• Title/Summary/Keyword: Security Techniques

Search Result 1,571, Processing Time 0.025 seconds

The Improved-Scheme of Two Factor Authentication using SMS (SMS를 이용하는 개선된 이중 인증 기법)

  • Ji, Seon-Su
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.17 no.6
    • /
    • pp.25-30
    • /
    • 2012
  • Passwords are a common method of identifying and authenticating a user who wishes to log on to a secure system. Password-based authentication techniques, however, do not provide strong security and recognized as being an poor form of protection. It is not all the responsibility of the user to control password and to protect its confidentiality. In this paper, confirm an appropriate response time and I propose a new and improved method of implementing two factor authentication using SMS via receiving apparatus(mobile and email).

A Study Personal 2D Color Feature Image Interpolation

  • Jo, Nam-Chul;Ku, Ja-Hyo;Kim, Hwi-Won;Lee, Ki-Dong
    • 한국정보컨버전스학회:학술대회논문집
    • /
    • 2008.06a
    • /
    • pp.177-180
    • /
    • 2008
  • Surveillance Cameras such as CCTV easily found in places requiring security and the prevention of crimes such as public institutions, banks, etc. play an important role as they prevent all sorts of crimes, and provide a decisive clue fix settling a criminal case. But, in case that a far-off person is photographed, an original image should be enlarged to identify the person. And as for the technique of enlarging an image, it is important to enlarge and restore it close to its original image rather than to merely magnify it. For the enlargement and restoration of an image, techniques called interpolation are used; as for interpolation methods known hitherto, however, the higher the magnifying power is, the more deteriorated the quality of an image becomes to the extent that the image cannot be identified. Therefore, in this paper, we are going to propose a new technique whereby the face outline in an image is vectorized and restored by means of FDP(Facial Definition Parameter) standardized by the MPEG-4 SNHC FBA group, and an image is restored to have better quality than images restored with the existing interpolation.

  • PDF

Reinforcement Learning Approach for Resource Allocation in Cloud Computing (클라우드 컴퓨팅 환경에서 강화학습기반 자원할당 기법)

  • Choi, Yeongho;Lim, Yujin;Park, Jaesung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.4
    • /
    • pp.653-658
    • /
    • 2015
  • Cloud service is one of major challenges in IT industries. In cloud environment, service providers predict dynamic user demands and provision resources to guarantee the QoS to cloud users. The conventional prediction models guarantee the QoS to cloud user, but don't guarantee profit of service providers. In this paper, we propose a new resource allocation mechanism using Q-learning algorithm to provide the QoS to cloud user and guarantee profit of service providers. To evaluate the performance of our mechanism, we compare the total expense and the VM provisioning delay with the conventional techniques with real data.

The Design of User-Authentication technique using QR-Code recognition (스마트폰의 QR-Code의 인식 기법을 이용한 사용자 인증 기법 설계)

  • Lee, Yong Jae;Kim, Young Gon;Park, Tae Sung;Jun, Moon Seog
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.7 no.3
    • /
    • pp.85-95
    • /
    • 2011
  • Smart phones, greatly expanding in the recent mobile market, are equipped with various features compared to existing feature phones and provide the conveniences to in several ways. The camera, one of the features of a smartphone, creates the digital contents, such photos and videos, and plays a role for the media which transmits information, such as video calls and bar code reader. QR-Code recognition is also one of the camera features. It contains a variety of information in two-dimensional bar code type in matrix format, and makes it possible to obtain the information by using smart phones. This paper analyzes the method of QR-Code recognition, password method-the existing user-authentication technique, smart card, biometrics and voice recognition and so on and thenn designs a new user-authentication technique. The proposed user-authentication technique is the technique in which QR-Code, which can be simply granted is read by smart phones and transmitted to a server, for authentication. It has the advantages in view that it will simply the process of authentication and conteract the disadvantages, such as brute force attack, man-inthe-middle attack, and keyboard hacking, which may occur in other authentication techniques.

Obstacles to Accessing Finance by Small Business Operators in the Buffalo City Metropolitan Municipality

  • Chimucheka, Tendai
    • Asian Journal of Business Environment
    • /
    • v.3 no.2
    • /
    • pp.23-29
    • /
    • 2013
  • Purpose - The study investigates the obstacles faced by small business owners (SBOs) in accessing finance in the Buffalo City Metropolitan Municipality. The study aims to identify the causes of inaccessibility to finance for SBOs, investigate the role of government agencies in supporting SBOs, assess the extent to which banks support SMMEs, and suggest solutions to ease the challenge of inaccessibility of finance. Research design, data, methodology -We used a triangulation research design, wherein SMME owners and managers in the Buffalo City Metropolitan Municipality were the target population. We used simple random sampling techniques to select respondents, and conducted in-depth interviews to collect qualitative data. Results - We analyzed quantitative data using descriptive statistics, Chi-square tests, and factor analysis. The qualitative data was analyzed using content analysis. The study identifies and discusses the obstacles in accessing finance; the main among which are the lack of collateral security, poor business plans, lack of knowledge, and lack of financial deposit. Conclusions -We urge the banks, government, and government agencies to support the SMME sector, for it remains the economic engine of many African countries and helps in reducing the impact of socio-economic challenges, like unemployment and poverty.

