• Title/Summary/Keyword: ID Management

Search Result 359, Processing Time 0.025 seconds

Effects of ID-CBT5101 in Preventing and Alleviating Osteoarthritis Symptoms in a Monosodium Iodoacetate-Induced Rat Model

  • Sim, Boo-Yong;Choi, Hak-Joo;Kim, Min-Goo;Jeong, Dong-Gu;Lee, Don-Gil;Yoon, Jong-Min;Kang, Dae-Jung;Park, Soobong;Ji, Joong-Gu;Joo, In-Hwan;Kim, Dong-Hee
    • Journal of Microbiology and Biotechnology
    • /
    • v.28 no.7
    • /
    • pp.1199-1208
    • /
    • 2018
  • Osteoarthritis is a disease that affects the articular cartilage and osseous tissue, and can be worsened by aging, overweight status, and post-traumatic arthritis. The present study aimed to evaluate the effect of ID-CBT5101 (tyndallized Clostridium butyricum) on bone metabolism and the inflammatory response in a monosodium iodoacetate-induced rat model of osteoarthritis. ID-CBT5101 was administered orally at doses of $10^8$ or $10^{10}CFU/day$ for 2 weeks before direct injection of monosodium iodoacetate ($3mg/50{\mu}l$ of 0.9% saline) into the intra-articular space of the rats' right knees. The rats subsequently received the same doses of oral ID-CBT5101 for another 4 weeks. We evaluated the treatment effects based on serum biomarkers, mRNA expression, morphological and histopathological analyses of the knee joints, and weight-bearing distribution analysis. Compared with those in control rats, the ID-CBT5101 treatments significantly reduced the serum concentration of inflammation and bone metabolism markers (i.e., COX-2, IL-6, $LTB_4$, and COMP), and significantly increased the concentration of $IFN-{\gamma}$ and glycosaminoglycans. In addition, the ID-CBT5101 treatments inhibited the mRNA expression of matrix metalloproteinases and tissue inhibitors of metalloproteinases (i.e., MMP-2, MMP-3, MMP-9, MMP-13, TIMP-1, and TIMP-2). Furthermore, the ID-CBT5101 treatments effectively preserved the knee cartilage and synovial membrane, and significantly decreased the amount of fibrous tissue. Moreover, compared with that of the negative control group, the ID-CBT5101 treatments increased the weight-bearing distribution by ${\geq}20%$. The results indicate that ID-CBT5101 prevented and alleviated osteoarthritis symptoms. Thus, ID-CBT5101 may be a novel therapeutic option for the management of osteoarthritis.

The Voice Template based User Authentication Scheme Suitable for Mobile Commerce Platform (모바일 상거래 플랫폼에 적합한 음성 템플릿 기반의 사용자 인증 기법)

  • Yun, Sung-Hyun;Koh, Hoon
    • Journal of Digital Convergence
    • /
    • v.10 no.5
    • /
    • pp.215-222
    • /
    • 2012
  • A smart phone has functions of both telephone and computer. The wide spread use of smart phones has sharply increased the demand for mobile commerce. The smart phone based mobile services are available anytime, anywhere. In commercial transactions, a digital signature scheme is used to make legally binding signature to prove both integrity of commercial document and verification of the signer. Smart phones are more risky compared with personal computers on the problems of how to protect privacy information. It's also easy to let proxy user to authenticate instead of the smart phone owner. In existing password or token based schemes, the ID is not physically bound to the owner. Thus, those schemes can not solve the problem of proxy authentication. To utilize the smart phone as the platform of mobile commerce, a study on the new type of authentication scheme is needed where the scheme should provide protocol to get legally binding signature and not to authenticate proxy user. In this paper, we create the mobile ID by using both the USIM and voice template of the smart phone owner. We also design and implement the user authentication scheme based on the mobile ID.

Certificateless Public Key Encryption Revisited: Security Model and Construction (무인증서 공개키 암호 기법의 재고: 안전성 모델 및 설계)

  • Kim, Songyi;Park, Seunghwan;Lee, Kwangsu
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.6
    • /
    • pp.1109-1122
    • /
    • 2016
  • Certificateless public key cryptography is a technique that can solve the certificate management problem of a public key cryptosystem and clear the key escrow issue of ID-based cryptography using the public key in user ID. Although the studies were actively in progress, many existing schemes have been designed without taking into account the safety of the secret value with the decryption key exposure attacks. If previous secret values and decryption keys are exposed after replacing public key, a valid private key can be calculated by obtaining the partial private key corresponding to user's ID. In this paper, we propose a new security model which ensures the security against the key exposure attacks and show that several certificateless public key encryption schemes are insecure in the proposed security model. In addition, we design a certificateless public key encryption scheme to be secure in the proposed security model and prove it based on the DBDH(Decisional Bilinear Diffie-Hellman) assumption.

