• Title/Summary/Keyword: Fingerprint Mechanism

Search Result 18, Processing Time 0.022 seconds

A Study of Behavior Based Authentication Using Touch Dynamics and Application Usage on Android (안드로이드에서 앱 사용과 터치 정보를 이용한 행위 기반 사용자 인증 기술 연구)

  • Kim, Minwoo;Kim, Seungyeon;Kwon, Taekyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.2
    • /
    • pp.361-371
    • /
    • 2017
  • The increase in user data stored in the device implies the increase in threats of users' sensitive data. Currently, smartphone authentication mechanisms such as Pattern Lock, fingerprint recognition are widely used. Although, there exist disadvantages of inconvenience use and dependence that users need to depend on their own memory. User behavior based authentication mechanism have advantages of high convenience by offering continuous authentication when using the mobile device. However, these mechanisms show limitations on low accuracy of authentication and there are researches to improve the accuracy. This paper proposes improved authentication mechanism that uses user's smartphone application usage pattern which has not considered on earlier studies. Also, we analyze performance of proposed mechanism with collected datasets from actual use of smartphone applications.

Security Analysis to an Biometric Authentication Protocol for Wireless Sensor Networks (WSN 환경에서 Biometric 정보를 이용한 사용자 인증 스킴의 안전성 분석)

  • Lee, Youngsook
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.1
    • /
    • pp.59-67
    • /
    • 2015
  • A novel authentication mechanism is biometric authentication where users are identified by their measurable human characteristics, such as fingerprint, voiceprint, and iris scan. The technology of biometrics is becoming a popular method for engineers to design a more secure user authentication scheme. In terms of physiological and behavioral human characteristics, biometrics is used as a form of identity access management and access control, and it services to identity individuals in groups that are under surveillance. In this article, we review the biometric-based authentication protocol by Althobati et al. and provide a security analysis on the scheme. Our analysis shows that Althobati et al.'s scheme does not guarantee server-to-user authentication. The contribution of the current work is to demonstrate this by mounting threat of data integrity and bypassing the gateway node on Althobati et al.'s scheme. In addition, we analysis the security vulnerabilities of Althobati et al.'s protocol.

Mini-proinsulins with a beta-turn motif

  • Chang, Seung-Gu;Kim, Dae-Young;Kim, Young-Sook;Park, Ki-Doo;Shin, Jae-Min;Shin, Hang-Cheol
    • Proceedings of the Korean Society of Applied Pharmacology
    • /
    • 1995.10a
    • /
    • pp.41-48
    • /
    • 1995
  • To increase the folding efficiency of proinsulin, we have designed a series of mini-proinsulins having the central C-peptide region replaced with sequences forming reverse turns. These proteins were produced as fusion proteins in E. coli in the form of inclusion bodies. After isolation process of the sulfonated mini-proinsulins, the subsequent refolding experiments indicate that the mini-proinsulins, with non-native penta-peptide sequences inserted between two of the enzyme processing sites, show substantially increased folding yields compared with the proinsulin. The correct disulfide connections were verified by fingerprint analysis using Glu-C endoproteinase. These novel mini-proinsulins could be used for the study of folding mechanism of proinsulin.

  • PDF

Storage System Performance Enhancement Using Duplicated Data Management Scheme (중복 데이터 관리 기법을 통한 저장 시스템 성능 개선)

  • Jung, Ho-Min;Ko, Young-Woong
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.37 no.1
    • /
    • pp.8-18
    • /
    • 2010
  • Traditional storage server suffers from duplicated data blocks which cause an waste of storage space and network bandwidth. To address this problem, various de-duplication mechanisms are proposed. Especially, lots of works are limited to backup server that exploits Contents-Defined Chunking (CDC). In backup server, duplicated blocks can be easily traced by using Anchor, therefore CDC scheme is widely used for backup server. In this paper, we propose a new de-duplication mechanism for improving a storage system. We focus on efficient algorithm for supporting general purpose de-duplication server including backup server, P2P server, and FTP server. The key idea is to adapt stride scheme on traditional fixed block duplication checking mechanism. Experimental result shows that the proposed mechanism can minimize computation time for detecting duplicated region of blocks and efficiently manage storage systems.