Hacking Aattack Trends Analysis of Mobile Smishing and Security Measures (Mobile Smishing 해킹 공격 동향 분석 및 보안대책)

  • Park, Dea-Woo;Yang, Sung-Yong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.283-284
    • /
    • 2015
  • Smartphone, tablet PC, notebook, such as the Internet banking and electronic commerce using a mobile device, as well as process and to their work. While going to high availability and convenience of mobile devices castle, SNS, letters, using an email Smishing financial fraud and leakage of personal information such as crime has occurred many. Smishing smartphone accidents increased sharply from 2013, MERS infection cases, landmine provocative events, such as the delivery of Thanksgiving has occurred cleverly using social engineering techniques. In this paper, i analyze the trends in Smishing hacking attacks on mobile devices since 2014. With regard to social issues, it analyzes the process of hacking attacks Smishing leading to financial fraud to mobile users.

  • PDF

An Ultra-Lightweight RFID Authentication Protocol Using Index (인덱스를 사용한 초경량 RFID 인증 프로토콜)

  • Lee, Jae-Kang;Oh, Se-Jin;Yun, Tae-Jin;Chung, Kyung-Ho;Ahn, Kwang-Seon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.1C
    • /
    • pp.24-33
    • /
    • 2012
  • Recently, the ultra-lightweight authentication RFID protocol that can actually implement on the RFID Tag is one among authentication protocols getting a concern, but recently many problems were clarified of the feature becase of the protocol which doesn't use the security algorithm. In this paper, we analyzed the problem of the ultra-lightweight authentication protocols and propose the design of ultra-lightweight RFID authentic ation protocols improving the index processing techniques. Because of improving the index processing technique in the method sending the Server authentication message to the authenticated tag, the proposed protocol is strong against the active attack which Li presents. Besides, the proposed protocol has the buffer storage of the keys and index and is strong against the asynchronous attack.

Design and Development of a PDA mobile banking System (PDA를 활용한 모바일뱅킹 시스템의 설계 및 구현)

  • Choi, Eui-Kwon;Lee, San-Bum
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.8 no.6
    • /
    • pp.1530-1536
    • /
    • 2007
  • In this paper, a mobile banking system which can provide banking services is introduced. Since a PDA has excellent features like a small-size computer and provides mobility, it has been widely used by salesmen. Therefore, if general banking services can be provided with PDA by using wireless technology, it will be very useful. In addition, it is easy to develop and maintain the client software of PDA because it uses Windows-based operation systems. In this paper, a PDA banking system is introduced. The system is designed and developed based on the techniques of wireless network, security and PDA programming to be used for mobile banking and a prototype system is developed. Moreover, we used the object-oriented modeling technique, UML and Java Beans for programming.

  • PDF

A Study on the Worm.Virus Attack Technique of Cyber Warfare (사이버 정보전 웜.바이러스 공격 기술 연구)

  • 김환국;서동일;이상호
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.776-779
    • /
    • 2004
  • With the rapid progress of information technique, it is getting more difficult to protect information systems from cyber terrorism, because of bugs and vulnerabilities of software and the properties of cyberspace such as anonymity. furthermore cyber terror techniques are highly developed and complicated and their use for a malicious intent and a military purpose are increasing recently. Therefore a study of warfare attack technology on the cyber space is necessary for establishing trusted society and further national security. Specially, worms/viruses are becoming a more common occurrence on the cyber space. Also, The worm caused a great deal of damage to the large number of networks around the world in a very short period of time. Therefore, we will describe worms/viruses in the warfare attack technique in this paper.

  • PDF

Tag-Reader Mutual Authentication Protocol for secure RFID environments (안전한 RFID 환경을 위한 태그-리더 상호 인증 프로토콜)

  • Lee, Young-Seok;Choi, Hoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.2
    • /
    • pp.357-364
    • /
    • 2015
  • Tags and Readers is receiving and sending the data using the wireless communication in the RFID environment. Therefore, it could allow an attacker to participate in the network without the physical constraints, which can be easily exposed to a variety of attacks, such as taps and data forgery. Also, it is not easy to apply the security techniques to defend external attacks because the resource constraints of RFID tags is high. In this paper, new tag-reader mutual authentication protocol is proposed to protect the external cyber attacks such as spoofing attacks, replay attacks, traffic analysis attacks, location tracking attacks. The performance evaluation of the proposed mutual authentication protocol is performed and the simulation results are presented.