Abstract:
A role-based certification method applying transitivity is provided to achieve an efficient authentication process by applying a transitive signature to a role-based authentication system, improve accuracy of authentication by minimizing strings of a delegation chain, and protect privacy by exposing contents of the delegation chain at the minimum. Credential between a user or agency V(i) and V(j) is expressed as E(i,j). A user or agency V(i) has a secret key sk(i) and an open key V(i). An agency V(i) issues delegation credential E(i,j) to an agency V(j), wherein the E(i,j) is regarded as an edge of a graph. The agency V(i) combines the secret key sk(i) with secret key sk(j) of the agency V(j) for making the delegation credential E(i,j). The agency V(i) receives the secret key sk(j) of the agency V(j) through a trusted communication path for generating E(i,j) and transmitting the E(i,j) to the agency V(j). When a user A receives role credential R(k) from an agency V(k), a condition capable of accessing the agency V(i) is that the user A demonstrates that the user A has the delegation credential E(i,j), the credential E(j,k), and the role credential R(k) to an agency V(i). For the condition, the user A combines the credential E(i,j) and the credential E(j,k) for constituting E(i,k) by calculating E(i,k)=E(i,j)xE(j,k) and concatenating the result with the R(k).
Abstract:
A sub security device for biometric authentication is provided to raise a security management level of a biometric authentication terminal by providing the secondary sub security device independent of the biometric authentication terminal and connected to the biometric authentication terminal. An input unit(210) receives a character string corresponding to at least one of user ID information and a command for controlling a biometric authentication terminal from the user. A processor(220) sets a communication channel for the biometric authentication terminal and transfers the command to the biometric authentication terminal. The processor includes a communication channel setter(221) setting the communication channel through mutual authentication with the biometric authentication terminal, and a command processor(222) transferring the command to the biometric authentication terminal when an instruction included in the command is within a user authority. A display driver(230) displays the character string and/or a communication state with the biometric authentication terminal. A communication port controller(240) controls a communication port for communicating with the biometric terminal.
Abstract:
A method and a device for recognizing a face by using a montage face image are provided to search the face of a criminal easily by generating the montage face image with a sketch operator based on a face image database, extracting a feature vector from a similar montage face image, and performing montage face recognition. A feature vector storing part(310) extracts feature vectors from a similar montage face image and stores the feature vectors. An authenticator(320) performs authentication by receiving a target face image, extracting feature vectors from the target face image, and comparing the extracted feature vectors with feature vectors stored in the feature vector database. The authenticator includes a second generator(321) converting the target face image into the similar montage face image, a second extractor(323) extracting feature vectors from the similar montage face image, and a similarity comparator(333) evaluating similarity by comparing feature vectors of the feature vector storing part with feature vectors of the second extractor. The second generator performs conversion by applying a sketch operation including a DIP(Difference of Inverse Probability), BDIP(Block DIP), or morphology filter.
Abstract:
본 발명은 응급 상황 긴급 처리 수단에 관한 것으로, 특히 사용자가 응급 상황에 처해 있음을 재난 센터로 알리는 과정에서도 사용자의 프라이버시 보호가 가능한 수단을 제공하기 위하여, 응급상황 처리기에서 응급 상황을 처리하는 방법은 센서 장치로부터 사용자의 생체 정보 및 상황 정보를 수집하는 단계; 상기 수집된 정보를, 인증 서버로부터 상기 사용자에 대하여 부여받은 암호화키로 암호화한 후 저장하는 단계; 상기 저장된 생체 정보 및 상황 정보를 분석하여 상기 사용자가 응급 상황인지 여부를 판단하는 단계; 및 상기 판단 결과 상기 사용자가 응급 상황인 경우에 한하여 재난 센터로 응급 상황 정보를 송출하고 응급 서비스를 요청하는 단계를 포함하여 구성된다. 응급 상황 처리, 프라이버시 프로파일, 암호화
Abstract:
본 발명에 의한 무선 XML 전자 서명 서비스 제공 장치 및 그 방법은 모바일 클라이언트로부터 수신되는 XML 전자서명 템플릿 생성 요청 또는 XML 전자 서명 검증 요청에 따라 상기 모바일 클라이언트를 인증하는 XML 메시지분석부; 상기 인증이 성공하면 상기 전자서명 템플릿과 정규화된 형태의 SignedInfo를 생성하고, 전자 서명을 검증하는 전자서명처리부; 및 상기 전자서명 템플릿 생성과 전자 서명 검증을 위한 적어도 하나 이상의 설정값들과 키 정보들을 상기 전자서명처리부로 제공하는 암호화부;를 포함하는 것을 특징으로 하며, 무선 환경에서 교환되는 메시지에 대한 인증, 무결성, 부인봉쇄 등을 제공해 주며, 제한된 리소스의 무선 환경에 적용가능하고, 기존의 유선 환경을 위한 XML 전자서명과 호환 가능하여 유무선 통합 전자거래에 활용 가능하며, 무선 XML 전자서명 적용에 따른 기존 유선 환경의 변화를 최소화 시킬 수 있다. 모바일 XML, 모바일 XML 전자서명
Abstract:
An electronic tag for personalizing an RFID(Radio Frequency IDentification)-attached article, and a method and a device for protecting privacy by using the same are provided to prevent leakage of article and owner information, thereby enabling a user to use the tag attached to the article safely in a ubiquitous environment. A receiver(610) receives a personalization instruction and an access password. A personalizer(620) changes an electronic tag ID value storing ID information for discrimination from other electronic tags into a predetermined value and stores the electronic tag ID value to a storing part(630) by the personalization instruction. The storing part stores privacy information and the access password needed for recognizing the electronic tag ID value. A comparator(640) compares the received access password with the stored access password. A transmitter(650) transmits the ID value of the electronic tag if the received access password is identical with the stored access password, and does not transmit the ID value of the electronic tag if not.
