Sample records for scanning devices authenticate

  1. Elemental Scanning Devices Authenticate Works of Art

    NASA Technical Reports Server (NTRS)

    2013-01-01

    To better detect aluminum compounds, Marshall Space Flight Center partnered with KeyMaster Inc. (later acquired by Madison, Wisconsin-based Bruker AXS Inc.) to develop a vacuum pump system that could be attached to X-ray fluorescence (XRF) scanners. The resulting technology greatly expanded XRF scanner capabilities, and hundreds of museums now use them to authenticate artifacts and works of art.

  2. A Lightweight Continuous Authentication Protocol for the Internet of Things.

    PubMed

    Chuang, Yo-Hsuan; Lo, Nai-Wei; Yang, Cheng-Ying; Tang, Ssu-Wei

    2018-04-05

    Modern societies are moving toward an information-oriented environment. To gather and utilize information around people's modern life, tiny devices with all kinds of sensing devices and various sizes of gateways need to be deployed and connected with each other through the Internet or proxy-based wireless sensor networks (WSNs). Within this kind of Internet of Things (IoT) environment, how to authenticate each other between two communicating devices is a fundamental security issue. As a lot of IoT devices are powered by batteries and they need to transmit sensed data periodically, it is necessary for IoT devices to adopt a lightweight authentication protocol to reduce their energy consumption when a device wants to authenticate and transmit data to its targeted peer. In this paper, a lightweight continuous authentication protocol for sensing devices and gateway devices in general IoT environments is introduced. The concept of valid authentication time period is proposed to enhance robustness of authentication between IoT devices. To construct the proposed lightweight continuous authentication protocol, token technique and dynamic features of IoT devices are adopted in order to reach the design goals: the reduction of time consumption for consecutive authentications and energy saving for authenticating devices through by reducing the computation complexity during session establishment of continuous authentication. Security analysis is conducted to evaluate security strength of the proposed protocol. In addition, performance analysis has shown the proposed protocol is a strong competitor among existing protocols for device-to-device authentication in IoT environments.

  3. A Lightweight Continuous Authentication Protocol for the Internet of Things

    PubMed Central

    Chuang, Yo-Hsuan; Yang, Cheng-Ying; Tang, Ssu-Wei

    2018-01-01

    Modern societies are moving toward an information-oriented environment. To gather and utilize information around people’s modern life, tiny devices with all kinds of sensing devices and various sizes of gateways need to be deployed and connected with each other through the Internet or proxy-based wireless sensor networks (WSNs). Within this kind of Internet of Things (IoT) environment, how to authenticate each other between two communicating devices is a fundamental security issue. As a lot of IoT devices are powered by batteries and they need to transmit sensed data periodically, it is necessary for IoT devices to adopt a lightweight authentication protocol to reduce their energy consumption when a device wants to authenticate and transmit data to its targeted peer. In this paper, a lightweight continuous authentication protocol for sensing devices and gateway devices in general IoT environments is introduced. The concept of valid authentication time period is proposed to enhance robustness of authentication between IoT devices. To construct the proposed lightweight continuous authentication protocol, token technique and dynamic features of IoT devices are adopted in order to reach the design goals: the reduction of time consumption for consecutive authentications and energy saving for authenticating devices through by reducing the computation complexity during session establishment of continuous authentication. Security analysis is conducted to evaluate security strength of the proposed protocol. In addition, performance analysis has shown the proposed protocol is a strong competitor among existing protocols for device-to-device authentication in IoT environments. PMID:29621168

  4. Hardware device binding and mutual authentication

    DOEpatents

    Hamlet, Jason R; Pierson, Lyndon G

    2014-03-04

    Detection and deterrence of device tampering and subversion by substitution may be achieved by including a cryptographic unit within a computing device for binding multiple hardware devices and mutually authenticating the devices. The cryptographic unit includes a physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a binding PUF value. The cryptographic unit uses the binding PUF value during an enrollment phase and subsequent authentication phases. During a subsequent authentication phase, the cryptographic unit uses the binding PUF values of the multiple hardware devices to generate a challenge to send to the other device, and to verify a challenge received from the other device to mutually authenticate the hardware devices.

  5. Multi-factor authentication

    DOEpatents

    Hamlet, Jason R; Pierson, Lyndon G

    2014-10-21

    Detection and deterrence of spoofing of user authentication may be achieved by including a cryptographic fingerprint unit within a hardware device for authenticating a user of the hardware device. The cryptographic fingerprint unit includes an internal physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a PUF value. Combining logic is coupled to receive the PUF value, combines the PUF value with one or more other authentication factors to generate a multi-factor authentication value. A key generator is coupled to generate a private key and a public key based on the multi-factor authentication value while a decryptor is coupled to receive an authentication challenge posed to the hardware device and encrypted with the public key and coupled to output a response to the authentication challenge decrypted with the private key.

  6. Optical benchmarking of security document readers for automated border control

    NASA Astrophysics Data System (ADS)

    Valentín, Kristián.; Wild, Peter; Å tolc, Svorad; Daubner, Franz; Clabian, Markus

    2016-10-01

    Authentication and optical verification of travel documents upon crossing borders is of utmost importance for national security. Understanding the workflow and different approaches to ICAO 9303 travel document scanning in passport readers, as well as highlighting normalization issues and designing new methods to achieve better harmonization across inspection devices are key steps for the development of more effective and efficient next- generation passport inspection. This paper presents a survey of state-of-the-art document inspection systems, showcasing results of a document reader challenge investigating 9 devices with regards to optical characteristics.

  7. Multi-factor authentication using quantum communication

    DOEpatents

    Hughes, Richard John; Peterson, Charles Glen; Thrasher, James T.; Nordholt, Jane E.; Yard, Jon T.; Newell, Raymond Thorson; Somma, Rolando D.

    2018-02-06

    Multi-factor authentication using quantum communication ("QC") includes stages for enrollment and identification. For example, a user enrolls for multi-factor authentication that uses QC with a trusted authority. The trusted authority transmits device factor information associated with a user device (such as a hash function) and user factor information associated with the user (such as an encrypted version of a user password). The user device receives and stores the device factor information and user factor information. For multi-factor authentication that uses QC, the user device retrieves its stored device factor information and user factor information, then transmits the user factor information to the trusted authority, which also retrieves its stored device factor information. The user device and trusted authority use the device factor information and user factor information (more specifically, information such as a user password that is the basis of the user factor information) in multi-factor authentication that uses QC.

  8. Obfuscated authentication systems, devices, and methods

    DOEpatents

    Armstrong, Robert C; Hutchinson, Robert L

    2013-10-22

    Embodiments of the present invention are directed toward authentication systems, devices, and methods. Obfuscated executable instructions may encode an authentication procedure and protect an authentication key. The obfuscated executable instructions may require communication with a remote certifying authority for operation. In this manner, security may be controlled by the certifying authority without regard to the security of the electronic device running the obfuscated executable instructions.

  9. 75 FR 36678 - In the Matter of Certain Authentication Systems, Including Software and Handheld Electronic...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-28

    ... INTERNATIONAL TRADE COMMISSION [Investigation No. 337-TA-697] In the Matter of Certain Authentication Systems, Including Software and Handheld Electronic Devices; Notice of Commission Decision Not to... importation of certain authentication systems, including software and handheld electronic devices, by reason...

  10. A Continuous Identity Authentication Scheme Based on Physiological and Behavioral Characteristics.

    PubMed

    Wu, Guannan; Wang, Jian; Zhang, Yongrong; Jiang, Shuai

    2018-01-10

    Wearable devices have flourished over the past ten years providing great advantages to people and, recently, they have also been used for identity authentication. Most of the authentication methods adopt a one-time authentication manner which cannot provide continuous certification. To address this issue, we present a two-step authentication method based on an own-built fingertip sensor device which can capture motion data (e.g., acceleration and angular velocity) and physiological data (e.g., a photoplethysmography (PPG) signal) simultaneously. When the device is worn on the user's fingertip, it will automatically recognize whether the wearer is a legitimate user or not. More specifically, multisensor data is collected and analyzed to extract representative and intensive features. Then, human activity recognition is applied as the first step to enhance the practicability of the authentication system. After correctly discriminating the motion state, a one-class machine learning algorithm is applied for identity authentication as the second step. When a user wears the device, the authentication process is carried on automatically at set intervals. Analyses were conducted using data from 40 individuals across various operational scenarios. Extensive experiments were executed to examine the effectiveness of the proposed approach, which achieved an average accuracy rate of 98.5% and an F1-score of 86.67%. Our results suggest that the proposed scheme provides a feasible and practical solution for authentication.

  11. A Continuous Identity Authentication Scheme Based on Physiological and Behavioral Characteristics

    PubMed Central

    Wu, Guannan; Wang, Jian; Zhang, Yongrong; Jiang, Shuai

    2018-01-01

    Wearable devices have flourished over the past ten years providing great advantages to people and, recently, they have also been used for identity authentication. Most of the authentication methods adopt a one-time authentication manner which cannot provide continuous certification. To address this issue, we present a two-step authentication method based on an own-built fingertip sensor device which can capture motion data (e.g., acceleration and angular velocity) and physiological data (e.g., a photoplethysmography (PPG) signal) simultaneously. When the device is worn on the user’s fingertip, it will automatically recognize whether the wearer is a legitimate user or not. More specifically, multisensor data is collected and analyzed to extract representative and intensive features. Then, human activity recognition is applied as the first step to enhance the practicability of the authentication system. After correctly discriminating the motion state, a one-class machine learning algorithm is applied for identity authentication as the second step. When a user wears the device, the authentication process is carried on automatically at set intervals. Analyses were conducted using data from 40 individuals across various operational scenarios. Extensive experiments were executed to examine the effectiveness of the proposed approach, which achieved an average accuracy rate of 98.5% and an F1-score of 86.67%. Our results suggest that the proposed scheme provides a feasible and practical solution for authentication. PMID:29320463

  12. eBiometrics: an enhanced multi-biometrics authentication technique for real-time remote applications on mobile devices

    NASA Astrophysics Data System (ADS)

    Kuseler, Torben; Lami, Ihsan; Jassim, Sabah; Sellahewa, Harin

    2010-04-01

    The use of mobile communication devices with advance sensors is growing rapidly. These sensors are enabling functions such as Image capture, Location applications, and Biometric authentication such as Fingerprint verification and Face & Handwritten signature recognition. Such ubiquitous devices are essential tools in today's global economic activities enabling anywhere-anytime financial and business transactions. Cryptographic functions and biometric-based authentication can enhance the security and confidentiality of mobile transactions. Using Biometric template security techniques in real-time biometric-based authentication are key factors for successful identity verification solutions, but are venerable to determined attacks by both fraudulent software and hardware. The EU-funded SecurePhone project has designed and implemented a multimodal biometric user authentication system on a prototype mobile communication device. However, various implementations of this project have resulted in long verification times or reduced accuracy and/or security. This paper proposes to use built-in-self-test techniques to ensure no tampering has taken place on the verification process prior to performing the actual biometric authentication. These techniques utilises the user personal identification number as a seed to generate a unique signature. This signature is then used to test the integrity of the verification process. Also, this study proposes the use of a combination of biometric modalities to provide application specific authentication in a secure environment, thus achieving optimum security level with effective processing time. I.e. to ensure that the necessary authentication steps and algorithms running on the mobile device application processor can not be undermined or modified by an imposter to get unauthorized access to the secure system.

  13. An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks.

    PubMed

    Kim, Ki-Wook; Han, Youn-Hee; Min, Sung-Gi

    2017-09-21

    Many Internet of Things (IoT) services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM) mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechanism for an IoT access network, which is based on IEEE 802.11 key management with the IEEE 802.1X authentication mechanism. The proposed AKM mechanism does not require any pre-configured security information between the access network domain and the IoT service domain. It considers the resource constraints of IoT devices, allowing IoT devices to delegate the burden of AKM processes to a powerful agent. The agent has sufficient power to support various authentication methods for the access point, and it performs cryptographic functions for the IoT devices. Performance analysis shows that the proposed mechanism greatly reduces computation costs, network costs, and memory usage of the resource-constrained IoT device as compared to the existing IEEE 802.11 Key Management with the IEEE 802.1X authentication mechanism.

  14. An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks

    PubMed Central

    Han, Youn-Hee; Min, Sung-Gi

    2017-01-01

    Many Internet of Things (IoT) services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM) mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechanism for an IoT access network, which is based on IEEE 802.11 key management with the IEEE 802.1X authentication mechanism. The proposed AKM mechanism does not require any pre-configured security information between the access network domain and the IoT service domain. It considers the resource constraints of IoT devices, allowing IoT devices to delegate the burden of AKM processes to a powerful agent. The agent has sufficient power to support various authentication methods for the access point, and it performs cryptographic functions for the IoT devices. Performance analysis shows that the proposed mechanism greatly reduces computation costs, network costs, and memory usage of the resource-constrained IoT device as compared to the existing IEEE 802.11 Key Management with the IEEE 802.1X authentication mechanism. PMID:28934152

  15. Hardware device to physical structure binding and authentication

    DOEpatents

    Hamlet, Jason R.; Stein, David J.; Bauer, Todd M.

    2013-08-20

    Detection and deterrence of device tampering and subversion may be achieved by including a cryptographic fingerprint unit within a hardware device for authenticating a binding of the hardware device and a physical structure. The cryptographic fingerprint unit includes an internal physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generate an internal PUF value. Binding logic is coupled to receive the internal PUF value, as well as an external PUF value associated with the physical structure, and generates a binding PUF value, which represents the binding of the hardware device and the physical structure. The cryptographic fingerprint unit also includes a cryptographic unit that uses the binding PUF value to allow a challenger to authenticate the binding.

  16. Mobile Microblogging: Using Twitter and Mobile Devices in an Online Course to Promote Learning in Authentic Contexts

    ERIC Educational Resources Information Center

    Hsu, Yu-Chang; Ching, Yu-Hui

    2012-01-01

    This research applied a mixed-method design to explore how best to promote learning in authentic contexts in an online graduate course in instructional message design. The students used Twitter apps on their mobile devices to collect, share, and comment on authentic design examples found in their daily lives. The data sources included tweets…

  17. Deterrence of device counterfeiting, cloning, and subversion by substitution using hardware fingerprinting

    DOEpatents

    Hamlet, Jason R; Bauer, Todd M; Pierson, Lyndon G

    2014-09-30

    Deterrence of device subversion by substitution may be achieved by including a cryptographic fingerprint unit within a computing device for authenticating a hardware platform of the computing device. The cryptographic fingerprint unit includes a physically unclonable function ("PUF") circuit disposed in or on the hardware platform. The PUF circuit is used to generate a PUF value. A key generator is coupled to generate a private key and a public key based on the PUF value while a decryptor is coupled to receive an authentication challenge posed to the computing device and encrypted with the public key and coupled to output a response to the authentication challenge decrypted with the private key.

  18. Effectiveness of medicines authentication technology to detect counterfeit, recalled and expired medicines: a two-stage quantitative secondary care study

    PubMed Central

    Naughton, Bernard; Roberts, Lindsey; Dopson, Sue; Chapman, Stephen; Brindley, David

    2016-01-01

    Objectives To identify the authentication and detection rate of serialised medicines using medicines authentication technology. Design and intervention 4192 serialised medicines were entered into a hospital dispensary over two separate 8-week stages in 2015. Medicines were authenticated using secure external database cross-checking, triggered by the scanning of a two-dimensional data matrix with a unit specific 12-digit serial code. 4% of medicines included were preprogrammed with a message to identify the product as either expired, pack recalled, product recalled or counterfeit. Setting A site within a large UK National Health Service teaching hospital trust. Participants Accredited checking staff, pharmacists and dispensers in a pharmacy department. Primary outcome measures Authentication and detection rate of counterfeit expired and recalled medicines. Results The operational detection rate of counterfeit, recalled and expired medicines scanned as a combined group was 81.4% (stage 1 (S1)) and 87% (stage 2 (S2)). The technology's technical detection rate (TDR) was 100%; however, not all medicines were scanned and of those that were scanned not all that generated a warning message were quarantined. Owing to an operational authentication rate (OAR) of 66.3% (over both stages), only 31.8% of counterfeit medicines, 58% of recalled drugs and 64% of expired medicines were detected as a proportion of those entered into the study. Response times (RTs) of 152 ms (S1) and 165 ms (S2) were recorded, meeting the falsified medicines directive-mandated 300 ms limit. Conclusions TDRs and RTs were not a limiting factor in this study. The suboptimal OAR poses significant quality and safety issues with this detection approach. Authentication at the checking stage, however, demonstrated higher OARs. There is a need for further qualitative research to establish the reasons for less than absolute authentication and detection rates in the hospital environment to improve this technology in preparation for the incumbent European Union regulative deadline. PMID:27940634

  19. Line-scan macro-scale Raman chemical imaging for authentication of powdered foods and ingredients

    USDA-ARS?s Scientific Manuscript database

    Adulteration and fraud for powdered foods and ingredients are rising food safety risks that threaten consumers’ health. In this study, a newly developed line-scan macro-scale Raman imaging system using a 5 W 785 nm line laser as excitation source was used to authenticate the food powders. The system...

  20. Device interoperability and authentication for telemedical appliance based on the ISO/IEEE 11073 Personal Health Device (PHD) Standards.

    PubMed

    Caranguian, Luther Paul R; Pancho-Festin, Susan; Sison, Luis G

    2012-01-01

    In this study, we focused on the interoperability and authentication of medical devices in the context of telemedical systems. A recent standard called the ISO/IEEE 11073 Personal Health Device (X73-PHD) Standards addresses the device interoperability problem by defining common protocols for agent (medical device) and manager (appliance) interface. The X73-PHD standard however has not addressed security and authentication of medical devices which is important in establishing integrity of a telemedical system. We have designed and implemented a security policy within the X73-PHD standards. The policy will enable device authentication using Asymmetric-Key Cryptography and the RSA algorithm as the digital signature scheme. We used two approaches for performing the digital signatures: direct software implementation and use of embedded security modules (ESM). The two approaches were evaluated and compared in terms of execution time and memory requirement. For the standard 2048-bit RSA, ESM calculates digital signatures only 12% of the total time for the direct implementation. Moreover, analysis shows that ESM offers more security advantage such as secure storage of keys compared to using direct implementation. Interoperability with other systems was verified by testing the system with LNI Healthlink, a manager software that implements the X73-PHD standard. Lastly, security analysis was done and the system's response to common attacks on authentication systems was analyzed and several measures were implemented to protect the system against them.

  1. Flexible and Transparent User Authentication for Mobile Devices

    NASA Astrophysics Data System (ADS)

    Clarke, Nathan; Karatzouni, Sevasti; Furnell, Steven

    The mobile device has become a ubiquitous technology that is capable of supporting an increasingly large array of services, applications and information. Given their increasing importance, it is imperative to ensure that such devices are not misused or abused. Unfortunately, a key enabling control to prevent this, user authentication, has not kept up with the advances in device technology. This paper presents the outcomes of a 2 year study that proposes the use of transparent and continuous biometric authentication of the user: providing more comprehensive identity verification; minimizing user inconvenience; and providing security throughout the period of use. A Non-Intrusive and Continuous Authentication (NICA) system is described that maintains a continuous measure of confidence in the identity of the user, removing access to sensitive services and information with low confidence levels and providing automatic access with higher confidence levels. An evaluation of the framework is undertaken from an end-user perspective via a trial involving 27 participants. Whilst the findings raise concerns over education, privacy and intrusiveness, overall 92% of users felt the system offered a more secure environment when compared to existing forms of authentication.

  2. PANATIKI: A Network Access Control Implementation Based on PANA for IoT Devices

    PubMed Central

    Sanchez, Pedro Moreno; Lopez, Rafa Marin; Gomez Skarmeta, Antonio F.

    2013-01-01

    Internet of Things (IoT) networks are the pillar of recent novel scenarios, such as smart cities or e-healthcare applications. Among other challenges, these networks cover the deployment and interaction of small devices with constrained capabilities and Internet protocol (IP)-based networking connectivity. These constrained devices usually require connection to the Internet to exchange information (e.g., management or sensing data) or access network services. However, only authenticated and authorized devices can, in general, establish this connection. The so-called authentication, authorization and accounting (AAA) services are in charge of performing these tasks on the Internet. Thus, it is necessary to deploy protocols that allow constrained devices to verify their credentials against AAA infrastructures. The Protocol for Carrying Authentication for Network Access (PANA) has been standardized by the Internet engineering task force (IETF) to carry the Extensible Authentication Protocol (EAP), which provides flexible authentication upon the presence of AAA. To the best of our knowledge, this paper is the first deep study of the feasibility of EAP/PANA for network access control in constrained devices. We provide light-weight versions and implementations of these protocols to fit them into constrained devices. These versions have been designed to reduce the impact in standard specifications. The goal of this work is two-fold: (1) to demonstrate the feasibility of EAP/PANA in IoT devices; (2) to provide the scientific community with the first light-weight interoperable implementation of EAP/PANA for constrained devices in the Contiki operating system (Contiki OS), called PANATIKI. The paper also shows a testbed, simulations and experimental results obtained from real and simulated constrained devices. PMID:24189332

  3. PANATIKI: a network access control implementation based on PANA for IoT devices.

    PubMed

    Moreno Sanchez, Pedro; Marin Lopez, Rafa; Gomez Skarmeta, Antonio F

    2013-11-01

    Internet of Things (IoT) networks are the pillar of recent novel scenarios, such as smart cities or e-healthcare applications. Among other challenges, these networks cover the deployment and interaction of small devices with constrained capabilities and Internet protocol (IP)-based networking connectivity. These constrained devices usually require connection to the Internet to exchange information (e.g., management or sensing data) or access network services. However, only authenticated and authorized devices can, in general, establish this connection. The so-called authentication, authorization and accounting (AAA) services are in charge of performing these tasks on the Internet. Thus, it is necessary to deploy protocols that allow constrained devices to verify their credentials against AAA infrastructures. The Protocol for Carrying Authentication for Network Access (PANA) has been standardized by the Internet engineering task force (IETF) to carry the Extensible Authentication Protocol (EAP), which provides flexible authentication upon the presence of AAA. To the best of our knowledge, this paper is the first deep study of the feasibility of EAP/PANA for network access control in constrained devices. We provide light-weight versions and implementations of these protocols to fit them into constrained devices. These versions have been designed to reduce the impact in standard specifications. The goal of this work is two-fold: (1) to demonstrate the feasibility of EAP/PANA in IoT devices; (2) to provide the scientific community with the first light-weight interoperable implementation of EAP/PANA for constrained devices in the Contiki operating system (Contiki OS), called PANATIKI. The paper also shows a testbed, simulations and experimental results obtained from real and simulated constrained devices.

  4. Secure method for biometric-based recognition with integrated cryptographic functions.

    PubMed

    Chiou, Shin-Yan

    2013-01-01

    Biometric systems refer to biometric technologies which can be used to achieve authentication. Unlike cryptography-based technologies, the ratio for certification in biometric systems needs not to achieve 100% accuracy. However, biometric data can only be directly compared through proximal access to the scanning device and cannot be combined with cryptographic techniques. Moreover, repeated use, improper storage, or transmission leaks may compromise security. Prior studies have attempted to combine cryptography and biometrics, but these methods require the synchronization of internal systems and are vulnerable to power analysis attacks, fault-based cryptanalysis, and replay attacks. This paper presents a new secure cryptographic authentication method using biometric features. The proposed system combines the advantages of biometric identification and cryptographic techniques. By adding a subsystem to existing biometric recognition systems, we can simultaneously achieve the security of cryptographic technology and the error tolerance of biometric recognition. This method can be used for biometric data encryption, signatures, and other types of cryptographic computation. The method offers a high degree of security with protection against power analysis attacks, fault-based cryptanalysis, and replay attacks. Moreover, it can be used to improve the confidentiality of biological data storage and biodata identification processes. Remote biometric authentication can also be safely applied.

  5. Using cloud models of heartbeats as the entity identifier to secure mobile devices.

    PubMed

    Fu, Donglai; Liu, Yanhua

    2017-01-01

    Mobile devices are extensively used to store more private and often sensitive information. Therefore, it is important to protect them against unauthorised access. Authentication ensures that authorised users can use mobile devices. However, traditional authentication methods, such as numerical or graphic passwords, are vulnerable to passive attacks. For example, an adversary can steal the password by snooping from a shorter distance. To avoid these problems, this study presents a biometric approach that uses cloud models of heartbeats as the entity identifier to secure mobile devices. Here, it is identified that these concepts including cloud model or cloud have nothing to do with cloud computing. The cloud model appearing in the study is the cognitive model. In the proposed method, heartbeats are collected by two ECG electrodes that are connected to one mobile device. The backward normal cloud generator is used to generate ECG standard cloud models characterising the heartbeat template. When a user tries to have access to their mobile device, cloud models regenerated by fresh heartbeats will be compared with ECG standard cloud models to determine if the current user can use this mobile device. This authentication method was evaluated from three aspects including accuracy, authentication time and energy consumption. The proposed method gives 86.04% of true acceptance rate with 2.73% of false acceptance rate. One authentication can be done in 6s, and this processing consumes about 2000 mW of power.

  6. Privacy preserving, real-time and location secured biometrics for mCommerce authentication

    NASA Astrophysics Data System (ADS)

    Kuseler, Torben; Al-Assam, Hisham; Jassim, Sabah; Lami, Ihsan A.

    2011-06-01

    Secure wireless connectivity between mobile devices and financial/commercial establishments is mature, and so is the security of remote authentication for mCommerce. However, the current techniques are open for hacking, false misrepresentation, replay and other attacks. This is because of the lack of real-time and current-precise-location in the authentication process. This paper proposes a new technique that includes freshly-generated real-time personal biometric data of the client and present-position of the mobile device used by the client to perform the mCommerce so to form a real-time biometric representation to authenticate any remote transaction. A fresh GPS fix generates the "time and location" to stamp the biometric data freshly captured to produce a single, real-time biometric representation on the mobile device. A trusted Certification Authority (CA) acts as an independent authenticator of such client's claimed realtime location and his/her provided fresh biometric data. Thus eliminates the necessity of user enrolment with many mCommerce services and application providers. This CA can also "independently from the client" and "at that instant of time" collect the client's mobile device "time and location" from the cellular network operator so to compare with the received information, together with the client's stored biometric information. Finally, to preserve the client's location privacy and to eliminate the possibility of cross-application client tracking, this paper proposes shielding the real location of the mobile device used prior to submission to the CA or authenticators.

  7. A Hybrid Authentication and Authorization Process for Control System Networks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Manz, David O.; Edgar, Thomas W.; Fink, Glenn A.

    2010-08-25

    Convergence of control system and IT networks require that security, privacy, and trust be addressed. Trust management continues to plague traditional IT managers and is even more complex when extended into control system networks, with potentially millions of entities, a mission that requires 100% availability. Yet these very networks necessitate a trusted secure environment where controllers and managers can be assured that the systems are secure and functioning properly. We propose a hybrid authentication management protocol that addresses the unique issues inherent within control system networks, while leveraging the considerable research and momentum in existing IT authentication schemes. Our hybridmore » authentication protocol for control systems provides end device to end device authentication within a remote station and between remote stations and control centers. Additionally, the hybrid protocol is failsafe and will not interrupt communication or control of vital systems in a network partition or device failure. Finally, the hybrid protocol is resilient to transitory link loss and can operate in an island mode until connectivity is reestablished.« less

  8. Effectiveness of medicines authentication technology to detect counterfeit, recalled and expired medicines: a two-stage quantitative secondary care study.

    PubMed

    Naughton, Bernard; Roberts, Lindsey; Dopson, Sue; Chapman, Stephen; Brindley, David

    2016-12-09

    To identify the authentication and detection rate of serialised medicines using medicines authentication technology. 4192 serialised medicines were entered into a hospital dispensary over two separate 8-week stages in 2015. Medicines were authenticated using secure external database cross-checking, triggered by the scanning of a two-dimensional data matrix with a unit specific 12-digit serial code. 4% of medicines included were preprogrammed with a message to identify the product as either expired, pack recalled, product recalled or counterfeit. A site within a large UK National Health Service teaching hospital trust. Accredited checking staff, pharmacists and dispensers in a pharmacy department. Authentication and detection rate of counterfeit expired and recalled medicines. The operational detection rate of counterfeit, recalled and expired medicines scanned as a combined group was 81.4% (stage 1 (S1)) and 87% (stage 2 (S2)). The technology's technical detection rate (TDR) was 100%; however, not all medicines were scanned and of those that were scanned not all that generated a warning message were quarantined. Owing to an operational authentication rate (OAR) of 66.3% (over both stages), only 31.8% of counterfeit medicines, 58% of recalled drugs and 64% of expired medicines were detected as a proportion of those entered into the study. Response times (RTs) of 152 ms (S1) and 165 ms (S2) were recorded, meeting the falsified medicines directive-mandated 300 ms limit. TDRs and RTs were not a limiting factor in this study. The suboptimal OAR poses significant quality and safety issues with this detection approach. Authentication at the checking stage, however, demonstrated higher OARs. There is a need for further qualitative research to establish the reasons for less than absolute authentication and detection rates in the hospital environment to improve this technology in preparation for the incumbent European Union regulative deadline. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/.

  9. Marketing Education Assessment Guide. Performance-Based Activities with Authentic Assessments Instruments.

    ERIC Educational Resources Information Center

    Everett, Donna R.

    This guide presents performance-based authentic assessment ideas, samples, and suggestions to help marketing teachers and students respond to changes and pressures from outside the classroom. It contains 21 activities, each accompanied by a method of authentic assessment. In most cases, the authentic assessment method is a scoring device. The…

  10. User authentication based on the NFC host-card-emulation technology

    NASA Astrophysics Data System (ADS)

    Kološ, Jan; Kotyrba, Martin

    2017-11-01

    This paper deals with implementation of algorithms for data exchange between mobile devices supporting NFC HCE (Host-Card-Emulation) and a contactless NFC reader communicating in a read/write mode. This solution provides multiplatform architecture for data exchange between devices with a focus on safe and simple user authentication.

  11. Mutual Authentication Scheme in Secure Internet of Things Technology for Comfortable Lifestyle.

    PubMed

    Park, Namje; Kang, Namhi

    2015-12-24

    The Internet of Things (IoT), which can be regarded as an enhanced version of machine-to-machine communication technology, was proposed to realize intelligent thing-to-thing communications by utilizing the Internet connectivity. In the IoT, "things" are generally heterogeneous and resource constrained. In addition, such things are connected to each other over low-power and lossy networks. In this paper, we propose an inter-device authentication and session-key distribution system for devices with only encryption modules. In the proposed system, unlike existing sensor-network environments where the key distribution center distributes the key, each sensor node is involved with the generation of session keys. In addition, in the proposed scheme, the performance is improved so that the authenticated device can calculate the session key in advance. The proposed mutual authentication and session-key distribution system can withstand replay attacks, man-in-the-middle attacks, and wiretapped secret-key attacks.

  12. Optical-electronic device based on diffraction optical element for control of special protective tags executed from luminophor

    NASA Astrophysics Data System (ADS)

    Polyakov, M.; Odinokov, S.

    2017-05-01

    The report focuses on special printing industry, which is called secure printing, which uses printing techniques to prevent forgery or falsification of security documents. The report considered the possibility of establishing a spectral device for determining the authenticity of certain documents that are protected by machine-readable luminophor labels. The device works in two spectral ranges - visible and near infrared that allows to register Stokes and anti-Stokes spectral components of protective tags. The proposed device allows verification of the authenticity of security documents based on multiple criteria in different spectral ranges. It may be used at enterprises related to the production of security printing products, expert units of law enforcement bodies at check of authenticity of banknotes and other structures.

  13. Visible and NIR spectral band combination to produce high security ID tags for automatic identification

    NASA Astrophysics Data System (ADS)

    Pérez-Cabré, Elisabet; Millán, María S.; Javidi, Bahram

    2006-09-01

    Verification of a piece of information and/or authentication of a given object or person are common operations carried out by automatic security systems that can be applied, for instance, to control the entrance to restricted areas, access to public buildings, identification of cardholders, etc. Vulnerability of such security systems may depend on the ease of counterfeiting the information used as a piece of identification for verification and authentication. To protect data against tampering, the signature that identifies an object is usually encrypted to avoid an easy recognition at human sight and an easy reproduction using conventional devices for imaging or scanning. To make counterfeiting even more difficult, we propose to combine data from visible and near infrared (NIR) spectral bands. By doing this, neither the visible content nor the NIR data by theirselves are sufficient to allow the signature recognition and thus, the identification of a given object. Only the appropriate combination of both signals permits a satisfactory authentication. In addition, the resulting signature is encrypted following a fully-phase encryption technique and the obtained complex-amplitude distribution is encoded on an ID tag. Spatial multiplexing of the encrypted signature allows us to build a distortion-invariant ID tag, so that remote authentication can be achieved even if the tag is captured under rotation or at different distances. We also explore the possibility of using partial information of the encrypted signature to simplify the ID tag design.

  14. Applications of Multi-Channel Safety Authentication Protocols in Wireless Networks.

    PubMed

    Chen, Young-Long; Liau, Ren-Hau; Chang, Liang-Yu

    2016-01-01

    People can use their web browser or mobile devices to access web services and applications which are built into these servers. Users have to input their identity and password to login the server. The identity and password may be appropriated by hackers when the network environment is not safe. The multiple secure authentication protocol can improve the security of the network environment. Mobile devices can be used to pass the authentication messages through Wi-Fi or 3G networks to serve as a second communication channel. The content of the message number is not considered in a multiple secure authentication protocol. The more excessive transmission of messages would be easier to collect and decode by hackers. In this paper, we propose two schemes which allow the server to validate the user and reduce the number of messages using the XOR operation. Our schemes can improve the security of the authentication protocol. The experimental results show that our proposed authentication protocols are more secure and effective. In regard to applications of second authentication communication channels for a smart access control system, identity identification and E-wallet, our proposed authentication protocols can ensure the safety of person and property, and achieve more effective security management mechanisms.

  15. Securing the communication of medical information using local biometric authentication and commercial wireless links.

    PubMed

    Ivanov, Vladimir I; Yu, Paul L; Baras, John S

    2010-09-01

    Medical information is extremely sensitive in nature - a compromise, such as eavesdropping or tampering by a malicious third party, may result in identity theft, incorrect diagnosis and treatment, and even death. Therefore, it is important to secure the transfer of medical information from the patient to the recording system. We consider a portable, wireless device transferring medical information to a remote server. We decompose this problem into two sub-problems and propose security solutions to each of them: (1) to secure the link between the patient and the portable device, and (2) to secure the link between the portable device and the network. Thus we push the limits of the network security to the edge by authenticating the user using their biometric information; authenticating the device to the network at the physical layer; and strengthening the security of the wireless link with a key exchange mechanism. The proposed authentication methods can be used for recording the readings of medical data in a central database and for accessing medical records in various settings.

  16. Secure Method for Biometric-Based Recognition with Integrated Cryptographic Functions

    PubMed Central

    Chiou, Shin-Yan

    2013-01-01

    Biometric systems refer to biometric technologies which can be used to achieve authentication. Unlike cryptography-based technologies, the ratio for certification in biometric systems needs not to achieve 100% accuracy. However, biometric data can only be directly compared through proximal access to the scanning device and cannot be combined with cryptographic techniques. Moreover, repeated use, improper storage, or transmission leaks may compromise security. Prior studies have attempted to combine cryptography and biometrics, but these methods require the synchronization of internal systems and are vulnerable to power analysis attacks, fault-based cryptanalysis, and replay attacks. This paper presents a new secure cryptographic authentication method using biometric features. The proposed system combines the advantages of biometric identification and cryptographic techniques. By adding a subsystem to existing biometric recognition systems, we can simultaneously achieve the security of cryptographic technology and the error tolerance of biometric recognition. This method can be used for biometric data encryption, signatures, and other types of cryptographic computation. The method offers a high degree of security with protection against power analysis attacks, fault-based cryptanalysis, and replay attacks. Moreover, it can be used to improve the confidentiality of biological data storage and biodata identification processes. Remote biometric authentication can also be safely applied. PMID:23762851

  17. A DRM based on renewable broadcast encryption

    NASA Astrophysics Data System (ADS)

    Ramkumar, Mahalingam; Memon, Nasir

    2005-07-01

    We propose an architecture for digital rights management based on a renewable, random key pre-distribution (KPD) scheme, HARPS (hashed random preloaded subsets). The proposed architecture caters for broadcast encryption by a trusted authority (TA) and by "parent" devices (devices used by vendors who manufacture compliant devices) for periodic revocation of devices. The KPD also facilitates broadcast encryption by peer devices, which permits peers to distribute content, and efficiently control access to the content encryption secret using subscription secrets. The underlying KPD also caters for broadcast authentication and mutual authentication of any two devices, irrespective of the vendors manufacturing the device, and thus provides a comprehensive solution for securing interactions between devices taking part in a DRM system.

  18. Line-scan system for continuous hand authentication

    NASA Astrophysics Data System (ADS)

    Liu, Xiaofeng; Kong, Lingsheng; Diao, Zhihui; Jia, Ping

    2017-03-01

    An increasing number of heavy machinery and vehicles have come into service, giving rise to a significant concern over protecting these high-security systems from misuse. Conventionally, authentication performed merely at the initial login may not be sufficient for detecting intruders throughout the operating session. To address this critical security flaw, a line-scan continuous hand authentication system with the appearance of an operating rod is proposed. Given that the operating rod is occupied throughout the operating period, it can be a possible solution for unobtrusively recording the personal characteristics for continuous monitoring. The ergonomics in the physiological and psychological aspects are fully considered. Under the shape constraints, a highly integrated line-scan sensor, a controller unit, and a gear motor with encoder are utilized. This system is suitable for both the desktop and embedded platforms with a universal serial bus interface. The volume of the proposed system is smaller than 15% of current multispectral area-based camera systems. Based on experiments on a database with 4000 images from 200 volunteers, a competitive equal error rate of 0.1179% is achieved, which is far more accurate than the state-of-the-art continuous authentication systems using other modalities.

  19. Design of Secure and Lightweight Authentication Protocol for Wearable Devices Environment.

    PubMed

    Das, Ashok Kumar; Wazid, Mohammad; Kumar, Neeraj; Khan, Muhammad Khurram; Choo, Kim-Kwang Raymond; Park, YoungHo

    2017-09-18

    Wearable devices are used in various applications to collect information including step information, sleeping cycles, workout statistics, and health related information. Due to the nature and richness of the data collected by such devices, it is important to ensure the security of the collected data. This paper presents a new lightweight authentication scheme suitable for wearable device deployment. The scheme allows a user to mutually authenticate his/her wearable device(s) and the mobile terminal (e.g., Android and iOS device) and establish a session key among these devices (worn and carried by the same user) for secure communication between the wearable device and the mobile terminal. The security of the proposed scheme is then demonstrated through the broadly-accepted Real-Or-Random model, as well as using the popular formal security verification tool, known as the Automated Validation of Internet Security Protocols and Applications (AVISPA). Finally, we present a comparative summary of the proposed scheme in terms of the overheads such as computation and communication costs, security and functionality features of the proposed scheme and related schemes, and also the evaluation findings from the NS2 simulation.

  20. Mutual Authentication Scheme in Secure Internet of Things Technology for Comfortable Lifestyle

    PubMed Central

    Park, Namje; Kang, Namhi

    2015-01-01

    The Internet of Things (IoT), which can be regarded as an enhanced version of machine-to-machine communication technology, was proposed to realize intelligent thing-to-thing communications by utilizing the Internet connectivity. In the IoT, “things” are generally heterogeneous and resource constrained. In addition, such things are connected to each other over low-power and lossy networks. In this paper, we propose an inter-device authentication and session-key distribution system for devices with only encryption modules. In the proposed system, unlike existing sensor-network environments where the key distribution center distributes the key, each sensor node is involved with the generation of session keys. In addition, in the proposed scheme, the performance is improved so that the authenticated device can calculate the session key in advance. The proposed mutual authentication and session-key distribution system can withstand replay attacks, man-in-the-middle attacks, and wiretapped secret-key attacks. PMID:26712759

  1. A user authentication scheme using physiological and behavioral biometrics for multitouch devices.

    PubMed

    Koong, Chorng-Shiuh; Yang, Tzu-I; Tseng, Chien-Chao

    2014-01-01

    With the rapid growth of mobile network, tablets and smart phones have become sorts of keys to access personal secured services in our daily life. People use these devices to manage personal finances, shop on the Internet, and even pay at vending machines. Besides, it also helps us get connected with friends and business partners through social network applications, which were widely used as personal identifications in both real and virtual societies. However, these devices use inherently weak authentication mechanism, based upon passwords and PINs that is not changed all the time. Although forcing users to change password periodically can enhance the security level, it may also be considered annoyances for users. Biometric technologies are straightforward because of the simple authentication process. However, most of the traditional biometrics methodologies require diverse equipment to acquire biometric information, which may be expensive and not portable. This paper proposes a multibiometric user authentication scheme with both physiological and behavioral biometrics. Only simple rotations with fingers on multitouch devices are required to enhance the security level without annoyances for users. In addition, the user credential is replaceable to prevent from the privacy leakage.

  2. A User Authentication Scheme Using Physiological and Behavioral Biometrics for Multitouch Devices

    PubMed Central

    Koong, Chorng-Shiuh; Tseng, Chien-Chao

    2014-01-01

    With the rapid growth of mobile network, tablets and smart phones have become sorts of keys to access personal secured services in our daily life. People use these devices to manage personal finances, shop on the Internet, and even pay at vending machines. Besides, it also helps us get connected with friends and business partners through social network applications, which were widely used as personal identifications in both real and virtual societies. However, these devices use inherently weak authentication mechanism, based upon passwords and PINs that is not changed all the time. Although forcing users to change password periodically can enhance the security level, it may also be considered annoyances for users. Biometric technologies are straightforward because of the simple authentication process. However, most of the traditional biometrics methodologies require diverse equipment to acquire biometric information, which may be expensive and not portable. This paper proposes a multibiometric user authentication scheme with both physiological and behavioral biometrics. Only simple rotations with fingers on multitouch devices are required to enhance the security level without annoyances for users. In addition, the user credential is replaceable to prevent from the privacy leakage. PMID:25147864

  3. An efficient and secure dynamic ID-based authentication scheme for telecare medical information systems.

    PubMed

    Chen, Hung-Ming; Lo, Jung-Wen; Yeh, Chang-Kuo

    2012-12-01

    The rapidly increased availability of always-on broadband telecommunication environments and lower-cost vital signs monitoring devices bring the advantages of telemedicine directly into the patient's home. Hence, the control of access to remote medical servers' resources has become a crucial challenge. A secure authentication scheme between the medical server and remote users is therefore needed to safeguard data integrity, confidentiality and to ensure availability. Recently, many authentication schemes that use low-cost mobile devices have been proposed to meet these requirements. In contrast to previous schemes, Khan et al. proposed a dynamic ID-based remote user authentication scheme that reduces computational complexity and includes features such as a provision for the revocation of lost or stolen smart cards and a time expiry check for the authentication process. However, Khan et al.'s scheme has some security drawbacks. To remedy theses, this study proposes an enhanced authentication scheme that overcomes the weaknesses inherent in Khan et al.'s scheme and demonstrated this scheme is more secure and robust for use in a telecare medical information system.

  4. Nonwoven-Based Gelatin/Polycaprolactone Membrane Proves Suitability in a Preclinical Assessment for Treatment of Soft Tissue Defects

    PubMed Central

    Schulz, Simon; Angarano, Marco; Fabritius, Martin; Mülhaupt, Rolf; Dard, Michel; Obrecht, Marcel; Tomakidi, Pascal

    2014-01-01

    Standard preclinical assessments in vitro often have limitations regarding their transferability to human beings, mainly evoked by their nonhuman and tissue-different/nontissue-specific source. Here, we aimed at employing tissue-authentic simple and complex interactive fibroblast-epithelial cell systems and their in vivo-relevant biomarkers for preclinical in vitro assessment of nonwoven-based gelatin/polycaprolactone membranes (NBMs) for treatment of soft tissue defects. NBMs were composed of electrospun gelatin and polycaprolactone nanofiber nonwovens. Scanning electron microscopy in conjunction with actin/focal contact integrin fluorescence revealed successful adhesion and proper morphogenesis of keratinocytes and fibroblasts, along with cells' derived extracellular matrix deposits. The “feel-good factor” of cells under study on the NBM was substantiated by forming a confluent connective tissue entity, which was concomitant with a stratified epithelial equivalent. Immunohistochemistry proved tissue authenticity over time by abundance of the biomarker vimentin in the connective tissue entity, and chronological increase of keratins KRT1/10 and involucrin expression in epithelial equivalents. Suitability of the novel NBM as wound dressing was evidenced by an almost completion of epithelial wound closure in a pilot mini-pig study, after a surgical intervention-caused gingival dehiscence. In summary, preclinical assessment by tissue-authentic cell systems and the animal pilot study revealed the NBM as an encouraging therapeutic medical device for prospective clinical applications. PMID:24494668

  5. Analog Video Authentication and Seal Verification Equipment Development

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Gregory Lancaster

    Under contract to the US Department of Energy in support of arms control treaty verification activities, the Savannah River National Laboratory in conjunction with the Pacific Northwest National Laboratory, the Idaho National Laboratory and Milagro Consulting, LLC developed equipment for use within a chain of custody regime. This paper discussed two specific devices, the Authentication Through the Lens (ATL) analog video authentication system and a photographic multi-seal reader. Both of these devices have been demonstrated in a field trial, and the experience gained throughout will also be discussed. Typically, cryptographic methods are used to prove the authenticity of digital imagesmore » and video used in arms control chain of custody applications. However, in some applications analog cameras are used. Since cryptographic authentication methods will not work on analog video streams, a simple method of authenticating analog video was developed and tested. A photographic multi-seal reader was developed to image different types of visual unique identifiers for use in chain of custody and authentication activities. This seal reader is unique in its ability to image various types of seals including the Cobra Seal, Reflective Particle Tags, and adhesive seals. Flicker comparison is used to compare before and after images collected with the seal reader in order to detect tampering and verify the integrity of the seal.« less

  6. Australian DefenceScience. Volume 16, Number 2, Winter

    DTIC Science & Technology

    2008-01-01

    Making Virtual Advisers speedily interactive To provide an authentically interactive experience for humans working with Virtual Advisers, the Virtual...peer trusted and strong authentication for checking of security credentials without recourse to third parties or infrastructure, thus eliminating...multiple passwords, or carry around multiple security tokens.” Each CodeStick device is readied for use with a biometric authentication process. Since

  7. An Efficient Authenticated Key Transfer Scheme in Client-Server Networks

    NASA Astrophysics Data System (ADS)

    Shi, Runhua; Zhang, Shun

    2017-10-01

    In this paper, we presented a novel authenticated key transfer scheme in client-server networks, which can achieve two secure goals of remote user authentication and the session key establishment between the remote user and the server. Especially, the proposed scheme can subtly provide two fully different authentications: identity-base authentication and anonymous authentication, while the remote user only holds a private key. Furthermore, our scheme only needs to transmit 1-round messages from the remote user to the server, thus it is very efficient in communication complexity. In addition, the most time-consuming computation in our scheme is elliptic curve scalar point multiplication, so it is also feasible even for mobile devices.

  8. Geospatial Authentication

    NASA Technical Reports Server (NTRS)

    Lyle, Stacey D.

    2009-01-01

    A software package that has been designed to allow authentication for determining if the rover(s) is/are within a set of boundaries or a specific area to access critical geospatial information by using GPS signal structures as a means to authenticate mobile devices into a network wirelessly and in real-time. The advantage lies in that the system only allows those with designated geospatial boundaries or areas into the server.

  9. Secure and Privacy Enhanced Gait Authentication on Smart Phone

    PubMed Central

    Choi, Deokjai

    2014-01-01

    Smart environments established by the development of mobile technology have brought vast benefits to human being. However, authentication mechanisms on portable smart devices, particularly conventional biometric based approaches, still remain security and privacy concerns. These traditional systems are mostly based on pattern recognition and machine learning algorithms, wherein original biometric templates or extracted features are stored under unconcealed form for performing matching with a new biometric sample in the authentication phase. In this paper, we propose a novel gait based authentication using biometric cryptosystem to enhance the system security and user privacy on the smart phone. Extracted gait features are merely used to biometrically encrypt a cryptographic key which is acted as the authentication factor. Gait signals are acquired by using an inertial sensor named accelerometer in the mobile device and error correcting codes are adopted to deal with the natural variation of gait measurements. We evaluate our proposed system on a dataset consisting of gait samples of 34 volunteers. We achieved the lowest false acceptance rate (FAR) and false rejection rate (FRR) of 3.92% and 11.76%, respectively, in terms of key length of 50 bits. PMID:24955403

  10. User Authentication in Smartphones for Telehealth

    PubMed Central

    SMITH, KATHERINE A.; ZHOU, LEMING; WATZLAF, VALERIE J. M.

    2017-01-01

    Many functions previously conducted on desktop computers are now performed on smartphones. Smartphones provide convenience, portability, and connectivity. When smartphones are used in the conduct of telehealth, sensitive data is invariably accessed, rendering the devices in need of user authentication to ensure data protection. User authentication of smartphones can help mitigate potential Health Insurance Portability and Accountability Act (HIPAA) breaches and keep sensitive patient information protected, while also facilitating the convenience of smartphones within everyday life and healthcare. This paper presents and examines several types of authentication methods available to smartphone users to help ensure security of sensitive data from attackers. The applications of these authentication methods in telehealth are discussed. PMID:29238444

  11. User Authentication in Smartphones for Telehealth.

    PubMed

    Smith, Katherine A; Zhou, Leming; Watzlaf, Valerie J M

    2017-01-01

    Many functions previously conducted on desktop computers are now performed on smartphones. Smartphones provide convenience, portability, and connectivity. When smartphones are used in the conduct of telehealth, sensitive data is invariably accessed, rendering the devices in need of user authentication to ensure data protection. User authentication of smartphones can help mitigate potential Health Insurance Portability and Accountability Act (HIPAA) breaches and keep sensitive patient information protected, while also facilitating the convenience of smartphones within everyday life and healthcare. This paper presents and examines several types of authentication methods available to smartphone users to help ensure security of sensitive data from attackers. The applications of these authentication methods in telehealth are discussed.

  12. Analysis of MD5 authentication in various routing protocols using simulation tools

    NASA Astrophysics Data System (ADS)

    Dinakaran, M.; Darshan, K. N.; Patel, Harsh

    2017-11-01

    Authentication being an important paradigm of security and Computer Networks require secure paths to make the flow of the data even more secure through some security protocols. So MD-5(Message Digest 5) helps in providing data integrity to the data being sent through it and authentication to the network devices. This paper gives a brief introduction to the MD-5, simulation of the networks by including MD-5 authentication using various routing protocols like OSPF, EIGRP and RIPv2. GNS3 is being used to simulate the scenarios. Analysis of the MD-5 authentication is done in the later sections of the paper.

  13. Authentication of Smartphone Users Based on Activity Recognition and Mobile Sensing.

    PubMed

    Ehatisham-Ul-Haq, Muhammad; Azam, Muhammad Awais; Loo, Jonathan; Shuang, Kai; Islam, Syed; Naeem, Usman; Amin, Yasar

    2017-09-06

    Smartphones are context-aware devices that provide a compelling platform for ubiquitous computing and assist users in accomplishing many of their routine tasks anytime and anywhere, such as sending and receiving emails. The nature of tasks conducted with these devices has evolved with the exponential increase in the sensing and computing capabilities of a smartphone. Due to the ease of use and convenience, many users tend to store their private data, such as personal identifiers and bank account details, on their smartphone. However, this sensitive data can be vulnerable if the device gets stolen or lost. A traditional approach for protecting this type of data on mobile devices is to authenticate users with mechanisms such as PINs, passwords, and fingerprint recognition. However, these techniques are vulnerable to user compliance and a plethora of attacks, such as smudge attacks. The work in this paper addresses these challenges by proposing a novel authentication framework, which is based on recognizing the behavioral traits of smartphone users using the embedded sensors of smartphone, such as Accelerometer, Gyroscope and Magnetometer. The proposed framework also provides a platform for carrying out multi-class smart user authentication, which provides different levels of access to a wide range of smartphone users. This work has been validated with a series of experiments, which demonstrate the effectiveness of the proposed framework.

  14. Authentication of Smartphone Users Based on Activity Recognition and Mobile Sensing

    PubMed Central

    Ehatisham-ul-Haq, Muhammad; Azam, Muhammad Awais; Loo, Jonathan; Shuang, Kai; Islam, Syed; Naeem, Usman; Amin, Yasar

    2017-01-01

    Smartphones are context-aware devices that provide a compelling platform for ubiquitous computing and assist users in accomplishing many of their routine tasks anytime and anywhere, such as sending and receiving emails. The nature of tasks conducted with these devices has evolved with the exponential increase in the sensing and computing capabilities of a smartphone. Due to the ease of use and convenience, many users tend to store their private data, such as personal identifiers and bank account details, on their smartphone. However, this sensitive data can be vulnerable if the device gets stolen or lost. A traditional approach for protecting this type of data on mobile devices is to authenticate users with mechanisms such as PINs, passwords, and fingerprint recognition. However, these techniques are vulnerable to user compliance and a plethora of attacks, such as smudge attacks. The work in this paper addresses these challenges by proposing a novel authentication framework, which is based on recognizing the behavioral traits of smartphone users using the embedded sensors of smartphone, such as Accelerometer, Gyroscope and Magnetometer. The proposed framework also provides a platform for carrying out multi-class smart user authentication, which provides different levels of access to a wide range of smartphone users. This work has been validated with a series of experiments, which demonstrate the effectiveness of the proposed framework. PMID:28878177

  15. Secure E-Business applications based on the European Citizen Card

    NASA Astrophysics Data System (ADS)

    Zipfel, Christian; Daum, Henning; Meister, Gisela

    The introduction of ID cards enhanced with electronic authentication services opens up the possibility to use these for identification and authentication in e-business applications. To avoid incompatible national solutions, the specification of the European Citizen Card aims at defining interoperable services for such use cases. Especially the given device authentication methods can help to eliminate security problems with current e-business and online banking applications.

  16. Android Based Behavioral Biometric Authentication via Multi-Modal Fusion

    DTIC Science & Technology

    2014-06-12

    such as the way he or she uses the mouse, or interacts with the Graphical User Interface (GUI) [9]. Described simply, standard biometrics is determined...as a login screen on a standard computer. Active authentication is authentication that occurs dynamically throughout interaction with the device. A...because they are higher level constructs in themselves. The Android framework was specifically used for capturing the multitouch gestures: pinch and zoom

  17. HERMA-Heartbeat Microwave Authentication

    NASA Technical Reports Server (NTRS)

    Haque, Salman-ul Mohammed (Inventor); Chow, Edward (Inventor); McKee, Michael Ray (Inventor); Tkacenko, Andre (Inventor); Lux, James Paul (Inventor)

    2018-01-01

    Systems and methods for identifying and/or authenticating individuals utilizing microwave sensing modules are disclosed. A HEaRtbeat Microwave Authentication (HERMA) system can enable the active identification and/or authentication of a user by analyzing reflected RF signals that contain a person's unique characteristics related to their heartbeats. An illumination signal is transmitted towards a person where a reflected signal captures the motion of the skin and tissue (i.e. displacement) due to the person's heartbeats. The HERMA system can utilize existing transmitters in a mobile device (e.g. Wi-Fi, Bluetooth, Cellphone signals) as the illumination source with at least one external receive antenna. The received reflected signals can be pre-processed and analyzed to identify and/or authenticate a user.

  18. Cloud-assisted mutual authentication and privacy preservation protocol for telecare medical information systems.

    PubMed

    Li, Chun-Ta; Shih, Dong-Her; Wang, Chun-Cheng

    2018-04-01

     With the rapid development of wireless communication technologies and the growing prevalence of smart devices, telecare medical information system (TMIS) allows patients to receive medical treatments from the doctors via Internet technology without visiting hospitals in person. By adopting mobile device, cloud-assisted platform and wireless body area network, the patients can collect their physiological conditions and upload them to medical cloud via their mobile devices, enabling caregivers or doctors to provide patients with appropriate treatments at anytime and anywhere. In order to protect the medical privacy of the patient and guarantee reliability of the system, before accessing the TMIS, all system participants must be authenticated.  Mohit et al. recently suggested a lightweight authentication protocol for cloud-based health care system. They claimed their protocol ensures resilience of all well-known security attacks and has several important features such as mutual authentication and patient anonymity. In this paper, we demonstrate that Mohit et al.'s authentication protocol has various security flaws and we further introduce an enhanced version of their protocol for cloud-assisted TMIS, which can ensure patient anonymity and patient unlinkability and prevent the security threats of report revelation and report forgery attacks.  The security analysis proves that our enhanced protocol is secure against various known attacks as well as found in Mohit et al.'s protocol. Compared with existing related protocols, our enhanced protocol keeps the merits of all desirable security requirements and also maintains the efficiency in terms of computation costs for cloud-assisted TMIS.  We propose a more secure mutual authentication and privacy preservation protocol for cloud-assisted TMIS, which fixes the mentioned security weaknesses found in Mohit et al.'s protocol. According to our analysis, our authentication protocol satisfies most functionality features for privacy preservation and effectively cope with cloud-assisted TMIS with better efficiency. Copyright © 2018 Elsevier B.V. All rights reserved.

  19. Authentication based on gestures with smartphone in hand

    NASA Astrophysics Data System (ADS)

    Varga, Juraj; Švanda, Dominik; Varchola, Marek; Zajac, Pavol

    2017-08-01

    We propose a new method of authentication for smartphones and similar devices based on gestures made by user with the device itself. The main advantage of our method is that it combines subtle biometric properties of the gesture (something you are) with a secret information that can be freely chosen by the user (something you know). Our prototype implementation shows that the scheme is feasible in practice. Further development, testing and fine tuning of parameters is required for deployment in the real world.

  20. Privacy-Preserving Authentication Using a Double Pseudonym for Internet of Vehicles

    PubMed Central

    Xu, Wenyu; Zhang, Jing; Xu, Yan; Liu, Lu

    2018-01-01

    The Internet of Vehicles (IoV) plays an important role in smart transportation to reduce the drivers’s risk of having an accident and help them manage small emergencies. Therefore, security and privacy issues of the message in the tamper proof device (TPD) broadcasted to other vehicles and roadside units (RSUs) have become an important research subject in the field of smart transportation. Many authentication schemes are proposed to tackle the challenges above and most of them are heavy in computation and communication. In this paper, we propose a novel authentication scheme that utilizes the double pseudonym method to hide the real identity of vehicles and adopts the dynamic update technology to periodically update the information (such as member secret, authentication key, internal pseudo-identity) stored in the tamper-proof device to prevent the side-channel attack. Because of not using bilinear pairing, our scheme yields a better performance in terms of computation overhead and communication overhead, and is more suitable to be applied in the Internet of Vehicles. PMID:29735941

  1. Authenticity screening of seized whiskey samples using electrophoresis microchips coupled with contactless conductivity detection.

