• Title/Summary/Keyword: Security Verification

Search Result 702, Processing Time 0.025 seconds

Eligibility Verification based on Immutable Personal Information without Revealing the Owner's Identity (불변 개인정보에 기반하여 소유자 신원 드러나지 않도록 적격성 검증)

  • Jun-Cheol Park
    • Smart Media Journal
    • /
    • v.12 no.3
    • /
    • pp.38-48
    • /
    • 2023
  • When an individual needs to prove eligibility, it is sufficient to know whether or not s/he meets the eligibility, but any existing method inevitably exposes the identity of the owner or unnecessary additional information in the process of providing personal information. In this paper, among the immutable items of personal information such as gender, date of birth, and place of birth, we propose a method in which the owner provides only essential item(s) to the eligibility verifier with each iterm marked on one option among multiple choices. In this way, the eligibility verifier can access the combination of items stored in the blockchain with the consent of the information owner, and can safely store the access history by requesting recording in the blockchain again. In the proposed method, the user does not worry about his/her identity being revealed or his/her personal information being overly exposed, and the eligibility verifier can check only necessary items and search later records without separately storing the records.

A Study on Authentication Management and Communication Method using AKI Based Verification System in Smart Home Environment (스마트 홈 환경에서 AKI기반 검증 시스템을 활용한 인증관리 및 통신 기법에 관한 연구)

  • Jin, Byung Wook;Park, Jung Oh;Jun, Moon Seog
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.6
    • /
    • pp.25-31
    • /
    • 2016
  • With the development of IOT technology and the expansion of ICT services recently, a variety of home network services have been advanced based on wired and wireless high speed telecommunication. Domestic and global companies have been studying on the innovative technology for the users using IOT based technology and the environment for the smart home services has been gradually developed. The users live their lives with more convenience due to the expansions and developments of smart phones. However, the threatening on the security of the smart home network had occurred by various attacks with the connection to the smart environment telecommunication, lack of applications on low powered and light weight telecommunication, and the problems of security guideline. In addition, the solutions are required for the new and variant attacking cases such as data forgery and alteration of the device for disguising approach with ill will. In this article, the safe communication protocol was designed using certification management technique based on AKI which supplemented the weakness of PKI, the existing certification system in the smart environment. Utilizing the signature technique based on ECDSA, the efficiency on the communication performance was improved, and the security and the safety were analyzed on the security threat under the smart home environment.

Verification of moderation effect that job characteristic has on the relationship between Security Guard job satisfaction and organizational citizenship behavior (경호원 직무만족과 조직시민행동의 관계에서 직무특성의 조절효과 검증)

  • Kim, Chang-Ho;Yeom, Dae-Gwan
    • Korean Security Journal
    • /
    • no.47
    • /
    • pp.61-84
    • /
    • 2016
  • The objective of this study is to closely examine the relationship between intrinsic extrinsic job satisfaction and organizational citizenship behavior and closely examine a moderation effect that job characteristic variable has, focusing on workers in private security guard industry. In order to attain the above-mentioned objectives, a purposive sampling method was used as sampling method. Data on 207 people were used for analysis. A frequency analysis, correlation analysis, reliability analysis, structural equation model analysis, multiple group analysis of the collected data was made by utilizing SPSS 21.0 and AMOS 22.0. The results of study can be summarized as follows. First, it was shown that intrinsic satisfaction, sub-factor of intrinsic extrinsic job satisfaction, had a positive (+) effect on altruism. Second, it was shown that intrinsic satisfaction had a positive (+) effect on conscientiousness. Third, it was shown that intrinsic satisfaction had a positive (+) effect on participation. Fourth, it was shown that extrinsic satisfaction didn't have significant effect on altruism. Fifth, it was shown that extrinsic satisfaction didn't have significant effect on conscientiousness. Sixth, it was shown that extrinsic satisfaction didn't have significant effect on participation. Seventh, it was shown that skill variety had a moderation effect on the relationship which intrinsic satisfaction had with altruism and participation. Eighth, it was shown that task identify had a moderation effect on the relationship which intrinsic satisfaction had with altruism and participation. Ninth, it was shown that task significance had a moderation effect on the relationship which intrinsic satisfaction had with altruism, conscientiousness and participation.

