• 제목/요약/키워드: user verification

Search Result 593, Processing Time 0.024 seconds

A Design Secure QR-Login User Authentication Protocol and Assurance Methods for the Safety of Critical Data Using Smart Device (스마트 기기를 이용한 안전한 QR-Login 사용자 인증 프로토콜의 설계 및 중요 정보의 안전성 보증을 위한 방법)

  • Lee, Jae-Sik;You, Han-Na;Cho, Chang-Hyun;Jun, Moon-Seog
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37C no.10
    • /
    • pp.949-964
    • /
    • 2012
  • Our PC have been under constant threat of malicious codes and viruses today. As many new ways of cyber attacks are being developed, such as zero-day-attack, nobody's PC is guaranteed to be safe from the attacks. In case where a user uses the existing verification protocol on a unsecured PC, the user's verification information may well be threatened by sniffing or man-in-the-middle attack. Especially, deadly attacks like memory hacking would give hard time for users to even recognize any symptom of virus infection. Therefore, this paper designs secured QR-Login user verification protocol for smart devices that are ready to communicate with QR-Code and proposes a way to keep critical data safe when using the internet. This way, user would be able to safeguard his/her critical data even when under attack by unknown attacks and safely carry out extremely sensitive task, like financial trading, on the device.

Motion-Based User Authentication for Enhanced Metaverse Security (메타버스 보안 강화를 위한 동작 기반 사용자 인증)

  • Seonggyu Park;Gwonsang Ryu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.3
    • /
    • pp.493-503
    • /
    • 2024
  • This paper addresses the issue of continuous user authentication within the metaverse environment. Recently, the metaverse plays a vital role in personal interaction, entertainment, education, and business, bringing forth significant security concerns. Particularly, vulnerabilities related to user identity verification have emerged as a major issue. This research proposes a novel method to verify identities by analyzing users' character movements in the metaverse through a pose estimation model. This method uses only video data for authentication, allowing flexibility in limited environments, and investigates how character movements contribute to user identification through various experiments. Furthermore, it explores the potential for extending this approach to other digital platforms. This research is expected to significantly contribute to enhancing security and innovating user identity verification methods in the metaverse environment.

Implementation of Advanced Dynamic Signature Verification System (고성능 동적 서명인증시스템 구현)

  • Kim, Jin-Whan;Cho, Hyuk-Gyu;Cha, Eui-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.462-466
    • /
    • 2005
  • Dynamic (On-line) signature verification system consists of preprocessing, feature extraction, comparison and decision process for internal processing, and registration and verification windows for the user interface. We describe an implementation and design for an advanced dynamic signature verification system. Also, we suggest the method of feature extraction, matching algorithm, efficient user interface and an objective criteria for evaluating the performance.

  • PDF

A Study on an Advanced Evaluation Method for Dynamic Signature Verification System

  • Kim, Jin-Whan;Cho, Jae-Hyun;Kim, Kwang-Baek
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.2
    • /
    • pp.140-144
    • /
    • 2010
  • This paper is a research on an evaluating method for the dynamic signature verification system. It is described about various factors such as error rate, the size of signature verification engine, the size of the characteristic vectors of a signature, the ability to distinguish similar signatures, the processing speed of signature verification and so on. This study identifies factors to consider in evaluating signature verification systems comprehensively and objectively without an officially approved signature database, examines the meaning of each of the factors, and proposes criteria for evaluating and analyzing the factors.

Visualization of Verification Condition by GML file (GML파일을 이용한 검증조건의 시각화)

  • Hu, Hye-Lim;Kim, Je-Min;Park, Joon-Seok;Yoo, Weon-Hee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.7
    • /
    • pp.23-32
    • /
    • 2012
  • There is a method which identifies validity of program by transforming program to verification condition to verify program. If program is verified by generating verification condition, verification condition must have enough and accurate information for verifying program. However, verification condition is consisting of logical formulas, so the user cannot easily identify the verification condition. In this paper, we implemented program that visualize the poorly readable verification conditions. By the program, the users can easily identify information, such as the relationship between logical formulas that represent verification condition.

