• Title/Summary/Keyword: Identity verification

Search Result 131, Processing Time 0.03 seconds

Roles of Social Identity Verification in the Effects of Symbolic and Evaluation Relevance on Chinese Consumers' Brand Attitude

  • Choi, Nak-Hwan;Xu, Huimin;Teng, Zhuoqi
    • Asian Journal of Business Environment
    • /
    • v.8 no.4
    • /
    • pp.17-27
    • /
    • 2018
  • Purpose - Current study aimed at investigating the symbolic and evaluation relevance to global luxury brands as the causes of inducing social identity verification, and also explored whether the social identity verification will affect the attitude toward the brands. Research design, data, and methodology - 323 questionaries from Chinese consumers were used to test hypotheses by structural equation model of AMOS 22.0. Results - First, social identity verification positively affected on the brand attitude. Second, both the symbolic relevance and the evaluation relevance positively affected on social identity verification. Third, the mediation roles of social identity verification were identified. Social identity verification played a full mediation role in the effect of the symbolic relevance on the brand attitude, and played a partial mediation role in the effect of the evaluation relevance on the brand attitude. Conclusions - This study could contribute to the advancement of theory concerned with the roles of consumers' social identity verification which induces positive attitude toward the global luxury brands. Global brand managers in China should try to search ways by which consumers can feel both the symbolic relevance and evaluation relevance to their luxury brands, and should make efforts to improve the symbolic relevance and evaluation relevance to their brand.

Design of an Authentication System Based on Personal Identity Verification Card (전자신분증 기반의 개인 신분확인을 위한 인증시스템 설계)

  • Park, Young-Ho;Kong, Byung-Un;Rhee, Kyung-Hyune
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.8
    • /
    • pp.1029-1040
    • /
    • 2011
  • Electronic identity (e-ID) card based on smartcard is a representative identity credential for on-line and off-line personal identification. The e-ID card can store the personal identity information securely, so that the information can be accessed fast, automated identity verification and used to determine the cardholder's authorization to access protected resources. Due to such features of an e-ID card, the number of government organizations and corporate enterprises that consider using e-ID card for identity management is increasing. In this paper, we present an authentication framework for access control system using e-ID cards by discussing the threat environment and security requirement against e-ID card. Specifically, to accomplish our purpose, we consider the Personal Identity Verification system as our target model.

Efficient Signature Scheme with Batch Verifications in Identity-Based Framework

  • Gopal, P.V.S.S.N.;Vasudeva Reddy, P.;Gowri, T.
    • ETRI Journal
    • /
    • v.38 no.2
    • /
    • pp.397-404
    • /
    • 2016
  • In group-oriented applications, it is often required to verify a group of signatures/messages. The individual verification of signed messages in such applications comes at a high cost in terms of computations and time. To improve computational efficiency and to speed up the verification process, a batch verification technique is a good alternative to individual verification. Such a technique is useful in many real-world applications, such as mail servers, e-commerce, banking transactions, and so on. In this work, we propose a new, efficient identity-based signature (IDS) scheme supporting batch verifications. We prove that the proposed IDS scheme and its various types of batch verifications is tightly related to the Computational Diffie.Hellman problem under a random oracle paradigm. We compare the efficiency of the proposed scheme with related schemes that support batch verifications.

The Study of the Relation between the Deciding Factors of Local Identity and Local Image Improvement - Focusing on the 2016 Festival of Daegaya Experience- (지역정체성 확립요인과 지역이미지 제고와의 관련성 연구 -'2016 가야체험축제'를 중심으로-)