  • PDF

Factors Influencing the Introduction of Mobile Security Technology (기업 모바일 보안기술 도입에 영향을 미치는 특성요인)

  • Choi, Woong-Gyu;Lee, Young-Jai
    • The Journal of Society for e-Business Studies
    • /
    • v.18 no.4
    • /
    • pp.215-240
    • /
    • 2013
  • This research has reviewed the major composition concepts and the positive research results in the selected studies which were theoretically based on IDT (Innovation Diffusion Theory), IRM (Model of Innovation Resistance), TAM(Technology Acceptance Model), and IAPA(Information Asset Protection Activity) in order to improve the theoretical explanation of major characterized factors influencing on the introduction of MST (Mobile Security Technology). The characterized factors for the adaptation of MST and 17 hypotheses on the MST study models in order to test the effects on the intention to use are empirically verified by utilizing the analysis method of structure equation model. As a result of a study, First, the most influential characterized factors of IRM are shown as compatibility, complexity, relative advantage, information asset protection in order. Second, the characterized factors affecting intention to use are shown as relative advantage, compatibility, innovation resistance, performance expectancy. The results of this study are relevantly significant to establish the theoretical foundation of the study on the adaptation of MST and The verification of the characterized factors provide strategic implication for the introduction of MST and policy direction which alleviates informational gap between new MST and previous Security Technology to diffusion agency.

Implementation of the Large-scale Data Signature System Using Hash Tree Replication Approach (해시 트리 기반의 대규모 데이터 서명 시스템 구현)

  • Park, Seung Kyu
    • Convergence Security Journal
    • /
    • v.18 no.1
    • /
    • pp.19-31
    • /
    • 2018
  • As the ICT technologies advance, the unprecedently large amount of digital data is created, transferred, stored, and utilized in every industry. With the data scale extension and the applying technologies advancement, the new services emerging from the use of large scale data make our living more convenient and useful. But the cybercrimes such as data forgery and/or change of data generation time are also increasing. For the data security against the cybercrimes, the technology for data integrity and the time verification are necessary. Today, public key based signature technology is the most commonly used. But a lot of costly system resources and the additional infra to manage the certificates and keys for using it make it impractical to use in the large-scale data environment. In this research, a new and far less system resources consuming signature technology for large scale data, based on the Hash Function and Merkle tree, is introduced. An improved method for processing the distributed hash trees is also suggested to mitigate the disruptions by server failures. The prototype system was implemented, and its performance was evaluated. The results show that the technology can be effectively used in a variety of areas like cloud computing, IoT, big data, fin-tech, etc., which produce a large-scale data.

  • PDF

A Study on the Trust Mechanism of Online Voting: Based on the Security Technologies and Current Status of Online Voting Systems (온라인투표의 신뢰 메커니즘에 대한 고찰: 온라인투표 보안기술 및 현황 분석을 중심으로)

  • Seonyoung Shim;Sangho Dong
    • Information Systems Review
    • /
    • v.25 no.4
    • /
    • pp.47-65
    • /
    • 2023
  • In this paper, we investigate how the online voting system can be a trust-based system from a technical perspective. Under four principles of voting, we finely evaluate the existing belief that offline voting is safer and more reliable than online voting based on procedural processes, technical principles. Many studies have suggested the ideas for implementing online voting system, but they have not attempted to strictly examine the technologies of online voting system from the perspective of voting requirements, and usually verification has been insufficient in terms of practical acceptance. Therefore, this study aims to analyze how the technologies are utilized to meet the demanding requirements of voting based on the technologies proven in the field. In addition to general data encryption, online voting requires more technologies for preventing data manipulation and verifying voting results. Moreover, high degree of confidentiality is required because voting data should not be exposed not only to outsiders but also to managers or the system itself. To this end, the security techniques such as Blind Signature, Bit Delegation and Key Division are used. In the case of blockchain-based voting, Mixnet and Zero-Knowledge Proof are required to ensure anonymity. In this study, the current status of the online voting system is analyzed based on the field system that actually serves. This study will enhance our understanding on online voting security technologies and contribute to build a more trust-based voting mechanism.

