• Title/Summary/Keyword: Authenticate

Search Result 289, Processing Time 0.022 seconds

Genetic identification of Sinomenium acutum based on chloroplast gene ndhF sequences

  • Ryuk, Jin Ah;Lee, Hye Won;Ko, Byoung Seob
    • The Korea Journal of Herbology
    • /
    • v.28 no.5
    • /
    • pp.1-6
    • /
    • 2013
  • Objectives : This study was conducted to identify the original Sinomini Caulis et Rhizoma plant among Stephania tetrandra, Cocculus trilobus, and Aristolochiae fangchi to develop the genetic marker for Sinomini Caulis et Rhizoma. Methods : Sinomenium acutum was identified by the classification and identification committee of the National Center for Standardization of Herbal Medicines. The chloroplast ndhF gene was amplified. We performed sequences alignment analysis of Sinomenium acutum, Stephania tetrandra, C. trilobus, and A. fangchi using BioEdit program. The SFR markers designed were consisted of SF01, SR04, and SR05 primers. Results : Many variations of Sinomeni Caulis et Rhizoma are currently commercialized as herbal medicine. We compared the base sequences of the ndhF intergenic space of chloroplast DNA with Sinomenium acutum, Stephania tetrandra, C. trilobus, and A. fangchi. According to the results, it showed that the nucleotide variations were seen in 30 genes of four species. Phylogenetic analysis revealed that 4 species were classified into five groups based on an inter-group divergence in nucleotide sequence of 9%. We developed SFR marker nucleotides enough to authenticate respective species and confirmed its application on the band size at 419 base pair. These sequence differences at corresponding positions were available genetic markers to identity the Sinomeni Caulis et Rhizoma. Conclusions : Base on these results, the ndhF region was effective in distinguishing Sinomini Caulis et Rhizoma The SFR genetic marker was useful for identifying Sinomini Caulis et Rhizoma with other species.

Development of wearable device with smart key function and convergence of personal bio-certification and technology using ECG signal (심전도 신호를 이용한 개인 바이오인증 기술 융합과 smart key 기능이 탑재된 wearable device 개발)

  • Bang, Gul-Won
    • Journal of Digital Convergence
    • /
    • v.20 no.5
    • /
    • pp.637-642
    • /
    • 2022
  • Self-authentication technology using electrocardiogram (ECG) signals is drawing attention as a self-authentication technology that can replace existing bio-authentication. A device that recognizes a digital electronic key can be mounted on a vehicle to wirelessly exchange data with a car, and a function that can lock or unlock a car door or start a car by using a smartphone can be controlled through a smartphone. However, smart keys are vulnerable to security, so smart keys applied with bio-authentication technology were studied to solve this problem and provide driver convenience. A personal authentication algorithm using electrocardiogram was mounted on a watch-type wearable device to authenticate bio, and when personal authentication was completed, it could function as a smart key of a car. The certification rate was 95 per cent achieved. Drivers do not need to have a smart key, and they propose a smart key as an alternative that can safely protect it from loss and hacking. Smart keys using personal authentication technology using electrocardiogram can be applied to various fields through personal authentication and will study methods that can be applied to identification devices using electrocardiogram in the future.

Study on Message Exposure to Administrator in Secure Messaging Protocol MLS (보안 메시징 프로토콜 MLS에서 관리자에 메시지노출에 관한 연구)

  • Kwon, Songhui;Choi, Hyoung-Kee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.2
    • /
    • pp.255-266
    • /
    • 2022
  • Messenger applications applied end-to-end encryption on their own to prevent message exposure to servers. Standardization of a group messaging protocol called Message Layer Security (MLS) with end-to-end encryption is being discussed for secure and efficient message communication. This paper performs safety checks based on the operation process and security requirements of MLS. Confidentiality to a middleman server, which is an essential security requirement in messenger communication, can be easily violated by a server administrator. We define a server administrator who is curious about the group's communication content as a curious admin and present an attack in which the admin obtains a group key from MLS. Reminds messenger application users that the server can view your communication content at any time. We discuss ways to authenticate between users without going through the server to prevent curious admin attacks.

