• Title/Summary/Keyword: Automatic Authentication

Search Result 60, Processing Time 0.023 seconds

Measuring and Analyzing WiMAX Security adopt to Wireless Environment of U-Healthcare (유헬스케어의 무선환경에 적합한 WiMAX 보안 측정 및 분석)

  • Jeong, Yoon-Su
    • Journal of Digital Convergence
    • /
    • v.11 no.3
    • /
    • pp.279-284
    • /
    • 2013
  • Wireless access network section needs strong security which supports high data rate and mobility not to invade patient's privacy by exposing patient's sensitive biometric from automatic implantable device that is adapted to u-healthcare service. This paper builds test bed and performs assessment and measurement of security ability of WiMAX network to transmit and receive mobile patient's biometric by building WiMAX network in wireless access network not to expose paitne's biometirc at wireless access network section to the third person. Specially, this paper compares and assesses data security, MAC control message security, handover conection delay, and frame loss and bandwidth of ECDH at the layer of WiMAX security compliance, WiMAX MAC IPSec, and MAC.

Development of Real-time Environment Monitoring System Using 3G Integrated Environmental Sensors Based on AWS (AWS기반 3G 통합환경센서 모듈을 이용한 실시간 환경 모니터링 시스템 개발)

  • Chun, Seung-Man;Lee, Seung-Jun;Yun, Jang-Kyu;Suk, Soo-Young
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.13 no.2
    • /
    • pp.101-107
    • /
    • 2018
  • As indoor pollutants such as carbon dioxide and dust mainly affect the respiratory and circulatory systems, there is an increasing need for real-time indoor / outdoor environmental monitoring. In this paper, we have developed a real - time environmental monitoring system using the cloud-based 3G integrated environmental sensor module for environmental monitoring. A highly reliable environmental information monitoring system requires various IT technologies such as infrastructure (server, commercial software, etc.), service application software, security, and authentication. A real-time environment monitoring system based on cloud service that can provide reliable service satisfying these configuration requirements is proposed and implemented. It is expected that this system can be applied to various technologies such as indoor automatic window opening/closing system based on the Internet.

Network 2-Factor Access Control system based on RFID security control system (RFID 출입통제시스템과 연동한 네트워크 이중 접근통제 시스템)

  • Choi, Kyong-Ho;Kim, Jong-Min;Lee, Dae-Sung
    • Convergence Security Journal
    • /
    • v.12 no.3
    • /
    • pp.53-58
    • /
    • 2012
  • Network Access Control System that is one of the efforts to protect the information of internal applies to effectively control of insider and automatic network management and security. However, it has some problems : spoofing the authorized PC or mobile devices, connect to the internal network using a system that authorized users are away. In addition, information leakage due to malicious code in the same system. So in this paper, Network 2-Factor Access Control System based on RFID security control system is proposed for safety communication environment that performing a two-factor authentication using authorized user and devices to connect to the internal network.

Design and Implementation of a Secure Software Architecture for Security Patch Distribution (안전한 보안패치 분배 구조의 설계 및 구현)

  • 손태식;서정우;문종섭;서정택;임을규;이철원
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.4
    • /
    • pp.47-62
    • /
    • 2003
  • Patch distribution is one of important processes to fix vulnerabilities of software and to ensure security of systems. Since an institute or a company has various operating systems or applications, it is not easy to update patches promptly. In this paper, we propose a secure patch distribution architecture with an authentication mechanism, a security assurance mechanism, a patch integrity assurance mechanism, and an automatic patch installation mechanism. We argue that the proposed architecture improve security of patch distribution processes within a domain.

Design and Implementation of Multi-functional Java Card for AMR (원격검침을 위한 다기능 자바카드 설계 및 구현)

  • Kang, Hwan-Soo;Cho, Jin-Hyung;Kwon, Kwi-Seok;Lee, Jong-Man;Kang, Hwan-Il
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.8
    • /
    • pp.64-72
    • /
    • 2009
  • AMR(Automatic Meter Reading), which means that it reads the meter of electricity, gas, or water, etc at a remote place automatically through wired or wireless communication, has been studied in terms of Power Line Communication method and Local Area Wireless Communication method, etc. In this paper, we designed and implemented JCA(Java Card for AMR) capable of AMR, which is based on java Card technology indispensable to the ubiquitous world. In this paper, JCA follows standard transactional procedures offered by power supply company and manages power usage log and billing data, and is designed in order to satisfy EMV multi-functional specifications. Because JCA is a multi-functional smart card capable of post-issuance applets as an open platform, it is installed into other applications of affiliated concerns as well as credit card and traffic card applications. Not only the proposed JCA is a low cost system, compared to other AMR systems, but is capable of paying rates in advance or later by applying authentication and security function of java Card. In addition the proposed JCA system can create value added services such as affiliated services with corporate alliance.