A Study on the Real-Time Certificate Status Verification System Using VDN (VDN을 이용한 실시간 인증서 상태 검증 시스템의 관한 연구)

  • Lee, Kwang-Hyoung;Kim, Hyun-Chul
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.7 no.5
    • /
    • pp.858-865
    • /
    • 2006
  • A certificate that is issued by the certification authority can be revoked within the period of validity by various reasons such as the loss of private key, disqualification or the change in key. Therefore, the certificate status verification must precede prior to use Currently, the CRL or the OCSP methods are used in most cases. But the CRL system can't guarantee the present status of the certificate, and the OCSP generates heavy network traffic by checking or requesting certificate status in real-time using high-capacity messages. In this paper, we propose a system that requests the certificate verification by creating VDN for user identity information. Through this system, the certification authority will be able to guarantee the certificate's status in real-time, and solve the problem of the sewer and network overload by verifying and finding user identity information from VDN, Based on the results, we propose a real-time certificate status verification system which can improve the speed of the verification. We confirmed the improvement in speed by testing and comparing it with the existing methods.

  • PDF

A Call Recommendation Algorithm Design and Verification with ESM (통화 상대 추천 알고리즘 디자인 및 ESM을 통한 평가)

  • Lee, Seung-Hwan;Seo, Jung-Suk;Lee, Gee-Hyuk
    • 한국HCI학회:학술대회논문집
    • /
    • 2009.02a
    • /
    • pp.357-362
    • /
    • 2009
  • We propose a method to recommend most likely people to call based on call log of mobile phone user. Call logs of an user can reflect calling pattern of the user include regular calling behavior. When user got a list of people to call with a click of 'send' button on the phone, the time and effort to search a person with several typing or to select a person from the list can be definitely reduced. This paper presents the design process of an algorithm to find most likely people to call at a certain moment and the verification process with recorded call log and Experience Sampling Method(ESM) on mobile phone.

  • PDF

Verification Process for Stable Human Detection and Tracking (안정적 사람 검출 및 추적을 위한 검증 프로세스)

  • Ahn, Jung-Ho;Choi, Jong-Ho
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.4 no.3
    • /
    • pp.202-208
    • /
    • 2011
  • Recently the technologies that control the computer system through human computer interaction(HCI) have been widely studied. Their applications usually involve the methods that locate user's positions via face detection and recognize user's gestures, but face detection performance is not good enough. In case that the applications do not locate user's position stably, user interface performance, such as gesture recognition, is significantly decreased. In this paper we propose a new stable face detection algorithm using skin color detection and cumulative distribution of face detection results, whose effectiveness was verified by experiments. The propsed algorithm can be applicable in the area of human tracking that uses correspondence matrix analysis.

Improved Drone Delivery System Through User Authentication and Mission Automation Using EdgeCPS (EdgeCPS를 활용한 사용자 인증 및 임무 자동화를 통한 드론 배송 시스템 개선)

  • MinGuen Cho;MinKi Beak;EuTeum Choi;DongBeom Ko;SungJoo Kang;SeongJin Lee
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.18 no.4
    • /
    • pp.141-150
    • /
    • 2023
  • Currently, various companies are actively participating in research and development of drone delivery services. Existing studies do not comprehensively provide integrated functions for future drone delivery services such as mission automation, customer verification, and overcoming performance limitations, which can lead to high manpower demand, reduced user service trust, and potentially overloading low-end devices. Therefore, this study proposes a drone mission automation system (DMAS) using EdgeCPS technology to provide the three aforementioned functions in an integrated manner. Real-world experiments were conducted to evaluate the proposed system, demonstrating that the DMAS components operate according to the specified roles in the delivery scenario. In addition, the system achieved user verification with a similarity of more than 90% in the process of receiving the product, and verified a faster inference speed and a lower resource share than the existing method.