• 제목/요약/키워드: personal identification

검색결과 506건 처리시간 0.026초

아이핀 기반 본인확인서비스의 안전성 강화 방안 (Safety Improvement Methods of Personal Identification Services using the i-Pin)

  • 김종배
    • 한국IT서비스학회지
    • /
    • 제16권2호
    • /
    • pp.97-110
    • /
    • 2017
  • Due to development of IT, various Internet services via the non-face-to-face are increasing rapidly. In the past, the resident registration numbers (RRN) was used a mean of personal identification, but the use of RRN is prohibited by the relevant laws, and the personal identification services using alternative means are activated. According to the prohibition policy of RRN, i-PIN service appeared as an alternative means to identify a person. However, the user's knowledge-based i-PIN service continues to cause fraudulent issuance, account hijacking, and fraud attempts due to hacking accidents. Due to these problems, the usage rate of i-PIN service which performs a nationwide free personal identification service, is rapidly decreasing. Therefore, this paper proposes a technical safety enhancement method for security enhancement in the i-PIN-based personal identification service. In order to strengthen the security of i-PIN, this paper analyzes the encryption key exposure, key exchange and i-PIN authentication model problems of i-PIN and suggests countermeasures. Through the proposed paper, the i-PIN can be expected to be used more effectively as a substitution of RRN by suggesting measures to enhance the safety of personal identification information. Secured personal identification services will enable safer online non-face-to-face transactions. By securing the technical, institutional, and administrative safety of the i-PIN service, the usage rate will gradually increase.

Personal Identification Based on Radio Signal Strength for Ubiquitous Healthcare Systems

  • Lee, Jong-Shill;Park, Sang-Hae;Chee, Young-Joon;Kim, In-Young;Kim, Sun-I.
    • 대한의용생체공학회:의공학회지
    • /
    • 제28권3호
    • /
    • pp.325-331
    • /
    • 2007
  • Personal identification is essential for the automatic measurement of biosignal information in home healthcare systems. Personal identification is usually achieved with passive radio frequency identification (RFID), which does little more than store a unique identification number. However, passive RFID is not ideal for automatic identification. We present a user identification system based on radio signal strength indication (RSSI) using ZigBee for active RFID tags. Personal identification is achieved by finding the largest RSSI value from aggregated beacon messages that are periodically transmitted by active RFID tags carried by users. Obtaining reliable person!'.! identification without restricting the orientation requires a certain distance between the closest active RFID tag from the ZED and the second closest tag. The results show that the closest active RFID tag from the ZED and the second closest tag must be at least 70 cm apart to achieve reliable personal identification.

Identification of Chinese Personal Names in Unrestricted Texts

  • Cheung, Lawrence;Tsou, Benjamin K.;Sun, Mao-Song
    • 한국언어정보학회:학술대회논문집
    • /
    • 한국언어정보학회 2002년도 Language, Information, and Computation Proceedings of The 16th Pacific Asia Conference
    • /
    • pp.28-35
    • /
    • 2002
  • Automatic identification of Chinese personal names in unrestricted texts is a key task in Chinese word segmentation, and can affect other NLP tasks such as word segmentation and information retrieval, if it is not properly addressed. This paper (1) demonstrates the problems of Chinese personal name identification in some If applications, (2) analyzes the structure of Chinese personal names, and (3) further presents the relevant processing strategies. The geographical differences of Chinese personal names between Beijing and Hong Kong are highlighted at the end. It shows that variation in names across different Chinese communities constitutes a critical factor in designing Chinese personal name Identification algorithm.

  • PDF

개인 커뮤니티 몰입에 대한 자아표현 및 동일시의 역할 (The Roles of Self-Expression and Identification on the Personal Community Commitment)

