• Title/Summary/Keyword: Security card

Search Result 477, Processing Time 0.026 seconds

User Authentication Method using Vibration Cue on Smartphone (진동 큐를 이용한 스마트폰 사용자 인증 방식)

  • Lee, Jong-Hyeok;Choi, Ok-Kyung;Kim, Kang-Seok;Yeh, Hong-Jin
    • The KIPS Transactions:PartC
    • /
    • v.19C no.3
    • /
    • pp.167-172
    • /
    • 2012
  • Mobile phone devices and memory card can be robbed and lost due to the carelessness that might be caused to leak personal information, and also company's confidential information can be disclosed. Therefore, the importance of user authentication to protect personal information is increasing exponentially. However, there are the limitations that criminals could easily obtain and abuse information about individuals, because the input method of personal identification number or the input method of password might not be safe for Shoulder Surfing Attack(SSA). Although various biometric identification methods were suggested to obstruct the SSA, it is the fact that they also have some faults due to the inconvenience to use in mobile environments. In this study, more complemented service for the user authentication was proposed by applying Keystroke method in the mobile environments to make up for the faults of existing biometric identification method. Lastly, the effectiveness and validity of this study were confirmed through experimental evaluations.

An Analysis on SNS Management and Visitors' response of Nuclear Regulatory Organizations : Focus on the Comparison about facebook page between NSSC and NRC (원자력 규제기관의 SNS 활용 및 수용자 반응 분석 : 원자력안전위원회와 NRC 페이스북 비교를 중심으로)

  • Choi, Hyun-Joo;Shim, Eun-Jung
    • Journal of Digital Convergence
    • /
    • v.14 no.5
    • /
    • pp.11-19
    • /
    • 2016
  • SNS users are continuously increasing and SNS is emerging as a major PR channel of government. In particular, SNS can be a useful tool, but also the challenges for risk communication. This study is examined how nuclear regulatory organizations' SNS management and visitors' responses to the facebook pages in Korea and U.S.. Results indicated that both organizations frequently used information-oriented posting. Concerning the types of PR, NSSC tended to mainly use 'Relationship-Management PR', NRC mainly use 'Image PR.' In addition, our analyses on visitors' responses showed that visitors usually in response to participational and visual(ex. video, card news) typed contents. Based on its' results, this study provides practical suggestions for government's future SNS management strategies.

Vulnerabilities Analysis of the OTP Implemented on a PC (PC에 탑재된 OTP의 취약점 분석)

  • Hong, Woo-Chan;Lee, Kwang-Woo;Kim, Seung-Joo;Won, Dong-Ho
    • The KIPS Transactions:PartC
    • /
    • v.17C no.4
    • /
    • pp.361-370
    • /
    • 2010
  • OTP(One Time Password) is a user authentication using secure mechanism to authenticate each other in a way to generate a password, an attacker could intercept the password to masquerade as legitimate users is a way to prevent attacks. The OTP can be implemented as H/W or S/W. Token and card type OTP, implemented as H/W, is difficult to popularize because of having problem with deployment and usability. As a way to replace it implemented as S/W on Mobile or PC is introduced. However, S/W products can be target of malicious attacks if S/W products have vulnerability of implementation. In fact, FSA said the OTP implemented on a mobile have vulnerability of implementation. However, the OTP implemented on a PC have no case about analysis of vulnerability. So, in this paper derive security review and vulnerabilities analysis of implemented on a PC.

Technique of Range Query in Encrypted Database (암호화 데이터베이스에서 영역 질의를 위한 기술)

  • Kim, Cheon-Shik;Kim, Hyoung-Joong;Hong, You-Sik
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.45 no.3
    • /
    • pp.22-30
    • /
    • 2008
  • Recently, protection of personal information is getting more important. Many countries have legislated about the protection of personal information. Now, the protection of relevant personal information is required not for a simple image of enterprises but law obligation. Most databases in enterprises used to store customers' names, addresses and credit card numbers with no exceptions. The personal information about a person is sensitive, and this asset is strategic. Therefore, most enterprises make an effort to preserve personal information safely. If someone, however, hacks password information of DBMS manager, no one can trust this system. Therefore, encryption is required based in order to protect data in the database. Because of database encryption, however, it is the problem of database performance in terms of computation time and the limited SQL query. Thus, we proposed an efficient query method to solve the problem of encrypted data in this paper.