Vehicle Emergency Lamp Fuzzy Control Systems Using The GPS (GPS를 이용한 자동차 비상등 작동 장치)

  • Kwon, Yunjung;Nam, Sangyep
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.6
    • /
    • pp.276-281
    • /
    • 2014
  • Necessities of a traffic means work a car in the modern society human to an usability of a life is enjoying. On the other hand, the damage by traffic accident increment the human quotient worked as we were in proportion to the vehicle which increased. Passing an examination moves necessarily on an obstacle to suddenly appear at the fronts if a car travels and the vehicles which stopped suddenly. Dynamic passing an examination about an obstacle turn on Vehicle Emergency Lamp to by hand when is unhurried, and can turn off, but to appear urgently dynamic passing an examination in time human is instinctive, but cannot inform an emergency to a back vehicle, and a rear-end collision occurs. A car we synthesize a speed of a vehicle, and this unit analyzes as we use GPS, and to drive runs Vehicle Emergency Lamp to automatic in the situations that shall turn on emergencies etc. If a speed of a vehicle continuously slows down in too high-speed driving or low-speed driving, or we are stopped, Vehicle Emergency Lamp is always turned on. It was built if we rise again as clearing itself from risk, and a speed of a vehicle judges, and we turn off Vehicle Emergency Lamp to automatic. It runs till rear-end collision sensor operates, and by hand reset does Vehicle Emergency Lamp a driving vehicle collides from behind to a back vehicle or when a driving vehicle was overthrown. It is shortened very much to the chain rear-end collision traffic accident that is a traffic accident of large size if we use this unit. And we did authentication through the experiment which a driver was helpful to unnecessary operation and a relaxed safe driving during drivings.

DNA fingerprinting analysis for soybean (Glycine max) varieties in Korea using a core set of microsatellite marker (핵심 Microsatellite 마커를 이용한 한국 콩 품종에 대한 Fingerprinting 분석)

  • Kwon, Yong-Sham
    • Journal of Plant Biotechnology
    • /
    • v.43 no.4
    • /
    • pp.457-465
    • /
    • 2016
  • Microsatellites are one of the most suitable markers for identification of variety, as they have the capability to discriminate between narrow genetic variations. The polymorphism level between 120 microsatellite primer pairs and 148 soybean varieties was investigated through the fluorescence based automatic detection system. A set of 16 primer pairs showed highly reproducible polymorphism in these varieties. A total of 204 alleles were detected using the 16 microsatellite markers. The number of alleles per locus ranged from 6 to 28, with an average of 12.75 alleles per locus. The average polymorphism information content (PIC) was 0.86, ranging from 0.75 to 0.95. The unweighted pair group method using the arithmetic averages (UPGMA) cluster analysis for 148 varieties were divided into five distinctive groups, reflecting the varietal types and pedigree information. All the varieties were perfectly discriminated by marker genotypes. These markers may be useful to complement a morphological assessment of candidate varieties in the DUS (distinctness, uniformity and stability) test, intervening of seed disputes relating to variety authentication, and testing of genetic purity in soybean varieties.

Evaluation of AFDX Certification Support System by both AFDX Tap and AFDX Analyzer (AFDX Tap과 AFDX 프로토콜 분석기를 이용한 AFDX 네트워크 인증 기술)

  • Park, Pusik;Son, Myeonghwan;Lee, Jeongdo;Yoon, Jongho
    • Journal of Aerospace System Engineering
    • /
    • v.16 no.1
    • /
    • pp.1-11
    • /
    • 2022
  • Avionics Full-DupleX Ethernet (AFDX) is a next-generation avionics network interface technology that is widely applied in the latest aircraft to replace ARINC429 and MIL-STD-1553B. However, the criteria for authenticating an avionics network consisting of AFDX are very scarce. Using AFDX Protocol Analyzer developed by the Korea Electronics Technology Research Institute and AFDX Tap developed by the Korea Aerospace University, we proposed a technology of certification practicality that can verify the normal functioning of avionics equipment with AFDX network interface. Our proposed technology provided the ability to collect precision packets, to verify AFDX specification compliance, and perform automatic tests to reduce the time and cost of authentication of AFDX avionics devices.