  • 최낙환;이창원
    • Asia Marketing Journal
    • /
    • 제9권3호
    • /
    • pp.117-149
    • /
    • 2007
  • 기업의 충성도 높은 고객 유치 및 기업 몰입을 위한 하나의 방안으로 대두되고 있는 온라인 개인 커뮤니티의 경우 개인이 미니홈피를 창조하여, 자신을 표현하고 관리하여 커뮤니티를 구축하고, 커뮤니티와 상호작용하면서 자신을 표현하기 때문에 온라인 개인 커뮤니티와 자아간의 연결인 동일시에 대한 연구가 중요함에도 불구하고 아직까지 이에 대한 연구가 이루어지지 않고 있다. 따라서 본 연구에서는 온라인 개인 커뮤니티 몰입에 대한 동일시의 역할과 동일시에 영향을 미치는 자아표현의 효과를 살펴보는데 연구 목적이 있다. 개인 미니홈피를 싸이월드에서 이용하는 소비자들을 대상으로 검증한 결과 첫째, 개인적 실제자아 표현과 개인적 이상자아 표현은 개인적 동일시에 영향을 미치고, 사회적 실제자아 표현과 사회적 이상자아 표현은 사회적 동일시에 영향을 미치는 것을 알 수 있었다. 둘째, 개인적 동일시와 사회적 동일시는 모두 온라인 개인 커뮤니티 몰입에 긍정적인 영향을 미치는 것을 알 수 있으며, 온라인 개인 커뮤니티 몰입 수준이 높을수록 원천 기업에 대한 반응은 좋게 나타나는 것을 알 수 있었다. 따라서 소비자들의 개인적 동일시와 사회적 동일시를 높여주기 위해서 온라인 개인 커뮤니티내의 상호작용 활동 및 정보제공의 용이성과 개인의 표현력을 높여줄 아이템의 개발이 있어야만 할 것이다.

  • PDF

Mutual Friendly Force Identification Protocol based on Hash-Chain for Personal Combat Systems

  • Lee, Jongkwan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권9호
    • /
    • pp.3858-3869
    • /
    • 2020
  • In this paper, we propose a hash-chain based friendly force identification protocol for personal combatants equipped with a personal combat system in a tactical wireless network. It is imperative in military operations to effectively and quickly identify friendly forces. If the identification of friendly forces is not correct, this can cause friendly fire. In current ground operations, the identification of friendly forces by personal combatants is neither secure nor safe. To address this issue, the proposed protocol uses a hash-chain to determine if a detected person is friendly. Only friendly forces with the same materials that are assigned before they deploy can construct an initial hash-chain. Moreover, the hash-chain is changed at specific times. The performance of the proposed protocol is evaluated on the assumption that the secret key is leaked, which is the worst scenario in the security research field. We verify that the proposed protocol is secure for the various attack scenarios, such as message replay attack, fabrication attack, and Denial of Service attack.

The Impact of Green Corporate Identity and Green Personal-Social Identification on Green Business Performance: A Case Study in Thailand

  • ONPUTTHA, Suraporn;SIRIWICHAI, Chalermporn
    • The Journal of Asian Finance, Economics and Business
    • /
    • 제8권5호
    • /
    • pp.157-166
    • /
    • 2021
  • This study aims to investigate the impact of green corporate identity and employees' green identification on green business performance of international automobile manufacturers in Thailand. It involves 400 employees from the target study area, using questionnaires to collect data from January to February 2021, with purposive and convenient sampling methods. Data analysis employed structural equation modeling (SEM). The results show that green corporate identity has a significant impact on employees' green personal-social identification and green business performance; meanwhile, employees' green social identification has a significant impact on green business performance. However, employees' green personal identification has a significant impact on green business performance only through employees' green social identification. Green corporate identity can increase the corporate' green business performance via economic, environmental and social aspects through employees' green personal-social identification. The findings suggest that green corporate communication through visual identity, employee behaviors, culture, policy products and services in response to environmental forces and drivers to create the green corporate identity is deemed to systematically work. Furthermore, the findings also suggest that employees' green identification on both personal and social levels can be a significant issue that the managers in automobile manufacturers should pay attention as well.

발자국 정보를 이용한 무의식적 개인 식별 방법 (Unconscious Personal Recognition Method using Personal Footprint)

  • 정진우;김대진;박광현;변증남
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2002년도 하계종합학술대회 논문집(5)
    • /
    • pp.137-140
    • /
    • 2002
  • We introduce a personal identification method which can find user's ID without any help of the user. To do this, there has been two approaches, vision-based and pressure-based. Pressure-based approach has some advantages compared than vision-based one in the aspects of illumination, occlusion, and the amount of data. In the previous study about pressure-based personal identification, there are some restrictions about human body posture for extracting normalized footprints. Since this approach cannot be extended unconscious and continuos identification, we suppose more natural method and verified it by experiments.