A Study on Definitions of Security Requirements for Identification and Authentication on the Step of Analysis (분석단계 보안에서 식별 및 인증의 보안 요건 정의에 대한 연구)

  • Shin, Seong-Yoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.7
    • /
    • pp.87-93
    • /
    • 2014
  • TIn analysis as the first step of S/W development, security requirements of identification and authentication, ID and password management, authentication process, authentication method, ete. should be defined. Identification is to uniquely identify certain users and applications running on a certain system. Authentication means the function to determine true or false users and applications in some cases. This paper is to suggest the security requirements for identification and authentication in analysis step. Firstly, individual ID should be uniquely identified. The second element is to apply the length limitations, combination and periodic changes of passwords. The third should require the more reinforced authentication methods besides ID and passwords and satisfy the defined security elements on authentication process. In this paper, the security requirements for the step of identification and authentication have been explained through several practical implementation methods.

Smart Card and Dynamic ID Based Electric Vehicle User Authentication Scheme (스마트카드 및 동적 ID 기반 전기 자동차 사용자 인증 스킴)

  • Jung, Su-Young;Kwak, Jin
    • Journal of Digital Convergence
    • /
    • v.11 no.7
    • /
    • pp.141-148
    • /
    • 2013
  • Smart grid can two-way communication using ICT(Information & Communication Technology). Also, smart grid can supply to dynamic power that grafted to electric vehicle can activate to electric vehicle charging infrastructure and used to storage battery of home. Storage battery of home can resale to power provider. These electric vehicle charging infrastructure locate fixed on home, apartment, building, etc charging infrastructure that used fluid on user. If don't authentication for user of fluid user use to charging infrastructure, electric charging service can occurred to illegal use, electric charges and leakgage of electric information. In this paper, we propose smartcard and dynamic ID based user authentication scheme for used secure to electric vehicle service in smart grid environment.

The Secure Password Authentication Method based on Multiple Hash Values that can Grant Multi-Permission to a Single Account (단수 계정에 다중 권한 부여가 가능한 다중 해시값 기반의 안전한 패스워드 인증 기법 설계)

  • Hyung-Jin Mun
    • Journal of Industrial Convergence
    • /
    • v.21 no.9
    • /
    • pp.49-56
    • /
    • 2023
  • ID is used as identifying information and password as user authentication for ID-based authentication. In order to have a secure user authentication, the password is generated as a hash value on the client and sent to the server, where it is compared with the stored information and authentication is performed. However, if even one character is incorrect, the different hash value is generated, authentication will be failed and cannot be performed and various functions cannot be applied to the password. In this study, we generate several hash value including imaginary number of entered password and transmit to server and perform authentcation. we propose a technique can grants the right differentially to give various rights to the user who have many rights by one account. This can defend shoulder surfing attack by imaginary password and provide convenience to users who have various rights by granting right based on password.

A Study on Safe Identification Card Using Fingerprint Recognition and Encrypted QR (지문인식기술과 암호화된 QR코드를 이용한 안전한 신분증 연구)

  • Song, Chung-Geon;Lee, Keun-Ho
    • Journal of Digital Convergence
    • /
    • v.12 no.6
    • /
    • pp.317-323
    • /
    • 2014
  • The registration cards that are currently used to identify the people of Korea may cause secondary damage once stolen because they contain very specifically expressed fingerprint information. In order to solve this problem, in ID is required that can utilize the state-owned fingerprint DB, while while maintaining confidentiality of the identification information and satisfying the cost as well. At this point accordingly, a secure form of ID, which uses the encrypted QR code and fingerprint information, is proposed.

Overlay Multicast for node of Management in Multi-layer (다중 계층 노드관리를 위한 오버레이 멀티캐스트)

  • Lee, Bum-Jae;Chi, Sam-Hyun;Lee, Kang-Whan
    • Proceedings of the IEEK Conference
    • /
    • 2008.06a
    • /
    • pp.623-624
    • /
    • 2008
  • Overlay Multicast Routing Algorithm operates flexibly according to the various limited condition and environment of the MANET. Because of this Algorithm have maintenance and transmission of the network to use virtual Overlay ID. This paper proposes the method to give node ID considering attribute of node. If it uses ID considering attribute of node, it will improve routing speed.

  • PDF

The Construction of the Testbed for the Integrated Intrusion Detection Management System (침입정보 통합관리시스템을 위한 테스트베드 구축)

  • Lee, Seong-Ho;Park, Yong-Cheol;Lee, Hyung-Hyo;Noh, Bong-Nam
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.05c
    • /
    • pp.1969-1972
    • /
    • 2003
  • 전통적인 IDS는 단일 시스템, 단일 환경하의 침입 탐지만을 제공하므로, 보안대상 제한, 유연성 한계, 다양한 형태의 침입탐지 불가 등의 문제점이 대두되고 있다. 최근 이러한 문제점을 해결하기 위하여 여러 IDS의 침입정보를 통합, 분석하는 연구가 활발히 진행되고 있다. IDWG는 IDS간 상호운용을 지원하고자 침입정보 전송 프로토콜과 메시지 친환 형태를 표준화하는 작업을 진행하고 있다. 본 논문은 이 기종 IDS 관리 및 침입정보 통합을 위한 테스트베드 구축 과정을 제시한다. 단위 IDS는 Snort와 Snare를 사용하였으며, 국제표준을 준수하는 RoadRunner 라이브러리를 이용하였다.

  • PDF