• Title/Summary/Keyword: Fingerprint Detection

Search Result 108, Processing Time 0.03 seconds

A Study on User Authentication Model Using Device Fingerprint Based on Web Standard (표준 웹 환경 디바이스 핑거프린트를 활용한 이용자 인증모델 연구)

  • Park, Sohee;Jang, Jinhyeok;Choi, Daeseon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.4
    • /
    • pp.631-646
    • /
    • 2020
  • The government is pursuing a policy to remove plug-ins for public and private websites to create a convenient Internet environment for users. In general, financial institution websites that provide financial services, such as banks and credit card companies, operate fraud detection system(FDS) to enhance the stability of electronic financial transactions. At this time, the installation software is used to collect and analyze the user's information. Therefore, there is a need for an alternative technology and policy that can collect user's information without installing software according to the no-plug-in policy. This paper introduces the device fingerprinting that can be used in the standard web environment and suggests a guideline to select from various techniques. We also propose a user authentication model using device fingerprints based on machine learning. In addition, we actually collected device fingerprints from Chrome and Explorer users to create a machine learning algorithm based Multi-class authentication model. As a result, the Chrome-based Authentication model showed about 85%~89% perfotmance, the Explorer-based Authentication model showed about 93%~97% performance.

Quality Evaluation of Moutan Cortex Radicis Using Multiple Component Analysisby High Performance Liquid Chromatography

  • Ding, Yan;Wu, Enqi;Chen, Jianbo;Nguyen, Huu-Tung;Do, Thi-Ha;Park, Kyung-Lae;Bae, Ki-Hwan;Kim, Young-Ho;Kang, Jong-Seong
    • Bulletin of the Korean Chemical Society
    • /
    • v.30 no.10
    • /
    • pp.2240-2244
    • /
    • 2009
  • A simple high performance liquid chromatographic method was developed to evaluate the quality of Moutan Cortex Radicis based on chromatographic fingerprints that characterize eight pharmacological compounds, namely, gallic acid, paeoniflorin, galloyl paeoniflorin, benzoic acid, quercetin, benzoylpaeoniflorin, paeoniflorigenone, and paeonol. These compounds were identified by their characteristic UV profiles and the mass spectroscopy data, and their contents were determined by HPLC. The chromatographic separation was performed on a $C_{18}$ column by gradient elution with 0.05% formic acid in water and acetonitrile. The methodological validation gave acceptable linearities (r = 0.9996) and recoveries (ranging from 99.4∼103.1%). The limits of detection (LOD) of these compounds ranged from 10 to 30 $\mu$g/mL. The representative chromatographic fingerprints of Moutan Cortex Radicis were obtained by analyzing 20 batches of samples collected from markets in Korea and China. For the efficient evaluation of quality for the commercial Moutan Cortex Radicis it is recommended that the total content of the six characteristic compounds should contain more than a minimum of 2% and that the content of total paeoniflorin and paeonol should exceed a minimum of 1.5% of dry weight of Moutan Cortex Radicis.

Indoor Zone Recognition System using RSSI of BLE Beacon (BLE Beacons의 RSSI를 이용한 실내 Zone인식 시스템)

  • Kim, Jinpyung;Ahn, Taeki;Kim, Sanghoon;Ahn, Chi-Hyung
    • Journal of the Korean Society for Railway
    • /
    • v.19 no.5
    • /
    • pp.585-591
    • /
    • 2016
  • Recently, indoor location detection has become an important area in the IoT (Internet of Things) environment for various indoor location-based services. In this paper, our proposed method shows that a virtual region can be divided electromagnetically according to specific facilities or services in various IoT application areas called zones. The MLP (Multi-Layer Perceptron) method is applied to recognize the service zone at the current position. The MLP utilized an RSSI (Received Signal Strength Indicator) signal of the BLE (Bluetooth Low Energy) Beacon as input data and made decisions to affiliate the zone of the current region as output. In order to verify the proposed method, we constructed an experimental environment similar in size to an actual rail station using four of the beacon and two zones.

Guided Wave THz Spectroscopy of Explosive Materials

  • Yoo, Byung-Hwa;Kang, Seung-Beom;Kwak, Min-Hwan;Kim, Sung-Il;Kim, Tae-Yong;Ryu, Han-Cheol;Jun, Dong-Suk;Paek, Mun-Cheol;Kang, Kwang-Yong;Chung, Dong-Chul
    • Journal of electromagnetic engineering and science
    • /
    • v.11 no.1
    • /
    • pp.42-50
    • /
    • 2011
  • One of the important applications of THz time-domain spectroscopy (TDS) is the detection of explosive materials through identification of vibrational fingerprint spectra. Most recent THz spectroscopic measurements have been made using pellet samples, where disorder effects contribute to line broadening, which results in the merging of individual resonances into relatively broad absorption features. To address this issue, we used the technique of parallel plate waveguide (PPWG) THz-TDS to achieve sensitive characterization of three explosive materials: TNT, RDX, and HMX. The measurement method for PPWG THz-TDS used well-established ultrafast optoelectronic techniques to generate and detect sub-picosecond THz pulses. All materials were characterized as powder layers in 112 ${\mu}m$ gaps in metal PPWG. To illustrate the PPWG THz-TDS method, we described our measurement by comparing the vibrational spectra of the materials, TNT, RDX, and HMX, applied as thin powder layers to a PPWG, or in conventional sample cell form, where all materials were placed in Teflon sample cells. The thin layer mass was estimated to be about 700 ${\mu}g$, whereas the mass in the sample cell was ~100 mg. In a laboratory environment, the absorption coefficient of an explosive material is essentially based on the mass of the material, which is given as: ${\alpha}({\omega})=[ln(I_R({\omega})/I_S({\omega}))]m$. In this paper, we show spectra of 3 different explosives from 0.2 to 2.4 THz measured using the PPWG THz-TDS.