    PubMed

    Rezende, Kariolanda C A; Moreira, Roger Cardoso; Logrado, Lucio Paulo Lima; Talhavini, Márcio; Coltro, Wendell K T

    2016-10-01

    This report describes for the first time the use of microchip electrophoresis (ME) devices integrated with capacitively coupled contactless conductivity detection (C 4 D) to investigate the authenticity of seized whiskey samples, which were probably adulterated by simple dilution with tap water. The proposed microfluidic platform was explored for the monitoring of anionic species (Cl - and F - ) in both original and tampered samples. The best separations were achieved within 70 s using a running buffer composed of lactic acid and histidine (pH = 5.9). ME-C 4 D devices were used to analyze samples from three different brands (five samples each). Based on the presence of inorganic anions like Cl - , F - , SO 4 2- and NO 2 - in different amounts, the authenticity of seized whiskeys was compared to original samples. According to the reported data, the proposed microfluidic platform can be useful to help regulatory authorities in the investigation and monitoring of authenticity of commercialized whiskey beverages. © 2016 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  2. Privacy-Preserving Authentication Using a Double Pseudonym for Internet of Vehicles.

    PubMed

    Cui, Jie; Xu, Wenyu; Zhong, Hong; Zhang, Jing; Xu, Yan; Liu, Lu

    2018-05-07

    The Internet of Vehicles (IoV) plays an important role in smart transportation to reduce the drivers’s risk of having an accident and help them manage small emergencies. Therefore, security and privacy issues of the message in the tamper proof device (TPD) broadcasted to other vehicles and roadside units (RSUs) have become an important research subject in the field of smart transportation. Many authentication schemes are proposed to tackle the challenges above and most of them are heavy in computation and communication. In this paper, we propose a novel authentication scheme that utilizes the double pseudonym method to hide the real identity of vehicles and adopts the dynamic update technology to periodically update the information (such as member secret, authentication key, internal pseudo-identity) stored in the tamper-proof device to prevent the side-channel attack. Because of not using bilinear pairing, our scheme yields a better performance in terms of computation overhead and communication overhead, and is more suitable to be applied in the Internet of Vehicles.

  3. Threshold Things That Think: Authorisation for Resharing

    NASA Astrophysics Data System (ADS)

    Peeters, Roel; Kohlweiss, Markulf; Preneel, Bart

    As we are evolving towards ubiquitous computing, users carry an increasing number of mobile devices with sensitive information. The security of this information can be protected using threshold cryptography, in which secret computations are shared between multiple devices. Threshold cryptography can be made more robust by resharing protocols, which allow recovery from partial compromises. This paper introduces user-friendly and secure protocols for the authorisation of resharing protocols. We present both automatic and manual protocols, utilising a group manual authentication protocol to add a new device. We analyse the security of these protocols: our analysis considers permanent and temporary compromises, denial of service attacks and manual authentications errors of the user.

  4. A Selective Group Authentication Scheme for IoT-Based Medical Information System.

    PubMed

    Park, YoHan; Park, YoungHo

    2017-04-01

    The technology of IoT combined with medical systems is expected to support advanced medical services. However, unsolved security problems, such as misuse of medical devices, illegal access to the medical server and so on, make IoT-based medical systems not be applied widely. In addition, users have a high burden of computation to access Things for the explosive growth of IoT devices. Because medical information is critical and important, but users have a restricted computing power, IoT-based medical systems are required to provide secure and efficient authentication for users. In this paper, we propose a selective group authentication scheme using Shamir's threshold technique. The property of selectivity gives the right of choice to users to form a group which consists of things users select and access. And users can get an access authority for those Things at a time. Thus, our scheme provides an efficient user authentication for multiple Things and conditional access authority for safe IoT-based medical information system. To the best of our knowledge, our proposed scheme is the first in which selectivity is combined with group authentication in IoT environments.

  5. Comparative Study on Various Authentication Protocols in Wireless Sensor Networks.

    PubMed

    Rajeswari, S Raja; Seenivasagam, V

    2016-01-01

    Wireless sensor networks (WSNs) consist of lightweight devices with low cost, low power, and short-ranged wireless communication. The sensors can communicate with each other to form a network. In WSNs, broadcast transmission is widely used along with the maximum usage of wireless networks and their applications. Hence, it has become crucial to authenticate broadcast messages. Key management is also an active research topic in WSNs. Several key management schemes have been introduced, and their benefits are not recognized in a specific WSN application. Security services are vital for ensuring the integrity, authenticity, and confidentiality of the critical information. Therefore, the authentication mechanisms are required to support these security services and to be resilient to distinct attacks. Various authentication protocols such as key management protocols, lightweight authentication protocols, and broadcast authentication protocols are compared and analyzed for all secure transmission applications. The major goal of this survey is to compare and find out the appropriate protocol for further research. Moreover, the comparisons between various authentication techniques are also illustrated.

  6. Comparative Study on Various Authentication Protocols in Wireless Sensor Networks

    PubMed Central

    Rajeswari, S. Raja; Seenivasagam, V.

    2016-01-01

    Wireless sensor networks (WSNs) consist of lightweight devices with low cost, low power, and short-ranged wireless communication. The sensors can communicate with each other to form a network. In WSNs, broadcast transmission is widely used along with the maximum usage of wireless networks and their applications. Hence, it has become crucial to authenticate broadcast messages. Key management is also an active research topic in WSNs. Several key management schemes have been introduced, and their benefits are not recognized in a specific WSN application. Security services are vital for ensuring the integrity, authenticity, and confidentiality of the critical information. Therefore, the authentication mechanisms are required to support these security services and to be resilient to distinct attacks. Various authentication protocols such as key management protocols, lightweight authentication protocols, and broadcast authentication protocols are compared and analyzed for all secure transmission applications. The major goal of this survey is to compare and find out the appropriate protocol for further research. Moreover, the comparisons between various authentication techniques are also illustrated. PMID:26881272

  7. TOKEN: Trustable Keystroke-Based Authentication for Web-Based Applications on Smartphones

    NASA Astrophysics Data System (ADS)

    Nauman, Mohammad; Ali, Tamleek

    Smartphones are increasingly being used to store personal information as well as to access sensitive data from the Internet and the cloud. Establishment of the identity of a user requesting information from smartphones is a prerequisite for secure systems in such scenarios. In the past, keystroke-based user identification has been successfully deployed on production-level mobile devices to mitigate the risks associated with naïve username/password based authentication. However, these approaches have two major limitations: they are not applicable to services where authentication occurs outside the domain of the mobile device - such as web-based services; and they often overly tax the limited computational capabilities of mobile devices. In this paper, we propose a protocol for keystroke dynamics analysis which allows web-based applications to make use of remote attestation and delegated keystroke analysis. The end result is an efficient keystroke-based user identification mechanism that strengthens traditional password protected services while mitigating the risks of user profiling by collaborating malicious web services.

  8. Holograms and authentication: meeting future demands

    NASA Astrophysics Data System (ADS)

    Lancaster, Ian M.

    2004-06-01

    The use of holograms as authentication or security devices is the most valuable application of holograms yet devised. In 20 years, this has developed from the first use of a hologram on credit cards, to the situation today where governments turn to holograms as a key security feature on the protected documents they issue, including banknotes, identity documents and tax banderols. At the same time, holograms (and related devices) are the most recognised visible feature used to authenticate and protect branded and OEM products; this sector covers the gamut from CD jewel-box seals to the protection of safety-related items such as medicines and vehicle replacement parts. There has been creative synergy between the commercial suppliers of such holograms and the practical holography community. But new technologies are coming forward to challenge the role of holograms, a challenge that is aided by the counterfeiting of security holograms. What are the characteristics of those technologies and can holograms provide similar resources to users? Examples of collaboration between hologram producers and producers of other technologies to create combination devices suggest a possible route forward for holography to maintain its role in authentication and security. By scrutinising and adapting to needs, often by combination with other techniques, holographers may be able to retain their role in this important application.

  9. Security mechanism based on Hospital Authentication Server for secure application of implantable medical devices.

    PubMed

    Park, Chang-Seop

    2014-01-01

    After two recent security attacks against implantable medical devices (IMDs) have been reported, the privacy and security risks of IMDs have been widely recognized in the medical device market and research community, since the malfunctioning of IMDs might endanger the patient's life. During the last few years, a lot of researches have been carried out to address the security-related issues of IMDs, including privacy, safety, and accessibility issues. A physician accesses IMD through an external device called a programmer, for diagnosis and treatment. Hence, cryptographic key management between IMD and programmer is important to enforce a strict access control. In this paper, a new security architecture for the security of IMDs is proposed, based on a 3-Tier security model, where the programmer interacts with a Hospital Authentication Server, to get permissions to access IMDs. The proposed security architecture greatly simplifies the key management between IMDs and programmers. Also proposed is a security mechanism to guarantee the authenticity of the patient data collected from IMD and the nonrepudiation of the physician's treatment based on it. The proposed architecture and mechanism are analyzed and compared with several previous works, in terms of security and performance.

  10. Security Mechanism Based on Hospital Authentication Server for Secure Application of Implantable Medical Devices

    PubMed Central

    2014-01-01

    After two recent security attacks against implantable medical devices (IMDs) have been reported, the privacy and security risks of IMDs have been widely recognized in the medical device market and research community, since the malfunctioning of IMDs might endanger the patient's life. During the last few years, a lot of researches have been carried out to address the security-related issues of IMDs, including privacy, safety, and accessibility issues. A physician accesses IMD through an external device called a programmer, for diagnosis and treatment. Hence, cryptographic key management between IMD and programmer is important to enforce a strict access control. In this paper, a new security architecture for the security of IMDs is proposed, based on a 3-Tier security model, where the programmer interacts with a Hospital Authentication Server, to get permissions to access IMDs. The proposed security architecture greatly simplifies the key management between IMDs and programmers. Also proposed is a security mechanism to guarantee the authenticity of the patient data collected from IMD and the nonrepudiation of the physician's treatment based on it. The proposed architecture and mechanism are analyzed and compared with several previous works, in terms of security and performance. PMID:25276797

  11. Exploring the Use of Discrete Gestures for Authentication

    NASA Astrophysics Data System (ADS)

    Chong, Ming Ki; Marsden, Gary

    Research in user authentication has been a growing field in HCI. Previous studies have shown that peoples’ graphical memory can be used to increase password memorability. On the other hand, with the increasing number of devices with built-in motion sensors, kinesthetic memory (or muscle memory) can also be exploited for authentication. This paper presents a novel knowledge-based authentication scheme, called gesture password, which uses discrete gestures as password elements. The research presents a study of multiple password retention using PINs and gesture passwords. The study reports that although participants could use kinesthetic memory to remember gesture passwords, retention of PINs is far superior to retention of gesture passwords.

  12. Geospatial Authentication

    NASA Technical Reports Server (NTRS)

    Lyle, Stacey D.

    2009-01-01

    A software package that has been designed to allow authentication for determining if the rover(s) is/are within a set of boundaries or a specific area to access critical geospatial information by using GPS signal structures as a means to authenticate mobile devices into a network wirelessly and in real-time has been developed. The advantage lies in that the system only allows those with designated geospatial boundaries or areas into the server. The Geospatial Authentication software has two parts Server and Client. The server software is a virtual private network (VPN) developed in Linux operating system using Perl programming language. The server can be a stand-alone VPN server or can be combined with other applications and services. The client software is a GUI Windows CE software, or Mobile Graphical Software, that allows users to authenticate into a network. The purpose of the client software is to pass the needed satellite information to the server for authentication.

  13. Spectroscopically Enhanced Method and System for Multi-Factor Biometric Authentication

    NASA Astrophysics Data System (ADS)

    Pishva, Davar

    This paper proposes a spectroscopic method and system for preventing spoofing of biometric authentication. One of its focus is to enhance biometrics authentication with a spectroscopic method in a multifactor manner such that a person's unique ‘spectral signatures’ or ‘spectral factors’ are recorded and compared in addition to a non-spectroscopic biometric signature to reduce the likelihood of imposter getting authenticated. By using the ‘spectral factors’ extracted from reflectance spectra of real fingers and employing cluster analysis, it shows how the authentic fingerprint image presented by a real finger can be distinguished from an authentic fingerprint image embossed on an artificial finger, or molded on a fingertip cover worn by an imposter. This paper also shows how to augment two widely used biometrics systems (fingerprint and iris recognition devices) with spectral biometrics capabilities in a practical manner and without creating much overhead or inconveniencing their users.

  14. A Key Establishment Protocol for RFID User in IPTV Environment

    NASA Astrophysics Data System (ADS)

    Jeong, Yoon-Su; Kim, Yong-Tae; Sohn, Jae-Min; Park, Gil-Cheol; Lee, Sang-Ho

    In recent years, the usage of IPTV (Internet Protocol Television) has been increased. The reason is a technological convergence of broadcasting and telecommunication delivering interactive applications and multimedia content through high speed Internet connections. The main critical point of IPTV security requirements is subscriber authentication. That is, IPTV service should have the capability to identify the subscribers to prohibit illegal access. Currently, IPTV service does not provide a sound authentication mechanism to verify the identity of its wireless users (or devices). This paper focuses on a lightweight authentication and key establishment protocol based on the use of hash functions. The proposed approach provides effective authentication for a mobile user with a RFID tag whose authentication information is communicated back and forth with the IPTV authentication server via IPTV set-top box (STB). That is, the proposed protocol generates user's authentication information that is a bundle of two public keys derived from hashing user's private keys and RFID tag's session identifier, and adds 1bit to this bundled information for subscriber's information confidentiality before passing it to the authentication server.

  15. Digital authentication with copy-detection patterns

    NASA Astrophysics Data System (ADS)

    Picard, Justin

    2004-06-01

    Technologies for making high-quality copies of documents are getting more available, cheaper, and more efficient. As a result, the counterfeiting business engenders huge losses, ranging to 5% to 8% of worldwide sales of brand products, and endangers the reputation and value of the brands themselves. Moreover, the growth of the Internet drives the business of counterfeited documents (fake IDs, university diplomas, checks, and so on), which can be bought easily and anonymously from hundreds of companies on the Web. The incredible progress of digital imaging equipment has put in question the very possibility of verifying the authenticity of documents: how can we discern genuine documents from seemingly "perfect" copies? This paper proposes a solution based on creating digital images with specific properties, called a Copy-detection patterns (CDP), that is printed on arbitrary documents, packages, etc. CDPs make an optimal use of an "information loss principle": every time an imae is printed or scanned, some information is lost about the original digital image. That principle applies even for the highest quality scanning, digital imaging, printing or photocopying equipment today, and will likely remain true for tomorrow. By measuring the amount of information contained in a scanned CDP, the CDP detector can take a decision on the authenticity of the document.

  16. Design of a MEMS-based retina scanning system for biometric authentication

    NASA Astrophysics Data System (ADS)

    Woittennek, Franziska; Knobbe, Jens; Pügner, Tino; Schelinski, Uwe; Grüger, Heinrich

    2014-05-01

    There is an increasing need for reliable authentication for a number of applications such as e commerce. Common authentication methods based on ownership (ID card) or knowledge factors (password, PIN) are often prone to manipulations and may therefore be not safe enough. Various inherence factor based methods like fingerprint, retinal pattern or voice identifications are considered more secure. Retina scanning in particular offers both low false rejection rate (FRR) and low false acceptance rate (FAR) with about one in a million. Images of the retina with its characteristic pattern of blood vessels can be made with either a fundus camera or laser scanning methods. The present work describes the optical design of a new compact retina laser scanner which is based on MEMS (Micro Electric Mechanical System) technology. The use of a dual axis micro scanning mirror for laser beam deflection enables a more compact and robust design compared to classical systems. The scanner exhibits a full field of view of 10° which corresponds to an area of 4 mm2 on the retinal surface surrounding the optical disc. The system works in the near infrared and is designed for use under ambient light conditions, which implies a pupil diameter of 1.5 mm. Furthermore it features a long eye relief of 30 mm so that it can be conveniently used by persons wearing glasses. The optical design requirements and the optical performance are discussed in terms of spot diagrams and ray fan plots.

  17. Patients’ Data Management System Protected by Identity-Based Authentication and Key Exchange

    PubMed Central

    Rivero-García, Alexandra; Santos-González, Iván; Hernández-Goya, Candelaria; Caballero-Gil, Pino; Yung, Moti

    2017-01-01

    A secure and distributed framework for the management of patients’ information in emergency and hospitalization services is proposed here in order to seek improvements in efficiency and security in this important area. In particular, confidentiality protection, mutual authentication, and automatic identification of patients are provided. The proposed system is based on two types of devices: Near Field Communication (NFC) wristbands assigned to patients, and mobile devices assigned to medical staff. Two other main elements of the system are an intermediate server to manage the involved data, and a second server with a private key generator to define the information required to protect communications. An identity-based authentication and key exchange scheme is essential to provide confidential communication and mutual authentication between the medical staff and the private key generator through an intermediate server. The identification of patients is carried out through a keyed-hash message authentication code. Thanks to the combination of the aforementioned tools, a secure alternative mobile health (mHealth) scheme for managing patients’ data is defined for emergency and hospitalization services. Different parts of the proposed system have been implemented, including mobile application, intermediate server, private key generator and communication channels. Apart from that, several simulations have been performed, and, compared with the current system, significant improvements in efficiency have been observed. PMID:28362328

  18. Patients' Data Management System Protected by Identity-Based Authentication and Key Exchange.

    PubMed

    Rivero-García, Alexandra; Santos-González, Iván; Hernández-Goya, Candelaria; Caballero-Gil, Pino; Yung, Moti

    2017-03-31

    A secure and distributed framework for the management of patients' information in emergency and hospitalization services is proposed here in order to seek improvements in efficiency and security in this important area. In particular, confidentiality protection, mutual authentication, and automatic identification of patients are provided. The proposed system is based on two types of devices: Near Field Communication (NFC) wristbands assigned to patients, and mobile devices assigned to medical staff. Two other main elements of the system are an intermediate server to manage the involved data, and a second server with a private key generator to define the information required to protect communications. An identity-based authentication and key exchange scheme is essential to provide confidential communication and mutual authentication between the medical staff and the private key generator through an intermediate server. The identification of patients is carried out through a keyed-hash message authentication code. Thanks to the combination of the aforementioned tools, a secure alternative mobile health (mHealth) scheme for managing patients' data is defined for emergency and hospitalization services. Different parts of the proposed system have been implemented, including mobile application, intermediate server, private key generator and communication channels. Apart from that, several simulations have been performed, and, compared with the current system, significant improvements in efficiency have been observed.

  19. M-AssIST: Interaction and Scaffolding Matters in Authentic Assessment

    ERIC Educational Resources Information Center

    Santos, Patricia; Cook, John; Hernández-Leo, Davinia

    2015-01-01

    Authentic assessment is important in formal and informal learning. Technology has the potential to be used to support the assessment of higher order skills particularly with respect to real life tasks. In particular, the use of mobile devices allows the learner to increase her interactions with physical objects, various environments (indoors and…

  20. Opportunistic Mobility Support for Resource Constrained Sensor Devices in Smart Cities

    PubMed Central

    Granlund, Daniel; Holmlund, Patrik; Åhlund, Christer

    2015-01-01

    A multitude of wireless sensor devices and technologies are being developed and deployed in cities all over the world. Sensor applications in city environments may include highly mobile installations that span large areas which necessitates sensor mobility support. This paper presents and validates two mechanisms for supporting sensor mobility between different administrative domains. Firstly, EAP-Swift, an Extensible Authentication Protocol (EAP)-based sensor authentication protocol is proposed that enables light-weight sensor authentication and key generation. Secondly, a mechanism for handoffs between wireless sensor gateways is proposed. We validate both mechanisms in a real-life study that was conducted in a smart city environment with several fixed sensors and moving gateways. We conduct similar experiments in an industry-based anechoic Long Term Evolution (LTE) chamber with an ideal radio environment. Further, we validate our results collected from the smart city environment against the results produced under ideal conditions to establish best and real-life case scenarios. Our results clearly validate that our proposed mechanisms can facilitate efficient sensor authentication and handoffs while sensors are roaming in a smart city environment. PMID:25738767

  1. Opportunistic mobility support for resource constrained sensor devices in smart cities.

    PubMed

    Granlund, Daniel; Holmlund, Patrik; Åhlund, Christer

    2015-03-02

    A multitude of wireless sensor devices and technologies are being developed and deployed in cities all over the world. Sensor applications in city environments may include highly mobile installations that span large areas which necessitates sensor mobility support. This paper presents and validates two mechanisms for supporting sensor mobility between different administrative domains. Firstly, EAP-Swift, an Extensible Authentication Protocol (EAP)-based sensor authentication protocol is proposed that enables light-weight sensor authentication and key generation. Secondly, a mechanism for handoffs between wireless sensor gateways is proposed. We validate both mechanisms in a real-life study that was conducted in a smart city environment with several fixed sensors and moving gateways. We conduct similar experiments in an industry-based anechoic Long Term Evolution (LTE) chamber with an ideal radio environment. Further, we validate our results collected from the smart city environment against the results produced under ideal conditions to establish best and real-life case scenarios. Our results clearly validate that our proposed mechanisms can facilitate efficient sensor authentication and handoffs while sensors are roaming in a smart city environment.

  2. A study on the integrity and authentication of weather observation data using Identity Based Encryption.

    PubMed

    Seo, Jung Woo; Lee, Sang Jin

    2016-01-01

    Weather information provides a safe working environment by contributing to the economic activity of the nation, and plays role of the prevention of natural disasters, which can cause large scaled casualties and damage of property. Especially during times of war, weather information plays a more important role than strategy, tactics and information about trends of the enemy. Also, it plays an essential role for the taking off and landing of fighter jet and the sailing of warships. If weather information, which plays a major role in national security and economy, gets misused for cyber terrorism resulting false weather information, it could be a huge threat for national security and the economy. We propose a plan to safely transmit the measured value from meteorological sensors through a meteorological telecommunication network in order to guarantee the confidentiality and integrity of the data despite cyber-attacks. Also, such a plan allows one to produce reliable weather forecasts by performing mutual authentication through authentication devices. To make sure of this, one can apply an Identity Based Signature to ensure the integrity of measured data, and transmit the encrypted weather information with mutual authentication about the authentication devices. There are merits of this research: It is not necessary to manage authentication certificates unlike the Public Key Infrastructure methodology, and it provides a powerful security measure with the capability to be realized in a small scale computing environment, such as the meteorological observation system due to the low burden on managing keys.

  3. Press touch code: A finger press based screen size independent authentication scheme for smart devices.

    PubMed

    Ranak, M S A Noman; Azad, Saiful; Nor, Nur Nadiah Hanim Binti Mohd; Zamli, Kamal Z

    2017-01-01

    Due to recent advancements and appealing applications, the purchase rate of smart devices is increasing at a higher rate. Parallely, the security related threats and attacks are also increasing at a greater ratio on these devices. As a result, a considerable number of attacks have been noted in the recent past. To resist these attacks, many password-based authentication schemes are proposed. However, most of these schemes are not screen size independent; whereas, smart devices come in different sizes. Specifically, they are not suitable for miniature smart devices due to the small screen size and/or lack of full sized keyboards. In this paper, we propose a new screen size independent password-based authentication scheme, which also offers an affordable defense against shoulder surfing, brute force, and smudge attacks. In the proposed scheme, the Press Touch (PT)-a.k.a., Force Touch in Apple's MacBook, Apple Watch, ZTE's Axon 7 phone; 3D Touch in iPhone 6 and 7; and so on-is transformed into a new type of code, named Press Touch Code (PTC). We design and implement three variants of it, namely mono-PTC, multi-PTC, and multi-PTC with Grid, on the Android Operating System. An in-lab experiment and a comprehensive survey have been conducted on 105 participants to demonstrate the effectiveness of the proposed scheme.

  4. Press touch code: A finger press based screen size independent authentication scheme for smart devices

    PubMed Central

    Ranak, M. S. A. Noman; Nor, Nur Nadiah Hanim Binti Mohd; Zamli, Kamal Z.

    2017-01-01

    Due to recent advancements and appealing applications, the purchase rate of smart devices is increasing at a higher rate. Parallely, the security related threats and attacks are also increasing at a greater ratio on these devices. As a result, a considerable number of attacks have been noted in the recent past. To resist these attacks, many password-based authentication schemes are proposed. However, most of these schemes are not screen size independent; whereas, smart devices come in different sizes. Specifically, they are not suitable for miniature smart devices due to the small screen size and/or lack of full sized keyboards. In this paper, we propose a new screen size independent password-based authentication scheme, which also offers an affordable defense against shoulder surfing, brute force, and smudge attacks. In the proposed scheme, the Press Touch (PT)—a.k.a., Force Touch in Apple’s MacBook, Apple Watch, ZTE’s Axon 7 phone; 3D Touch in iPhone 6 and 7; and so on—is transformed into a new type of code, named Press Touch Code (PTC). We design and implement three variants of it, namely mono-PTC, multi-PTC, and multi-PTC with Grid, on the Android Operating System. An in-lab experiment and a comprehensive survey have been conducted on 105 participants to demonstrate the effectiveness of the proposed scheme. PMID:29084262

  5. A New Ticket-Based Authentication Mechanism for Fast Handover in Mesh Network.

    PubMed

    Lai, Yan-Ming; Cheng, Pu-Jen; Lee, Cheng-Chi; Ku, Chia-Yi

    2016-01-01

    Due to the ever-growing popularity mobile devices of various kinds have received worldwide, the demands on large-scale wireless network infrastructure development and enhancement have been rapidly swelling in recent years. A mobile device holder can get online at a wireless network access point, which covers a limited area. When the client leaves the access point, there will be a temporary disconnection until he/she enters the coverage of another access point. Even when the coverages of two neighboring access points overlap, there is still work to do to make the wireless connection smoothly continue. The action of one wireless network access point passing a client to another access point is referred to as the handover. During handover, for security concerns, the client and the new access point should perform mutual authentication before any Internet access service is practically gained/provided. If the handover protocol is inefficient, in some cases discontinued Internet service will happen. In 2013, Li et al. proposed a fast handover authentication mechanism for wireless mesh network (WMN) based on tickets. Unfortunately, Li et al.'s work came with some weaknesses. For one thing, some sensitive information such as the time and date of expiration is sent in plaintext, which increases security risks. For another, Li et al.'s protocol includes the use of high-quality tamper-proof devices (TPDs), and this unreasonably high equipment requirement limits its applicability. In this paper, we shall propose a new efficient handover authentication mechanism. The new mechanism offers a higher level of security on a more scalable ground with the client's privacy better preserved. The results of our performance analysis suggest that our new mechanism is superior to some similar mechanisms in terms of authentication delay.

  6. A New Ticket-Based Authentication Mechanism for Fast Handover in Mesh Network

    PubMed Central

    Lai, Yan-Ming; Cheng, Pu-Jen; Lee, Cheng-Chi; Ku, Chia-Yi

    2016-01-01

    Due to the ever-growing popularity mobile devices of various kinds have received worldwide, the demands on large-scale wireless network infrastructure development and enhancement have been rapidly swelling in recent years. A mobile device holder can get online at a wireless network access point, which covers a limited area. When the client leaves the access point, there will be a temporary disconnection until he/she enters the coverage of another access point. Even when the coverages of two neighboring access points overlap, there is still work to do to make the wireless connection smoothly continue. The action of one wireless network access point passing a client to another access point is referred to as the handover. During handover, for security concerns, the client and the new access point should perform mutual authentication before any Internet access service is practically gained/provided. If the handover protocol is inefficient, in some cases discontinued Internet service will happen. In 2013, Li et al. proposed a fast handover authentication mechanism for wireless mesh network (WMN) based on tickets. Unfortunately, Li et al.’s work came with some weaknesses. For one thing, some sensitive information such as the time and date of expiration is sent in plaintext, which increases security risks. For another, Li et al.’s protocol includes the use of high-quality tamper-proof devices (TPDs), and this unreasonably high equipment requirement limits its applicability. In this paper, we shall propose a new efficient handover authentication mechanism. The new mechanism offers a higher level of security on a more scalable ground with the client’s privacy better preserved. The results of our performance analysis suggest that our new mechanism is superior to some similar mechanisms in terms of authentication delay. PMID:27171160

  7. Informal Language Learning in Authentic Setting, Using Mobile Devices and SNS

    ERIC Educational Resources Information Center

    Aladjem, Ruthi; Jou, Bibiana

    2016-01-01

    One of the challenges of teaching a foreign language in non-immersive contexts, is extending the exposure of learners to the target language, beyond school hours. Since it is quite common to find linguistic and cultural exponents of foreign languages, in authentic contexts (i.e., the "Linguistic Landscape"), those exponents may serve as…

  8. Screening of adulterants in powdered foods and ingredients using line-scan Raman chemical imaging.

    USDA-ARS?s Scientific Manuscript database

    A newly developed line-scan Raman imaging system using a 785 nm line laser was used to authenticate powdered foods and ingredients. The system was used to collect hyperspectral Raman images in the range of 102–2865 wavenumber from three representative food powders mixed with selected adulterants eac...

  9. Restricted Authentication and Encryption for Cyber-physical Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kirkpatrick, Michael S; Bertino, Elisa; Sheldon, Frederick T

    2009-01-01

    Cyber-physical systems (CPS) are characterized by the close linkage of computational resources and physical devices. These systems can be deployed in a number of critical infrastructure settings. As a result, the security requirements of CPS are different than traditional computing architectures. For example, critical functions must be identified and isolated from interference by other functions. Similarly, lightweight schemes may be required, as CPS can include devices with limited computing power. One approach that offers promise for CPS security is the use of lightweight, hardware-based authentication. Specifically, we consider the use of Physically Unclonable Functions (PUFs) to bind an access requestmore » to specific hardware with device-specific keys. PUFs are implemented in hardware, such as SRAM, and can be used to uniquely identify the device. This technology could be used in CPS to ensure location-based access control and encryption, both of which would be desirable for CPS implementations.« less

  10. Imaging of the Finger Vein and Blood Flow for Anti-Spoofing Authentication Using a Laser and a MEMS Scanner.

    PubMed

    Lee, Jaekwon; Moon, Seunghwan; Lim, Juhun; Gwak, Min-Joo; Kim, Jae Gwan; Chung, Euiheon; Lee, Jong-Hyun

    2017-04-22

    A new authentication method employing a laser and a scanner is proposed to improve image contrast of the finger vein and to extract blood flow pattern for liveness detection. A micromirror reflects a laser beam and performs a uniform raster scan. Transmissive vein images were obtained, and compared with those of an LED. Blood flow patterns were also obtained based on speckle images in perfusion and occlusion. Curvature ratios of the finger vein and blood flow intensities were found to be nearly constant, regardless of the vein size, which validated the high repeatability of this scheme for identity authentication with anti-spoofing.

  11. Imaging of the Finger Vein and Blood Flow for Anti-Spoofing Authentication Using a Laser and a MEMS Scanner

    PubMed Central

    Lee, Jaekwon; Moon, Seunghwan; Lim, Juhun; Gwak, Min-Joo; Kim, Jae Gwan; Chung, Euiheon; Lee, Jong-Hyun

    2017-01-01

    A new authentication method employing a laser and a scanner is proposed to improve image contrast of the finger vein and to extract blood flow pattern for liveness detection. A micromirror reflects a laser beam and performs a uniform raster scan. Transmissive vein images were obtained, and compared with those of an LED. Blood flow patterns were also obtained based on speckle images in perfusion and occlusion. Curvature ratios of the finger vein and blood flow intensities were found to be nearly constant, regardless of the vein size, which validated the high repeatability of this scheme for identity authentication with anti-spoofing. PMID:28441728

  12. Security authentication with a three-dimensional optical phase code using random forest classifier: an overview

    NASA Astrophysics Data System (ADS)

    Markman, Adam; Carnicer, Artur; Javidi, Bahram

    2017-05-01

    We overview our recent work [1] on utilizing three-dimensional (3D) optical phase codes for object authentication using the random forest classifier. A simple 3D optical phase code (OPC) is generated by combining multiple diffusers and glass slides. This tag is then placed on a quick-response (QR) code, which is a barcode capable of storing information and can be scanned under non-uniform illumination conditions, rotation, and slight degradation. A coherent light source illuminates the OPC and the transmitted light is captured by a CCD to record the unique signature. Feature extraction on the signature is performed and inputted into a pre-trained random-forest classifier for authentication.

  13. Evaluations of the Combat Ready Clamp to Control Bleeding in Human Cadavers, Manikins, Swine Femoral Artery Hemorrhage Model and Swine Carcasses

    DTIC Science & Technology

    2012-06-01

    some advantages over alternative live tissue models when a mechanical device is employed to reduce arterial flow rates. Authentic human anatomy is...vessels to reduce and stop blood flow require authentic human anatomy for optimal testing. Cadaver I was approximately 60 year old male with a total

  14. Security enhancement of a biometric based authentication scheme for telecare medicine information systems with nonce.

    PubMed

    Mishra, Dheerendra; Mukhopadhyay, Sourav; Kumari, Saru; Khan, Muhammad Khurram; Chaturvedi, Ankita

    2014-05-01

    Telecare medicine information systems (TMIS) present the platform to deliver clinical service door to door. The technological advances in mobile computing are enhancing the quality of healthcare and a user can access these services using its mobile device. However, user and Telecare system communicate via public channels in these online services which increase the security risk. Therefore, it is required to ensure that only authorized user is accessing the system and user is interacting with the correct system. The mutual authentication provides the way to achieve this. Although existing schemes are either vulnerable to attacks or they have higher computational cost while an scalable authentication scheme for mobile devices should be secure and efficient. Recently, Awasthi and Srivastava presented a biometric based authentication scheme for TMIS with nonce. Their scheme only requires the computation of the hash and XOR functions.pagebreak Thus, this scheme fits for TMIS. However, we observe that Awasthi and Srivastava's scheme does not achieve efficient password change phase. Moreover, their scheme does not resist off-line password guessing attack. Further, we propose an improvement of Awasthi and Srivastava's scheme with the aim to remove the drawbacks of their scheme.

  15. Cryptanalysis and Improvement of "A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks".

    PubMed

    Alizadeh, Mojtaba; Zamani, Mazdak; Baharun, Sabariah; Abdul Manaf, Azizah; Sakurai, Kouichi; Anada, Hiroaki; Anada, Hiroki; Keshavarz, Hassan; Ashraf Chaudhry, Shehzad; Khurram Khan, Muhammad

    2015-01-01

    Proxy Mobile IPv6 is a network-based localized mobility management protocol that supports mobility without mobile nodes' participation in mobility signaling. The details of user authentication procedure are not specified in this standard, hence, many authentication schemes have been proposed for this standard. In 2013, Chuang et al., proposed an authentication method for PMIPv6, called SPAM. However, Chuang et al.'s Scheme protects the network against some security attacks, but it is still vulnerable to impersonation and password guessing attacks. In addition, we discuss other security drawbacks such as lack of revocation procedure in case of loss or stolen device, and anonymity issues of the Chuang et al.'s scheme. We further propose an enhanced authentication method to mitigate the security issues of SPAM method and evaluate our scheme using BAN logic.

  16. Cryptanalysis and Improvement of "A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks"

    PubMed Central

    Alizadeh, Mojtaba; Zamani, Mazdak; Baharun, Sabariah; Abdul Manaf, Azizah; Sakurai, Kouichi; Anada, Hiroki; Keshavarz, Hassan; Ashraf Chaudhry, Shehzad; Khurram Khan, Muhammad

    2015-01-01

    Proxy Mobile IPv6 is a network-based localized mobility management protocol that supports mobility without mobile nodes’ participation in mobility signaling. The details of user authentication procedure are not specified in this standard, hence, many authentication schemes have been proposed for this standard. In 2013, Chuang et al., proposed an authentication method for PMIPv6, called SPAM. However, Chuang et al.’s Scheme protects the network against some security attacks, but it is still vulnerable to impersonation and password guessing attacks. In addition, we discuss other security drawbacks such as lack of revocation procedure in case of loss or stolen device, and anonymity issues of the Chuang et al.’s scheme. We further propose an enhanced authentication method to mitigate the security issues of SPAM method and evaluate our scheme using BAN logic. PMID:26580963

  17. Breaking down the barriers of using strong authentication and encryption in resource constrained embedded systems

    NASA Astrophysics Data System (ADS)

    Knobler, Ron; Scheffel, Peter; Jackson, Scott; Gaj, Kris; Kaps, Jens Peter

    2013-05-01

    Various embedded systems, such as unattended ground sensors (UGS), are deployed in dangerous areas, where they are subject to compromise. Since numerous systems contain a network of devices that communicate with each other (often times with commercial off the shelf [COTS] radios), an adversary is able to intercept messages between system devices, which jeopardizes sensitive information transmitted by the system (e.g. location of system devices). Secret key algorithms such as AES are a very common means to encrypt all system messages to a sufficient security level, for which lightweight implementations exist for even very resource constrained devices. However, all system devices must use the appropriate key to encrypt and decrypt messages from each other. While traditional public key algorithms (PKAs), such as RSA and Elliptic Curve Cryptography (ECC), provide a sufficiently secure means to provide authentication and a means to exchange keys, these traditional PKAs are not suitable for very resource constrained embedded systems or systems which contain low reliability communication links (e.g. mesh networks), especially as the size of the network increases. Therefore, most UGS and other embedded systems resort to pre-placed keys (PPKs) or other naïve schemes which greatly reduce the security and effectiveness of the overall cryptographic approach. McQ has teamed with the Cryptographic Engineering Research Group (CERG) at George Mason University (GMU) to develop an approach using revolutionary cryptographic techniques that provides both authentication and encryption, but on resource constrained embedded devices, without the burden of large amounts of key distribution or storage.

  18. Using medical history embedded in biometrics medical card for user identity authentication: data representation by AVT hierarchical data tree.

    PubMed

    Fong, Simon; Zhuang, Yan

    2012-01-01

    User authentication has been widely used by biometric applications that work on unique bodily features, such as fingerprints, retina scan, and palm vessels recognition. This paper proposes a novel concept of biometric authentication by exploiting a user's medical history. Although medical history may not be absolutely unique to every individual person, the chances of having two persons who share an exactly identical trail of medical and prognosis history are slim. Therefore, in addition to common biometric identification methods, medical history can be used as ingredients for generating Q&A challenges upon user authentication. This concept is motivated by a recent advancement on smart-card technology that future identity cards are able to carry patents' medical history like a mobile database. Privacy, however, may be a concern when medical history is used for authentication. Therefore in this paper, a new method is proposed for abstracting the medical data by using attribute value taxonomies, into a hierarchical data tree (h-Data). Questions can be abstracted to various level of resolution (hence sensitivity of private data) for use in the authentication process. The method is described and a case study is given in this paper.

  19. Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer

    NASA Astrophysics Data System (ADS)

    Mannan, Mohammad; van Oorschot, P. C.

    Keylogging and phishing attacks can extract user identity and sensitive account information for unauthorized access to users' financial accounts. Most existing or proposed solutions are vulnerable to session hijacking attacks. We propose a simple approach to counter these attacks, which cryptographically separates a user's long-term secret input from (typically untrusted) client PCs; a client PC performs most computations but has access only to temporary secrets. The user's long-term secret (typically short and low-entropy) is input through an independent personal trusted device such as a cellphone. The personal device provides a user's long-term secrets to a client PC only after encrypting the secrets using a pre-installed, "correct" public key of a remote service (the intended recipient of the secrets). The proposed protocol (MP-Auth) realizes such an approach, and is intended to safeguard passwords from keyloggers, other malware (including rootkits), phishing attacks and pharming, as well as to provide transaction security to foil session hijacking. We report on a prototype implementation of MP-Auth, and provide a comparison of web authentication techniques that use an additional factor of authentication (e.g. a cellphone, PDA or hardware token).

  20. System and Method for Detecting Unauthorized Device Access by Comparing Multiple Independent Spatial-Time Data Sets from Other Devices

    NASA Technical Reports Server (NTRS)

    Westmeyer, Paul A. (Inventor); Wertenberg, Russell F. (Inventor); Krage, Frederick J. (Inventor); Riegel, Jack F. (Inventor)

    2017-01-01

    An authentication procedure utilizes multiple independent sources of data to determine whether usage of a device, such as a desktop computer, is authorized. When a comparison indicates an anomaly from the base-line usage data, the system, provides a notice that access of the first device is not authorized.

  1. World Language Students' Ethnographic Investigations of Culture through Mobile Devices

    ERIC Educational Resources Information Center

    Tuttle, Harry G.; Tuttle, Lori A.

    2017-01-01

    World language teachers can transform how their students learn culture through the use of mobile devices. When world language students use their mobile devices to access authentic current culture, they go from being passive receivers of culture to active cultural investigators. These students go from learning thin surface culture to exploring…

  2. Smartphone-based secure authenticated session sharing in Internet of Personal Things

    NASA Astrophysics Data System (ADS)

    Krishnan, Ram; Ninglekhu, Jiwan

    2015-03-01

    In the context of password-based authentication, a user can only memorize limited number of usernames and passwords. They are generally referred to as user-credentials. Longer character length of passwords further adds complication in mastering them. The expansion of the Internet and our growing dependency on it, has made it almost impossible for us to handle the big pool of user-credentials. Using simple, same or similar passwords is considered a poor practice, as it can easily be compromised by password cracking tools and social engineering attacks. Therefore, a robust and painless technique to manage personal credentials for websites is desirable. In this paper, a novel technique for user-credentials management via a smart mobile device such as a smartphone in a local network is proposed. We present a secure user-credential management scheme in which user's account login (username) and password associated with websites domain name is saved into the mobile device's database using a mobile application. We develop a custom browser extension application for client and use it to import user's credentials linked with the corresponding website from the mobile device via the local Wi-Fi network connection. The browser extension imports and identifies the authentication credentials and pushes them into the target TextBox locations in the webpage, ready for the user to execute. This scheme is suitably demonstrated between two personal devices in a local network.

  3. A Multifactor Secure Authentication System for Wireless Payment

    NASA Astrophysics Data System (ADS)

    Sanyal, Sugata; Tiwari, Ayu; Sanyal, Sudip

    Organizations are deploying wireless based online payment applications to expand their business globally, it increases the growing need of regulatory requirements for the protection of confidential data, and especially in internet based financial areas. Existing internet based authentication systems often use either the Web or the Mobile channel individually to confirm the claimed identity of the remote user. The vulnerability is that access is based on only single factor authentication which is not secure to protect user data, there is a need of multifactor authentication. This paper proposes a new protocol based on multifactor authentication system that is both secure and highly usable. It uses a novel approach based on Transaction Identification Code and SMS to enforce another security level with the traditional Login/password system. The system provides a highly secure environment that is simple to use and deploy with in a limited resources that does not require any change in infrastructure or underline protocol of wireless network. This Protocol for Wireless Payment is extended as a two way authentications system to satisfy the emerging market need of mutual authentication and also supports secure B2B communication which increases faith of the user and business organizations on wireless financial transaction using mobile devices.

  4. An improved anonymous authentication scheme for roaming in ubiquitous networks.

    PubMed

    Lee, Hakjun; Lee, Donghoon; Moon, Jongho; Jung, Jaewook; Kang, Dongwoo; Kim, Hyoungshick; Won, Dongho

    2018-01-01

    With the evolution of communication technology and the exponential increase of mobile devices, the ubiquitous networking allows people to use our data and computing resources anytime and everywhere. However, numerous security concerns and complicated requirements arise as these ubiquitous networks are deployed throughout people's lives. To meet the challenge, the user authentication schemes in ubiquitous networks should ensure the essential security properties for the preservation of the privacy with low computational cost. In 2017, Chaudhry et al. proposed a password-based authentication scheme for the roaming in ubiquitous networks to enhance the security. Unfortunately, we found that their scheme remains insecure in its protection of the user privacy. In this paper, we prove that Chaudhry et al.'s scheme is vulnerable to the stolen-mobile device and user impersonation attacks, and its drawbacks comprise the absence of the incorrect login-input detection, the incorrectness of the password change phase, and the absence of the revocation provision. Moreover, we suggest a possible way to fix the security flaw in Chaudhry et al's scheme by using the biometric-based authentication for which the bio-hash is applied in the implementation of a three-factor authentication. We prove the security of the proposed scheme with the random oracle model and formally verify its security properties using a tool named ProVerif, and analyze it in terms of the computational and communication cost. The analysis result shows that the proposed scheme is suitable for resource-constrained ubiquitous environments.

  5. An improved anonymous authentication scheme for roaming in ubiquitous networks

    PubMed Central

    Lee, Hakjun; Lee, Donghoon; Moon, Jongho; Jung, Jaewook; Kang, Dongwoo; Kim, Hyoungshick

    2018-01-01

    With the evolution of communication technology and the exponential increase of mobile devices, the ubiquitous networking allows people to use our data and computing resources anytime and everywhere. However, numerous security concerns and complicated requirements arise as these ubiquitous networks are deployed throughout people’s lives. To meet the challenge, the user authentication schemes in ubiquitous networks should ensure the essential security properties for the preservation of the privacy with low computational cost. In 2017, Chaudhry et al. proposed a password-based authentication scheme for the roaming in ubiquitous networks to enhance the security. Unfortunately, we found that their scheme remains insecure in its protection of the user privacy. In this paper, we prove that Chaudhry et al.’s scheme is vulnerable to the stolen-mobile device and user impersonation attacks, and its drawbacks comprise the absence of the incorrect login-input detection, the incorrectness of the password change phase, and the absence of the revocation provision. Moreover, we suggest a possible way to fix the security flaw in Chaudhry et al’s scheme by using the biometric-based authentication for which the bio-hash is applied in the implementation of a three-factor authentication. We prove the security of the proposed scheme with the random oracle model and formally verify its security properties using a tool named ProVerif, and analyze it in terms of the computational and communication cost. The analysis result shows that the proposed scheme is suitable for resource-constrained ubiquitous environments. PMID:29505575

  6. Sensor sentinel computing device

    DOEpatents

    Damico, Joseph P.

    2016-08-02

    Technologies pertaining to authenticating data output by sensors in an industrial environment are described herein. A sensor sentinel computing device receives time-series data from a sensor by way of a wireline connection. The sensor sentinel computing device generates a validation signal that is a function of the time-series signal. The sensor sentinel computing device then transmits the validation signal to a programmable logic controller in the industrial environment.

  7. Authentication Without Secrets

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Pierson, Lyndon G.; Robertson, Perry J.

    This work examines a new approach to authentication, which is the most fundamental security primitive that underpins all cyber security protections. Current Internet authentication techniques require the protection of one or more secret keys along with the integrity protection of the algorithms/computations designed to prove possession of the secret without actually revealing it. Protecting a secret requires physical barriers or encryption with yet another secret key. The reason to strive for "Authentication without Secret Keys" is that protecting secrets (even small ones only kept in a small corner of a component or device) is much harder than protecting the integritymore » of information that is not secret. Promising methods are examined for authentication of components, data, programs, network transactions, and/or individuals. The successful development of authentication without secret keys will enable far more tractable system security engineering for high exposure, high consequence systems by eliminating the need for brittle protection mechanisms to protect secret keys (such as are now protected in smart cards, etc.). This paper is a re-release of SAND2009-7032 with new figures numerous edits.« less

  8. Wireless Technology Infrastructures for Authentication of Patients: PKI that Rings

    PubMed Central

    Sax, Ulrich; Kohane, Isaac; Mandl, Kenneth D.

    2005-01-01

    As the public interest in consumer-driven electronic health care applications rises, so do concerns about the privacy and security of these applications. Achieving a balance between providing the necessary security while promoting user acceptance is a major obstacle in large-scale deployment of applications such as personal health records (PHRs). Robust and reliable forms of authentication are needed for PHRs, as the record will often contain sensitive and protected health information, including the patient's own annotations. Since the health care industry per se is unlikely to succeed at single-handedly developing and deploying a large scale, national authentication infrastructure, it makes sense to leverage existing hardware, software, and networks. This report proposes a new model for authentication of users to health care information applications, leveraging wireless mobile devices. Cell phones are widely distributed, have high user acceptance, and offer advanced security protocols. The authors propose harnessing this technology for the strong authentication of individuals by creating a registration authority and an authentication service, and examine the problems and promise of such a system. PMID:15684133

  9. Wireless technology infrastructures for authentication of patients: PKI that rings.

    PubMed

    Sax, Ulrich; Kohane, Isaac; Mandl, Kenneth D

    2005-01-01

    As the public interest in consumer-driven electronic health care applications rises, so do concerns about the privacy and security of these applications. Achieving a balance between providing the necessary security while promoting user acceptance is a major obstacle in large-scale deployment of applications such as personal health records (PHRs). Robust and reliable forms of authentication are needed for PHRs, as the record will often contain sensitive and protected health information, including the patient's own annotations. Since the health care industry per se is unlikely to succeed at single-handedly developing and deploying a large scale, national authentication infrastructure, it makes sense to leverage existing hardware, software, and networks. This report proposes a new model for authentication of users to health care information applications, leveraging wireless mobile devices. Cell phones are widely distributed, have high user acceptance, and offer advanced security protocols. The authors propose harnessing this technology for the strong authentication of individuals by creating a registration authority and an authentication service, and examine the problems and promise of such a system.

  10. 75 FR 448 - In the Matter of: Certain Authentication Systems, Including Software and Handheld Electronic...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-05

    ... Systems, Including Software and Handheld Electronic Devices; Notice of Investigation AGENCY: U.S... software and handheld electronic devices, by reason of infringement of certain claims of U.S. Patent No 7... software and handheld electronic devices, that infringe one or more of claims 31-35, 38, 41, 51, 54, 56, 58...

  11. QR code for medical information uses.

    PubMed

    Fontelo, Paul; Liu, Fang; Ducut, Erick G

    2008-11-06

    We developed QR code online tools, simulated and tested QR code applications for medical information uses including scanning QR code labels, URLs and authentication. Our results show possible applications for QR code in medicine.

  12. Security Analysis and Improvements of Authentication and Access Control in the Internet of Things

    PubMed Central

    Ndibanje, Bruce; Lee, Hoon-Jae; Lee, Sang-Gon

    2014-01-01

    Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network. Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes. This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al (Authentication and Access Control in the Internet of Things. In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China, 18–21 June 2012, pp. 588–592). According to our analysis, Jing et al.'s protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol. Therefore, we propose improvements to the protocol to fill the discovered weakness gaps. The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment. Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost. PMID:25123464

  13. Self-Assembled Resonance Energy Transfer Keys for Secure Communication over Classical Channels.

    PubMed

    Nellore, Vishwa; Xi, Sam; Dwyer, Chris

    2015-12-22

    Modern authentication and communication protocols increasingly use physical keys in lieu of conventional software-based keys for security. This shift is primarily driven by the ability to derive a unique, unforgeable signature from a physical key. The sole demonstration of an unforgeable key, thus far, has been through quantum key distribution, which suffers from limited communication distances and expensive infrastructure requirements. Here, we show a method for creating unclonable keys by molecular self-assembly of resonance energy transfer (RET) devices. It is infeasible to clone the RET-key due to the inability to characterize the key using current technology, the large number of input-output combinations per key, and the variation of the key's response with time. However, the manufacturer can produce multiple identical devices, which enables inexpensive, secure authentication and communication over classical channels, and thus any distance. Through a detailed experimental survey of the nanoscale keys, we demonstrate that legitimate users are successfully authenticated 99.48% of the time and the false-positives are only 0.39%, over two attempts. We estimate that a legitimate user would have a computational advantage of more than 10(340) years over an attacker. Our method enables the discovery of physical key based multiparty authentication and communication schemes that are both practical and possess unprecedented security.

  14. Security analysis and improvements of authentication and access control in the Internet of Things.

    PubMed

    Ndibanje, Bruce; Lee, Hoon-Jae; Lee, Sang-Gon

    2014-08-13

    Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network. Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes. This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al. (Authentication and Access Control in the Internet of Things. In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China, 18-21 June 2012, pp. 588-592). According to our analysis, Jing et al.'s protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol. Therefore, we propose improvements to the protocol to fill the discovered weakness gaps. The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment. Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost.

  15. Profiling a multiplex short tandem repeat loci from human urine with use of low cost on-site technology for verification of sample authenticity.

    PubMed

    Pires, Nuno M M; Tao Dong; Berntzen, Lasse; Lonningdal, Torill

    2017-07-01

    This work focuses on the development of a sophisticated technique via STR typing to unequivocally verify the authenticity of urine samples before sent to laboratories. STR profiling was conducted with the CSF1PO, TPOX, TH01 Multiplex System coupled with a smartphone-based detection method. The promising capability of the method to identify distinct STR profiles from urine of different persons opens the possibility to conduct sample authenticity tests. On-site STR profiling could be realized with a self-contained autonomous device with an integrated PCR microchip shown hereby.

  16. Transform Modern Language Learning through Mobile Devices

    ERIC Educational Resources Information Center

    Tuttle, Harry Grover

    2013-01-01

    College professors can transform their modern language classes through mobile devices. Their students' learning becomes more active, more personalized, more contextual, and more culturally authentic as illustrated through the author's modern language mobile learning classroom examples. In addition, their students engage in many diverse types of…

  17. An Enhanced Secure Identity-Based Certificateless Public Key Authentication Scheme for Vehicular Sensor Networks.

    PubMed

    Li, Congcong; Zhang, Xi; Wang, Haiping; Li, Dongfeng

    2018-01-11

    Vehicular sensor networks have been widely applied in intelligent traffic systems in recent years. Because of the specificity of vehicular sensor networks, they require an enhanced, secure and efficient authentication scheme. Existing authentication protocols are vulnerable to some problems, such as a high computational overhead with certificate distribution and revocation, strong reliance on tamper-proof devices, limited scalability when building many secure channels, and an inability to detect hardware tampering attacks. In this paper, an improved authentication scheme using certificateless public key cryptography is proposed to address these problems. A security analysis of our scheme shows that our protocol provides an enhanced secure anonymous authentication, which is resilient against major security threats. Furthermore, the proposed scheme reduces the incidence of node compromise and replication attacks. The scheme also provides a malicious-node detection and warning mechanism, which can quickly identify compromised static nodes and immediately alert the administrative department. With performance evaluations, the scheme can obtain better trade-offs between security and efficiency than the well-known available schemes.

  18. Quantum tagging for tags containing secret classical data

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kent, Adrian

    Various authors have considered schemes for quantum tagging, that is, authenticating the classical location of a classical tagging device by sending and receiving quantum signals from suitably located distant sites, in an environment controlled by an adversary whose quantum information processing and transmitting power is potentially unbounded. All of the schemes proposed elsewhere in the literature assume that the adversary is able to inspect the interior of the tagging device. All of these schemes have been shown to be breakable if the adversary has unbounded predistributed entanglement. We consider here the case in which the tagging device contains a finitemore » key string shared with distant sites but kept secret from the adversary, and show this allows the location of the tagging device to be authenticated securely and indefinitely. Our protocol relies on quantum key distribution between the tagging device and at least one distant site, and demonstrates a new practical application of quantum key distribution. It also illustrates that the attainable security in position-based cryptography can depend crucially on apparently subtle details in the security scenario considered.« less

  19. Impersonation attack on a quantum secure direct communication and authentication protocol with improvement

    NASA Astrophysics Data System (ADS)

    Amerimehr, Ali; Hadain Dehkordi, Massoud

    2018-03-01

    We analyze the security of a quantum secure direct communication and authentication protocol based on single photons. We first give an impersonation attack on the protocol. The cryptanalysis shows that there is a gap in the authentication procedure of the protocol so that an opponent can reveal the secret information by an undetectable attempt. We then propose an improvement for the protocol and show it closes the gap by applying a mutual authentication procedure. In the improved protocol single photons are transmitted once in a session, so it is easy to implement as the primary protocol. Furthermore, we use a novel technique for secret order rearrangement of photons by which not only quantum storage is eliminated also a secret key can be reused securely. So the new protocol is applicable in practical approaches like embedded system devices.

  20. MEMS scanner mirror based system for retina scanning and in eye projection

    NASA Astrophysics Data System (ADS)

    Woittennek, Franziska; Knobbe, Jens; Pügner, Tino; Dallmann, Hans-Georg; Schelinski, Uwe; Grüger, Heinrich

    2015-02-01

    Many applications could benefit from miniaturized systems to scan blood vessels behind the retina in the human eye, so called "retina scanning". This reaches from access control to sophisticated security applications and medical devices. High volume systems for consumer applications require low cost and a user friendly operation. For example this includes no need for removal of glasses and self-adjustment, in turn guidance of focus and point of attraction by simultaneous projection for the user. A new system has been designed based on the well-known resonantly driven 2-d scanner mirror of Fraunhofer IPMS. A combined NIR and VIS laser system illuminates the eye through an eye piece designed for an operating distance allowing the use of glasses and granting sufficient field of view. This usability feature was considered to be more important than highest miniaturization. The modulated VIS laser facilitates the projection of an image directly onto the retina. The backscattered light from the continuous NIR laser contains the information of the blood vessels and is detected by a highly sensitive photo diode. A demonstrational setup has been realized including readout and driving electronics. The laser power was adjusted to an eye-secure level. Additional security features were integrated. Test measurements revealed promising results. In a first demonstration application the detection of biometric pattern of the blood vessels was evaluated for issues authentication in.

