Abstract:
A method and an apparatus for authenticating user using biometric information. The apparatus authenticates the user by performing: generating a first feature vector from first biometric information of the user obtained by the biometric sensor and multiplying the first feature vector by a plurality of pseudo-random number (PRN) matrices, respectively; generating a query template based on an index of an element having a maximum value among elements of a result vector of the multiplication between the first feature vector and the plurality of PRN matrices; and performing authentication for the user by comparing the query template with a pre-stored reference template of a subscribed user.
Abstract:
Disclosed is a method and apparatus for mobile terminal management supporting security policy. An exemplary embodiment of the present invention provides a terminal management method for installing a mobile device management (MDM) function in which a server supports a security policy for a binary mobile application, including: adding, by the server, an MDM interlocking code for each class-method unit of an original application of the binary mobile application; modifying, by the server, the original application into a modification application; and generating and transmitting, by the server, an MDM policy including at least one MDM function to be applied to the modification application to a mobile terminal.
Abstract:
An integrated platform management apparatus to which SDN and NFV technologies are applied includes a VIM controlling and managing virtualized computing, storage, and network resources of a NFVI and interaction of the resources of the NFVI; a VNFM controlling at least one network function and virtualization of the at least one the network function so that a part of the at least one network function and the NFVI is implemented in software; and a NFV orchestrator displaying appliance functions of a plurality of VNFs in form of icons on a UI screen, and provides integrated wired, mobile, and hyper-connection communication services by connecting functions corresponding to icons selected by an OSS or a BSS among the icons displayed on the UI screen in form of a forwarding graph.
Abstract:
Disclosed are an entry and exit control method and apparatus, and a user terminal and a server. The entry and exit control method may be performed by the entry and exit control apparatus, and include broadcasting location information of the entry and exit control apparatus, receiving an authentication token from the user terminal providing a user authentication interface, verifying the received authentication token, and controlling an entry or an exit based on the verified authentication token, in which the authentication token may be issued by an entry and exit control server communicating with the entry and exit control apparatus at a request of the user terminal.
Abstract:
A method and an apparatus for providing a service using a kiosk by a service providing server by performing the steps of: receiving a device list of at least one kiosk having an ability to provide the service among a plurality of kiosks registered in a blockchain from a kiosk server; authenticating a first kiosk through a smart contract function embedded in the blockchain when a user requests the service through the first kiosk and determining whether the first kiosk is included in the device list; and providing the service to the user when the first kiosk is authenticated by the smart contract function and is included in the device list are provided.
Abstract:
A user classification apparatus and method using a keystroke pattern based on a user posture are provided. A user classification method using a keystroke pattern may include receiving keystroke data from a user, extracting feature information corresponding to a unique pattern of the user using the received keystroke data, comparing the extracted feature information to a pattern of a keystroke profile for each posture of the user pre-generated through training, and determining whether currently input keystroke data is data of a trained user based on a result of the comparing.
Abstract:
The present invention relates to a technique which provides a function of compressed encryption large pieces of plaintext information in a single ciphertext in order to improve a space efficiency of the encryption data which occupies most of a storage space to design an efficient SHE technique which is a base of the FHE technique design. More specifically, the present invention relates to a technique which is designed to improve a structure in which only one bit is encrypted/decrypted in the technique of the prior art to encrypt/decrypt multiple bit information to improve the space efficiency for storing a ciphertext.
Abstract:
A transaction information managing system including a plurality of servers and at least one third-party server, wherein the plurality of servers are configured to create, when transactions using the budget of the public organization occurs, a block based on transaction information of the transactions, add the block to the block chain, and share the block chain and the at least one third-party server is configured to perform a mathematical operation to enhance the reliability of the block chain, and a method for managing the transaction information are provided.
Abstract:
A method and an apparatus for fingerprint recognition are disclosed. The apparatus for the fingerprint recognition may extract a plurality of fingerprint feature points from a fingerprint image and may predetermine a group among the plurality of fingerprint feature points. The apparatus for the fingerprint recognition may also calculate a ridge number between the first fingerprint feature points included in the group and may use the ridge number to generate a ridge count sequence.
Abstract:
A face recognition based key generation apparatus controls a key generation model that is formed of a CNN and an RNN to be learned to generate a desired key having a consistent value by using sample facial images of a key owner and a PIN of the key owner as inputs, and the key generation model receives a facial image of the key owner and the PIN of the key owner, as inputs at a desired key generation time, and generates a key.