Analysis and Improved Solution of Hussian et al.'s Authentication Protocol for Digital Rights Management

  • Mi-Og Park
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.5
    • /
    • pp.67-74
    • /
    • 2023
  • In this paper, we analyze the authentication protocol for DRM proposed by Hussain et al. in 2022, and present an improved solution. Hussain et al. argued that their authentication protocol guarantees man-in-the-middle attack, replay attacks, and mutual authentication. However, as a result of analyzing Hussain et al.'s authentication protocol in this paper, Hussain et al.'s authentication protocol still has an insider attack problem, a problem with Yu et al.'s authentication protocol that they pointed out. For this reason, when an inside attacker acquires information on a mobile device, a user impersonation attack was also possible. In addition, there were problems with the user's lack of ID format verification and the problem of the secret key mismatch of the digital contents between the server and the user. Therefore, this paper proposes an improved solution to solve these problems. As a result of analysis in this paper, the improved solution is safe from various attacks such as smart card attack, insider attack, and password guessing attack and can safely authenticate users of DRM.

A Study on the Rural Tourism Education in the Korea National Agricultural College (한국농업전문학교 농촌관광교육에 관한 연구)

  • Kwon, Young-Hyoo;Suh, Gyu-Sun
    • Journal of Practical Agriculture & Fisheries Research
    • /
    • v.6 no.1
    • /
    • pp.3-16
    • /
    • 2004
  • The objective of this study was to investigate the necessity of rural tourism education in the Korea National Agricultural College and suggest the educational plan. Recently, the Korean government proposes the rural tourism as an alternative plan for solving the problems of agriculture and rural community that experience difficulty by the opening of agricultural market and the falling price, etc. As result of investigation of cases of OECD nations and the growth rate of tourism market in Korea, it has been determined that the demand of rural tourism was sufficient. The Ministry of Agriculture & Forestry makes a goal of attracting the yearly 150million tourists by 2013 to the rural communities. Rural tourism can be new income source in the rural communities in Korea. It is important to develop the resources in the rural amenity and promote the tourism leader group with it that will be applicable in the field in order that this rural tourism may take its place as main source of income. As a result of research, on the characteristics of the Korea National Agricultural College that the demand of manpower about the rural tourism and the most of students settled down on the rural community after their graduation, it has been determined that the education for rural tourism leaders in the Korea National Agricultural College would authenticate the validity. Also, it suggested the educational plan by the curriculum for the education for the rural tourism leaders, and suggested the necessity of the establishment of the department of rural tourism. The establishment of the department of rural tourism in the Korea National Agricultural College should be investigated and determined carefully through the relations with the other departments and the process of collecting the public opinions within and outside schools, etc.

Analysis to a Remote User Authentication Scheme Using Smart Cards (스마트 카드를 이용한 사용자 인증 스킴의 안전성 분석)

  • An, Young-Hwa;Lee, Kang-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.3
    • /
    • pp.133-138
    • /
    • 2009
  • Recently Lin et al. proposed the remote user authentication scheme using smart cards. But the proposed scheme has not been satisfied security requirements considering in the user authentication scheme using the password based smart card. In this paper, we showed that he can get the user's password using the off-line password guessing attack on the scheme when the adversary steals the user's smart card and extracts the information in the smart card. Also, we proposed the seven security requirements for evaluating remote user authentication schemes using smart card. As a result of analysis, in Lin et al's scheme we have found the deficiencies of security requirements. So we suggest the improved scheme, the mutual authentication scheme that does not store the user's password verifier in server and can authenticate each other at the same time between the user and server.

Key-Agreement Protocol between IoT and Edge Devices for Edge Computing Environments (에지 컴퓨팅 환경을 위한 IoT와 에지 장치 간 키 동의 프로토콜)

  • Choi, Jeong-Hee
    • Journal of Convergence for Information Technology
    • /
    • v.12 no.2
    • /
    • pp.23-29
    • /
    • 2022
  • Recently, due to the increase in the use of Internet of Things (IoT) devices, the amount of data transmitted and processed to cloud computing servers has increased rapidly. As a result, network problems (delay, server overload and security threats) are emerging. In particular, edge computing with lower computational capabilities than cloud computing requires a lightweight authentication algorithm that can easily authenticate numerous IoT devices.In this paper, we proposed a key-agreement protocol of a lightweight algorithm that guarantees anonymity and forward and backward secrecy between IoT and edge devices. and the proposed algorithm is stable in MITM and replay attacks for edge device and IoT. As a result of comparing and analyzing the proposed key-agreement protocol with previous studies, it was shown that a lightweight protocol that can be efficiently used in IoT and edge devices.

