• Title/Summary/Keyword: Identity card

Search Result 64, Processing Time 0.027 seconds

A Study on the Recognition of Face Based on CNN Algorithms (CNN 알고리즘을 기반한 얼굴인식에 관한 연구)

  • Son, Da-Yeon;Lee, Kwang-Keun
    • Korean Journal of Artificial Intelligence
    • /
    • v.5 no.2
    • /
    • pp.15-25
    • /
    • 2017
  • Recently, technologies are being developed to recognize and authenticate users using bioinformatics to solve information security issues. Biometric information includes face, fingerprint, iris, voice, and vein. Among them, face recognition technology occupies a large part. Face recognition technology is applied in various fields. For example, it can be used for identity verification, such as a personal identification card, passport, credit card, security system, and personnel data. In addition, it can be used for security, including crime suspect search, unsafe zone monitoring, vehicle tracking crime.In this thesis, we conducted a study to recognize faces by detecting the areas of the face through a computer webcam. The purpose of this study was to contribute to the improvement in the accuracy of Recognition of Face Based on CNN Algorithms. For this purpose, We used data files provided by github to build a face recognition model. We also created data using CNN algorithms, which are widely used for image recognition. Various photos were learned by CNN algorithm. The study found that the accuracy of face recognition based on CNN algorithms was 77%. Based on the results of the study, We carried out recognition of the face according to the distance. Research findings may be useful if face recognition is required in a variety of situations. Research based on this study is also expected to improve the accuracy of face recognition.

Implementation of Offline Payment Solution using USIM in IMT-2000 (IMT-2000 단말기용 USIM상에서의 오프라인 지불 솔루션 탑재에 관한 연구)

  • 백장미;하남수;홍인식
    • Journal of Korea Multimedia Society
    • /
    • v.6 no.5
    • /
    • pp.849-860
    • /
    • 2003
  • As mobile device is becoming more popular, E-Commerce changes into M-Commerce. Especially, IMT-2000 (International Mobile Telecommunication 2000) service is prepared for M-Commerce and this has USIM (Universal Subscriber Identity Module) as a core of certification of individuality and transactions. As a result, the area of mobile service going to expand by USIM. But, mobile services using USIM leave much to be desired, and developed application don't variety. In this paper, for the efficient design of USIM, the structure of USIM and protocol is analyzed, and secure payment solution in USIM is proposed. Specially, offline payment system is proposed for the verification of proposed protocols including security, saving, and calculation of balance. finally, the simulation of proposed payment system on USIM is performed using Java Card.

  • PDF

A Brokered Authentication Scheme Based on Smart-Card for Multi-Server Authentication (다중서버 인증을 위한 스마트카드 기반 중재 인증 기법 연구)

  • Kim, Myungsun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.3
    • /
    • pp.190-198
    • /
    • 2013
  • Since the facilities for the remote users tend to be deployed in distributed manner, authentication schemes for multi-server communication settings, which provide various web services, are required for real-world applications. A typical way to authenticate a remote user relies on password authentication mostly. However, this method is vulnerable to attacks and inconvenient as the system requires users to maintain different identities and corresponding passwords. On the other hand, the user can make use of a single password for all servers, but she may be exposed to variants of malicious attacks. In this paper, we propose an efficient and secure authentication scheme based on a brokered authentication along with smart-cards in multi-server environment. Further we show that our scheme is secure against possible attacks and analyze its performance with respect to communication and computational cost.

Phishing Attack Detection Using Deep Learning

  • Alzahrani, Sabah M.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.213-218
    • /
    • 2021
  • This paper proposes a technique for detecting a significant threat that attempts to get sensitive and confidential information such as usernames, passwords, credit card information, and more to target an individual or organization. By definition, a phishing attack happens when malicious people pose as trusted entities to fraudulently obtain user data. Phishing is classified as a type of social engineering attack. For a phishing attack to happen, a victim must be convinced to open an email or a direct message [1]. The email or direct message will contain a link that the victim will be required to click on. The aim of the attack is usually to install malicious software or to freeze a system. In other instances, the attackers will threaten to reveal sensitive information obtained from the victim. Phishing attacks can have devastating effects on the victim. Sensitive and confidential information can find its way into the hands of malicious people. Another devastating effect of phishing attacks is identity theft [1]. Attackers may impersonate the victim to make unauthorized purchases. Victims also complain of loss of funds when attackers access their credit card information. The proposed method has two major subsystems: (1) Data collection: different websites have been collected as a big data corresponding to normal and phishing dataset, and (2) distributed detection system: different artificial algorithms are used: a neural network algorithm and machine learning. The Amazon cloud was used for running the cluster with different cores of machines. The experiment results of the proposed system achieved very good accuracy and detection rate as well.

IMC Strategy of Sinhan Card for Building the Strong Brand Equity (신한카드 브랜드구축을 위한 IMC전략)

  • Ahn, Kwang Ho;Yoo, Chang Jo;Park, Woon Yong
    • Asia Marketing Journal
    • /
    • v.13 no.3
    • /
    • pp.249-264
    • /
    • 2011
  • Brand is the major enduring asset of a company and more valuable than the totality of specific products and facilities. Thus brands are powerful assets that must be carefully developed and managed. The company should design and implement marketing activities and marketing communication programs to build and grow the brand value. Strarbucks, Samsung Galaxy, and Nike brands get a price premium and generate strong customer loyalty. A power brand has high brand equity, which is the differential effect that brand knowledge has on consumer response to the marketing of that brand. Brand equity is created when brands have strong, favorable and unique brand associations with customers and high level of brand awareness. Therefore marketers in building a strong brand should ensure to develop the right type of customer experiences with products and effective integrated marketing communication(IMC) programs to create the brand equity. Since 2007 Sinhan card acquiring the LG card has developed the new brand identity and carefully managed the advertising campaign and other marketing communication mix tools to create the high brand awareness and differential brand image. In this case study we examine how Sinhan card with the goal of being No.1 brand in the credit card market has developed and implemented the IMC Strategy to build a high level of consumer brand awareness, unique brand image and strong customer relationship.

