• Title/Summary/Keyword: Identity verification

Search Result 133, Processing Time 0.02 seconds

Publication Trends and Future Research Directions of Korean Journal of Health Service Management : A Focus on Hospital Management (보건의료산업학회지의 지난 10년간 게재경향 및 향후 연구방향 : 병원관리분야를 중심으로)

  • Choi, Ryoung;Ahn, Sang-Yoon
    • The Korean Journal of Health Service Management
    • /
    • v.13 no.4
    • /
    • pp.9-17
    • /
    • 2019
  • Objectives: The purpose of this study is to explore the developmental direction of the hospital management field that contributes to the academic and practical development of the health care industry and to establish its identity by using the Korean Journal of Health Service Management. Methods: A total of 156 papers were analyzed from April 2007 to December 2018. Frequency analysis and descriptive statistics were performed using SPSS 25.0. Results: The volume of articles published in the hospital management field was decreasing and the ratio was relatively low due to the nature of the journal. The disposition of the papers in the hospital management field excessively focused on the organizational behavior field, and research in the management field that was difficult to access was decreasing. In addition, about 83% of the participants were drawn from hospitals. Conclusions: It is necessary to present guidelines for publication of theses so that a managerial approach can be made rather than an approach to industrial psychological theory verification.

Development and Validation of the Strengths Assessment Indicators for Daycare Centers (어린이집 강점평가지표 개발 및 타당화)

  • Hong, Sung hee;Hwang, Hae-Ik
    • Korean Journal of Childcare and Education
    • /
    • v.14 no.6
    • /
    • pp.143-170
    • /
    • 2018
  • Objective: The purpose of this study was to develop assessment indicators and to verify the validity and reliability of the developed assessment indicators. Methods: A Delphi survey, focus group interviews, and content verification were conducted in order for experts to develop an evaluation index of the strengths of the day care center. A main survey was conducted on 438 daycare center principals and teachers to test their item quality, validity and reliability. Results: The final assessment indicators consisted of three areas, seven assessment criteria, 19 evaluation factors, 41 assessment items and a five-point rubric rating scale. As for the common strengths indicators, there were three assessment areas, five assessment criteria, 12 assessment elements and 22 assessment items. In regard to the selective strengths indicators, there were 3 assessment areas, 5 assessment criteria, 12 assessment elements and 16 assessment items. Conclusion/Implications: The efforts to confirm the strengths of daycare centers are expected to facilitate the identity building of the daycare center itself and for its organizational members to make a contribution to the qualitative improvement of childcare.

Efficient Proxy Re-encryption Scheme for E-Voting System

  • Li, Wenchao;Xiong, Hu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.5
    • /
    • pp.1847-1870
    • /
    • 2021
  • With the development of information and communication technologies, especially wireless networks and cell phones, the e-voting system becomes popular as its cost-effectiveness, swiftness, scalability, and ecological sustainability. However, the current e-voting schemes are faced with the problem of privacy leakage and further cause worse vote-buying and voter-coercion problems. Moreover, in large-scale voting, some previous e-voting system encryption scheme with pairing operation also brings huge overhead pressure to the voting system. Thus, it is a vital problem to design a protocol that can protect voter privacy and simultaneously has high efficiency to guarantee the effective implementation of e-voting. To address these problems, our paper proposes an efficient unidirectional proxy re-encryption scheme that provides the re-encryption of vote content and the verification of users' identity. This function can be exactly applied in the e-voting system to protect the content of vote and preserve the privacy of the voter. Our proposal is proven to be CCA secure and collusion resistant. The detailed analysis also shows that our scheme achieves higher efficiency in computation cost and ciphertext size than the schemes in related fields.

Implementation of monitoring system for availability of Hyperledger Indy (Hyperledger Indy의 가용성을 위한 모니터링 시스템 구현)

  • Gyu Hyun Choi;Geun Hyung Kim
    • Smart Media Journal
    • /
    • v.12 no.3
    • /
    • pp.60-67
    • /
    • 2023
  • Hyperledger Indy is an open-source implementation of DID, a decentralized identity verification technology. Hyperledger Indy uses the RBFT consensus algorithm, and if there is a lack of consensus with more than a certain number of problem nodes in the pool, data is not added. This problem can be prevented in advance by adding a node, and a node monitoring system was implemented to operate automatically. The node monitoring system continuously checks the status of the pool and automatically adds nodes when there are more than a certain number of problematic nodes to prevent consensus problems from occurring. This proposed method can increase the availability of Hyperledger Indy and is a study that can be referenced in various blockchain services that use consensus algorithms.