Positioning Mechanism Using GPS and Pico-cell ID Access Probability (GPS와 Pico-cell ID접속 확률을 이용한 위치 추정 방법)

  • Jeong, Won-Young;Lee, Tae-Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.12B
    • /
    • pp.1459-1467
    • /
    • 2011
  • Cell-ID based positioning solution is cheaper and easier to implement than other wireless positioning solutions. However, its accuracy is relatively low. So we propose a novel approach to improve its accuracy. Our approach uses the probability that an MS will connect to each of BSs among several BSs to which an MS can access in a pico-cell network, and Cell-ID based positioning method is applied. The simulation result shows that performance of the proposed approach is improved compared to the other positioning solutions.

User Authentication Mechanism based on Authentication Information using One-time Sessions (일회용 세션을 활용한 인증정보 기반의 사용자 인증 방안)

  • Park, Yeong Su;Lee, Byoung Yup
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.7
    • /
    • pp.421-426
    • /
    • 2019
  • Nowadays, various type of technologies are used for user authentication, such as knowledge based(ID/PW, etc.) authentication, biometric based(Iris/fingerprint/vein recognition) authentication, ownership based(OTP, security card, etc.) authentication. ID/PW authentication technology, a knowledge based authentication, despite the advantages of low in implementation and maintenance costs and being familiar to users, there are disadvantages of vulnerable to hacking attacks, Other authentication methods solve the vulnerability in ID/PW authentication technology, but they have high initial investment cost and maintenance cost and troublesome problem of reissuance. In this paper, we proposed to improve security and convenience over existing ID/PW based authentication technology, and to secure user authentication without restriction on the devices used for authentication.

Sonchus asper extract inhibits LPS-induced oxidative stress and pro-inflammatory cytokine production in RAW264.7 macrophages

  • Wang, Lan;Xu, Ming Lu;Liu, Jie;Wang, You;Hu, Jian He;Wang, Myeong-Hyeon
    • Nutrition Research and Practice
    • /
    • v.9 no.6
    • /
    • pp.579-585
    • /
    • 2015
  • BACKGROUND/OBJECTIVES: Sonchus asper is used extensively as an herbal anti-inflammatory for treatment of bronchitis, asthma, wounds, burns, and cough; however, further investigation is needed in order to understand the underlying mechanism. To determine its mechanism of action, we examined the effects of an ethyl acetate fraction (EAF) of S. asper on nitric oxide (NO) production and prostaglandin-E2 levels in lipopolysaccharide (LPS)-stimulated RAW264.7 macrophages. MATERIALS/METHODS: An in vitro culture of RAW264.7 macrophages was treated with LPS to induce inflammation. RESULTS: Treatment with EAF resulted in significant suppression of oxidative stress in RAW264.7 macrophages as demonstrated by increased endogenous superoxide dismutase (SOD) activity and intracellular glutathione levels, decreased generation of reactive oxygen species and lipid peroxidation, and restoration of the mitochondrial membrane potential. To confirm its anti-inflammatory effects, analysis of expression of inducible NO synthase, cyclooxygenase-2, tumor necrosis factor-${\alpha}$, and the anti-inflammatory cytokines IL-$1{\beta}$ and IL-6 was performed using semi-quantitative RT-PCR. EAF treatment resulted in significantly reduced dose-dependent expression of all of these factors, and enhanced expression of the antioxidants MnSOD and heme oxygenase-1. In addition, HPLC fingerprint results suggest that rutin, caffeic acid, and quercetin may be the active ingredients in EAF. CONCLUSIONS: Taken together, findings of this study imply that the anti-inflammatory effect of EAF on LPS-stimulated RAW264.7 cells is mediated by suppression of oxidative stress.

Design and Implementation of Outdoor Positioning System Using MSS Mechanism & Wireless AP characteristic (MSS 기법과 무선 AP 특징을 활용 실외 측위 시스템 설계 및 구현)

  • Lee, Hyoun-Sup;Kim, Jin-Deog
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.3
    • /
    • pp.433-439
    • /
    • 2011
  • The positioning system based on wireless AP collects AP information distributed in the real world, stores it into database, and measures the position objects by comparing with searched AP information. The existing fingerprinting method is a probabilistic modeling method that acquires much of the data collected from one location upon database composition, and stores the average of the data for the sake of use it in positioning objects. Using the average value, however, may cause the probability of errors Such errors are fatal weaknesses for services based on the accurate position. This paper described the characteristics and problems of the previously used wireless AP positioning system, and proposed a method of using the AP DB and an MSS mechanism for outdoor positioning in order to solve the aforementioned problems. And the results obtained from experimental tests showed that the proposed method achieved very low error rate(27%) compared with the existing method.