  1. Fuzzy-cellular neural network for face recognition HCI Authentication

    NASA Astrophysics Data System (ADS)

    Hoomod, Haider K.; ali, Ahmed abd

    2018-05-01

    Because of the rapid development of mobile devices technology, ease of use and interact with humans. May have found a mobile device most uses in our communications. Mobile devices can carry large amounts of personal and sensitive data, but often left not guaranteed (pin) locks are inconvenient to use and thus have seen low adoption while biometrics is more convenient and less susceptible to fraud and manipulation. Were propose in this paper authentication technique for using a mobile face recognition based on cellular neural networks [1] and fuzzy rules control. The good speed and get recognition rate from applied the proposed system in Android system. The images obtained in real time for 60 persons each person has 20 t0 60 different shot face images (about 3600 images), were the results for (FAR = 0), (FRR = 1.66%), (FER = 1.66) and accuracy = 98.34

  2. Trust-Based and Context-Aware Authentication in a Software Architecture for Context and Proximity-Aware Services

    NASA Astrophysics Data System (ADS)

    Lenzini, Gabriele

    We describe an existing software architecture for context and proximity aware services that enables trust-based and context-aware authentication. A service is proximity aware when it automatically detects the presence of entities in its proximity. Authentication is context-aware when it uses contextual information to discern among different identities and to evaluate to which extent they are authentic. The software architecture that we describe here is functioning in our Institute: It manages a sensor network to detect the presence and location of users and their devices. A context manager is responsible to merge the different sources of contextual information, to solve potential contradictions, and to determine the level of authentication of the identity of the person approaching one of the services offered in the coffee-break corners of our Institute. In our solution for context-aware authentication, sensors are managed as if they were recommenders having subjective belief, disbelief, and uncertainty (i.e., trust) on the position and identity of users. A sensor’s subjective trust depends on what it has been sensing in the environment. We discuss the results of an array of simulations that we conducted to validate our concept of trust-based and context-aware authentication. We use Subjective Logic to manage trust.

  3. Forensic document analysis using scanning microscopy

    NASA Astrophysics Data System (ADS)

    Shaffer, Douglas K.

    2009-05-01

    The authentication and identification of the source of a printed document(s) can be important in forensic investigations involving a wide range of fraudulent materials, including counterfeit currency, travel and identity documents, business and personal checks, money orders, prescription labels, travelers checks, medical records, financial documents and threatening correspondence. The physical and chemical characterization of document materials - including paper, writing inks and printed media - is becoming increasingly relevant for law enforcement agencies, with the availability of a wide variety of sophisticated commercial printers and copiers which are capable of producing fraudulent documents of extremely high print quality, rendering these difficult to distinguish from genuine documents. This paper describes various applications and analytical methodologies using scanning electron miscoscopy/energy dispersive (x-ray) spectroscopy (SEM/EDS) and related technologies for the characterization of fraudulent documents, and illustrates how their morphological and chemical profiles can be compared to (1) authenticate and (2) link forensic documents with a common source(s) in their production history.

  4. 21 CFR 1311.116 - Additional requirements for biometrics.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... controlled substances. (f) The biometric subsystem must store device ID data at enrollment (i.e., biometric registration) with the biometric data and verify the device ID at the time of authentication to the electronic prescription application. (g) The biometric subsystem must protect the biometric data (raw data or templates...

  5. 21 CFR 1311.116 - Additional requirements for biometrics.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... controlled substances. (f) The biometric subsystem must store device ID data at enrollment (i.e., biometric registration) with the biometric data and verify the device ID at the time of authentication to the electronic prescription application. (g) The biometric subsystem must protect the biometric data (raw data or templates...

  6. Barriers to Securing Data on Bluetooth®-Enabled Mobile Devices: A Phenomenological Study

    ERIC Educational Resources Information Center

    Hines, Natasha

    2015-01-01

    Company data on mobile devices is vulnerable and subject to unauthorized access. The general problem is that information security incidents compromise the integrity and authenticity of electronic data. The specific problem is that organizational security policies, procedures, and training do not adequately address the vulnerabilities associated…

  7. Novel Authentication of Monitoring Data Through the use of Secret and Public Cryptographic Keys

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Benz, Jacob M.; Tolk, Keith; Tanner, Jennifer E.

    The Office of Nuclear Verification (ONV) is supporting the development of a piece of equipment to provide data authentication and protection for a suite of monitoring sensors as part of a larger effort to create an arms control technology toolkit. This device, currently called the Red Box, leverages the strengths of both secret and public cryptographic keys to authenticate, digitally sign, and pass along monitoring data to allow for host review, and redaction if necessary, without the loss of confidence in the authenticity of the data by the monitoring party. The design of the Red Box will allow for themore » addition and removal of monitoring equipment and can also verify that the data was collected by authentic monitoring equipment prior to signing the data and sending it to the host and for review. The host will then forward the data to the monitor for review and inspection. This paper will highlight the progress to date of the Red Box development, and will explain the novel method of leveraging both symmetric and asymmetric (secret and public key) cryptography to authenticate data within a warhead monitoring regime.« less

  8. A rhythm-based authentication scheme for smart media devices.

    PubMed

    Lee, Jae Dong; Jeong, Young-Sik; Park, Jong Hyuk

    2014-01-01

    In recent years, ubiquitous computing has been rapidly emerged in our lives and extensive studies have been conducted in a variety of areas related to smart devices, such as tablets, smartphones, smart TVs, smart refrigerators, and smart media devices, as a measure for realizing the ubiquitous computing. In particular, smartphones have significantly evolved from the traditional feature phones. Increasingly higher-end smartphone models that can perform a range of functions are now available. Smart devices have become widely popular since they provide high efficiency and great convenience for not only private daily activities but also business endeavors. Rapid advancements have been achieved in smart device technologies to improve the end users' convenience. Consequently, many people increasingly rely on smart devices to store their valuable and important data. With this increasing dependence, an important aspect that must be addressed is security issues. Leaking of private information or sensitive business data due to loss or theft of smart devices could result in exorbitant damage. To mitigate these security threats, basic embedded locking features are provided in smart devices. However, these locking features are vulnerable. In this paper, an original security-locking scheme using a rhythm-based locking system (RLS) is proposed to overcome the existing security problems of smart devices. RLS is a user-authenticated system that addresses vulnerability issues in the existing locking features and provides secure confidentiality in addition to convenience.

  9. A Rhythm-Based Authentication Scheme for Smart Media Devices

    PubMed Central

    Lee, Jae Dong; Park, Jong Hyuk

    2014-01-01

    In recent years, ubiquitous computing has been rapidly emerged in our lives and extensive studies have been conducted in a variety of areas related to smart devices, such as tablets, smartphones, smart TVs, smart refrigerators, and smart media devices, as a measure for realizing the ubiquitous computing. In particular, smartphones have significantly evolved from the traditional feature phones. Increasingly higher-end smartphone models that can perform a range of functions are now available. Smart devices have become widely popular since they provide high efficiency and great convenience for not only private daily activities but also business endeavors. Rapid advancements have been achieved in smart device technologies to improve the end users' convenience. Consequently, many people increasingly rely on smart devices to store their valuable and important data. With this increasing dependence, an important aspect that must be addressed is security issues. Leaking of private information or sensitive business data due to loss or theft of smart devices could result in exorbitant damage. To mitigate these security threats, basic embedded locking features are provided in smart devices. However, these locking features are vulnerable. In this paper, an original security-locking scheme using a rhythm-based locking system (RLS) is proposed to overcome the existing security problems of smart devices. RLS is a user-authenticated system that addresses vulnerability issues in the existing locking features and provides secure confidentiality in addition to convenience. PMID:25110743

  10. Optically secured information retrieval using two authenticated phase-only masks.

    PubMed

    Wang, Xiaogang; Chen, Wen; Mei, Shengtao; Chen, Xudong

    2015-10-23

    We propose an algorithm for jointly designing two phase-only masks (POMs) that allow for the encryption and noise-free retrieval of triple images. The images required for optical retrieval are first stored in quick-response (QR) codes for noise-free retrieval and flexible readout. Two sparse POMs are respectively calculated from two different images used as references for authentication based on modified Gerchberg-Saxton algorithm (GSA) and pixel extraction, and are then used as support constraints in a modified double-phase retrieval algorithm (MPRA), together with the above-mentioned QR codes. No visible information about the target images or the reference images can be obtained from each of these authenticated POMs. This approach allows users to authenticate the two POMs used for image reconstruction without visual observation of the reference images. It also allows user to friendly access and readout with mobile devices.

  11. Optically secured information retrieval using two authenticated phase-only masks

    PubMed Central

    Wang, Xiaogang; Chen, Wen; Mei, Shengtao; Chen, Xudong

    2015-01-01

    We propose an algorithm for jointly designing two phase-only masks (POMs) that allow for the encryption and noise-free retrieval of triple images. The images required for optical retrieval are first stored in quick-response (QR) codes for noise-free retrieval and flexible readout. Two sparse POMs are respectively calculated from two different images used as references for authentication based on modified Gerchberg-Saxton algorithm (GSA) and pixel extraction, and are then used as support constraints in a modified double-phase retrieval algorithm (MPRA), together with the above-mentioned QR codes. No visible information about the target images or the reference images can be obtained from each of these authenticated POMs. This approach allows users to authenticate the two POMs used for image reconstruction without visual observation of the reference images. It also allows user to friendly access and readout with mobile devices. PMID:26494213

  12. Optically secured information retrieval using two authenticated phase-only masks

    NASA Astrophysics Data System (ADS)

    Wang, Xiaogang; Chen, Wen; Mei, Shengtao; Chen, Xudong

    2015-10-01

    We propose an algorithm for jointly designing two phase-only masks (POMs) that allow for the encryption and noise-free retrieval of triple images. The images required for optical retrieval are first stored in quick-response (QR) codes for noise-free retrieval and flexible readout. Two sparse POMs are respectively calculated from two different images used as references for authentication based on modified Gerchberg-Saxton algorithm (GSA) and pixel extraction, and are then used as support constraints in a modified double-phase retrieval algorithm (MPRA), together with the above-mentioned QR codes. No visible information about the target images or the reference images can be obtained from each of these authenticated POMs. This approach allows users to authenticate the two POMs used for image reconstruction without visual observation of the reference images. It also allows user to friendly access and readout with mobile devices.

  13. An Efficient Remote Authentication Scheme for Wireless Body Area Network.

    PubMed

    Omala, Anyembe Andrew; Kibiwott, Kittur P; Li, Fagen

    2017-02-01

    Wireless body area network (WBAN) provide a mechanism of transmitting a persons physiological data to application providers e.g. hospital. Given the limited range of connectivity associated with WBAN, an intermediate portable device e.g. smartphone, placed within WBAN's connectivity, forwards the data to a remote server. This data, if not protected from an unauthorized access and modification may be lead to poor diagnosis. In order to ensure security and privacy between WBAN and a server at the application provider, several authentication schemes have been proposed. Recently, Wang and Zhang proposed an authentication scheme for WBAN using bilinear pairing. However, in their scheme, an application provider could easily impersonate a client. In order to overcome this weakness, we propose an efficient remote authentication scheme for WBAN. In terms of performance, our scheme can not only provide a malicious insider security, but also reduce running time of WBAN (client) by 51 % as compared to Wang and Zhang scheme.

  14. An Enhanced Secure Identity-Based Certificateless Public Key Authentication Scheme for Vehicular Sensor Networks

    PubMed Central

    Li, Congcong; Zhang, Xi; Wang, Haiping; Li, Dongfeng

    2018-01-01

    Vehicular sensor networks have been widely applied in intelligent traffic systems in recent years. Because of the specificity of vehicular sensor networks, they require an enhanced, secure and efficient authentication scheme. Existing authentication protocols are vulnerable to some problems, such as a high computational overhead with certificate distribution and revocation, strong reliance on tamper-proof devices, limited scalability when building many secure channels, and an inability to detect hardware tampering attacks. In this paper, an improved authentication scheme using certificateless public key cryptography is proposed to address these problems. A security analysis of our scheme shows that our protocol provides an enhanced secure anonymous authentication, which is resilient against major security threats. Furthermore, the proposed scheme reduces the incidence of node compromise and replication attacks. The scheme also provides a malicious-node detection and warning mechanism, which can quickly identify compromised static nodes and immediately alert the administrative department. With performance evaluations, the scheme can obtain better trade-offs between security and efficiency than the well-known available schemes. PMID:29324719

  15. Secure voice-based authentication for mobile devices: vaulted voice verification

    NASA Astrophysics Data System (ADS)

    Johnson, R. C.; Scheirer, Walter J.; Boult, Terrance E.

    2013-05-01

    As the use of biometrics becomes more wide-spread, the privacy concerns that stem from the use of biometrics are becoming more apparent. As the usage of mobile devices grows, so does the desire to implement biometric identification into such devices. A large majority of mobile devices being used are mobile phones. While work is being done to implement different types of biometrics into mobile phones, such as photo based biometrics, voice is a more natural choice. The idea of voice as a biometric identifier has been around a long time. One of the major concerns with using voice as an identifier is the instability of voice. We have developed a protocol that addresses those instabilities and preserves privacy. This paper describes a novel protocol that allows a user to authenticate using voice on a mobile/remote device without compromising their privacy. We first discuss the Vaulted Verification protocol, which has recently been introduced in research literature, and then describe its limitations. We then introduce a novel adaptation and extension of the Vaulted Verification protocol to voice, dubbed Vaulted Voice Verification (V3). Following that we show a performance evaluation and then conclude with a discussion of security and future work.

  16. Visualizing Solutions: Apps as Cognitive Stepping-Stones in the Learning Process

    ERIC Educational Resources Information Center

    Stevenson, Michael; Hedberg, John; Highfield, Kate; Diao, Mingming

    2015-01-01

    In many K-12 and higher education contexts, the use of smart mobile devices increasingly affords learning experiences that are situated, authentic and connected. While earlier reviews of mobile technology may have led to criticism of these devices as being largely for consumption, many current uses emphasize creativity and productivity, with…

  17. Going to the MALL: Mobile Assisted Language Learning

    ERIC Educational Resources Information Center

    Chinnery, George M.

    2006-01-01

    Practically since their availability, a succession of audiovisual recording devices (e.g., reel-to-reel, VCRs, PCs) has been used to capture language samples, and myriad playback and broadcast devices (e.g., phonographs, radios, televisions) have provided access to authentic speech samples. The espousal of audiolingual theory in the 1950s brought…

  18. Authentication of Radio Frequency Identification Devices Using Electronic Characteristics

    ERIC Educational Resources Information Center

    Chinnappa Gounder Periaswamy, Senthilkumar

    2010-01-01

    Radio frequency identification (RFID) tags are low-cost devices that are used to uniquely identify the objects to which they are attached. Due to the low cost and size that is driving the technology, a tag has limited computational capabilities and resources. This limitation makes the implementation of conventional security protocols to prevent…

  19. Using Quantum Confinement to Uniquely Identify Devices

    PubMed Central

    Roberts, J.; Bagci, I. E.; Zawawi, M. A. M.; Sexton, J.; Hulbert, N.; Noori, Y. J.; Young, M. P.; Woodhead, C. S.; Missous, M.; Migliorato, M. A.; Roedig, U.; Young, R. J.

    2015-01-01

    Modern technology unintentionally provides resources that enable the trust of everyday interactions to be undermined. Some authentication schemes address this issue using devices that give a unique output in response to a challenge. These signatures are generated by hard-to-predict physical responses derived from structural characteristics, which lend themselves to two different architectures, known as unique objects (UNOs) and physically unclonable functions (PUFs). The classical design of UNOs and PUFs limits their size and, in some cases, their security. Here we show that quantum confinement lends itself to the provision of unique identities at the nanoscale, by using fluctuations in tunnelling measurements through quantum wells in resonant tunnelling diodes (RTDs). This provides an uncomplicated measurement of identity without conventional resource limitations whilst providing robust security. The confined energy levels are highly sensitive to the specific nanostructure within each RTD, resulting in a distinct tunnelling spectrum for every device, as they contain a unique and unpredictable structure that is presently impossible to clone. This new class of authentication device operates with minimal resources in simple electronic structures above room temperature. PMID:26553435

  20. BossPro: a biometrics-based obfuscation scheme for software protection

    NASA Astrophysics Data System (ADS)

    Kuseler, Torben; Lami, Ihsan A.; Al-Assam, Hisham

    2013-05-01

    This paper proposes to integrate biometric-based key generation into an obfuscated interpretation algorithm to protect authentication application software from illegitimate use or reverse-engineering. This is especially necessary for mCommerce because application programmes on mobile devices, such as Smartphones and Tablet-PCs are typically open for misuse by hackers. Therefore, the scheme proposed in this paper ensures that a correct interpretation / execution of the obfuscated program code of the authentication application requires a valid biometric generated key of the actual person to be authenticated, in real-time. Without this key, the real semantics of the program cannot be understood by an attacker even if he/she gains access to this application code. Furthermore, the security provided by this scheme can be a vital aspect in protecting any application running on mobile devices that are increasingly used to perform business/financial or other security related applications, but are easily lost or stolen. The scheme starts by creating a personalised copy of any application based on the biometric key generated during an enrolment process with the authenticator as well as a nuance created at the time of communication between the client and the authenticator. The obfuscated code is then shipped to the client's mobile devise and integrated with real-time biometric extracted data of the client to form the unlocking key during execution. The novelty of this scheme is achieved by the close binding of this application program to the biometric key of the client, thus making this application unusable for others. Trials and experimental results on biometric key generation, based on client's faces, and an implemented scheme prototype, based on the Android emulator, prove the concept and novelty of this proposed scheme.

  1. Evaluating authentication options for mobile health applications in younger and older adults

    PubMed Central

    Khan, Hassan; Hengartner, Urs; Ong, Stephanie; Logan, Alexander G.; Vogel, Daniel; Gebotys, Robert; Yang, Jilan

    2018-01-01

    Objective Apps promoting patient self-management may improve health outcomes. However, methods to secure stored information on mobile devices may adversely affect usability. We tested the reliability and usability of common user authentication techniques in younger and older adults. Methodology Usability testing was conducted in two age groups, 18 to 30 years and 50 years and older. After completing a demographic questionnaire, each participant tested four authentication options in random order: four-digit personal identification number (PIN), graphical password (GRAPHICAL), Android pattern-lock (PATTERN), and a swipe-style Android fingerprint scanner (FINGERPRINT). Participants rated each option using the Systems Usability Scale (SUS). Results A total of 59 older and 43 younger participants completed the study. Overall, PATTERN was the fastest option (3.44s), and PIN had the fewest errors per attempt (0.02). Participants were able to login using PIN, PATTERN, and GRAPHICAL at least 98% of the time. FINGERPRINT was the slowest (26.97s), had an average of 1.46 errors per attempt, and had a successful login rate of 85%. Overall, PIN and PATTERN had higher SUS scores than FINGERPRINT and GRAPHICAL. Compared to younger participants, older participants were also less likely to find PATTERN to be tiring, annoying or time consuming and less likely to consider PIN to be time consuming. Younger participants were more likely to rate GRAPHICAL as annoying, time consuming and tiring than older participants. Conclusions On mobile devices, PIN and pattern-lock outperformed graphical passwords and swipe-style fingerprints. All participants took longer to authenticate using the swipe-style fingerprint compared to other options. Older participants also took two to three seconds longer to authenticate using the PIN, pattern and graphical passwords though this did not appear to affect perceived usability. PMID:29300736

  2. Evaluating authentication options for mobile health applications in younger and older adults.

    PubMed

    Grindrod, Kelly; Khan, Hassan; Hengartner, Urs; Ong, Stephanie; Logan, Alexander G; Vogel, Daniel; Gebotys, Robert; Yang, Jilan

    2018-01-01

    Apps promoting patient self-management may improve health outcomes. However, methods to secure stored information on mobile devices may adversely affect usability. We tested the reliability and usability of common user authentication techniques in younger and older adults. Usability testing was conducted in two age groups, 18 to 30 years and 50 years and older. After completing a demographic questionnaire, each participant tested four authentication options in random order: four-digit personal identification number (PIN), graphical password (GRAPHICAL), Android pattern-lock (PATTERN), and a swipe-style Android fingerprint scanner (FINGERPRINT). Participants rated each option using the Systems Usability Scale (SUS). A total of 59 older and 43 younger participants completed the study. Overall, PATTERN was the fastest option (3.44s), and PIN had the fewest errors per attempt (0.02). Participants were able to login using PIN, PATTERN, and GRAPHICAL at least 98% of the time. FINGERPRINT was the slowest (26.97s), had an average of 1.46 errors per attempt, and had a successful login rate of 85%. Overall, PIN and PATTERN had higher SUS scores than FINGERPRINT and GRAPHICAL. Compared to younger participants, older participants were also less likely to find PATTERN to be tiring, annoying or time consuming and less likely to consider PIN to be time consuming. Younger participants were more likely to rate GRAPHICAL as annoying, time consuming and tiring than older participants. On mobile devices, PIN and pattern-lock outperformed graphical passwords and swipe-style fingerprints. All participants took longer to authenticate using the swipe-style fingerprint compared to other options. Older participants also took two to three seconds longer to authenticate using the PIN, pattern and graphical passwords though this did not appear to affect perceived usability.

  3. Molecules for security measures: from keypad locks to advanced communication protocols.

    PubMed

    Andréasson, J; Pischel, U

    2018-04-03

    The idea of using molecules in the context of information security has sparked the interest of researchers from many scientific disciplines. This is clearly manifested in the diversity of the molecular platforms and the analytical techniques used for this purpose, some of which we highlight in this Tutorial Review. Moreover, those molecular systems can be used to emulate a broad spectrum of security measures. For a long time, molecular keypad locks enjoyed a clear preference and the review starts off with a description of how these devices developed. In the last few years, however, the field has evolved into something larger. Examples include more complex authentication protocols (multi-factor authentication and one-time passwords), the recognition of erroneous procedures in data transmission (parity devices), as well as steganographic and cryptographic protection.

  4. E-SAP: Efficient-Strong Authentication Protocol for Healthcare Applications Using Wireless Medical Sensor Networks

    PubMed Central

    Kumar, Pardeep; Lee, Sang-Gon; Lee, Hoon-Jae

    2012-01-01

    A wireless medical sensor network (WMSN) can sense humans’ physiological signs without sacrificing patient comfort and transmit patient vital signs to health professionals’ hand-held devices. The patient physiological data are highly sensitive and WMSNs are extremely vulnerable to many attacks. Therefore, it must be ensured that patients’ medical signs are not exposed to unauthorized users. Consequently, strong user authentication is the main concern for the success and large scale deployment of WMSNs. In this regard, this paper presents an efficient, strong authentication protocol, named E-SAP, for healthcare application using WMSNs. The proposed E-SAP includes: (1) a two-factor (i.e., password and smartcard) professional authentication; (2) mutual authentication between the professional and the medical sensor; (3) symmetric encryption/decryption for providing message confidentiality; (4) establishment of a secure session key at the end of authentication; and (5) professionals can change their password. Further, the proposed protocol requires three message exchanges between the professional, medical sensor node and gateway node, and achieves efficiency (i.e., low computation and communication cost). Through the formal analysis, security analysis and performance analysis, we demonstrate that E-SAP is more secure against many practical attacks, and allows a tradeoff between the security and the performance cost for healthcare application using WMSNs. PMID:22438729

  5. E-SAP: efficient-strong authentication protocol for healthcare applications using wireless medical sensor networks.

    PubMed

    Kumar, Pardeep; Lee, Sang-Gon; Lee, Hoon-Jae

    2012-01-01

    A wireless medical sensor network (WMSN) can sense humans' physiological signs without sacrificing patient comfort and transmit patient vital signs to health professionals' hand-held devices. The patient physiological data are highly sensitive and WMSNs are extremely vulnerable to many attacks. Therefore, it must be ensured that patients' medical signs are not exposed to unauthorized users. Consequently, strong user authentication is the main concern for the success and large scale deployment of WMSNs. In this regard, this paper presents an efficient, strong authentication protocol, named E-SAP, for healthcare application using WMSNs. The proposed E-SAP includes: (1) a two-factor (i.e., password and smartcard) professional authentication; (2) mutual authentication between the professional and the medical sensor; (3) symmetric encryption/decryption for providing message confidentiality; (4) establishment of a secure session key at the end of authentication; and (5) professionals can change their password. Further, the proposed protocol requires three message exchanges between the professional, medical sensor node and gateway node, and achieves efficiency (i.e., low computation and communication cost). Through the formal analysis, security analysis and performance analysis, we demonstrate that E-SAP is more secure against many practical attacks, and allows a tradeoff between the security and the performance cost for healthcare application using WMSNs.

  6. Evaluation of the automatic optical authentication technologies for control systems of objects

    NASA Astrophysics Data System (ADS)

    Averkin, Vladimir V.; Volegov, Peter L.; Podgornov, Vladimir A.

    2000-03-01

    The report considers the evaluation of the automatic optical authentication technologies for the automated integrated system of physical protection, control and accounting of nuclear materials at RFNC-VNIITF, and for providing of the nuclear materials nonproliferation regime. The report presents the nuclear object authentication objectives and strategies, the methodology of the automatic optical authentication and results of the development of pattern recognition techniques carried out under the ISTC project #772 with the purpose of identification of unique features of surface structure of a controlled object and effects of its random treatment. The current decision of following functional control tasks is described in the report: confirmation of the item authenticity (proof of the absence of its substitution by an item of similar shape), control over unforeseen change of item state, control over unauthorized access to the item. The most important distinctive feature of all techniques is not comprehensive description of some properties of controlled item, but unique identification of item using minimum necessary set of parameters, properly comprising identification attribute of the item. The main emphasis in the technical approach is made on the development of rather simple technological methods for the first time intended for use in the systems of physical protection, control and accounting of nuclear materials. The developed authentication devices and system are described.

  7. Glucoweb: a case study of secure, remote biomonitoring and communication.

    PubMed

    Nigrin, D J; Kohane, I S

    2000-01-01

    As the Internet begins to play a greater role in many healthcare processes, it is inevitable that remote monitoring of patients' physiological parameters over the Internet will become increasingly commonplace. Internet-based communication between patients and their healthcare providers has already become prevalent, and has gained significant attention in terms of confidentiality issues. However, transmission of data directly from patients' physiological biomonitoring devices over the Web has garnered significantly less focus, especially in the area of authentication and security. In this paper, we describe a prototype system called Glucoweb, which allows patients with diabetes mellitus to transmit their self-monitored blood glucose data directly from their personal glucometer device to their diabetes care provider over the Internet. No customized software is necessary on the patient's computer, only a Web browser and active Internet connection. We use this example to highlight key authentication and security measures that should be considered for devices that transmit healthcare data to remote locations.

  8. Four Cases of a Sociocultural Approach to Mobile Learning in "La Clase Mágica," an Afterschool Technology Club

    ERIC Educational Resources Information Center

    Prieto, Linda; Arreguín-Anderson, María G.; Yuen, Timothy T.; Ek, Lucila D.; Sánchez, Patricia; Machado-Casas, Margarita; García, Adriana

    2016-01-01

    This paper presents four projects in which mobile devices are used to support authentic learning in an afterschool technology club, "La Clase Mágica" (LCM@UTSA), designed to motivate underrepresented elementary school children in science, technology, engineering, and mathematics. The implementation of mobile devices into our LCM@UTSA is…

  9. Highly Sophisticated Virtual Laboratory Instruments in Education

    NASA Astrophysics Data System (ADS)

    Gaskins, T.

    2006-12-01

    Many areas of Science have advanced or stalled according to the ability to see what can not normally be seen. Visual understanding has been key to many of the world's greatest breakthroughs, such as discovery of DNAs double helix. Scientists use sophisticated instruments to see what the human eye can not. Light microscopes, scanning electron microscopes (SEM), spectrometers and atomic force microscopes are employed to examine and learn the details of the extremely minute. It's rare that students prior to university have access to such instruments, or are granted full ability to probe and magnify as desired. Virtual Lab, by providing highly authentic software instruments and comprehensive imagery of real specimens, provides them this opportunity. Virtual Lab's instruments let explorers operate virtual devices on a personal computer to examine real specimens. Exhaustive sets of images systematically and robotically photographed at thousands of positions and multiple magnifications and focal points allow students to zoom in and focus on the most minute detail of each specimen. Controls on each Virtual Lab device interactively and smoothly move the viewer through these images to display the specimen as the instrument saw it. Users control position, magnification, focal length, filters and other parameters. Energy dispersion spectrometry is combined with SEM imagery to enable exploration of chemical composition at minute scale and arbitrary location. Annotation capabilities allow scientists, teachers and students to indicate important features or areas. Virtual Lab is a joint project of NASA and the Beckman Institute at the University of Illinois at Urbana- Champaign. Four instruments currently compose the Virtual Lab suite: A scanning electron microscope and companion energy dispersion spectrometer, a high-power light microscope, and a scanning probe microscope that captures surface properties to the level of atoms. Descriptions of instrument operating principles and uses are also part of Virtual Lab. The Virtual Lab software and its increasingly rich collection of specimens are free to anyone. This presentation describes Virtual Lab and its uses in formal and informal education.

  10. A Lightweight Protocol for Secure Video Streaming.

    PubMed

    Venčkauskas, Algimantas; Morkevicius, Nerijus; Bagdonas, Kazimieras; Damaševičius, Robertas; Maskeliūnas, Rytis

    2018-05-14

    The Internet of Things (IoT) introduces many new challenges which cannot be solved using traditional cloud and host computing models. A new architecture known as fog computing is emerging to address these technological and security gaps. Traditional security paradigms focused on providing perimeter-based protections and client/server point to point protocols (e.g., Transport Layer Security (TLS)) are no longer the best choices for addressing new security challenges in fog computing end devices, where energy and computational resources are limited. In this paper, we present a lightweight secure streaming protocol for the fog computing "Fog Node-End Device" layer. This protocol is lightweight, connectionless, supports broadcast and multicast operations, and is able to provide data source authentication, data integrity, and confidentiality. The protocol is based on simple and energy efficient cryptographic methods, such as Hash Message Authentication Codes (HMAC) and symmetrical ciphers, and uses modified User Datagram Protocol (UDP) packets to embed authentication data into streaming data. Data redundancy could be added to improve reliability in lossy networks. The experimental results summarized in this paper confirm that the proposed method efficiently uses energy and computational resources and at the same time provides security properties on par with the Datagram TLS (DTLS) standard.

  11. Pashto Reader.

    ERIC Educational Resources Information Center

    Tegey, Habibullah; Robson, Barbara

    This reader is the basic text for a set of instructional materials in Pashto. It consists of 45 authentic passages in Pashto script, each accompanied by background information, a vocabulary list, hints for scanning, comprehension exercises, and notes for detailed rereading. An introductory section offers study suggestions for the student. The…

  12. Secured Hash Based Burst Header Authentication Design for Optical Burst Switched Networks

    NASA Astrophysics Data System (ADS)

    Balamurugan, A. M.; Sivasubramanian, A.; Parvathavarthini, B.

    2017-12-01

    The optical burst switching (OBS) is a promising technology that could meet the fast growing network demand. They are featured with the ability to meet the bandwidth requirement of applications that demand intensive bandwidth. OBS proves to be a satisfactory technology to tackle the huge bandwidth constraints, but suffers from security vulnerabilities. The objective of this proposed work is to design a faster and efficient burst header authentication algorithm for core nodes. There are two important key features in this work, viz., header encryption and authentication. Since the burst header is an important in optical burst switched network, it has to be encrypted; otherwise it is be prone to attack. The proposed MD5&RC4-4S based burst header authentication algorithm runs 20.75 ns faster than the conventional algorithms. The modification suggested in the proposed RC4-4S algorithm gives a better security and solves the correlation problems between the publicly known outputs during key generation phase. The modified MD5 recommended in this work provides 7.81 % better avalanche effect than the conventional algorithm. The device utilization result also shows the suitability of the proposed algorithm for header authentication in real time applications.

  13. Email authentication using symmetric and asymmetric key algorithm encryption

    NASA Astrophysics Data System (ADS)

    Halim, Mohamad Azhar Abdul; Wen, Chuah Chai; Rahmi, Isredza; Abdullah, Nurul Azma; Rahman, Nurul Hidayah Ab.

    2017-10-01

    Protection of sensitive or classified data from unauthorized access, hackers and other personals is virtue. Storage of data is done in devices such as USB, external hard disk, laptops, I-Pad or at cloud. Cloud computing presents with both ups and downs. However, storing information elsewhere increases risk of being attacked by hackers. Besides, the risk of losing the device or being stolen is increased in case of storage in portable devices. There are array of mediums of communications and even emails used to send data or information but these technologies come along with severe weaknesses such as absence of confidentiality where the message sent can be altered and sent to the recipient. No proofs are shown to the recipient that the message received is altered. The recipient would not find out unless he or she checks with the sender. Without encrypted of data or message, sniffing tools and software can be used to hack and read the information since it is in plaintext. Therefore, an electronic mail authentication is proposed, namely Hybrid Encryption System (HES). The security of HES is protected using asymmetric and symmetric key algorithms. The asymmetric algorithm is RSA and symmetric algorithm is Advance Encryption Standard. With the combination for both algorithms in the HES may provide the confidentiality and authenticity to the electronic documents send from the sender to the recipient. In a nutshell, the HES will help users to protect their valuable documentation and data from illegal third party user.

  14. Optical ID Tags for Secure Verification of Multispectral Visible and NIR Signatures

    NASA Astrophysics Data System (ADS)

    Pérez-Cabré, Elisabet; Millán, María S.; Javidi, Bahram

    2008-04-01

    We propose to combine information from visible (VIS) and near infrared (NIR) spectral bands to increase robustness on security systems and deter from unauthorized use of optical tags that permit the identification of a given person or object. The signature that identifies the element under surveillance will be only obtained by the appropriate combination of the visible content and the NIR data. The fully-phase encryption technique is applied to avoid an easy recognition of the resultant signature at the naked eye and an easy reproduction using conventional devices for imaging or scanning. The obtained complex-amplitude encrypted distribution is encoded on an identity (ID) tag. Spatial multiplexing of the encrypted signature allows us to build a distortion-invariant ID tag, so that remote authentication can be achieved even if the tag is captured under rotation or at different distances. We explore the possibility of using partial information of the encrypted distribution. Simulation results are provided and discussed.

  15. Continuous QKD and high speed data encryption

    NASA Astrophysics Data System (ADS)

    Zbinden, Hugo; Walenta, Nino; Guinnard, Olivier; Houlmann, Raphael; Wen, Charles Lim Ci; Korzh, Boris; Lunghi, Tommaso; Gisin, Nicolas; Burg, Andreas; Constantin, Jeremy; Legré, Matthieu; Trinkler, Patrick; Caselunghe, Dario; Kulesza, Natalia; Trolliet, Gregory; Vannel, Fabien; Junod, Pascal; Auberson, Olivier; Graf, Yoan; Curchod, Gilles; Habegger, Gilles; Messerli, Etienne; Portmann, Christopher; Henzen, Luca; Keller, Christoph; Pendl, Christian; Mühlberghuber, Michael; Roth, Christoph; Felber, Norbert; Gürkaynak, Frank; Schöni, Daniel; Muheim, Beat

    2013-10-01

    We present the results of a Swiss project dedicated to the development of high speed quantum key distribution and data encryption. The QKD engine features fully automated key exchange, hardware key distillation based on finite key security analysis, efficient authentication and wavelength division multiplexing of the quantum and the classical channel and one-time pas encryption. The encryption device allows authenticated symmetric key encryption (e.g AES) at rates of up to 100 Gb/s. A new quantum key can uploaded up to 1000 times second from the QKD engine.

  16. Secure Server Login by Using Third Party and Chaotic System

    NASA Astrophysics Data System (ADS)

    Abdulatif, Firas A.; zuhiar, Maan

    2018-05-01

    Server is popular among all companies and it used by most of them but due to the security threat on the server make this companies are concerned when using it so that in this paper we will design a secure system based on one time password and third parity authentication (smart phone). The proposed system make security to the login process of server by using one time password to authenticate person how have permission to login and third parity device (smart phone) as other level of security.

  17. 75 FR 32915 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-10

    ... used to authenticate authorized desktop and laptop computer users. Computer servers are scanned monthly... data is also used for management and statistical reports and studies. Routine uses of records... duties. The computer files are password protected with access restricted to authorized users. Records are...

  18. SegAuth: A Segment-based Approach to Behavioral Biometric Authentication

    PubMed Central

    Li, Yanyan; Xie, Mengjun; Bian, Jiang

    2016-01-01

    Many studies have been conducted to apply behavioral biometric authentication on/with mobile devices and they have shown promising results. However, the concern about the verification accuracy of behavioral biometrics is still common given the dynamic nature of behavioral biometrics. In this paper, we address the accuracy concern from a new perspective—behavior segments, that is, segments of a gesture instead of the whole gesture as the basic building block for behavioral biometric authentication. With this unique perspective, we propose a new behavioral biometric authentication method called SegAuth, which can be applied to various gesture or motion based authentication scenarios. SegAuth can achieve high accuracy by focusing on each user’s distinctive gesture segments that frequently appear across his or her gestures. In SegAuth, a time series derived from a gesture/motion is first partitioned into segments and then transformed into a set of string tokens in which the tokens representing distinctive, repetitive segments are associated with higher genuine probabilities than those tokens that are common across users. An overall genuine score calculated from all the tokens derived from a gesture is used to determine the user’s authenticity. We have assessed the effectiveness of SegAuth using 4 different datasets. Our experimental results demonstrate that SegAuth can achieve higher accuracy consistently than existing popular methods on the evaluation datasets. PMID:28573214

  19. SegAuth: A Segment-based Approach to Behavioral Biometric Authentication.

    PubMed

    Li, Yanyan; Xie, Mengjun; Bian, Jiang

    2016-10-01

    Many studies have been conducted to apply behavioral biometric authentication on/with mobile devices and they have shown promising results. However, the concern about the verification accuracy of behavioral biometrics is still common given the dynamic nature of behavioral biometrics. In this paper, we address the accuracy concern from a new perspective-behavior segments, that is, segments of a gesture instead of the whole gesture as the basic building block for behavioral biometric authentication. With this unique perspective, we propose a new behavioral biometric authentication method called SegAuth, which can be applied to various gesture or motion based authentication scenarios. SegAuth can achieve high accuracy by focusing on each user's distinctive gesture segments that frequently appear across his or her gestures. In SegAuth, a time series derived from a gesture/motion is first partitioned into segments and then transformed into a set of string tokens in which the tokens representing distinctive, repetitive segments are associated with higher genuine probabilities than those tokens that are common across users. An overall genuine score calculated from all the tokens derived from a gesture is used to determine the user's authenticity. We have assessed the effectiveness of SegAuth using 4 different datasets. Our experimental results demonstrate that SegAuth can achieve higher accuracy consistently than existing popular methods on the evaluation datasets.

  20. Optical nano artifact metrics using silicon random nanostructures

    NASA Astrophysics Data System (ADS)

    Matsumoto, Tsutomu; Yoshida, Naoki; Nishio, Shumpei; Hoga, Morihisa; Ohyagi, Yasuyuki; Tate, Naoya; Naruse, Makoto

    2016-08-01

    Nano-artifact metrics exploit unique physical attributes of nanostructured matter for authentication and clone resistance, which is vitally important in the age of Internet-of-Things where securing identities is critical. However, expensive and huge experimental apparatuses, such as scanning electron microscopy, have been required in the former studies. Herein, we demonstrate an optical approach to characterise the nanoscale-precision signatures of silicon random structures towards realising low-cost and high-value information security technology. Unique and versatile silicon nanostructures are generated via resist collapse phenomena, which contains dimensions that are well below the diffraction limit of light. We exploit the nanoscale precision ability of confocal laser microscopy in the height dimension; our experimental results demonstrate that the vertical precision of measurement is essential in satisfying the performances required for artifact metrics. Furthermore, by using state-of-the-art nanostructuring technology, we experimentally fabricate clones from the genuine devices. We demonstrate that the statistical properties of the genuine and clone devices are successfully exploited, showing that the liveness-detection-type approach, which is widely deployed in biometrics, is valid in artificially-constructed solid-state nanostructures. These findings pave the way for reasonable and yet sufficiently secure novel principles for information security based on silicon random nanostructures and optical technologies.

  1. Spinoff 2012

    NASA Technical Reports Server (NTRS)

    2013-01-01

    Topics covered include: Water Treatment Technologies Inspire Healthy Beverages; Dietary Formulas Fortify Antioxidant Supplements; Rovers Pave the Way for Hospital Robots; Dry Electrodes Facilitate Remote Health Monitoring; Telescope Innovations Improve Speed, Accuracy of Eye Surgery; Superconductors Enable Lower Cost MRI Systems; Anti-Icing Formulas Prevent Train Delays; Shuttle Repair Tools Automate Vehicle Maintenance; Pressure-Sensitive Paints Advance Rotorcraft Design Testing; Speech Recognition Interfaces Improve Flight Safety; Polymers Advance Heat Management Materials for Vehicles; Wireless Sensors Pinpoint Rotorcraft Troubles; Ultrasonic Detectors Safely Identify Dangerous, Costly Leaks; Detectors Ensure Function, Safety of Aircraft Wiring; Emergency Systems Save Tens of Thousands of Lives; Oxygen Assessments Ensure Safer Medical Devices; Collaborative Platforms Aid Emergency Decision Making; Space-Inspired Trailers Encourage Exploration on Earth; Ultra-Thin Coatings Beautify Art; Spacesuit Materials Add Comfort to Undergarments; Gigapixel Images Connect Sports Teams with Fans; Satellite Maps Deliver More Realistic Gaming; Elemental Scanning Devices Authenticate Works of Art; Microradiometers Reveal Ocean Health, Climate Change; Sensors Enable Plants to Text Message Farmers; Efficient Cells Cut the Cost of Solar Power; Shuttle Topography Data Inform Solar Power Analysis; Photocatalytic Solutions Create Self-Cleaning Surfaces; Concentrators Enhance Solar Power Systems; Innovative Coatings Potentially Lower Facility Maintenance Costs; Simulation Packages Expand Aircraft Design Options; Web Solutions Inspire Cloud Computing Software; Behavior Prediction Tools Strengthen Nanoelectronics; Power Converters Secure Electronics in Harsh Environments; Diagnostics Tools Identify Faults Prior to Failure; Archiving Innovations Preserve Essential Historical Records; Meter Designs Reduce Operation Costs for Industry; Commercial Platforms Allow Affordable Space Research; Fiber Optics Deliver Real-Time Structural Monitoring; Camera Systems Rapidly Scan Large Structures; Terahertz Lasers Reveal Information for 3D Images; Thin Films Protect Electronics from Heat and Radiation; Interferometers Sharpen Measurements for Better Telescopes; and Vision Systems Illuminate Industrial Processes.

  2. An efficient and secure certificateless authentication protocol for healthcare system on wireless medical sensor networks.

    PubMed

    Guo, Rui; Wen, Qiaoyan; Jin, Zhengping; Zhang, Hua

    2013-01-01

    Sensor networks have opened up new opportunities in healthcare systems, which can transmit patient's condition to health professional's hand-held devices in time. The patient's physiological signals are very sensitive and the networks are extremely vulnerable to many attacks. It must be ensured that patient's privacy is not exposed to unauthorized entities. Therefore, the control of access to healthcare systems has become a crucial challenge. An efficient and secure authentication protocol will thus be needed in wireless medical sensor networks. In this paper, we propose a certificateless authentication scheme without bilinear pairing while providing patient anonymity. Compared with other related protocols, the proposed scheme needs less computation and communication cost and preserves stronger security. Our performance evaluations show that this protocol is more practical for healthcare system in wireless medical sensor networks.

  3. An Efficient and Secure Certificateless Authentication Protocol for Healthcare System on Wireless Medical Sensor Networks

    PubMed Central

    Guo, Rui; Wen, Qiaoyan; Jin, Zhengping; Zhang, Hua

    2013-01-01

    Sensor networks have opened up new opportunities in healthcare systems, which can transmit patient's condition to health professional's hand-held devices in time. The patient's physiological signals are very sensitive and the networks are extremely vulnerable to many attacks. It must be ensured that patient's privacy is not exposed to unauthorized entities. Therefore, the control of access to healthcare systems has become a crucial challenge. An efficient and secure authentication protocol will thus be needed in wireless medical sensor networks. In this paper, we propose a certificateless authentication scheme without bilinear pairing while providing patient anonymity. Compared with other related protocols, the proposed scheme needs less computation and communication cost and preserves stronger security. Our performance evaluations show that this protocol is more practical for healthcare system in wireless medical sensor networks. PMID:23710147

  4. Eat-by-light fiber-optic and micro-optic devices for food quality and safety assessment

    NASA Astrophysics Data System (ADS)

    Mignani, A. G.; Ciaccheri, L.; Cucci, C.; Mencaglia, A. A.; Cimato, A.; Attilio, C.; Thienpont, H.; Ottevaere, H.; Paolesse, R.; Mastroianni, M.; Monti, D.; Buonocore, G.; Del Nobile, A.; Mentana, A.; Grimaldi, M. F.; Dall'Asta, C.; Faccini, A.; Galaverna, G.; Dossena, A.

    2007-06-01

    A selection is presented of fiber-optic and micro-optic devices that have been designed and tested for guaranteeing the quality and safety of typical foods, such as extra virgin olive oil, beer, and milk. Scattered colorimetry is used to authenticate various types of extra virgin olive oil and beer, while a fiber-optic-based device for UV-VIS-NIR absorption spectroscopy is exploited in order to obtain the hyperspectral optical signature of olive oil. This is done not only for authentication purposes, but also so as to correlate the spectral data with the content of fatty acids, which are important nutritional factors. A micro-optic sensor for the detection of olive oil aroma that is capable of distinguishing different ageing levels of extra virgin olive oil is also presented. It shows effective potential for acting as a smart cap of bottled olive oil in order to achieve a non-destructive olfactory perception of oil ageing. Lastly, a compact portable fluorometer for the rapid monitoring of the carcinogenic M1 aflatoxin in milk, is experimented.

  5. Eat-by-light: fiber-optic and micro-optic devices for food safety and quality assessment

    NASA Astrophysics Data System (ADS)

    Mignani, A. G.; Ciaccheri, L.; Cucci, C.; Mencaglia, A. A.; Cimato, A.; Attilio, C.; Thienpont, H.; Ottevaere, H.; Paolesse, R.; Mastroianni, M.; Monti, D.; Buonocore, G.; Del Nobile, A.; Mentana, A.; Dall'Asta, C.; Faccini, A.; Galaverna, G.; Dossena, A.

    2007-07-01

    A selection of fiber-optic and micro-optic devices is presented designed and tested for monitoring the quality and safety of typical foods, namely the extra virgin olive oil, the beer, and the milk. Scattered colorimetry is used for the authentication of various types of extra virgin olive oil and beer, while a fiber-optic-based device for UV-VIS-NIR absorption spectroscopy is exploited in order to obtain the hyperspectral optical signature of olive oil. This is done not only for authentication purposes, but also so as to correlate the spectral data with the content of fatty acids that are important nutritional factors. A micro-optic sensor for the detection of olive oil aroma is presented. It is capable of distinguishing different ageing levels of extra virgin olive oil. It shows effective potential for acting as a smart cap of bottled olive oil in order to achieve a non-destructive olfactory perception of oil ageing. Lastly, a compact portable fluorometer is experimented for the rapid monitoring of the carcinogenic M1 aflatoxin in milk.

  6. A Rich Client-Server Based Framework for Convenient Security and Management of Mobile Applications

    NASA Astrophysics Data System (ADS)

    Badan, Stephen; Probst, Julien; Jaton, Markus; Vionnet, Damien; Wagen, Jean-Frédéric; Litzistorf, Gérald

    Contact lists, Emails, SMS or custom applications on a professional smartphone could hold very confidential or sensitive information. What could happen in case of theft or accidental loss of such devices? Such events could be detected by the separation between the smartphone and a Bluetooth companion device. This event should typically block the applications and delete personal and sensitive data. Here, a solution is proposed based on a secured framework application running on the mobile phone as a rich client connected to a security server. The framework offers strong and customizable authentication and secured connectivity. A security server manages all security issues. User applications are then loaded via the framework. User data can be secured, synchronized, pushed or pulled via the framework. This contribution proposes a convenient although secured environment based on a client-server architecture using external authentications. Several features of the proposed system are exposed and a practical demonstrator is described.

  7. Comprehensive authentication of (E)-alpha(beta)-ionone from raspberries, using constant flow MDGC-C/P-IRMS and enantio-MDGC-MS.

    PubMed

    Sewenig, Sabine; Bullinger, Dino; Hener, Uwe; Mosandl, Armin

    2005-02-23

    A new coupling system of GC-GC, connected via a Multi Column Switching Device MCS2 for measuring isotope ratios, is introduced. By means of several standard substances the precise and accurate measurement of isotopic values is proved. First applications concerning the authentication of raspberry aroma compounds are established. Consequently, the combination of constant flow multidimensional gas chromatography-combustion/pyrolysis-isotope ratio mass spectrometry (MDGC-C/P-IRMS) is applied to the authenticity assessment of (E)-alpha(beta)-ionone from six different raspberry cultivars. Furthermore, 12 commercially available raspberry products and samples of (E)-alpha(beta)-ionone, some declared to be natural, are investigated. delta(2)Eta(V)(-)(SMOW) and delta(13)C(V)(-)(PDB) values of (E)-alpha(beta)-ionone are determined, and characteristic authenticity ranges were concluded from raspberries by correlation of both delta(2)Eta(V)(-)(SMOW) and delta(13)C( V)(-)(PDB) values. The results are correlated with the determination of enantiomeric purities of (E)-alpha-ionone, using stir bar sorptive extraction enantio-multidimensional gas chromatography mass spectrometry (SBSE-enantio-MDGC-MS).

  8. Next Generation Trusted Radiation Identification System (NG-TRIS).

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Flynn, Adam J.; Amai, Wendy A.; Merkle, Peter Benedict

    2010-05-01

    The original Trusted Radiation Identification System (TRIS) was developed from 1999-2001, featuring information barrier technology to collect gamma radiation template measurements useful for arms control regime operations. The first TRIS design relied upon a multichannel analyzer (MCA) that was external to the protected volume of the system enclosure, undesirable from a system security perspective. An internal complex programmable logic device (CPLD) contained data which was not subject to software authentication. Physical authentication of the TRIS instrument case was performed by a sensitive but slow eddy-current inspection method. This paper describes progress to date for the Next Generation TRIS (NG-TRIS), whichmore » improves the TRIS design. We have incorporated the MCA internal to the trusted system volume, achieved full authentication of CPLD data, and have devised rapid methods to authenticate the system enclosure and weld seals of the NG-TRIS enclosure. For a complete discussion of the TRIS system and components upon which NG-TRIS is based, the reader is directed to the comprehensive user's manual and system reference of Seager, et al.« less

  9. Elliptic Curve Cryptography-Based Authentication with Identity Protection for Smart Grids

    PubMed Central

    Zhang, Liping; Tang, Shanyu; Luo, He

    2016-01-01

    In a smart grid, the power service provider enables the expected power generation amount to be measured according to current power consumption, thus stabilizing the power system. However, the data transmitted over smart grids are not protected, and then suffer from several types of security threats and attacks. Thus, a robust and efficient authentication protocol should be provided to strength the security of smart grid networks. As the Supervisory Control and Data Acquisition system provides the security protection between the control center and substations in most smart grid environments, we focus on how to secure the communications between the substations and smart appliances. Existing security approaches fail to address the performance-security balance. In this study, we suggest a mitigation authentication protocol based on Elliptic Curve Cryptography with privacy protection by using a tamper-resistant device at the smart appliance side to achieve a delicate balance between performance and security of smart grids. The proposed protocol provides some attractive features such as identity protection, mutual authentication and key agreement. Finally, we demonstrate the completeness of the proposed protocol using the Gong-Needham- Yahalom logic. PMID:27007951

  10. Elliptic Curve Cryptography-Based Authentication with Identity Protection for Smart Grids.

    PubMed

    Zhang, Liping; Tang, Shanyu; Luo, He

    2016-01-01

    In a smart grid, the power service provider enables the expected power generation amount to be measured according to current power consumption, thus stabilizing the power system. However, the data transmitted over smart grids are not protected, and then suffer from several types of security threats and attacks. Thus, a robust and efficient authentication protocol should be provided to strength the security of smart grid networks. As the Supervisory Control and Data Acquisition system provides the security protection between the control center and substations in most smart grid environments, we focus on how to secure the communications between the substations and smart appliances. Existing security approaches fail to address the performance-security balance. In this study, we suggest a mitigation authentication protocol based on Elliptic Curve Cryptography with privacy protection by using a tamper-resistant device at the smart appliance side to achieve a delicate balance between performance and security of smart grids. The proposed protocol provides some attractive features such as identity protection, mutual authentication and key agreement. Finally, we demonstrate the completeness of the proposed protocol using the Gong-Needham-Yahalom logic.

  11. Enhancing the authenticity of assessments through grounding in first impressions.

    PubMed

    Humă, Bogdana

    2015-09-01

    This article examines first impressions through a discursive and interactional lens. Until now, social psychologists have studied first impressions in laboratory conditions, in isolation from their natural environment, thus overseeing their discursive roles as devices for managing situated interactional concerns. I examine fragments of text and talk in which individuals spontaneously invoke first impressions of other persons as part of assessment activities in settings where the authenticity of speakers' stances might be threatened: (1) in activities with inbuilt evaluative components and (2) in sequential contexts where recipients have been withholding affiliation to speakers' actions. I discuss the relationship between authenticity, as a type of credibility issue related to intersubjective trouble, and the characteristics of first impression assessments, which render them useful for dealing with this specific credibility concern. I identify four features of first impression assessments which make them effective in enhancing authenticity: witness positioning (Potter, 1996, Representing reality: Discourse, rhetoric and social construction, Sage, London), (dis)location in time and space, automaticity, and extreme formulations (Edwards, 2003, Analyzing race talk: Multidisciplinary perspectives on the research interview, Cambridge University Press, New York). © 2014 The British Psychological Society.

  12. CyPhyTown

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    A series of software programs that enables students to progress from completely unsecured control of devices to control that protects network commands with authentication, integrity and confidentiality. The working example provided is for turning LED lights on and off on a Raspberry Pi computer.

  13. New Results on Unconditionally Secure Multi-receiver Manual Authentication

    NASA Astrophysics Data System (ADS)

    Wang, Shuhong; Safavi-Naini, Reihaneh

    Manual authentication is a recently proposed model of communication motivated by the settings where the only trusted infrastructure is a low bandwidth authenticated channel, possibly realized by the aid of a human, that connects the sender and the receiver who are otherwise connected through an insecure channel and do not have any shared key or public key infrastructure. A good example of such scenarios is pairing of devices in Bluetooth. Manual authentication systems are studied in computational and information theoretic security model and protocols with provable security have been proposed. In this paper we extend the results in information theoretic model in two directions. Firstly, we extend a single receiver scenario to multireceiver case where the sender wants to authenticate the same message to a group of receivers. We show new attacks (compared to single receiver case) that can launched in this model and demonstrate that the single receiver lower bound 2log(1/ɛ) + O(1) on the bandwidth of manual channel stays valid in the multireceiver scenario. We further propose a protocol that achieves this bound and provides security, in the sense that we define, if up to c receivers are corrupted. The second direction is the study of non-interactive protocols in unconditionally secure model. We prove that unlike computational security framework, without interaction a secure authentication protocol requires the bandwidth of the manual channel to be at least the same as the message size, hence non-trivial protocols do not exist.

  14. WLC Preface

    NASA Astrophysics Data System (ADS)

    Miret, Josep M.; Sebé, Francesc

    Low-cost devices are the key component of several applications: RFID tags permit an automated supply chain management while smart cards are a secure means of storing cryptographic keys required for remote and secure authentication in e-commerce and e-government applications. These devices must be cheap in order to permit their cost-effective massive manufacturing and deployment. Unfortunately, their low cost limits their computational power. Other devices such as nodes of sensor networks suffer from an additional constraint, namely, their limited battery life. Secure applications designed for these devices cannot make use of classical cryptographic primitives designed for full-fledged computers.

  15. 21 CFR 892.1350 - Nuclear scanning bed.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 21 Food and Drugs 8 2013-04-01 2013-04-01 false Nuclear scanning bed. 892.1350 Section 892.1350...) MEDICAL DEVICES RADIOLOGY DEVICES Diagnostic Devices § 892.1350 Nuclear scanning bed. (a) Identification. A nuclear scanning bed is an adjustable bed intended to support a patient during a nuclear medicine...

  16. 21 CFR 892.1350 - Nuclear scanning bed.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 21 Food and Drugs 8 2010-04-01 2010-04-01 false Nuclear scanning bed. 892.1350 Section 892.1350...) MEDICAL DEVICES RADIOLOGY DEVICES Diagnostic Devices § 892.1350 Nuclear scanning bed. (a) Identification. A nuclear scanning bed is an adjustable bed intended to support a patient during a nuclear medicine...

  17. 21 CFR 892.1350 - Nuclear scanning bed.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 21 Food and Drugs 8 2011-04-01 2011-04-01 false Nuclear scanning bed. 892.1350 Section 892.1350...) MEDICAL DEVICES RADIOLOGY DEVICES Diagnostic Devices § 892.1350 Nuclear scanning bed. (a) Identification. A nuclear scanning bed is an adjustable bed intended to support a patient during a nuclear medicine...

  18. 21 CFR 892.1350 - Nuclear scanning bed.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 21 Food and Drugs 8 2012-04-01 2012-04-01 false Nuclear scanning bed. 892.1350 Section 892.1350...) MEDICAL DEVICES RADIOLOGY DEVICES Diagnostic Devices § 892.1350 Nuclear scanning bed. (a) Identification. A nuclear scanning bed is an adjustable bed intended to support a patient during a nuclear medicine...

  19. 21 CFR 892.1350 - Nuclear scanning bed.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 21 Food and Drugs 8 2014-04-01 2014-04-01 false Nuclear scanning bed. 892.1350 Section 892.1350...) MEDICAL DEVICES RADIOLOGY DEVICES Diagnostic Devices § 892.1350 Nuclear scanning bed. (a) Identification. A nuclear scanning bed is an adjustable bed intended to support a patient during a nuclear medicine...

  20. 32 CFR 161.7 - ID card life-cycle procedures.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... provide two fingerprint biometric scans and a facial image, to assist with authenticating the applicant's... manner: (i) A digitized, full-face passport-type photograph will be captured for the facial image and stored in DEERS and shall have a plain white or off-white background. No flags, posters, or other images...

  1. Characterization of paired helical filaments by scanning transmission electron microscopy.

    PubMed

    Ksiezak-Reding, Hanna; Wall, Joseph S

    2005-07-01

    Paired helical filaments (PHFs) are abnormal twisted filaments composed of hyperphosphorylated tau protein. They are found in Alzheimer's disease and other neurodegenerative disorders designated as tauopathies. They are a major component of intracellular inclusions known as neurofibrillary tangles (NFTs). The objective of this review is to summarize various structural studies of PHFs in which using scanning transmission electron microscopy (STEM) has been particularly informative. STEM provides shape and mass per unit length measurements important for studying ultrastructural aspects of filaments. These include quantitative comparisons between dispersed and aggregated populations of PHFs as well as comparative studies of PHFs in Alzheimer's disease and other neurodegenerative disorders. Other approaches are also discussed if relevant or complementary to studies using STEM, e.g., application of a novel staining reagent, Nanovan. Our understanding of the PHF structure and the development of PHFs into NFTs is presented from a historical perspective. Others goals are to describe the biochemical and ultrastructural complexity of authentic PHFs, to assess similarities between authentic and synthetic PHFs, and to discuss recent advances in PHF modeling.

