Abstract:
The present invention relates to a vessel traffic service system and a method for extracting accident data, and more particularly, to a technique that search and extracts possible event traffic data automatically from data of a concerned area without knowing exact time when a marine accident occurs. The vessel traffic service system includes: an input unit receiving conditional information for extracting accident occurrence data from a user; a storage unit storing at least one of an automatic identification system (AIS) signal, a radar signal, and a camera image signal; and a control unit extracting an event occurrence part from at least one of the AIS signal, the radar signal, and the camera image signal of a point and a time at which an accident occurs in accordance with the conditional information to generate an accident candidate list.
Abstract:
Disclosed are a device and method for managing credentials. In a multi-decentralized identity management service environment, a user can safely manage credentials that have been once issued, and can use the credentials in various user terminals without being redundantly issued credentials.
Abstract:
Disclosed is a biometric information-based authentication method and apparatus, in which various types of biometric information extracted from a user are used. According to an embodiment of the present disclosure, the authentication method includes: checking first biometric information based on a physical characteristic of a user and second biometric information varying with a biological characteristic of the user; constructing a reference composite polynomial on the basis of one or more feature points respectively detected from the first and second biometric information and generating and storing security information using the reference composite polynomial; checking first and second measured biometric information of the user; constructing a detection composite polynomial on the basis of one or more feature points detected from the first and second measured biometric information and generating authentication information using the detection composite polynomial; and performing authentication of the user by comparing the security information with the authentication information.