• Title/Summary/Keyword: ID management system

Search Result 197, Processing Time 0.03 seconds

Frequency of Red Blood Cell Antigens According to Parent Ethnicity in Korea Using Molecular Typing

  • Shin, Kyung-Hwa;Lee, Hyun-Ji;Kim, Hyung-Hoi;Hong, Yun Ji;Park, Kyoung Un;Kim, Min Ju;Kwon, Jeong-Ran;Choi, Young-Sil;Kim, Jun Nyun
    • Annals of Laboratory Medicine
    • /
    • v.38 no.6
    • /
    • pp.599-603
    • /
    • 2018
  • Frequencies of red blood cell (RBC) blood group antigens differ by ethnicity. Since the number of immigrants is increasing in Korea, RBC antigens should be assessed in children/youths with parents of different ethnicities to ensure safe transfusions. We investigated the frequency of RBC antigens, except for ABO and RhD, in 382 children and youths with parents having Korean and non-Korean ethnicities. Subjects were divided into those with ethnically Korean parents (Korean group; N=252) and those with at least one parent of non-Korean ethnicity (non-Korean group; N=130). The 37 RBC antigens were genotyped using the ID CORE XT system (Progenika Biopharma-Grifols, Bizkaia, Spain). The frequencies of the Rh (E, C, e, $hr^S$, and $hr^B$), Duffy ($Fy^a$), MNS ($Mi^a$), and Cartwright ($Yt^b$) antigens differed significantly between the two groups. Eight and 11 subjects in the Korean and non-Korean groups, respectively, exhibited negative expression of high-frequency antigens, whereas 14 subjects in the non-Korean group showed positive expression of low-frequency antigens. The frequency of RBC antigens has altered alongside demographic changes in Korea and might lead to changes in distribution of RBC antibodies that cause acute or delayed hemolytic transfusion reaction.

Study on Improvement of Weil Pairing IBE for Secret Document Distribution (기밀문서유통을 위한 Weil Pairing IBE 개선 연구)

  • Choi, Cheong-Hyeon
    • Journal of Internet Computing and Services
    • /
    • v.13 no.2
    • /
    • pp.59-71
    • /
    • 2012
  • PKI-based public key scheme is outstanding in terms of authenticity and privacy. Nevertheless its application brings big burden due to the certificate/key management. It is difficult to apply it to limited computing devices in WSN because of its high encryption complexity. The Bilinear Pairing emerged from the original IBE to eliminate the certificate, is a future significant cryptosystem as based on the DDH(Decisional DH) algorithm which is significant in terms of computation and secure enough for authentication, as well as secure and faster. The practical EC Weil Pairing presents that its encryption algorithm is simple and it satisfies IND/NM security constraints against CCA. The Random Oracle Model based IBE PKG is appropriate to the structure of our target system with one secret file server in the operational perspective. Our work proposes modification of the Weil Pairing as proper to the closed network for secret file distribution[2]. First we proposed the improved one computing both encryption and message/user authentication as fast as O(DES) level, in which our scheme satisfies privacy, authenticity and integrity. Secondly as using the public key ID as effective as PKI, our improved IBE variant reduces the key exposure risk.

A Study on Single Sign-On Authentication Model using Multi Agent (멀티 에이전트를 이용한 Single Sign-On 인증 모델에 관한 연구)

  • 서대희;이임영
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.7C
    • /
    • pp.997-1006
    • /
    • 2004
  • The rapid expansion of the Internet has provided users with a diverse range of services. Most Internet users create many different IDs and passwords to subscribe to various Internet services. Thus, the SSO system has been proposed to supplement vulnerable security that may arise from inefficient management system where administrators and users manage a number of ms. The SSO system can provide heightened efficiency and security to users and administrators. Recently commercialized SSO systems integrate a single agent with the broker authentication model. However, this hybrid authentication system cannot resolve problems such as those involving user pre-registration and anonymous users. It likewise cannot provide non-repudiation service between joining objects. Consequently, the hybrid system causes considerable security vulnerability. Since it cannot provide security service for the agent itself, the user's private information and SSO system may have significant security vulnerability. This paper proposed an authentication model that integrates a broker authentication model, out of various authentication models of the SSO system, with a multi-agent system. The proposed method adopts a secure multi-agent system that supplements the security vulnerability of an agent applied to the existing hybrid authentication system. The method proposes an SSO authentication model that satisfies various security requirements not provided by existing broker authentication models and hybrid authentication systems.