Antibiotic Resistant Patterns and DNA Fingerprint Analysis of Acinetobacter baumannii from Clinical Isolates (임상에서 분리된 Acinetobacter baumannii의 항생제 내성 패턴과 유전학적 특징)

  • Kim, Min-Ji;Lee, Si-Won;Lee, Do-Kyung;Park, Jae-Eun;Kang, Joo-Yeon;Park, Il-Ho;Shin, Hae-Soon;Ha, Nam-Joo
    • YAKHAK HOEJI
    • /
    • v.57 no.2
    • /
    • pp.132-138
    • /
    • 2013
  • Acinetobacter baumannii is gram-negative bacilli that can be widely found in environments. Recently, A. baumannii emerged as a serious nosocomial infection. A total of 92 A. baumannii were isolated from hospitalized patients in Seoul, Korea, between December 2010 and April 2011. Antimicrobial susceptibility testing was investigated using CLSI agar dilution methods. Tigecycline non-susceptible A. baumannii isolates were investigated by repetitive extragenic palindromic sequence-based PCR (rep-PCR). Pulsed-field gel electrophoresis was performed to determine the epidemiological relationships. All clinical isolates showed high-level resistance to the most commonly used antibiotics: Ciprofloxacin (87.0%), Ampicillin/sulbactam (82.6%), Cefotaxime (81.5%), Ceftazidime (80.4%). Moreover, 50.0% of these isolates were non-susceptible to tigecycline. When evaluated by RAPD analysis, generated distinct band ranging in size from 1kb to 8k band varying from 4 to 10 bands. Stricter surveillance and more rapid detection are essential to prevent the spread of multi drug resistant A. baumannii.

Evil-Twin Detection Scheme Using SVM with Multi-Factors (다중 요소를 가지는 SVM을 이용한 이블 트윈 탐지 방법)

  • Kang, SungBae;Nyang, DaeHun;Lee, KyungHee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.2
    • /
    • pp.334-348
    • /
    • 2015
  • Widespread use of smart devices accompanies increase of use of access point (AP), which enables the connection to the wireless network. If the appropriate security is not served when a user tries to connect the wireless network through an AP, various security problems can arise due to the rogue APs. In this paper, we are going to examine the threat by evil-twin, which is a kind of rogue APs. Most of recent researches for detecting rogue APs utilize the measured time difference, such as round trip time (RTT), between the evil-twin and authorized APs. These methods, however, suffer from the low detection rate in the network congestion. Due to these reasons, in this paper, we suggest a new factor, packet inter-arrival time (PIAT), in order to detect evil-twins. By using both RTT and PIAT as the learning factors for the support vector machine (SVM), we determine the non-linear metric to classify evil-twins and authorized APs. As a result, we can detect evil-twins with the probability of up to 96.5% and at least 89.75% even when the network is congested.

A Study on the Quality Model and Metrics for Evaluating the Quality of Information Security Products (정보보호제품 품질평가를 위한 품질 모델 및 메트릭에 관한 연구)

  • Yun, Yeo-Wung;Lee, Sang-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.5
    • /
    • pp.131-142
    • /
    • 2009
  • While users of information security products require high-quality products that are secure and have high performance, there are neither examples for evaluating the quality of information security products nor studies on the quality model and metrics for the quality evaluation. In this paper, information security products are categorized into three different types and the security and performance of various information security products are analyzed. Through this process and after consideration of information security products' security and performance, a new quality model that possesses 7 characteristics and 24 sub-characteristics has been defined. In addition, metrics consisting of 62 common and 45 extended metrics that can be used to evaluate the quality of information security products are introduced, and a proposition for a method of generating the quality evaluation metrics for specific information security products is included. The method of generating metrics proposed in this paper can be extended in order to be applied to a variety of information security products, and by generating and verifying the quality evaluation metrics for firewall, intrusion detection systems and fingerprint systems it is shown that it applicable on a variety of information security products.

Trend and future prospect on the development of technology for electronic security system (기계경비시스템의 기술 변화추세와 개발전망)

  • Chung, Tae-Hwang;So, Sung-Young
    • Korean Security Journal
    • /
    • no.19
    • /
    • pp.225-244
    • /
    • 2009
  • Electronic security system is composed mainly of electronic-information-communication device, so system technology, configuration and management of the electronic security system could be affected by the change of information-communication environment. This study is to propose the future prospect on the development of technique for electronic security system through the analysis of the trend and the actual condition on the development of technique. This study is based on literature study and interview with user and provider of electronic security system, also survey was carried out by system provider and members of security integration company to come up with more practical result. Hybrid DVR technology that has multi-function such as motion detection, target tracking and image identification is expected to be developed. And 'Embedded IP camera' technology that internet server and image identification software are built in. Those technologies could change the configuration and management of CCTV system. Fingerprint identification technology and face identification technology are continually developed to get more reliability, but continual development of surveillance and three-dimension identification technology for more efficient face identification system is needed. As radio identification and tracking function of RFID is appreciated as very useful for access control system, hardware and software of RFID technology is expected to be developed, but government's support for market revitalization is necessary. Behavior pattern identification sensor technology is expected to be developed and could replace passive infrared sensor that cause system error, giving security guard firm confidence for response. The principle of behavior pattern identification is similar to image identification, so those two technology could be integrated with tracking technology and radio identification technology of RFID for total monitoring system. For more efficient electronic security system, middle-ware's role is very important to integrate the technology of electronic security system, this could make possible of installing the integrated security system.

  • PDF