AI Automation Smart Access Management System using Personal Authentication and Heat Detector (AI자동화 개인 인증 및 발열 감지기를 이용한 스마트 출입 관리 시스템)

  • Lee, Hyo-Jai;Hong, Changho;Cho, Sung Ho;Kim, Eungsuk
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.272-274
    • /
    • 2021
  • Recently, due to COVID-19, the use of non-face-to-face authentication and fever detection systems is increasing. As the number of confirmed cases increases, the government is making it mandatory to authenticate and install a fever detector. It is used for entering and leaving not only general restaurants but also all stores. However, in most cases, the heat detector and the authentication device are separately configured and used, which is very inconvenient. Therefore, this study was conducted to develop an access control system that can simultaneously perform these functions. A smart access control system was developed by combining IOT technology as well as a fever detection function and smart personal recognition function. It is expected to further develop K-Quarantine by distributing it to public facilities and nursing facilities in the future.

  • PDF

Proposal of elevator calling intelligent IoT system using smartphone Bluetooth (스마트폰 블루투스를 이용한 승강기 호출 지능형 IoT 시스템 제안)

  • Si Yeon Kim;Sun-Kuk Noh
    • Smart Media Journal
    • /
    • v.13 no.1
    • /
    • pp.60-66
    • /
    • 2024
  • The Internet of Things, which began by connecting sensors through a network, is developing into an intelligent IoT by combining it with artificial intelligence technology. Elevators are essential for high-rise buildings in the city, and elevators move from floor to floor and perform the functions of transporting goods and moving users. It is necessary to provide safe and convenient services for elevator users in high-rise buildings or special environments (hospitals, etc.). In an environment where rapid patient transportation is important, such as large hospitals, there is a problem that hospital staff and the general public often use the elevator for patients. In particular, when moving patients where golden time is important, the waiting time to board the elevator is a major hindrance. In order to solve this problem, this study proposes an intelligent IoT system for elevator calling using smartphone Bluetooth. First, we experimented with the elevator calling IoT system using smartphone Bluetooth, and as a result of the experiment, it was confirmed that it can authenticate elevator users and reduce unnecessary waiting time for boarding. In addition, we propose an intelligent IoT system that connects with intelligent IoT.

Ensuring Consumer Safety: Molecular Authentication of Eurycoma longifolia Derivative Products in the Wood Science and Technology Industry

  • Arida SUSILOWATI;Henti Hendalastuti RACHMAT;Kusumadewi Sri YULITA;Asep HIDAYAT;Susila SUSILA;Nawwall ARROFAHA;Irsyad KAMAL;Fifi Gus DWIYANTI
    • Journal of the Korean Wood Science and Technology
    • /
    • v.52 no.4
    • /
    • pp.343-362
    • /
    • 2024
  • Eurycoma longifolia (pasak bumi) is a popular medicinal plant in Indonesia and is widely used in various products. Its high economic value has caused illegal harvesting and product falsification. Using molecular techniques, the authentication and traceability of E. longifolia derivatives can be controlled to ensure consumer safety. Therefore, this study aimed to authenticate the products and derivatives of E. longifolia (pasak bumi) produced, marketed, and consumed in Indonesia using molecular identification techniques. Genomic DNA from 37 leaf samples collected from the Sumatran mainland and the Riau Islands and six E. longifolia products were amplified and sequenced using trnL-trnF and internal transcribed spacer (ITS) regions. The results revealed that all leaf samples were indeed E. longifolia based on the markers used, with the six products, only the herbal tea product (sample code TCPB) was most likely derived from E. longifolia based on the two regions, suggesting that not all products labelled as E. longifolia in the market are authentic. The results also indicated that several other plants species are used as substitutes or adulterants, including Simaba spp., Simarouba spp., Homalolepis spp., Vernonia gigantea, Elephantopus scaber, Gymnanthemum amygdalinum, Cyanthillium spp., Potentilla lineata, Ailanthus altissima, Geijera paniculata, Hannoa chlorantha, and Dalbergia spp. Klebsiella pneumoniae bacteria were also identified in this study on the outer wooden cup of E. longifolia products. Therefore, this molecular approach is effective in identifying the authenticity of E. longifolia products, with trnL-trnF and ITS as the recommended DNA markers.