Biometric verified authentication of Automatic Teller Machine (ATM)

  • Jayasri Kotti
    • Advances in environmental research
    • /
    • v.12 no.2
    • /
    • pp.113-122
    • /
    • 2023
  • Biometric authentication has become an essential part of modern-day security systems, especially in financial institutions like banks. A face recognition-based ATM is a biometric authentication system, that uses facial recognition technology to verify the identity of bank account holders during ATM transactions. This technology offers a secure and convenient alternative to traditional ATM transactions that rely on PIN numbers for verification. The proposed system captures users' pictures and compares it with the stored image in the bank's database to authenticate the transaction. The technology also offers additional benefits such as reducing the risk of fraud and theft, as well as speeding up the transaction process. However, privacy and data security concerns remain, and it is important for the banking sector to instrument solid security actions to protect customers' personal information. The proposed system consists of two stages: the first stage captures the user's facial image using a camera and performs pre-processing, including face detection and alignment. In the second stage, machine learning algorithms compare the pre-processed image with the stored image in the database. The results demonstrate the feasibility and effectiveness of using face recognition for ATM authentication, which can enhance the security of ATMs and reduce the risk of fraud.

Mediated ID based signature scheme and key updating signature scheme (중재자를 이용한 ID기반 전자서명과 키 업데이팅 전자서명 기법)

  • Ju, Hak-Soo;Kim, Dae-Youb
    • The KIPS Transactions:PartC
    • /
    • v.14C no.6
    • /
    • pp.463-470
    • /
    • 2007
  • Revocation is one of the main difficulties faced in implementing Public Key Infrastructures(PHs). Boneh, Ding and Tsudik first introduced a mediated cryptography for obtaining immediate revocation of RSA keys used in PKIs. Their method is based on the idea that each user's private key can be split into two random shares, one of which is given to the user and the other to an online security mediator(SEM). Thus any signature or decryption must be performed as a cooperation between a user and his/her associated SEM and revocation is achieved by instructing the mediator SEM to stop cooperating the user. Recently, Libert and Quisquater showed that the fast revocation method using a SEcurity Mediator(SEM) in a mRSA can be applied to the Boneh-Franklin identify based encryption and GDH signature schemes. In this paper we propose a mediated identity based signature(mIBS) with batch verification which apply the SEM architecture to an identity based signature. Libert's GDH siganture scheme is not forward secure even though forward security is an important and desirable feature for signature schemes. We propose an efficient key udating mediated signature scheme, mKUS based on mIBS and analyze its security and efficiency.

Design Program for the Regional Development (지역진흥을 위한 디자인개발 프로그램)

  • 하상오
    • Archives of design research
    • /
    • v.15 no.1
    • /
    • pp.379-388
    • /
    • 2002
  • Since policies of each local government toward regional development have been focusing on only development of the individual applied items such as a character merchandise, co-regional brand, and developing a speciality for the region, the adverse effects of design have been came out. So we carried out this research to minimize the adverse effect of design and also we would like to give the opportunity of thinking of a new way to activate local economy, to create regional identity and to develop local resources by applying the Cl program which have bean used as the way of business improvement coping with the conceptional change of competitiveness with a comprehensive view. Therefore, for design to play an important role in regional development, as standing on the basis of regional development it is necessary to attain the various goals such as activating administrative organization, improving the administrative image, and making the local in go unique. And also it is necessary to develop the communicational strategy as an innovative and expressive program which can consider human network development as an regional resource. To carry out this communicational strategy effectively, in particular, it is not only inevitable to operate the strategic and comprehensive programs promoting the regional development according to the of 6 stages design develop cent program which consists of region's self-verification and self-recognition, self-determination, development of self-innovation, visibility to unify the regional images, creating the design system, and carrying out and verifying the program, but also it is necessary to apply regional development system which can change the regional basic plan, aiming at regional development, into unique regional trait that has an future image by improving the program with constant management and feedback through verifying the design program.

