Abstract:
Disclosed are a device and method for managing credentials. In a multi-decentralized identity management service environment, a user can safely manage credentials that have been once issued, and can use the credentials in various user terminals without being redundantly issued credentials.
Abstract:
Disclosed are an entry and exit control method and apparatus, and a user terminal and a server. The entry and exit control method may be performed by the entry and exit control apparatus, and include broadcasting location information of the entry and exit control apparatus, receiving an authentication token from the user terminal providing a user authentication interface, verifying the received authentication token, and controlling an entry or an exit based on the verified authentication token, in which the authentication token may be issued by an entry and exit control server communicating with the entry and exit control apparatus at a request of the user terminal.
Abstract:
A transaction information managing system including a plurality of servers and at least one third-party server, wherein the plurality of servers are configured to create, when transactions using the budget of the public organization occurs, a block based on transaction information of the transactions, add the block to the block chain, and share the block chain and the at least one third-party server is configured to perform a mathematical operation to enhance the reliability of the block chain, and a method for managing the transaction information are provided.
Abstract:
A method and an apparatus for fingerprint recognition are disclosed. The apparatus for the fingerprint recognition may extract a plurality of fingerprint feature points from a fingerprint image and may predetermine a group among the plurality of fingerprint feature points. The apparatus for the fingerprint recognition may also calculate a ridge number between the first fingerprint feature points included in the group and may use the ridge number to generate a ridge count sequence.
Abstract:
A face recognition based key generation apparatus controls a key generation model that is formed of a CNN and an RNN to be learned to generate a desired key having a consistent value by using sample facial images of a key owner and a PIN of the key owner as inputs, and the key generation model receives a facial image of the key owner and the PIN of the key owner, as inputs at a desired key generation time, and generates a key.
Abstract:
A method and an apparatus for providing a service using a kiosk by a service providing server by performing the steps of: receiving a device list of at least one kiosk having an ability to provide the service among a plurality of kiosks registered in a blockchain from a kiosk server; authenticating a first kiosk through a smart contract function embedded in the blockchain when a user requests the service through the first kiosk and determining whether the first kiosk is included in the device list; and providing the service to the user when the first kiosk is authenticated by the smart contract function and is included in the device list are provided.
Abstract:
A user classification apparatus and method using a keystroke pattern based on a user posture are provided. A user classification method using a keystroke pattern may include receiving keystroke data from a user, extracting feature information corresponding to a unique pattern of the user using the received keystroke data, comparing the extracted feature information to a pattern of a keystroke profile for each posture of the user pre-generated through training, and determining whether currently input keystroke data is data of a trained user based on a result of the comparing.
Abstract:
Provided are a zone-based user verification system, a method thereof, and a zone-based user verification server. The zone-based user verification system includes a verification zone setting device configured to set a user verification zone and transmit user verification zone information to a user terminal located near the set user verification zone, a user terminal configured to determine whether the user terminal has entered the user verification zone by using the user verification zone information, and transmit identification information for user verification when it is determined that the user terminal has entered the user verification zone, a service terminal configured to transmit a user verification request signal when it is determined that the user terminal has entered the user verification zone, and a user verification server configured to perform user verification by using information included in the user verification request signal received from the service terminal and identification information for user verification received from the user terminal.
Abstract:
Disclosed are a system for security authentication via a mobile device, which includes: a first terminal of a user which requests mobile authentication; a server which generates authentication information and a key for encryption, encrypts the authentication information with the key, and divides the key into first information and second information to transmit the first information to the first terminal and transmit the second information and the encrypted information to a second terminal of the user; and the second terminal which acquires the first information from the first terminal, generates the key based on the first information and the second information, and acquires the authentication information by using the generated key.
Abstract:
A facial recognition method and apparatus are provided. The face recognizing apparatus divides an input face image into a plurality of regions, generates a feature vector consisting of real values for each region of the input face image, and generates an image feature vector using the generated feature vectors for each region. In addition, the face recognizing apparatus performs a search for finding whose face image the input face image is by using the image feature vector.