Abstract:
생체정보를 이용한 사용자 신원확인장치 및 방법, 그 방법을 이용한 여행자 출입국 관리방법에 관한 것으로, 사용자로부터 입력받은 제1생체정보와 생체여권에 등록된 제2생체정보를 비교하여 상기 제1생체정보를 인증하는 이동형 생체인증 단말부, 상기 이동형 생체인증 단말부로부터 상기 제1생체정보를 암호화된 메세지로 수신하여 복호화하는 이동형 생체인증 단말관리부, 상기 이동형 생체인증 단말관리부로부터 전달된 상기 제1생체정보와 기등록된 인물에 대한 생체정보를 비교하여 일치여부를 확인하는 메인검색부 및 상기 생체여권에 등록된 제2생체정보와 상기 메인검색부의 일치여부에 대한 정보를 상기 사용자가 통과하는 심사대에서 디스플레이하여 상기 사용자를 확인하는 사용자 출입 승인부로 구성되어, 출입국 심사 과정에서 필요한 생체인증 및 생체검색에 소요되는 시간을 개인적으로 활용할 수 있으면서 최종 출입국 심사를 기존의 방법보다 간소하게 수행하여 출입국 절차를 빠르게 진행할 수 있는 장점을 제공한다.
Abstract:
A device authentication system based on a public key and an authentication method thereof are provided to simplify an authentication process if a device moves from one domain to the other and to register the device and issue device authentication by using a certificate server. A device authentication system based on a public key is composed of an authentication unit(210) for a server(200), for checking ID(Identification) of a device in which a service list is registered, and obtaining device authentication for the corresponding device issued from a certificate authority; a code key generating unit(220) for generating the public key and a secret key for the device and then transmitting the generated public and secret keys to the device; and a permission issuing unit(230) for authenticating the device on the basis of the device authentication and issuing device permissions getting access to the other device.
Abstract:
A method and a device for authenticating a user with a face image are provided to authenticate the user by extracting a feature vector based on a characteristic that energy is concentrated around transformation coefficients in the face image and comparing similarity of the extracted feature vector with the similarity of the registered feature vectors. A frequency transformer(110) transforms the face image of a normalized face area into frequency domain. An effective transformation coefficient extractor(120) extracts effective transformation coefficients from data in the frequency domain through energy concentration area information. A feature vector extractor(130) extracts the feature vector from the extracted effective transformation coefficients. A user authenticator(150) performs user authentication by comparing the extracted feature vector with the registered feature vector. An energy concentration area extractor extracts the energy concentration area from a plurality of training face images to extract the effective transformation coefficients.
Abstract:
A method for converting a key exchange protocol in a duplex channel into a key exchange protocol in a half-duplex channel is provided to facilitate conversion without increase of a network load by generating a new session key for a half-duplex channel without the change of contents of a transmission message of the key exchange protocol in the duplex channel. A method for converting a key exchange protocol in a duplex channel into a key exchange protocol in a half-duplex channel includes the steps of: converting a round message in the duplex channel into a round message in the half-duplex channel(S21); and applying a Pseudo random function to a session key of the round message in the duplex channel and a session identifier of the round message in the half-duplex channel and generating a session key for the round message in the half-duplex channel for a session corresponding to the identifier(S23).