  • Kim, Hyung-Jun
    • Journal of the Korea Safety Management & Science
    • /
    • v.19 no.2
    • /
    • pp.117-133
    • /
    • 2017
  • The purpose of this study is to consider the relation between the deciding factors of local identity and local image improvement. To achieve this purpose, the deciding factors of local identity have been set as the following four: historical identity, cultural identity, (nature) scenery identity, and industrial identity. The writer has established a model to represent the relation between these factors and the local image improvement, namely 'Visitor Satisfaction' and 'Revisit Intentions', and framed a hypothesis for empirical verification. The study results are as follows: First, the deciding factors of local identity which this study addressed are empirically proven to have a significant effect on the visitor satisfaction and the intention to revisit in which is it likely that the greater the impact of the deciding factors, the higher the visitor satisfaction and revisit intentions would be. Second, the deciding factors of local identity, it appears that the 'historical identity' factor had the largest impact on the visitor satisfaction, and the 'cultural identity' factor had the largest impact on the revisit intentions. Therefore, of the four deciding factors, the 'historical identity' should be considered the highest priority to increase the visitor satisfaction, and the 'cultural identity' should be considered the highest priority to increase the revisit intentions. Third, based on the verification of the relation between the visitor satisfaction and revisit intentions, it can be presumed that the greater the visitor satisfaction, the higher the revisit intentions would be.

An Efficient Broadcast Authentication Scheme with Batch Verification for ADS-B Messages

  • Yang, Haomiao;Kim, Hyunsung;Li, Hongwei;Yoon, Eunjun;Wang, Xiaofen;Ding, Xuefeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.10
    • /
    • pp.2544-2560
    • /
    • 2013
  • As a cornerstone of the next generation air traffic management (ATM), automatic dependent surveillance-broadcast (ADS-B) system can provide continual broadcast of aircraft position, identity, velocity and other messages over unencrypted data links to generate a common situational awareness picture for ATM. However, since ADS-B messages are unauthenticated, it is easy to insert fake aircrafts into the system via spoofing or insertion of false messages. Unfortunately, the authentication for ADS-B messages has not yet been well studied. In this paper, we propose an efficient broadcast authentication scheme with batch verification for ADS-B messages which employs an identity-based signature (IBS). Security analysis indicates that our scheme can achieve integrity and authenticity of ADS-B messages, batch verification, and resilience to key leakage. Performance evaluation demonstrates that our scheme is computationally efficient for the typical avionics devices with limited resources, and it has low communication overhead well suitable for low-bandwidth ADS-B data link.

Secure and Efficient Identity-based Batch Verification Signature Scheme for ADS-B System

  • Zhou, Jing-xian;Yan, Jian-hua
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.12
    • /
    • pp.6243-6259
    • /
    • 2019
  • As a foundation of next-generation air transportation systems, automatic dependent surveillance-broadcast (ADS-B) helps pilots and air traffic controllers create a safer and more efficient national airspace system. Owing to the open communication environment, it is easy to insert fake aircraft into the system via spoofing or the insertion of false messages. Efforts have thus been made in academic research and practice in the aviation industry to ensure the security of transmission of messages of the ADS-B system. An identity-based batch verification (IBV) scheme was recently proposed to enhance the security and efficiency of the ADS-B system, but current IBV schemes are often too resource intensive because of the application of complex hash-to-point operations or bilinear pairing operations. In this paper, we propose a lightweight IBV signature scheme for the ADS-B system that is robust against adaptive chosen message attacks in the random oracle model, and ensures the security of batch message verification and against the replaying attack. The proposed IBV scheme needs only a small and constant number of point multiplication and point addition computations instead of hash-to-point or pairing operations. Detailed performance analyses were conducted to show that the proposed IBV scheme has clear advantages over prevalent schemes in terms of computational cost and transmission overhead.

How do people verify identity in the Metaverse: Through exploring the user's avatar (메타버스 내 아바타 정체성 확인에 영향을 미치는 요인에 관한 연구)

  • Kihyun Kim;Seongwon Lee;Kil-Soo Suh
    • Journal of Intelligence and Information Systems
    • /
    • v.29 no.2
    • /
    • pp.189-217
    • /
    • 2023
  • The metaverse is a virtual world where individuals engage in social, economic, and cultural activities using avatars, which represent an alternate version of oneself within the virtual realm. While the metaverse has garnered global attention recently, research exploring the identity manifested through avatars within the metaverse remains limited. This study investigates the influence of four IT artifact characteristics related to avatar usage in the metaverse-avatar representation, avatar copresence, avatar profiling, and avatar-space interaction-on perceived avatar identity verification. A survey was conducted with 196 experienced users of the Zepeto platform, and hypotheses were tested using structural equation modeling. The analysis results indicate that the use of IT artifacts enabling avatar representation, avatar copresence, and avatar-space interaction has a positive impact on perceived avatar identity verification. This achieved self-verification indirectly influences the satisfaction and subsequent intention to continue using the metaverse. This study contributes to the academic field by empirically verifying the metaverse technological factors that influence the projected identity onto avatars within the metaverse. Furthermore, it is expected to provide effective guidelines for metaverse platform companies in designing and implementing the metaverse.

