• Title/Summary/Keyword: Id

Search Result 2,853, Processing Time 0.027 seconds

The Mobile Digital ID Wallet based on LTE/SAE for 4G Networks (4G 네트워크를 위한 LTE/SAE 기반의 모바일 전자ID지갑)

  • Jung, Yun-Seon;Lim, Sun-Hee;Yi, Ok-Yeon;Lee, Sang-Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.10C
    • /
    • pp.764-777
    • /
    • 2008
  • In 4G environments, which is the next generation technology for mobile network, it is forecasted that the wireless Internet using a mobile devices such as a mobile phone, PDA will increase because of expansion of Internet and integration of heterogeneous networks. Therefore, we need a Digital ID management technology that can prevent illegal uses and manage private information efficiently in wired and wireless environments. In this paper, we analyze various Digital ID management technologies, and then define requirements of user-centric Digital ID management technology. In addition, we newly propose the authentication mechanism for mobile applications in LTE/SAE network. Finally, we propose the mobile Digital ID Wallet mechanism suitable for 4G environments.

Analysis of Stability Condition and Wideband Characteristics of 3D Isotropic Dispersion(ID)-FDTD Algorithm (3차원 ID-FDTD 알고리즘의 Stability Condition과 광대역 특성 분석)

  • Kim, Woo-Tae;Koh, Il-Suek;Yook, Jong-Gwan
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.22 no.4
    • /
    • pp.407-415
    • /
    • 2011
  • The stability condition and wideband characteristics of 3D ID-FDTD algorithm which has low dispersion error with isotropic dispersion are presented in this paper. 3D ID-FDTD method was proposed to improve the defect of the Yee FDTD such as the anisotropy and large dispersion error. The published paper calculated the stability condition of 3D ID-FDTD algorithm by using numerical method, however, it is thought that the examples were not sufficient to verify the stability condition. Thus, in this paper, various simulations are included in order to hold reliability under the conditions that the plane wave propagation is assumed with a single frequency and a wideband frequency. Also, the 3D ID-FDTD algorithm is compared to those that have the similar FDTD algorithm with ID-FDTD such as Forgy's method and non-standard FDTD method in a wideband. Finally, the radar cross section(RCS) for the large sphere with high dielectric constant is calculated.

Efficient ID-Based Authentication and Key Exchange Protocol (효율적인 ID 기반 인증 및 키 교환 프로토콜)

  • Eom, Jieun;Seo, Minhye;Park, Jong Hwan;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.6
    • /
    • pp.1387-1399
    • /
    • 2016
  • In a hyper-connected society realized through IoT-enabled technology, a large amount of data is collected by various devices and is processed to provide new services to users. While communicating through a network, it is essential for devices to execute mutual authentication since users' privacy can be infringed by malicious attackers. ID-based signature enables authentication and key exchange with a unique ID of a device. However, most of the previous ID-based signature schemes based on RSA require an additional step to share parameters for key exchange so that they are not suitable for resource-constrained devices in terms of efficiency. In this paper, we design an efficient ID-based signature and thereby propose an efficient ID-based authentication and key exchange protocol in which sessions for both an authentication and a key exchange are executed simultaneously. In addition, we prove the security of our scheme under the RSA onewayness problem and analyze the efficiency by comparing with the previous schemes.

A Study on Scalable Federated ID Interoperability Method in Mobile Network Environments (모바일 환경으로 확장 가능한 federated ID 연동 방안에 관한 연구)

  • Kim, Bae-Hyun;Ryoo, In-Tae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.6
    • /
    • pp.27-35
    • /
    • 2005
  • While the current world wide network offers an incredibly rich base of information, it causes network management problem because users should have many independent IDs and passwords for accessing different sewers located in many places. In order to solve this problem users have employed single circle of trust(COT) ID management system, but it is still not sufficient for clearing the problem because the coming ubiquitous network computing environment will be integrated and complex networks combined with wired and wireless network devices. The purpose of this paper is to describe the employment and evaluation of federated ID interoperability method for solving the problem. The use of the proposed model can be a solution for solving network management problem in the age of mobile computing environment as well as wired network computing environment.

A Study on Authentication and Authorization on Entity in Grid (Grid 환경에서 엔티티 인증과 권한부여에 관한 연구)

  • Kug, Joung-Ook;Lee, Jae-Kwang
    • The KIPS Transactions:PartC
    • /
    • v.10C no.3
    • /
    • pp.273-280
    • /
    • 2003
  • When an existing user authorization systems in Grid access many user to local system and subject DN (Distinguished Name) in a user-proxy authenticate and ID in local system is one-to-one mapping, they have difficulties in ID management, memory resource management and resource management. At this, a variety of subject DN is shared of one local ID in an existing Grid. But this faces many difficulties in applying all requirements for many Grid users. Thus, we suppose user authorization system based on a certificate not them based on ID in this paper. That is, we add user's access level to extension field in a certificate, and make a supposed authorization system decide access limitation level on resources instead of an existing ID mapping methods.