Recognition of Resident Registration Card using ART2-based RBF Network and face Verification (ART2 기반 RBF 네트워크와 얼굴 인증을 이용한 주민등록증 인식)

  • Kim Kwang-Baek;Kim Young-Ju
    • Journal of Intelligence and Information Systems
    • /
    • v.12 no.1
    • /
    • pp.1-15
    • /
    • 2006
  • In Korea, a resident registration card has various personal information such as a present address, a resident registration number, a face picture and a fingerprint. A plastic-type resident card currently used is easy to forge or alter and tricks of forgery grow to be high-degree as time goes on. So, whether a resident card is forged or not is difficult to judge by only an examination with the naked eye. This paper proposed an automatic recognition method of a resident card which recognizes a resident registration number by using a refined ART2-based RBF network newly proposed and authenticates a face picture by a template image matching method. The proposed method, first, extracts areas including a resident registration number and the date of issue from a resident card image by applying Sobel masking, median filtering and horizontal smearing operations to the image in turn. To improve the extraction of individual codes from extracted areas, the original image is binarized by using a high-frequency passing filter and CDM masking is applied to the binaried image fur making image information of individual codes better. Lastly, individual codes, which are targets of recognition, are extracted by applying 4-directional contour tracking algorithm to extracted areas in the binarized image. And this paper proposed a refined ART2-based RBF network to recognize individual codes, which applies ART2 as the loaming structure of the middle layer and dynamicaly adjusts a teaming rate in the teaming of the middle and the output layers by using a fuzzy control method to improve the performance of teaming. Also, for the precise judgement of forgey of a resident card, the proposed method supports a face authentication by using a face template database and a template image matching method. For performance evaluation of the proposed method, this paper maked metamorphoses of an original image of resident card such as a forgey of face picture, an addition of noise, variations of contrast variations of intensity and image blurring, and applied these images with original images to experiments. The results of experiment showed that the proposed method is excellent in the recognition of individual codes and the face authentication fur the automatic recognition of a resident card.

  • PDF

A Study on Touchless Finger Vein Recognition Robust to the Alignment and Rotation of Finger (손가락 정렬과 회전에 강인한 비 접촉식 손가락 정맥 인식 연구)

  • Park, Kang-Ryoung;Jang, Young-Kyoon;Kang, Byung-Jun
    • The KIPS Transactions:PartB
    • /
    • v.15B no.4
    • /
    • pp.275-284
    • /
    • 2008
  • With increases in recent security requirements, biometric technology such as fingerprints, faces and iris recognitions have been widely used in many applications including door access control, personal authentication for computers, internet banking, automatic teller machines and border-crossing controls. Finger vein recognition uses the unique patterns of finger veins in order to identify individuals at a high level of accuracy. This paper proposes new device and methods for touchless finger vein recognition. This research presents the following five advantages compared to previous works. First, by using a minimal guiding structure for the finger tip, side and the back of finger, we were able to obtain touchless finger vein images without causing much inconvenience to user. Second, by using a hot mirror, which was slanted at the angle of 45 degrees in front of the camera, we were able to reduce the depth of the capturing device. Consequently, it would be possible to use the device in many applications having size limitations such as mobile phones. Third, we used the holistic texture information of the finger veins based on a LBP (Local Binary Pattern) without needing to extract accurate finger vein regions. By using this method, we were able to reduce the effect of non-uniform illumination including shaded and highly saturated areas. Fourth, we enhanced recognition performance by excluding non-finger vein regions. Fifth, when matching the extracted finger vein code with the enrolled one, by using the bit-shift in both the horizontal and vertical directions, we could reduce the authentic variations caused by the translation and rotation of finger. Experimental results showed that the EER (Equal Error Rate) was 0.07423% and the total processing time was 91.4ms.