• Title/Summary/Keyword: User Identity

Search Result 387, Processing Time 0.02 seconds

User Identity Module(UIM) for IMT-2000 systems

  • Chung, Bo-Hyun;Koh, Jong-Seog
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2000.10b
    • /
    • pp.1141-1144
    • /
    • 2000
  • User Identity Module(UIM) is widely deployed in GSM(Global System for Mobile communications), Known as SIM(Subscriber Identity Module). We can expect that UIM will be also available for ANSI based third generation systems. Removable User Identity Module(R-UIM) is UIM for ANSI based third generation systems and Universal Subscriber Identity Module(USIM) is UIM for GSM based third generation systems. This paper identifies differences between R-UIM and USIM and studies global roaming in IMT-2000 systems.

  • PDF

The Proposals of Identity Escrow Scheme to Control User's Anonymity (사용자의 익명성을 제어하는 신원 위탁 방식 제안)

  • 황보성;이임영
    • Journal of Korea Multimedia Society
    • /
    • v.3 no.6
    • /
    • pp.617-624
    • /
    • 2000
  • We introduce the concept of a Identity Escrow Scheme, an application of key escrow ideas to solve the problem of authentication. In the Identity Escrow Scheme, the User escrows a own real identity to the Issuer and receives a Authentication Information. In authentication step, between the User to the Service Provider, the User only gives a Authentication Information to the Service Provider. Therefore, the Service Provider don't know a real identity of user's. However, when the User does unlawful actions, the Lawful Agent is called by the Service Provider, and his anonymity is revoked by cooperation of the Issuer and the Lawful Agent. We propose new Identity Escrow Schemes and analyze these.

  • PDF

A Identity Escrow mechanism supporting key recovery (키 복구를 지원하는 향상된 신원위탁 메커니즘)

  • 이용호;이임영;김주한;문기영
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.3
    • /
    • pp.119-128
    • /
    • 2002
  • In case certification between user and service provider is achieved, problem that user's identity is revealed is occurring by social issue, so it was presented identity escrow scheme to solve these problem. In identity escrow scheme, the issuer who have correct user's identity transmits securely anonymity authentication information to user, and user achieves authentication phase with service provider keeping oneself anonymity using this. In this paper, we present requirement for security and trusty of identity escrow scheme and propose new mechanism that can security this. Also, propose method that service provider can deliver securely contents to user and propose mechanism that improve that support ky recovery at encryption communication that using secret key that it was generated by key agreement between users.

How of Improve an identity of mobile device interface and usability? (모바일 디바이스의 인터페이스 아이덴티티 개선 및 사용성 증대방안)

  • Song, Sang-Gon;Kim, Young-Sun;Choo, Hee-Jeong;Kang, Tae-Young;Hong, Noh-Kyung
    • 한국HCI학회:학술대회논문집
    • /
    • 2008.02b
    • /
    • pp.140-145
    • /
    • 2008
  • Mobile device has a constraint such as a small physical display size and interaction. One of the most important issues in mobile devices is the express an identity of one's products company. It can be appeal to the user in side of consistency. Thus, we integrate and extract an identity element from user experience including, Graphical User Interface, Information Architecture and Audio User Interface. The study was conducted by a task force team with User Interface practitioners of managing divisions of each product. In this study, methods and processes that were attempted in order to establish consistency principles of user experiences, enhancing the various characteristics of each product, are described. The results and practical experiences obtained through the processes are introduced.

  • PDF

A Case Study on the Expression Characteristics of Brand Identity in Housing Cultural Center (주택문화관의 브랜드 아이덴티티 표현특성에 과한 사례조사 연구)

  • Chung, Su-Jin;Hwang, Yeon-Sook
    • Korean Institute of Interior Design Journal
    • /
    • v.21 no.1
    • /
    • pp.30-39
    • /
    • 2012
  • The essence of brand identity is to draw an interrelation between user and brand based on user's desire. The housing cultural center is focused on brand identity for satisfaction of user. The purpose of this study is to inquire out the expression characteristics of brand Identity in housing cultural center according to analyze previous studies and case studies. The results of this study are summarized as follows. 'Uniqueness' is directly expressed through brand name or logo or through brand colors. 'Experience' is expressed as auditive expression through stimulation using a body and providing music. 'Relationship' has provided a communication environment or created relationship with brand by leading interaction with others. 'Estheticism' has increased visual satisfactory level by aesthetically sublimating lighting direction or form. 'Functionality' is expressed by providing various programs through smooth flow plan and grafting with the latest technology. 'Non-dailiness' has affected memory territory by inducing curiosity and astonishment through space modification or new and contrasting direction. The housing cultural center needs to be planned as a space where interaction of user and brand will be initiatively activated sensationally and psychologically by pursuing user-oriented brand identity.