A Study on Analysis of Collaborative Governance in the Process of Local Government Co-evaluation Based on Virtual Policy Studio (지방행정 평가정보 시스템을 활용한 지방자치단체 합동평가 과정의 협력적 거버넌스 분석에 관한 연구)

  • Mun, Young Hoon
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.3
    • /
    • pp.191-201
    • /
    • 2010
  • The Korean central government has been investing a lot of efforts to promote performance of local governments. For example, the Ministry of Public Administration and Security (MOPAS) supported the local governments to develop and provide with a 'balanced score card' and a 'customer satisfaction innovation. ' Many other central ministries also conducted individual evaluations for local governments in their substantive policy areas. These evaluation systems of 78 appraisals for local governments conducted by the MOPAS and other ministries had made the local governments to work harder. However, most local governments have appealed their 'reform fatigue' caused by the overlapping evaluation systems. In this context, the MOPAS initiated merging the evaluations into a co-evaluation system under the new Government Performance Evaluation Act of 2006. In this process of introduction of new evaluation system, there are two significant movements. Firstly, as Korean Government has strong information technology, MOPAS has developed 'Virtual Policy Studio (VPS)' which evaluates the performance of each local government with on line. In other words, in the co-evaluation system for local government performance most evaluation steps are implemented by computer and Internet. So most stakeholder can access and work on the VPS in real time when they want to. And the other thing is that cooperation among stakeholders has been occurred in the co-evaluation system. Furthurmore the cooperative governance is systemized and sustain for a long time because MOPAS made IT based co-evaluation system. Therefore this paper intends to illustrate the process of introduction of VPS, main process of co-evaluation system based on VPS and analyze collaborative governance of the co-evaluation system.

Passwordless Protection for Private Key Using USIM Information (USIM 정보를 활용한 패스워드리스 방식의 개인키 보호 방안)

  • Kim, Seon-Joo
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.6
    • /
    • pp.32-38
    • /
    • 2017
  • Despite the opinion that certificate is useless, half of the population in Korea (approx. 35 million) get an certificate, and use it for internet banking, internet shopping, stock trading, and so on. Most users store their certificates on a usb memory or smartphone, and certificates or passwords stored on such storage media can be easily attacked and used to disguise as legitimate users. Due to these security problem of certificate, a various authentication technologies has been proposed such as smartphone owner authentication using SMS, and a personal authentication using biometric authentication. However, a safe technique is not presented yet without user password, and certificate. In this paper, I proposed a method to secure certificate/private key without a user password using a combination of USIM card and smartphone's information. Even if a hacker gets the user password, the certificate, and the private key, he can not use the certificate. User do not need to remember complex password which is a combination of alphabetic / numeric / special characters, and use his certificate safely.

A Study on Evaluation Scheme for Exchangeable CAS (XCAS) (다운로드형 수신제한시스템(XCAS)의 평가체계에 관한 연구)

  • Hwang, Yu-Na;Jeong, Han-Jae;Won, Dong-Ho;Kim, Seung-Joo
    • The KIPS Transactions:PartC
    • /
    • v.17C no.5
    • /
    • pp.407-414
    • /
    • 2010
  • A condition access system (CAS) refers to a hardware-based system that allows only authenticated users to have access to contents. The CAS has many disadvantages found in that in the replacement of multiple service operator (MSO) a set-top box should be also changed and the smart-card often causes malfunction. To deal with the problems, exchangeable CAS (XCAS) was developed in 2009. However the standards or evaluation schemes for XCAS are absent. Existing evaluation schemes are not appropriate for evaluating XCAS due to the evaluation standard, the evaluation cost and efficiencies. Therefore, a specific scheme that can evaluate the security and suitability of exchangeable conditional access systems has been requested. In this paper, we propose an appropriate evaluation scheme for XCAS. The evaluation scheme includes an evaluation purpose and four components to evaluate the evaluation target, the evaluation process, the evaluation subject, and the evaluation cost involved.

