• Title/Summary/Keyword: Identity verification

Search Result 133, Processing Time 0.024 seconds

A Secure Maintenance Scheme of Secret Data on Trusted Mobile Platform Environment (Trusted Mobile Platform 환경에서의 안전한 비밀 데이터 유지(이전) 방안)

  • Kang, Dong-Wan;Lee, Im-Yeong;Han, Jin-Hee;Jun, Sung-Ik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.4
    • /
    • pp.79-91
    • /
    • 2008
  • Modern society as an information society, a lot of information is communicated in on-line. Specially, mobile environment based on radio communication has a characteristic of flexibility compared with wire communication and is developed rapidly. However, the more mobile technology is developed the more security for sensitive information is needed. Therefore, MTM(Mobile Trusted Module) is developed and promoted by TCG(Trusted Computing Group), which is an industry standard body to enhance the security level in the mobile computing environment. MTM, hardware security module for mobile environment, offers user's privacy protection, platform integrity verification, and individual platform attestation. On the other hand, secure migration scheme is required in case secret data or key is transferred from one platform to the other platform. In this paper, we analyze migration schemes which were described in TCG standard and other papers and then propose security maintenance scheme for secret data using USIM(Universal Subscriber Identity Module).

The Effects of Adolescents' Truancy Experience on Self-awareness and Emotional Problems - Based on the Data of Korean Children and Youth Panel Survey(KCYPS) - (청소년의 무단결석 경험이 자아인식과 정서문제에 미치는 영향 - 한국아동·청소년패널 자료를 중심으로 -)

  • Jeon, Gu-Hun
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.6
    • /
    • pp.369-379
    • /
    • 2021
  • The purpose of this study was empirical verification of the effect of adolescents' truancy experience on the self-awareness and emotional problems. For this, using the data of 2016 in the Korean Children and Youth Panel Survey(KCYPS), we compared and analyzed using t-test and multiple regression analysis the self-awareness and emotional problems of adolescents who experienced truancy and adolescents who did not. As a result of the analysis, adolescents with truancy experience had relatively low self-awareness, and statistically significant but low scores in self-identity and career identity. However, there was a clear difference in emotional problems, and truancy adolescents scored high in attention, aggression, physical symptoms, and depression. This proved that adolescents with experience of truancy were more exposed to emotional problems, and it was necessary to develop a support system and program for this.

Reverse Engineering Procedure of Metal Brake Pad for Part 25 Aircraft (수송류 항공기용 금속계 제동패드의 역설계 절차)

  • Min-ji Kim;Kyung-il Kim;Kyung-taek Kim
    • Journal of Advanced Navigation Technology
    • /
    • v.27 no.5
    • /
    • pp.621-628
    • /
    • 2023
  • This study derived a reverse engineering procedure for verifying the design identity of original parts and developed parts for PMA(Parts Manufacturer Approval) and STC(Supplemental Type Certificate) of metal brake pads for transport aircraft, which are critical parts among aircraft parts and equipment. In Korea, the regulations for reverse engineering procedures are regulated by the Parts Manufacturer Approval Guidelines, and in the United States, AC No. 21. 303-4. In the reverse engineering for the brake pad, the detailed procedures for each component were determined by selecting verification test items to confirm identity based on sample quantity, dimensional tolerance, mechanical property measurement, material, weight and volume characteristics for each component. In addition, as a result of analyzing the regulation of Korea and United States, in the case of Korea, it is necessary to establish technical standards for braking systems for transport aircraft and regulations related to flight tests.

Implementation of A Security Token System using Fingerprint Verification (지문 인증을 이용한 보안 토큰 시스템 구현)

  • 문대성;길연희;안도성;반성범;정용화;정교일
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.4
    • /
    • pp.63-70
    • /
    • 2003
  • In the modern electronic world, the authentication of a person is an important task in many areas of online-transactions. Using biometrics to authenticate a person's identity has several advantages over the present practices of Personal Identification Numbers(PINs) and passwords. To gain maximum security in the verification system using biometrics, the computation of the verification as well as the store of the biometric pattern has to be taken place in the security token(smart card, USB token). However, there is an open issue of integrating biometrics into the security token because of its limited resources(memory space, processing power). In this paper, we describe our implementation of the USB security token system having 206MHz StrongARM CPU, 16MBytes flash memory, and 1MBytes RAM. Also, we evaluate the performance of a light-weighted In-gerprint verification algorithm that can be executed in the restricted environments. Based on experimental results, we confirmed that the RAM requirement of the proposed algorithm was about 6.8 KBytes and the Equal Error Rate(EER) was 1.7%.