  2. Lightweight Privacy-Preserving Authentication Protocols Secure against Active Attack in an Asymmetric Way

    NASA Astrophysics Data System (ADS)

    Cui, Yank; Kobara, Kazukuni; Matsuura, Kanta; Imai, Hideki

    As pervasive computing technologies develop fast, the privacy protection becomes a crucial issue and needs to be coped with very carefully. Typically, it is difficult to efficiently identify and manage plenty of the low-cost pervasive devices like Radio Frequency Identification Devices (RFID), without leaking any privacy information. In particular, the attacker may not only eavesdrop the communication in a passive way, but also mount an active attack to ask queries adaptively, which is obviously more dangerous. Towards settling this problem, in this paper, we propose two lightweight authentication protocols which are privacy-preserving against active attack, in an asymmetric way. That asymmetric style with privacy-oriented simplification succeeds to reduce the load of low-cost devices and drastically decrease the computation cost for the management of server. This is because that, unlike the usual management of the identities, our approach does not require any synchronization nor exhaustive search in the database, which enjoys great convenience in case of a large-scale system. The protocols are based on a fast asymmetric encryption with specialized simplification and only one cryptographic hash function, which consequently assigns an easy work to pervasive devices. Besides, our results do not require the strong assumption of the random oracle.

  3. Self-organized Anonymous Authentication in Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Freudiger, Julien; Raya, Maxim; Hubaux, Jean-Pierre

    Pervasive communications bring along new privacy challenges, fueled by the capability of mobile devices to communicate with, and thus “sniff on”, each other directly. We design a new mechanism that aims at achieving location privacy in these forthcoming mobile networks, whereby mobile nodes collect the pseudonyms of the nodes they encounter to generate their own privacy cloaks. Thus, privacy emerges from the mobile network and users gain control over the disclosure of their locations. We call this new paradigm self-organized location privacy. In this work, we focus on the problem of self-organized anonymous authentication that is a necessary prerequisite for location privacy. We investigate, using graph theory, the optimality of different cloak constructions and evaluate with simulations the achievable anonymity in various network topologies. We show that peer-to-peer wireless communications and mobility help in the establishment of self-organized anonymous authentication in mobile networks.

  4. A Standard Mutual Authentication Protocol for Cloud Computing Based Health Care System.

    PubMed

    Mohit, Prerna; Amin, Ruhul; Karati, Arijit; Biswas, G P; Khan, Muhammad Khurram

    2017-04-01

    Telecare Medical Information System (TMIS) supports a standard platform to the patient for getting necessary medical treatment from the doctor(s) via Internet communication. Security protection is important for medical records (data) of the patients because of very sensitive information. Besides, patient anonymity is another most important property, which must be protected. Most recently, Chiou et al. suggested an authentication protocol for TMIS by utilizing the concept of cloud environment. They claimed that their protocol is patient anonymous and well security protected. We reviewed their protocol and found that it is completely insecure against patient anonymity. Further, the same protocol is not protected against mobile device stolen attack. In order to improve security level and complexity, we design a light weight authentication protocol for the same environment. Our security analysis ensures resilience of all possible security attacks. The performance of our protocol is relatively standard in comparison with the related previous research.

  5. Authentication Based on Non-Interactive Zero-Knowledge Proofs for the Internet of Things.

    PubMed

    Martín-Fernández, Francisco; Caballero-Gil, Pino; Caballero-Gil, Cándido

    2016-01-07

    This paper describes the design and analysis of a new scheme for the authenticated exchange of confidential information in insecure environments within the Internet of Things, which allows a receiver of a message to authenticate the sender and compute a secret key shared with it. The proposal is based on the concept of a non-interactive zero-knowledge proof, so that in a single communication, relevant data may be inferred to verify the legitimacy of the sender. Besides, the new scheme uses the idea under the Diffie-Hellman protocol for the establishment of a shared secret key. The proposal has been fully developed for platforms built on the Android Open Source Project, so it can be used in any device or sensor with this operating system. This work provides a performance study of the implementation and a comparison between its promising results and others obtained with similar schemes.

  6. Authentication Based on Non-Interactive Zero-Knowledge Proofs for the Internet of Things

    PubMed Central

    Martín-Fernández, Francisco; Caballero-Gil, Pino; Caballero-Gil, Cándido

    2016-01-01

    This paper describes the design and analysis of a new scheme for the authenticated exchange of confidential information in insecure environments within the Internet of Things, which allows a receiver of a message to authenticate the sender and compute a secret key shared with it. The proposal is based on the concept of a non-interactive zero-knowledge proof, so that in a single communication, relevant data may be inferred to verify the legitimacy of the sender. Besides, the new scheme uses the idea under the Diffie–Hellman protocol for the establishment of a shared secret key. The proposal has been fully developed for platforms built on the Android Open Source Project, so it can be used in any device or sensor with this operating system. This work provides a performance study of the implementation and a comparison between its promising results and others obtained with similar schemes. PMID:26751454

  7. A Trusted Portable Computing Device

    NASA Astrophysics Data System (ADS)

    Ming-wei, Fang; Jun-jun, Wu; Peng-fei, Yu; Xin-fang, Zhang

    A trusted portable computing device and its security mechanism were presented to solve the security issues, such as the attack of virus and Trojan horse, the lost and stolen of storage device, in mobile office. It used smart card to build a trusted portable security base, virtualization to create a secure virtual execution environment, two-factor authentication mechanism to identify legitimate users, and dynamic encryption to protect data privacy. The security environment described in this paper is characteristic of portability, security and reliability. It can meet the security requirement of mobile office.

  8. Biochip scanner device

    DOEpatents

    Perov, Alexander; Belgovskiy, Alexander I.; Mirzabekov, Andrei D.

    2001-01-01

    A biochip scanner device used to detect and acquire fluorescence signal data from biological microchips or biochips and method of use are provided. The biochip scanner device includes a laser for emitting a laser beam. A modulator, such as an optical chopper modulates the laser beam. A scanning head receives the modulated laser beam and a scanning mechanics coupled to the scanning head moves the scanning head relative to the biochip. An optical fiber delivers the modulated laser beam to the scanning head. The scanning head collects the fluorescence light from the biochip, launches it into the same optical fiber, which delivers the fluorescence into a photodetector, such as a photodiode. The biochip scanner device is used in a row scanning method to scan selected rows of the biochip with the laser beam size matching the size of the immobilization site.

  9. Secure access to patient's health records using SpeechXRays a mutli-channel biometrics platform for user authentication.

    PubMed

    Spanakis, Emmanouil G; Spanakis, Marios; Karantanas, Apostolos; Marias, Kostas

    2016-08-01

    The most commonly used method for user authentication in ICT services or systems is the application of identification tools such as passwords or personal identification numbers (PINs). The rapid development in ICT technology regarding smart devices (laptops, tablets and smartphones) has allowed also the advance of hardware components that capture several biometric traits such as fingerprints and voice. These components are aiming among others to overcome weaknesses and flaws of password usage under the prism of improved user authentication with higher level of security, privacy and usability. To this respect, the potential application of biometrics for secure user authentication regarding access in systems with sensitive data (i.e. patient's data from electronic health records) shows great potentials. SpeechXRays aims to provide a user recognition platform based on biometrics of voice acoustics analysis and audio-visual identity verification. Among others, the platform aims to be applied as an authentication tool for medical personnel in order to gain specific access to patient's electronic health records. In this work a short description of SpeechXrays implementation tool regarding eHealth is provided and analyzed. This study explores security and privacy issues, and offers a comprehensive overview of biometrics technology applications in addressing the e-Health security challenges. We present and describe the necessary requirement for an eHealth platform concerning biometric security.

  10. Assessing and Managing Quality of Information Assurance

    DTIC Science & Technology

    2010-11-01

    such as firewalls, antivirus scanning tools and mechanisms for user authentication and authorization. Advanced mission-critical systems often...imply increased risk to DoD information systems. The Process and Organizational Maturity (POM) class focuses on the maturity of the software and...include architectural quality. Common Weakness Enumeration (CWE) is a recent example that highlights the connection between software quality and

  11. Results of a laboratory experiment that tests rotating unbalanced-mass devices for scanning gimbaled payloads and free-flying spacecraft

    NASA Technical Reports Server (NTRS)

    Alhorn, D. C.; Polites, M. E.

    1994-01-01

    Rotating unbalanced-mass (RUM) devices are a new way to scan space-based, balloon-borne, and ground-based gimbaled payloads, like x-ray and gamma-ray telescopes. They can also be used to scan free-flying spacecraft. Circular scans, linear scans, and raster scans can be generated. A pair of RUM devices generates the basic scan motion and an auxiliary control system using torque motors, control moment gyros, or reaction wheels keeps the scan centered on the target and produces some complementary motion for raster scanning. Previous analyses and simulation results show that this approach offers significant power savings compared to scanning only with the auxiliary control system, especially with large payloads and high scan frequencies. However, these claims have never been proven until now. This paper describes a laboratory experiment which tests the concept of scanning a gimbaled payload with RUM devices. A description of the experiment is given and test results that prove the concept are presented. The test results are compared with those from a computer simulation model of the experiment and the differences are discussed.

  12. 75 FR 34482 - Certain Biometric Scanning Devices, Components Thereof, Associated Software, and Products...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-17

    ..., Components Thereof, Associated Software, and Products Containing the Same; Notice of Investigation AGENCY: U... scanning devices, components thereof, associated software, and products containing the same by reason of... after importation of certain biometric scanning devices, components thereof, associated software, or...

  13. Mobile Device Management

    DTIC Science & Technology

    2012-01-01

    password policies (or smart card authentication), disabling compo- nents of the operating system that were deemed unsafe, allowing users to only install...written nearly 100 applications for the iOS and Android platforms with over 1,500,000 downloads on iTunes and Google Play. CPT Braunstein is a

  14. Is This Real Life? Is This Just Fantasy?: Realism and Representations in Learning with Technology

    NASA Astrophysics Data System (ADS)

    Sauter, Megan Patrice

    Students often engage in hands-on activities during science learning; however, financial and practical constraints often limit the availability of these activities. Recent advances in technology have led to increases in the use of simulations and remote labs, which attempt to recreate hands-on science learning via computer. Remote labs and simulations are interesting from a cognitive perspective because they allow for different relations between representations and their referents. Remote labs are unique in that they provide a yoked representation, meaning that the representation of the lab on the computer screen is actually linked to that which it represents: a real scientific device. Simulations merely represent the lab and are not connected to any real scientific devices. However, the type of visual representations used in the lab may modify the effects of the lab technology. The purpose of this dissertation is to examine the relation between representation and technology and its effects of students' psychological experiences using online science labs. Undergraduates participated in two studies that investigated the relation between technology and representation. In the first study, participants performed either a remote lab or a simulation incorporating one of two visual representations, either a static image or a video of the equipment. Although participants in both lab conditions learned, participants in the remote lab condition had more authentic experiences. However, effects were moderated by the realism of the visual representation. Participants who saw a video were more invested and felt the experience was more authentic. In a second study, participants performed a remote lab and either saw the same video as in the first study, an animation, or the video and an animation. Most participants had an authentic experience because both representations evoked strong feelings of presence. However, participants who saw the video were more likely to believe the remote technology was real. Overall, the findings suggest that participants' experiences with technology were shaped by representation. Students had more authentic experiences using the remote lab than the simulation. However, incorporating visual representations that enhance presence made these experiences even more authentic and meaningful than afforded by the technology alone.

  15. Depth profiling of inks in authentic and counterfeit banknotes by electrospray laser desorption ionization/mass spectrometry.

    PubMed

    Kao, Yi-Ying; Cheng, Sy-Chyi; Cheng, Chu-Nian; Shiea, Jentaie

    2016-01-01

    Electrospray laser desorption ionization is an ambient ionization technique that generates neutrals via laser desorption and ionizes those neutrals in an electrospray plume and was utilized to characterize inks in different layers of copy paper and banknotes of various currencies. Depth profiling of inks was performed on overlapping color bands on copy paper by repeatedly scanning the line with a pulsed laser beam operated at a fixed energy. The molecules in the ink on a banknote were desorbed by irradiating the banknote surface with a laser beam operated at different energies, with results indicating that different ions were detected at different depths. The analysis of authentic $US100, $100 RMB and $1000 NTD banknotes indicated that ions detected in 'color-shifting' and 'typography' regions were significantly different. Additionally, the abundances of some ions dramatically changed with the depth of the aforementioned regions. This approach was used to distinguish authentic $1000 NTD banknotes from counterfeits. Copyright © 2015 John Wiley & Sons, Ltd. Copyright © 2015 John Wiley & Sons, Ltd.

  16. Detecting adulterants in milk powder using high-throughput Raman chemical imaging

    USDA-ARS?s Scientific Manuscript database

    This study used a line-scan high-throughput Raman imaging system to authenticate milk powder. A 5 W 785 nm line laser (240 mm long and 1 mm wide) was used as a Raman excitation source. The system was used to acquire hyperspectral Raman images in a wavenumber range of 103–2881 cm-1 from the skim milk...

  17. Detection and quantification of adulterants in milk powder using high-throughput Raman chemical imaging technique

    USDA-ARS?s Scientific Manuscript database

    Milk is a vulnerable target for economically motivated adulteration. In this study, a line-scan high-throughput Raman imaging system was used to authenticate milk powder. A 5 W 785 nm line laser (240 mm long and 1 mm wide) was used as a Raman excitation source. The system was used to acquire hypersp...

  18. Toward a more materialistic medicine: the value of authentic materialism within current and future medical practice.

    PubMed

    Leder, Drew; Krucoff, Mitchell W

    2011-09-01

    Modern medicine is often accused by diverse critics of being "too materialistic" and therefore insufficiently holistic and effective. Yet, this critique can be misleading, dependent upon the ambiguous meanings of "materialism." The term can refer to the prevalence of financial concerns in driving medical practice. Alternatively, it can refer to "mechanistic materialism," the patient viewed as a body-machine. In each case, this article shows that this represents not authentic "materialism" at play, but a focus upon high-level abstractions. "Bottom-line" financial or diagnostic numbers can distract practitioners from the embodied needs of sick patients. In this sense, medical practice is not materialist enough. Through a series of clinical examples, this article explores how an authentic materialism would look in current and future practice. The article examines the use of prayer/comfort shawls at the bedside; hospitals and nursing homes redesigned as enriched healing environments; and a paradigmatic medical device--the implantable cardioverter defibrillator--as it might be presented to patients, in contrast to current practice.

  19. dLocAuth: a dynamic multifactor authentication scheme for mCommerce applications using independent location-based obfuscation

    NASA Astrophysics Data System (ADS)

    Kuseler, Torben; Lami, Ihsan A.

    2012-06-01

    This paper proposes a new technique to obfuscate an authentication-challenge program (named LocProg) using randomly generated data together with a client's current location in real-time. LocProg can be used to enable any handsetapplication on mobile-devices (e.g. mCommerce on Smartphones) that requires authentication with a remote authenticator (e.g. bank). The motivation of this novel technique is to a) enhance the security against replay attacks, which is currently based on using real-time nonce(s), and b) add a new security factor, which is location verified by two independent sources, to challenge / response methods for authentication. To assure a secure-live transaction, thus reducing the possibility of replay and other remote attacks, the authors have devised a novel technique to obtain the client's location from two independent sources of GPS on the client's side and the cellular network on authenticator's side. The algorithm of LocProg is based on obfuscating "random elements plus a client's data" with a location-based key, generated on the bank side. LocProg is then sent to the client and is designed so it will automatically integrate into the target application on the client's handset. The client can then de-obfuscate LocProg if s/he is within a certain range around the location calculated by the bank and if the correct personal data is supplied. LocProg also has features to protect against trial/error attacks. Analysis of LocAuth's security (trust, threat and system models) and trials based on a prototype implementation (on Android platform) prove the viability and novelty of LocAuth.

  20. Security and Dependability Solutions for Networks and Devices

    NASA Astrophysics Data System (ADS)

    Gücrgens, Sigrid; Fuchs, Andreas

    In this chapter we give an overview over the denotation of the SERENITY artefacts S&D Classes, Patterns and Implementations in the context of networks and devices. In order to demonstrate their necessity we sketch an example for confidential and authentic communication and storage that utilizes a trusted platform module, and model the relevant pattern. We then dissociate solutions for network and device related S&D requirements from those targeting the context of organizational or workflow and web services based solutions. Then we give a summary of the broad field of application for network and device solutions. Finally we clarify the meaning and interaction between classes, patterns and implementations by giving some concrete examples.

  1. Unbiased Scanning Method and Data Banking Approach Using Ultra-High Performance Liquid Chromatography Coupled with High-Resolution Mass Spectrometry for Quantitative Comparison of Metabolite Exposure in Plasma across Species Analyzed at Different Dates.

    PubMed

    Gao, Hongying; Deng, Shibing; Obach, R Scott

    2015-12-01

    An unbiased scanning methodology using ultra high-performance liquid chromatography coupled with high-resolution mass spectrometry was used to bank data and plasma samples for comparing the data generated at different dates. This method was applied to bank the data generated earlier in animal samples and then to compare the exposure to metabolites in animal versus human for safety assessment. With neither authentic standards nor prior knowledge of the identities and structures of metabolites, full scans for precursor ions and all ion fragments (AIF) were employed with a generic gradient LC method to analyze plasma samples at positive and negative polarity, respectively. In a total of 22 tested drugs and metabolites, 21 analytes were detected using this unbiased scanning method except that naproxen was not detected due to low sensitivity at negative polarity and interference at positive polarity; and 4'- or 5-hydroxy diclofenac was not separated by a generic UPLC method. Statistical analysis of the peak area ratios of the analytes versus the internal standard in five repetitive analyses over approximately 1 year demonstrated that the analysis variation was significantly different from sample instability. The confidence limits for comparing the exposure using peak area ratio of metabolites in animal plasma versus human plasma measured over approximately 1 year apart were comparable to the analysis undertaken side by side on the same days. These statistical analysis results showed it was feasible to compare data generated at different dates with neither authentic standards nor prior knowledge of the analytes.

  2. Data Driven Device Failure Prediction

    DTIC Science & Technology

    2016-09-15

    Microsoft enterprise authentication service and Apache web server in an effort to increase up-time and improve mission effectiveness. These new fault loads...54 4.2.2 Web Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59...predictor. Finally, the implementation is validated by running the same experiment on a web server. 1.1 Problem Statement According to the operational

  3. Appropriating Quantified Self Technologies to Support Elementary Statistical Teaching and Learning

    ERIC Educational Resources Information Center

    Lee, Victor R.; Drake, Joel R.; Thayne, Jeffrey L.

    2016-01-01

    Wearable activity tracking devices associated with the Quantified Self movement have potential benefit for educational settings because they produce authentic and granular data about activities and experiences already familiar to youth. This article explores how that potential could be realized through explicit acknowledgment of and response to…

  4. The Comparison of Students' Satisfaction between Ubiquitous and Web-Based Learning Environments

    ERIC Educational Resources Information Center

    Virtanen, Mari Aulikki; Kääriäinen, Maria; Liikanen, Eeva; Haavisto, Elina

    2017-01-01

    Higher education is moving towards digitalized learning. The rapid development of technological resources, devices and wireless networks enables more flexible opportunities to study and learn in innovative learning environments. New technologies enable combining of authentic and virtual learning spaces and digital resources as multifunctional…

  5. Comparison of ZigBee Replay Attacks Using a Universal Software Radio Peripheral and USB Radio

    DTIC Science & Technology

    2014-03-27

    authentication code (CBC-MAC) CPU central processing unit CUT component under test db decibel dbm decibel referenced to one milliwatt FFD full- fuction ...categorized into two different types: full- fuction devices (FFDs) and reduced-function devices (RFDs). The difference between an FFD and an RFD is that...KillerBee Hardware. Although KillerBee can be used with any hardware that can interact with 802.15.4 networks, the primary development hardware is the

  6. Static and Dynamic Human Shape Modeling - A Review of the Literature and State of the Art

    DTIC Science & Technology

    2009-04-01

    Figure 60. Confluent marker-based animation (Aguiar et al. 2006). Subsequent frames showing the female scan authentically performing a soccer kick ...Infoscitex Corp. 4027 Colonel Glenn Highway Suite 210 Dayton OH 45431-1672 Kathleen Robinette Biosciences and Protection Division Biomechanics ...Biosciences and Protection Division Biomechanics Branch Wright-Patterson AFB OH 45433 Approved for public release; distribution unlimited. NOTICE

  7. Authentication, privacy, security can exploit brainwave by biomarker

    NASA Astrophysics Data System (ADS)

    Jenkins, Jeffrey; Sweet, Charles; Sweet, James; Noel, Steven; Szu, Harold

    2014-05-01

    We seek to augment the current Common Access Control (CAC) card and Personal Identification Number (PIN) verification systems with an additional layer of classified access biometrics. Among proven devices such as fingerprint readers and cameras that can sense the human eye's iris pattern, we introduced a number of users to a sequence of 'grandmother images', or emotionally evoked stimuli response images from other users, as well as one of their own, for the purpose of authentication. We performed testing and evaluation of the Authenticity Privacy and Security (APS) brainwave biometrics, similar to the internal organ of the human eye's iris which cannot easily be altered. `Aha' recognition through stimulus-response habituation can serve as a biomarker, similar to keystroke dynamics analysis for inter and intra key fluctuation time of a memorized PIN number (FIST). Using a non-tethered Electroencephalogram (EEG) wireless smartphone/pc monitor interface, we explore the appropriate stimuli-response biomarker present in DTAB low frequency group waves. Prior to login, the user is shown a series of images on a computer display. They have been primed to click their mouse when the image is presented. DTAB waves are collected with a wireless EEG and are sent via Smartphone to a cloud based processing infrastructure. There, we measure fluctuations in DTAB waves from a wireless, non-tethered, single node EEG device between the Personal Graphic Image Number (PGIN) stimulus image and the response time from an individual's mental performance baseline. Towards that goal, we describe an infrastructure that supports distributed verification for web-based EEG authentication. The performance of machine learning on the relative Power Spectral Density EEG data may uncover features required for subsequent access to web or media content. Our approach provides a scalable framework wrapped into a robust Neuro-Informatics toolkit, viable for use in the Biomedical and mental health communities, as well as numerous consumer applications.

  8. Interdigitated electrode (IDE) for porcine detection based on titanium dioxide (TiO2) thin films

    NASA Astrophysics Data System (ADS)

    Nordin, N.; Hashim, U.; Azizah, N.

    2016-07-01

    Interdigited Electrode (IDE) porcine detection can be accomplished to authenticate the halal issue that has been a concern to Muslim not only in Malaysia but all around the world. The method used is photolithography that used the p-type photoresist on the spin coater with 2500 rpm. Bare IDEs device is deposited with Titanium Dioxide (TiO2) to improve the performance of the device. The result indicates that current-voltage (I-V) measurement of porcine probe line slightly above porcine target due to negative charges repelled each other. The IDE device can detect the porcine presence in food as lowest as 1.0 µM. Better performance of the device can be achieved with the replacement of gold deposited to trigger more sensitivity of the device.

  9. A dual channel three-terminal np-LDMOS with both majorities for conduction

    NASA Astrophysics Data System (ADS)

    Kong, Moufu; Yi, Bo; Zhang, Bingke

    2018-02-01

    A novel dual channel three-terminal np-LDMOS power device with both electrons and holes for conduction is proposed in this paper. Based on a new approach of inducing a large-signal which is processed by a simple circuit for controlling the gate of p-LDMOS inside the device, the new np-LDMOS only requires one external gate controlling voltage signal that can be performed as an n-LDMOS device. The SOA of the new device is improved in comparison with the n-LDMOS device, since the counteracting of electric flux density produced by the both type of carriers' currents. Furthermore, the specific on-resistance of the np-LDMOS device is reduced by about 19% when comparing with that of the conventional one. The control method and performances of the proposed power device are investigated and authenticated by numerical simulations.

  10. Individual A-Scan Signal Normalization Between Two Spectral Domain Optical Coherence Tomography Devices

    PubMed Central

    Chen, Chieh-Li; Ishikawa, Hiroshi; Wollstein, Gadi; Ling, Yun; Bilonick, Richard A.; Kagemann, Larry; Sigal, Ian A.; Schuman, Joel S.

    2013-01-01

    Purpose. We developed a method to normalize optical coherence tomography (OCT) signal profiles from two spectral-domain (SD) OCT devices so that the comparability between devices increases. Methods. We scanned 21 eyes from 14 healthy and 7 glaucoma subjects with two SD-OCT devices on the same day, with equivalent cube scan patterns centered on the fovea (Cirrus HD-OCT and RTVue). Foveola positions were selected manually and used as the center for registration of the corresponding images. A-scan signals were sampled 1.8 mm from the foveola in the temporal, superior, nasal, and inferior quadrants. After oversampling and rescaling RTVue data along the Z-axis to match the corresponding Cirrus data format, speckle noise reduction and amplitude normalization were applied. For comparison between normalized A-scan profiles, mean absolute difference in amplitude in percentage was measured at each sampling point. As a reference, the mean absolute difference between two Cirrus scans on the same eye also was measured. Results. The mean residual of the A-scan profile amplitude was reduced significantly after signal normalization (12.7% vs. 6.2%, P < 0.0001, paired t-test). All four quadrants also showed statistically significant reduction (all P < 0.0001). Mean absolute difference after normalization was smaller than the one between two Cirrus scans. No performance difference was detected between health and glaucomatous eyes. Conclusions. The reported signal normalization method successfully reduced the A-scan profile differences between two SD-OCT devices. This signal normalization processing may improve the direct comparability of OCT image analysis and measurement on various devices. PMID:23611992

  11. 78 FR 38240 - Authentication of Electronic Signatures on Electronically Filed Statements of Account

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-26

    ... up by any trick, scheme, or device a material fact; (2) makes any materially false, fictitious, or fraudulent statement or representation; or (3) makes or uses any false writing or document knowing the same to contain any materially false, fictitious, or fraudulent statement or entry; shall be fined under...

  12. A Study of Contextualised Mobile Information Delivery for Language Learning

    ERIC Educational Resources Information Center

    de Jong, Tim; Specht, Marcus; Koper, Rob

    2010-01-01

    Mobile devices offer unique opportunities to deliver learning content in authentic learning situations. Apart from being able to play various kinds of rich multimedia content, they offer new ways of tailoring information to the learner's situation or context. This paper presents the results of a study of mobile media delivery for language…

  13. Effects of Practice Type in the Here and Now Mobile Learning Environment

    ERIC Educational Resources Information Center

    Tutty, Jeremy I.; Martin, Florence

    2014-01-01

    This generation of technology is characterized by mobile and portable devices such as smartphones and tablet computers with wireless broadband access. Mobile technologies enable a new kind of learning called "here and now learning," where learners have access to information anytime and anywhere to perform authentic activities in the…

  14. An Identity-Based Anti-Quantum Privacy-Preserving Blind Authentication in Wireless Sensor Networks.

    PubMed

    Zhu, Hongfei; Tan, Yu-An; Zhu, Liehuang; Wang, Xianmin; Zhang, Quanxin; Li, Yuanzhang

    2018-05-22

    With the development of wireless sensor networks, IoT devices are crucial for the Smart City; these devices change people's lives such as e-payment and e-voting systems. However, in these two systems, the state-of-art authentication protocols based on traditional number theory cannot defeat a quantum computer attack. In order to protect user privacy and guarantee trustworthy of big data, we propose a new identity-based blind signature scheme based on number theorem research unit lattice, this scheme mainly uses a rejection sampling theorem instead of constructing a trapdoor. Meanwhile, this scheme does not depend on complex public key infrastructure and can resist quantum computer attack. Then we design an e-payment protocol using the proposed scheme. Furthermore, we prove our scheme is secure in the random oracle, and satisfies confidentiality, integrity, and non-repudiation. Finally, we demonstrate that the proposed scheme outperforms the other traditional existing identity-based blind signature schemes in signing speed and verification speed, outperforms the other lattice-based blind signature in signing speed, verification speed, and signing secret key size.

  15. An Identity-Based Anti-Quantum Privacy-Preserving Blind Authentication in Wireless Sensor Networks

    PubMed Central

    Zhu, Hongfei; Tan, Yu-an; Zhu, Liehuang; Wang, Xianmin; Zhang, Quanxin; Li, Yuanzhang

    2018-01-01

    With the development of wireless sensor networks, IoT devices are crucial for the Smart City; these devices change people’s lives such as e-payment and e-voting systems. However, in these two systems, the state-of-art authentication protocols based on traditional number theory cannot defeat a quantum computer attack. In order to protect user privacy and guarantee trustworthy of big data, we propose a new identity-based blind signature scheme based on number theorem research unit lattice, this scheme mainly uses a rejection sampling theorem instead of constructing a trapdoor. Meanwhile, this scheme does not depend on complex public key infrastructure and can resist quantum computer attack. Then we design an e-payment protocol using the proposed scheme. Furthermore, we prove our scheme is secure in the random oracle, and satisfies confidentiality, integrity, and non-repudiation. Finally, we demonstrate that the proposed scheme outperforms the other traditional existing identity-based blind signature schemes in signing speed and verification speed, outperforms the other lattice-based blind signature in signing speed, verification speed, and signing secret key size. PMID:29789475

  16. Feasibility and Limitations of Vaccine Two-Dimensional Barcoding Using Mobile Devices.

    PubMed

    Bell, Cameron; Guerinet, Julien; Atkinson, Katherine M; Wilson, Kumanan

    2016-06-23

    Two-dimensional (2D) barcoding has the potential to enhance documentation of vaccine encounters at the point of care. However, this is currently limited to environments equipped with dedicated barcode scanners and compatible record systems. Mobile devices may present a cost-effective alternative to leverage 2D vaccine vial barcodes and improve vaccine product-specific information residing in digital health records. Mobile devices have the potential to capture product-specific information from 2D vaccine vial barcodes. We sought to examine the feasibility, performance, and potential limitations of scanning 2D barcodes on vaccine vials using 4 different mobile phones. A unique barcode scanning app was developed for Android and iOS operating systems. The impact of 4 variables on the scan success rate, data accuracy, and time to scan were examined: barcode size, curvature, fading, and ambient lighting conditions. Two experimenters performed 4 trials 10 times each, amounting to a total of 2160 barcode scan attempts. Of the 1832 successful scans performed in this evaluation, zero produced incorrect data. Five-millimeter barcodes were the slowest to scan, although only by 0.5 seconds on average. Barcodes with up to 50% fading had a 100% success rate, but success rate deteriorated beyond 60% fading. Curved barcodes took longer to scan compared with flat, but success rate deterioration was only observed at a vial diameter of 10 mm. Light conditions did not affect success rate or scan time between 500 lux and 20 lux. Conditions below 20 lux impeded the device's ability to scan successfully. Variability in scan time was observed across devices in all trials performed. 2D vaccine barcoding is possible using mobile devices and is successful under the majority of conditions examined. Manufacturers utilizing 2D barcodes should take into consideration the impact of factors that limit scan success rates. Future studies should evaluate the effect of mobile barcoding on workflow and vaccine administrator acceptance.

  17. A privacy authentication scheme based on cloud for medical environment.

    PubMed

    Chen, Chin-Ling; Yang, Tsai-Tung; Chiang, Mao-Lun; Shih, Tzay-Farn

    2014-11-01

    With the rapid development of the information technology, the health care technologies already became matured. Such as electronic medical records that can be easily stored. However, how to get medical resources more convenient is currently concerning issue. In spite of many literatures discussed about medical systems, these literatures should face many security challenges. The most important issue is patients' privacy. Therefore, we propose a privacy authentication scheme based on cloud environment. In our scheme, we use mobile device's characteristics, allowing peoples to use medical resources on the cloud environment to find medical advice conveniently. The digital signature is used to ensure the security of the medical information that is certified by the medical department in our proposed scheme.

  18. A High Speed Finger-Print Optical Scanning Method

    DTIC Science & Technology

    2000-01-01

    biometrics technologies for authentication, from the view point of convenience and higher security, dactyloscopy is by far the best, much better than the...sensing technologies using static capacitance, thermal or optical detection, the optical detection is by far with the most potential to meet the...present time due to the low resolution of the inherent nature of thermal imaging technique. Besides, this method is easily influenced by environmental

  19. Application of Arrester Simulation Device in Training

    NASA Astrophysics Data System (ADS)

    Baoquan, Zhang; Ziqi, Chai; Genghua, Liu; Wei, Gao; Kaiyue, Wu

    2017-12-01

    Combining with the arrester simulation device put into use successfully, this paper introduces the application of arrester test in the insulation resistance measurement, counter test, Leakage current test under DC 1mA voltage and leakage current test under 0.75U1mA. By comparing with the existing training, this paper summarizes the arrester simulation device’s outstanding advantages including real time monitoring, multi-type fault data analysis and acousto-optic simulation. It effectively solves the contradiction between authenticity and safety in the existing test training, and provides a reference for further training.

  20. Privacy preservation and authentication on secure geographical routing in VANET

    NASA Astrophysics Data System (ADS)

    Punitha, A.; Manickam, J. Martin Leo

    2017-05-01

    Vehicular Ad hoc Networks (VANETs) play an important role in vehicle-to-vehicle communication as it offers a high level of safety and convenience to drivers. In order to increase the level of security and safety in VANETs, in this paper, we propose a Privacy Preservation and Authentication on Secure Geographical Routing Protocol (PPASGR) for VANET. It provides security by detecting and preventing malicious nodes through two directional antennas such as forward (f-antenna) and backward (b-antenna). The malicious nodes are detected by direction detection, consistency detection and conflict detection. The location of the trusted neighbour is identified using TNT-based location verification scheme after the implementation of the Vehicle Tamper Proof Device (VTPD), Trusted Authority (TA) is generated that produces the anonymous credentials. Finally, VTPD generates pseudo-identity using TA which retrieves the real identity of the sender. Through this approach, the authentication, integrity and confidentiality for routing packets can be achieved. The simulation results show that the proposed approach reduces the packet drop due to attack and improves the packet delivery ratio.

  1. Body identification, biometrics and medicine: ethical and social considerations.

    PubMed

    Mordini, Emilio; Ottolini, Corinna

    2007-01-01

    Identity is important when it is weak. This apparent paradox is the core of the current debate on identity. Traditionally, verification of identity has been based upon authentication of attributed and biographical characteristics. After small scale societies and large scale, industrial societies, globalization represents the third period of personal identification. The human body lies at the heart of all strategies for identity management. The tension between human body and personal identity is critical in the health care sector. The health care sector is second only to the financial sector in term of the number of biometric users. Many hospitals and healthcare organizations are in progress to deploy biometric security architecture. Secure identification is critical in the health care system, both to control logic access to centralized archives of digitized patients' data, and to limit physical access to buildings and hospital wards, and to authenticate medical and social support personnel. There is also an increasing need to identify patients with a high degree of certainty. Finally there is the risk that biometric authentication devices can significantly reveal any health information. All these issues require a careful ethical and political scrutiny.

  2. Optical Coherence Tomography (OCT) Device Independent Intraretinal Layer Segmentation

    PubMed Central

    Ehnes, Alexander; Wenner, Yaroslava; Friedburg, Christoph; Preising, Markus N.; Bowl, Wadim; Sekundo, Walter; zu Bexten, Erdmuthe Meyer; Stieger, Knut; Lorenz, Birgit

    2014-01-01

    Purpose To develop and test an algorithm to segment intraretinal layers irrespectively of the actual Optical Coherence Tomography (OCT) device used. Methods The developed algorithm is based on the graph theory optimization. The algorithm's performance was evaluated against that of three expert graders for unsigned boundary position difference and thickness measurement of a retinal layer group in 50 and 41 B-scans, respectively. Reproducibility of the algorithm was tested in 30 C-scans of 10 healthy subjects each with the Spectralis and the Stratus OCT. Comparability between different devices was evaluated in 84 C-scans (volume or radial scans) obtained from 21 healthy subjects, two scans per subject with the Spectralis OCT, and one scan per subject each with the Stratus OCT and the RTVue-100 OCT. Each C-scan was segmented and the mean thickness for each retinal layer in sections of the early treatment of diabetic retinopathy study (ETDRS) grid was measured. Results The algorithm was able to segment up to 11 intraretinal layers. Measurements with the algorithm were within the 95% confidence interval of a single grader and the difference was smaller than the interindividual difference between the expert graders themselves. The cross-device examination of ETDRS-grid related layer thicknesses highly agreed between the three OCT devices. The algorithm correctly segmented a C-scan of a patient with X-linked retinitis pigmentosa. Conclusions The segmentation software provides device-independent, reliable, and reproducible analysis of intraretinal layers, similar to what is obtained from expert graders. Translational Relevance Potential application of the software includes routine clinical practice and multicenter clinical trials. PMID:24820053

  3. Interdigitated electrode (IDE) for porcine detection based on titanium dioxide (TiO{sub 2}) thin films

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Nordin, N.; Azizah, N.; Hashim, U., E-mail: uda@unimap.edu.my

    2016-07-06

    Interdigited Electrode (IDE) porcine detection can be accomplished to authenticate the halal issue that has been a concern to Muslim not only in Malaysia but all around the world. The method used is photolithography that used the p-type photoresist on the spin coater with 2500 rpm. Bare IDEs device is deposited with Titanium Dioxide (TiO{sub 2}) to improve the performance of the device. The result indicates that current-voltage (I-V) measurement of porcine probe line slightly above porcine target due to negative charges repelled each other. The IDE device can detect the porcine presence in food as lowest as 1.0 µM.more » Better performance of the device can be achieved with the replacement of gold deposited to trigger more sensitivity of the device.« less

  4. Promises and Challenges in Continuous Tracking Utilizing Amino Acids in Skin Secretions for Active Multi-Factor Biometric Authentication for Cybersecurity.

    PubMed

    Agudelo, Juliana; Privman, Vladimir; Halámek, Jan

    2017-07-05

    We consider a new concept of biometric-based cybersecurity systems for active authentication by continuous tracking, which utilizes biochemical processing of metabolites present in skin secretions. Skin secretions contain a large number of metabolites and small molecules that can be targeted for analysis. Here we argue that amino acids found in sweat can be exploited for the establishment of an amino acid profile capable of identifying an individual user of a mobile or wearable device. Individual and combinations of amino acids processed by biocatalytic cascades yield physical (optical or electronic) signals, providing a time-series of several outputs that, in their entirety, should suffice to authenticate a specific user based on standard statistical criteria. Initial results, motivated by biometrics, indicate that single amino acid levels can provide analog signals that vary according to the individual donor, albeit with limited resolution versus noise. However, some such assays offer digital separation (into well-defined ranges of values) according to groups such as age, biological sex, race, and physiological state of the individual. Multi-input biocatalytic cascades that handle several amino acid signals to yield a single digital-type output, as well as continuous-tracking time-series data rather than a single-instance sample, should enable active authentication at the level of an individual. © 2017 Wiley-VCH Verlag GmbH & Co. KGaA, Weinheim.

  5. Dynamic focus-tracking MEMS scanning micromirror with low actuation voltages for endoscopic imaging.

    PubMed

    Strathman, Matthew; Liu, Yunbo; Li, Xingde; Lin, Lih Y

    2013-10-07

    We demonstrate a 3-D scanning micromirror device that combines 2-D beam scanning with focus control in the same device using micro-electro-mechanical-systems (MEMS) technology. 2-D beam scanning is achieved with a biaxial gimbal structure and focus control is obtained with a deformable mirror membrane surface. The micromirror with 800 micrometer diameter is designed to be sufficiently compact and efficient so that it can be incorporated into an endoscopic imaging probe in the future. The design, fabrication and characterization of the device are described in this paper. Using the focus-tracking MEMS scanning mirror, we achieved an optical scanning range of >16 degrees with <40 V actuation voltage at resonance and a tunable focal length between infinity and 25 mm with <100V applied bias.

  6. Using Narrative-Based Design Scaffolds within a Mobile Learning Environment to Support Learning Outdoors with Young Children

    ERIC Educational Resources Information Center

    Seely, Brian J.

    2015-01-01

    This study aims to advance learning outdoors with mobile devices. As part of the ongoing Tree Investigators design-based research study, this research investigated a mobile application to support observation, identification, and explanation of the tree life cycle within an authentic, outdoor setting. Recognizing the scientific and conceptual…

  7. Recognizing User Identity by Touch on Tabletop Displays: An Interactive Authentication Method

    ERIC Educational Resources Information Center

    Torres Peralta, Raquel

    2012-01-01

    Multi-touch tablets allow users to interact with computers through intuitive, natural gestures and direct manipulation of digital objects. One advantage of these devices is that they can offer a large, collaborative space where several users can work on a task at the same time. However the lack of privacy in these situations makes standard…

  8. DOD Supply Chain: Preliminary Observations Indicate That Counterfeit Electronic Parts Can Be Found on Internet Purchasing Platforms

    DTIC Science & Technology

    2011-11-08

    Corps’ V-22 Osprey aircraft, and the Navy’s SSN-688 Los Angeles Class nuclear-powered attack submarine . If authentic, these parts provide accurate power...even d Different color epoxy seals were noted within both lots according to SMT Corp., which is common in suspect counterfeit devices

  9. Performance evaluation of wavelet-based face verification on a PDA recorded database

    NASA Astrophysics Data System (ADS)

    Sellahewa, Harin; Jassim, Sabah A.

    2006-05-01

    The rise of international terrorism and the rapid increase in fraud and identity theft has added urgency to the task of developing biometric-based person identification as a reliable alternative to conventional authentication methods. Human Identification based on face images is a tough challenge in comparison to identification based on fingerprints or Iris recognition. Yet, due to its unobtrusive nature, face recognition is the preferred method of identification for security related applications. The success of such systems will depend on the support of massive infrastructures. Current mobile communication devices (3G smart phones) and PDA's are equipped with a camera which can capture both still and streaming video clips and a touch sensitive display panel. Beside convenience, such devices provide an adequate secure infrastructure for sensitive & financial transactions, by protecting against fraud and repudiation while ensuring accountability. Biometric authentication systems for mobile devices would have obvious advantages in conflict scenarios when communication from beyond enemy lines is essential to save soldier and civilian life. In areas of conflict or disaster the luxury of fixed infrastructure is not available or destroyed. In this paper, we present a wavelet-based face verification scheme that have been specifically designed and implemented on a currently available PDA. We shall report on its performance on the benchmark audio-visual BANCA database and on a newly developed PDA recorded audio-visual database that take include indoor and outdoor recordings.

  10. Microscopic and UPLC-UV-MS analyses of authentic and commercial yohimbe (Pausinystalia johimbe) bark samples.

    PubMed

    Raman, Vijayasankar; Avula, Bharathi; Galal, Ahmed M; Wang, Yan-Hong; Khan, Ikhlas A

    2013-01-01

    Yohimbine is the major alkaloid found in the stem bark of yohimbe, Pausinystalia johimbe (Rubiaceae), an evergreen tree native to Africa. The objectives of the current study were to provide a detailed anatomy of yohimbe bark, as well as to determine the quantity of yohimbine in the raw yohimbe products sold online. Twelve commercial raw materials of yohimbe were analyzed by microscopic and ultra performance liquid chromatography-UV-MS methods. The study revealed that three samples were probably adulterated and four other samples contained various levels of impurities. Yohimbine was not detected in one sample, whereas its presence in other samples was found to be in the range 0.1-0.91%. The present work also provides a detailed anatomy of the stem bark of yohimbe, with light and scanning electron microscopy images, for proper identification and authentication.

  11. Application of Fourier transform midinfrared spectroscopy to the discrimination between Irish artisanal honey and such honey adulterated with various sugar syrups.

    PubMed

    Kelly, J Daniel; Petisco, Cristina; Downey, Gerard

    2006-08-23

    A collection of authentic artisanal Irish honeys (n = 580) and certain of these honeys adulterated by fully inverted beet syrup (n = 280), high-fructose corn syrup (n = 160), partial invert cane syrup (n = 120), dextrose syrup (n = 160), and beet sucrose (n = 120) was assembled. All samples were adjusted to 70 degrees Bx and scanned in the midinfrared region (800-4000 cm(-1)) by attenuated total reflectance sample accessory. By use of soft independent modeling of class analogy (SIMCA) and partial least-squares (PLS) classification, authentic honey and honey adulterated by beet sucrose, dextrose syrups, and partial invert corn syrup could be identified with correct classification rates of 96.2%, 97.5%, 95.8%, and 91.7%, respectively. This combination of spectroscopic technique and chemometric methods was not able to unambiguously detect adulteration by high-fructose corn syrup or fully inverted beet syrup.

  12. Performance of a three-dimensional-printed microscanner in a laser scanning microscopy application

    NASA Astrophysics Data System (ADS)

    Oyman, Hilmi Artun; Gokdel, Yigit Daghan; Ferhanoglu, Onur; Yalcinkaya, Arda Deniz

    2018-04-01

    A magnetically actuated microscanner is used in a laser scanning microscopy application. Stress distribution along the circular-profiled flexure is compared with a rectangular counterpart in finite-element environment. Magnetic actuation mechanism of the scanning unit is explained in detail. Moreover, reliability of the scanner is tested for 3×106 cycle. The scanning device is designed to meet a confocal microscopy application providing 100 μm×100 μm field of view and <3-μm lateral resolution. The resonance frequencies of the device were analytically modeled, where we obtained 130- and 268-Hz resonance values for the out-of-plane and torsion modes, respectively. The scanning device provided an optical scan angle about 2.5 deg for 170-mA drive current, enabling the desired field of view for our custom built confocal microscope setup. Finally, imaging experiments were conducted on a resolution target, showcasing the desired scan area and resolution.

  13. Optical scanning holography based on compressive sensing using a digital micro-mirror device

    NASA Astrophysics Data System (ADS)

    A-qian, Sun; Ding-fu, Zhou; Sheng, Yuan; You-jun, Hu; Peng, Zhang; Jian-ming, Yue; xin, Zhou

    2017-02-01

    Optical scanning holography (OSH) is a distinct digital holography technique, which uses a single two-dimensional (2D) scanning process to record the hologram of a three-dimensional (3D) object. Usually, these 2D scanning processes are in the form of mechanical scanning, and the quality of recorded hologram may be affected due to the limitation of mechanical scanning accuracy and unavoidable vibration of stepper motor's start-stop. In this paper, we propose a new framework, which replaces the 2D mechanical scanning mirrors with a Digital Micro-mirror Device (DMD) to modulate the scanning light field, and we call it OSH based on Compressive Sensing (CS) using a digital micro-mirror device (CS-OSH). CS-OSH can reconstruct the hologram of an object through the use of compressive sensing theory, and then restore the image of object itself. Numerical simulation results confirm this new type OSH can get a reconstructed image with favorable visual quality even under the condition of a low sample rate.

  14. Overcoming the challenges of secure mobile applications for network-centric, data-sensitive applications

    NASA Astrophysics Data System (ADS)

    Farroha, Bassam; Farroha, Deborah

    2012-05-01

    Gaining the competitive advantage in today's aggressive environment requires our corporate leaders and Warfighters alike to be armed with up-to-date knowledge related to friendly and opposing forces. This knowledge has to be delivered in real-time between the core enterprise and tactical/mobile units at the edge. The type and sensitivity of data delivered will vary depending on users, threat level and current rules of dissemination. This paper will describe the mobile security management that basis access rights on positive identification of user, authenticating the user and the edge device. Next, Access Management is granted on a fine grain basis where each data element is tagged with meta-data that is crypto-bound to the data itself to ensure authenticity of contents and observance of data sensitivity.

  15. Software Authority Transition through Multiple Distributors

    PubMed Central

    Han, Kyusunk; Shon, Taeshik

    2014-01-01

    The rapid growth in the use of smartphones and tablets has changed the software distribution ecosystem. The trend today is to purchase software through application stores rather than from traditional offline markets. Smartphone and tablet users can install applications easily by purchasing from the online store deployed in their device. Several systems, such as Android or PC-based OS units, allow users to install software from multiple sources. Such openness, however, can promote serious threats, including malware and illegal usage. In order to prevent such threats, several stores use online authentication techniques. These methods can, however, also present a problem whereby even licensed users cannot use their purchased application. In this paper, we discuss these issues and provide an authentication method that will make purchased applications available to the registered user at all times. PMID:25143971

  16. Software authority transition through multiple distributors.

    PubMed

    Han, Kyusunk; Shon, Taeshik

    2014-01-01

    The rapid growth in the use of smartphones and tablets has changed the software distribution ecosystem. The trend today is to purchase software through application stores rather than from traditional offline markets. Smartphone and tablet users can install applications easily by purchasing from the online store deployed in their device. Several systems, such as Android or PC-based OS units, allow users to install software from multiple sources. Such openness, however, can promote serious threats, including malware and illegal usage. In order to prevent such threats, several stores use online authentication techniques. These methods can, however, also present a problem whereby even licensed users cannot use their purchased application. In this paper, we discuss these issues and provide an authentication method that will make purchased applications available to the registered user at all times.

  17. Dynamic focus-tracking MEMS scanning micromirror with low actuation voltages for endoscopic imaging

    PubMed Central

    Strathman, Matthew; Liu, Yunbo; Li, Xingde; Lin, Lih Y.

    2013-01-01

    We demonstrate a 3-D scanning micromirror device that combines 2-D beam scanning with focus control in the same device using micro-electro-mechanical-systems (MEMS) technology. 2-D beam scanning is achieved with a biaxial gimbal structure and focus control is obtained with a deformable mirror membrane surface. The micromirror with 800 micrometer diameter is designed to be sufficiently compact and efficient so that it can be incorporated into an endoscopic imaging probe in the future. The design, fabrication and characterization of the device are described in this paper. Using the focus-tracking MEMS scanning mirror, we achieved an optical scanning range of >16 degrees with <40 V actuation voltage at resonance and a tunable focal length between infinity and 25 mm with <100V applied bias. PMID:24104304

  18. Authentication of Piper betle L. folium and quantification of their antifungal-activity.

    PubMed

    Wirasuta, I Made Agus Gelgel; Srinadi, I Gusti Ayu Made; Dwidasmara, Ida Bagus Gede; Ardiyanti, Ni Luh Putu Putri; Trisnadewi, I Gusti Ayu Arya; Paramita, Ni Luh Putu Vidya

    2017-07-01

    The TLC profiles of intra- and inter-day precision for Piper betle L . (PBL) folium methanol extract was studied for their peak marker recognition and identification. The Numerical chromatographic parameters (NCPs) of the peak markers, the hierarchical clustering analysis (HCA) and the principal component analysis (PCA) were applied to authenticate the PBL. folium extract from other Piper species folium extract and to ensure the antifungal activity quality of the PBL essential oil. The spotted extract was developed with the mobile phase of toluene: ethyl acetate; 93:7, (v/v). The eluted plate was viewed with the TLC-Visualizer, scanned under absorption and fluorescent mode detection, and on each sample the in-situ UV spectra were recorded between 190 to 400 nm. The NCPs profiles of intra- and inter-day precision results offered multi-dimensional chromatogram fingerprints for better marker peak pattern recognition and identification. Using the r -value fingerprints data series generated with this method allowed more precise discrimination the PBL. from other Piper species compared to the marker peak area fingerprint method. The cosine pair comparison was a simple method for authentication of two different fingerprints. The ward linkage clustering and the pair cross-correlation comparison were better chemometric methods to determine the consistency peak area ratio between fingerprints. The first component PCA-loading values of peak marker area fingerprints were correlated linearly to both the bio-marker concentration as well as the antifungal activity. This relationship could be used to control the quality and pharmacological potency. This simple method was developed for the authentication and quantification of herbal medicine.

  19. Multi-image encryption based on synchronization of chaotic lasers and iris authentication

    NASA Astrophysics Data System (ADS)

    Banerjee, Santo; Mukhopadhyay, Sumona; Rondoni, Lamberto

    2012-07-01

    A new technique of transmitting encrypted combinations of gray scaled and chromatic images using chaotic lasers derived from Maxwell-Bloch's equations has been proposed. This novel scheme utilizes the general method of solution of a set of linear equations to transmit similar sized heterogeneous images which are a combination of monochrome and chromatic images. The chaos encrypted gray scaled images are concatenated along the three color planes resulting in color images. These are then transmitted over a secure channel along with a cover image which is an iris scan. The entire cryptology is augmented with an iris-based authentication scheme. The secret messages are retrieved once the authentication is successful. The objective of our work is briefly outlined as (a) the biometric information is the iris which is encrypted before transmission, (b) the iris is used for personal identification and verifying for message integrity, (c) the information is transmitted securely which are colored images resulting from a combination of gray images, (d) each of the images transmitted are encrypted through chaos based cryptography, (e) these encrypted multiple images are then coupled with the iris through linear combination of images before being communicated over the network. The several layers of encryption together with the ergodicity and randomness of chaos render enough confusion and diffusion properties which guarantee a fool-proof approach in achieving secure communication as demonstrated by exhaustive statistical methods. The result is vital from the perspective of opening a fundamental new dimension in multiplexing and simultaneous transmission of several monochromatic and chromatic images along with biometry based authentication and cryptography.

  20. Authenticated sensor interface device

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Coleman, Jody Rustyn; Poland, Richard W.

    A system and method for the secure storage and transmission of data is provided. A data aggregate device can be configured to receive secure data from a data source, such as a sensor, and encrypt the secure data using a suitable encryption technique, such as a shared private key technique, a public key encryption technique, a Diffie-Hellman key exchange technique, or other suitable encryption technique. The encrypted secure data can be provided from the data aggregate device to different remote devices over a plurality of segregated or isolated data paths. Each of the isolated data paths can include an optoisolatormore » that is configured to provide one-way transmission of the encrypted secure data from the data aggregate device over the isolated data path. External data can be received through a secure data filter which, by validating the external data, allows for key exchange and other various adjustments from an external source.« less

  1. J2ME implementation of system for storing and accessing of sensitive data on patient's mobile device

    NASA Astrophysics Data System (ADS)

    Zabołotny, Wojciech M.; Wielgórski, Radosław; Nowik, Marcin

    2011-10-01

    This paper presents a system allowing to use a patient's mobile phone or PDA for storing of biomedical data, which then, during medical consultation or intervention may be used by the medical staff. The presented solution is aimed on providing both: reliable protection to sensitive patient's data, and easy access to information for authorized medical staff. In the presented system, data are stored in an encrypted form, and the encryption key is available only for authorized persons. The central authentication server verifies the current access rights of the person trying to obtain the information, before providing him or her with the key needed to access the patient's data. The key provided by the server is valid only for the particular device, which minimizes the risk of its misuse. For rare situations when no connection to the authentication server is available (e.g. intervention in the mountains or rural area), system assures an additional "emergency" method to access the encryption key in controlled, registered way. The system has been implemented in Java language and tested in the simulated environment provided by Sun Java Wireless Toolkit for CLDC.

  2. Bluetooth and security

    NASA Astrophysics Data System (ADS)

    Ivo, Penn

    2004-04-01

    Bluetooth is the new emerging technology for wireless communication. It can be used to connect almost any device to another device. The traditional example is to link a Personal Digital Assistant (PDA) or a laptop to a mobile phone. That way you can easily take remote connections with your PDA or laptop without getting your mobile phone from your pocket or messing around with cables. A Class 3 Bluetooth device has range of 0,1 - 10 meters. The architecture of Bluetooth is formed by the radio, the base frequency part and the Link Manager. Bluetooth uses the radio range of 2.45 GHz. The theoretical maximum bandwidth is 1 Mb/s, which is slowed down a bit by Forward Error Correction (FEC). Bluetooth specification designates the frequency hopping to be implemented with Gaussian Frequency Shift Keying (GFSK). The base frequency part of the Bluetooth architecture uses a combination of circuit and packet switching technologies. Bluetooth can support either one asynchronous data channel and up to three simultaneous synchronous speech channels, or one channel that transfers asynchronous data and synchronous speech simultaneously. The Link Manager is an essential part of the Bluetooth architecture. It uses Link Manager Protocol (LMP) to configure, authenticate and handle the connections between Bluetooth devices. Several Bluetooth devices can form an ad hoc network. In these piconets, one of the Bluetooth devices will act as a master and the others are slaves. The master sets the frequency-hopping behavior of the piconet. It is also possible to connect up to 10 piconets to each other to form so-called scatternets. Bluetooth has been designed to operate in noisy radio frequency environments, and uses a fast acknowledgement and frequency-hopping scheme to make the link robust, communication-wise. Bluetooth radio modules avoid interference from other signals by hopping to a new frequency after transmitting or receiving a packet. Compared with other systems operating in the same frequency band, the Bluetooth radio typically hops faster and uses shorter packets. This is because short packages and fast hopping limit the impact of microwave ovens and other sources of disturbances. Use of Forward Error Correction (FEC) limits the impact of random noise on long-distance links. Bluetooth transmissions are secure in a business and home environment. Bluetooth has built in sufficient encryption and authentication and is thus very secure in any environment. In addition to this, a frequency-hopping scheme with 1600 hops/sec. is employed. This is far quicker than any other competing system. This, together with an automatic output power adaption to reduce the range exactly to requirement, makes the system extremely difficult to eavesdrop. Information Integrity in Bluetooth has these components: Random Number Generation, Encryption, Encryption Key Management and Authentication.

  3. High-performance liquid chromatographic peak identification of 2,4-dinitrophenylhydrazine derivatives of lipid peroxidation aldehydes by photodiode array detection.

    PubMed

    Cordis, G A; Das, D K; Riedel, W

    1998-03-06

    Malonaldehyde (MDA), a product of lipid peroxidation, is a presumptive marker for the development of oxidative stress in tissues and plasmas. In this study we report the photodiode array detection of the 2,4-dinitrophenylhydrazine (DNPH) derivatives of MDA using HPLC. Oxidative stress was produced by injecting (i.p.) bacterial lipopolysaccharide (LPS) into rats at a dose of 100 micrograms/kg, or i.v. into rabbits (1 microgram/kg), or added to freshly drawn human blood (200 ng/ml). Blood was collected at several time points up to 5 h, centrifuged, and equal volumes of 20% TCA were used to precipitate proteins from the plasma. The supernatants were derivatized with DNPH, and the aldehyde-DNPHs were extracted with pentane. After evaporation, aliquots of 10 microliters in acetonitrile were injected onto a Beckman Ultrasphere C18 (3 microns) column, chromatographed with an acetonitrile-water-acetic acid gradient mobile phase and scanned using Waters 996 photodiode array detector. Peak identification and homogeneity was determined by comparing the experimental peaks and UV scans with those of authentic standards. A significant increase in the DNPH derivative of malonaldehyde (MDA-DNPH), but not of the other aldehyde-DNPH derivatives of formaldehyde (FDA), acetaldehyde (ADA), acetone and propionaldehyde (PDA) was seen over the first hour after LPS administration in anesthetized rats, while in conscious rabbits this trend lasted up to 3 h. The retention times as well as the UV scans of the derivatized aldehydes matched the authentic standards. Thus, photodiode array detection has proved valuable in establishing this HPLC method for estimating oxidative stress. This technique could accurately measure pmol amounts of MDA-DNPH indicating the usefulness of photodiode array detection method for estimating small changes in the oxidative stress.