  • PDF

Privacy Controller using XACML for Internet Identity Management System (인터넷 Identity 관리 시스템 환경에서 XACML을 이용한 프라이버시 컨트롤러)

  • Roh, Jong-Hyuk;Jin, Seung-Hun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.7B
    • /
    • pp.438-447
    • /
    • 2007
  • In the Internet, an identity service must to obtain permission from a user to allow them to share data with requesting service. For that, the privacy policy, which reflects legal regulations and preferences made by the user, is needed. Also, the management interface that aids the user to make the privacy policy and the PDP system that makes admission control and policy decisions in response to a request from an entity wanting to access the personal information are needed. In this paper, the privacy controller system model handled under the internet Identity management system environment is proposed. The system has the easy interface of policy generation and the efficient policy decision process. The system applies and modifies to the XACML of OASIS group. We propose that the privacy policy is divided into the three policies, which are the user policy, the domain policy and the basic offering policy. To resolve the collision between the policies, we also propose the collision resolution policy.

Research on User-Centric Inter-Organizational Collaboration (UCICOIn) framework (사용자 제어 기반 다중 도메인 접근 제어에 대한 연구)

  • Sunghyuck Hong
    • Journal of Industrial Convergence
    • /
    • v.21 no.12
    • /
    • pp.37-43
    • /
    • 2023
  • In today's business landscape, collaboration and interoperability are crucial for organizational success and profitability. However, integrating operations across multiple organizations is challenging due to differing roles and policies in Identity and Access Management (IAM). User-centric identity (UCI) adopts a personalized approach to digital identity management, centering on the end-user for authentication and access control. It provides a decentralized system that ensures secure and customized access for each user. UCI aims to address complex security challenges by aligning access privileges with individual user requirements. This research delves into UCI's ability to streamline resource access amidst conflicting IAM roles and protocols across various organizations. The study presents a UCI-based multi-domain access control (MDAC) framework, which encompasses an ontology, a unified method for articulating access roles and policies across domains, and software services melding with UCI infrastructure. The goal is to enhance organizational resource management and decision-making by offering clear guidelines on access roles and policy management across diverse domains, ultimately boosting companies' return on investment.

Traceable Dynamic Public Auditing with Identity Privacy Preserving for Cloud Storage

  • Zhang, Yinghui;Zhang, Tiantian;Guo, Rui;Xu, Shengmin;Zheng, Dong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.11
    • /
    • pp.5653-5672
    • /
    • 2019
  • In cloud computing era, an increasing number of resource-constrained users outsource their data to cloud servers. Due to the untrustworthiness of cloud servers, it is important to ensure the integrity of outsourced data. However, most of existing solutions still have challenging issues needing to be addressed, such as the identity privacy protection of users, the traceability of users, the supporting of dynamic user operations, and the publicity of auditing. In order to tackle these issues simultaneously, in this paper, we propose a traceable dynamic public auditing scheme with identity privacy preserving for cloud storage. In the proposed scheme, a single user, including a group manager, is unable to know the signer's identity. Furthermore, our scheme realizes traceability based on a secret sharing mechanism and supports dynamic user operations. Based on the security and efficiency analysis, it is shown that our scheme is secure and efficient.

A study on the Influences of flow and Identity Perspectives Toward User behaviors in Micro blog Services (마이크로블로그 서비스에서 사용자 행동에 미치는 플로우와 정체성의 영향에 대한 연구)

  • Shin, Ho-Kyoung;Ha, Na-Yeon;Lee, Ki-Won
    • Journal of Information Technology Applications and Management
    • /
    • v.16 no.4
    • /
    • pp.59-77
    • /
    • 2009
  • Microblog services are such new communication channels with some considerable potential to improve information sharing. The idea of sharing short messages using multiple access points seems to be appealing to people worldwide. Through the lens of flow and social identity, we explored factors that influence information sharing behaviors in microblog services. With an empirical study, we examined enjoyment and concentration(flow) and self-presentation(social identity) in microblog services like twitter can contribute to the user behaviors. Our aim was to gain insight into ways of creating an environment that facilitating voluntary sharing of information. Our findings suggested that enjoyment, concentration, and selfpresentation were crucial determinants of information sharing behaviors in microblog services. This study has important implications for academic researchers and practitioners who seek to understand why microblog service users share their information with other members in microblog services.

  • PDF

The Role of Message Content and Source User Identity in Information Diffusion on Online Social Networks

  • Son, Insoo;Kim, Young-kyu;Lee, Dongwon
    • Asia pacific journal of information systems
    • /
    • v.25 no.2
    • /
    • pp.239-264
    • /
    • 2015
  • This study aims to investigate the effect of message content and source user identity on information diffusion in Twitter networks. For the empirical study, we collected 11,346 tweets pertaining to the three major mobile telecom carriers in Korea for three months, from September to December 2011. These tweets generated 59,111 retweets (RTs) and were retweeted at least once. Our analysis indicates that information diffusion in Twitter in terms of RT volume is affected primarily by the type of message content, such as the inclusion of corporate social responsibility activities. However, the effect of message content on information diffusion is heterogeneous to the identity of the information source. We argue that user identity affects recipients' perception of the credibility of focal information. Our study offers insights into the information diffusion mechanism in online social networks and provides managerial implications on the strategic utilization of online social networks for marketing communications with customers.