OTP-Based Transaction Verification Protocol Using PUFs (PUF를 이용한 OTP 기반 거래 검증 프로토콜)

  • Lee, Jonghoon;Park, Minho;Jung, Souhwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.6
    • /
    • pp.492-500
    • /
    • 2013
  • The One-Time Password(OTP) Generator is used as a multi-factor authentication method to ensure secure transaction during e-Financial transaction in the bank and securities company. The OTP based e-Financial Transaction Verification Protocol ensures secure e-financial transaction through confirming the user's identity using OTP authentication information and counters not only Man-in-the-Browser(MITB) attacks but also memory hacking attacks. However, it is possible to generate correct OTPs due to potential of stealing sensitive information of the OTP generator through intelligent phishing, pharming, social engineering attacks. Therefore, it needs another scheme to prevent from above threats, and this paper proposes advanced scheme using Physical Unclonable Functions(PUFs) to solve these problems. First, it is impossible to generate the same OTP values because of the hysically unclonable features of PUFs. In addition, it is impossible to clone OTP generator with hardware techniques. Consequently, the proposed protocol provides stronger and more robust authentication protocol than existing one by adding PUFs in the OTP generator.

Robust Fuzzy Fingerprint Vault System against Correlation Attack (상관관계 공격에 강인한 지문퍼지볼트 시스템)

  • Moon, Dae-Sung;Chae, Seung-Hoon;Chung, Yong-Wha;Kim, Sung-Young;Kim, Jeong-Nyeo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.2
    • /
    • pp.13-25
    • /
    • 2011
  • Biometric-based authentication can provide strong security guarantee about the identity of users. However, security of biometric data is particularly important as the compromise of the data will be permanent. The fuzzy fingerprint vault system is one of the most popular solutions for protecting the fingerprint template stored in the database. Recently, however, this system is very susceptible to a correlation attack that finds the real minutiae using multiple fingerprint vaults enrolled for different applications. To solve this problem, we propose a robust fuzzy fingerprint vault system against the correlation attack. In this paper, we add chaff minutiae based on the relative information of minutiae such as direction, coordinate instead of adding randomly. Also, our proposed approach allow to add multiple chaff minutiae within tolerance box for enhanced security level. Experimental results show that the proposed approach can protect the correlation attack and achieve enhanced verification accuracy.

A Study on the Exhibition 《Women_Independence Movement_Gimhae》 from a Psychoanalytic Feminist Point of View: Based on the Theories of L. Irigaray and J. Kristeva (정신분석학적 페미니즘 관점에서의 《어와 만세 백성들아, 여성_독립운동_김해》전시 연구 - L. 이리가레이와 J. 크리스테바의 이론을 중심으로 -)

  • Choi, Jeong Eun
    • Korean Association of Arts Management
    • /
    • no.55
    • /
    • pp.155-184
    • /
    • 2020
  • This paper aims to reveal the merits and demerits of the exhibition by examining whether the subject intended at the exhibition planning stage was finally persuasively implemented throughout the work and exhibition, along with the theoretical verification of the way the exhibition dealing with the history of the women's independence movement from the psychoanalytic feminist point of view. To this end, a more fundamental approach to the theme of the Women's Independence Movement calls for the search for a feminine language that can capture women's unique identity rather than a masculine language such as the existing independence movement exhibition method, and for finding such feminine language, a feminine speech, art and poetic language, maternal genealogy, and women's solidarity are presented, along with theories. This paper, which expounds the role of art works in exhibitions dealing with history through theoretical verification of actual exhibition cases, has significance as communication between theory and field.