A Study on Risk Analysis and Acident Prevention Heater Interlock By-pass (Heater interlock by-pass로 인한 위험분석 및 사고방지에 대한 연구)

  • Son Jae-geun;Park Kyo-Shik;Kang Tae-Yeon;Yeo Yeong-Koo
    • Journal of the Korean Institute of Gas
    • /
    • v.7 no.1 s.18
    • /
    • pp.24-27
    • /
    • 2003
  • In this paper it was investigated 15 heaters of CDU plant heater, NCC plant heater, CO plant heater, Aromatic plant heater and so on while running in our country. It was also analysed the standard of operation procedure, the action in alarm, the interlock system, the operating situation of the interlock by-pass and major accident about the heater and so on. This paper presents the installation of the on-line monitoring, the additional installation of the local pressure gauge and temperature gauge, the check in starting operation,'the management of the interlock by-pass, the change of manufacturer causing the disorder of instrument sensor, the management method of DCS alarm for methods of the interlock prevention and facilities improvement. It was few information about the heater interlock in the inside and outside of the country We mainly have studied with reflecting the opinion of the operator and manager on site, the sheet of process trouble and operation procedure and so on. we think that the accident relating to the interlock will significantly reduce if the companies apply the conclusion of this study(i.e. methods of the interlock prevention and facilities improvement).

  • PDF

Design and Implementation of Anomaly Traffic Control framework based on Linux Netfilter System and CBQ Routing Mechanisms (리눅스 Netfilter시스템과 CBQ 라우팅 기능을 이용한 비정상 트래픽 제어 프레임워크 설계 및 구현)

  • 조은경;고광선;이태근;강용혁;엄영익
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.6
    • /
    • pp.129-140
    • /
    • 2003
  • Recently viruses and various hacking tools that threat hosts on a network becomes more intelligent and cleverer, and so the various security mechanisms against them have ken developed during last decades. To detect these network attacks, many NIPSs(Network-based Intrusion Prevention Systems) that are more functional than traditional NIDSs are developed by several companies and organizations. But, many previous NIPSS are hewn to have some weakness in protecting important hosts from network attacks because of its incorrectness and post-management aspects. The aspect of incorrectness means that many NIPSs incorrectly discriminate between normal and attack network traffic in real time. The aspect of post-management means that they generally respond to attacks after the intrusions are already performed to a large extent. Therefore, to detect network attacks in realtime and to increase the capability of analyzing packets, faster and more active responding capabilities are required for NIPS frameworks. In this paper, we propose a framework for real-time intrusion prevention. This framework consists of packet filtering component that works on netfilter in Linux kernel and traffic control component that have a capability of step-by-step control over abnormal network traffic with the CBQ mechanism.

Sampling based Network Flooding Attack Detection/Prevention System for SDN (SDN을 위한 샘플링 기반 네트워크 플러딩 공격 탐지/방어 시스템)

  • Lee, Yungee;Kim, Seung-uk;Vu Duc, Tiep;Kim, Kyungbaek
    • Smart Media Journal
    • /
    • v.4 no.4
    • /
    • pp.24-32
    • /
    • 2015
  • Recently, SDN is actively used as datacenter networks and gradually increase its applied areas. Along with this change of networking environment, research of deploying network security systems on SDN becomes highlighted. Especially, systems for detecting network flooding attacks by monitoring every packets through ports of OpenFlow switches have been proposed. However, because of the centralized management of a SDN controller which manage multiple switches, it may be substantial overhead that the attack detection system continuously monitors all the flows. In this paper, a sampling based network flooding attack detection and prevention system is proposed to reduce the overhead of monitoring packets and to achieve reasonable functionality of attack detection and prevention. The proposed system periodically takes sample packets of network flows with the given sampling conditions, analyzes the sampled packets to detect network flooding attacks, and block the attack flows actively by managing the flow entries in OpenFlow switches. As network traffic sampler, sFlow agent is used, and snort, an opensource IDS, is used to detect network flooding attack from the sampled packets. For active prevention of the detected attacks, an OpenDaylight application is developed and applied. The proposed system is evaluated on the local testbed composed with multiple OVSes (Open Virtual Switch), and the performance and overhead of the proposed system under various sampling condition is analyzed.

Smartphone User Authentication Algorithm based on Mutual Cooperation in Mobile Environment (모바일 환경에서 상호 협력 기반 스마트폰 사용자 인증 알고리즘)

  • Jeong, Pil-Seong;Cho, Yang-Hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.7
    • /
    • pp.1393-1400
    • /
    • 2017
  • As the number of smartphone users increases, vulnerability to privacy protection is increasing. This is because personal information is stored on various servers connected to the Internet and the user is authenticated using the same ID and password. Authentication methods such as OTP, FIDO, and PIN codes have been introduced to solve traditional authentication methods, but their use is limited for authentication that requires sharing with other users. In this paper, we propose the authentication method that is needed for the management of shared information such as hospitals and corporations. The proposed algorithm is an algorithm that can authenticate users in the same place in real time using smart phone IMEI, QR code, BLE, push message. We propose an authentication algorithm that can perform user authentication through mutual cooperation using a smart phone and can cancel realtime authentication. And we designed and implemented a mutual authentication system using proposed algorithm.

