• Title/Summary/Keyword: Authentication and Access

Search Result 685, Processing Time 0.02 seconds

A Study on Web Accessibility Evaluation of Public Agency Homepage (공공기관 홈페이지의 웹 접근성 평가에 대한 연구)

  • Kim, Hye-ri;Lee, Sang-joon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.4
    • /
    • pp.19-25
    • /
    • 2017
  • In the reality that the use of the web is becoming commonplace, the general people are complaining about the inconvenience because they are not standardized when using the web site. Especially, the disabled people such as the social underprivileged classes people suffer from the inconvenience due to the web site that is not accessible. The purpose of this study is to conduct an authentication audit to obtain web accessibility certification mark on the homepage of a specific public institution. Through these practical cases, it is possible to improve the recognition of web accessibility by practitioners or managers, And suggest ways to improve the Aging existing public institution web sites. Although there are a lot of existing literature and previous researches, it is still not being newly produced because of lack of awareness of web accessibility, As a result, the users who access the web site of the public institution for the first time are much inconvenienced. In order to solve this problem, this paper compares the Korean web content accessibility guideline 2.1, revised in April 2015, and verified the effectiveness of the guidelines through web accessibility evaluation of specific public institution sites.

Face Tracking Method based on Neural Oscillatory Network Using Color Information (컬러 정보를 이용한 신경 진동망 기반 얼굴추적 방법)

  • Hwang, Yong-Won;Oh, Sang-Rok;You, Bum-Jae;Lee, Ji-Yong;Park, Mig-Non;Jeong, Mun-Ho
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.48 no.2
    • /
    • pp.40-46
    • /
    • 2011
  • This paper proposes a real-time face detection and tracking system that uses neural oscillators which can be applied to access regulation system or control systems of user authentication as well as a new algorithm. We study a way to track faces using the neural oscillatory network which imitates the artificial neural net of information handing ability of human and animals, and biological movement characteristic of a singular neuron. The system that is suggested in this paper can broadly be broken into two stages of process. The first stage is the process of face extraction, which involves the acquisition of real-time RGB24bit color video delivering with the use of a cheap webcam. LEGION(Locally Excitatory Globally Inhibitory)algorithm is suggested as the face extraction method to be preceded for face tracking. The second stage is a method for face tracking by discovering the leader neuron that has the greatest connection strength amongst neighbor neuron of extracted face area. Along with the suggested method, the necessary element of face track such as stability as well as scale problem can be resolved.

Privacy Protection for 5G Mobile-based IoT Users (5G 이동 통신 기반의 IoT 사용자를 위한 프라이버시 보호 기법)

  • Jeong, Yoon-Su;Yoon, Deok-Byeong;Shin, Seung-Soo
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.1
    • /
    • pp.1-7
    • /
    • 2020
  • Recently 5G technology is one of the technologies that has been receiving much positive responses from users as it is integrated with virtual technology. However, 5G's security issues have not been fully resolved and more security is soon required. In this paper, an approach technique is proposed as a probability-based hierarchy to provide personal privacy for 5G-based IoT users more safely. The proposed technique is aimed at not exposing the privacy of IoT users to third parties by using two random keys created personally by IoT users. In order to satisfy both safety and efficiency, the proposed technology divides the privacy of IoT users into two layers. In the first stage, IoT users will control access to intermediate media using anonymous keys generated by IoT users, and in the second stage, information of IoT users registered with servers will be darkened and replicated. The proposed technique has improved the accuracy of the privacy protection of IoT users as they assign weights to layered information after layering users' privacy information on a probabilistic basis.

A Study on the DID based Smart Remocon and FIDO Transaction Certification for Home-shopping (DID 기반의 스마트 리모콘과 홈쇼핑 FIDO 거래인증 연구)

  • Yeo, Hyupgoo;Kang, Mingoo;Sonh, Seungil
    • Smart Media Journal
    • /
    • v.9 no.1
    • /
    • pp.60-66
    • /
    • 2020
  • In this paper, the FIDO (Fast IDentity Online) transaction certification platform was proposed for applying the DID (Decentralized ID) of blockchain with home shopping channels to the IPTV service providers based on the Remocon (Remote Control). In this case, the DID based smart remocon applies biometric identification techniques for personal identification. These individual DID smart remote controls apply distributed ID blockchain, enabling home shopping viewers to conduct reliable ratings surveys through the detection of channel changed information. In addition, this smart remocon utilizes the product purchased information history on home shopping channels, allowing IPTV's home shopping viewers to compare the same broadcasted production information on all channels by blockchain technique and their production characteristics. IPTV service providers can process home shopping order/authorization informations in one-stop service via a number of home shopping broadcasting companies, and DID smart remote controls for home shopping viewers with the checking results of their real-time online access to confirm the FIDO2.0 transaction certification homepage. Thus, the FIDO transaction authentication platforms of IPTV service provider(Telecommunication company) can be expected to improve the benefits of home shopping customers, and to reduce the broadcasting companies' burden of payment, too.

The Mechanism of Proxy Mobile IPv4 to Minimize the Latency of Handover Using MIH Services (MIH 서비스를 활용한 Proxy Mobile IPv4의 핸드오버 지연 최소화 방안)

  • Kim, Sung-Jin;You, Heung-Ryeol;Rhee, Seuck-Ho
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2008.08a
    • /
    • pp.211-217
    • /
    • 2008
  • Recently, there are many efforts to support seamless mobility in 802.11 WLANs using IP Layer mobility protocols. The IP layer mobility protocols are the most efficient mechanism to guarantee the service session continuity when IP subnet is changed during handover. Even if the IP layer mobility protocols are quite efficient, the feature of the protocols that had been designed to consider only L3 layer makes it difficult to improve the performance of hand over more and more. Nowadays, to overcome this limitation of IP mobility protocols, many researchers have worked on the mobility protocols integration of different layers (e.g., L2 layer). In this paper, we propose the enhanced Proxy MIPv4 to minimize the latency of handover using MIH protocol in 802.11 WLANs. The proposed mechanism minimizes the latency of authentication by exchanging security keys between Access Routers during handover. Moreover, it also minimizes packet losses by Inter-AP Tunneling and data forwarding.

  • PDF