Design of Encryption/Decryption Core for Block Cipher HIGHT (블록 암호 HIGHT를 위한 암·복호화기 코어 설계)

  • Sonh, Seung-Il
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.4
    • /
    • pp.778-784
    • /
    • 2012
  • A symmetric block cryptosystem uses an identical cryptographic key at encryption and decryption processes. HIGHT cipher algorithm is 64-bit block cryptographic technology for mobile device that was authorized as international standard by ISO/IEC on 2010. In this paper, block cipher HIGHT algorithm is designed using Verilog-HDL. Four modes of operation for block cipher such as ECB, CBC, OFB and CTR are supported. When continuous message blocks of fixed size are encrypted or decrypted, the desigend HIGHT core can process a 64-bit message block in every 34-clock cycle. The cryptographic processor designed in this paper operates at 144MHz on vertex chip of Xilinx, Inc. and the maximum throughput is 271Mbps. The designed cryptographic processor is applicable to security module of the areas such as PDA, smart card, internet banking and satellite broadcasting.

Relationship Between Household Food Insecurity and Growth Disorders in Children Aged 3 to 6 in Qazvin City, Iran

  • Gholampour, Tooba;Noroozi, Mostafa;Zavoshy, Rosa;Mohammadpoorasl, Asghar;Ezzeddin, Neda
    • Pediatric Gastroenterology, Hepatology & Nutrition
    • /
    • v.23 no.5
    • /
    • pp.447-456
    • /
    • 2020
  • Purpose: Food insecurity, which is the inability to obtain food or inadequate food consumption in terms of quality and quantity, has physical and psychological consequences on children's health. This study aimed to investigate the relationship between children's growth disorders and food insecurity in Qazvin city, Iran. Methods: A case-control study was conducted on 177 cases and 355 controls of children aged 3 to 6 years, who were referred to health centers in Qazvin city. The case group consisted of children with growth disorders. Data were obtained with the 18-item US Department of Agriculture questionnaire, a household socioeconomic questionnaire, a and growth monitoring card. The data were analyzed with using IBM SPSS Version 22.0, by independent sample t-test, chi-square test, and logistic regression. Results: A significant relationship was found between children's growth disorders and household food insecurity with (p<0.05, odds ratio [OR]=17.0, confidence interval [CI]=5.9, 48.8) and without hunger (p<0.05, OR=2.69, CI=1.4, 4.9). There were also significant relationships between children's growth disorders and socioeconomic status (p<0.05, OR=3.4, CI=1.4, 8.5), the duration of breastfeeding (p<0.05, OR=0.94, CI=0.9, 0.98), and children's ages (p<0.05, OR=0.94, CI=0.92, 0.96). Sex and birth order, and the age of the parents was not found to be significantly related with growth disorders. Conclusion: Lower socioeconomic status and household food insecurity were the important predictors of children's growth disorders. Policymakers should focus more on promoting steady employment and income among family members. Nutritional education for mothers is also recommended, in order to better meet the nutritional needs of the children.

Image Watermarking for Identification Forgery Prevention (신분증 위변조 방지를 위한 이미지 워터마킹)

  • Nah, Ji-Hah;Kim, Jong-Weon;Kim, Jae-Seok
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.12
    • /
    • pp.552-559
    • /
    • 2011
  • In this paper, a new image watermarking algorithm is proposed which can hide specific information of an ID card's owner in photo image for preventing ID's photo forgery. Proposed algorithm uses the image segmentation and the correlation peak position modulation of spread spectrum. The watermark embedded in photo ensures not only robustness against printing and scanning but also sufficient information capacity hiding unique number such as social security numbers in small-sized photo. Another advantage of proposed method is extracting accurate information with error tolerance within some rotation range by using $2^h{\times}2^w$ unit sample space not instead $1{\times}1$ pixels for insertion and extraction of information. 40 bits information can be embedded and extracted at $256{\times}256$ sized ID photo with BER value of 0 % when the test condition is 300dpi scanner and photo printer with 22 photos. In conclusion, proposed algorithm shows the robustness for noise and rotational errors occured during printing and scanning.