• Title/Summary/Keyword: ID 인증

Search Result 450, Processing Time 0.021 seconds

Quantitative analysis of cholesterol in infant formula by isotope dilution liquid chromatography-tandem mass spectrometry (동위원소희석 액체크로마토그래피 질량분석법에 의한 분유 내 콜레스테롤의 정량)

  • Ahn, Eun Jeong;Lee, Hwa Shim;Kim, Byung Joo;Lee, Gae Ho
    • Analytical Science and Technology
    • /
    • v.28 no.6
    • /
    • pp.460-466
    • /
    • 2015
  • An isotope dilution liquid chromatography tandem mass spectrometry was developed as a primary method for the quantitative analysis of cholesterol in infant formula. Cholesterol-d4 was used as an internal standard and spiked into the infant formula sample. In order to release cholesterol out of cholesteryl ester, which is cholesterol bound to fatty acids in infant formula, saponification was carried out. Saponification conditions were optimized with heating temperature, reaction time and the concentration of KOH. The optimum conditions were as follows; heating temperature was 70 ℃, reaction time was 180 min and the concentration of KOH was 0.8 mL of 8 M KOH for about 0.1 g infant formula sample. Extraction of cholesterol out of sample solution was carried out with hexane uisng liquid-liquid extraction. Chromatographic analysis was carried out using Phenomenex Kinetex C18 column. Mobile phase was 0.1% acetic acid in methanol/water (v/v, 99/1) and flow rate was 0.3 mL/min. Cholesterol and cholesterol-d4 were monitored at mass transfer m/z 369/259 and 373/263 respectively. Reproducibility of the method was evaluated to be 0.23% of the measurement result. The expanded uncertainty of the measurement result of cholesterol in infant formula was approximately 1.9% at a 95% confidence level. NIST standard reference material having certified values of cholesterol in infant formula, was analyzed in order to verify this method. The ID-LC/MS/MS results were well agreed with the certified values of NIST SRM within the uncertainty.

Design of RFID Authentication Protocol Using 2D Tent-map (2차원 Tent-map을 이용한 RFID 인증 프로토콜 설계)

  • Yim, Geo-su
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.13 no.5
    • /
    • pp.425-431
    • /
    • 2020
  • Recent advancements in industries and technologies have resulted in an increase in the volume of transportation, management, and distribution of logistics. Radio-frequency identification (RFID) technologies have been developed to efficiently manage such a large amount of logistics information. The use of RFID for management is being applied not only to the logistics industry, but also to the power transmission and energy management field. However, due to the limitation of program development capacity, the RFID device is limited in development, and this limitation is vulnerable to security because the existing strong encryption method cannot be used. For this reason, we designed a chaotic system for security with simple operations that are easy to apply to such a restricted environment of RFID. The designed system is a two-dimensional tent map chaotic system. In order to solve the problem of a biased distribution of signals according to the parameters of the chaotic dynamical system, the system has a cryptographic parameter(𝜇1), a distribution parameter(𝜇2), and a parameter(𝜃), which is the constant point, ID value, that can be used as a key value. The designed RFID authentication system is similar to random numbers, and it has the characteristics of chaotic signals that can be reproduced with initial values. It can also solve the problem of a biased distribution of parameters, so it is deemed to be more effective than the existing encryption method using the chaotic system.

The Password base System for the safe and Efficient Identification (안전하고 효율적인 신원확인을 위한 암호기반 시스템)

  • Park, Jong-Min;Park, Byung-Jun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.1
    • /
    • pp.81-86
    • /
    • 2009
  • Almost all network systems provide an authentication mechanism based on user ID and password. In such system, it is easy to obtain the user password using a sniffer program with illegal eavesdropping. The one-time password and challenge-response method are useful authentication schemes that protect the user passwords against eavesdropping. In client/server environments, the one-time password scheme using time is especially useful because it solves the synchronization problem. In this paper, we propose a new identification scheme One Pass Identification. The security of Password base System is based on the square root problem, and Password base System is secure against the well known attacks including pre-play attack, off-line dictionary attack and server comprise. A number of pass of Password base System is one, and Password base System processes the password and does not need the key. We think that Password base System is excellent for the consuming time to verify the prover.

Development of a RADIUS WLAN Security System for Industrial Applications Based on WEB (WEB 기반의 기업용 RADIUS 무선랜 보안 시스템 개발)

  • Jeong, Yeon-Woo;Sohn, Jong-Yoon;Chun, Joong-Chang;Choi, Kyung-Sun
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.9 no.6
    • /
    • pp.599-603
    • /
    • 2016
  • Recently the wireless LAN system is substituting wired LAN system notably as the number of mobile users increases greatly along the advancement of technology. But the wireless LAN has a critical weakness in the security such as data leakage. Thus a safe security system is imperative to avoid threatening from hackers with offering the best convenience to inner users. In this research, we have developed a RADIUS wireless LAN security system for industrial applications, which performs the EAP authentication with the compatibility for any maker of wireless LAN. The system has interfaces based on WEB, providing DB access function for user management so that users can perform authentication of 802.1x in their computers.

Determination of Cadmium, Copper, Lead, Nickel, and Zinc in Sediments by ID-ICP/MS (동위원소희석 질량분석법에 의한 저니토 중의 카드뮴, 구리, 납, 니켈, 아연의 정량)

  • Cho, Kyung-Haeng;Park, Chang-Joon;Suh, Jung-Kee;Han, Myoung-Sub
    • Analytical Science and Technology
    • /
    • v.13 no.3
    • /
    • pp.297-303
    • /
    • 2000
  • Isotope-dilution inductively coupled plasma mass spectrometry was used to determine trace amounts of Cd, Cu, Pb, Ni and Zn in sediment. Sediment samples were dissolved by microwave digestion with addition of mixed acid ($HNO_3$, HF and $HClO_4$). Lead was determined after separation of alkaline and alkaline earth metals by an ammonium pyrrolidenedithiocarbarmate (APDC) solvent extraction. The other elements were determined after separation of iron, tin and titanium by hydroxide precipitation. Recovery efficiency of the analyte elements was not satisfactory, but most of matrix elements causing the isobaric interference could be effectively eliminated by the separation. Good agreement was achieved with the certified values in the analysis of the two sediment reference materials.