A Case Study on the classroom life and the identity of the Elementary Mathematics Gifted Education (초등수학 영재교육원의 교실 생활과 정체성에 대한 사례연구)

  • Lee, Hak-Ro;Ryu, Sung-Rim
    • Communications of Mathematical Education
    • /
    • v.25 no.1
    • /
    • pp.99-118
    • /
    • 2011
  • For this case study of gifted education, two classrooms in two locations, show life in general of the gifted educational system. And for this case study the identity of teachers and the gifted, help to activate the mathematically gifted education for these research questions, which are as followed: Firstly, how is the gifted education classroom life? Secondly, what kind of identity do the teachers and gifted students bring to mathematics, mathematics teaching and mathematics learning? Being selected in the gifted children's education center solves the research problem of characteristic and approach. Backed by the condition and the permission possibility, 2 selected classes and 2 people, which are coming and going. Gifted education classroom life, the identity of teachers and gifted students in mathematics and mathematics teaching and mathematic learning. It will be for 3 months, with various recordings and vocal instruction between teacher and students. Collected observations and interviews will be analyzed over the course of instruction. The results analyzed include, social participation, structure, and the formation of the gifted education classroom life. The organization of classes were analyzed by the classes conscious levels to collect and retain data. The classes verification levels depended on the program's first class incentive, teaching and learning levels and understanding of gifted math. A performance assessment will be applied after the final lesson and a consultation with parents and students after the final class. The six kinds of social participation structure come out of the type of the most important roles in gifted education accounts, for these types of group discussions and interactions, students must have an interaction or individual activity that students can use, such as a work product through the real materials, which release teachers and other students for that type of questions to evaluate. In order for the development of meaningful mathematical concepts to formulate, mathematical principles require problem solving among all students, which will appear in the resolution or it will be impossible to map the meaning of the instruction from which it was formed. These results show the analysis of the mathematics, mathematics teaching, mathematics learning and about the identity of the teachers and gifted. Gifted education teachers are defined by gifted math, which is more difficult and requires more differentiated learning, suitable for gifted students. Gifted was defined when higher level math was created and challenged students to deeper thinking. Gifted students think that gifted math is creative learning and they are forward or passive to one-way according to the education atmosphere.

A Method of Reusing Kinematic Information for Virtual Facilities (동작 정보를 갖는 가상설비 데이터 재활용 방법론)

  • Ko, Min-Suk;Shin, Hye-Seon;Wang, Gi-Nam;Park, Sang-Chul
    • Korean Journal of Computational Design and Engineering
    • /
    • v.16 no.4
    • /
    • pp.305-313
    • /
    • 2011
  • This paper proposes a method for reusing kinematic design data for virtual facilities, Making a virtual model of a facility involves two major activities: geometric design (virtual model visualization) and kinematic design that should be remodeled frequently whenever design changes occur, Conventionally, a virtual model of an automated facility focuses on the design level, which mainly deals with design verification, alternative comparison, and geometric model diagnosis, Although a design level model can be designed with the information of past models from PLM system, a simulation level model is not sufficient utilized to be reused for kinematic design purpose, We propose a method for reusing kinematic information of a past simulation model to cope with this problem, We use the concept or the 'center of mass', which is a point representing the mean position of the matter in a body or system. And we also use comparison method of a boundary box to identity which 3D objects have to be involved from the design model to a link structure that is contained in the simulation model. Because a proposed method only use not a historical approach but a geometrical approach, it is more effective to apply to the field.

IBC-Based Entity Authentication Protocols for Federated Cloud Systems

  • Cao, Chenlei;Zhang, Ru;Zhang, Mengyi;Yang, Yixian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.5
    • /
    • pp.1291-1312
    • /
    • 2013
  • Cloud computing changes the service models of information systems and accelerates the pace of technological innovation of consumer electronics. However, it also brings new security issues. As one of the important foundations of various cloud security solutions, entity authentication is attracting increasing interest of many researchers. This article proposes a layered security architecture to provide a trust transmission mechanism among cloud systems maintained by different organizations. Based on the security architecture, four protocols are proposed to implement mutual authentication, data sharing and secure data transmission in federated cloud systems. The protocols not only can ensure the confidentiality of the data transferred, but also resist man-in-the-middle attacks and masquerading attacks. Additionally, the security properties of the four protocols have been proved by S-pi calculus formal verification. Finally, the performance of the protocols is investigated in a lab environment and the feasibility of the security architecture has been verified under a hybrid cloud system.