  4. A Fast lattice-based polynomial digital signature system for m-commerce

    NASA Astrophysics Data System (ADS)

    Wei, Xinzhou; Leung, Lin; Anshel, Michael

    2003-01-01

    The privacy and data integrity are not guaranteed in current wireless communications due to the security hole inside the Wireless Application Protocol (WAP) version 1.2 gateway. One of the remedies is to provide an end-to-end security in m-commerce by applying application level security on top of current WAP1.2. The traditional security technologies like RSA and ECC applied on enterprise's server are not practical for wireless devices because wireless devices have relatively weak computation power and limited memory compared with server. In this paper, we developed a lattice based polynomial digital signature system based on NTRU's Polynomial Authentication and Signature Scheme (PASS), which enabled the feasibility of applying high-level security on both server and wireless device sides.

  5. Device Data Protection in Mobile Healthcare Applications

    NASA Astrophysics Data System (ADS)

    Weerasinghe, Dasun; Rajarajan, Muttukrishnan; Rakocevic, Veselin

    The rapid growth in mobile technology makes the delivery of healthcare data and services on mobile phones a reality. However, the healthcare data is very sensitive and has to be protected against unauthorized access. While most of the development work on security of mobile healthcare today focuses on the data encryption and secure authentication in remote servers, protection of data on the mobile device itself has gained very little attention. This paper analyses the requirements and the architecture for a secure mobile capsule, specially designed to protect the data that is already on the device. The capsule is a downloadable software agent with additional functionalities to enable secure external communication with healthcare service providers, network operators and other relevant communication parties.

  6. An Indoor Positioning-Based Mobile Payment System Using Bluetooth Low Energy Technology

    PubMed Central

    Winata, Doni

    2018-01-01

    The development of information technology has paved the way for faster and more convenient payment process flows and new methodology for the design and implementation of next generation payment systems. The growth of smartphone usage nowadays has fostered a new and popular mobile payment environment. Most of the current generation smartphones support Bluetooth Low Energy (BLE) technology to communicate with nearby BLE-enabled devices. It is plausible to construct an Over-the-Air BLE-based mobile payment system as one of the payment methods for people living in modern societies. In this paper, a secure indoor positioning-based mobile payment authentication protocol with BLE technology and the corresponding mobile payment system design are proposed. The proposed protocol consists of three phases: initialization phase, session key construction phase, and authentication phase. When a customer moves toward the POS counter area, the proposed mobile payment system will automatically detect the position of the customer to confirm whether the customer is ready for the checkout process. Once the system has identified the customer is standing within the payment-enabled area, the payment system will invoke authentication process between POS and the customer’s smartphone through BLE communication channel to generate a secure session key and establish an authenticated communication session to perform the payment transaction accordingly. A prototype is implemented to assess the performance of the proposed design for mobile payment system. In addition, security analysis is conducted to evaluate the security strength of the proposed protocol. PMID:29587399

  7. An Indoor Positioning-Based Mobile Payment System Using Bluetooth Low Energy Technology.

    PubMed

    Yohan, Alexander; Lo, Nai-Wei; Winata, Doni

    2018-03-25

    The development of information technology has paved the way for faster and more convenient payment process flows and new methodology for the design and implementation of next generation payment systems. The growth of smartphone usage nowadays has fostered a new and popular mobile payment environment. Most of the current generation smartphones support Bluetooth Low Energy (BLE) technology to communicate with nearby BLE-enabled devices. It is plausible to construct an Over-the-Air BLE-based mobile payment system as one of the payment methods for people living in modern societies. In this paper, a secure indoor positioning-based mobile payment authentication protocol with BLE technology and the corresponding mobile payment system design are proposed. The proposed protocol consists of three phases: initialization phase, session key construction phase, and authentication phase. When a customer moves toward the POS counter area, the proposed mobile payment system will automatically detect the position of the customer to confirm whether the customer is ready for the checkout process. Once the system has identified the customer is standing within the payment-enabled area, the payment system will invoke authentication process between POS and the customer's smartphone through BLE communication channel to generate a secure session key and establish an authenticated communication session to perform the payment transaction accordingly. A prototype is implemented to assess the performance of the proposed design for mobile payment system. In addition, security analysis is conducted to evaluate the security strength of the proposed protocol.

  8. Nonintrusive multibiometrics on a mobile device: a comparison of fusion techniques

    NASA Astrophysics Data System (ADS)

    Allano, Lorene; Morris, Andrew C.; Sellahewa, Harin; Garcia-Salicetti, Sonia; Koreman, Jacques; Jassim, Sabah; Ly-Van, Bao; Wu, Dalei; Dorizzi, Bernadette

    2006-04-01

    In this article we test a number of score fusion methods for the purpose of multimodal biometric authentication. These tests were made for the SecurePhone project, whose aim is to develop a prototype mobile communication system enabling biometrically authenticated users to deal legally binding m-contracts during a mobile phone call on a PDA. The three biometrics of voice, face and signature were selected because they are all traditional non-intrusive and easy to use means of authentication which can readily be captured on a PDA. By combining multiple biometrics of relatively low security it may be possible to obtain a combined level of security which is at least as high as that provided by a PIN or handwritten signature, traditionally used for user authentication. As the relative success of different fusion methods depends on the database used and tests made, the database we used was recorded on a suitable PDA (the Qtek2020) and the test protocol was designed to reflect the intended application scenario, which is expected to use short text prompts. Not all of the fusion methods tested are original. They were selected for their suitability for implementation within the constraints imposed by the application. All of the methods tested are based on fusion of the match scores output by each modality. Though computationally simple, the methods tested have shown very promising results. All of the 4 fusion methods tested obtain a significant performance increase.

  9. Biometrics: Accessibility challenge or opportunity?

    PubMed

    Blanco-Gonzalo, Ramon; Lunerti, Chiara; Sanchez-Reillo, Raul; Guest, Richard Michael

    2018-01-01

    Biometric recognition is currently implemented in several authentication contexts, most recently in mobile devices where it is expected to complement or even replace traditional authentication modalities such as PIN (Personal Identification Number) or passwords. The assumed convenience characteristics of biometrics are transparency, reliability and ease-of-use, however, the question of whether biometric recognition is as intuitive and straightforward to use is open to debate. Can biometric systems make some tasks easier for people with accessibility concerns? To investigate this question, an accessibility evaluation of a mobile app was conducted where test subjects withdraw money from a fictitious ATM (Automated Teller Machine) scenario. The biometric authentication mechanisms used include face, voice, and fingerprint. Furthermore, we employed traditional modalities of PIN and pattern in order to check if biometric recognition is indeed a real improvement. The trial test subjects within this work were people with real-life accessibility concerns. A group of people without accessibility concerns also participated, providing a baseline performance. Experimental results are presented concerning performance, HCI (Human-Computer Interaction) and accessibility, grouped according to category of accessibility concern. Our results reveal links between individual modalities and user category establishing guidelines for future accessible biometric products.

  10. A Lightweight Protocol for Secure Video Streaming

    PubMed Central

    Morkevicius, Nerijus; Bagdonas, Kazimieras

    2018-01-01

    The Internet of Things (IoT) introduces many new challenges which cannot be solved using traditional cloud and host computing models. A new architecture known as fog computing is emerging to address these technological and security gaps. Traditional security paradigms focused on providing perimeter-based protections and client/server point to point protocols (e.g., Transport Layer Security (TLS)) are no longer the best choices for addressing new security challenges in fog computing end devices, where energy and computational resources are limited. In this paper, we present a lightweight secure streaming protocol for the fog computing “Fog Node-End Device” layer. This protocol is lightweight, connectionless, supports broadcast and multicast operations, and is able to provide data source authentication, data integrity, and confidentiality. The protocol is based on simple and energy efficient cryptographic methods, such as Hash Message Authentication Codes (HMAC) and symmetrical ciphers, and uses modified User Datagram Protocol (UDP) packets to embed authentication data into streaming data. Data redundancy could be added to improve reliability in lossy networks. The experimental results summarized in this paper confirm that the proposed method efficiently uses energy and computational resources and at the same time provides security properties on par with the Datagram TLS (DTLS) standard. PMID:29757988

  11. R2NA: Received Signal Strength (RSS) Ratio-Based Node Authentication for Body Area Network

    PubMed Central

    Wu, Yang; Wang, Kai; Sun, Yongmei; Ji, Yuefeng

    2013-01-01

    The body area network (BAN) is an emerging branch of wireless sensor networks for personalized applications. The services in BAN usually have a high requirement on security, especially for the medical diagnosis. One of the fundamental directions to ensure security in BAN is how to provide node authentication. Traditional research using cryptography relies on prior secrets shared among nodes, which leads to high resource cost. In addition, most existing non-cryptographic solutions exploit out-of-band (OOB) channels, but they need the help of additional hardware support or significant modifications to the system software. To avoid the above problems, this paper presents a proximity-based node authentication scheme, which only uses wireless modules equipped on sensors. With only one sensor and one control unit (CU) in BAN, we could detect a unique physical layer characteristic, namely, the difference between the received signal strength (RSS) measured on different devices in BAN. Through the above-mentioned particular difference, we can tell whether the sender is close enough to be legitimate. We validate our scheme through both theoretical analysis and experiments, which are conducted on the real Shimmer nodes. The results demonstrate that our proposed scheme has a good security performance.

  12. Biometrics: Accessibility challenge or opportunity?

    PubMed Central

    Lunerti, Chiara; Sanchez-Reillo, Raul; Guest, Richard Michael

    2018-01-01

    Biometric recognition is currently implemented in several authentication contexts, most recently in mobile devices where it is expected to complement or even replace traditional authentication modalities such as PIN (Personal Identification Number) or passwords. The assumed convenience characteristics of biometrics are transparency, reliability and ease-of-use, however, the question of whether biometric recognition is as intuitive and straightforward to use is open to debate. Can biometric systems make some tasks easier for people with accessibility concerns? To investigate this question, an accessibility evaluation of a mobile app was conducted where test subjects withdraw money from a fictitious ATM (Automated Teller Machine) scenario. The biometric authentication mechanisms used include face, voice, and fingerprint. Furthermore, we employed traditional modalities of PIN and pattern in order to check if biometric recognition is indeed a real improvement. The trial test subjects within this work were people with real-life accessibility concerns. A group of people without accessibility concerns also participated, providing a baseline performance. Experimental results are presented concerning performance, HCI (Human-Computer Interaction) and accessibility, grouped according to category of accessibility concern. Our results reveal links between individual modalities and user category establishing guidelines for future accessible biometric products. PMID:29565989

  13. Quantum key distribution using card, base station and trusted authority

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Nordholt, Jane E.; Hughes, Richard John; Newell, Raymond Thorson

    Techniques and tools for quantum key distribution ("QKD") between a quantum communication ("QC") card, base station and trusted authority are described herein. In example implementations, a QC card contains a miniaturized QC transmitter and couples with a base station. The base station provides a network connection with the trusted authority and can also provide electric power to the QC card. When coupled to the base station, after authentication by the trusted authority, the QC card acquires keys through QKD with a trust authority. The keys can be used to set up secure communication, for authentication, for access control, or formore » other purposes. The QC card can be implemented as part of a smart phone or other mobile computing device, or the QC card can be used as a fillgun for distribution of the keys.« less

  14. Quantum key distribution using card, base station and trusted authority

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Nordholt, Jane Elizabeth; Hughes, Richard John; Newell, Raymond Thorson

    Techniques and tools for quantum key distribution ("QKD") between a quantum communication ("QC") card, base station and trusted authority are described herein. In example implementations, a QC card contains a miniaturized QC transmitter and couples with a base station. The base station provides a network connection with the trusted authority and can also provide electric power to the QC card. When coupled to the base station, after authentication by the trusted authority, the QC card acquires keys through QKD with a trusted authority. The keys can be used to set up secure communication, for authentication, for access control, or formore » other purposes. The QC card can be implemented as part of a smart phone or other mobile computing device, or the QC card can be used as a fillgun for distribution of the keys.« less

  15. Security challenge to using smartphones for SHM

    NASA Astrophysics Data System (ADS)

    Abueh, Yeka; Liu, Hong

    2016-04-01

    Pervasive smartphones have demonstrated great potential in structural health monitoring (SHM) of civil infrastructures. Their sensing, processing, and communication capabilities along with crowdsourcing facility ease technical difficulties and reduce financial burdens of instrumentation and monitoring for SHM in civil infrastructures. However, smartphones are vulnerable to unintentional misuses and malicious attacks. This paper analyzes the vulnerabilities of smartphones in performing SHM and reveals the exploitation of those vulnerabilities. The work probes the attack surface of both devices and data. Device attack scenarios include hacking individual smartphones to modify the data stored on them and orchestrating smartphones to launch a distributed denial-of-service attack. Specifically, experiments are conducted to remotely access an Android smartphone and modify the sensing data of structural health stored on it. The work also presents a case study that reveals the sensitivity of a popular perturbation analysis method to faulty data delivered by a smartphone. The paper provides the direction of meeting the security challenge to using smartphones for SHM. As the first line of defense, device authentication is implemented in the smartphone to stop spoofing. Subsequently, message authentication is devised to maintain data integrity. There is a need to apply data science for the SHM immunity system against the sensitivity to data inaccuracy. The work also evaluates the cost-effectiveness of the proposed security measures, recommending varying levels of security to mitigate the adversaries to smartphones used in SHM systems. It calls for security solutions at the design stage of SHM systems rather than patching up after their implementations.

  16. Internet of Things (IoT) Based Design of a Secure and Lightweight Body Area Network (BAN) Healthcare System.

    PubMed

    Deng, Yong-Yuan; Chen, Chin-Ling; Tsaur, Woei-Jiunn; Tang, Yung-Wen; Chen, Jung-Hsuan

    2017-12-15

    As sensor networks and cloud computation technologies have rapidly developed over recent years, many services and applications integrating these technologies into daily life have come together as an Internet of Things (IoT). At the same time, aging populations have increased the need for expanded and more efficient elderly care services. Fortunately, elderly people can now wear sensing devices which relay data to a personal wireless device, forming a body area network (BAN). These personal wireless devices collect and integrate patients' personal physiological data, and then transmit the data to the backend of the network for related diagnostics. However, a great deal of the information transmitted by such systems is sensitive data, and must therefore be subject to stringent security protocols. Protecting this data from unauthorized access is thus an important issue in IoT-related research. In regard to a cloud healthcare environment, scholars have proposed a secure mechanism to protect sensitive patient information. Their schemes provide a general architecture; however, these previous schemes still have some vulnerability, and thus cannot guarantee complete security. This paper proposes a secure and lightweight body-sensor network based on the Internet of Things for cloud healthcare environments, in order to address the vulnerabilities discovered in previous schemes. The proposed authentication mechanism is applied to a medical reader to provide a more comprehensive architecture while also providing mutual authentication, and guaranteeing data integrity, user untraceability, and forward and backward secrecy, in addition to being resistant to replay attack.

  17. Flat panel ferroelectric electron emission display system

    DOEpatents

    Sampayan, Stephen E.; Orvis, William J.; Caporaso, George J.; Wieskamp, Ted F.

    1996-01-01

    A device which can produce a bright, raster scanned or non-raster scanned image from a flat panel. Unlike many flat panel technologies, this device does not require ambient light or auxiliary illumination for viewing the image. Rather, this device relies on electrons emitted from a ferroelectric emitter impinging on a phosphor. This device takes advantage of a new electron emitter technology which emits electrons with significant kinetic energy and beam current density.

  18. Provision of magnetic resonance imaging for patients with 'MR-conditional' cardiac implantable electronic devices: an unmet clinical need.

    PubMed

    Sabzevari, Kian; Oldman, James; Herrey, Anna S; Moon, James C; Kydd, Anna C; Manisty, Charlotte

    2017-03-01

    Increasing need for magnetic resonance imaging (MRI) has driven the development of MR-conditional cardiac implantable electronic devices (CIEDs; pacemakers and defibrillators); however, patients still report difficulties obtaining scans. We sought to establish current provision for MRI scanning of patients with CIEDs in England. A survey was distributed to all hospitals in England with MRI, to assess current practice. Information requested included whether hospitals currently offer MRI to this patient group, the number and type of scans acquired, local safety considerations, complications experienced and perceived obstacles to service provision in those departments not currently offering it. Responses were received from 195 of 227 (86%) of hospitals surveyed. Although 98% of departments were aware of MR-conditional devices, only 46% (n = 89) currently offer MRI scans to patients with CIED's; of these, 85% of departments perform ≤10 scans per year. No major complications were reported from MRI scanning in patients with MR-conditional devices. Current barriers to service expansion include perceived concerns regarding potential risk, lack of training, logistical difficulties, and lack of cardiology support. Provision of MRI for patients with CIEDs is currently poor, despite increasing numbers of patients with MR-conditional devices and extremely low reported complication rates. Published on behalf of the European Society of Cardiology. All rights reserved. © The Author 2016. For permissions please email: journals.permissions@oup.com.

  19. System and method for chromatography and electrophoresis using circular optical scanning

    DOEpatents

    Balch, Joseph W.; Brewer, Laurence R.; Davidson, James C.; Kimbrough, Joseph R.

    2001-01-01

    A system and method is disclosed for chromatography and electrophoresis using circular optical scanning. One or more rectangular microchannel plates or radial microchannel plates has a set of analysis channels for insertion of molecular samples. One or more scanning devices repeatedly pass over the analysis channels in one direction at a predetermined rotational velocity and with a predetermined rotational radius. The rotational radius may be dynamically varied so as to monitor the molecular sample at various positions along a analysis channel. Sample loading robots may also be used to input molecular samples into the analysis channels. Radial microchannel plates are built from a substrate whose analysis channels are disposed at a non-parallel angle with respect to each other. A first step in the method accesses either a rectangular or radial microchannel plate, having a set of analysis channels, and second step passes a scanning device repeatedly in one direction over the analysis channels. As a third step, the scanning device is passed over the analysis channels at dynamically varying distances from a centerpoint of the scanning device. As a fourth step, molecular samples are loaded into the analysis channels with a robot.

  20. Predicting scattering scanning near-field optical microscopy of mass-produced plasmonic devices

    NASA Astrophysics Data System (ADS)

    Otto, Lauren M.; Burgos, Stanley P.; Staffaroni, Matteo; Ren, Shen; Süzer, Özgün; Stipe, Barry C.; Ashby, Paul D.; Hammack, Aeron T.

    2018-05-01

    Scattering scanning near-field optical microscopy enables optical imaging and characterization of plasmonic devices with nanometer-scale resolution well below the diffraction limit. This technique enables developers to probe and understand the waveguide-coupled plasmonic antenna in as-fabricated heat-assisted magnetic recording heads. In order to validate and predict results and to extract information from experimental measurements that is physically comparable to simulations, a model was developed to translate the simulated electric field into expected near-field measurements using physical parameters specific to scattering scanning near-field optical microscopy physics. The methods used in this paper prove that scattering scanning near-field optical microscopy can be used to determine critical sub-diffraction-limited dimensions of optical field confinement, which is a crucial metrology requirement for the future of nano-optics, semiconductor photonic devices, and biological sensing where the near-field character of light is fundamental to device operation.

  1. Applying Multi-Touch Technology to Facilitate the Learning of Art Appreciation: From the View of Motivation and Annotation

    ERIC Educational Resources Information Center

    Hung, Hui-Chun; Young, Shelley Shwu-Ching

    2017-01-01

    Handheld technologies with multi-touch functions have been embraced by the young generation and become their important tool for social and learning purposes. The purpose of this study was to explore how the state-of-art devices could be integrated into authentic art appreciation courses to motivate and enhance students' learning. It was conducted…

  2. System and method for evaluating wind flow fields using remote sensing devices

    DOEpatents

    Schroeder, John; Hirth, Brian; Guynes, Jerry

    2016-12-13

    The present invention provides a system and method for obtaining data to determine one or more characteristics of a wind field using a first remote sensing device and a second remote sensing device. Coordinated data is collected from the first and second remote sensing devices and analyzed to determine the one or more characteristics of the wind field. The first remote sensing device is positioned to have a portion of the wind field within a first scanning sector of the first remote sensing device. The second remote sensing device is positioned to have the portion of the wind field disposed within a second scanning sector of the second remote sensing device.

  3. Flat panel ferroelectric electron emission display system

    DOEpatents

    Sampayan, S.E.; Orvis, W.J.; Caporaso, G.J.; Wieskamp, T.F.

    1996-04-16

    A device is disclosed which can produce a bright, raster scanned or non-raster scanned image from a flat panel. Unlike many flat panel technologies, this device does not require ambient light or auxiliary illumination for viewing the image. Rather, this device relies on electrons emitted from a ferroelectric emitter impinging on a phosphor. This device takes advantage of a new electron emitter technology which emits electrons with significant kinetic energy and beam current density. 6 figs.

  4. Device-independent color scanning

    NASA Astrophysics Data System (ADS)

    Burger, Rudolph E.

    1993-08-01

    Color calibration technology is being incorporated into both Apple and Microsoft's operating systems. These color savvy operating systems will produce a market pull towards 'smart color' scanners and printers which, in turn, will lead towards a distributed architecture for color management systems (CMS). Today's desktop scanners produce red-green-blue color signals that do not accurately describe the color of the object being scanned. Future scanners will be self-calibrating and communicate their own 'device profile' to the operating system based CMS. This paper describes some of the key technologies required for this next generation of smart color scanners. Topics covered include a comparison of colorimetric and conventional scanning technologies, and the impact of metamerism, dye fluorescence and chromatic adaptation on device independent color scanning.

  5. Thermally-induced voltage alteration for analysis of microelectromechanical devices

    DOEpatents

    Walraven, Jeremy A.; Cole, Jr., Edward I.

    2002-01-01

    A thermally-induced voltage alteration (TIVA) apparatus and method are disclosed for analyzing a microelectromechanical (MEM) device with or without on-board integrated circuitry. One embodiment of the TIVA apparatus uses constant-current biasing of the MEM device while scanning a focused laser beam over electrically-active members therein to produce localized heating which alters the power demand of the MEM device and thereby changes the voltage of the constant-current source. This changing voltage of the constant-current source can be measured and used in combination with the position of the focused and scanned laser beam to generate an image of any short-circuit defects in the MEM device (e.g. due to stiction or fabrication defects). In another embodiment of the TIVA apparatus, an image can be generated directly from a thermoelectric potential produced by localized laser heating at the location of any short-circuit defects in the MEM device, without any need for supplying power to the MEM device. The TIVA apparatus can be formed, in part, from a scanning optical microscope, and has applications for qualification testing or failure analysis of MEM devices.

  6. Systems and methods for performing wireless financial transactions

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    McCown, Steven Harvey

    2012-07-03

    A secure computing module (SCM) is configured for connection with a host device. The SCM includes a processor for performing secure processing operations, a host interface for coupling the processor to the host device, and a memory connected to the processor wherein the processor logically isolates at least some of the memory from access by the host device. The SCM also includes a proximate-field wireless communicator connected to the processor to communicate with another SCM associated with another host device. The SCM generates a secure digital signature for a financial transaction package and communicates the package and the signature tomore » the other SCM using the proximate-field wireless communicator. Financial transactions are performed from person to person using the secure digital signature of each person's SCM and possibly message encryption. The digital signatures and transaction details are communicated to appropriate financial organizations to authenticate the transaction parties and complete the transaction.« less

  7. Derived virtual devices: a secure distributed file system mechanism

    NASA Technical Reports Server (NTRS)

    VanMeter, Rodney; Hotz, Steve; Finn, Gregory

    1996-01-01

    This paper presents the design of derived virtual devices (DVDs). DVDs are the mechanism used by the Netstation Project to provide secure shared access to network-attached peripherals distributed in an untrusted network environment. DVDs improve Input/Output efficiency by allowing user processes to perform I/O operations directly from devices without intermediate transfer through the controlling operating system kernel. The security enforced at the device through the DVD mechanism includes resource boundary checking, user authentication, and restricted operations, e.g., read-only access. To illustrate the application of DVDs, we present the interactions between a network-attached disk and a file system designed to exploit the DVD abstraction. We further discuss third-party transfer as a mechanism intended to provide for efficient data transfer in a typical NAP environment. We show how DVDs facilitate third-party transfer, and provide the security required in a more open network environment.

  8. A Strategic Design of an Opto-Chemical Security Device with Resettable and Reconfigurable Password Based Upon Dual Channel Two-in-One Chemosensor Molecule.

    PubMed

    Majumdar, Tapas; Haldar, Basudeb; Mallick, Arabinda

    2017-02-20

    A simple strategy is proposed to design and develop an intelligent device based on dual channel ion responsive spectral properties of a commercially available molecule, harmine (HM). The system can process different sets of opto-chemical inputs generating different patterns as fluorescence outputs at specific wavelengths which can provide an additional level of protection exploiting both password and pattern recognitions. The proposed system could have the potential to come up with highly secured combinatorial locks at the molecular level that could pose valuable real time and on-site applications for user authentication.

  9. A Strategic Design of an Opto-Chemical Security Device with Resettable and Reconfigurable Password Based Upon Dual Channel Two-in-One Chemosensor Molecule

    NASA Astrophysics Data System (ADS)

    Majumdar, Tapas; Haldar, Basudeb; Mallick, Arabinda

    2017-02-01

    A simple strategy is proposed to design and develop an intelligent device based on dual channel ion responsive spectral properties of a commercially available molecule, harmine (HM). The system can process different sets of opto-chemical inputs generating different patterns as fluorescence outputs at specific wavelengths which can provide an additional level of protection exploiting both password and pattern recognitions. The proposed system could have the potential to come up with highly secured combinatorial locks at the molecular level that could pose valuable real time and on-site applications for user authentication.

  10. System and method for authentication

    DOEpatents

    Duerksen, Gary L.; Miller, Seth A.

    2015-12-29

    Described are methods and systems for determining authenticity. For example, the method may include providing an object of authentication, capturing characteristic data from the object of authentication, deriving authentication data from the characteristic data of the object of authentication, and comparing the authentication data with an electronic database comprising reference authentication data to provide an authenticity score for the object of authentication. The reference authentication data may correspond to one or more reference objects of authentication other than the object of authentication.

  11. In vivo tooth-color measurement with a new 3D intraoral scanning system in comparison to conventional digital and visual color determination methods.

    PubMed

    Mehl, Albert; Bosch, Gabriel; Fischer, Carolin; Ender, Andreas

    Three-dimensional (3D) intraoral scanning systems allow for the simultaneous acquisition of 3D information about tooth surfaces and a photorealistic view of the patient's tooth colors. The goal of this study was the in vivo comparison of a new 3D scanner with a color acquisition mode and conventional visual and digital color measurements. The colors of 40 teeth of 20 patients were evaluated in seven ways: 1) By dentists using the Vita 3D-Master; 2) By dental technicians using the Vita 3D-Master; 3) With the 3Shape Trios device; 4) With the Vita Easyshade device; 5) With the Vita Easyshade Advance device; 6) With the SpectroShade device; and 7) With the SpectroShade Micro device. Digital measurements of Groups 3 to 7 were repeated three times for each tooth. For all groups, both the CIE Lab values and the Vita 3D-Master values were recorded. The repeatability and relative accuracy of the Vita 3D-Master values were analyzed statistically using Pearson's chi-squared test (α < 0.05). ΔE values were calculated from the CIE Lab values, which served as a basis for performing multidimensional scaling (MDS) and evaluating differences between the groups using the one-way ANOVA with post hoc Tamhane's test (α < 0.05). The results of the ΔE values showed that clinically relevant differences between the evaluation by dentists, dental technicians, and the intraoral scanning device (3Shape) are negligible. The intraoral 3D scanning device (Group 3) and the digital systems (Groups 4 to 7) did not differ significantly in the repeatability of color shade management. The SpectroShade Micro (Group 7) had significantly better relative accuracy than the other devices. The results demonstrate that intraoral scanning systems can be used to measure both tooth color and tooth surface in 3D. Intraoral optical scanning devices allow for the acquisition of accurate 3D surface data. Tooth color can be evaluated simultaneously and can be used to determine the color of restorations without requiring additional conventional color-measurement methods.

  12. Authentic Teachers: Student Criteria Perceiving Authenticity of Teachers

    ERIC Educational Resources Information Center

    De Bruyckere, Pedro; Kirschner, Paul A.

    2016-01-01

    Authenticity is seen by many as a key for good learning and education. There is talk of authentic instruction, authentic learning, authentic problems, authentic assessment, authentic tools and authentic teachers. The problem is that while authenticity is an often-used adjective describing almost all aspects of teaching and learning, the concept…

  13. Inkjet Printing of Lanthanide-Organic Frameworks for Anti-Counterfeiting Applications.

    PubMed

    da Luz, Leonis L; Milani, Raquel; Felix, Jorlandio F; Ribeiro, Igor R B; Talhavini, Márcio; Neto, Brenno A D; Chojnacki, Jaroslaw; Rodrigues, Marcelo O; Júnior, Severino A

    2015-12-16

    Photoluminescent lanthanide-organic frameworks (Ln-MOFs) were printed onto plastic and paper foils with a conventional inkjet printer. Ln-MOF inks were used to reproduce color images that can only be observed under UV light irradiation. This approach opens a new window for exploring Ln-MOF materials in technological applications, such as optical devices (e.g., lab-on-a-chip), as proof of authenticity for official documents.

  14. Low-Cost Manufacturing, Usability, and Security: An Analysis of Bluetooth Simple Pairing and Wi-Fi Protected Setup

    NASA Astrophysics Data System (ADS)

    Kuo, Cynthia; Walker, Jesse; Perrig, Adrian

    Bluetooth Simple Pairing and Wi-Fi Protected Setup specify mechanisms for exchanging authentication credentials in wireless networks. Both Simple Pairing and Protected Setup support multiple setup mechanisms, which increases security risks and hurts the user experience. To improve the security and usability of these specifications, we suggest defining a common baseline for hardware features and a consistent, interoperable user experience across devices.

  15. The Role of Lexical Properties and Cohesive Devices in Text Integration and Their Effect on Human Ratings of Speaking Proficiency

    ERIC Educational Resources Information Center

    Crossley, Scott; Clevinger, Amanda; Kim, YouJin

    2014-01-01

    There has been a growing interest in the use of integrated tasks in the field of second language testing to enhance the authenticity of language tests. However, the role of text integration in test takers' performance has not been widely investigated. The purpose of the current study is to examine the effects of text-based relational (i.e.,…

  16. Keystroke dynamics in the pre-touchscreen era

    PubMed Central

    Ahmad, Nasir; Szymkowiak, Andrea; Campbell, Paul A.

    2013-01-01

    Biometric authentication seeks to measure an individual’s unique physiological attributes for the purpose of identity verification. Conventionally, this task has been realized via analyses of fingerprints or signature iris patterns. However, whilst such methods effectively offer a superior security protocol compared with password-based approaches for example, their substantial infrastructure costs, and intrusive nature, make them undesirable and indeed impractical for many scenarios. An alternative approach seeks to develop similarly robust screening protocols through analysis of typing patterns, formally known as keystroke dynamics. Here, keystroke analysis methodologies can utilize multiple variables, and a range of mathematical techniques, in order to extract individuals’ typing signatures. Such variables may include measurement of the period between key presses, and/or releases, or even key-strike pressures. Statistical methods, neural networks, and fuzzy logic have often formed the basis for quantitative analysis on the data gathered, typically from conventional computer keyboards. Extension to more recent technologies such as numerical keypads and touch-screen devices is in its infancy, but obviously important as such devices grow in popularity. Here, we review the state of knowledge pertaining to authentication via conventional keyboards with a view toward indicating how this platform of knowledge can be exploited and extended into the newly emergent type-based technological contexts. PMID:24391568

  17. Keystroke dynamics in the pre-touchscreen era.

    PubMed

    Ahmad, Nasir; Szymkowiak, Andrea; Campbell, Paul A

    2013-12-19

    Biometric authentication seeks to measure an individual's unique physiological attributes for the purpose of identity verification. Conventionally, this task has been realized via analyses of fingerprints or signature iris patterns. However, whilst such methods effectively offer a superior security protocol compared with password-based approaches for example, their substantial infrastructure costs, and intrusive nature, make them undesirable and indeed impractical for many scenarios. An alternative approach seeks to develop similarly robust screening protocols through analysis of typing patterns, formally known as keystroke dynamics. Here, keystroke analysis methodologies can utilize multiple variables, and a range of mathematical techniques, in order to extract individuals' typing signatures. Such variables may include measurement of the period between key presses, and/or releases, or even key-strike pressures. Statistical methods, neural networks, and fuzzy logic have often formed the basis for quantitative analysis on the data gathered, typically from conventional computer keyboards. Extension to more recent technologies such as numerical keypads and touch-screen devices is in its infancy, but obviously important as such devices grow in popularity. Here, we review the state of knowledge pertaining to authentication via conventional keyboards with a view toward indicating how this platform of knowledge can be exploited and extended into the newly emergent type-based technological contexts.

  18. Improvement of the Raman detection system for pesticide residues on/in fruits and vegetables

    NASA Astrophysics Data System (ADS)

    Li, Yan; Peng, Yankun; Zhai, Chen; Chao, Kuanglin; Qin, Jianwei

    2017-05-01

    Pesticide residue is one of the major challenges to fruits safety, while the traditional detection methods of pesticide residue on fruits and vegetables can't afford the demand of rapid detection in actual production because of timeconsuming. Thus rapid identification and detection methods for pesticide residue are urgently needed at present. While most Raman detection systems in the market are spot detection systems, which limits the range of application. In the study, our lab develops a Raman detection system to achieve area-scan thorough the self-developed spot detection Raman system with a control software and two devices. In the system, the scanning area is composed of many scanning spots, which means every spot needs to be detected and more time will be taken than area-scan Raman system. But lower detection limit will be achieved in this method. And some detection device is needed towards fruits and vegetables in different shape. Two detection devices are developed to detect spherical fruits and leaf vegetables. During the detection, the device will make spherical fruit rotate along its axis of symmetry, and leaf vegetables will be pressed in the test surface smoothly. The detection probe will be set to keep a proper distance to the surface of fruits and vegetables. It should make sure the laser shins on the surface of spherical fruit vertically. And two software are used to detect spherical fruits and leaf vegetables will be integrated to one, which make the operator easier to switch. Accordingly two detection devices for spherical fruits and leaf vegetables will also be portable devices to make it easier to change. In the study, a new way is developed to achieve area-scan result by spot-scan Raman detection system.

  19. Rotating-unbalanced-mass Devices for Scanning Balloon-borne Experiments, Free-flying Spacecraft, and Space Shuttle/space Station Experiments

    NASA Technical Reports Server (NTRS)

    Polites, Michael E.

    1990-01-01

    A new method is presented for scanning balloon-borne experiments, free-flying spacecraft, and gimballed experiments mounted to the space shuttle or the space station. It uses rotating-unbalanced-mass (RUM) devices for generating circular, line, or raster scan patterns and an auxiliary control system for target acquisition, keeping the scan centered on the target, and producing complementary motion for raster scanning. It is ideal for applications where the only possible way to accomplish the required scan is to physically scan the entire experiment or spacecraft as in x ray and gamma ray experiments. In such cases, this new method should have advantages over prior methods in terms of either power, weight, cost, performance, stability, or a combination of these.

  20. Line-scan spatially offset Raman spectroscopy for inspecting subsurface food safety and quality

    NASA Astrophysics Data System (ADS)

    Qin, Jianwei; Chao, Kuanglin; Kim, Moon S.

    2016-05-01

    This paper presented a method for subsurface food inspection using a newly developed line-scan spatially offset Raman spectroscopy (SORS) technique. A 785 nm laser was used as a Raman excitation source. The line-shape SORS data was collected in a wavenumber range of 0-2815 cm-1 using a detection module consisting of an imaging spectrograph and a CCD camera. A layered sample, which was created by placing a plastic sheet cut from the original container on top of cane sugar, was used to test the capability for subsurface food inspection. A whole set of SORS data was acquired in an offset range of 0-36 mm (two sides of the laser) with a spatial interval of 0.07 mm. Raman spectrum from the cane sugar under the plastic sheet was resolved using self-modeling mixture analysis algorithms, demonstrating the potential of the technique for authenticating foods and ingredients through packaging. The line-scan SORS measurement technique provides a new method for subsurface inspection of food safety and quality.

  1. Internet of Things (IoT) Based Design of a Secure and Lightweight Body Area Network (BAN) Healthcare System

    PubMed Central

    Deng, Yong-Yuan; Chen, Chin-Ling; Tsaur, Woei-Jiunn; Tang, Yung-Wen; Chen, Jung-Hsuan

    2017-01-01

    As sensor networks and cloud computation technologies have rapidly developed over recent years, many services and applications integrating these technologies into daily life have come together as an Internet of Things (IoT). At the same time, aging populations have increased the need for expanded and more efficient elderly care services. Fortunately, elderly people can now wear sensing devices which relay data to a personal wireless device, forming a body area network (BAN). These personal wireless devices collect and integrate patients’ personal physiological data, and then transmit the data to the backend of the network for related diagnostics. However, a great deal of the information transmitted by such systems is sensitive data, and must therefore be subject to stringent security protocols. Protecting this data from unauthorized access is thus an important issue in IoT-related research. In regard to a cloud healthcare environment, scholars have proposed a secure mechanism to protect sensitive patient information. Their schemes provide a general architecture; however, these previous schemes still have some vulnerability, and thus cannot guarantee complete security. This paper proposes a secure and lightweight body-sensor network based on the Internet of Things for cloud healthcare environments, in order to address the vulnerabilities discovered in previous schemes. The proposed authentication mechanism is applied to a medical reader to provide a more comprehensive architecture while also providing mutual authentication, and guaranteeing data integrity, user untraceability, and forward and backward secrecy, in addition to being resistant to replay attack. PMID:29244776

  2. Safe Active Scanning for Energy Delivery Systems Final Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Helms, J.; Salazar, B.; Scheibel, P.

    The Department of Energy’s Cybersecurity for Energy Delivery Systems Program has funded Safe(r) Active Scanning for Energy Delivery Systems, led by Lawrence Livermore National Laboratory, to investigate and analyze the impacts of active scanning in the operational environment of energy delivery systems. In collaboration with Pacific Northwest National Laboratory and Idaho National Laboratory, active scans across three testbeds including 38 devices were performed. This report gives a summary of the initial literature survey performed on the SASEDS project as well as industry partner interview summaries and main findings from Phase 1 of the project. Additionally, the report goes into themore » details of scanning techniques, methodologies for testing, testbed descriptions, and scanning results, with appendices to elaborate on the specific scans that were performed. As a result of testing, a single device out of 38 exhibited problems when actively scanned, and a reboot was required to fix it. This single failure indicates that active scanning is not likely to have a detrimental effect on the safety and resilience of energy delivery systems. We provide a path forward for future research that could enable wide adoption of active scanning and lead utilities to incorporate active scanning as part of their default network security plans to discover and rectify rogue devices, adversaries, and services that may be on the network. This increased network visibility will allow operational technology cybersecurity practitioners to improve their situational awareness of networks and their vulnerabilities.« less

  3. Candidate DNA Barcode Tags Combined With High Resolution Melting (Bar-HRM) Curve Analysis for Authentication of Senna alexandrina Mill. With Validation in Crude Drugs.

    PubMed

    Mishra, Priyanka; Shukla, Ashutosh K; Sundaresan, Velusamy

    2018-01-01

    Senna alexandrina (Fabaceae) is a globally recognized medicinal plant for its laxative properties as well as the only source of sennosides, and is highly exported bulk herb from India. Its major procurement is exclusively from limited cultivation, which leads to risks of deliberate or unintended adulteration. The market raw materials are in powdered or finished product form, which lead to difficulties in authentication. Here, DNA barcode tags based on chloroplast genes ( rbcL and matK ) and intergenic spacers ( psbA-trnH and ITS ) were developed for S. alexandrina along with the allied species. The ability and performance of the ITS1 region to discriminate among the Senna species resulted in the present proposal of the ITS1 tags as successful barcode. Further, these tags were coupled with high-resolution melting (HRM) curve analysis in a real-time PCR genotyping method to derive Bar-HRM (Barcoding-HRM) assays. Suitable HRM primer sets were designed through SNP detection and mutation scanning in genomic signatures of Senna species. The melting profiles of S. alexandrina and S . italica subsp. micrantha were almost identical and the remaining five species were clearly separated so that they can be differentiated by HRM method. The sensitivity of the method was utilized to authenticate market samples [Herbal Sample Assays (HSAs)]. HSA01 ( S. alexandrina crude drug sample from Bangalore) and HSA06 ( S. alexandrina crude drug sample from Tuticorin, Tamil Nadu, India) were found to be highly contaminated with S . italica subsp. micrantha . Species admixture samples mixed in varying percentage was identified sensitively with detection of contamination as low as 1%. The melting profiles of PCR amplicons are clearly distinct, which enables the authentic differentiation of species by the HRM method. This study reveals that DNA barcoding coupled with HRM is an efficient molecular tool to authenticate Senna herbal products in the market for quality control in the drug supply chain. CIMAP Communication Number: CIMAP/PUB/2017/31.

  4. Candidate DNA Barcode Tags Combined With High Resolution Melting (Bar-HRM) Curve Analysis for Authentication of Senna alexandrina Mill. With Validation in Crude Drugs

    PubMed Central

    Mishra, Priyanka; Shukla, Ashutosh K.; Sundaresan, Velusamy

    2018-01-01

    Senna alexandrina (Fabaceae) is a globally recognized medicinal plant for its laxative properties as well as the only source of sennosides, and is highly exported bulk herb from India. Its major procurement is exclusively from limited cultivation, which leads to risks of deliberate or unintended adulteration. The market raw materials are in powdered or finished product form, which lead to difficulties in authentication. Here, DNA barcode tags based on chloroplast genes (rbcL and matK) and intergenic spacers (psbA-trnH and ITS) were developed for S. alexandrina along with the allied species. The ability and performance of the ITS1 region to discriminate among the Senna species resulted in the present proposal of the ITS1 tags as successful barcode. Further, these tags were coupled with high-resolution melting (HRM) curve analysis in a real-time PCR genotyping method to derive Bar-HRM (Barcoding-HRM) assays. Suitable HRM primer sets were designed through SNP detection and mutation scanning in genomic signatures of Senna species. The melting profiles of S. alexandrina and S. italica subsp. micrantha were almost identical and the remaining five species were clearly separated so that they can be differentiated by HRM method. The sensitivity of the method was utilized to authenticate market samples [Herbal Sample Assays (HSAs)]. HSA01 (S. alexandrina crude drug sample from Bangalore) and HSA06 (S. alexandrina crude drug sample from Tuticorin, Tamil Nadu, India) were found to be highly contaminated with S. italica subsp. micrantha. Species admixture samples mixed in varying percentage was identified sensitively with detection of contamination as low as 1%. The melting profiles of PCR amplicons are clearly distinct, which enables the authentic differentiation of species by the HRM method. This study reveals that DNA barcoding coupled with HRM is an efficient molecular tool to authenticate Senna herbal products in the market for quality control in the drug supply chain. CIMAP Communication Number: CIMAP/PUB/2017/31 PMID:29593755

  5. On the security of consumer wearable devices in the Internet of Things.

    PubMed

    Tahir, Hasan; Tahir, Ruhma; McDonald-Maier, Klaus

    2018-01-01

    Miniaturization of computer hardware and the demand for network capable devices has resulted in the emergence of a new class of technology called wearable computing. Wearable devices have many purposes like lifestyle support, health monitoring, fitness monitoring, entertainment, industrial uses, and gaming. Wearable devices are hurriedly being marketed in an attempt to capture an emerging market. Owing to this, some devices do not adequately address the need for security. To enable virtualization and connectivity wearable devices sense and transmit data, therefore it is essential that the device, its data and the user are protected. In this paper the use of novel Integrated Circuit Metric (ICMetric) technology for the provision of security in wearable devices has been suggested. ICMetric technology uses the features of a device to generate an identification which is then used for the provision of cryptographic services. This paper explores how a device ICMetric can be generated by using the accelerometer and gyroscope sensor. Since wearable devices often operate in a group setting the work also focuses on generating a group identification which is then used to deliver services like authentication, confidentiality, secure admission and symmetric key generation. Experiment and simulation results prove that the scheme offers high levels of security without compromising on resource demands.

  6. On the security of consumer wearable devices in the Internet of Things

    PubMed Central

    Tahir, Hasan; Tahir, Ruhma; McDonald-Maier, Klaus

    2018-01-01

    Miniaturization of computer hardware and the demand for network capable devices has resulted in the emergence of a new class of technology called wearable computing. Wearable devices have many purposes like lifestyle support, health monitoring, fitness monitoring, entertainment, industrial uses, and gaming. Wearable devices are hurriedly being marketed in an attempt to capture an emerging market. Owing to this, some devices do not adequately address the need for security. To enable virtualization and connectivity wearable devices sense and transmit data, therefore it is essential that the device, its data and the user are protected. In this paper the use of novel Integrated Circuit Metric (ICMetric) technology for the provision of security in wearable devices has been suggested. ICMetric technology uses the features of a device to generate an identification which is then used for the provision of cryptographic services. This paper explores how a device ICMetric can be generated by using the accelerometer and gyroscope sensor. Since wearable devices often operate in a group setting the work also focuses on generating a group identification which is then used to deliver services like authentication, confidentiality, secure admission and symmetric key generation. Experiment and simulation results prove that the scheme offers high levels of security without compromising on resource demands. PMID:29668756

  7. Digital Thickness Measurement of a Transparent Plastic Orthodontic Device

    NASA Astrophysics Data System (ADS)

    Kim, Yoon-Hwan; Rhim, Sung-Han

    2018-05-01

    A transparent orthodontic device is used to move the teeth to the final calibration position to form a proper set of teeth. Because the uniform thickness of the device plays an important role in tooth positioning, the accuracy of the device's thickness profile is important for effective orthodontic treatment. However, due to the complexity of the device's geometry and the transparency of the device's material, measuring the complete thickness profile has been difficult. In the present study, a new optical scanning method to measure the thickness profile of transparent plastic orthodontic devices is proposed and evaluated by using scanning electron microscopy (SEM). The error of the new measurement method is less than ±18 μm. The new method can be used to measure the thickness of non-specific, multi-curved, transparent orthodontic devices.

  8. Two-dimensional scanning high-energy particle diagnostic system in Large Helical Device

    NASA Astrophysics Data System (ADS)

    Ozaki, T.; Goncharov, P.; Sudo, S.; Shoji, M.; Kawahata, K.; Kaneko, O.; Murakami, S.

    2004-10-01

    A high-energy neutral particle measurement is one of the important diagnostics for ion temperature and high-energy particle confinement analysis. The neutral particle analyzer in the large helical device is capable of wide range scanning as a feature. We have obtained various data using the horizontal scan of the analyzer. Recently, in addition to the horizontal scan, a high-speed perpendicular scan became possible which enables acquisition of new information in the poloidal direction. Two stainless blocks are set on the opposite sides of the chain in order to balance the weight (700 kg) of the analyzer and reduce the load for the motor. Therefore a very high scan speed of 1°/s can be obtained. The scanning speed is 1°/s. By adding the vertical scan, the ion temperature profile and the radial variation of the signal loss associated with the resonant loss was obtained in preliminary experimental results.

  9. A versatile LabVIEW and field-programmable gate array-based scanning probe microscope for in operando electronic device characterization.

    PubMed

    Berger, Andrew J; Page, Michael R; Jacob, Jan; Young, Justin R; Lewis, Jim; Wenzel, Lothar; Bhallamudi, Vidya P; Johnston-Halperin, Ezekiel; Pelekhov, Denis V; Hammel, P Chris

    2014-12-01

    Understanding the complex properties of electronic and spintronic devices at the micro- and nano-scale is a topic of intense current interest as it becomes increasingly important for scientific progress and technological applications. In operando characterization of such devices by scanning probe techniques is particularly well-suited for the microscopic study of these properties. We have developed a scanning probe microscope (SPM) which is capable of both standard force imaging (atomic, magnetic, electrostatic) and simultaneous electrical transport measurements. We utilize flexible and inexpensive FPGA (field-programmable gate array) hardware and a custom software framework developed in National Instrument's LabVIEW environment to perform the various aspects of microscope operation and device measurement. The FPGA-based approach enables sensitive, real-time cantilever frequency-shift detection. Using this system, we demonstrate electrostatic force microscopy of an electrically biased graphene field-effect transistor device. The combination of SPM and electrical transport also enables imaging of the transport response to a localized perturbation provided by the scanned cantilever tip. Facilitated by the broad presence of LabVIEW in the experimental sciences and the openness of our software solution, our system permits a wide variety of combined scanning and transport measurements by providing standardized interfaces and flexible access to all aspects of a measurement (input and output signals, and processed data). Our system also enables precise control of timing (synchronization of scanning and transport operations) and implementation of sophisticated feedback protocols, and thus should be broadly interesting and useful to practitioners in the field.

  10. A versatile LabVIEW and field-programmable gate array-based scanning probe microscope for in operando electronic device characterization

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Berger, Andrew J., E-mail: berger.156@osu.edu; Page, Michael R.; Young, Justin R.

    Understanding the complex properties of electronic and spintronic devices at the micro- and nano-scale is a topic of intense current interest as it becomes increasingly important for scientific progress and technological applications. In operando characterization of such devices by scanning probe techniques is particularly well-suited for the microscopic study of these properties. We have developed a scanning probe microscope (SPM) which is capable of both standard force imaging (atomic, magnetic, electrostatic) and simultaneous electrical transport measurements. We utilize flexible and inexpensive FPGA (field-programmable gate array) hardware and a custom software framework developed in National Instrument's LabVIEW environment to perform themore » various aspects of microscope operation and device measurement. The FPGA-based approach enables sensitive, real-time cantilever frequency-shift detection. Using this system, we demonstrate electrostatic force microscopy of an electrically biased graphene field-effect transistor device. The combination of SPM and electrical transport also enables imaging of the transport response to a localized perturbation provided by the scanned cantilever tip. Facilitated by the broad presence of LabVIEW in the experimental sciences and the openness of our software solution, our system permits a wide variety of combined scanning and transport measurements by providing standardized interfaces and flexible access to all aspects of a measurement (input and output signals, and processed data). Our system also enables precise control of timing (synchronization of scanning and transport operations) and implementation of sophisticated feedback protocols, and thus should be broadly interesting and useful to practitioners in the field.« less

  11. Multi-beam and single-chip LIDAR with discrete beam steering by digital micromirror device

    NASA Astrophysics Data System (ADS)

    Rodriguez, Joshua; Smith, Braden; Hellman, Brandon; Gin, Adley; Espinoza, Alonzo; Takashima, Yuzuru

    2018-02-01

    A novel Digital Micromirror Device (DMD) based beam steering enables a single chip Light Detection and Ranging (LIDAR) system for discrete scanning points. We present increasing number of scanning point by using multiple laser diodes for Multi-beam and Single-chip DMD-based LIDAR.

  12. 76 FR 52970 - In the Matter of Certain Biometric Scanning Devices, Components Thereof, Associated Software, and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-24

    ... INTERNATIONAL TRADE COMMISSION [Investigation No. 337-TA-720] In the Matter of Certain Biometric... accessing its Internet server at http://www.usitc.gov . The public record for this investigation may be... certain biometric scanning devices, components thereof, associated software, and products containing the...

  13. Development of scanning graphene Hall probes for magnetic microscopy

    NASA Astrophysics Data System (ADS)

    Schaefer, Brian T.; Wang, Lei; McEuen, Paul L.; Nowack, Katja C.

    We discuss our progress on developing scanning Hall probes fabricated from hexagonal boron nitride (hBN)-encapsulated graphene, with the goal to image magnetic fields with submicron resolution. In contrast to scanning superconducting quantum interference device (SQUID) microscopy, this technique is compatible with a large applied magnetic field and not limited to cryogenic temperatures. The field sensitivity of a Hall probe depends inversely on carrier density, while the primary source of noise in the measurement is Johnson noise originating from the device resistance. hBN-encapsulated graphene demonstrates high carrier mobility at low carrier densities, therefore making it an ideal material for sensitive Hall probes. Furthermore, engineering the dielectric environment of graphene by encapsulating in hBN reduces low-frequency charge noise and disorder from the substrate. We outline our plans for adapting these devices for scanning, including characterization of the point spread function with a scanned current loop and fabrication of a deep-etched structure that enables positioning the sensitive area within 100 nanometers of the sample surface.

  14. Control electronics for a multi-laser/multi-detector scanning system

    NASA Technical Reports Server (NTRS)

    Kennedy, W.

    1980-01-01

    The Mars Rover Laser Scanning system uses a precision laser pointing mechanism, a photodetector array, and the concept of triangulation to perform three dimensional scene analysis. The system is used for real time terrain sensing and vision. The Multi-Laser/Multi-Detector laser scanning system is controlled by a digital device called the ML/MD controller. A next generation laser scanning system, based on the Level 2 controller, is microprocessor based. The new controller capabilities far exceed those of the ML/MD device. The first draft circuit details and general software structure are presented.

  15. Definition and design of an experiment to test raster scanning with rotating unbalanced-mass devices on gimbaled payloads

    NASA Technical Reports Server (NTRS)

    Lightsey, W. D.; Alhorn, D. C.; Polites, M. E.

    1992-01-01

    An experiment designed to test the feasibility of using rotating unbalanced-mass (RUM) devices for line and raster scanning gimbaled payloads, while expending very little power is described. The experiment is configured for ground-based testing, but the scan concept is applicable to ground-based, balloon-borne, and space-based payloads, as well as free-flying spacecraft. The servos used in scanning are defined; the electronic hardware is specified; and a computer simulation model of the system is described. Simulation results are presented that predict system performance and verify the servo designs.

  16. Huffman and linear scanning methods with statistical language models.

    PubMed

    Roark, Brian; Fried-Oken, Melanie; Gibbons, Chris

    2015-03-01

    Current scanning access methods for text generation in AAC devices are limited to relatively few options, most notably row/column variations within a matrix. We present Huffman scanning, a new method for applying statistical language models to binary-switch, static-grid typing AAC interfaces, and compare it to other scanning options under a variety of conditions. We present results for 16 adults without disabilities and one 36-year-old man with locked-in syndrome who presents with complex communication needs and uses AAC scanning devices for writing. Huffman scanning with a statistical language model yielded significant typing speedups for the 16 participants without disabilities versus any of the other methods tested, including two row/column scanning methods. A similar pattern of results was found with the individual with locked-in syndrome. Interestingly, faster typing speeds were obtained with Huffman scanning using a more leisurely scan rate than relatively fast individually calibrated scan rates. Overall, the results reported here demonstrate great promise for the usability of Huffman scanning as a faster alternative to row/column scanning.

  17. Scalable Engineering of Quantum Optical Information Processing Architectures (SEQUOIA)

    DTIC Science & Technology

    2016-12-13

    arrays. Figure 4: An 8-channel fiber-coupled SNSPD array. 1.4 Post -fabrication-tunable linear optic fabrication We have analyzed the...performance of the programmable nanophotonic processor (PNP) that is dynamically tunable via post -fabrication active phase tuning to predict the scaling of...various device losses. PACS numbers: 42.50. Ex , 03.67.Dd, 03.67.Lx, 42.50.Dv I. INTRODUCTION Quantum key distribution (QKD) enables two distant authenticated

  18. Actor-network Procedures: Modeling Multi-factor Authentication, Device Pairing, Social Interactions

    DTIC Science & Technology

    2011-08-29

    unmodifiable properties of your body; or the capabilities that you cannot convey to others, such as your handwriting . An identity can thus be determined by...network, two principals with the same set of secrets but, say , different computational powers, can be distinguished by timing their responses. Or they... says that configurations are finite sets. Partially ordered multisets, or pomsets were introduced and extensively studied by Vaughan Pratt and his

  19. A novel near real-time laser scanning device for geometrical determination of pleural cavity surface.

    PubMed

    Kim, Michele M; Zhu, Timothy C

    2013-02-02

    During HPPH-mediated pleural photodynamic therapy (PDT), it is critical to determine the anatomic geometry of the pleural surface quickly as there may be movement during treatment resulting in changes with the cavity. We have developed a laser scanning device for this purpose, which has the potential to obtain the surface geometry in real-time. A red diode laser with a holographic template to create a pattern and a camera with auto-focusing abilities are used to scan the cavity. In conjunction with a calibration with a known surface, we can use methods of triangulation to reconstruct the surface. Using a chest phantom, we are able to obtain a 360 degree scan of the interior in under 1 minute. The chest phantom scan was compared to an existing CT scan to determine its accuracy. The laser-camera separation can be determined through the calibration with 2mm accuracy. The device is best suited for environments that are on the scale of a chest cavity (between 10cm and 40cm). This technique has the potential to produce cavity geometry in real-time during treatment. This would enable PDT treatment dosage to be determined with greater accuracy. Works are ongoing to build a miniaturized device that moves the light source and camera via a fiber-optics bundle commonly used for endoscopy with increased accuracy.

  20. Are Portable Stereophotogrammetric Devices Reliable in Facial Imaging? A Validation Study of VECTRA H1 Device.

    PubMed

    Gibelli, Daniele; Pucciarelli, Valentina; Cappella, Annalisa; Dolci, Claudia; Sforza, Chiarella

    2018-01-31

    Modern 3-dimensional (3D) image acquisition systems represent a crucial technologic development in facial anatomy because of their accuracy and precision. The recently introduced portable devices can improve facial databases by increasing the number of applications. In the present study, the VECTRA H1 portable stereophotogrammetric device was validated to verify its applicability to 3D facial analysis. Fifty volunteers underwent 4 facial scans using portable VECTRA H1 and static VECTRA M3 devices (2 for each instrument). Repeatability of linear, angular, surface area, and volume measurements was verified within the device and between devices using the Bland-Altman test and the calculation of absolute and relative technical errors of measurement (TEM and rTEM, respectively). In addition, the 2 scans obtained by the same device and the 2 scans obtained by different devices were registered and superimposed to calculate the root mean square (RMS; point-to-point) distance between the 2 surfaces. Most linear, angular, and surface area measurements had high repeatability in M3 versus M3, H1 versus H1, and M3 versus H1 comparisons (range, 82.2 to 98.7%; TEM range, 0.3 to 2.0 mm, 0.4° to 1.8°; rTEM range, 0.2 to 3.1%). In contrast, volumes and RMS distances showed evident differences in M3 versus M3 and H1 versus H1 comparisons and reached the maximum when scans from the 2 different devices were compared. The portable VECTRA H1 device proved reliable for assessing linear measurements, angles, and surface areas; conversely, the influence of involuntary facial movements on volumes and RMS distances was more important compared with the static device. Copyright © 2018 American Association of Oral and Maxillofacial Surgeons. Published by Elsevier Inc. All rights reserved.