  • PDF

Design of Invisible Watermarking for Biometric Image of Electronic ID Card (전자신분증용 바이오 영상을 위한 비인지 워터마킹 설계)

  • Shin, Yong-Nyuo;Lee, Yong-Jun;Kim, Won-Gyum
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.11
    • /
    • pp.1555-1565
    • /
    • 2008
  • Biometric information such as face and fingerprint information is highlighted in many security areas, including authentication, due to its uniqueness and convenience factors. However, if exploited maliciously, it can cause more serious damage than traditional security measures, like passwords. This paper reviews the watermarking method that is able to verify the integrity of this biometric information. The watermark to be inserted is the date of the biometric information acquisition. It is combined with 16-bit Cyclic Redundancy Checks prior to insertion. In particular, face and fingerprint images are saved in a specific compressed format. The proposed watermarking algorithm will be designed in such a way as to remain resilient against compression. The watermark inserted at the acquisition stage will be extracted at each storage and deployment stage, so that the integrity of the biometric information can be verified.

  • PDF

Multiplex Certification System Using XML For WBI (WBI에서의 XML 다중인증 시스템)

  • 신영준;이동휘;김정재;김귀남
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.297-302
    • /
    • 2004
  • Internet becomes absolutely necessary tools due to rapid progress of information technology. Educational correspondence abount an age of information demand is a education focused on a learner and remote education based on information technology. WBI(Web Based Instruction) is a formation that remotly educate a learner using web, possible mutual reaction between instructor and learner, submint various studying material, has a good point to overcome spatial restriction. Internal and external standardization working is accelerated and recently XML security studies are activated using XML which is next generation web standard document format. And XML electronic signature raise interworking between digital signature systems used by various field of using XML document. Using these merit and complementing defect are main contents that users have to pay about Certification service to get CA certificate from 2004 june. This paper propose multiplex Certification remote education agent system using XML digital signature to satisfy security requirement.

  • PDF

A study on Zigbee Authentication Protocol Using System IDs in Environments of Smart Grid (스마트 그리드 환경에서 시스템 ID를 이용한 지그비 인증 프로토콜에 관한 연구)

  • Kim, Kyoung-Mok;Im, Song-Bin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.4
    • /
    • pp.101-110
    • /
    • 2011
  • A smart grid networks delivers electricity from suppliers to consumers using digital technology with two-way communications to control appliances at consumers' homes to save energy, reduce cost and increase reliability and transparency. Security is critically important for smart grid networks that are usually used for the electric power network and IT environments that are opened to attacks, such as, eavesdroping, replay attacks of abnormal messages, forgery of the messages to name a few. ZigBee has emerged as a strong contender for smart grid networks. ZigBee is used for low data rate and low power wireless network applications. To deploy smart grid networks, the collected information requires protection from an adversary over the network in many cases. The security mechanism should be provided for collecting the information over the network. However, the ZigBee protocol has some security weaknesses. In this paper, these weaknesses are discussed and a method to improve security aspect of the ZigBee protocol is presented along with a comparison of the message complexity of the proposed security protocol with that of the current ZigBee protocol.

Vision-based Authentication and Registration of Facial Identity in Hospital Information System

  • Bae, Seok-Chan;Lee, Yon-Sik;Choi, Sun-Woong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.12
    • /
    • pp.59-65
    • /
    • 2019
  • Hospital Information System includes a wide range of information in the medical profession, from the overall administrative work of the hospital to the medical work of doctors. In this paper, we proposed a Vision-based Authentication and Registration of Facial Identity in Hospital Information System using OpenCV. By using the proposed security module program a Vision-based Authentication and Registration of Facial Identity, the hospital information system was designed to enhance the security through registration of the face in the hospital personnel and to process the receipt, treatment, and prescription process without any secondary leakage of personal information. The implemented security module program eliminates the need for printing, exposing and recognizing the existing sticker paper tags and wristband type personal information that can be checked by the nurse in the hospital information system. In contrast to the original, the security module program is inputted with ID and password instead to improve privacy and recognition rate.

Remote Secure Entrance Control System using RFID and TCP/IP (RFID와 TCp/IP를 활용한 원격 보안 출입 제어 시스템)

  • Kim, Jeong-Sook;Kim, Cheon-Shik;Yoon, Eun-Jun;Hong, You-Sik
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.45 no.6
    • /
    • pp.60-67
    • /
    • 2008
  • At present, RFID system is highly welcomed as a substitute system with its bar code recognition system and self recognition equipment. Consequently, the system has multi applications and can be complementing to its security. In particular, RFID system is significantly related with electronic transaction equipments : transportation card, ID card in check point, attendance sheet. Based upon these characteristic, the system is becoming extremely popular in the field of logistics, harbor and stock management, animal control and product circulation & distribution. In this dissertation, I would like to present a more efficient and stable remote entry control system with the network-based TCP/IP. It is a simple example of ubiquitous computing function. Above all, approved protocol system should be applied to the remote entry control function. Its efficient function with the applied approval protocol based-remote entry control system should be confirmed. Therefore, a preliminary test should be prerequisite in automatic entrance function with the embedded and TCP/IP-based RFID system.