USN Security Enhancement Using System IDs (시스템 ID를 이용한 USN의 보안 취약성 개선)

  • Kim, Hyun-Jue;Chung, Jong-Moon
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.2
    • /
    • pp.73-80
    • /
    • 2009
  • Security is critically important for ubiquitous sensor networks that are usually used for the military and serveillance in environments that are opened to attacks, such as, eavesdroping, replay attacks of abnormal messages, forgery of the messages to name a few. ZigBee has emerged as a strong contender for ubiquitous sensor networks. ZigBee is used for low data rate and low power wireless sensor network applications. To deploy ubiquitous sensor networks, the collected information requires protection from an adversary over the network in many cases. The security mechanism should be provided for collecting the information over the network. However, the ZigBee protocol has some security weaknesses. In this paper, these weaknesses are discussed and a method to improve security aspect of the ZigBee protocol is presented along with a comparison of the message complexity of the proposed security protocol with that of the current ZigBee protocol.

Study Focused on Task Process regarding Effective Information Transfer of Ancillary Tests in Diagnostic Pathology (병리추가조직검사 정보전달을 위한 업무프로세스 연구)

  • Ko, Jae-Nam;Park, Yun-Ik;Jung, Jin-Gyeong;Ahn, Sang-Ho;Kim, Jae-Ho;Shin, Hwa-Jeong;Hyun, Ji-Suk;Kim, Kyeong-Ho
    • Quality Improvement in Health Care
    • /
    • v.22 no.2
    • /
    • pp.95-108
    • /
    • 2016
  • Purpose: Ancillary tests such as immunohistochemistry or molecular testing for pathologic diagnosis are performed using ready-made tissue blocks for a histological examination. Various methods and processes during ancillary testing cause some of issues, particularly in the time required and the results reporting scheme. Methods: To solve these issues, we constructed real-time management software. When a pathologist or a clinician had ancillary tests examined using this software by selecting the codes of the needed ancillary tests on site and the system assigned the tests to each laboratory. Then, pathology technologists checked the referred tests and performed the examination. In clinical departments, serial number of each ancillary test can be matched the original pathologic ID. In the department of pathology, numbers of tissue blocks that needed additional tests could be indicated and detected using one-click detection system when a clinician referred the test. Results: Using this system resulted in simplifying the referral procedures from nine-steps to three-steps in each clinical department and from seven-steps to two-steps in department of pathology. Errors that happened on the paper-based request system were also reduced. Furthermore, the time required was saved by seven hours in pathologic laboratory on average. Mean durations from requesting to reporting of the ancillary test was reduced by three days for specimens of health promotion center. Conclusion: Construction of an effective information transfer system may be helpful for shortening the time required, reducing errors, and checking processing information of the tests in real time.

A Study on the Appling National ITS Standardization for Advanced Traffic Information System (통합교통정보체계 추진을 위한 표준안 활용방안 연구)

  • Cho Young-Sung;Lee Sang-Keon;Moon Young-Jun;Jung Hee-Woon
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.2 no.1 s.2
    • /
    • pp.15-24
    • /
    • 2003
  • While public institutions and privite coperations have constructed the data collecting infrastructure and commercialized it to service traffic information, inaccuracy with information, insufficiency with the public sector, overapping investment and the rest are arising from the differences of data treatment, offering method, communication protocal and the like. For these reasons, we need standardization it as a national enterprise. In this paper, we would like to present the unity management and joint method of traffic information based on the present position of system construction and national ITS standardization. At first, we presented the relation between data elements and message sets and then analyzed how message sets have been used to message sets to share traffic information so far in public institutions and private coperations like Korea freeway cooperation-ITS model city-Cheonan-Nonsan expressway, In-cheon international airport expressway-Korea freeway cooperation and Seoul metropolitan police agency-Seoul metropolitan government. As the results of analyzing message sets, it had disclosed that data transmission is impossible or a system is unchangeable because data form and each items to transmission were different from each other and its own address and link IDS were not determined yet. Also it showed these message sets did not abidy by The Draft of National ITS Standards. First of all, we proposed data basic form and elements which were form by items used in each center in common and the elements to manage traffic information suggested by Standards based on the results of analyses.

  • PDF