• Title/Summary/Keyword: User Response

Search Result 983, Processing Time 0.124 seconds

A Method for Detecting the Exposure of an OCSP Responder's Session Private Key in D-OCSP-KIS (D-OCSP-KIS에서 OCSP Responder의 세션 개인키의 노출을 검출하는 방법)

  • Lee, Young-Gyo;Nam, Jung-Hyun;Kim, Jee-Yeon;Kim, Seung-Joo;Won, Dong-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.4
    • /
    • pp.83-92
    • /
    • 2005
  • D-OCSP-KIS proposed by Koga and Sakurai not only reduces the number or OCSP Responder's certificate but also criers the certificate status validation about OCSP Responder to the client. Therefore, D-OCSP-KIS is an effective method that can reduce the communication cost, computational time and storage consumption in client, but it has some problems. In case an attacker accidentally acquires an OCSP Responder's session private key in a time period (e.g., one day), she can disguise as the OCSP Responder in the time period unless the OCSP Responder recognizes. She can offer the wrong response to the client using the hash value intercepted. And the server and user on I-commerce can have a serious confusion and damage. And the computation and releasing of hash chain can be a load to CA. Thus, we propose a method detecting immediately the exposure of an OCSP Responder's session private key and the abuse of hash value in D-OCSP-KIS.

Improved Security for Fuzzy Fingerprint Vault Using Secret Sharing over a Security Token and a Server (비밀분산 기법을 이용한 보안토큰 기반 지문 퍼지볼트의 보안성 향상 방법)

  • Choi, Han-Na;Lee, Sung-Ju;Moon, Dae-Sung;Choi, Woo-Yong;Chung, Yong-Wha;Pan, Sung-Bum
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.1
    • /
    • pp.63-70
    • /
    • 2009
  • Recently, in the security token based authentication system, there is an increasing trend of using fingerprint for the token holder verification, instead of passwords. However, the security of the fingerprint data is particularly important as the possible compromise of the data will be permanent. In this paper, we propose an approach for secure fingerprint verification by distributing both the secret and the computation based on the fuzzy vault(a cryptographic construct which has been proposed for crypto-biometric systems). That is, a user fingerprint template which is applied to the fuzzy vault is divided into two parts, and each part is stored into a security token and a server, respectively. At distributing the fingerprint template, we consider both the security level and the verification accuracy. Then, the geometric hashing technique is applied to solve the fingerprint alignment problem, and this computation is also distributed over the combination of the security token and the server in the form of the challenge-response. Finally, the polynomial can be reconstructed from the accumulated real points from both the security token and the server. Based on the experimental results, we confirm that our proposed approach can perform the fuzzy vault-based fingerprint verification more securely on a combination of a security token and a server without significant degradation of the verification accuracy.

The strategic behaviors of incumbent pharmacy groups in the retail market of pharmaceuticals in response to the entry trials by the online platform firms delivering medicines - A perspective of market entry deference model in game theory (온라인 의약품배송플랫폼기업의 시장 진입 시도에 대한 기존 의약품 공급자의 전략적 행동 - 게임이론의 시장진입 저지 모형 관점)

  • Lee, Jaehee
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.4
    • /
    • pp.303-311
    • /
    • 2022
  • Recently the telemedicine platform firms which have been temporarily permitted since COVID-19 outbreak have increasingly provided online prescription drugs delivery, causing concerns among incumbent providers of medicine, some of whom began to take aggressive actions again them. In this study, using game theoretic market entry - deterrence model, we show that although the incumbent medicine provider can effectively deter entry by the telemedicine platform firms by its preemptive action, accommodation could be a optimal action when telemedicine platform firms already have penetrated the market with their being permitted to do business due to the COVID-19. However, for the incumbent to cooperate for the successful change in the retail market for medicines, policies like placing a ceiling on the maximum number of taking prescriptions by the pharmacists a day in the telemedince platform network, providing favorable exposure of community pharmacists on the telemedicine platform user interface, and allowing community pharmacies to participate as shareholders of the telemedicine platform firms in its initial public opening of capital, are suggested.

