Abstract:
A method and an apparatus for providing a service using a kiosk by a service providing server by performing the steps of: receiving a device list of at least one kiosk having an ability to provide the service among a plurality of kiosks registered in a blockchain from a kiosk server; authenticating a first kiosk through a smart contract function embedded in the blockchain when a user requests the service through the first kiosk and determining whether the first kiosk is included in the device list; and providing the service to the user when the first kiosk is authenticated by the smart contract function and is included in the device list are provided.
Abstract:
A face recognition based key generation apparatus controls a key generation model that is formed of a CNN and an RNN to be learned to generate a desired key having a consistent value by using sample facial images of a key owner and a PIN of the key owner as inputs, and the key generation model receives a facial image of the key owner and the PIN of the key owner, as inputs at a desired key generation time, and generates a key.
Abstract:
An anonymous credential authentication system receives an anonymous credential signature value indicating that setting proposition information using a credential is satisfied from a user device that has been issued the credential combined with multiple pieces of attribute information constituting personal information, generates signer authentication information that confirms a signer of the anonymous credential signature value using an opening key, and outputs the signer authentication information.
Abstract:
A user classification apparatus and method using a keystroke pattern based on a user posture are provided. A user classification method using a keystroke pattern may include receiving keystroke data from a user, extracting feature information corresponding to a unique pattern of the user using the received keystroke data, comparing the extracted feature information to a pattern of a keystroke profile for each posture of the user pre-generated through training, and determining whether currently input keystroke data is data of a trained user based on a result of the comparing.
Abstract:
A transaction information managing system including a plurality of servers and at least one third-party server, wherein the plurality of servers are configured to create, when transactions using the budget of the public organization occurs, a block based on transaction information of the transactions, add the block to the block chain, and share the block chain and the at least one third-party server is configured to perform a mathematical operation to enhance the reliability of the block chain, and a method for managing the transaction information are provided.
Abstract:
A method and an apparatus for fingerprint recognition are disclosed. The apparatus for the fingerprint recognition may extract a plurality of fingerprint feature points from a fingerprint image and may predetermine a group among the plurality of fingerprint feature points. The apparatus for the fingerprint recognition may also calculate a ridge number between the first fingerprint feature points included in the group and may use the ridge number to generate a ridge count sequence.
Abstract:
The present disclosure relates to a method and apparatus for predicting application service response time in a communication system. Particularly, the present disclosure relates to a method, apparatus and system for predicting response time required to provide an application service to a user in response to the user's request of the application service in a server of a communication system. A method for predicting application service response time according to an embodiment of the present disclosure includes: data collection for collecting network data associated with a user application service, in response to a request for the application service by a user device; and data analysis for performing, by utilizing the collected data, a response time predictive analysis, in order to predict a user's application service response time. The data analysis selects an optimal prediction model by initially applying a response time prediction model and testing the initial prediction model that is applied.
Abstract:
An intelligent operation management apparatus for infrastructure may include a memory and a processor. Herein, the processor may be configured to: collect data by monitoring a resource of an operation target, perform an anomaly detection analysis by various methods of visualization using a graph for the collected data, perform an abnormal prediction analysis for the collected data, and perform pre-maintenance intelligent management based on a result of the anomaly detection analysis and a result of the abnormal prediction analysis. According to an apparatus and method for intelligent operation management of infrastructure, an effect of reducing operation expense and an effect of consecutively providing the quality of service (QoS) may be expected.
Abstract:
A method and an apparatus for authenticating user using biometric information. The apparatus authenticates the user by performing: generating a first feature vector from first biometric information of the user obtained by the biometric sensor and multiplying the first feature vector by a plurality of pseudo-random number (PRN) matrices, respectively; generating a query template based on an index of an element having a maximum value among elements of a result vector of the multiplication between the first feature vector and the plurality of PRN matrices; and performing authentication for the user by comparing the query template with a pre-stored reference template of a subscribed user.
Abstract:
The present invention relates to a technique which provides a function of compressed encryption large pieces of plaintext information in a single ciphertext in order to improve a space efficiency of the encryption data which occupies most of a storage space to design an efficient SHE technique which is a base of the FHE technique design. More specifically, the present invention relates to a technique which is designed to improve a structure in which only one bit is encrypted/decrypted in the technique of the prior art to encrypt/decrypt multiple bit information to improve the space efficiency for storing a ciphertext.