A Design of Sybil Attack detection technique using ID-based certificate on Sensor network (센서 네트워크에서 ID기반 인증서를 이용한 Sybil 공격 탐지 기법 설계)

  • Jeong, Eun-Hee;Lee, Byung-Kwan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.467-470
    • /
    • 2012
  • This paper proposes a technique of sybil attack detection using an ID-based certificate on sensor network. First, it can solve the broadcast storm problem happening when keys are distributed to sensor nodes. Second, it prevents the replay attack by periodically generating and changing the keys of sensor nodes with Key-chain technique. Third, it authenticates sensor node's ID using hash function. So, it maximizes sensor node's memory usage, reduces communication overhead. Finally it detects Sybil attack through ID-based certificate. Therefore, the proposed technique of Sybil attack detection using ID-based certificate consider simultaneously energy efficiency and stability on sensor network environment, and can trust the provided information through sensor network.

  • PDF

Study on Development of Automation System for Non-Contact Counting of ID Card (비접촉 ID카드 계수를 위한 자동화 시스템 개발)

  • Kang, Dae-Hwa;Hong, Jun-Hee;Guo, Yang-Yang;Lee, Hyok-Won
    • Journal of the Korean Society of Manufacturing Technology Engineers
    • /
    • v.22 no.4
    • /
    • pp.652-657
    • /
    • 2013
  • In this study, we developed a counting method for non-contact ID cards using an optical fiber displacement sensor instead of the traditionally used friction counting method. The proposed method has the advantage of high speed and automated measurement. For counting non-contact ID cards, an H-type optical fiber sensor, jig part, and counting program are developed separately to build the system and adjust it. Through the experimental test results, it was confirmed that counting is possible with one type of international ID card and one type of financial security card based on ISO7810. Furthermore, by applying the proposed method to 100 ID cards 100 times repeatedly, it was confirmed that it has high accuracy and an error ratio of 0%. We experimentally demonstrated that the proposed counting method for non-contact ID cards using an optical fiber displacement sensor can perform measurements with high accuracy and high speed.

Effects of Indigestible Dextrin on Lipid Metabolism in Rats Fed Normal or High Fat Diet (식이지방 수준이 다른 식이를 섭취한 흰쥐의 체내 지질대사에 대한 난소화성 덱스트린의 섭취 효과)

  • 우동호;강현숙;이연숙;박양자;이현수
    • Journal of Nutrition and Health
    • /
    • v.31 no.6
    • /
    • pp.981-990
    • /
    • 1998
  • The effects of indigestible dextrin on lipids in serum, tissue, and feces were investigated in two experiments carried out with 64 male Sprague-Dawley rats for eight weeks. Experiment I diet(normal fat diet) containing 5% corn oil and experiment II diet(high fat diet) containing 18% fat(13% beef tallow and 5% corn oil) and 1% cholesterol were divided into four groups with 0.5% cellulose(0.5CL : control), 10% cellulose(10CL), 10% Indigestible dextrin I(ID-I) and 10% indigestible dextrin II(ID-II), respectively. ID-I and ID-II diets produced a decrease in serum total lipid and cholesterol concentrations in both normal and high fat diets but more significantly in the groups fed high fat diet. ID-I, ID-II, and 10CL of high fat diet decreased serum glucose concentration. ID-I and ID-II diets also decreased liver cholesterol and triglyceride concentrations in rats fed normal and high fit diets. The fecal excretion of cholesterol in ID-II/high fat diet was significantly higher than that of 0.5CL diet. Bile acid excretion was increased in the rats fed 10CL and ID-II diets of normal and high fat diets. These observations indicat the hypolipidemic and hypocholesterolemic effects of indigestible dextrin on the rats. These effects are mediated by the increase of facal cholesterol and bile acid excretion. (Korean J Nutrition31(6) : 981-990, 1998)

  • PDF

A fasrter Spam Mail Prevention Algorithm on userID based (userID 기반의 빠른 메일 차단 알고리즘)

  • 심재창;고주영;김현기
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.10a
    • /
    • pp.211-214
    • /
    • 2003
  • The problem of unsolicited e-mail has been increasing for years, so many researchers has studied about spam filtering and prevention. In this article, we proposed a faster spam prevention algorithm based on userID instead of full email address. But there are 2% of false-negatives by userID. In this case, we store those domains in a DB and filter them out. The proposed algorithm requires small DB and 3.7 times faster than the e-mail address comparison algorithm. We implemented this algorithm using SPRSW(Spam Prevention using Replay Secrete Words) to register userID automatically in userID DB.

  • PDF

On the Security of ID-Based Cryptosystem against Power Analysis Attacks (전력 분석 공격과 ID기반 암호 시스템의 안전성)

  • 양연형;박동진;이필중
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.4
    • /
    • pp.135-140
    • /
    • 2004
  • The ID-based cryptosystem and Power Analysis Attack are attracting many researchers and have been developed aggressively to date. Especially, DPA (Differential Power Analysis) attack has been considered to be the most powerful attack against low power devices, such as smart cards. However, these two leading topics are researched independently and have little hewn relations with each other. In this paper, we investigate the effect of power analysis attack against ID based cryptosystem. As a result, we insist that ID-based cryptosystem is secure against DPA and we only need to defend against SPA (Simple Power Analysis).