  • PDF

Security Enhancement of Lightweight User Authentication Scheme Using Smartcard (스마트카드를 이용한 안전한 경량급 사용자 인증 스킴의 설계)

  • Lee, Youngsook
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.209-215
    • /
    • 2020
  • The environment of the Internet provides an efficient communication of the things which are connected. While internet and online service provide us many valuable benefits, online services offered and accessed remotely through internet also exposes us to many different types of security threats. Most security threats were just related to information leakage and the loss of authentication on client-server environment. In 2016, Ahmed et al. proposed an efficient lightweight remote user authentication protocol. However, Kang et al. show that it's scheme still unstable and inefficient. It cannot resist offline identity guessing attack and cannot provide session key confirmation property. Moreover, there is some risk of biometric information's recognition error. In this paper, we propose an improved scheme to overcome these security weaknesses by storing secret data in device. In addition, our proposed scheme should provide not only security, but also efficiency since we only use hash function and XOR operation.

Analyses of Detection and Protection for Phishing on Web page (웹페이지의 피싱 차단 탐지 기술에 대한 분석)

  • Kim, Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.607-610
    • /
    • 2008
  • Phishing is a form of online identity theft that aims to steal sensitive information such as online banking passwords and credit card information from users. Phishing scams have been receiving extensive press coverage because such attacks have been escalating in number and sophistication. According to a study by Gartner, Many Internet users have identified the receipt of e-mail linked to phishing scams and about 2 million of them are estimated to have been tricked into giving away sensitive information. This paper presents a novel browser extension, AntiPhish, that aims to protect users against spoofed web site-based phishing attack.

  • PDF

The Study on the Security Requirements of USIM based on Java Card (자바카드 기반 USIM의 보안 요구사항에 관한 연구)

  • Jung, Yun-Seon;Jung, Young-Jun;Shin, Myoung-Sub;Lim, Sun-Hee;Yi, Ok-Yeon;Lim, Jong-In
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2007.10d
    • /
    • pp.56-61
    • /
    • 2007
  • 3세대 이동통신 방식인 WCDMA가 상용화됨에 따라 국내에서도 GSM 방식의 SIM 카드의 역할을 하는 USIM(Universal Subscriber identity Module) 카드가 본격적으로 도입되었다. USIM 카드는 WCDMA 단말기에 필수적으로 장착되며, 기존의 SIM 카드의 기본적인 기능 이외에도 다양한 기능이 추가될 수 있다. 본 논문에서는 자바카드의 구조 및 보안적 특징, USIM의 보안 요구사항 및 자바카드를 위한 USIM 아키텍쳐에 대해 설명한 후에 USIM의 다양한 활용을 위한 보안 고려사항에 대하여 논의한다.

  • PDF

Authentication Protocol with OTP Generation and Synchronization using Stream algorithm (스트림 알고리즘을 이용한 OTP 생성 및 동기화 인증 프로토콜)

  • Lee, Jang-Chun;Lee, Hoon-Jae;Kim, Tae-Yong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.10a
    • /
    • pp.305-308
    • /
    • 2007
  • 현재 네트워크상에 사용자를 인증하는 부분은 시스템 보안상으로 아주 중요한 역할을 하고 있다. 공개된 네트워크에서는 개인의 중요한 프라이버시 정보를 보호하기 위해 인증 절차를 거치게 된다. 이러한 인증 방법에는 간단한 Identity/Password 인증부터 복잡한 생채 공학 인증까지 다양한 기술들이 존재 한다. 최근 금융보안업계가 주축이 되어 일회용패스워드(OTP : One Time Password) 인증 시스템을 활용하기 위한 기술적 시도 및 개발이 활발히 이루어지고 있다. 일회용 패스워드는 사용자가 인증 받고자 할 때 새로운 패스워드를 생성하고 사용 후 버린다는 구조를 가지고 있다. 이는 매번 같은 패스워드를 사용했을 때 발생하는 보안 문제점을 해결할 수 있다. 그러나 OTP 인증 방법에도 여러 가지 공격 방법에 취약한 문제점들이 노출되어 있다. 본 논문은 기존의 인증 프로토콜 문제점을 개선하고 크기가 작은 스트림 알고리즘을 이용하여 스마트카드에서 사용 가능한 새로운 인증 프로토콜을 제안한다.

  • PDF

User Authentication in Smart card Using Signature (서명을 이용한 스마트카드 사용자 인증)

  • Song, Young-Sang;Shin, In-Chul;Lee, Wan-Suck;Son, Byub-Soo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.05c
    • /
    • pp.1957-1960
    • /
    • 2003
  • 최근 개인의 정보보호에 관한 관심이 높아져 가고 있으며 자신의 정보보호를 위해 스마트카드가 사용되어지고 있는 추세이다. 기존의 스마트카드는 카드 주체를 확인하는 과정으로 PIN(Personal Identity number) 제출을 요구한다. 본 논문에서 이러한 사용자의 확인 과정에 사용되는 PIN 대신 생체인식 중 서명을 스마트카드에 저장하였으며 이를 이용하여 사용자 인증을 위한 시스템에 대해 연구하였다. 본 논문은 스마트카드의 패스워드의 분실이나 강제에 의한 도용을 방지하고 사용자에 좀더 익숙하고 안전한 서비스를 보장 받게 될 것이다.

  • PDF