  1. Supervised Multi-Authority Scheme with Blind Signature for IoT with Attribute Based Encryption

    NASA Astrophysics Data System (ADS)

    Nissenbaum, O. V.; Ponomarov, K. Y.; Zaharov, A. A.

    2018-04-01

    This article proposes a three-side cryptographic scheme for verifying device attributes with a Supervisor and a Certification Authority (CA) for attribute-based encryption. Two options are suggested: using a message authentication code and using a digital signature. The first version is suitable for networks with one CA, and the second one for networks with several CAs, including dynamic systems. Also, the addition of this scheme with a blind signature is proposed to preserve the confidentiality of the device attributes from the CA. The introduction gives a definition and a brief historical overview of attribute-based encryption (ABE), addresses the use of ABE in the Internet of Things.

  2. Transmissive liquid-crystal device correcting primary coma aberration and astigmatism in laser scanning microscopy

    NASA Astrophysics Data System (ADS)

    Tanabe, Ayano; Hibi, Terumasa; Ipponjima, Sari; Matsumoto, Kenji; Yokoyama, Masafumi; Kurihara, Makoto; Hashimoto, Nobuyuki; Nemoto, Tomomi

    2016-03-01

    Laser scanning microscopy allows 3D cross-sectional imaging inside biospecimens. However, certain aberrations produced can degrade the quality of the resulting images. We previously reported a transmissive liquid-crystal device that could compensate for the predominant spherical aberrations during the observations, particularly in deep regions of the samples. The device, inserted between the objective lens and the microscope revolver, improved the image quality of fixed-mouse-brain slices that were observed using two-photon excitation laser scanning microscopy, which was originally degraded by spherical aberration. In this study, we developed a transmissive device that corrects primary coma aberration and astigmatism, motivated by the fact that these asymmetric aberrations can also often considerably deteriorate image quality, even near the sample surface. The device's performance was evaluated by observing fluorescent beads using single-photon excitation laser scanning microscopy. The fluorescence intensity in the image of the bead under a cover slip tilted in the y-direction was increased by 1.5 times after correction by the device. Furthermore, the y- and z-widths of the imaged bead were reduced to 66% and 65%, respectively. On the other hand, for the imaged bead sucked into a glass capillary in the longitudinal x-direction, correction with the device increased the fluorescence intensity by 2.2 times compared to that of the aberrated image. In addition, the x-, y-, and z-widths of the bead image were reduced to 75%, 53%, and 40%, respectively. Our device successfully corrected several asymmetric aberrations to improve the fluorescent signal and spatial resolution, and might be useful for observing various biospecimens.

  3. Comparing Scanning Modes for Youths with Cerebral Palsy. Final Report.

    ERIC Educational Resources Information Center

    Ottenbacher, Kenneth J.; Angelo, Jennifer

    This study of 22 individuals (ages 13-20) with cerebral palsy investigated the use of scanning, an interface technique that allows access to assistive devices such as communication boards, electronic augmentative communication devices, and computers by using a pointer, either a finger or a cursor. This packet of information includes the findings…

  4. In situ scanning tunneling microscope tip treatment device for spin polarization imaging

    DOEpatents

    Li, An-Ping [Oak Ridge, TN; Jianxing, Ma [Oak Ridge, TN; Shen, Jian [Knoxville, TN

    2008-04-22

    A tip treatment device for use in an ultrahigh vacuum in situ scanning tunneling microscope (STM). The device provides spin polarization functionality to new or existing variable temperature STM systems. The tip treatment device readily converts a conventional STM to a spin-polarized tip, and thereby converts a standard STM system into a spin-polarized STM system. The tip treatment device also has functions of tip cleaning and tip flashing a STM tip to high temperature (>2000.degree. C.) in an extremely localized fashion. Tip coating functions can also be carried out, providing the tip sharp end with monolayers of coating materials including magnetic films. The device is also fully compatible with ultrahigh vacuum sample transfer setups.

  5. Scanning SQUID sampler with 40-ps time resolution

    NASA Astrophysics Data System (ADS)

    Cui, Zheng; Kirtley, John R.; Wang, Yihua; Kratz, Philip A.; Rosenberg, Aaron J.; Watson, Christopher A.; Gibson, Gerald W.; Ketchen, Mark B.; Moler, Kathryn. A.

    2017-08-01

    Scanning Superconducting QUantum Interference Device (SQUID) microscopy provides valuable information about magnetic properties of materials and devices. The magnetic flux response of the SQUID is often linearized with a flux-locked feedback loop, which limits the response time to microseconds or longer. In this work, we present the design, fabrication, and characterization of a novel scanning SQUID sampler with a 40-ps time resolution and linearized response to periodically triggered signals. Other design features include a micron-scale pickup loop for the detection of local magnetic flux, a field coil to apply a local magnetic field to the sample, and a modulation coil to operate the SQUID sampler in a flux-locked loop to linearize the flux response. The entire sampler device is fabricated on a 2 mm × 2 mm chip and can be scanned over macroscopic planar samples. The flux noise at 4.2 K with 100 kHz repetition rate and 1 s of averaging is of order 1 mΦ0. This SQUID sampler will be useful for imaging dynamics in magnetic and superconducting materials and devices.

  6. Scanning SQUID sampler with 40-ps time resolution.

    PubMed

    Cui, Zheng; Kirtley, John R; Wang, Yihua; Kratz, Philip A; Rosenberg, Aaron J; Watson, Christopher A; Gibson, Gerald W; Ketchen, Mark B; Moler, Kathryn A

    2017-08-01

    Scanning Superconducting QUantum Interference Device (SQUID) microscopy provides valuable information about magnetic properties of materials and devices. The magnetic flux response of the SQUID is often linearized with a flux-locked feedback loop, which limits the response time to microseconds or longer. In this work, we present the design, fabrication, and characterization of a novel scanning SQUID sampler with a 40-ps time resolution and linearized response to periodically triggered signals. Other design features include a micron-scale pickup loop for the detection of local magnetic flux, a field coil to apply a local magnetic field to the sample, and a modulation coil to operate the SQUID sampler in a flux-locked loop to linearize the flux response. The entire sampler device is fabricated on a 2 mm × 2 mm chip and can be scanned over macroscopic planar samples. The flux noise at 4.2 K with 100 kHz repetition rate and 1 s of averaging is of order 1 mΦ 0 . This SQUID sampler will be useful for imaging dynamics in magnetic and superconducting materials and devices.

  7. Fast scan control for deflection type mass spectrometers

    NASA Technical Reports Server (NTRS)

    Yeager, P. R.; Gaetano, G.; Hughes, D. B. (Inventor)

    1974-01-01

    A high speed scan device is reported that allows most any scanning sector mass spectrometer to measure preselected gases at a very high sampling rate. The device generates a rapidly changing staircase output which is applied to the accelerator of the spectrometer and it also generates defocusing pulses that are applied to one of the deflecting plates of the spectrometer which when shorted to ground deflects the ion beam away from the collector. A defocusing pulse occurs each time there is a change in the staircase output.

  8. Authenticity examination of compressed audio recordings using detection of multiple compression and encoders' identification.

    PubMed

    Korycki, Rafal

    2014-05-01

    Since the appearance of digital audio recordings, audio authentication has been becoming increasingly difficult. The currently available technologies and free editing software allow a forger to cut or paste any single word without audible artifacts. Nowadays, the only method referring to digital audio files commonly approved by forensic experts is the ENF criterion. It consists in fluctuation analysis of the mains frequency induced in electronic circuits of recording devices. Therefore, its effectiveness is strictly dependent on the presence of mains signal in the recording, which is a rare occurrence. Recently, much attention has been paid to authenticity analysis of compressed multimedia files and several solutions were proposed for detection of double compression in both digital video and digital audio. This paper addresses the problem of tampering detection in compressed audio files and discusses new methods that can be used for authenticity analysis of digital recordings. Presented approaches consist in evaluation of statistical features extracted from the MDCT coefficients as well as other parameters that may be obtained from compressed audio files. Calculated feature vectors are used for training selected machine learning algorithms. The detection of multiple compression covers up tampering activities as well as identification of traces of montage in digital audio recordings. To enhance the methods' robustness an encoder identification algorithm was developed and applied based on analysis of inherent parameters of compression. The effectiveness of tampering detection algorithms is tested on a predefined large music database consisting of nearly one million of compressed audio files. The influence of compression algorithms' parameters on the classification performance is discussed, based on the results of the current study. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.

  9. Magnetic Resonance Imaging in Nondependent Pacemaker Patients with Pacemakers and Defibrillators with a Nearly Depleted Battery.

    PubMed

    Okamura, Hideo; Padmanabhan, Deepak; Watson, Robert E; Dalzell, Connie; Acker, Nancy; Jondal, Mary; Romme, Abby L; Cha, Yong-Mei; Asirvatham, Samuel J; Felmlee, Joel P; Friedman, Paul A

    2017-05-01

    Magnetic resonance imaging (MRI) in patients with non-MRI-conditional cardiac implantable electronic devices (CIEDs) has been shown to be safe when performed under closely monitored protocols. However, the safety of MRI in patients with devices with a nearly depleted battery has not been reported. Prospective data were collected between January 2008 and May 2015 in patients with non-MRI-conditional CIEDs undergoing clinically indicated MRI under institutional protocol. Patients who were pacemaker dependent were excluded. Patients whose devices were at elective replacement indicator (ERI) at the time of MRI or close to ERI (ERI or replacement for battery depletion within 3 months of scan) were identified through database review and analyzed for clinical events. MRI scans (n = 569) were performed in 442 patients. Of these, we identified 13 scans performed with a nearly depleted battery in nine patients. All scans with implantable cardioverter defibrillators (ICDs, n = 9) were uneventful. However, two scans with pacemakers close to ERI resulted in a power-on-reset (PoR) event. One scan with a pacemaker close to ERI that was programmed to DOO mode reached ERI during MRI and automatically changed to VVI mode. Additionally, one scan with a pacemaker at ERI did not allow programming. All pacemakers with events were implanted before 2005. Patients with pacemakers and ICDs with a nearly depleted battery can safely undergo MRI when patients are not pacemaker dependent. Attention should be paid because old devices can result in PoR or ERI during MRI, which may lead to oversensing and inhibition of pacing. © 2017 Wiley Periodicals, Inc.

  10. Distinct Morphology of Human T-Cell Leukemia Virus Type 1-Like Particles

    PubMed Central

    Maldonado, José O.; Cao, Sheng; Zhang, Wei; Mansky, Louis M.

    2016-01-01

    The Gag polyprotein is the main retroviral structural protein and is essential for the assembly and release of virus particles. In this study, we have analyzed the morphology and Gag stoichiometry of human T-cell leukemia virus type 1 (HTLV-1)-like particles and authentic, mature HTLV-1 particles by using cryogenic transmission electron microscopy (cryo-TEM) and scanning transmission electron microscopy (STEM). HTLV-1-like particles mimicked the morphology of immature authentic HTLV-1 virions. Importantly, we have observed for the first time that the morphology of these virus-like particles (VLPs) has the unique local feature of a flat Gag lattice that does not follow the curvature of the viral membrane, resulting in an enlarged distance between the Gag lattice and the viral membrane. Other morphological features that have been previously observed with other retroviruses include: (1) a Gag lattice with multiple discontinuities; (2) membrane regions associated with the Gag lattice that exhibited a string of bead-like densities at the inner leaflet; and (3) an arrangement of the Gag lattice resembling a railroad track. Measurement of the average size and mass of VLPs and authentic HTLV-1 particles suggested a consistent range of size and Gag copy numbers in these two groups of particles. The unique local flat Gag lattice morphological feature observed suggests that HTLV-1 Gag could be arranged in a lattice structure that is distinct from that of other retroviruses characterized to date. PMID:27187442

  11. Authenticity of Benin metalworks evaluated by inductively coupled plasma mass spectrometry and lead isotope analyses

    NASA Astrophysics Data System (ADS)

    Fabbri, E.; Soffritti, C.; Merlin, M.; Vaccaro, C.; Garagnani, G. L.

    2017-05-01

    Two metal plaques and a cock statuette belonging to a private collection and stylistically consistent with the Royal Art of Benin (Nigeria) were investigated in order to verify their authenticity. The characterization of alloys and patinas were carried out by inductively coupled plasma mass spectrometry, optical microscopy, scanning electron microscopy and energy dispersion spectroscopy, and X-Ray diffraction spectrometry. Furthermore, thermal ionization mass spectrometry was used to assess the abundances of lead isotopes and to attempt a dating by the measurement of 210Pb/204Pb ratio. The results showed that all three artefacts were mainly composed of low lead-brass alloys, with relatively high concentrations of zinc, antimony, cadmium and aluminum in the solid copper solution. Microstructures were mostly dendritic, typical of as-cast brasses, and characterized by recrystallized non-homogeneous twinned grains in areas corresponding to surface decorations, probably due to multiple hammering steps followed by partial annealing treatments. The matrix was composed of a cored α-Cu solid solution together with non-metallic inclusions, lead globules and Sn-rich precipitates in interdendritic spaces. On the surface of all metalworks, both copper and zinc oxides, a non-continuous layer of sulphur-containing contaminants and chloride-containing compounds, were identified. The lead isotope results were consistent with brasses produced shortly before or after 1900 CE. Overall, the data obtained by different techniques supported the hypothesis that the three artefacts were not authentic.

  12. Applications of a hologram watermarking protocol: aging-aware biometric signature verification and time validity check with personal documents

    NASA Astrophysics Data System (ADS)

    Vielhauer, Claus; Croce Ferri, Lucilla

    2003-06-01

    Our paper addresses two issues of a biometric authentication algorithm for ID cardholders previously presented namely the security of the embedded reference data and the aging process of the biometric data. We describe a protocol that allows two levels of verification, combining a biometric hash technique based on handwritten signature and hologram watermarks with cryptographic signatures in a verification infrastructure. This infrastructure consists of a Trusted Central Public Authority (TCPA), which serves numerous Enrollment Stations (ES) in a secure environment. Each individual performs an enrollment at an ES, which provides the TCPA with the full biometric reference data and a document hash. The TCPA then calculates the authentication record (AR) with the biometric hash, a validity timestamp, and a document hash provided by the ES. The AR is then signed with a cryptographic signature function, initialized with the TCPA's private key and embedded in the ID card as a watermark. Authentication is performed at Verification Stations (VS), where the ID card will be scanned and the signed AR is retrieved from the watermark. Due to the timestamp mechanism and a two level biometric verification technique based on offline and online features, the AR can deal with the aging process of the biometric feature by forcing a re-enrollment of the user after expiry, making use of the ES infrastructure. We describe some attack scenarios and we illustrate the watermarking embedding, retrieval and dispute protocols, analyzing their requisites, advantages and disadvantages in relation to security requirements.

  13. Thermo-Acoustic Ultrasound for Detection of RF-Induced Device Lead Heating in MRI.

    PubMed

    Dixit, Neerav; Stang, Pascal P; Pauly, John M; Scott, Greig C

    2018-02-01

    Patients who have implanted medical devices with long conductive leads are often restricted from receiving MRI scans due to the danger of RF-induced heating near the lead tips. Phantom studies have shown that this heating varies significantly on a case-by-case basis, indicating that many patients with implanted devices can receive clinically useful MRI scans without harm. However, the difficulty of predicting RF-induced lead tip heating prior to scanning prevents numerous implant recipients from being scanned. Here, we demonstrate that thermo-acoustic ultrasound (TAUS) has the potential to be utilized for a pre-scan procedure assessing the risk of RF-induced lead tip heating in MRI. A system was developed to detect TAUS signals by four different TAUS acquisition methods. We then integrated this system with an MRI scanner and detected a peak in RF power absorption near the tip of a model lead when transmitting from the scanner's body coil. We also developed and experimentally validated simulations to characterize the thermo-acoustic signal generated near lead tips. These results indicate that TAUS is a promising method for assessing RF implant safety, and with further development, a TAUS pre-scan could allow many more patients to have access to MRI scans of significant clinical value.

  14. The impact of database quality on keystroke dynamics authentication

    NASA Astrophysics Data System (ADS)

    Panasiuk, Piotr; Rybnik, Mariusz; Saeed, Khalid; Rogowski, Marcin

    2016-06-01

    This paper concerns keystroke dynamics, also partially in the context of touchscreen devices. The authors concentrate on the impact of database quality and propose their algorithm to test database quality issues. The algorithm is used on their own as well as the well-known . Following specific problems were researched: classification accuracy, development of user typing proficiency, time precision during sample acquisition, representativeness of training set, sample length.

  15. Data-Dependent Fingerprints for Wireless Device Authentication

    DTIC Science & Technology

    2014-05-20

    enhanced when using a modulation based on orthogonal frequency division multiplexing ( OFDM ) that has a large range of signal levels. However, in...at 70 MHz. The radios use OFDM with 64-point FFT block sizes for transmission so that the bandwidth is divided into Nd = 64 data and Nc = 5 cyclic...τℓTs) (1) where Ts is the OFDM symbol period (and therefore discrete-time sampling period) and L is the number of multipaths in the channel with

  16. An authentication scheme to healthcare security under wireless sensor networks.

    PubMed

    Hsiao, Tsung-Chih; Liao, Yu-Ting; Huang, Jen-Yan; Chen, Tzer-Shyong; Horng, Gwo-Boa

    2012-12-01

    In recent years, Taiwan has been seeing an extension of the average life expectancy and a drop in overall fertility rate, initiating our country into an aged society. Due to this phenomenon, how to provide the elderly and patients with chronic diseases a suitable healthcare environment has become a critical issue presently. Therefore, we propose a new scheme that integrates healthcare services with wireless sensor technology in which sensor nodes are employed to measure patients' vital signs. Data collected from these sensor nodes are then transmitted to mobile devices of the medical staff and system administrator, promptly enabling them to understand the patients' condition in real time, which will significantly improve patients' healthcare quality. As per the personal data protection act, patients' vital signs can only be accessed by authorized medical staff. In order to protect patients', the system administrator will verify the medical staff's identity through the mobile device using a smart card and password mechanism. Accordingly, only the verified medical staff can obtain patients' vital signs data such as their blood pressure, pulsation, and body temperature, etc.. Besides, the scheme includes a time-bounded characteristic that allows the verified staff access to data without having to have to re-authenticate and re-login into the system within a set period of time. Consequently, the time-bounded property also increases the work efficiency of the system administrator and user.

  17. Printable, scannable biometric templates for secure documents and materials

    NASA Astrophysics Data System (ADS)

    Cambier, James L.; Musgrave, Clyde

    2000-04-01

    Biometric technology has been widely acknowledged as an effective means for enhancing private and public security through applications in physical access control, computer and computer network access control, medical records protection, banking security, public identification programs, and others. Nearly all of these applications involve use of a biometric token to control access to a physical entity or private information. There are also unique benefits to be derived from attaching a biometric template to a physical entity such as a document, package, laboratory sample, etc. Such an association allows fast, reliable, and highly accurate association of an individual person's identity to the physical entity, and can be used to enhance security, convenience, and privacy in many types of transactions. Examples include authentication of documents, tracking of laboratory samples in a testing environment, monitoring the movement of physical evidence within the criminal justice system, and authenticating the identity of both sending and receiving parties in shipment of high value parcels. A system is described which combines a biometric technology based on iris recognition with a printing and scanning technology for high-density bar codes.

  18. X-Ray Scan Detection for Cargo Integrity

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Valencia, Juan D.; Miller, Steven D.

    ABSTRACT The increase of terrorism and its global impact has made the determination of the contents of cargo containers a necessity. Existing technology allows non-intrusive inspections to determine the contents of a container rapidly and accurately. However, some cargo shipments are exempt from such inspections. Hence, there is a need for a technology that enables rapid and accurate means of detecting whether such containers were non-intrusively inspected. Non-intrusive inspections are most commonly performed utilizing high powered X-ray equipment. The challenge is creating a device that can detect short duration X-ray scans while maintaining a portable, battery powered, low cost, andmore » easy to use platform. The Pacific Northwest National Laboratory (PNNL) has developed a methodology and prototype device focused on this challenge. The prototype, developed by PNNL, is a battery powered electronic device that continuously measures its X-ray and Gamma exposure, calculates the dose equivalent rate, and makes a determination of whether the device has been exposed to the amount of radiation experienced during an X-ray inspection. Once an inspection is detected, the device will record a timestamp of the event and relay the information to authorized personnel via a visual alert, USB connection, and/or wireless communication. The results of this research demonstrate that PNNL’s prototype device can be effective at determining whether a container was scanned by X-ray equipment typically used for cargo container inspections. This paper focuses on laboratory measurements and test results acquired with the PNNL prototype device using several X-ray radiation levels. Keywords: Radiation, Scan, X-ray, Gamma, Detection, Cargo, Container, Wireless, RF« less

  19. A study on user authentication methodology using numeric password and fingerprint biometric information.

    PubMed

    Ju, Seung-hwan; Seo, Hee-suk; Han, Sung-hyu; Ryou, Jae-cheol; Kwak, Jin

    2013-01-01

    The prevalence of computers and the development of the Internet made us able to easily access information. As people are concerned about user information security, the interest of the user authentication method is growing. The most common computer authentication method is the use of alphanumerical usernames and passwords. The password authentication systems currently used are easy, but only if you know the password, as the user authentication is vulnerable. User authentication using fingerprints, only the user with the information that is specific to the authentication security is strong. But there are disadvantage such as the user cannot change the authentication key. In this study, we proposed authentication methodology that combines numeric-based password and biometric-based fingerprint authentication system. Use the information in the user's fingerprint, authentication keys to obtain security. Also, using numeric-based password can to easily change the password; the authentication keys were designed to provide flexibility.

  20. A Study on User Authentication Methodology Using Numeric Password and Fingerprint Biometric Information

    PubMed Central

    Ju, Seung-hwan; Seo, Hee-suk; Han, Sung-hyu; Ryou, Jae-cheol

    2013-01-01

    The prevalence of computers and the development of the Internet made us able to easily access information. As people are concerned about user information security, the interest of the user authentication method is growing. The most common computer authentication method is the use of alphanumerical usernames and passwords. The password authentication systems currently used are easy, but only if you know the password, as the user authentication is vulnerable. User authentication using fingerprints, only the user with the information that is specific to the authentication security is strong. But there are disadvantage such as the user cannot change the authentication key. In this study, we proposed authentication methodology that combines numeric-based password and biometric-based fingerprint authentication system. Use the information in the user's fingerprint, authentication keys to obtain security. Also, using numeric-based password can to easily change the password; the authentication keys were designed to provide flexibility. PMID:24151601

  1. Accuracy analysis for triangulation and tracking based on time-multiplexed structured light.

    PubMed

    Wagner, Benjamin; Stüber, Patrick; Wissel, Tobias; Bruder, Ralf; Schweikard, Achim; Ernst, Floris

    2014-08-01

    The authors' research group is currently developing a new optical head tracking system for intracranial radiosurgery. This tracking system utilizes infrared laser light to measure features of the soft tissue on the patient's forehead. These features are intended to offer highly accurate registration with respect to the rigid skull structure by means of compensating for the soft tissue. In this context, the system also has to be able to quickly generate accurate reconstructions of the skin surface. For this purpose, the authors have developed a laser scanning device which uses time-multiplexed structured light to triangulate surface points. The accuracy of the authors' laser scanning device is analyzed and compared for different triangulation methods. These methods are given by the Linear-Eigen method and a nonlinear least squares method. Since Microsoft's Kinect camera represents an alternative for fast surface reconstruction, the authors' results are also compared to the triangulation accuracy of the Kinect device. Moreover, the authors' laser scanning device was used for tracking of a rigid object to determine how this process is influenced by the remaining triangulation errors. For this experiment, the scanning device was mounted to the end-effector of a robot to be able to calculate a ground truth for the tracking. The analysis of the triangulation accuracy of the authors' laser scanning device revealed a root mean square (RMS) error of 0.16 mm. In comparison, the analysis of the triangulation accuracy of the Kinect device revealed a RMS error of 0.89 mm. It turned out that the remaining triangulation errors only cause small inaccuracies for the tracking of a rigid object. Here, the tracking accuracy was given by a RMS translational error of 0.33 mm and a RMS rotational error of 0.12°. This paper shows that time-multiplexed structured light can be used to generate highly accurate reconstructions of surfaces. Furthermore, the reconstructed point sets can be used for high-accuracy tracking of objects, meeting the strict requirements of intracranial radiosurgery.

  2. Evaluation of complex gonioapparent samples using a bidirectional spectrometer.

    PubMed

    Rogelj, Nina; Penttinen, Niko; Gunde, Marta Klanjšek

    2015-08-24

    Many applications use gonioapparent targets whose appearance depends on irradiation and viewing angles; the strongest effects are provided by light diffraction. These targets, optically variable devices (OVDs), are used in both security and authentication applications. This study introduces a bidirectional spectrometer, which enables to analyze samples with most complex angular and spectral properties. In our work, the spectrometer is evaluated with samples having very different types of reflection, concerning spectral and angular distributions. Furthermore, an OVD containing several different grating patches is evaluated. The device uses automatically adjusting exposure time to provide maximum signal dynamics and is capable of doing steps as small as 0.01°. However, even 2° steps for the detector movement showed that this device is more than capable of characterizing even the most complex reflecting surfaces. This study presents sRGB visualizations, discussion of bidirectional reflection, and accurate grating period calculations for all of the grating samples used.

  3. Secure Control Systems for the Energy Sector

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Smith, Rhett; Campbell, Jack; Hadley, Mark

    2012-03-31

    Schweitzer Engineering Laboratories (SEL) will conduct the Hallmark Project to address the need to reduce the risk of energy disruptions because of cyber incidents on control systems. The goals is to develop solutions that can be both applied to existing control systems and designed into new control systems to add the security measures needed to mitigate energy network vulnerabilities. The scope of the Hallmark Project contains four primary elements: 1. Technology transfer of the Secure Supervisory Control and Data Acquisition (SCADA) Communications Protocol (SSCP) from Pacific Northwest National Laboratories (PNNL) to Schweitzer Engineering Laboratories (SEL). The project shall use thismore » technology to develop a Federal Information Processing Standard (FIPS) 140-2 compliant original equipment manufacturer (OEM) module to be called a Cryptographic Daughter Card (CDC) with the ability to directly connect to any PC enabling that computer to securely communicate across serial to field devices. Validate the OEM capabilities with another vendor. 2. Development of a Link Authenticator Module (LAM) using the FIPS 140-2 validated Secure SCADA Communications Protocol (SSCP) CDC module with a central management software kit. 3. Validation of the CDC and Link Authenticator modules via laboratory and field tests. 4. Creation of documents that record the impact of the Link Authenticator to the operators of control systems and on the control system itself. The information in the documents can assist others with technology deployment and maintenance.« less

  4. Speech watermarking: an approach for the forensic analysis of digital telephonic recordings.

    PubMed

    Faundez-Zanuy, Marcos; Lucena-Molina, Jose J; Hagmüller, Martin

    2010-07-01

    In this article, the authors discuss the problem of forensic authentication of digital audio recordings. Although forensic audio has been addressed in several articles, the existing approaches are focused on analog magnetic recordings, which are less prevalent because of the large amount of digital recorders available on the market (optical, solid state, hard disks, etc.). An approach based on digital signal processing that consists of spread spectrum techniques for speech watermarking is presented. This approach presents the advantage that the authentication is based on the signal itself rather than the recording format. Thus, it is valid for usual recording devices in police-controlled telephone intercepts. In addition, our proposal allows for the introduction of relevant information such as the recording date and time and all the relevant data (this is not always possible with classical systems). Our experimental results reveal that the speech watermarking procedure does not interfere in a significant way with the posterior forensic speaker identification.

  5. Applications and requirements for MEMS scanner mirrors

    NASA Astrophysics Data System (ADS)

    Wolter, Alexander; Hsu, Shu-Ting; Schenk, Harald; Lakner, Hubert K.

    2005-01-01

    Micro scanning mirrors are quite versatile MEMS devices for the deflection of a laser beam or a shaped beam from another light source. The most exciting application is certainly in laser-scanned displays. Laser television, home cinema and data projectors will display the most brilliant colors exceeding even plasma, OLED and CRT. Devices for front and rear projection will have advantages in size, weight and price. These advantages will be even more important in near-eye virtual displays like head-mounted displays or viewfinders in digital cameras and potentially in UMTS handsets. Optical pattern generation by scanning a modulated beam over an area can be used also in a number of other applications: laser printers, direct writing of photo resist for printed circuit boards or laser marking and with higher laser power laser ablation or material processing. Scanning a continuous laser beam over a printed pattern and analyzing the scattered reflection is the principle of barcode reading in 1D and 2D. This principle works also for identification of signatures, coins, bank notes, vehicles and other objects. With a focused white-light or RGB beam even full color imaging with high resolution is possible from an amazingly small device. The form factor is also very interesting for the application in endoscopes. Further applications are light curtains for intrusion control and the generation of arbitrary line patterns for triangulation. Scanning a measurement beam extends point measurements to 1D or 2D scans. Automotive LIDAR (laser RADAR) or scanning confocal microscopy are just two examples. Last but not least there is the field of beam steering. E.g. for all-optical fiber switches or positioning of read-/write heads in optical storage devices. The variety of possible applications also brings a variety of specifications. This publication discusses various applications and their requirements.

  6. Characterizing the Nature of Scan Results Discussions: Insights Into Why Patients Misunderstand Their Prognosis

    PubMed Central

    Singh, Sarguni; Cortez, Dagoberto; Maynard, Douglas; Cleary, James F.; DuBenske, Lori

    2017-01-01

    Introduction: Patients with incurable cancer have poor prognostic awareness. We present a detailed analysis of the dialogue between oncologists and patients in conversations with prognostic implications. Methods: A total of 128 audio-recorded encounters from a large multisite trial were obtained, and 64 involved scan results. We used conversation analysis, a qualitative method for studying human interaction, to analyze typical patterns and conversational devices. Results: Four components consistently occurred in sequential order: symptom-talk, scan-talk, treatment-talk, and logistic-talk. Six of the encounters (19%) were identified as good news, 15 (45%) as stable news, and 12 (36%) as bad news. The visit duration varied by the type of news: good, 15 minutes (07:00-29:00); stable, 17 minutes (07:00-41:00); and bad, 20 minutes (07:00-28:00). Conversational devices were common, appearing in half of recordings. Treatment-talk occupied 50% of bad-news encounters, 31% of good-news encounters, and 19% of stable-news encounters. Scan-talk occupied less than 10% of all conversations. There were only four instances of frank prognosis discussion. Conclusion: Oncologists and patients are complicit in constructing the typical encounter. Oncologists spend little time discussing scan results and the prognostic implications in favor of treatment-related talk. Conversational devices routinely help transition from scan-talk to detailed discussions about treatment options. We observed an opportunity to create prognosis-talk after scan-talk with a new conversational device, the question “Would you like to talk about what this means?” as the oncologist seeks permission to disclose prognostic information while ceding control to the patient. PMID:28095172

  7. Device localization and dynamic scan plane selection using a wireless magnetic resonance imaging detector array.

    PubMed

    Riffe, Matthew J; Yutzy, Stephen R; Jiang, Yun; Twieg, Michael D; Blumenthal, Colin J; Hsu, Daniel P; Pan, Li; Gilson, Wesley D; Sunshine, Jeffrey L; Flask, Christopher A; Duerk, Jeffrey L; Nakamoto, Dean; Gulani, Vikas; Griswold, Mark A

    2014-06-01

    A prototype wireless guidance device using single sideband amplitude modulation (SSB) is presented for a 1.5T magnetic resonance imaging system. The device contained three fiducial markers each mounted to an independent receiver coil equipped with wireless SSB technology. Acquiring orthogonal projections of these markers determined the position and orientation of the device, which was used to define the scan plane for a subsequent image acquisition. Device localization and scan plane update required approximately 30 ms, so it could be interleaved with high temporal resolution imaging. Since the wireless device is used for localization and does not require full imaging capability, the design of the SSB wireless system was simplified by allowing an asynchronous clock between the transmitter and receiver. When coupled to a high readout bandwidth, the error caused by the lack of a shared frequency reference was quantified to be less than one pixel (0.78 mm) in the projection acquisitions. Image guidance with the prototype was demonstrated with a phantom where a needle was successfully guided to a target and contrast was delivered. The feasibility of active tracking with a wireless detector array is demonstrated. Wireless arrays could be incorporated into devices to assist in image-guided procedures. Copyright © 2013 Wiley Periodicals, Inc.

  8. Device localization and dynamic scan plane selection using a wireless MRI detector array

    PubMed Central

    Riffe, Matthew J.; Yutzy, Stephen R.; Jiang, Yun; Twieg, Michael D.; Blumenthal, Colin J.; Hsu, Daniel P.; Pan, Li; Gilson, Wesley D.; Sunshine, Jeffrey L.; Flask, Christopher A.; Duerk, Jeffrey L.; Nakamoto, Dean; Gulani, Vikas; Griswold, Mark A.

    2013-01-01

    Purpose A prototype wireless guidance device using single sideband amplitude modulation (SSB) is presented for a 1.5T MRI system. Methods The device contained three fiducial markers each mounted to an independent receiver coil equipped with wireless SSB technology. Acquiring orthogonal projections of these markers determined the position and orientation of the device, which was used to define the scan plane for a subsequent image acquisition. Device localization and scan plane update required approximately 30 ms, so it could be interleaved with high temporal resolution imaging. Since the wireless device is used for localization and doesn’t require full imaging capability, the design of the SSB wireless system was simplified by allowing an asynchronous clock between the transmitter and receiver. Results When coupled to a high readout bandwidth, the error caused by the lack of a shared frequency reference was quantified to be less than one pixel (0.78 mm) in the projection acquisitions. Image-guidance with the prototype was demonstrated with a phantom where a needle was successfully guided to a target and contrast was delivered. Conclusion The feasibility of active tracking with a wireless detector array is demonstrated. Wireless arrays could be incorporated into devices to assist in image-guided procedures. PMID:23900921

  9. Face recognition from unconstrained three-dimensional face images using multitask sparse representation

    NASA Astrophysics Data System (ADS)

    Bentaieb, Samia; Ouamri, Abdelaziz; Nait-Ali, Amine; Keche, Mokhtar

    2018-01-01

    We propose and evaluate a three-dimensional (3D) face recognition approach that applies the speeded up robust feature (SURF) algorithm to the depth representation of shape index map, under real-world conditions, using only a single gallery sample for each subject. First, the 3D scans are preprocessed, then SURF is applied on the shape index map to find interest points and their descriptors. Each 3D face scan is represented by keypoints descriptors, and a large dictionary is built from all the gallery descriptors. At the recognition step, descriptors of a probe face scan are sparsely represented by the dictionary. A multitask sparse representation classification is used to determine the identity of each probe face. The feasibility of the approach that uses the SURF algorithm on the shape index map for face identification/authentication is checked through an experimental investigation conducted on Bosphorus, University of Milano Bicocca, and CASIA 3D datasets. It achieves an overall rank one recognition rate of 97.75%, 80.85%, and 95.12%, respectively, on these datasets.

  10. Quantum Dialogue with Authentication Based on Bell States

    NASA Astrophysics Data System (ADS)

    Shen, Dongsu; Ma, Wenping; Yin, Xunru; Li, Xiaoping

    2013-06-01

    We propose an authenticated quantum dialogue protocol, which is based on a shared private quantum entangled channel. In this protocol, the EPR pairs are randomly prepared in one of the four Bell states for communication. By performing four Pauli operations on the shared EPR pairs to encode their shared authentication key and secret message, two legitimate users can implement mutual identity authentication and quantum dialogue without the help from the third party authenticator. Furthermore, due to the EPR pairs which are used for secure communication are utilized to implement authentication and the whole authentication process is included in the direct secure communication process, it does not require additional particles to realize authentication in this protocol. The updated authentication key provides the counterparts with a new authentication key for the next authentication and direct communication. Compared with other secure communication with authentication protocols, this one is more secure and efficient owing to the combination of authentication and direct communication. Security analysis shows that it is secure against the eavesdropping attack, the impersonation attack and the man-in-the-middle (MITM) attack.

  11. TealLock 5.20 security software program for handheld devices.

    PubMed

    Tahil, Fatimah A

    2004-07-01

    The TealLock has a simple graphic interface, and the program is user-friendly with well thought out options to customize security settings. The program is inexpensive and works seamlessly with the Palm OS platform's built-in basic Security application. The developer offers a 30-day free trial version and there is no downside to trying it to see if it meets your needs. It seems to be an effective security software program for psychiatrists who keep confidential and sensitive patient information on their PDAs. In keeping with HIPAA regulations, the TealLock bolsters security for protected health information stored on PDAs or other handheld devices by providing safeguards that address authentication, access control, encryption, and selected aspects of transmission.

  12. A Middleware Based Approach to Dynamically Deploy Location Based Services onto Heterogeneous Mobile Devices Using Bluetooth in Indoor Environment

    NASA Astrophysics Data System (ADS)

    Sadhukhan, Pampa; Sen, Rijurekha; Das, Pradip K.

    Several methods for providing location based service (LBS) to mobile devices in indoor environment using wireless technologies like WLAN, RFID and Bluetooth have been proposed, implemented and evaluated. However, most of them do not focus on heterogeneity of mobile platforms, memory constraint of mobile devices, the adaptability of client or device to the new services it discovers whenever it reaches a new location. In this paper, we have proposed a Middleware based approach of LBS provision in the indoor environment, where a Bluetooth enabled Base Station (BS) detects Bluetooth enabled mobile devices and pushes a proper client application only to those devices that belong to some registered subscriber of LBS. This dynamic deployment enables the mobile clients to access any new service without having preinstalled interface to that service beforehand and thus the client's memory consumption is reduced. Our proposed work also addresses the other issues like authenticating the clients before providing them LBSs and introducing paid services. We have evaluated its performance in term of file transfer time with respect to file size and throughput with respect to distance. Experimental results on service consumption time by the mobile client for different services are also presented.

  13. Multi-channel electronically scanned cryogenic pressure sensor

    NASA Technical Reports Server (NTRS)

    Chapman, John J. (Inventor); Hopson, Purnell, Jr. (Inventor); Kruse, Nancy M. H. (Inventor)

    1995-01-01

    A miniature, multi-channel, electronically scanned pressure measuring device uses electrostatically bonded silicon dies in a multielement array. These dies are bonded at specific sites on a glass, prepatterned substrate. Thermal data is multiplexed and recorded on each individual pressure measuring diaphragm. The device functions in a cryogenic environment without the need of heaters to keep the sensor at constant temperatures.

  14. A Possibility Study on Gender Recognition Method Using Near Infrared Ray Scanning Spectrophotometer

    NASA Astrophysics Data System (ADS)

    Nishino, Satoshi; Ohshima, Kenji

    Male and female recognition is necessary to make security stronger and when various statistics on the visitor are taken in commercial facilities and so on. The conventional method of male and female recognition is currently determined by using the person's appearance, the person's dress and in such cases, the way of walking, the foot pressure, the hair type. But, these characteristics can be intentionally changed by human intervention or design. The proposed method gets a difference in the male's and female's characteristics by taking absorbance characteristic of the fat distribution of the person's cheek by near infrared ray scanning spectrophotometer. This is a male and female recognition based on the new concept idea which this is used for. Consequently, this can be used to recognize a male from a female even if a male turns himself into the female intentionally (and vice versa), because this method involves biometrics authentication.

  15. Seeing-Is-Believing: Using Camera Phones for Human-Verifiable Authentication

    DTIC Science & Technology

    2004-11-01

    the context of, e.g., a smart home (Section 7). Our implementation is detailed in Section 8, with a security analysis is Section 9. Section 10...establishment of security parame- ters [17]. This work considers a smart home , where a user may want to establish a security context for controlling...appliances or other devices in a smart - home . We refer to the security property discussed in this work as presence, where it is desirable that only users or

  16. A critical review on the applications of artificial neural networks in winemaking technology.

    PubMed

    Moldes, O A; Mejuto, J C; Rial-Otero, R; Simal-Gandara, J

    2017-09-02

    Since their development in 1943, artificial neural networks were extended into applications in many fields. Last twenty years have brought their introduction into winery, where they were applied following four basic purposes: authenticity assurance systems, electronic sensory devices, production optimization methods, and artificial vision in image treatment tools, with successful and promising results. This work reviews the most significant approaches for neural networks in winemaking technologies with the aim of producing a clear and useful review document.

  17. A Clock Fingerprints-Based Approach for Wireless Transmitter Identification

    NASA Astrophysics Data System (ADS)

    Zhao, Caidan; Xie, Liang; Huang, Lianfen; Yao, Yan

    Cognitive radio (CR) was proposed as one of the promising solutions for low spectrum utilization. However, security problems such as the primary user emulation (PUE) attack severely limit its applications. In this paper, we propose a clock fingerprints-based authentication approach to prevent PUE attacks in CR networks with the help of curve fitting and classifier. An experimental setup was constructed using the WLAN cards and software radio devices, and the corresponding results show that satisfied identification can be achieved for wireless transmitters.

  18. Protocol Standards and Implementation within the Digital Engineering Laboratory Computer Network (DELNET) Using the Universal Network Interface Device (UNID). Part 1.

    DTIC Science & Technology

    1983-12-01

    Initializes the data tables shared by both the Local and Netowrk Operating Systems. 3. Invint: Written in Assembly Language. Initializes the Input/Output...connection with an appropriate type and grade of transport service and appropriate security authentication (Ref 6:38). Data Transfer within a session...V.; Kent, S. Security in oihr Level Protocolst Anorgaches. Alternatives and Recommendations, Draft Report ICST/HLNP-81-19, Wash ingt on,,D.C.: Dept

  19. A 3D Polymer Based Printed Two-Dimensional Laser Scanner

    NASA Astrophysics Data System (ADS)

    Oyman, H. A.; Gokdel, Y. D.; Ferhanoglu, O.; Yalcinkaya, A. D.

    2016-10-01

    A two-dimensional (2D) polymer based scanning mirror with magnetic actuation is developed for imaging applications. Proposed device consists of a circular suspension holding a rectangular mirror and can generate a 2D scan pattern. Three dimensional (3D) printing technology which is used for implementation of the device, offers added flexibility in controlling the cross-sectional profile as well as the stress distribution compared to the traditional planar process technologies. The mirror device is developed to meet a portable, miniaturized confocal microscope application in mind, delivering 4.5 and 4.8 degrees of optical scan angles at 111 and 267 Hz, respectively. As a result of this mechanical performance, the resulting microscope incorporating the mirror is estimated to accomplish a field of view (FOV) of 350 µm × 350 µm.

  20. Observation of martensitic transformation in Ni50Mn41Cu4Sn5 Heusler alloy prepared by mechanical alloying

    NASA Astrophysics Data System (ADS)

    Saini, Dinesh; Singh, Satyavir; Banerjee, M. K.; Sachdev, K.

    2017-05-01

    Mechanical alloying route has been employed for preparation of a single phase Ni50Mn41Cu4Sn5 (atomic %) Heusler alloy. Use of high energy planetary ball mill enables successful preparation of the same as authenticated by detailed X-ray diffraction (XRD) study. Microstructural study is carried out by optical and scanning electron microscopic techniques. XRD results reveal that increasing milling time leads to reduction in crystallite size and concurrent increase in lattice strain. Microstructural results indicate formation of self-assembled martensite twins.

  1. The Authentic Personality: A Theoretical and Empirical Conceptualization and the Development of the Authenticity Scale

    ERIC Educational Resources Information Center

    Wood, Alex M.; Linley, P. Alex; Maltby, John; Baliousis, Michael; Joseph, Stephen

    2008-01-01

    This article describes the development of a measure of dispositional authenticity and tests whether authenticity is related to well-being, as predicted by several counseling psychology perspectives. Scales were designed to measure a tripartite conception of authenticity, comprising self-alienation, authentic living, and accepting external…

  2. Measuring Teacher Authenticity: Criteria Students Use in Their Perception of Teacher Authenticity

    ERIC Educational Resources Information Center

    De Bruyckere, Pedro; Kirschner, Paul A.

    2017-01-01

    Authenticity is an often-heard term with respect to education. Tasks should be authentic, the learning environment should be authentic and, above all, the teacher should be authentic. Previous qualitative research has shown that there are four primary criteria that students in formal educational settings use when forming their perceptions of…

  3. The authentic worker's well-being and performance: the relationship between authenticity at work, well-being, and work outcomes.

    PubMed

    van den Bosch, Ralph; Taris, Toon W

    2014-01-01

    Previous research on authenticity has mainly focused on trait conceptualizations of authenticity (e.g., Wood et al., 2008), whereas in specific environments (e.g., at work) state conceptualizations of authenticity (cf. Van den Bosch & Taris, 2013) are at least as relevant. For example, working conditions are subject to change, and this could well have consequences for employees' perceived level of authenticity at work. The current study employs a work-specific, state-like conceptualization of authenticity to investigate the relations between authenticity at work, well-being, and work outcomes. A series of ten separate hierarchical regression analyses using data from 685 participants indicated that after controlling for selected work characteristics and demographic variables, authenticity at work accounted for on average 11% of the variance of various wellbeing and work outcomes. Of the three subscales of authenticity at work (i.e., authentic living, self-alienation, and accepting influence), self-alienation was the strongest predictor of outcomes, followed by authentic living and accepting external influence, respectively. These findings are discussed in the light of their practical and theoretical implications.

  4. Run-to-Run Optimization Control Within Exact Inverse Framework for Scan Tracking.

    PubMed

    Yeoh, Ivan L; Reinhall, Per G; Berg, Martin C; Chizeck, Howard J; Seibel, Eric J

    2017-09-01

    A run-to-run optimization controller uses a reduced set of measurement parameters, in comparison to more general feedback controllers, to converge to the best control point for a repetitive process. A new run-to-run optimization controller is presented for the scanning fiber device used for image acquisition and display. This controller utilizes very sparse measurements to estimate a system energy measure and updates the input parameterizations iteratively within a feedforward with exact-inversion framework. Analysis, simulation, and experimental investigations on the scanning fiber device demonstrate improved scan accuracy over previous methods and automatic controller adaptation to changing operating temperature. A specific application example and quantitative error analyses are provided of a scanning fiber endoscope that maintains high image quality continuously across a 20 °C temperature rise without interruption of the 56 Hz video.

  5. Performing magnetic resonance imaging in patients with implantable pacemakers and defibrillators: results of a European Heart Rhythm Association survey.

    PubMed

    Marinskis, Germanas; Bongiorni, Maria Grazia; Dagres, Nikolaos; Dobreanu, Dan; Lewalter, Thorsten; Blomström-Lundqvist, Carina

    2012-12-01

    The purpose of our survey was to evaluate the experience, current practice and attitudes of performing magnetic resonance imaging (MRI) studies in patients with cardiac implantable electronic devices. Fifty-one centre-members of European Heart Rhythm Association Research network have responded to the survey. According to the obtained data, 55.2% of responding centres do not perform MRI scans in patients with non-MRI-certified pacemakers and 65.8% in patients with such implantable cardioverter defibrillators (ICDs). Reported complication rate in patients with non-MRI-certified devices is low and conforms to the literature data. Experience with newer MRI-compatible pacemakers and ICDs is limited to single cases in most centres. This survey shows limited experience with performing MRI studies in patients with implanted pacemakers and ICDs. In concordance with available guidelines, most centres limit MRI scans in patients with non-MRI-certified devices. The implant numbers for MRI-certified devices and experience with performing MRI scans in these patients are still low.

  6. Multi-Channel Electronically Scanned Cryogenic Pressure Sensor And Method For Making Same

    NASA Technical Reports Server (NTRS)

    Chapman, John J. (Inventor); Hopson, Purnell, Jr. (Inventor); Holloway, Nancy M. (Inventor)

    2001-01-01

    A miniature, multi-channel, electronically scanned pressure measuring device uses electrostatically bonded silicon dies in a multi-element array. These dies are bonded at specific sites on a glass, pre-patterned substrate. Thermal data is multiplexed and recorded on each individual pressure measuring diaphragm. The device functions in a cryogenic environment without the need of heaters to keep the sensor at constant temperatures.

  7. Assessment of meat authenticity using bioinformatics, targeted peptide biomarkers and high-resolution mass spectrometry.

    PubMed

    Ruiz Orduna, Alberto; Husby, Erik; Yang, Charles T; Ghosh, Dipankar; Beaudry, Francis

    2015-01-01

    In recent years a significant increase of food fraud has been observed, ranging from false label claims to the use of additives and fillers to increase profitability. Recently in 2013 horse and pig DNAs were detected in beef products sold from several retailers. Mass spectrometry (MS) has become the workhorse in protein research, and the detection of marker proteins could serve for both animal species and tissue authentication. Meat species authenticity is performed in this paper using a well-defined proteogenomic annotation, carefully chosen surrogate tryptic peptides and analysis using a hybrid quadrupole-Orbitrap MS. Selected mammalian meat samples were homogenised and proteins were extracted and digested with trypsin. The samples were analysed using a high-resolution MS. Chromatography was achieved using a 30-min linear gradient along with a BioBasic C8 100 × 1 mm column at a flow rate of 75 µl min(-1). The MS was operated in full-scan high resolution and accurate mass. MS/MS spectra were collected for selected proteotypic peptides. Muscular proteins were methodically analysed in silico in order to generate tryptic peptide mass lists and theoretical MS/MS spectra. Following a comprehensive bottom-up proteomic analysis, we detected and identified a proteotypic myoglobin tryptic peptide (120-134) for each species with observed m/z below 1.3 ppm compared with theoretical values. Moreover, proteotypic peptides from myosin-1, myosin-2 and β-haemoglobin were also identified. This targeted method allowed comprehensive meat speciation down to 1% (w/w) of undesired product.

  8. Modern Pacemaker and Implantable Cardioverter/Defibrillator Systems Can Be Magnetic Resonance Imaging Safe

    PubMed Central

    Roguin, Ariel; Zviman, Menekhem M.; Meininger, Glenn R.; Rodrigues, E. Rene; Dickfeld, Timm M.; Bluemke, David A.; Lardo, Albert; Berger, Ronald D.; Calkins, Hugh; Halperin, Henry R.

    2011-01-01

    Background MRI has unparalleled soft-tissue imaging capabilities. The presence of devices such as pacemakers and implantable cardioverter/defibrillators (ICDs), however, is historically considered a contraindication to MRI. These devices are now smaller, with less magnetic material and improved electromagnetic interference protection. Our aim was to determine whether these modern systems can be used in an MR environment. Methods and Results We tested in vitro and in vivo lead heating, device function, force acting on the device, and image distortion at 1.5 T. Clinical MR protocols and in vivo measurements yielded temperature changes <0.5°C. Older (manufactured before 2000) ICDs were damaged by the MR scans. Newer ICD systems and most pacemakers, however, were not. The maximal force acting on newer devices was <100 g. Modern (manufactured after 2000) ICD systems were implanted in dogs (n=18), and after 4 weeks, 3- to 4-hour MR scans were performed (n=15). No device dysfunction occurred. The images were of high quality with distortion dependent on the scan sequence and plane. Pacing threshold and intracardiac electrogram amplitude were unchanged over the 8 weeks, except in 1 animal that, after MRI, had a transient (<12 hours) capture failure. Pathological data of the scanned animals revealed very limited necrosis or fibrosis at the tip of the lead area, which was not different from controls (n=3) not subjected to MRI. Conclusions These data suggest that certain modern pacemaker and ICD systems may indeed be MRI safe. This may have major clinical implications for current imaging practices. PMID:15277324

  9. Security analysis and enhancements of an effective biometric-based remote user authentication scheme using smart cards.

    PubMed

    An, Younghwa

    2012-01-01

    Recently, many biometrics-based user authentication schemes using smart cards have been proposed to improve the security weaknesses in user authentication system. In 2011, Das proposed an efficient biometric-based remote user authentication scheme using smart cards that can provide strong authentication and mutual authentication. In this paper, we analyze the security of Das's authentication scheme, and we have shown that Das's authentication scheme is still insecure against the various attacks. Also, we proposed the enhanced scheme to remove these security problems of Das's authentication scheme, even if the secret information stored in the smart card is revealed to an attacker. As a result of security analysis, we can see that the enhanced scheme is secure against the user impersonation attack, the server masquerading attack, the password guessing attack, and the insider attack and provides mutual authentication between the user and the server.

  10. Security Analysis and Enhancements of an Effective Biometric-Based Remote User Authentication Scheme Using Smart Cards

    PubMed Central

    An, Younghwa

    2012-01-01

    Recently, many biometrics-based user authentication schemes using smart cards have been proposed to improve the security weaknesses in user authentication system. In 2011, Das proposed an efficient biometric-based remote user authentication scheme using smart cards that can provide strong authentication and mutual authentication. In this paper, we analyze the security of Das's authentication scheme, and we have shown that Das's authentication scheme is still insecure against the various attacks. Also, we proposed the enhanced scheme to remove these security problems of Das's authentication scheme, even if the secret information stored in the smart card is revealed to an attacker. As a result of security analysis, we can see that the enhanced scheme is secure against the user impersonation attack, the server masquerading attack, the password guessing attack, and the insider attack and provides mutual authentication between the user and the server. PMID:22899887

  11. Comparison of the biometric values obtained by two different A-mode ultrasound devices (Eye Cubed vs. PalmScan): a transversal, descriptive, and comparative study.

    PubMed

    Velez-Montoya, Raul; Shusterman, Eugene Mark; López-Miranda, Miriam Jessica; Mayorquin-Ruiz, Mariana; Salcedo-Villanueva, Guillermo; Quiroz-Mercado, Hugo; Morales-Cantón, Virgilio

    2010-03-24

    To assess the reliability of the measurements obtained with the PalmScan, when compared with another standardized A-mode ultrasound device, and assess the consistency and correlation between the two methods. Transversal, descriptive, and comparative study. We recorded the axial length (AL), anterior chamber depth (ACD) and lens thickness (LT) obtained with two A-mode ultrasounds (PalmScan A2000 and Eye Cubed) using an immersion technique. We compared the measurements with a two-sample t-test. Agreement between the two devices was assessed with Bland-Altman plots and 95% limits of agreement. 70 eyes of 70 patients were enrolled in this study. The measurements with the Eye Cubed of AL and ACD were shorter than the measurements taken by the PalmScan. The differences were not statistically significant regarding AL (p < 0.4) but significant regarding ACD (p < 0.001). The highest agreement between the two devices was obtained during LT measurement. The PalmScan measurements were shorter, but not statistically significantly (p < 0.2). The values of AL and LT, obtained with both devices are not identical, but within the limits of agreement. The agreement is not affected by the magnitude of the ocular dimensions (but only between range of 20 mm to 27 mm of AL and 3.5 mm to 5.7 mm of LT). A correction of about 0.5 D could be considered if an intraocular lens is being calculated. However due to the large variability of the results, the authors recommend discretion in using this conversion factor, and to adjust the power of the intraocular lenses based upon the personal experience of the surgeon.

  12. Safety evaluation of a leadless transcatheter pacemaker for magnetic resonance imaging use.

    PubMed

    Soejima, Kyoko; Edmonson, Jonathan; Ellingson, Michael L; Herberg, Ben; Wiklund, Craig; Zhao, Jing

    2016-10-01

    Increased magnetic resonance imaging (MRI) adoption and demand are driving the need for device patients to have safe access to MRI. The aim of this study was to address the interactions of MRI with the Micra transcatheter pacemaker system. A strategy was developed to evaluate potential MRI risks including device heating, unintended cardiac stimulation, force, torque, vibration, and device malfunction. Assessment of MRI-induced device heating was conducted using a phantom containing gelled saline, and Monte Carlo simulations incorporating these results were conducted to simulate numerous combinations of human body models, position locations in the MRI scanner bore, and a variety of coil designs. Lastly, a patient with a Micra pacemaker who underwent a clinically indicated MRI scan is presented. Compared to traditional MRI conditional pacemakers, the overall risk with Micra was greatly reduced because of the small size of the device and the absence of a lead. The modeling results predicted that the nonperfused temperature rise of the device would be less than 0.4°C at 1.5 T and 0.5°C at 3 T and that the risk of device heating with multiple device implants was not increased as compared with a single device. The clinical case study revealed no MRI-related complications. The MRI safety assessment tests conducted for the Micra pacemaker demonstrate that patients with a single device or multiple devices can safely undergo MRI scans in both 1.5- and 3-T MRI scanners. No MRI-related complications were observed in a patient implanted with a Micra pacemaker undergoing a clinically indicated scan. Copyright © 2016 Heart Rhythm Society. Published by Elsevier Inc. All rights reserved.

  13. Safety and utility of magnetic resonance imaging in patients with cardiac implantable electronic devices.

    PubMed

    Strom, Jordan B; Whelan, Jill B; Shen, Changyu; Zheng, Shuang Qi; Mortele, Koenraad J; Kramer, Daniel B

    2017-08-01

    Off-label magnetic resonance imaging (MRI) for patients with cardiac implantable electrical devices has been limited owing to concerns about safety and unclear diagnostic and prognostic utility. The purpose of this study was to define major and minor adverse events with off-label MRI scans. We prospectively evaluated patients with non-MRI-conditional cardiac implantable electrical devices referred for MRI scans under a strict clinical protocol. The primary safety outcome was incidence of major adverse events (loss of pacing, inappropriate shock or antitachycardia pacing, need for system revision, or death) or minor adverse events (inappropriate pacing, arrhythmias, power-on-reset events, heating at the generator site, or changes in device parameters at baseline or at 6 months). A total of 189 MRI scans were performed in 123 patients (63.1% [78] men; median age 70 ± 18.5 years; 56.9% [70] patients with implantable cardioverter-defibrillators; 33.3% [41] pacemaker-dependent patients) predominantly for brain or spinal conditions. A minority of scans (22.7% [43]) were performed for urgent or emergent indications. Major adverse events were rare: 1 patient with loss of pacing, no deaths, or system revisions (overall rate 0.5%; 95% confidence interval 0.01-2.91). Minor adverse events were similarly rare (overall rate 1.6%; 95% confidence interval 0.3-4.6). Nearly all studies (98.4% [186]) were interpretable, while 75.1% [142] were determined to change management according to the prespecified criteria. No clinically significant changes were observed in device parameters acutely after MRI or at 6 months as compared with baseline across all patient and device categories. Off-label MRI scans performed under a strict protocol demonstrated excellent short- and medium-term safety while providing interpretable imaging that frequently influenced clinical care. Copyright © 2017 Heart Rhythm Society. Published by Elsevier Inc. All rights reserved.