Storing information of stroke rehabilitation patients using blockchain technology: a software study

  • Chang, Min Cheol
    • Journal of Yeungnam Medical Science
    • /
    • v.39 no.2
    • /
    • pp.98-107
    • /
    • 2022
  • Background: Stroke patients usually experience damage to multiple functions and a long rehabilitation period. Hence, there is a large volume of patient clinical information. It thus takes a long time for clinicians to identify the patient's information and essential pieces of information may be overlooked. To solve this, we stored the essential clinical information of stroke patients in a blockchain and implemented the blockchain technology using the Java programming language. Methods: We created a mini blockchain to store the medical information of patients using the Java programming language. Results: After generating a unique pair of public/private keys for identity verification, a patient's identity is verified by applying the Elliptic Curve Digital Signature Algorithm based on the generated keys. When the identity verification is complete, new medical data are stored in the transaction list and the generated transaction is verified. When verification is completed normally, the block hash value is derived using the transaction value and the hash value of the previous block. The hash value of the previous block is then stored in the generated block to interconnect the blocks. Conclusion: We demonstrated that blockchain can be used to store and deliver the patient information of stroke patients. It may be difficult to directly implement the code that we developed in the medical field, but it can serve as a starting point for the creation of a blockchain system to be used in the field.

FinDID : A DID service supporting the standard service scheme for the financial sector

  • Lee, Young-Eun;Kim, Hye-Won;Lee, Myung-Joon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.5
    • /
    • pp.127-138
    • /
    • 2022
  • In this paper, we present FinDID (Financial Decentralized IDentity), a blockchain-based DID(Decentralized IDentity) service that can flexibly control personal information or credentials through a systematic verification method while complying with the standard service scheme of decentralized identity for the financial sector. DID is an identity management system used in a decentralized environment without a specific certification authority, and as a technology that allows users to control their own information, it can realize self-sovereignty over users' own personal information. Through FinDID, users receive credentials that authenticate their various personal information from the issuer, select only the claims required by the target financial service using their personal electronic wallet, create presentations from credentials. Then they submit it to the financial service, leading to their qualification from the service. FinDID consists of electronic wallet, credential issuer, credential storage, DID service including DID management contract and credential management contract, and financial services using this service scheme. The DID service manages each user's DID and supports all verification processes of the associated identity management scheme.

Validation of 17 Microsatellite Markers for Parentage Verification and Identity Test in Chinese Holstein Cattle

  • Zhang, Yi;Wang, Yachun;Sun, Dongxiao;Yu, Ying;Zhang, Yuan
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.23 no.4
    • /
    • pp.425-429
    • /
    • 2010
  • To develop an efficient DNA typing system for Chinese Holstein cattle, 17 microsatellites, which were amplified in four fluorescent multiplex reactions and genotyped by two capillary electrophoresis injections, were evaluated for parentage verification and identity test. These markers were highly polymorphic with a mean of 8.35 alleles per locus and an average expected heterozygosity of 0.711 in 371 individuals. Parentage exclusion probability with only one sampled parent was approximately 0.999. Parentage exclusion probability when another parent' genotype was known was over 0.99999. Overall probability of identity, i.e. the probability that two animals share a common genotype by chance, was $1.52{\times}10^{-16}$. In a test case of parentage assignment, the 17 loci assigned 31 out of 33 cows to the pedigree sires with 95% confidence, while 2 cows were excluded from the paternity relationship with candidate sires. The results demonstrated the high efficacy of the 17 markers in parentage analysis and individual identification for Chinese Holstein cattle.