An Efficient and Transparent Blockchain-based Electronic Voting and Survey System (효율성과 투명성을 확보한 블록체인 기반 전자투표 및 설문조사 시스템)

  • Kim, HyeonA;Na, YeonJu;Lee, JaeYun;Jeong, YuRi;Kim, Hyung-Jong
    • Journal of the Korea Society for Simulation
    • /
    • v.30 no.4
    • /
    • pp.9-19
    • /
    • 2021
  • Electronic voting has been recognized as an alternative to complement the limitations of existing paper voting. At the same time, security concerns are being raised. This paper presents a blockchain-based electronic voting and survey system that can guarantee reliability. Our smart contract was created using Solidity on Ethereum which is a blockchain-based distributed computing platform, and the system was implemented in connection with the Javascript based user interface. In addition, in order to protect the personal information of participants, the system is generating hash of the personal data and storing the hash of users for the contract data. Since we exploited different kinds of languages for the system, we derived items of functionality testing and presented the functionality testing result. Moreover, we made use of the Chrome's performance evaluation functionality to see the response time of the blockchain-based system. In addition, we compared the performance with the system which has the same functionality on database. The contribution of this research is design and implementation of blockchain-based electronic voting system and presentation of the functionality and performance simulation result.

Development of Software-Defined Perimeter-based Access Control System for Security of Cloud and IoT System (Cloud 및 IoT 시스템의 보안을 위한 소프트웨어 정의 경계기반의 접근제어시스템 개발)

  • Park, Seung-Kyu
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.2
    • /
    • pp.15-26
    • /
    • 2021
  • Recently, as the introduction of cloud, mobile, and IoT has become active, there is a growing need for technology development that can supplement the limitations of traditional security solutions based on fixed perimeters such as firewalls and Network Access Control (NAC). In response to this, SDP (Software Defined Perimeter) has recently emerged as a new base technology. Unlike existing security technologies, SDP can sets security boundaries (install Gateway S/W) regardless of the location of the protected resources (servers, IoT gateways, etc.) and neutralize most of the network-based hacking attacks that are becoming increasingly sofiscated. In particular, SDP is regarded as a security technology suitable for the cloud and IoT fields. In this study, a new access control system was proposed by combining SDP and hash tree-based large-scale data high-speed signature technology. Through the process authentication function using large-scale data high-speed signature technology, it prevents the threat of unknown malware intruding into the endpoint in advance, and implements a kernel-level security technology that makes it impossible for user-level attacks during the backup and recovery of major data. As a result, endpoint security, which is a weak part of SDP, has been strengthened. The proposed system was developed as a prototype, and the performance test was completed through a test of an authorized testing agency (TTA V&V Test). The SDP-based access control solution is a technology with high potential that can be used in smart car security.

A Study on the Smart Elderly Support System in response to the New Virus Disease (신종 바이러스에 대응하는 스마트 고령자지원 시스템의 연구)

  • Myeon-Gyun Cho
    • Journal of Industrial Convergence
    • /
    • v.21 no.1
    • /
    • pp.175-185
    • /
    • 2023
  • Recently, novel viral infections such as COVID-19 have spread and pose a serious public health problem. In particular, these diseases have a fatal effect on the elderly, threatening life and causing serious social and economic losses. Accordingly, applications such as telemedicine, healthcare, and disease prevention using the Internet of Things (IoT) and artificial intelligence (AI) have been introduced in many industries to improve disease detection, monitoring, and quarantine performance. However, since existing technologies are not applied quickly and comprehensively to the sudden emergence of infectious diseases, they have not been able to prevent large-scale infection and the nationwide spread of infectious diseases in society. Therefore, in this paper, we try to predict the spread of infection by collecting various infection information with regional limitations through a virus disease information collector and performing AI analysis and severity matching through an AI broker. Finally, through the Korea Centers for Disease Control and Prevention, danger alerts are issued to the elderly, messages are sent to block the spread, and information on evacuation from infected areas is quickly provided. A realistic elderly support system compares the location information of the elderly with the information of the infected area and provides an intuitive danger area (infected area) avoidance function with an augmented reality-based smartphone application. When the elderly visit an infected area is confirmed, quarantine management services are provided automatically. In the future, the proposed system can be used as a method of preventing a crushing accident due to sudden crowd concentration in advance by identifying the location-based user density.

Design and Implementation of a Data-Driven Defect and Linearity Assessment Monitoring System for Electric Power Steering (전동식 파워 스티어링을 위한 데이터 기반 결함 및 선형성 평가 모니터링 시스템의 설계 구현)

  • Lawal Alabe Wale;Kimleang Kea;Youngsun Han;Tea-Kyung Kim
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.2
    • /
    • pp.61-69
    • /
    • 2023
  • In recent years, due to heightened environmental awareness, Electric Power Steering (EPS) has been increasingly adopted as the steering control unit in manufactured vehicles. This has had numerous benefits, such as improved steering power, elimination of hydraulic hose leaks and reduced fuel consumption. However, for EPS systems to respond to actions, sensors must be employed; this means that the consistency of the sensor's linear variation is integral to the stability of the steering response. To ensure quality control, a reliable method for detecting defects and assessing linearity is required to assess the sensitivity of the EPS sensor to changes in the internal design characters. This paper proposes a data-driven defect and linearity assessment monitoring system, which can be used to analyze EPS component defects and linearity based on vehicle speed interval division. The approach is validated experimentally using data collected from an EPS test jig and is further enhanced by the inclusion of a Graphical User Interface (GUI). Based on the design, the developed system effectively performs defect detection with an accuracy of 0.99 percent and obtains a linearity assessment score at varying vehicle speeds.