  14. Safety and utility of magnetic resonance imaging in patients with cardiac implantable electronic devices

    PubMed Central

    Strom, Jordan B.; Whelan, Jill B.; Shen, Changyu; Zheng, Shuang Qi; Mortele, Koenraad J.; Kramer, Daniel B.

    2017-01-01

    BACKGROUND Off-label magnetic resonance imaging (MRI) for patients with cardiac implantable electrical devices has been limited owing to concerns about safety and unclear diagnostic and prognostic utility. OBJECTIVE The purpose of this study was to define major and minor adverse events with off-label MRI scans. METHODS We prospectively evaluated patients with non–MRI-conditional cardiac implantable electrical devices referred for MRI scans under a strict clinical protocol. The primary safety outcome was incidence of major adverse events (loss of pacing, inappropriate shock or antitachycardia pacing, need for system revision, or death) or minor adverse events (inappropriate pacing, arrhythmias, power-on-reset events, heating at the generator site, or changes in device parameters at baseline or at 6 months). RESULTS A total of 189 MRI scans were performed in 123 patients (63.1% [78] men; median age 70 ± 18.5 years; 37.0% [70] patients with implantable cardioverter-defibrillators; 21.8% [41] pacemaker-dependent patients) predominantly for brain or spinal conditions. A minority of scans (22.7% [43]) were performed for urgent or emergent indications. Major adverse events were rare: 1 patient with loss of pacing, no deaths, or system revisions (overall rate 0.5%; 95% confidence interval 0.01–2.91). Minor adverse events were similarly rare (overall rate 1.6%; 95% confidence interval 0.3–4.6). Nearly all studies (98.4% [186]) were interpretable, while 74.9% [142] were determined to change management according to the prespecified criteria. No clinically significant changes were observed in device parameters acutely after MRI or at 6 months as compared with baseline across all patient and device categories. CONCLUSION Off-label MRI scans performed under a strict protocol demonstrated excellent short- and medium-term safety while providing interpretable imaging that frequently influenced clinical care. PMID:28385671

  15. Philosophically Rooted Educational Authenticity as a Normative Ideal for Education: Is the International Baccalaureate's Primary Years Programme an Example of an Authentic Curriculum?

    ERIC Educational Resources Information Center

    Lüddecke, Florian

    2016-01-01

    Whereas the importance of authenticity in relation to educational contexts has been highlighted, educational authenticity (EA) has mainly referred to a real-life/world convergence or the notion of teacher authenticity, implying that authenticity can be taught and learnt. This view, however, has largely overlooked philosophical considerations so…

  16. The Effect of Authentic versus Non-Authentic Texts on Upper Intermediate Iranian EFL Learners' Vocabulary Retention

    ERIC Educational Resources Information Center

    Nematollahi, Shirin; Maghsoudi, Mojtaba

    2015-01-01

    In this current study the researchers have tried to investigate the possible effect of authentic and non-authentic texts on Iranian EFL learners' vocabulary retention. Despite the great deal of studies conducted in the area of EFL/ESL learning, the effect of authentic versus non-authentic texts have almost gained little attention and been…

  17. Fulfillment of HTTP Authentication Based on Alcatel OmniSwitch 9700

    NASA Astrophysics Data System (ADS)

    Liu, Hefu

    This paper provides a way of HTTP authentication On Alcatel OmniSwitch 9700. Authenticated VLANs control user access to network resources based on VLAN assignment and user authentication. The user can be authenticated through the switch via any standard Web browser software. Web browser client displays the username and password prompts. Then a way for HTML forms can be given to pass HTTP authentication data when it's submitted. A radius server will provide a database of user information that the switch checks whenever it tries to authenticate through the switch. Before or after authentication, the client can get an address from a Dhcp server.

  18. Transmission environmental scanning electron microscope with scintillation gaseous detection device.

    PubMed

    Danilatos, Gerasimos; Kollia, Mary; Dracopoulos, Vassileios

    2015-03-01

    A transmission environmental scanning electron microscope with use of a scintillation gaseous detection device has been implemented. This corresponds to a transmission scanning electron microscope but with addition of a gaseous environment acting both as environmental and detection medium. A commercial type of low vacuum machine has been employed together with appropriate modifications to the detection configuration. This involves controlled screening of various emitted signals in conjunction with a scintillation gaseous detection device already provided with the machine for regular surface imaging. Dark field and bright field imaging has been obtained along with other detection conditions. With a progressive series of modifications and tests, the theory and practice of a novel type of microscopy is briefly shown now ushering further significant improvements and developments in electron microscopy as a whole. Copyright © 2014 Elsevier B.V. All rights reserved.

  19. New Beam Scanning Device for Active Beam Delivery System (BDS) in Proton Therapy

    NASA Astrophysics Data System (ADS)

    Variale, V.; Mastromarco, M.; Colamaria, F.; Colella, D.

    A new Beam Delivery System (BDS) has been studied in the framework of a new proton therapy project, called AMIDERHA. It is characterized by an active scanning system for target irradiation with a pencil beam. The project is based on the use of a Linac with variable final energy and the Robotized Patient Positioning System instead of the traditional gantry. As a consequence, in the active BDS of AMIDERHA a pencil beam scanning system with a relatively long Source to Axis Distance (SAD) can be used. In this contribution, the idea of using a unique new device capable of both horizontal and vertical beam scansion for the AMIDERHA active BDS will be presented and discussed. Furthermore, a preliminary design of that device will be shown, together with the results of simulations.

  20. Architecture for removable media USB-ARM

    DOEpatents

    Shue, Craig A.; Lamb, Logan M.; Paul, Nathanael R.

    2015-07-14

    A storage device is coupled to a computing system comprising an operating system and application software. Access to the storage device is blocked by a kernel filter driver, except exclusive access is granted to a first anti-virus engine. The first anti-virus engine is directed to scan the storage device for malicious software and report results. Exclusive access may be granted to one or more other anti-virus engines and they may be directed to scan the storage device and report results. Approval of all or a portion of the information on the storage device is based on the results from the first anti-virus engine and the other anti-virus engines. The storage device is presented to the operating system and access is granted to the approved information. The operating system may be a Microsoft Windows operating system. The kernel filter driver and usage of anti-virus engines may be configurable by a user.

  1. Magnetic resonance imaging-conditional devices: Luxury or real clinical need?

    PubMed

    Mavrogeni, Sophie I; Poulos, George; Kolovou, Genovefa; Theodorakis, George

    Although the risk of MRI scanning on patients with conventional devices is lower than initially thought, the patient's safety can only be guaranteed when using MRI-conditional devices. The most important modifications in MRI-conditional devices include a) Reduction in ferromagnetic components to reduce magnetic attraction and susceptibility artifacts; b) Replacement of the reed switch by a Hall sensor in order to avoid unpredictable reed switch behavior; c) Lead coil design to minimize lead heating and electrical current induction; d) Filter circuitry to prevent damage to the internal power supply; and e) Dedicated pacemaker programming to prevent inappropriate pacemaker inhibition and competing rhythms. Although many companies claim to have MRI-conditional devices, adoption in clinical practice is limited because a) Not all companies have MRI-conditional devices approved for both 1.5 and 3T; b) Not all companies offer the option of unlimited MRI scanning (without an exclusion zone in the thorax); c) Certain companies allow only a 30-min MRI scanning and only in afebrile patients; and d) Despite having MRI-conditional pacemakers, certain companies do not have MRI-conditional defibrillators and CRT systems. It is clear that this new technology opens the door for MRI to a growing number of patients; however, the widespread adoption of MRI-conditional devices will depend on real-life issues, such as cost, clinical indications for such a device and the permanent education of health care professionals. Copyright © 2017 Hellenic Society of Cardiology. Published by Elsevier B.V. All rights reserved.

  2. Reliability and accuracy of four dental shade-matching devices.

    PubMed

    Kim-Pusateri, Seungyee; Brewer, Jane D; Davis, Elaine L; Wee, Alvin G

    2009-03-01

    There are several electronic shade-matching instruments available for clinical use, but the reliability and accuracy of these instruments have not been thoroughly investigated. The purpose of this in vitro study was to evaluate the reliability and accuracy of 4 dental shade-matching instruments in a standardized environment. Four shade-matching devices were tested: SpectroShade, ShadeVision, VITA Easyshade, and ShadeScan. Color measurements were made of 3 commercial shade guides (Vitapan Classical, Vitapan 3D-Master, and Chromascop). Shade tabs were placed in the middle of a gingival matrix (Shofu GUMY) with shade tabs of the same nominal shade from additional shade guides placed on both sides. Measurements were made of the central region of the shade tab positioned inside a black box. For the reliability assessment, each shade tab from each of the 3 shade guide types was measured 10 times. For the accuracy assessment, each shade tab from 10 guides of each of the 3 types evaluated was measured once. Differences in reliability and accuracy were evaluated using the Standard Normal z test (2 sided) (alpha=.05) with Bonferroni correction. Reliability of devices was as follows: ShadeVision, 99.0%; SpectroShade, 96.9%; VITA Easyshade, 96.4%; and ShadeScan, 87.4%. A significant difference in reliability was found between ShadeVision and ShadeScan (P=.008). All other comparisons showed similar reliability. Accuracy of devices was as follows: VITA Easyshade, 92.6%; ShadeVision, 84.8%; SpectroShade, 80.2%; and ShadeScan, 66.8%. Significant differences in accuracy were found between all device pairs (P<.001) for all comparisons except for SpectroShade versus ShadeVision (P=.033). Most devices had similar high reliability (over 96%), indicating predictable shade values from repeated measurements. However, there was more variability in accuracy among devices (67-93%), and differences in accuracy were seen with most device comparisons.

  3. Optical Sensing Device Containing Fiber Bragg Gratings

    DTIC Science & Technology

    2000-08-01

    Fabry - Perot (SFP) filter-based interrogation (Kersey et al. Opt. Lett.. 18, 1370-2. 1993), tunable acousto-optic filter inteiTOgation (Geiger et al...a tunable Fabry - Perot filter, and a tunable acousto-optical filter. Alternatively, scanning filter 28 can be omitted in device 10 of the present...invention when broadband light source 20 is a tunable broadband light source. More preferably, scanning filter 28 is a tunable Fabry - Perot filter

  4. Comparison of laser ray-tracing and skiascopic ocular wavefront-sensing devices

    PubMed Central

    Bartsch, D-UG; Bessho, K; Gomez, L; Freeman, WR

    2009-01-01

    Purpose To compare two wavefront-sensing devices based on different principles. Methods Thirty-eight healthy eyes of 19 patients were measured five times in the reproducibility study. Twenty eyes of 10 patients were measured in the comparison study. The Tracey Visual Function Analyzer (VFA), based on the ray-tracing principle and the Nidek optical pathway difference (OPD)-Scan, based on the dynamic skiascopy principle were compared. Standard deviation (SD) of root mean square (RMS) errors was compared to verify the reproducibility. We evaluated RMS errors, Zernike terms and conventional refractive indexes (Sph, Cyl, Ax, and spherical equivalent). Results In RMS errors reading, both devices showed similar ratios of SD to the mean measurement value (VFA: 57.5±11.7%, OPD-Scan: 53.9±10.9%). Comparison on the same eye showed that almost all terms were significantly greater using the VFA than using the OPD-Scan. However, certain high spatial frequency aberrations (tetrafoil, pentafoil, and hexafoil) were consistently measured near zero with the OPD-Scan. Conclusion Both devices showed similar level of reproducibility; however, there was considerable difference in the wavefront reading between machines when measuring the same eye. Differences in the number of sample points, centration, and measurement algorithms between the two instruments may explain our results. PMID:17571088

  5. Analysis of Multilayer Devices for Superconducting Electronics by High-Resolution Scanning Transmission Electron Microscopy and Energy Dispersive Spectroscopy

    DOE PAGES

    Missert, Nancy; Kotula, Paul G.; Rye, Michael; ...

    2017-02-15

    We used a focused ion beam to obtain cross-sectional specimens from both magnetic multilayer and Nb/Al-AlOx/Nb Josephson junction devices for characterization by scanning transmission electron microscopy (STEM) and energy dispersive X-ray spectroscopy (EDX). An automated multivariate statistical analysis of the EDX spectral images produced chemically unique component images of individual layers within the multilayer structures. STEM imaging elucidated distinct variations in film morphology, interface quality, and/or etch artifacts that could be correlated to magnetic and/or electrical properties measured on the same devices.

  6. Fabrication of Gate-tunable Graphene Devices for Scanning Tunneling Microscopy Studies with Coulomb Impurities

    PubMed Central

    Jung, Han Sae; Tsai, Hsin-Zon; Wong, Dillon; Germany, Chad; Kahn, Salman; Kim, Youngkyou; Aikawa, Andrew S.; Desai, Dhruv K.; Rodgers, Griffin F.; Bradley, Aaron J.; Velasco, Jairo; Watanabe, Kenji; Taniguchi, Takashi; Wang, Feng; Zettl, Alex; Crommie, Michael F.

    2015-01-01

    Owing to its relativistic low-energy charge carriers, the interaction between graphene and various impurities leads to a wealth of new physics and degrees of freedom to control electronic devices. In particular, the behavior of graphene’s charge carriers in response to potentials from charged Coulomb impurities is predicted to differ significantly from that of most materials. Scanning tunneling microscopy (STM) and scanning tunneling spectroscopy (STS) can provide detailed information on both the spatial and energy dependence of graphene's electronic structure in the presence of a charged impurity. The design of a hybrid impurity-graphene device, fabricated using controlled deposition of impurities onto a back-gated graphene surface, has enabled several novel methods for controllably tuning graphene’s electronic properties.1-8 Electrostatic gating enables control of the charge carrier density in graphene and the ability to reversibly tune the charge2 and/or molecular5 states of an impurity. This paper outlines the process of fabricating a gate-tunable graphene device decorated with individual Coulomb impurities for combined STM/STS studies.2-5 These studies provide valuable insights into the underlying physics, as well as signposts for designing hybrid graphene devices. PMID:26273961

  7. System and Method for Scan Range Gating

    NASA Technical Reports Server (NTRS)

    Lindemann, Scott (Inventor); Zuk, David M. (Inventor)

    2017-01-01

    A system for scanning light to define a range gated signal includes a pulsed coherent light source that directs light into the atmosphere, a light gathering instrument that receives the light modified by atmospheric backscatter and transfers the light onto an image plane, a scanner that scans collimated light from the image plane to form a range gated signal from the light modified by atmospheric backscatter, a control circuit that coordinates timing of a scan rate of the scanner and a pulse rate of the pulsed coherent light source so that the range gated signal is formed according to a desired range gate, an optical device onto which an image of the range gated signal is scanned, and an interferometer to which the image of the range gated signal is directed by the optical device. The interferometer is configured to modify the image according to a desired analysis.

  8. The non-contact biometric identified bio signal measurement sensor and algorithms.

    PubMed

    Kim, Chan-Il; Lee, Jong-Ha

    2018-01-01

    In these days, wearable devices have been developed for effectively measuring biological data. However, these devices have tissue allege and noise problem. To solve these problems, biometric measurement based on a non-contact method, such as face image sequencing is developed. This makes it possible to measure biometric data without any operation and side effects. However, it is impossible for a remote center to identify the person whose data are measured by the novel methods. In this paper, we propose the novel non-contact heart rate and blood pressure imaging system, Deep Health Eye. This system has authentication process at the same time as measuring bio signals, through non-contact method. In the future, this system can be convenient home bio signal monitoring system by combined with smart mirror.

  9. Access control for electronic patient records.

    PubMed

    Glagola, M J

    1998-01-01

    The transition from hardcopy records to electronic records is in the forefront for healthcare today. For healthcare facilities, a major issue is determining who can access patients' medical information and how access to this information can be controlled. There are three components to access control: identification, authentication and authorization. Checking proof of identity is a means of authenticating someone--through a driver's license, passport or their fingerprints. Similar processes are needed in a computer environment, through the use of passwords, one-time passwords or smartcards, encryption and kerberos, and call-back procedures. New in the area of access control are biometric devices, which are hardware/software combinations that digitize a physical characteristic and compare the sample with previously stored samples. Fingerprints, voiceprints and facial features are examples. Their cost is currently prohibitive, but in time, they may become more common. Digital certificates and certification authorities are other means used to authenticate identify. When a system challenges a user's identity at log on, the user provides a certification that tells the system to go to the issuing certification authority and find proof the user's claim is valid. Low-level certifications offer little value for sensitive data, but high-level certification is now being introduced. It requires more specific, detailed information on the applicant. Authorization, the final component of access control, establishes what a specific user can and cannot access. To have effective access control, transaction logging and system monitoring are needed to ensure the various techniques are being used and performing properly.

  10. Securing health sensing using integrated circuit metric.

    PubMed

    Tahir, Ruhma; Tahir, Hasan; McDonald-Maier, Klaus

    2015-10-20

    Convergence of technologies from several domains of computing and healthcare have aided in the creation of devices that can help health professionals in monitoring their patients remotely. An increase in networked healthcare devices has resulted in incidents related to data theft, medical identity theft and insurance fraud. In this paper, we discuss the design and implementation of a secure lightweight wearable health sensing system. The proposed system is based on an emerging security technology called Integrated Circuit Metric (ICMetric) that extracts the inherent features of a device to generate a unique device identification. In this paper, we provide details of how the physical characteristics of a health sensor can be used for the generation of hardware "fingerprints". The obtained fingerprints are used to deliver security services like authentication, confidentiality, secure admission and symmetric key generation. The generated symmetric key is used to securely communicate the health records and data of the patient. Based on experimental results and the security analysis of the proposed scheme, it is apparent that the proposed system enables high levels of security for health monitoring in resource optimized manner.

  11. Securing Health Sensing Using Integrated Circuit Metric

    PubMed Central

    Tahir, Ruhma; Tahir, Hasan; McDonald-Maier, Klaus

    2015-01-01

    Convergence of technologies from several domains of computing and healthcare have aided in the creation of devices that can help health professionals in monitoring their patients remotely. An increase in networked healthcare devices has resulted in incidents related to data theft, medical identity theft and insurance fraud. In this paper, we discuss the design and implementation of a secure lightweight wearable health sensing system. The proposed system is based on an emerging security technology called Integrated Circuit Metric (ICMetric) that extracts the inherent features of a device to generate a unique device identification. In this paper, we provide details of how the physical characteristics of a health sensor can be used for the generation of hardware “fingerprints”. The obtained fingerprints are used to deliver security services like authentication, confidentiality, secure admission and symmetric key generation. The generated symmetric key is used to securely communicate the health records and data of the patient. Based on experimental results and the security analysis of the proposed scheme, it is apparent that the proposed system enables high levels of security for health monitoring in resource optimized manner. PMID:26492250

  12. Reliability and accuracy of sleep apnea scans in novel cardiac resynchronization therapy devices: an independent report of two cases.

    PubMed

    Fox, Henrik; Nölker, Georg; Gutleben, Klaus-Jürgen; Bitter, Thomas; Horstkotte, Dieter; Oldenburg, Olaf

    2014-03-01

    Pacemaker apnea scan algorithms are able to screen for sleep apnea. We investigated whether these systems were able to accurately detect sleep-disordered breathing (SDB) in two patients from an outpatient clinic. The first patient suffered from ischemic heart failure and severe central sleep apnea (CSA) and underwent adaptive servoventilation therapy (ASV). The second patient suffered from dilated cardiomyopathy and moderate obstructive sleep apnea (OSA). Pacemaker read-outs did not match polysomnography (PSG) recordings well and overestimated the apnea-hypopnea index. However, ASV therapy-induced SDB improvements were adequately recognized by the apnea scan of the Boston Scientific INVIVE® cardiac resynchronization therapy pacemaker. Detection of obstructive respiratory events using impedance-based technology may underestimate the number of events, as frustrane breathing efforts induce impedance changes without significant airflow. By contrast, in the second case, apnea scan overestimated the number of total events and of obstructive events, perhaps owing to a very sensitive but less specific hypopnea definition and detection within the diagnostic algorithm of the device. These two cases show that a pacemaker apnea scan is able to reflect SDB, but PSG precision is not met by far. The device scan revealed the decline of SDB through ASV therapy for CSA in one patient, but not for OSA in the second case. To achieve reliable monitoring of SDB, further technical developments and clinical studies are necessary.

  13. Graph State-Based Quantum Group Authentication Scheme

    NASA Astrophysics Data System (ADS)

    Liao, Longxia; Peng, Xiaoqi; Shi, Jinjing; Guo, Ying

    2017-02-01

    Motivated by the elegant structure of the graph state, we design an ingenious quantum group authentication scheme, which is implemented by operating appropriate operations on the graph state and can solve the problem of multi-user authentication. Three entities, the group authentication server (GAS) as a verifier, multiple users as provers and the trusted third party Trent are included. GAS and Trent assist the multiple users in completing the authentication process, i.e., GAS is responsible for registering all the users while Trent prepares graph states. All the users, who request for authentication, encode their authentication keys on to the graph state by performing Pauli operators. It demonstrates that a novel authentication scheme can be achieved with the flexible use of graph state, which can synchronously authenticate a large number of users, meanwhile the provable security can be guaranteed definitely.

  14. 22 CFR 92.36 - Authentication defined.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Authentication defined. 92.36 Section 92.36... Notarial Acts § 92.36 Authentication defined. An authentication is a certification of the genuineness of... recognized in another jurisdiction. Documents which may require authentication include legal instruments...

  15. New colored optical security elements using Rolic's LPP/LCP technology: devices for first- to third-level inspection

    NASA Astrophysics Data System (ADS)

    Moia, Franco

    2002-04-01

    With linear photo-polymerization (LPP) ROLIC has invented a photo-patternable technology enabling to align not only conventional liquid crystals but also liquid crystals polymers (LCP). ROLIC's optical security device technology derives from its LPP/LCP technology. LPP/LCP security devices are created by structured photo-alignment of an LPP layer through phot-masks, thus generating a high resolution, photo-patterned aligning layer which carries the aligning information of the image to be created. The subsequent LCP layer transforms the aligning information into an optical phase image with low and/or very high information content, such as invisible photographic pictures. The building block capability of the LPP/LCP technology allows the manufacturing of cholesteric and non-cholesteric LPP/LCP devices which cover 1st and/or 2nd level applications. Apart from black/white security devices colored information zones can be integrated. Moreover, we have developed an LPP/LCP security device which covers all three- 1st, 2nd and 3rd- inspection levels in one and the same authentication device: besides a color shift by tilting the device (1st level) and the detection of normally hidden information by use of a simple sheet polarizer (2nd level) the new device contains encrypted hidden information which can be visualized only by superimposing an LPP/LCP inspection tool (key) for decryption (3rd level). This optical key is also based on the LPP/LCP technology and is itself a 3rd level security device.

  16. Authentic feminist? Authenticity and feminist identity in teenage feminists' talk.

    PubMed

    Calder-Dawe, Octavia; Gavey, Nicola

    2017-12-01

    This article explores how young people's feminist identities take shape in conjunction with a contemporary ideal of personal authenticity: to know and to express the 'real me'. Drawing from interviews with 18 teenagers living in Auckland, New Zealand, we examine a novel convergence of authenticity and feminism in participants' identity talk. For social psychologists interested in identity and politics, this convergence is intriguing: individualizing values such as authenticity are generally associated with disengagement with structural critique and with a repudiation of politicized and activist identities. Rather than seeking to categorize authentic feminism as an instance of either 'good/collective' or 'bad/individualized' feminist politics, we use discourse analysis to examine how the identity position of authentic feminist was constructed and to explore implications for feminist politics. On one hand, interviewees mobilized authentic feminism to affirm their commitment to normative liberal values of authenticity and self-expression. At the same time, the position of authentic feminist appeared to authorize risky feminist identifications and to justify counter-normative feelings, desires, and actions. To conclude, we explore how encountering others' intolerance of authentic feminism exposed interviewees to the limits of authenticity discourse, propelling some towards new understandings of the social world and their space for action within it. © 2017 The British Psychological Society.

  17. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Krempasky, J.; Flechsig, U.; Korhonen, T.

    Synchronous monochromator and insertion device energy scans were implemented at the Surfaces/Interfaces:Microscopy (SIM) beamline in order to provide the users fast X-ray magnetic dichroism studies (XMCD). A simple software control scheme is proposed based on a fast monochromator run-time energy readback which quickly updates the insertion device requested energy during an on-the-fly X-ray absorption scan (XAS). In this scheme the Plain Grating Monochromator (PGM) motion control, being much slower compared with the insertion device (APPLE-II type undulator), acts as a 'master' controlling the undulator 'slave' energy position. This master-slave software implementation exploits EPICS distributed device control over computer network andmore » allows for a quasi-synchronous motion control combined with data acquisition needed for the XAS or XMCD experiment.« less

  18. Multimodal biometric digital watermarking on immigrant visas for homeland security

    NASA Astrophysics Data System (ADS)

    Sasi, Sreela; Tamhane, Kirti C.; Rajappa, Mahesh B.

    2004-08-01

    Passengers with immigrant Visa's are a major concern to the International Airports due to the various fraud operations identified. To curb tampering of genuine Visa, the Visa's should contain human identification information. Biometric characteristic is a common and reliable way to authenticate the identity of an individual [1]. A Multimodal Biometric Human Identification System (MBHIS) that integrates iris code, DNA fingerprint, and the passport number on the Visa photograph using digital watermarking scheme is presented. Digital Watermarking technique is well suited for any system requiring high security [2]. Ophthalmologists [3], [4], [5] suggested that iris scan is an accurate and nonintrusive optical fingerprint. DNA sequence can be used as a genetic barcode [6], [7]. While issuing Visa at the US consulates, the DNA sequence isolated from saliva, the iris code and passport number shall be digitally watermarked in the Visa photograph. This information is also recorded in the 'immigrant database'. A 'forward watermarking phase' combines a 2-D DWT transformed digital photograph with the personal identification information. A 'detection phase' extracts the watermarked information from this VISA photograph at the port of entry, from which iris code can be used for identification and DNA biometric for authentication, if an anomaly arises.

  19. Privacy and Security within Biobanking: The Role of Information Technology.

    PubMed

    Heatherly, Raymond

    2016-03-01

    Along with technical issues, biobanking frequently raises important privacy and security issues that must be resolved as biobanks continue to grow in scale and scope. Consent mechanisms currently in use range from fine-grained to very broad, and in some cases participants are offered very few privacy protections. However, developments in information technology are bringing improvements. New programs and systems are being developed to allow researchers to conduct analyses without distributing the data itself offsite, either by allowing the investigator to communicate with a central computer, or by having each site participate in meta-analysis that results in a shared statistic or final significance result. The implementation of security protocols into the research biobanking setting requires three key elements: authentication, authorization, and auditing. Authentication is the process of making sure individuals are who they claim to be, frequently through the use of a password, a key fob, or a physical (i.e., retinal or fingerprint) scan. Authorization involves ensuring that every individual who attempts an action has permission to do that action. Finally, auditing allows for actions to be logged so that inappropriate or unethical actions can later be traced back to their source. © 2016 American Society of Law, Medicine & Ethics.

  20. Functional Scanning Probe Imaging of Nanostructured Solar Energy Materials.

    PubMed

    Giridharagopal, Rajiv; Cox, Phillip A; Ginger, David S

    2016-09-20

    From hybrid perovskites to semiconducting polymer/fullerene blends for organic photovoltaics, many new materials being explored for energy harvesting and storage exhibit performance characteristics that depend sensitively on their nanoscale morphology. At the same time, rapid advances in the capability and accessibility of scanning probe microscopy methods over the past decade have made it possible to study processing/structure/function relationships ranging from photocurrent collection to photocarrier lifetimes with resolutions on the scale of tens of nanometers or better. Importantly, such scanning probe methods offer the potential to combine measurements of local structure with local function, and they can be implemented to study materials in situ or devices in operando to better understand how materials evolve in time in response to an external stimulus or environmental perturbation. This Account highlights recent advances in the development and application of scanning probe microscopy methods that can help address such questions while filling key gaps between the capabilities of conventional electron microscopy and newer super-resolution optical methods. Focusing on semiconductor materials for solar energy applications, we highlight a range of electrical and optoelectronic scanning probe microscopy methods that exploit the local dynamics of an atomic force microscope tip to probe key properties of the solar cell material or device structure. We discuss how it is possible to extract relevant device properties using noncontact scanning probe methods as well as how these properties guide materials development. Specifically, we discuss intensity-modulated scanning Kelvin probe microscopy (IM-SKPM), time-resolved electrostatic force microscopy (trEFM), frequency-modulated electrostatic force microscopy (FM-EFM), and cantilever ringdown imaging. We explain these developments in the context of classic atomic force microscopy (AFM) methods that exploit the physics of cantilever motion and photocarrier generation to provide robust, nanoscale measurements of materials physics that are correlated with device operation. We predict that the multidimensional data sets made possible by these types of methods will become increasingly important as advances in data science expand capabilities and opportunities for image correlation and discovery.

  1. Two-dimensional profiling of carriers in terahertz quantum cascade lasers using calibrated scanning spreading resistance microscopy and scanning capacitance microscopy.

    PubMed

    Dhar, R S; Ban, D

    2013-07-01

    The distribution of charge carriers inside the active region of a terahertz (THz) quantum cascade laser (QCL) has been measured with scanning spreading resistance microscopy (SSRM) and scanning capacitance microscopy (SCM). Individual quantum well-barrier modules with a 35.7-nm single module thickness in the active region of the device have been resolved for the first time using high-resolution SSRM and SCM techniques at room temperature. SSRM and SCM measurements on the quantum well-barrier structure were calibrated utilizing known GaAs dopant staircase samples. Doping concentrations derived from SSRM and SCM measurements were found to be in quantitative agreement with the designed average doping values of the n-type active region in the terahertz quantum cascade laser. The secondary ion mass spectroscopy provides a partial picture of internal device parameters, and we have demonstrated with our results the efficacy of uniting calibrated SSRM and SCM to delineate quantitatively the transverse cross-sectional structure of complex two-dimensional terahertz quantum cascade laser devices. © 2013 The Authors Journal of Microscopy © 2013 Royal Microscopical Society.

  2. Optical scanning tests of complex CMOS microcircuits

    NASA Technical Reports Server (NTRS)

    Levy, M. E.; Erickson, J. J.

    1977-01-01

    The new test method was based on the use of a raster-scanned optical stimulus in combination with special electrical test procedures. The raster-scanned optical stimulus was provided by an optical spot scanner, an instrument that combines a scanning optical microscope with electronic instrumentation to process and display the electric photoresponse signal induced in a device that is being tested.

  3. 22 CFR 92.38 - Forms of certificate of authentication.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Forms of certificate of authentication. 92.38... SERVICES Specific Notarial Acts § 92.38 Forms of certificate of authentication. The form of a certificate of authentication depends on the statutory requirements of the jurisdiction where the authenticated...

  4. 18 CFR 375.102 - Custody and authentication of Commission records.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... authentication of Commission records. 375.102 Section 375.102 Conservation of Power and Water Resources FEDERAL... Provisions § 375.102 Custody and authentication of Commission records. (a) Custody of official records. (1...) Authentication of Commission action. All orders and other actions of the Commission shall be authenticated or...

  5. Should Teachers Be Authentic?

    ERIC Educational Resources Information Center

    Bialystok, Lauren

    2015-01-01

    Authenticity is often touted as an important virtue for teachers. But what do we mean when we say that a teacher ought to be "authentic"? Research shows that discussions of teacher authenticity frequently refer to other character traits or simply to teacher effectiveness, but authenticity is a unique concept with a long philosophical…

  6. Richard Peters and Valuing Authenticity

    ERIC Educational Resources Information Center

    Degenhardt, M. A. B.

    2009-01-01

    Richard Peters has been praised for the authenticity of his philosophy, and inquiry into aspects of the development of his philosophy reveals a profound authenticity. Yet authenticity is something he seems not to favour. The apparent paradox is resolved by observing historical changes in the understanding of authenticity as an important value.…

  7. Defining the questions: a research agenda for nontraditional authentication in arms control

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hauck, Danielle K; Mac Arthur, Duncan W; Smith, Morag K

    Many traditional authentication techniques have been based on hardware solutions. Thus authentication of measurement system hardware has been considered in terms of physical inspection and destructive analysis. Software authentication has implied hash function analysis or authentication tools such as Rose. Continuity of knowledge is maintained through TIDs and cameras. Although there is ongoing progress improving all of these authentication methods, there has been little discussion of the human factors involved in authentication. Issues of non-traditional authentication include sleight-of-hand substitutions, monitor perception vs. reality, and visual diversions. Since monitor confidence in a measurement system depends on the product of their confidencesmore » in each authentication element, it is important to investigate all authentication techniques, including the human factors. This paper will present an initial effort to identify the most important problems that traditional authentication approaches in safeguards have not addressed and are especially relevant to arms control verification. This will include a survey of the literature and direct engagement with nontraditional experts in areas like psychology and human factors. Based on the identification of problem areas, potential research areas will be identified and a possible research agenda will be developed.« less

  8. Do We Need to Design Course-Based Undergraduate Research Experiences for Authenticity?

    PubMed Central

    Rowland, Susan; Pedwell, Rhianna; Lawrie, Gwen; Lovie-Toon, Joseph; Hung, Yu

    2016-01-01

    The recent push for more authentic teaching and learning in science, technology, engineering, and mathematics indicates a shared agreement that undergraduates require greater exposure to professional practices. There is considerable variation, however, in how “authentic” science education is defined. In this paper we present our definition of authenticity as it applies to an “authentic” large-scale undergraduate research experience (ALURE); we also look to the literature and the student voice for alternate perceptions around this concept. A metareview of science education literature confirmed the inconsistency in definitions and application of the notion of authentic science education. An exploration of how authenticity was explained in 604 reflections from ALURE and traditional laboratory students revealed contrasting and surprising notions and experiences of authenticity. We consider the student experience in terms of alignment with 1) the intent of our designed curriculum and 2) the literature definitions of authentic science education. These findings contribute to the conversation surrounding authenticity in science education. They suggest two things: 1) educational experiences can have significant authenticity for the participants, even when there is no purposeful design for authentic practice, and 2) the continuing discussion of and design for authenticity in UREs may be redundant. PMID:27909029

  9. SDVSRM - a new SSRM based technique featuring dynamically adjusted, scanner synchronized sample voltages for measurement of actively operated devices.

    PubMed

    Doering, Stefan; Wachowiak, Andre; Roetz, Hagen; Eckl, Stefan; Mikolajick, Thomas

    2018-06-01

    Scanning spreading resistance microscopy (SSRM) with its high spatial resolution and high dynamic signal range is a powerful tool for two-dimensional characterization of semiconductor dopant areas. However, the application of the method is limited to devices in equilibrium condition, as the investigation of actively operated devices would imply potential differences within the device, whereas SSRM relies on a constant voltage difference between sample surface and probe tip. Furthermore, the standard preparation includes short circuiting of all device components, limiting applications to devices in equilibrium condition. In this work scanning dynamic voltage spreading resistance microscopy (SDVSRM), a new SSRM based two pass atomic force microscopy (AFM) technique is introduced, overcoming these limitations. Instead of short circuiting the samples during preparation, wire bond devices are used allowing for active control of the individual device components. SDVSRM consists of two passes. In the first pass the local sample surface voltage dependent on the dc biases applied to the components of the actively driven device is measured as in scanning voltage microscopy (SVM). The local spreading resistance is measured within the second pass, in which the afore obtained local surface voltage is used to dynamically adjust the terminal voltages of the device under test. This is done in a way that the local potential difference across the nano-electrical contact matches the software set SSRM measurement voltage, and at the same time, the internal voltage differences within the device under test are maintained. In this work the proof of the concept could be demonstrated by obtaining spreading resistance data of an actively driven photodiode test device. SDVSRM adds a higher level of flexibility in general to SSRM, as occurring differences in cross section surface voltage are taken into account. These differences are immanent for actively driven devices, but can also be present at standard, short circuited samples. Therefore, SDVSRM could improve the characterization under equilibrium conditions as well. Copyright © 2018. Published by Elsevier B.V.

  10. Enhanced Axial Resolution of Wide-Field Two-Photon Excitation Microscopy by Line Scanning Using a Digital Micromirror Device.

    PubMed

    Park, Jong Kang; Rowlands, Christopher J; So, Peter T C

    2017-01-01

    Temporal focusing multiphoton microscopy is a technique for performing highly parallelized multiphoton microscopy while still maintaining depth discrimination. While the conventional wide-field configuration for temporal focusing suffers from sub-optimal axial resolution, line scanning temporal focusing, implemented here using a digital micromirror device (DMD), can provide substantial improvement. The DMD-based line scanning temporal focusing technique dynamically trades off the degree of parallelization, and hence imaging speed, for axial resolution, allowing performance parameters to be adapted to the experimental requirements. We demonstrate this new instrument in calibration specimens and in biological specimens, including a mouse kidney slice.

  11. Enhanced Axial Resolution of Wide-Field Two-Photon Excitation Microscopy by Line Scanning Using a Digital Micromirror Device

    PubMed Central

    Park, Jong Kang; Rowlands, Christopher J.; So, Peter T. C.

    2017-01-01

    Temporal focusing multiphoton microscopy is a technique for performing highly parallelized multiphoton microscopy while still maintaining depth discrimination. While the conventional wide-field configuration for temporal focusing suffers from sub-optimal axial resolution, line scanning temporal focusing, implemented here using a digital micromirror device (DMD), can provide substantial improvement. The DMD-based line scanning temporal focusing technique dynamically trades off the degree of parallelization, and hence imaging speed, for axial resolution, allowing performance parameters to be adapted to the experimental requirements. We demonstrate this new instrument in calibration specimens and in biological specimens, including a mouse kidney slice. PMID:29387484

  12. Use of digital micromirror devices as dynamic pinhole arrays for adaptive confocal fluorescence microscopy

    NASA Astrophysics Data System (ADS)

    Pozzi, Paolo; Wilding, Dean; Soloviev, Oleg; Vdovin, Gleb; Verhaegen, Michel

    2018-02-01

    In this work, we present a new confocal laser scanning microscope capable to perform sensorless wavefront optimization in real time. The device is a parallelized laser scanning microscope in which the excitation light is structured in a lattice of spots by a spatial light modulator, while a deformable mirror provides aberration correction and scanning. A binary DMD is positioned in an image plane of the detection optical path, acting as a dynamic array of reflective confocal pinholes, images by a high performance cmos camera. A second camera detects images of the light rejected by the pinholes for sensorless aberration correction.

  13. Blind source computer device identification from recorded VoIP calls for forensic investigation.

    PubMed

    Jahanirad, Mehdi; Anuar, Nor Badrul; Wahab, Ainuddin Wahid Abdul

    2017-03-01

    The VoIP services provide fertile ground for criminal activity, thus identifying the transmitting computer devices from recorded VoIP call may help the forensic investigator to reveal useful information. It also proves the authenticity of the call recording submitted to the court as evidence. This paper extended the previous study on the use of recorded VoIP call for blind source computer device identification. Although initial results were promising but theoretical reasoning for this is yet to be found. The study suggested computing entropy of mel-frequency cepstrum coefficients (entropy-MFCC) from near-silent segments as an intrinsic feature set that captures the device response function due to the tolerances in the electronic components of individual computer devices. By applying the supervised learning techniques of naïve Bayesian, linear logistic regression, neural networks and support vector machines to the entropy-MFCC features, state-of-the-art identification accuracy of near 99.9% has been achieved on different sets of computer devices for both call recording and microphone recording scenarios. Furthermore, unsupervised learning techniques, including simple k-means, expectation-maximization and density-based spatial clustering of applications with noise (DBSCAN) provided promising results for call recording dataset by assigning the majority of instances to their correct clusters. Copyright © 2017 Elsevier Ireland Ltd. All rights reserved.

  14. Optimum Filters and Pulsed Signal Storage Devices,

    DTIC Science & Technology

    1982-05-05

    condition is usually fulfilled in practice, with the exception of cases of very fast targets, superlong pulses and very short wavelengths. After passing...the repetition period of the system should be used to create slow scanning. The scope with fast scanning is used to measure speed and the one with slow...b. Consideration of these functions shows the intermit - tent amplitude variation of the pulse characteristic of a two-stage storage device. This is

  15. Note: Automated optical focusing on encapsulated devices for scanning light stimulation systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bitzer, L. A.; Benson, N., E-mail: niels.benson@uni-due.de; Schmechel, R.

    Recently, a scanning light stimulation system with an automated, adaptive focus correction during the measurement was introduced. Here, its application on encapsulated devices is discussed. This includes the changes an encapsulating optical medium introduces to the focusing process as well as to the subsequent light stimulation measurement. Further, the focusing method is modified to compensate for the influence of refraction and to maintain a minimum beam diameter on the sample surface.

  16. Scanning and Measuring Device for Diagnostic of Barrel Bore

    NASA Astrophysics Data System (ADS)

    Marvan, Ales; Hajek, Josef; Vana, Jan; Dvorak, Radim; Drahansky, Martin; Jankovych, Robert; Skvarek, Jozef

    The article discusses the design, mechanical design, electronics and software for robot diagnosis of barrels with caliber of 120 mm to 155 mm. This diagnostic device is intended primarily for experimental research and verification of appropriate methods and technologies for the diagnosis of the main bore guns. Article also discusses the design of sensors and software, the issue of data processing and image reconstruction obtained by scanning of the surface of the bore.

  17. Ensuring safety of implanted devices under MRI using reversed RF polarization.

    PubMed

    Overall, William R; Pauly, John M; Stang, Pascal P; Scott, Greig C

    2010-09-01

    Patients with long-wire medical implants are currently prevented from undergoing magnetic resonance imaging (MRI) scans due to the risk of radio frequency (RF) heating. We have developed a simple technique for determining the heating potential for these implants using reversed radio frequency (RF) polarization. This technique could be used on a patient-to-patient basis as a part of the standard prescan procedure to ensure that the subject's device does not pose a heating risk. By using reversed quadrature polarization, the MR scan can be sensitized exclusively to the potentially dangerous currents in the device. Here, we derive the physical principles governing the technique and explore the primary sources of inaccuracy. These principles are verified through finite-difference simulations and through phantom scans of implant leads. These studies demonstrate the potential of the technique for sensitively detecting potentially dangerous coupling conditions before they can do any harm. 2010 Wiley-Liss, Inc.

  18. Self-authentication of value documents

    NASA Astrophysics Data System (ADS)

    Hayosh, Thomas D.

    1998-04-01

    To prevent fraud it is critical to distinguish an authentic document from a counterfeit or altered document. Most current technologies rely on difficult-to-print human detectable features which are added to a document to prevent illegal reproduction. Fraud detection is mostly accomplished by human observation and is based upon the examiner's knowledge, experience and time allotted for examination of a document. Another approach to increasing the security of a value document is to add a unique property to each document. Data about that property is then encoded on the document itself and finally secured using a public key based digital signature. In such a scheme, machine readability of authenticity is possible. This paper describes a patent-applied-for methodology using the unique property of magnetic ink printing, magnetic remanence, that provides for full self- authentication when used with a recordable magnetic stripe for storing a digital signature and other document data. Traditionally the authenticity of a document is determined by physical examination for color, background printing, paper texture, printing resolution, and ink characteristics. On an initial level, there may be numerous security features present on a value document but only a few can be detected and evaluated by the untrained individual. Because security features are normally not standardized except on currency, training tellers and cashiers to do extensive security evaluation is not practical, even though these people are often the only people who get a chance to closely examine the document in a payment system which is back-end automated. In the context of this paper, one should be thinking about value documents such as commercial and personal checks although the concepts presented here can easily be applied to travelers cheques, credit cards, event tickets, passports, driver's licenses, motor vehicle titles, and even currency. For a practical self-authentication system, the false alarms should be less than 1% on the first read pass. Causes of false alarms could be the lack of robustness of the taggant discrimination algorithm, excessive document skew as it is being read, or errors in reading the recordable stripe. The false alarm rate is readily tested by reading the magnetic tags and digitally signing documents in one reader and performing authentication in at least two other reading devices. When reading the same check in the same reader where signed, the error metric is typically in the range of 0.0600. When comparing different checks in different readers, the error metric generally reports values in the range of 0.3930. It is clear from tests to date that the taggant patterns are randomly different for checks even when printed serially one after another using the same printing process. Testing results to date on the robustness of the taggant comparison and discrimination algorithms indicate that it is probable that low false alarms and very low false accept rates will be achieved.

  19. Ultrafast axial scanning for two-photon microscopy via a digital micromirror device and binary holography.

    PubMed

    Cheng, Jiyi; Gu, Chenglin; Zhang, Dapeng; Wang, Dien; Chen, Shih-Chi

    2016-04-01

    In this Letter, we present an ultrafast nonmechanical axial scanning method for two-photon excitation (TPE) microscopy based on binary holography using a digital micromirror device (DMD), achieving a scanning rate of 4.2 kHz, scanning range of ∼180  μm, and scanning resolution (minimum step size) of ∼270  nm. Axial scanning is achieved by projecting the femtosecond laser to a DMD programmed with binary holograms of spherical wavefronts of increasing/decreasing radii. To guide the scanner design, we have derived the parametric relationships between the DMD parameters (i.e., aperture and pixel size), and the axial scanning characteristics, including (1) maximum optical power, (2) minimum step size, and (3) scan range. To verify the results, the DMD scanner is integrated with a custom-built TPE microscope that operates at 60 frames per second. In the experiment, we scanned a pollen sample via both the DMD scanner and a precision z-stage. The results show the DMD scanner generates images of equal quality throughout the scanning range. The overall efficiency of the TPE system was measured to be ∼3%. With the high scanning rate, the DMD scanner may find important applications in random-access imaging or high-speed volumetric imaging that enables visualization of highly dynamic biological processes in 3D with submillisecond temporal resolution.

  20. Assessment of Safety and Interference Issues of Radio Frequency Identification Devices in 0.3 Tesla Magnetic Resonance Imaging and Computed Tomography

    PubMed Central

    Periyasamy, M.; Dhanasekaran, R.

    2014-01-01

    The objective of this study was to evaluate two issues regarding magnetic resonance imaging (MRI) including device functionality and image artifacts for the presence of radio frequency identification devices (RFID) in association with 0.3 Tesla at 12.7 MHz MRI and computed tomography (CT) scanning. Fifteen samples of RFID tags with two different sizes (wristband and ID card types) were tested. The tags were exposed to several MR-imaging conditions during MRI examination and X-rays of CT scan. Throughout the test, the tags were oriented in three different directions (axial, coronal, and sagittal) relative to MRI system in order to cover all possible situations with respect to the patient undergoing MRI and CT scanning, wearing a RFID tag on wrist. We observed that the tags did not sustain physical damage with their functionality remaining unaffected even after MRI and CT scanning, and there was no alternation in previously stored data as well. In addition, no evidence of either signal loss or artifact was seen in the acquired MR and CT images. Therefore, we can conclude that the use of this passive RFID tag is safe for a patient undergoing MRI at 0.3 T/12.7 MHz and CT Scanning. PMID:24701187

  1. Analysis of the dynamics and frequency spectrum synthesis of an optical-mechanical scanning device

    NASA Technical Reports Server (NTRS)

    Andryushkevichyus, A. I.; Kumpikas, A. L.; Kumpikas, K. L.

    1973-01-01

    A two-coordinate optical-mechanical scanning device (OMSD), the operating unit of which is a scanning disk, with directional and focusing optics and a board, on which the data carrier is placed, is examined. The disk and board are kinematically connected by a transmission mechanism, consisting of a worm and complex gear drive and a tightening screw-nut with correcting device, and it is run by a synchronous type motor. The dynamic errors in the system depend, first, on irregularities in rotation of the disk, fluctuations in its axis and vibrations of the table in the plane parallel to the plane of the disk. The basic sources of the fluctuations referred to above are residual disbalance of the rotor and other rotating masses, the periodic component of the driving torque of the synchronous motor, variability in the resistance, kinematic errors in the drive and other things. The fluctuations can be transmitted to the operating units through the kinematic link as a flexural-torsional system, as well as through vibrations of the housing of the device.

  2. An Innovative Miniature Bite Force Recorder

    PubMed Central

    Utreja, Ashok K; Sandhu, Navreet; Dhaliwal, Yadvinder S

    2011-01-01

    In this study, a detailed description of development of a new novel bite force recorder (gnathodynamometer) using solid state components is vividly explained. This state of the art authenticated device can be used to assess the complex function of human bite force, which is the net resultant combination of functional response of various craniomandibular structures consisting of interrelated components, like the muscles of mastication, joints, teeth and the neuromuscular system. The consistency and accuracy of the bite force recorder was reaffirmed by doing a detailed laboratory calibration and clinical testing on 30 adult subjects. PMID:27672249

  3. Cyber Security Vulnerabilities During Long Term Evolution Power-Saving Discontinuous Reception Protocol

    DTIC Science & Technology

    2014-06-01

    2G second generation 3G third generation 3GPP Third Generation Partnership Project 4G fourth generation AAA authentication, authorization and...RRC_IDLE or the RRC_CONNECTED states in 4G LTE as shown in Figure 19. 2G and 3G networks use DRX in idle mode only. In Figure 19, LTE-U_u is the new DRX...is a wireless access communications network that consists of base stations called eNodeBs (eNBs), which allow connectivity between the mobile device

  4. Designing ECG-based physical unclonable function for security of wearable devices.

    PubMed

    Shihui Yin; Chisung Bae; Sang Joon Kim; Jae-Sun Seo

    2017-07-01

    As a plethora of wearable devices are being introduced, significant concerns exist on the privacy and security of personal data stored on these devices. Expanding on recent works of using electrocardiogram (ECG) as a modality for biometric authentication, in this work, we investigate the possibility of using personal ECG signals as the individually unique source for physical unclonable function (PUF), which eventually can be used as the key for encryption and decryption engines. We present new signal processing and machine learning algorithms that learn and extract maximally different ECG features for different individuals and minimally different ECG features for the same individual over time. Experimental results with a large 741-subject in-house ECG database show that the distributions of the intra-subject (same person) Hamming distance of extracted ECG features and the inter-subject Hamming distance have minimal overlap. 256-b random numbers generated from the ECG features of 648 (out of 741) subjects pass the NIST randomness tests.

  5. A Smartphone Client-Server Teleradiology System for Primary Diagnosis of Acute Stroke

    PubMed Central

    2011-01-01

    Background Recent advances in the treatment of acute ischemic stroke have made rapid acquisition, visualization, and interpretation of images a key factor for positive patient outcomes. We have developed a new teleradiology system based on a client-server architecture that enables rapid access to interactive advanced 2-D and 3-D visualization on a current generation smartphone device (Apple iPhone or iPod Touch, or an Android phone) without requiring patient image data to be stored on the device. Instead, a server loads and renders the patient images, then transmits a rendered frame to the remote device. Objective Our objective was to determine if a new smartphone client-server teleradiology system is capable of providing accuracies and interpretation times sufficient for diagnosis of acute stroke. Methods This was a retrospective study. We obtained 120 recent consecutive noncontrast computed tomography (NCCT) brain scans and 70 computed tomography angiogram (CTA) head scans from the Calgary Stroke Program database. Scans were read by two neuroradiologists, one on a medical diagnostic workstation and an iPod or iPhone (hereafter referred to as an iOS device) and the other only on an iOS device. NCCT brain scans were evaluated for early signs of infarction, which includes early parenchymal ischemic changes and dense vessel sign, and to exclude acute intraparenchymal hemorrhage and stroke mimics. CTA brain scans were evaluated for any intracranial vessel occlusion. The interpretations made on an iOS device were compared with those made at a workstation. The total interpretation times were recorded for both platforms. Interrater agreement was assessed. True positives, true negatives, false positives, and false negatives were obtained, and sensitivity, specificity, and accuracy of detecting the abnormalities on the iOS device were computed. Results The sensitivity, specificity, and accuracy of detecting intraparenchymal hemorrhage were 100% using the iOS device with a perfect interrater agreement (kappa = 1). The sensitivity, specificity, and accuracy of detecting acute parenchymal ischemic change were 94.1%, 100%, and 98.09% respectively for reader 1 and 97.05%, 100%, and 99.04% for reader 2 with nearly perfect interrater agreement (kappa = .8). The sensitivity, specificity, and accuracy of detecting dense vessel sign were 100%, 95.4%, and 96.19% respectively for reader 1 and 72.2%, 100%, and 95.23% for reader 2 using the iOS device with a good interrater agreement (kappa = .69). The sensitivity, specificity, and accuracy of detecting vessel occlusion on CT angiography scans were 94.4%, 100%, and 98.46% respectively for both readers using the iOS device, with perfect interrater agreement (kappa = 1). No significant difference (P < .05) was noted in the interpretation time between the workstation and iOS device. Conclusion The smartphone client-server teleradiology system appears promising and may have the potential to allow urgent management decisions in acute stroke. However, this study was retrospective, involved relatively few patient studies, and only two readers. Generalizing conclusions about its clinical utility, especially in other diagnostic use cases, should not be made until additional studies are performed. PMID:21550961

  6. A smartphone client-server teleradiology system for primary diagnosis of acute stroke.

    PubMed

    Mitchell, J Ross; Sharma, Pranshu; Modi, Jayesh; Simpson, Mark; Thomas, Monroe; Hill, Michael D; Goyal, Mayank

    2011-05-06

    Recent advances in the treatment of acute ischemic stroke have made rapid acquisition, visualization, and interpretation of images a key factor for positive patient outcomes. We have developed a new teleradiology system based on a client-server architecture that enables rapid access to interactive advanced 2-D and 3-D visualization on a current generation smartphone device (Apple iPhone or iPod Touch, or an Android phone) without requiring patient image data to be stored on the device. Instead, a server loads and renders the patient images, then transmits a rendered frame to the remote device. Our objective was to determine if a new smartphone client-server teleradiology system is capable of providing accuracies and interpretation times sufficient for diagnosis of acute stroke. This was a retrospective study. We obtained 120 recent consecutive noncontrast computed tomography (NCCT) brain scans and 70 computed tomography angiogram (CTA) head scans from the Calgary Stroke Program database. Scans were read by two neuroradiologists, one on a medical diagnostic workstation and an iPod or iPhone (hereafter referred to as an iOS device) and the other only on an iOS device. NCCT brain scans were evaluated for early signs of infarction, which includes early parenchymal ischemic changes and dense vessel sign, and to exclude acute intraparenchymal hemorrhage and stroke mimics. CTA brain scans were evaluated for any intracranial vessel occlusion. The interpretations made on an iOS device were compared with those made at a workstation. The total interpretation times were recorded for both platforms. Interrater agreement was assessed. True positives, true negatives, false positives, and false negatives were obtained, and sensitivity, specificity, and accuracy of detecting the abnormalities on the iOS device were computed. The sensitivity, specificity, and accuracy of detecting intraparenchymal hemorrhage were 100% using the iOS device with a perfect interrater agreement (kappa=1). The sensitivity, specificity, and accuracy of detecting acute parenchymal ischemic change were 94.1%, 100%, and 98.09% respectively for reader 1 and 97.05%, 100%, and 99.04% for reader 2 with nearly perfect interrater agreement (kappa=.8). The sensitivity, specificity, and accuracy of detecting dense vessel sign were 100%, 95.4%, and 96.19% respectively for reader 1 and 72.2%, 100%, and 95.23% for reader 2 using the iOS device with a good interrater agreement (kappa=.69). The sensitivity, specificity, and accuracy of detecting vessel occlusion on CT angiography scans were 94.4%, 100%, and 98.46% respectively for both readers using the iOS device, with perfect interrater agreement (kappa=1). No significant difference (P<.05) was noted in the interpretation time between the workstation and iOS device. The smartphone client-server teleradiology system appears promising and may have the potential to allow urgent management decisions in acute stroke. However, this study was retrospective, involved relatively few patient studies, and only two readers. Generalizing conclusions about its clinical utility, especially in other diagnostic use cases, should not be made until additional studies are performed. ©J Ross Mitchell, Pranshu Sharma, Jayesh Modi, Mark Simpson, Monroe Thomas, Michael D. Hill, Mayank Goyal.

  7. X-ray scan detection for cargo integrity

    NASA Astrophysics Data System (ADS)

    Valencia, Juan; Miller, Steve

    2011-04-01

    The increase of terrorism and its global impact has made the determination of the contents of cargo containers a necessity. Existing technology allows non-intrusive inspections to determine the contents of a container rapidly and accurately. However, some cargo shipments are exempt from such inspections. Hence, there is a need for a technology that enables rapid and accurate means of detecting whether such containers were non-intrusively inspected. Non-intrusive inspections are most commonly performed utilizing high powered X-ray equipment. The challenge is creating a device that can detect short duration X-ray scans while maintaining a portable, battery powered, low cost, and easy to use platform. The Pacific Northwest National Laboratory (PNNL) has developed a methodology and prototype device focused on this challenge. The prototype, developed by PNNL, is a battery powered electronic device that continuously measures its X-ray and Gamma exposure, calculates the dose equivalent rate, and makes a determination of whether the device has been exposed to the amount of radiation experienced during an X-ray inspection. Once an inspection is detected, the device will record a timestamp of the event and relay the information to authorized personnel via a visual alert, USB connection, and/or wireless communication. The results of this research demonstrate that PNNL's prototype device can be effective at determining whether a container was scanned by X-ray equipment typically used for cargo container inspections. This paper focuses on laboratory measurements and test results acquired with the PNNL prototype device using several X-ray radiation levels.

  8. Examining the relationship between authenticity and self-handicapping.

    PubMed

    Akin, Ahmet; Akin, Umran

    2014-12-01

    Self-handicapping includes strategies of externalization in which people excuse failure and internalize success, but which also prevents them from behaving in an authentic way. The goal was to investigate the relation of authenticity with self-handicapping. The study was conducted with 366 university students (176 men, 190 women; M age = 20.2 yr.). Participants completed the Turkish version of the Authenticity Scale and the Self-handicapping Scale. Self-handicapping was correlated positively with two factors of authenticity, accepting external influence and self-alienation, and negatively with the authentic living factor. A multiple regression analysis indicated that self-handicapping was predicted positively by self-alienation and accepting external influence and negatively by authentic living, accounting for 21% of the variance collectively. These results demonstrated the negative association of authenticity with self-handicapping.

