摘要:
A multiple biometric identification system and method are provided. In the multiple biometric identification system and method, a plurality of unified comparison values are generated for respective corresponding candidates who may have different combinations of biometric identification information so that the comparison value vectors of the candidates can be effectively compared with one another. Therefore, it is possible to enable multiple biometric identification even when the type and quantity of biometric information differs from one candidate to.
摘要:
Provided are a mobile extensible Markup Language (XML) signature service providing apparatus and method. The mobile XML signature service providing apparatus includes: an XML message analyzing unit authenticating a mobile client, according to an XML signature template generation request or an XML signature verification request received from the mobile client; an XML signature processor generating an XML signature template and a SignedInfo element in a canonicalized format if the authentication is successful, and verifying an XML signature; and an encoder providing key information and at least one setting value for the generation of the XML signature template and verification of the XML signature, to the XML signature processor. Therefore, the mobile XML signature service providing apparatus and method provide authentication, integrity, non-repudiation, etc. with respect to messages received/transmitted in a wireless environment, are applied to a wireless environment having limited resources, are compatible with an XML signature for an existing wired environment that is to be applied to wired-and-wireless integration electronic commerce, and minimizes a change in an existing wired environment when a mobile XML signature is applied.
摘要:
Provided are a method and apparatus for securely distributing digital content. According to the method and apparatus, content is securely transmitted to users who have a right of use content regardless of the reliability of a content distributor, thereby allowing the users to efficiently use content. For example, even if an unauthorized third party changes a list of content users by deleting a user who has a right to use content from the list or adding a user who has no right to use content to the list, such an unauthorized change can be easily detected in real time, thereby securely protecting the list. Accordingly, it is possible to securely distribute and use digital content regardless of a content distributor.
摘要:
Provided is a fingerprint matching method and apparatus using fingerprint minutiae and fingerprint binary images. The method includes: constructing a template fingerprint database by extracting minutiae information and a binary image of a first fingerprint image; and extracting minutiae information and a binary image of a second fingerprint image to be authenticated and performing authentication by aligning the extracted minutiae information and the binary image of the second fingerprint image with data in the template fingerprint database. Accordingly, the fingerprint matching using the fingerprint binary images is additionally performed, thereby reducing a false acceptance rate (FAR) compared to a conventional minutia-based fingerprint authentication method.
摘要:
Provided is a method and apparatus for authenticating a fingerprint by hiding minutiae, securely storing information on the fingerprint, and authenticating the information on the fingerprint in order to prevent the information on the fingerprint from being reused by an attacker who accesses the information on the fingerprint that is stored in a storage unit. The method for recognizing fingerprint by hiding minutiae of a fingerprint adds fake minutiae information to genuine minutiae information, hides fingerprint information using a polynomial, which is generated based on personal intrinsic information, and stores the fingerprint information, thereby securely protecting the fingerprint information from an external attacker, and preventing the fingerprint information accessed by the attacker from being reused since the attacker cannot know the genuine minutiae.
摘要:
A method and apparatus for classifying fingerprint image quality and a fingerprint image recognition system are provided. The method includes dividing a fingerprint image into a plurality of blocks, calculating and vectorizing quality classification parameters with respect to the respective blocks, obtaining quality classification values for the respective blocks by inputting the vectorized quality classification parameters into a trained quality classifier, and selecting a representative value of the quality classification values and determining the representative value as the quality of the fingerprint image. Since the quality of the fingerprint image can be accurately judged, reliability of the fingerprint image recognition system is increased.
摘要:
A method of iris recognition using a cumulative-sum-based change point analysis and an apparatus using the same are disclosed. The method includes: transforming an iris image to a polar coordinated image having n×m pixel size and dividing the polar coordinated image into at least one cell; grouping the divided iris images into at least one of first groups having a predetermined number of cells, and at least one of second groups each having more cells than the first group has; performing a cumulative-sum-based change point analysis using a predetermined characteristic pattern value of each cell as a representative value; and generating a pattern vector by assigning a predetermined value to a cell having the change point and assigning a different value to other cells.
摘要:
Provided are a method for automatically generating an address in the IPv6-based Internet when a sender having a pair of a public key and a private key establishes a network connection, and a data format thereof. The method includes generating a CGA address and a CGA option based on the public key and a predetermined parameter, generating a signature option for verifying the CGA option, additionally generating a timestamp option in a case where a unidirectional message is transmitted to the network, and additionally generating a nonce option containing random numbers in a case where a bidirectional message is transmitted to the network, and adding the signature option, the timestamp option and the nonce option to a Neighbor Discovery (ND) option field to form an ND message, and transmitting the ND message to the network. When a host enters the network in a Zero Configuration over the IPv6-based Internet, the host can securely generate its own address without using a manual key. The method can also be applied to general IPv6 packet authentication or position authentication of a mobile node.
摘要:
A method for verifying authorization with extensibility in an authentication, authorization, and accounting (AAA) server, and more particularly, a method for verifying authorization in an AAA server capable of uniformly performing an authorization verification function regardless of a variety of authorization verification methods required for a user service provided through a network is provided. The method for verifying authorization with extensibility in an AAA server includes: the AAA server performing user authentication, transmitting the authentication result data to the user, and requesting authorization information for a subscriber service desired to be used, to the user; the user transferring an extensible authorization verification protocol framework having a predetermined format according to an AAA protocol to the AAA server, and requesting verification of the requested authorization; the AAA server verifying whether or not the authorization requested to be verified is set for the user, by referring to the framework; and if the authorization is verified, the AAA server transmitting the authorization verification result to the user, and by allocating a resource related to the authorization, beginning to provide the subscriber service.
摘要:
A method and apparatus for generating a keystream are provided. The method includes: (a) receiving a bitstream comprised of at least 4 bits; (b) selecting at least two bits from the received bitstream; (c) generating an operation value by performing a predetermined bitwise operation on the bits selected in (b); and (d) determining whether to discard the received bitstream or to output the rest of the received bitstream not selected in (b) according to the operation value. The method and apparatus for generating a keystream are expected to be suitable for a ubiquitous computing and network environment and to provide high security or high efficiency.