  • PDF

Secure Certificates Duplication Method Among Multiple Devices Based on BLE and TCP (BLE 및 TCP 기반 다중 디바이스 간 안전한 인증서 복사 방법)

  • Jo, Sung-Hwan;Han, Gi-Tae
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.2
    • /
    • pp.49-58
    • /
    • 2018
  • A certificate is a means to certify users by conducting the identification of the users, the prevention of forgery and alteration, and non-repudiation. Most people use an accredited certificate when they perform a task using online banking, and it is often used for the purpose of proving one's identity in issuing various certificates and making electronic payments in addition to online banking. At this time, the issued certificate exists in a file form on the disk, and it is possible to use the certificate issued in an existing device in a new device only if one copies it from the existing device. However, most certificate duplication methods are a method of duplication, entering an 8-16 digit verification code. This is inconvenient because one should enter the verification code and has a weakness that it is vulnerable to security issues. To solve this weakness, this study proposes a method for enhancing security certificate duplication in a multi-channel using TCP and BLE. The proposed method: 1) shares data can be mutually authenticated, using BLE Advertising data; and 2) encrypts the certificate with a symmetric key algorithm and delivers it after the certification of the device through an ECC-based electronic signature algorithm. As a result of the implementation of the proposed method in a mobile environment, it could defend against sniffing attacks, the area of security vulnerabilities in the existing methods and it was proven that it could increase security strength about $10^{41}$ times in an attempt of decoding through the method of substitution of brute force attack existing method.

Proposal for 2-WAY Trade Verification Model that Based on Consensus between Trading Partners (거래당사자간 합의에 기반하는 온라인 전자금융 2-WAY 거래인증 모델 제안)

  • Lee, Ig-jun;Oh, Jae-sub;Youm, Heung-youl
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.6
    • /
    • pp.1475-1487
    • /
    • 2018
  • To verify remitter's identity when the remitter transfers money to a recipient using an electronic financial service provided by the financial institution, the remitter inputs the information; such as the withdrawal account number, the withdrawal amount, the password pre-registered with the financial company, or the information from authenticating medium that is previously distributed by the financial institution. However, the 1-Way transaction between the financial institution and the remitter is exposed to a great risk of accidents such as an anomaly remittance or a voice phishing fraud. Therefore, in this study, we propose a 2-WAY trade verification model for electronic financial transaction that can be mutually agreed by allowing the recipient to share the transaction information with the remitter and the financial company. We have improved the traditional electronic financial transaction's method by replacing it to 2-WAY trade method, and it is used for various purposes; such as preventing an error within the remittance or voice phishing fraud, enhancing loan transaction and contract transaction, etc. Through these variety of applications, we are expecting to reduce the inconveniences while improving the convenience of financial transaction and vitalizing the P2P transaction of financial institution.

Development of Community Design Evaluation Index from the Perspective of Sustainability (지속가능성의 관점에서 본 커뮤니티디자인 평가지표 개발)

  • Geng, Li;Yoon, Ji-Young
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.5
    • /
    • pp.110-124
    • /
    • 2022
  • The purpose of this study is to develop community design evaluation factors for sustainable urban regeneration and to suggest considerations for sustainable community design by analyzing excellent community design cases. Through literature review, previous studies on the concept and core items of sustainable urban regeneration, and the concept and components of community design were considered. In addition, evaluation indicators for sustainable community design were developed in the socio-economic, physical, environmental, historical and cultural dimensions through the analysis of the linkage with the evaluation factors of community design through the analysis of previous studies. The evaluation index consists of 3 evaluation items and 9 items including social performance and participation at the social level, economic feasibility at the economic level, environmental characteristics at the physical and environmental level, accessibility, contextuality, locality at the historical and cultural level, identity, and artistry. Includes dog evaluation factors. Reliability and effectiveness are secured through the developed evaluation index and detailed description and expert verification. Exploratory factor analysis and expert interviews were conducted through the survey, and as a result of the analysis, the stability and Cronbach'α coefficients were verified, and the validity of the community design evaluation index considering sustainable urban regeneration was recognized through expert interview. The results of this study are considered meaningful in that they can provide basic data for the improvement of community design for sustainable urban regeneration in the future.