A Study on Signature-based Wireless Intrusion Detection Systems (시그니처 기반의 무선 침입 탐지 시스템에 관한 연구)

  • Park, Sang-No;Kim, A-Yong;Jung, Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.5
    • /
    • pp.1122-1127
    • /
    • 2014
  • WLAN is affordability, flexibility, and ease of installation, use the smart device due to the dissemination and the AP (Access Point) to the simplification of the Office building, store, at school. Wi-Fi radio waves because it uses the medium of air transport to reach areas where security threats are always exposed to illegal AP installation, policy violations AP, packet monitoring, AP illegal access, external and service access, wireless network sharing, MAC address, such as a new security threat to steal. In this paper, signature-based of wireless intrusion detection system for Snort to suggest how to develop. The public can use hacking tools and conduct a mock hacking, Snort detects an attack of hacking tools to verify from experimental verification of the suitability of the thesis throughout.

A Study on Factors Influencing Purchase Intention of Smartphones on Chinese University Students (중국 대학생들의 스마트폰 구매의도 영향요인에 관한연구)

  • Yu, Ying;Lee, Kidong
    • Journal of Digital Convergence
    • /
    • v.12 no.1
    • /
    • pp.253-261
    • /
    • 2014
  • The purpose of this study is to explore the factors affecting purchase intention of smartphone in Chinese university students. We have identified five independent variables that affecting purchase intention of smartphone, which include price, compatibility, security, social influence and consumer innovations. We test the degree of influence of these five variables on customer satisfaction eventually and on purchase intention. To prove the hypothesis, we performed questionnaire investigation in Qingdao University. and final date of 187 samples were analyzed by using SPSS18.0 program. The result of hypothesis verification is the followings: As the independent variables of compatibility and consumer innovations are affects satisfaction; the price, security and social influence are not affects satisfaction and the satisfaction as the parameter affects the purchase intention which is the dependent variable in this study in Chinese university students. At the end of this study, the marketing implications for advancing to China market based on the results of empirical analysis were presented.

Communication competence and Satisfaction in Interpersonal Relationship on MBTI personality patterns(Focused on 3th military Cadet) (MBTI 성격유형에 따른 커뮤니케이션 능력과 대인관계 만족도에 관한 연구)

  • Hwangbo, Sik;Jang, Haesook
    • Convergence Security Journal
    • /
    • v.16 no.3_1
    • /
    • pp.11-26
    • /
    • 2016
  • This study explores communication competence and satisfaction in interpersonal relationship according to MBTI personality patterns. Looking at the distribution of MBTI personality patterns among male cadets, number of ESTJ(16.7%) is the highest, For female cadets, the highest in number is ENFJ(16.7%). There is discrepancy in communication competence depends on personality patterns, in order to verify such disparity, LSD was applied as a post-verification. As a result, there was discrepancy in communication competence between E(extravert) and I(introvert), also in satisfaction in interpersonal relationship between E(extravert) and I(introvert). Correlation between communication competence and satisfaction in interpersonal relationship showed static relation(r=.604(p<.01). In conclusion, this study proves significant relation of communication competence and satisfaction in interpersonal relationship according to cadet's personality patterns statistically. Also this study is significant because it can indicate directions that needs to be taken for discipline of cadets.

Analysis of 27MHz Wireless Keyboard Electromagnetic Signal Using USRP and GNU Radio (USRP와 GNU Radio를 이용한 27MHz 무선 키보드 전자파 신호 분석)

  • Kim, Ho-Yeon;Sim, Bo-Yeon;Park, Ae-Sun;Han, Dong-Guk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.1
    • /
    • pp.81-91
    • /
    • 2016
  • Nowadays, electronic device is in a close relationship with human life. Above all, the use of wireless electronic devices such as smart phone, tablet pc, and wireless keyboard is increasing owing to the high convenience and portability. Furthermore, according to the increasing use of sensitive personal and financial information from the electronic device, various attacks for stealing information are being reported. In this paper we do an analysis of 27MHz wireless keyboard vulnerability and set up an analysis environment. Moreover, we make an experiment and show that there are real vulnerabilities. An experimental result will be used for safety analysis and vulnerability verification of wireless electronic devices.