The Effect of Support Quality of Chatbot Services on User Satisfaction, Loyalty and Continued Use Intention: Focusing on the Moderating Effect of Social Presence (챗봇서비스의 지원품질이 사용자 만족, 충성도 및 지속사용의도에 미치는 영향에 관한 연구 : 사회적 실재감의 조절효과를 중심으로)

  • Kim Jung Tae;Choi Do Young
    • Journal of Service Research and Studies
    • /
    • v.12 no.4
    • /
    • pp.106-124
    • /
    • 2022
  • This study examined whether the social support (emotional support, information support) provided by customers through chatbot service affects the satisfaction of chatbot service felt by customers and whether the satisfaction of chatbot service affects loyalty and intention to continue using chatbot service. In order to confirm the moderating effect of social presence of chatbot service, a total of 300 effective data were obtained by conducting an online survey divided into a group that recognizes social presence highly and a group that recognizes low. As a result of the analysis, the path from emotional support to satisfaction of chatbot service was supported in the group that recognized social presence highly, and the path from emotional support to satisfaction of chatbot service was not supported in the group that recognized social presence low, and the difference was confirmed in the hypothesis path coefficient. This is interpreted as the social presence affecting human emotional response.This study can provide implications for the function of social presence of chatbot service in that it applied information support and emotional support, which are two factors of social support, to chatbot service, and demonstrated the relationship between satisfaction, loyalty, and continuous use according to the degree of social presence of chatbot users.

Busan Tourism Industry applying OECD Tourism Policy and ICT Convergence Platform (OECD 관광정책과 ICT 융합 플랫폼을 적용한 부산관광산업)

  • Lim, Yong-Suk;Jung, Ho-Jin;Lee, Jung-Won
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.7 no.12
    • /
    • pp.871-879
    • /
    • 2017
  • The purpose of this study is to propose a Busan tourism industry in which the 2016 OECD Tourism policy and ICT convergence platform are applied. OECD proposed 3 policies to promote the tourism industry: First, to maintain the competitiveness of the tourism industry as well as improve its efficiency and sustainability, second, to establish a seamless traffic system, and third, to build a response to the sharing economy. Centering on the OECD's three policies, we propose the developmental possibilities of tourism in Busan. At the same time, we suggest the necessity to build an ICT convergence platform that will help foster the industry. In building an ICT convergence platform, we especially focus on the necessity of: 1. Sharing and creating experience-based interactive contents on the software side, and 2. Developing high quality user experience (UX) and providing a data analysis-based customized service on the hardware side. In addition, we insist on the establishment of the Tourism Promotion Agency for the continuous performance and management of Busan tourism industry. The study ultimately suggests that the construction of ICT convergence platform based on OECD tourism policy can result in the expected outcomes of high effects with low cost for both consumers and suppliers related to the tourism industry.

How Does the Negative Response to Digital Shadow Work Influence the Continuous Use Intention of Users?: The Moderating Effect of Gratification Delay Ability (디지털 그림자노동에 대한 부정적 반응은 지속사용의도에 어떻게 영향을 미치나?: 만족지연능력의 조절효과)

  • TingTing Liu;Woong-Kyu Lee;Joon Koh
    • Knowledge Management Research
    • /
    • v.24 no.3
    • /
    • pp.173-193
    • /
    • 2023
  • Digital transformation and the COVID-19 pandemic have facilitated the rapid development and dissemination of non-face-to-face technologies such as self-service technologies (SSTs). This research investigates how motivation factors affect consumers' negative responses to digital shadow work (DSW) in SSTs which decreases their continuous use intention of SSTs. Also, we examine whether the grafication delay ability moderates the relationship between consumers' negative responses to DSW and their continuous use intention of SSTs. By an analysis of usable 450 user respondents via SmartPLS 4.0, perceived benefits was found to significantly influence consumers' negative responses to DSW. Also, consumers' negative responses to DSW can significantly decrease their intention to continue using SSTs. Further, the effect of negative responses to DSW on continuous use intention of SSTs is stronger in case of consumers with low gratification delay ability than in case of consumers with high gratification delay ability. The study findings contribute to providing some strategies for companies operating SSTs by examining the effects of consumer's responses to DSW and gratification delay ability on the continuous usage intention of SSTs.