system using Weigand (Data format) signal output, can replace earlier RF Card systems and make an access control (security) system. It uses RS-232, Rs-422 or TCP/IP type communication with the computer so an embedded system can be controlled using the software.