  • PDF

개인신원정보 보호를 위한 광 보호 시스템 (Optical security system for protection of personal identification information)

  • 윤종수;도양회
    • 한국광학회지
    • /
    • 제14권4호
    • /
    • pp.383-391
    • /
    • 2003
  • 개인의 신원정보 보호를 위하여 새로운 광 정보보호 시스템을 제안하였다. 개인 신원정보의 확인과 인증을 위하여 얼굴영상과 개인식별번호로 구성된 신원정보를 사용하였다. 영상 암호화는 4-f 광상관기의 입력과 푸리에영역에서 랜덤위상패턴을 사용하는 위상암호화 기술을 사용하였다. 그렇지만 암호화된 영상을 복원하는 과정에서 개인의 신원정보가 유출될 가능성이 있다. 이에 대처하기 위하여 신원확인 과정에서 영상을 복원하지 않고 암호화된 영상을 그대로 사용하였다. 암호화된 개인식별번호는 제안된 MMACE_p 필터를 사용하여 분류ㆍ인식하였고, 개인정보의 인증은 OWMF를 사용하여 얼굴영상의 상관치를 구하여 확인하였다. 제안된 MMACE_p 필터는 10개의 암호화된 숫자를 한꺼번에 인식할 수 있도록 4개의 MACE_p필터를 다중화하여 합성하였고, OWMF는 얼굴영상의 분리인식 능력과 SNR을 향상시킬 수 있도록 하였다. 컴퓨터 시뮤레이션을 통하여 제안된 정보보호기술이 개인신원정보 보호에 적용될 수 있음을 보였다.

A pilot study of an automated personal identification process: Applying machine learning to panoramic radiographs

  • Ortiz, Adrielly Garcia;Soares, Gustavo Hermes;da Rosa, Gabriela Cauduro;Biazevic, Maria Gabriela Haye;Michel-Crosato, Edgard
    • Imaging Science in Dentistry
    • /
    • 제51권2호
    • /
    • pp.187-193
    • /
    • 2021
  • Purpose: This study aimed to assess the usefulness of machine learning and automation techniques to match pairs of panoramic radiographs for personal identification. Materials and Methods: Two hundred panoramic radiographs from 100 patients (50 males and 50 females) were randomly selected from a private radiological service database. Initially, 14 linear and angular measurements of the radiographs were made by an expert. Eight ratio indices derived from the original measurements were applied to a statistical algorithm to match radiographs from the same patients, simulating a semi-automated personal identification process. Subsequently, measurements were automatically generated using a deep neural network for image recognition, simulating a fully automated personal identification process. Results: Approximately 85% of the radiographs were correctly matched by the automated personal identification process. In a limited number of cases, the image recognition algorithm identified 2 potential matches for the same individual. No statistically significant differences were found between measurements performed by the expert on panoramic radiographs from the same patients. Conclusion: Personal identification might be performed with the aid of image recognition algorithms and machine learning techniques. This approach will likely facilitate the complex task of personal identification by performing an initial screening of radiographs and matching ante-mortem and post-mortem images from the same individuals.

비접촉 손 영상에서 손가락 면을 이용한 개인 식별 (Personal Identification Using Inner Face of Fingers from Contactless Hand Image)

  • 김민기
    • 한국멀티미디어학회논문지
    • /
    • 제17권8호
    • /
    • pp.937-945
    • /
    • 2014
  • Multi-modal biometric system can use another biometric trait in the case of having deficiency at a biometric trait. It also has an advantage of improving the performance of personal identification by using multiple biometric traits, so studies on new biometric traits have continuously been performed. The inner face of finger is a relatively new biometric trait. It has two major features of knuckle lines and wrinkles, which can be used as discriminative features. This paper proposes a finger identification method based on displacement vector to effectively process some variation appeared in contactless hand image. At first, the proposed method produces displacement vectors, which are made by connecting corresponding points acquired by matching each pair of local block. It then recognize finger by measuring the similarity among all the detected displacement vectors. The experimental results using pubic CASIA hand image database show that the proposed method may be effectively applied to personal identification.