  9. An Authentication Protocol for Future Sensor Networks.

    PubMed

    Bilal, Muhammad; Kang, Shin-Gak

    2017-04-28

    Authentication is one of the essential security services in Wireless Sensor Networks (WSNs) for ensuring secure data sessions. Sensor node authentication ensures the confidentiality and validity of data collected by the sensor node, whereas user authentication guarantees that only legitimate users can access the sensor data. In a mobile WSN, sensor and user nodes move across the network and exchange data with multiple nodes, thus experiencing the authentication process multiple times. The integration of WSNs with Internet of Things (IoT) brings forth a new kind of WSN architecture along with stricter security requirements; for instance, a sensor node or a user node may need to establish multiple concurrent secure data sessions. With concurrent data sessions, the frequency of the re-authentication process increases in proportion to the number of concurrent connections. Moreover, to establish multiple data sessions, it is essential that a protocol participant have the capability of running multiple instances of the protocol run, which makes the security issue even more challenging. The currently available authentication protocols were designed for the autonomous WSN and do not account for the above requirements. Hence, ensuring a lightweight and efficient authentication protocol has become more crucial. In this paper, we present a novel, lightweight and efficient key exchange and authentication protocol suite called the Secure Mobile Sensor Network (SMSN) Authentication Protocol. In the SMSN a mobile node goes through an initial authentication procedure and receives a re-authentication ticket from the base station. Later a mobile node can use this re-authentication ticket when establishing multiple data exchange sessions and/or when moving across the network. This scheme reduces the communication and computational complexity of the authentication process. We proved the strength of our protocol with rigorous security analysis (including formal analysis using the BAN-logic) and simulated the SMSN and previously proposed schemes in an automated protocol verifier tool. Finally, we compared the computational complexity and communication cost against well-known authentication protocols.

  10. An Authentication Protocol for Future Sensor Networks

    PubMed Central

    Bilal, Muhammad; Kang, Shin-Gak

    2017-01-01

    Authentication is one of the essential security services in Wireless Sensor Networks (WSNs) for ensuring secure data sessions. Sensor node authentication ensures the confidentiality and validity of data collected by the sensor node, whereas user authentication guarantees that only legitimate users can access the sensor data. In a mobile WSN, sensor and user nodes move across the network and exchange data with multiple nodes, thus experiencing the authentication process multiple times. The integration of WSNs with Internet of Things (IoT) brings forth a new kind of WSN architecture along with stricter security requirements; for instance, a sensor node or a user node may need to establish multiple concurrent secure data sessions. With concurrent data sessions, the frequency of the re-authentication process increases in proportion to the number of concurrent connections. Moreover, to establish multiple data sessions, it is essential that a protocol participant have the capability of running multiple instances of the protocol run, which makes the security issue even more challenging. The currently available authentication protocols were designed for the autonomous WSN and do not account for the above requirements. Hence, ensuring a lightweight and efficient authentication protocol has become more crucial. In this paper, we present a novel, lightweight and efficient key exchange and authentication protocol suite called the Secure Mobile Sensor Network (SMSN) Authentication Protocol. In the SMSN a mobile node goes through an initial authentication procedure and receives a re-authentication ticket from the base station. Later a mobile node can use this re-authentication ticket when establishing multiple data exchange sessions and/or when moving across the network. This scheme reduces the communication and computational complexity of the authentication process. We proved the strength of our protocol with rigorous security analysis (including formal analysis using the BAN-logic) and simulated the SMSN and previously proposed schemes in an automated protocol verifier tool. Finally, we compared the computational complexity and communication cost against well-known authentication protocols. PMID:28452937

  11. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Solis, John Hector

    In this paper, we present a modular framework for constructing a secure and efficient program obfuscation scheme. Our approach, inspired by the obfuscation with respect to oracle machines model of [4], retains an interactive online protocol with an oracle, but relaxes the original computational and storage restrictions. We argue this is reasonable given the computational resources of modern personal devices. Furthermore, we relax the information-theoretic security requirement for computational security to utilize established cryptographic primitives. With this additional flexibility we are free to explore different cryptographic buildingblocks. Our approach combines authenticated encryption with private information retrieval to construct a securemore » program obfuscation framework. We give a formal specification of our framework, based on desired functionality and security properties, and provide an example instantiation. In particular, we implement AES in Galois/Counter Mode for authenticated encryption and the Gentry-Ramzan [13]constant communication-rate private information retrieval scheme. We present our implementation results and show that non-trivial sized programs can be realized, but scalability is quickly limited by computational overhead. Finally, we include a discussion on security considerations when instantiating specific modules.« less

  12. Multi-Patches IRIS Based Person Authentication System Using Particle Swarm Optimization and Fuzzy C-Means Clustering

    NASA Astrophysics Data System (ADS)

    Shekar, B. H.; Bhat, S. S.

    2017-05-01

    Locating the boundary parameters of pupil and iris and segmenting the noise free iris portion are the most challenging phases of an automated iris recognition system. In this paper, we have presented person authentication frame work which uses particle swarm optimization (PSO) to locate iris region and circular hough transform (CHT) to device the boundary parameters. To undermine the effect of the noise presented in the segmented iris region we have divided the candidate region into N patches and used Fuzzy c-means clustering (FCM) to classify the patches into best iris region and not so best iris region (noisy region) based on the probability density function of each patch. Weighted mean Hammimng distance is adopted to find the dissimilarity score between the two candidate irises. We have used Log-Gabor, Riesz and Taylor's series expansion (TSE) filters and combinations of these three for iris feature extraction. To justify the feasibility of the proposed method, we experimented on the three publicly available data sets IITD, MMU v-2 and CASIA v-4 distance.

  13. Large Devices of Industrial Culture: the Preservation of their Historical Evidence

    NASA Astrophysics Data System (ADS)

    Keller-Kempas, Ruth

    Development of material science and engineering technology is present in devices of the last 150 years. How can the historical evidence of their construction and use, the transfer of technological stages of development be preserved as a special quality in cultural tradition? The conservation of technical artefacts as a cultural heritage of western civilisation has developed scientific methods of conservation so as to respect their authenticity as materialised references of the past. During the last fifteen years these methods have been evaluated in the unique training program for this specialisation of conservation discipline at the HTW Berlin, University for Applied Sciences. They are enough standardised now to be applied without hesitation on objects being kept indoor in a museum or private collection. It is much more difficult to keep devices outside or, as is the case in Observatory - at climates changing between inside aud outside situations. The paper will show a few examples of how to develop concepts for conservation and how it is teclinically possible to preserve the very important original surfaces of the objects, their authentic materiality. As soon as the objects are kept as part of cultural history or history of science they change their function and can not be kept in the same manner as before. They give evidence of their materiality. The archaeometry of modern times is a new and expanding branch of historic research. Moreover the surface of a historic device is the point of contact between passed times and the presence for the general public as much as for the scientists. It will be demonstrated how large the loss of historic information and thus of cultural value of objects can be by renovation instead of considerate conservation. Some examples of careful conservation work carried out on big objects other than an observatory are presented. The paper will then summarise the possibilities and difficulties of doing such work on large devices still in use. The scientific research in this specialist field of conservation has only just begun und will be continued in large scientific projects in the future: “The relation to the past is always an integral dimension of the form, of being of the present, and restoration, dealing materially with the object, always exteriorizes this relationship in a manifest an indisputable manner, even in its least conscious aspects.”

  14. [Magnetic resonance imaging in patients with implantable devices for treatment of disturbed heart rhythm: review of the current situation].

    PubMed

    Sviridova, A A

    The question of the possibility of MRI scanning in patients with cardiac implantable electronic devices (CIED) appeared simultaneously with the introduction of MRI in clinical practice. A lot of in-vitro, in-vivo and clinical researches were performed to estimate wat going on with CIED in strong magnetic field and is it possible to perform some unified protocol of safe MRI-scanning for these patients. Recommendations were provided, but not for the wide practice. MRI remained strongly contraindicated for CIED patient. To meet the clinical need CIEM manufacturers changed the design of devices to made them MRI-compatible, including reducing of ferromagnetic components, additional filters, new software. Lead coil design was changed as well to minimize lead heating and electrical current induction. Now all leaders of CIED industry have in their portfolio all types of MRI-conditional implanted cardiac rhythm management devices (pacemakers, ICDs, CRTs). "Conditional" means MRI scanning can be done only under specific condition. For MRI device and lead in one system have to be from the same manufacturer. Now, if you need to implant the device, you must proceed from the fact that the patient is more likely to need an MRI in the future and choose the appropriate model, not forgetting that the electrodes should also be MRI-compatible.

  15. Image authentication using distributed source coding.

    PubMed

    Lin, Yao-Chung; Varodayan, David; Girod, Bernd

    2012-01-01

    We present a novel approach using distributed source coding for image authentication. The key idea is to provide a Slepian-Wolf encoded quantized image projection as authentication data. This version can be correctly decoded with the help of an authentic image as side information. Distributed source coding provides the desired robustness against legitimate variations while detecting illegitimate modification. The decoder incorporating expectation maximization algorithms can authenticate images which have undergone contrast, brightness, and affine warping adjustments. Our authentication system also offers tampering localization by using the sum-product algorithm.

  16. Unexpected surface implanted layer in static random access memory devices observed by microwave impedance microscope

    NASA Astrophysics Data System (ADS)

    Kundhikanjana, W.; Yang, Y.; Tanga, Q.; Zhang, K.; Lai, K.; Ma, Y.; Kelly, M. A.; Li, X. X.; Shen, Z.-X.

    2013-02-01

    Real-space mapping of doping concentration in semiconductor devices is of great importance for the microelectronics industry. In this work, a scanning microwave impedance microscope (MIM) is employed to resolve the local conductivity distribution of a static random access memory sample. The MIM electronics can also be adjusted to the scanning capacitance microscopy (SCM) mode, allowing both measurements on the same region. Interestingly, while the conventional SCM images match the nominal device structure, the MIM results display certain unexpected features, which originate from a thin layer of the dopant ions penetrating through the protective layers during the heavy implantation steps.

  17. Resource optimized TTSH-URA for multimedia stream authentication in swallowable-capsule-based wireless body sensor networks.

    PubMed

    Wang, Wei; Wang, Chunqiu; Zhao, Min

    2014-03-01

    To ease the burdens on the hospitalization capacity, an emerging swallowable-capsule technology has evolved to serve as a remote gastrointestinal (GI) disease examination technique with the aid of the wireless body sensor network (WBSN). Secure multimedia transmission in such a swallowable-capsule-based WBSN faces critical challenges including energy efficiency and content quality guarantee. In this paper, we propose a joint resource allocation and stream authentication scheme to maintain the best possible video quality while ensuring security and energy efficiency in GI-WBSNs. The contribution of this research is twofold. First, we establish a unique signature-hash (S-H) diversity approach in the authentication domain to optimize video authentication robustness and the authentication bit rate overhead over a wireless channel. Based on the full exploration of S-H authentication diversity, we propose a new two-tier signature-hash (TTSH) stream authentication scheme to improve the video quality by reducing authentication dependence overhead while protecting its integrity. Second, we propose to combine this authentication scheme with a unique S-H oriented unequal resource allocation (URA) scheme to improve the energy-distortion-authentication performance of wireless video delivery in GI-WBSN. Our analysis and simulation results demonstrate that the proposed TTSH with URA scheme achieves considerable gain in both authenticated video quality and energy efficiency.

  18. Authentic leadership: application to women leaders

    PubMed Central

    Hopkins, Margaret M.; O’Neil, Deborah A.

    2015-01-01

    The purpose of this perspective article is to present the argument that authentic leadership is a gendered representation of leadership. We first provide a brief history of leadership theories and definitions of authentic leadership. We then critique authentic leadership and offer arguments to support the premise that authentic leadership is not gender-neutral and is especially challenging for women. PMID:26236254

  19. Xavier's Take on Authentic Writing: Structuring Choices for Expression and Impact

    ERIC Educational Resources Information Center

    Behizadeh, Nadia

    2015-01-01

    Because authenticity in education is a subjective judgment regarding the meaningfulness of an activity, a need exists to co-investigate with students classroom factors increasing authenticity of writing. In this case study, one 8th grade student's needs for authentic writing are explored in detail. Xavier's take on authentic writing…

  20. Authentic leadership: application to women leaders.

    PubMed

    Hopkins, Margaret M; O'Neil, Deborah A

    2015-01-01

    The purpose of this perspective article is to present the argument that authentic leadership is a gendered representation of leadership. We first provide a brief history of leadership theories and definitions of authentic leadership. We then critique authentic leadership and offer arguments to support the premise that authentic leadership is not gender-neutral and is especially challenging for women.

  1. Radar Array Processing of Experimental Data Via the Scan-MUSIC Algorithm

    DTIC Science & Technology

    2004-06-01

    Radar Array Processing of Experimental Data Via the Scan- MUSIC Algorithm by Canh Ly ARL-TR-3135 June 2004...Processing of Experimental Data Via the Scan- MUSIC Algorithm Canh Ly Sensors and Electron Devices Directorate, ARL...NUMBER 5b. GRANT NUMBER 4. TITLE AND SUBTITLE Radar Array Processing of Experimental Data Via the Scan- MUSIC Algorithm 5c. PROGRAM ELEMENT NUMBER 5d

  2. Localized lossless authentication watermark (LAW)

    NASA Astrophysics Data System (ADS)

    Celik, Mehmet U.; Sharma, Gaurav; Tekalp, A. Murat; Saber, Eli S.

    2003-06-01

    A novel framework is proposed for lossless authentication watermarking of images which allows authentication and recovery of original images without any distortions. This overcomes a significant limitation of traditional authentication watermarks that irreversibly alter image data in the process of watermarking and authenticate the watermarked image rather than the original. In particular, authenticity is verified before full reconstruction of the original image, whose integrity is inferred from the reversibility of the watermarking procedure. This reduces computational requirements in situations when either the verification step fails or the zero-distortion reconstruction is not required. A particular instantiation of the framework is implemented using a hierarchical authentication scheme and the lossless generalized-LSB data embedding mechanism. The resulting algorithm, called localized lossless authentication watermark (LAW), can localize tampered regions of the image; has a low embedding distortion, which can be removed entirely if necessary; and supports public/private key authentication and recovery options. The effectiveness of the framework and the instantiation is demonstrated through examples.

  3. Residual Stress and Fracture of PECVD Thick Oxide Films for Power MEMS Structures and Devices

    DTIC Science & Technology

    2007-06-01

    Residual stress leads to large overall wafer bow, which makes further processing difficult. For example some microfabrication machines , such as chemical...curvature will be measured across the wafer surface in 12 scans, rotating 24 the wafer by 300 between each scan. In situ wafer curvature will be...SiOx. 4.1. Introduction As introduced earlier (Sec.1), in Power MEMS (micro energy- harvesting devices such as micro heat engines and related components

  4. How to Speak an Authentication Secret Securely from an Eavesdropper

    NASA Astrophysics Data System (ADS)

    O'Gorman, Lawrence; Brotman, Lynne; Sammon, Michael

    When authenticating over the telephone or mobile headphone, the user cannot always assure that no eavesdropper hears the password or authentication secret. We describe an eavesdropper-resistant, challenge-response authentication scheme for spoken authentication where an attacker can hear the user’s voiced responses. This scheme entails the user to memorize a small number of plaintext-ciphertext pairs. At authentication, these are challenged in random order and interspersed with camouflage elements. It is shown that the response can be made to appear random so that no information on the memorized secret can be learned by eavesdroppers. We describe the method along with parameter value tradeoffs of security strength, authentication time, and memory effort. This scheme was designed for user authentication of wireless headsets used for hands-free communication by healthcare staff at a hospital.

  5. Megahertz ultra-wide-field swept-source retina optical coherence tomography compared to current existing imaging devices.

    PubMed

    Reznicek, Lukas; Klein, Thomas; Wieser, Wolfgang; Kernt, Marcus; Wolf, Armin; Haritoglou, Christos; Kampik, Anselm; Huber, Robert; Neubauer, Aljoscha S

    2014-06-01

    To investigate the image quality of wide-angle cross-sectional and reconstructed fundus images based on ultra-megahertz swept-source Fourier domain mode locking (FDML) OCT compared to current generation diagnostic devices. A 1,050 nm swept-source FDML OCT system was constructed running at 1.68 MHz A-scan rate covering approximately 70° field of view. Twelve normal eyes were imaged with the device applying an isotropically dense sampling protocol (1,900 × 1,900 A-scans) with a fill factor of 100 %. Obtained OCT scan image quality was compared with two commercial OCT systems (Heidelberg Spectralis and Stratus OCT) of the same 12 eyes. Reconstructed en-face fundus images from the same FDML-OCT data set were compared to color fundus, infrared and ultra-wide-field scanning laser images (SLO). Comparison of cross-sectional scans showed a high overall image quality of the 15× averaged FDML images at 1.68 MHz [overall quality grading score: 8.42 ± 0.52, range 0 (bad)-10 (excellent)] comparable to current spectral-domain OCTs (overall quality grading score: 8.83 ± 0.39, p = 0.731). On FDML OCT, a dense 3D data set was obtained covering also the central and mid-peripheral retina. The reconstructed FDML OCT en-face fundus images had high image quality comparable to scanning laser ophthalmoscope (SLO) as judged from retinal structures such as vessels and optic disc. Overall grading score was 8.36 ± 0.51 for FDML OCT vs 8.27 ± 0.65 for SLO (p = 0.717). Ultra-wide-field megahertz 3D FDML OCT at 1.68 MHz is feasible, and provides cross-sectional image quality comparable to current spectral-domain OCT devices. In addition, reconstructed en-face visualization of fundus images result in a wide-field view with high image quality as compared to currently available fundus imaging devices. The improvement of >30× in imaging speed over commercial spectral-domain OCT technology enables high-density scan protocols leading to a data set for high quality cross-sectional and en-face images of the posterior segment.

  6. Fast and secure handover of intra-ASN IEEE802.16 network by proposed certificate based pre-authentication

    NASA Astrophysics Data System (ADS)

    Sridevi, B.; Supriya, T. S.; Rajaram, S.

    2013-01-01

    The current generation of wireless networks has been designed predominantly to support voice and more recently data traffic. WiMAX is currently one of the hottest technologies in wireless. The main motive of the mobile technologies is to provide seamless cost effective mobility. But this is affected by Authentication cost and handover delay since on each handoff the Mobile Station (MS) has to undergo all steps of authentication. Pre-Authentication is used to reduce the handover delay and increase the speed of the Intra-ASN Handover. Proposed Pre-Authentication method is intended to reduce the authentication delay by getting pre authenticated by central authority called Pre Authentication Authority (PAA). MS requests PAA for Pre Authentication Certificate (PAC) before performing handoff. PAA verifies the identity of MS and provides PAC to MS and also to the neighboring target Base Stations (tBSs). MS having time bound PAC can skip the authentication process when recognized by target BS during handoff. It also prevents the DOS (Denial Of Service) attack and Replay attack. It has no wastage of unnecessary key exchange of the resources. The proposed work is simulated by NS2 model and by MATLAB.

  7. 75 FR 70290 - In the Matter of Certain Biometric Scanning Devices, Components Thereof, Associated Software, and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-17

    ... INTERNATIONAL TRADE COMMISSION [Inv. No. 337-TA-720] In the Matter of Certain Biometric Scanning... also be obtained by accessing its Internet server ( http://www.usitc.gov ). The public record for this... for importation, and sale within the United States after importation of certain biometric scanning...

  8. Effect of Software Version on the Accuracy of an Intraoral Scanning Device.

    PubMed

    Haddadi, Yasser; Bahrami, Golnosh; Isidor, Flemming

    2018-04-06

    To investigate the impact of software version on the accuracy of an intraoral scanning device. A master tooth was scanned with a high-precision optical scanner and then 10 times with a CEREC Omnicam scanner with software versions 4.4.0 and 4.4.4. Discrepancies were measured using quality control software. Mean deviation for 4.4.0 was 36.2 ± 35 μm and for 4.4.4 was 20.7 ± 14.2 μm (P ≤ .001). Software version has a significant impact on the accuracy of an intraoral scanner. It is important that researchers also publish the software version of scanners when publishing their findings.

  9. Development of Scanning Ultrafast Electron Microscope Capability.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Collins, Kimberlee Chiyoko; Talin, Albert Alec; Chandler, David W.

    Modern semiconductor devices rely on the transport of minority charge carriers. Direct examination of minority carrier lifetimes in real devices with nanometer-scale features requires a measurement method with simultaneously high spatial and temporal resolutions. Achieving nanometer spatial resolutions at sub-nanosecond temporal resolution is possible with pump-probe methods that utilize electrons as probes. Recently, a stroboscopic scanning electron microscope was developed at Caltech, and used to study carrier transport across a Si p-n junction [ 1 , 2 , 3 ] . In this report, we detail our development of a prototype scanning ultrafast electron microscope system at Sandia National Laboratoriesmore » based on the original Caltech design. This effort represents Sandia's first exploration into ultrafast electron microscopy.« less

  10. Authentication systems for securing clinical documentation workflows. A systematic literature review.

    PubMed

    Schwartze, J; Haarbrandt, B; Fortmeier, D; Haux, R; Seidel, C

    2014-01-01

    Integration of electronic signatures embedded in health care processes in Germany challenges health care service and supply facilities. The suitability of the signature level of an eligible authentication procedure is confirmed for a large part of documents in clinical practice. However, the concrete design of such a procedure remains unclear. To create a summary of usable user authentication systems suitable for clinical workflows. A Systematic literature review based on nine online bibliographic databases. Search keywords included authentication, access control, information systems, information security and biometrics with terms user authentication, user identification and login in title or abstract. Searches were run between 7 and 12 September 2011. Relevant conference proceedings were searched manually in February 2013. Backward reference search of selected results was done. Only publications fully describing authentication systems used or usable were included. Algorithms or purely theoretical concepts were excluded. Three authors did selection independently. DATA EXTRACTION AND ASSESSMENT: Semi-structured extraction of system characteristics was done by the main author. Identified procedures were assessed for security and fulfillment of relevant laws and guidelines as well as for applicability. Suitability for clinical workflows was derived from the assessments using a weighted sum proposed by Bonneau. Of 7575 citations retrieved, 55 publications meet our inclusion criteria. They describe 48 different authentication systems; 39 were biometric and nine graphical password systems. Assessment of authentication systems showed high error rates above European CENELEC standards and a lack of applicability of biometric systems. Graphical passwords did not add overall value compared to conventional passwords. Continuous authentication can add an additional layer of safety. Only few systems are suitable partially or entirely for use in clinical processes. Suitability strongly depends on national or institutional requirements. Four authentication systems seem to fulfill requirements of authentication procedures for clinical workflows. Research is needed in the area of continuous authentication with biometric methods. A proper authentication system should combine all factors of authentication implementing and connecting secure individual measures.

  11. Authentic leadership: a new theory for nursing or back to basics?

    PubMed

    Wong, Carol; Cummings, Greta

    2009-01-01

    Authentic leadership is an emerging theoretical model purported to focus on the root component of effective leadership. The purpose of this paper is to describe the relevance of authentic leadership to the advancement of nursing leadership practice and research and address the question of whether this is a new theory for leadership or an old one in new packaging. The paper outlines the origins and key elements of the model, assesses the theoretical, conceptual and measurement issues associated with authentic leadership and compares it with other leadership theories frequently reported in the nursing literature. The emerging authentic leadership theory holds promise for explaining the underlying processes by which authentic leaders and followers influence work outcomes and organizational performance. Construct validity of authentic leadership has preliminary documentation and a few studies have shown positive relationships between authenticity and trust. Furthermore, the clarity of the authenticity construct and comprehensiveness of the overall theoretical framework provide a fruitful base for future research examining the relationship between authentic leadership and the creation of healthier work environments. A clear focus on the relational aspects of leadership, the foundational moral/ethical component, a potential linkage of positive psychological capital to work engagement and the emphasis on leader and follower development in the authentic leadership framework are closely aligned to current and future nursing leadership practice and research priorities for the creation of sustainable changes in nursing work environments.

  12. Explicit authenticity and stimulus features interact to modulate BOLD response induced by emotional speech.

    PubMed

    Drolet, Matthis; Schubotz, Ricarda I; Fischer, Julia

    2013-06-01

    Context has been found to have a profound effect on the recognition of social stimuli and correlated brain activation. The present study was designed to determine whether knowledge about emotional authenticity influences emotion recognition expressed through speech intonation. Participants classified emotionally expressive speech in an fMRI experimental design as sad, happy, angry, or fearful. For some trials, stimuli were cued as either authentic or play-acted in order to manipulate participant top-down belief about authenticity, and these labels were presented both congruently and incongruently to the emotional authenticity of the stimulus. Contrasting authentic versus play-acted stimuli during uncued trials indicated that play-acted stimuli spontaneously up-regulate activity in the auditory cortex and regions associated with emotional speech processing. In addition, a clear interaction effect of cue and stimulus authenticity showed up-regulation in the posterior superior temporal sulcus and the anterior cingulate cortex, indicating that cueing had an impact on the perception of authenticity. In particular, when a cue indicating an authentic stimulus was followed by a play-acted stimulus, additional activation occurred in the temporoparietal junction, probably pointing to increased load on perspective taking in such trials. While actual authenticity has a significant impact on brain activation, individual belief about stimulus authenticity can additionally modulate the brain response to differences in emotionally expressive speech.

  13. Comparing Change in Anterior Curvature after Corneal Cross-Linking Using Scanning-Slit and Scheimpflug Technology.

    PubMed

    Lang, Paul Z; Thulasi, Praneetha; Khandelwal, Sumitra S; Hafezi, Farhad; Randleman, J Bradley

    2018-05-02

    To evaluate the correlation between anterior axial curvature difference maps following corneal cross-linking (CXL) for progressive keratoconus obtained from Scheimpflug-based tomography and Placido-based topography. Between-devices reliability analysis of randomized clinical trial data METHODS: Corneal imaging was collected at a single center institution pre-operatively and at 3, 6, and 12 months post-operatively using Scheimpflug-based tomography (Pentacam, Oculus Inc., Lynnwood, WA) and Scanning-slit, Placido-based topography (Orbscan II, Bausch & Lomb, Rochester, NY) in patients with progressive keratoconus receiving standard protocol CXL (3mW/cm 2 for 30 minutes). Regularization index (RI), absolute maximum keratometry (K Max), and change in (ΔK Max) were compared between the two devices at each time point. 51 eyes from 36 patients were evaluated at all time points. values were significantly different at all time points [56.01±5.3D Scheimpflug vs. 55.04±5.1D scanning-slit pre-operatively (p=0.003); 54.58±5.3D Scheimpflug vs. 53.12±4.9D scanning-slit at 12 months (p<0.0001)] but strongly correlated between devices (r=0.90-0.93) at all time points. The devices were not significantly different at any time point for either ΔK Max or RI but were poorly correlated at all time points (r=0.41-0.53 for ΔK Max, r=0.29-0.48 for RI). At 12 months, 95% LOA was 7.51D for absolute, 8.61D for ΔK Max, and 19.86D for RI. Measurements using Scheimpflug and scanning-slit Placido-based technology are correlated but not interchangeable. Both devices appear reasonable for separately monitoring the cornea's response to CXL; however, caution should be used when comparing results obtained with one measuring technology to the other. Copyright © 2018 Elsevier Inc. All rights reserved.

  14. Lightweight ECC based RFID authentication integrated with an ID verifier transfer protocol.

    PubMed

    He, Debiao; Kumar, Neeraj; Chilamkurti, Naveen; Lee, Jong-Hyouk

    2014-10-01

    The radio frequency identification (RFID) technology has been widely adopted and being deployed as a dominant identification technology in a health care domain such as medical information authentication, patient tracking, blood transfusion medicine, etc. With more and more stringent security and privacy requirements to RFID based authentication schemes, elliptic curve cryptography (ECC) based RFID authentication schemes have been proposed to meet the requirements. However, many recently published ECC based RFID authentication schemes have serious security weaknesses. In this paper, we propose a new ECC based RFID authentication integrated with an ID verifier transfer protocol that overcomes the weaknesses of the existing schemes. A comprehensive security analysis has been conducted to show strong security properties that are provided from the proposed authentication scheme. Moreover, the performance of the proposed authentication scheme is analyzed in terms of computational cost, communicational cost, and storage requirement.

  15. Optical authentication based on moiré effect of nonlinear gratings in phase space

    NASA Astrophysics Data System (ADS)

    Liao, Meihua; He, Wenqi; Wu, Jiachen; Lu, Dajiang; Liu, Xiaoli; Peng, Xiang

    2015-12-01

    An optical authentication scheme based on the moiré effect of nonlinear gratings in phase space is proposed. According to the phase function relationship of the moiré effect in phase space, an arbitrary authentication image can be encoded into two nonlinear gratings which serve as the authentication lock (AL) and the authentication key (AK). The AL is stored in the authentication system while the AK is assigned to the authorized user. The authentication procedure can be performed using an optoelectronic approach, while the design process is accomplished by a digital approach. Furthermore, this optical authentication scheme can be extended for multiple users with different security levels. The proposed scheme can not only verify the legality of a user identity, but can also discriminate and control the security levels of legal users. Theoretical analysis and simulation experiments are provided to verify the feasibility and effectiveness of the proposed scheme.

  16. Vein matching using artificial neural network in vein authentication systems

    NASA Astrophysics Data System (ADS)

    Noori Hoshyar, Azadeh; Sulaiman, Riza

    2011-10-01

    Personal identification technology as security systems is developing rapidly. Traditional authentication modes like key; password; card are not safe enough because they could be stolen or easily forgotten. Biometric as developed technology has been applied to a wide range of systems. According to different researchers, vein biometric is a good candidate among other biometric traits such as fingerprint, hand geometry, voice, DNA and etc for authentication systems. Vein authentication systems can be designed by different methodologies. All the methodologies consist of matching stage which is too important for final verification of the system. Neural Network is an effective methodology for matching and recognizing individuals in authentication systems. Therefore, this paper explains and implements the Neural Network methodology for finger vein authentication system. Neural Network is trained in Matlab to match the vein features of authentication system. The Network simulation shows the quality of matching as 95% which is a good performance for authentication system matching.

  17. Kerberos authentication: The security answer for unsecured networks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Engert, D.E.

    1995-06-01

    Traditional authentication schemes do not properly address the problems encountered with today`s unsecured networks. Kerbmm developed by MIT, on the other hand is designed to operate in an open unsecured network, yet provide good authentication and security including encrypted session traffic. Basic Kerberos principles as well as experiences of the ESnet Authentication Pilot Project with Cross Realm. Authentication between four National Laboratories will also be described.

  18. SSO - Single-Sign-On Profile: Authentication Mechanisms Version 2.0

    NASA Astrophysics Data System (ADS)

    Taffoni, Giuliano; Schaaf, André; Rixon, Guy; Major, Brian; Taffoni, Giuliano

    2017-05-01

    Approved client-server authentication mechanisms are described for the IVOA single-sign-on profile: No Authentication; HTTP Basic Authentication; TLS with passwords; TLS with client certificates; Cookies; Open Authentication; Security Assertion Markup Language; OpenID. Normative rules are given for the implementation of these mechanisms, mainly by reference to pre-existing standards. The Authorization mechanisms are out of the scope of this document.

  19. Ultrahigh speed en face OCT capsule for endoscopic imaging

    PubMed Central

    Liang, Kaicheng; Traverso, Giovanni; Lee, Hsiang-Chieh; Ahsen, Osman Oguz; Wang, Zhao; Potsaid, Benjamin; Giacomelli, Michael; Jayaraman, Vijaysekhar; Barman, Ross; Cable, Alex; Mashimo, Hiroshi; Langer, Robert; Fujimoto, James G.

    2015-01-01

    Depth resolved and en face OCT visualization in vivo may have important clinical applications in endoscopy. We demonstrate a high speed, two-dimensional (2D) distal scanning capsule with a micromotor for fast rotary scanning and a pneumatic actuator for precision longitudinal scanning. Longitudinal position measurement and image registration were performed by optical tracking of the pneumatic scanner. The 2D scanning device enables high resolution imaging over a small field of view and is suitable for OCT as well as other scanning microscopies. Large field of view imaging for screening or surveillance applications can also be achieved by proximally pulling back or advancing the capsule while scanning the distal high-speed micromotor. Circumferential en face OCT was demonstrated in living swine at 250 Hz frame rate and 1 MHz A-scan rate using a MEMS tunable VCSEL light source at 1300 nm. Cross-sectional and en face OCT views of the upper and lower gastrointestinal tract were generated with precision distal pneumatic longitudinal actuation as well as proximal manual longitudinal actuation. These devices could enable clinical studies either as an adjunct to endoscopy, attached to an endoscope, or as a swallowed tethered capsule for non-endoscopic imaging without sedation. The combination of ultrahigh speed imaging and distal scanning capsule technology could enable both screening and surveillance applications. PMID:25909001

  20. Ultrahigh speed en face OCT capsule for endoscopic imaging.

    PubMed

    Liang, Kaicheng; Traverso, Giovanni; Lee, Hsiang-Chieh; Ahsen, Osman Oguz; Wang, Zhao; Potsaid, Benjamin; Giacomelli, Michael; Jayaraman, Vijaysekhar; Barman, Ross; Cable, Alex; Mashimo, Hiroshi; Langer, Robert; Fujimoto, James G

    2015-04-01

    Depth resolved and en face OCT visualization in vivo may have important clinical applications in endoscopy. We demonstrate a high speed, two-dimensional (2D) distal scanning capsule with a micromotor for fast rotary scanning and a pneumatic actuator for precision longitudinal scanning. Longitudinal position measurement and image registration were performed by optical tracking of the pneumatic scanner. The 2D scanning device enables high resolution imaging over a small field of view and is suitable for OCT as well as other scanning microscopies. Large field of view imaging for screening or surveillance applications can also be achieved by proximally pulling back or advancing the capsule while scanning the distal high-speed micromotor. Circumferential en face OCT was demonstrated in living swine at 250 Hz frame rate and 1 MHz A-scan rate using a MEMS tunable VCSEL light source at 1300 nm. Cross-sectional and en face OCT views of the upper and lower gastrointestinal tract were generated with precision distal pneumatic longitudinal actuation as well as proximal manual longitudinal actuation. These devices could enable clinical studies either as an adjunct to endoscopy, attached to an endoscope, or as a swallowed tethered capsule for non-endoscopic imaging without sedation. The combination of ultrahigh speed imaging and distal scanning capsule technology could enable both screening and surveillance applications.

  1. Security Issues for Mobile Medical Imaging: A Primer.

    PubMed

    Choudhri, Asim F; Chatterjee, Arindam R; Javan, Ramin; Radvany, Martin G; Shih, George

    2015-10-01

    The end-user of mobile device apps in the practice of clinical radiology should be aware of security measures that prevent unauthorized use of the device, including passcode policies, methods for dealing with failed login attempts, network manager-controllable passcode enforcement, and passcode enforcement for the protection of the mobile device itself. Protection of patient data must be in place that complies with the Health Insurance Portability and Accountability Act and U.S. Federal Information Processing Standards. Device security measures for data protection include methods for locally stored data encryption, hardware encryption, and the ability to locally and remotely clear data from the device. As these devices transfer information over both local wireless networks and public cell phone networks, wireless network security protocols, including wired equivalent privacy and Wi-Fi protected access, are important components in the chain of security. Specific virtual private network protocols, Secure Sockets Layer and related protocols (especially in the setting of hypertext transfer protocols), native apps, virtual desktops, and nonmedical commercial off-the-shelf apps require consideration in the transmission of medical data over both private and public networks. Enterprise security and management of both personal and enterprise mobile devices are discussed. Finally, specific standards for hardware and software platform security, including prevention of hardware tampering, protection from malicious software, and application authentication methods, are vital components in establishing a secure platform for the use of mobile devices in the medical field. © RSNA, 2015.

  2. 22 CFR 92.40 - Authentication of foreign extradition papers.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 22 Foreign Relations 1 2011-04-01 2011-04-01 false Authentication of foreign extradition papers... RELATED SERVICES Specific Notarial Acts § 92.40 Authentication of foreign extradition papers. Foreign extradition papers are authenticated by chiefs of mission. ...

  3. Sequential mathematical solution for authentication and authorization technique implementing encryption methodology creating secure transaction using various methods also at quantum level

    NASA Astrophysics Data System (ADS)

    Gharami, Snigdha; Dinakaran, M.

    2017-11-01

    We see challenges in authenticating each aspect of electronic usage, starting from transaction to social interaction the authenticity and availability of correct information is guided in various ways. Authentication and authorization follow one another; a process of authentication is calculated on multiple layers of steps. In this paper we discuss various possibilities of modifying and using ways to deal with authentication and authorization mechanism. Idea is to work through authentication with mathematical calculations. We will go through various scenarios and find out the system of information that fits best at the moment of need. We will take account of new approaches of authentication and authorization while working on mathematical paradigm of information. The paper also takes an eye on quantum cryptography and discusses on how it could help one in the present scenario. This paper is divided into sections discussing on various paradigm of authentication and how one can achieve it in secure way, this paper is part of research work where analysis of various constraints are to be followed in the extended research work.

  4. Phone, Email and Video Interactions with Characters in an Epidemiology Game: Towards Authenticity

    NASA Astrophysics Data System (ADS)

    Ney, Muriel; Gonçalves, Celso; Blacheff, Nicolas; Schwartz, Claudine; Bosson, Jean-Luc

    A key concern in game-based learning is the level of authenticity that the game requires in order to have an accurate match of what the learners can expect in the real world with what they need to learn. In this paper, we show how four challenges to the designer of authentic games have been addressed in a game for an undergraduate course in a medical school. We focus in particular on the system of interaction with different characters of the game, namely, the patients and a number of professionals. Students use their personal phone and email application, as well as various web sites. First, we analyze the authenticity of the game through four attributes, authenticity of the character, of the content of the feedback, of the mode and channel of communication and of the constraints. Second, the perceived authenticity (by students) is analyzed. The later is threefold and defined by an external authenticity (perceived likeness with a real life reference), an internal authenticity (perceived internal coherence of the proposed situations) and a didactical authenticity (perceived relevance with respect to learning goals).

  5. Low cost, microcontroller based heating device for multi-wavelength differential scanning fluorimetry.

    PubMed

    Hoeser, Jo; Gnandt, Emmanuel; Friedrich, Thorsten

    2018-01-23

    Differential scanning fluorimetry is a popular method to estimate the stability of a protein in distinct buffer conditions by determining its 'melting point'. The method requires a temperature controlled fluorescence spectrometer or a RT-PCR machine. Here, we introduce a low-budget version of a microcontroller based heating device implemented into a 96-well plate reader that is connected to a standard fluorescence spectrometer. We demonstrate its potential to determine the 'melting point' of soluble and membranous proteins at various buffer conditions.

  6. 22 CFR 131.1 - Certification of documents.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... Foreign Relations DEPARTMENT OF STATE MISCELLANEOUS CERTIFICATES OF AUTHENTICATION § 131.1 Certification of documents. The Authentication Officer, Acting Authentication Officer, or any Assistant Authentication Officer designated by either of the former officers may, and is hereby authorized to, sign and...

  7. Study on a Biometric Authentication Model based on ECG using a Fuzzy Neural Network

    NASA Astrophysics Data System (ADS)

    Kim, Ho J.; Lim, Joon S.

    2018-03-01

    Traditional authentication methods use numbers or graphic passwords and thus involve the risk of loss or theft. Various studies are underway regarding biometric authentication because it uses the unique biometric data of a human being. Biometric authentication technology using ECG from biometric data involves signals that record electrical stimuli from the heart. It is difficult to manipulate and is advantageous in that it enables unrestrained measurements from sensors that are attached to the skin. This study is on biometric authentication methods using the neural network with weighted fuzzy membership functions (NEWFM). In the biometric authentication process, normalization and the ensemble average is applied during preprocessing, characteristics are extracted using Haar-wavelets, and a registration process called “training” is performed in the fuzzy neural network. In the experiment, biometric authentication was performed on 73 subjects in the Physionet Database. 10-40 ECG waveforms were tested for use in the registration process, and 15 ECG waveforms were deemed the appropriate number for registering ECG waveforms. 1 ECG waveforms were used during the authentication stage to conduct the biometric authentication test. Upon testing the proposed biometric authentication method based on 73 subjects from the Physionet Database, the TAR was 98.32% and FAR was 5.84%.

  8. Residual vibration control based on a global search method in a high-speed white light scanning interferometer.

    PubMed

    Song, Zhenyuan; Guo, Tong; Fu, Xing; Hu, Xiaotang

    2018-05-01

    To achieve high-speed measurements using white light scanning interferometers, the scanning devices used need to have high feedback gain in closed-loop operations. However, flexure hinges induce a residual vibration that can cause a misidentification of the fringe order. The reduction of this residual vibration is crucial because the highly nonlinear distortions in interferograms lead to clearly incorrect measured profiles. Input shaping can be used to control the amplitude of the residual vibration. The conventional method uses continuous wavelet transform (CWT) to estimate parameters of the scanning device. Our proposed method extracts equivalent modal parameters using a global search algorithm. Due to its simplicity, ease of implementation, and response speed, this global search method outperforms CWT. The delay time is shortened by searching, because fewer modes are needed for the shaper. The effectiveness of the method has been confirmed by the agreement between simulated shaped responses and experimental displacement information from the capacitive sensor inside the scanning device, and the intensity profiles of the interferometer have been greatly improved. An experiment measuring the surface of a silicon wafer is also presented. The method is shown to be effective at improving the intensity profiles and recovering accurate surface topography. Finally, frequency localizations are found to be almost stable with different proportional gains, but their energy distributions change.

  9. Wafer-level vacuum packaged resonant micro-scanning mirrors for compact laser projection displays

    NASA Astrophysics Data System (ADS)

    Hofmann, Ulrich; Oldsen, Marten; Quenzer, Hans-Joachim; Janes, Joachim; Heller, Martin; Weiss, Manfred; Fakas, Georgios; Ratzmann, Lars; Marchetti, Eleonora; D'Ascoli, Francesco; Melani, Massimiliano; Bacciarelli, Luca; Volpi, Emilio; Battini, Francesco; Mostardini, Luca; Sechi, Francesco; De Marinis, Marco; Wagner, Bernd

    2008-02-01

    Scanning laser projection using resonant actuated MEMS scanning mirrors is expected to overcome the current limitation of small display size of mobile devices like cell phones, digital cameras and PDAs. Recent progress in the development of compact modulated RGB laser sources enables to set up very small laser projection systems that become attractive not only for consumer products but also for automotive applications like head-up and dash-board displays. Within the last years continuous progress was made in increasing MEMS scanner performance. However, only little is reported on how mass-produceability of these devices and stable functionality even under harsh environmental conditions can be guaranteed. Automotive application requires stable MEMS scanner operation over a wide temperature range from -40° to +85°Celsius. Therefore, hermetic packaging of electrostatically actuated MEMS scanning mirrors becomes essential to protect the sensitive device against particle contamination and condensing moisture. This paper reports on design, fabrication and test of a resonant actuated two-dimensional micro scanning mirror that is hermetically sealed on wafer level. With resonant frequencies of 30kHz and 1kHz, an achievable Theta-D-product of 13mm.deg and low dynamic deformation <20nm RMS it targets Lissajous projection with SVGA-resolution. Inevitable reflexes at the vacuum package surface can be seperated from the projection field by permanent inclination of the micromirror.

  10. An improved three-dimensional non-scanning laser imaging system based on digital micromirror device

    NASA Astrophysics Data System (ADS)

    Xia, Wenze; Han, Shaokun; Lei, Jieyu; Zhai, Yu; Timofeev, Alexander N.

    2018-01-01

    Nowadays, there are two main methods to realize three-dimensional non-scanning laser imaging detection, which are detection method based on APD and detection method based on Streak Tube. However, the detection method based on APD possesses some disadvantages, such as small number of pixels, big pixel interval and complex supporting circuit. The detection method based on Streak Tube possesses some disadvantages, such as big volume, bad reliability and high cost. In order to resolve the above questions, this paper proposes an improved three-dimensional non-scanning laser imaging system based on Digital Micromirror Device. In this imaging system, accurate control of laser beams and compact design of imaging structure are realized by several quarter-wave plates and a polarizing beam splitter. The remapping fiber optics is used to sample the image plane of receiving optical lens, and transform the image into line light resource, which can realize the non-scanning imaging principle. The Digital Micromirror Device is used to convert laser pulses from temporal domain to spatial domain. The CCD with strong sensitivity is used to detect the final reflected laser pulses. In this paper, we also use an algorithm which is used to simulate this improved laser imaging system. In the last, the simulated imaging experiment demonstrates that this improved laser imaging system can realize three-dimensional non-scanning laser imaging detection.

  11. SEM analysis of ionizing radiation effects in linear integrated circuits. [Scanning Electron Microscope

    NASA Technical Reports Server (NTRS)

    Stanley, A. G.; Gauthier, M. K.

    1977-01-01

    A successful diagnostic technique was developed using a scanning electron microscope (SEM) as a precision tool to determine ionization effects in integrated circuits. Previous SEM methods radiated the entire semiconductor chip or major areas. The large area exposure methods do not reveal the exact components which are sensitive to radiation. To locate these sensitive components a new method was developed, which consisted in successively irradiating selected components on the device chip with equal doses of electrons /10 to the 6th rad (Si)/, while the whole device was subjected to representative bias conditions. A suitable device parameter was measured in situ after each successive irradiation with the beam off.

  12. Time to unravel the conceptual confusion of authenticity and fidelity and their contribution to learning within simulation-based nurse education. A discussion paper.

    PubMed

    Bland, Andrew J; Topping, Annie; Tobbell, Jane

    2014-07-01

    High-fidelity patient simulation is a method of education increasingly utilised by educators of nursing to provide authentic learning experiences. Fidelity and authenticity, however, are not conceptually equivalent. Whilst fidelity is important when striving to replicate a life experience such as clinical practice, authenticity can be produced with low fidelity. A challenge for educators of undergraduate nursing is to ensure authentic representation of the clinical situation which is a core component for potential success. What is less clear is the relationship between fidelity and authenticity in the context of simulation based learning. Authenticity does not automatically follow fidelity and as a result, educators of nursing cannot assume that embracing the latest technology-based educational tools will in isolation provide a learning environment perceived authentic by the learner. As nursing education programmes increasingly adopt simulators that offer the possibility of representing authentic real world situations, there is an urgency to better articulate and understand the terms fidelity and authenticity. Without such understanding there is a real danger that simulation as a teaching and learning resource in nurse education will never reach its potential and be misunderstood, creating a potential barrier to learning. This paper examines current literature to promote discussion within nurse education, concluding that authenticity in the context of simulation-based learning is complex, relying on far more than engineered fidelity. Copyright © 2014 Elsevier Ltd. All rights reserved.

  13. Location-assured, multifactor authentication on smartphones via LTE communication

    NASA Astrophysics Data System (ADS)

    Kuseler, Torben; Lami, Ihsan A.; Al-Assam, Hisham

    2013-05-01

    With the added security provided by LTE, geographical location has become an important factor for authentication to enhance the security of remote client authentication during mCommerce applications using Smartphones. Tight combination of geographical location with classic authentication factors like PINs/Biometrics in a real-time, remote verification scheme over the LTE layer connection assures the authenticator about the client itself (via PIN/biometric) as well as the client's current location, thus defines the important aspects of "who", "when", and "where" of the authentication attempt without eaves dropping or man on the middle attacks. To securely integrate location as an authentication factor into the remote authentication scheme, client's location must be verified independently, i.e. the authenticator should not solely rely on the location determined on and reported by the client's Smartphone. The latest wireless data communication technology for mobile phones (4G LTE, Long-Term Evolution), recently being rolled out in various networks, can be employed to enhance this location-factor requirement of independent location verification. LTE's Control Plane LBS provisions, when integrated with user-based authentication and independent source of localisation factors ensures secure efficient, continuous location tracking of the Smartphone. This feature can be performed during normal operation of the LTE-based communication between client and network operator resulting in the authenticator being able to verify the client's claimed location more securely and accurately. Trials and experiments show that such algorithm implementation is viable for nowadays Smartphone-based banking via LTE communication.

  14. Proceedings of the Conference on Application of Scanning Methodologies in Libraries (Beltsville, Maryland, November 17-18, 1988).

    ERIC Educational Resources Information Center

    Blamberg, Donald L., Ed.; And Others

    Planned and organized by the National Agricultural Library (NAL), the conference was designed to bring together people involved in scanning projects and to evaluate the feasibility of using hand-held scanning devices for transcribing bibliographic information during the cataloging and indexing processes. Ten previously unpublished papers and a…

  15. Around Marshall

    NASA Image and Video Library

    1995-07-08

    Marshall researchers, in the Astrionics lab, study rotating unbalanced mass devices. These require less power, and are lighter than current devices used for scanning images, a slice at a time. They have a wide range of space-based applications.

  16. 22 CFR 61.3 - Certification and authentication criteria.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... AUDIO-VISUAL MATERIALS § 61.3 Certification and authentication criteria. (a) The Department shall certify or authenticate audio-visual materials submitted for review as educational, scientific and... of the material. (b) The Department will not certify or authenticate any audio-visual material...

  17. 22 CFR 61.3 - Certification and authentication criteria.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... AUDIO-VISUAL MATERIALS § 61.3 Certification and authentication criteria. (a) The Department shall certify or authenticate audio-visual materials submitted for review as educational, scientific and... of the material. (b) The Department will not certify or authenticate any audio-visual material...

  18. 22 CFR 61.3 - Certification and authentication criteria.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... AUDIO-VISUAL MATERIALS § 61.3 Certification and authentication criteria. (a) The Department shall certify or authenticate audio-visual materials submitted for review as educational, scientific and... of the material. (b) The Department will not certify or authenticate any audio-visual material...

  19. Non-invasive and high-sensitivity scanning detection of magnetic nanoparticles in animals using high-Tc scanning superconducting-quantum-interference-device biosusceptometry.

    PubMed

    Chieh, J J; Hong, C Y

    2011-08-01

    Although magnetic nanoparticles (MNPs) have been widely applied to animals in biomedicine, MNPs within animals should be examined in real time, in vivo, and without bio-damaged possibility to evaluate whether the bio-function of MNPs is valid or to further controls the biomedicinal process because of accompanying complex problems such as MNPs distribution and MNPs biodegradation. The non-invasive and high-sensitivity scanning detection of MNPs in animals using ac susceptometry based on a high-T(c) superconducting quantum interference device (SQUID) is presented. The non-invasive results and biopsy results show good agreement, and two gold-standard biomedicine methods, Prussian blue stain and inductively coupled plasma, prove the magnetic results. This confirms that the future clinical diagnosis of bio-functional MNPs could be operated by using scanning SQUID biosusceptometry as conveniently as an ultrasonic probe.

  20. Nanomanipulation and nanofabrication with multi-probe scanning tunneling microscope: from individual atoms to nanowires.

    PubMed

    Qin, Shengyong; Kim, Tae-Hwan; Wang, Zhouhang; Li, An-Ping

    2012-06-01

    The wide variety of nanoscale structures and devices demands novel tools for handling, assembly, and fabrication at nanoscopic positioning precision. The manipulation tools should allow for in situ characterization and testing of fundamental building blocks, such as nanotubes and nanowires, as they are built into functional devices. In this paper, a bottom-up technique for nanomanipulation and nanofabrication is reported by using a 4-probe scanning tunneling microscope (STM) combined with a scanning electron microscope (SEM). The applications of this technique are demonstrated in a variety of nanosystems, from manipulating individual atoms to bending, cutting, breaking carbon nanofibers, and constructing nanodevices for electrical characterizations. The combination of the wide field of view of SEM, the atomic position resolution of STM, and the flexibility of multiple scanning probes is expected to be a valuable tool for rapid prototyping in the nanoscience and nanotechnology.

  1. Functional Scanning Probe Imaging of Nanostructured Solar Energy Materials

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Giridharagopal, Rajiv; Cox, Phillip A.; Ginger, David S.

    From hybrid perovskites to semiconducting polymer/fullerene blends for organic photovoltaics, many new materials being explored for energy harvesting and storage exhibit performance characteristics that depend sensitively on their nanoscale morphology. At the same time, rapid advances in the capability and accessibility of scanning probe microscopy methods over the past decade have made it possible to study processing/structure/function relationships ranging from photocurrent collection to photocarrier lifetimes with resolutions on the scale of tens of nanometers or better. Importantly, such scanning probe methods offer the potential to combine measurements of local structure with local function, and they can be implemented to studymore » materials in situ or devices in operando to better understand how materials evolve in time in response to an external stimulus or environmental perturbation. This Account highlights recent advances in the development and application of scanning probe microscopy methods that can help address such questions while filling key gaps between the capabilities of conventional electron microscopy and newer super-resolution optical methods. Focusing on semiconductor materials for solar energy applications, we highlight a range of electrical and optoelectronic scanning probe microscopy methods that exploit the local dynamics of an atomic force microscope tip to probe key properties of the solar cell material or device structure. We discuss how it is possible to extract relevant device properties using noncontact scanning probe methods as well as how these properties guide materials development. Specifically, we discuss intensity-modulated scanning Kelvin probe microscopy (IM-SKPM), time-resolved electrostatic force microscopy (trEFM), frequency-modulated electrostatic force microscopy (FM-EFM), and cantilever ringdown imaging. We explain these developments in the context of classic atomic force microscopy (AFM) methods that exploit the physics of cantilever motion and photocarrier generation to provide robust, nanoscale measurements of materials physics that are correlated with device operation. We predict that the multidimensional data sets made possible by these types of methods will become increasingly important as advances in data science expand capabilities and opportunities for image correlation and discovery.« less

  2. Functional Scanning Probe Imaging of Nanostructured Solar Energy Materials

    DOE PAGES

    Giridharagopal, Rajiv; Cox, Phillip A.; Ginger, David S.

    2016-08-30

    From hybrid perovskites to semiconducting polymer/fullerene blends for organic photovoltaics, many new materials being explored for energy harvesting and storage exhibit performance characteristics that depend sensitively on their nanoscale morphology. At the same time, rapid advances in the capability and accessibility of scanning probe microscopy methods over the past decade have made it possible to study processing/structure/function relationships ranging from photocurrent collection to photocarrier lifetimes with resolutions on the scale of tens of nanometers or better. Importantly, such scanning probe methods offer the potential to combine measurements of local structure with local function, and they can be implemented to studymore » materials in situ or devices in operando to better understand how materials evolve in time in response to an external stimulus or environmental perturbation. This Account highlights recent advances in the development and application of scanning probe microscopy methods that can help address such questions while filling key gaps between the capabilities of conventional electron microscopy and newer super-resolution optical methods. Focusing on semiconductor materials for solar energy applications, we highlight a range of electrical and optoelectronic scanning probe microscopy methods that exploit the local dynamics of an atomic force microscope tip to probe key properties of the solar cell material or device structure. We discuss how it is possible to extract relevant device properties using noncontact scanning probe methods as well as how these properties guide materials development. Specifically, we discuss intensity-modulated scanning Kelvin probe microscopy (IM-SKPM), time-resolved electrostatic force microscopy (trEFM), frequency-modulated electrostatic force microscopy (FM-EFM), and cantilever ringdown imaging. We explain these developments in the context of classic atomic force microscopy (AFM) methods that exploit the physics of cantilever motion and photocarrier generation to provide robust, nanoscale measurements of materials physics that are correlated with device operation. We predict that the multidimensional data sets made possible by these types of methods will become increasingly important as advances in data science expand capabilities and opportunities for image correlation and discovery.« less

  3. Managing authenticity: the paradox of great leadership.

    PubMed

    Goffee, Rob; Jones, Gareth

    2005-12-01

    Leaders and followers both associate authenticity with sincerity, honesty, and integrity. It's the real thing--the attribute that uniquely defines great managers. But while the expression of a genuine self is necessary for great leadership, the concept of authenticity is often misunderstood, not least by leaders themselves. They often assume that authenticity is an innate quality--that a person is either genuine or not. In fact, the authors say, authenticity is largely defined by what other people see in you and, as such, can to a great extent be controlled by you. In this article, the authors explore the qualities of authentic leadership. To illustrate their points, they recount the experiences of some of the authentic leaders they have known and studied, including the BBC's Greg Dyke, Nestlé's Peter Brabeck-Letmathe, and Marks & Spencer's Jean Tomlin. Establishing your authenticity as a leader is a two-part challenge. You have to consistently match your words and deeds; otherwise, followers will never accept you as authentic. But it is not enough just to practice what you preach. To get people to follow you, you also have to get them to relate to you. This means presenting different faces to different audiences--a requirement that many people find hard to square with authenticity. But authenticity is not the product of manipulation. It accurately reflects aspects of the leader's inner self, so it can't be an act. Authentic leaders seem to know which personality traits they should reveal to whom, and when. Highly attuned to their environments, authentic leaders rely on an intuition born of formative, sometimes harsh experiences to understand the expectations and concerns of the people they seek to influence. They retain their distinctiveness as individuals, yet they know how to win acceptance in strong corporate and social cultures and how to use elements of those cultures as a basis for radical change.

  4. Reciprocal Relations between Work-Related Authenticity and Intrinsic Motivation, Work Ability and Depressivity: A Two-Wave Study.

    PubMed

    Emmerich, Astrid I; Rigotti, Thomas

    2017-01-01

    This study investigates the role of context-specific authenticity at work for work-related outcomes (intrinsic motivation, work ability) and depressivity. Furthermore reciprocal relations between work-related authenticity and healthy psychological functioning are investigated. Longitudinal data from 1,243 employees from 63 subsidiaries of a non-profit organization in the social sector were analyzed using multilevel structural equation modeling. Work-related authenticity at T1 predicted work ability and depressivity, but not intrinsic motivation at T2, about 6 months later. Work-related authenticity at T2 was predicted by intrinsic motivation and depressivity, but not by work ability at T1. We conclude that work-related authenticity and healthy psychological functioning are positively reinforcing each other. Thus, enabling employees to be authentic supposedly increases their well-being and is a pivotal opportunity for organizations to foster health and performance-related indicators like work ability and prevent negative health indicators like depressivity. At the same time, authenticity of employees can be fostered through workplace health promotion.

  5. Design and fabrication of a magnetically actuated non-invasive reusable drug delivery device.

    PubMed

    Dsa, Joyline; Goswami, Manish; Singh, B R; Bhatt, Nidhi; Sharma, Pankaj; Chauhan, Meenakshi K

    2018-07-01

    We present a novel approach of designing and fabricating a noninvasive drug delivery device which is capable of delivering the drug to the target site in a controlled manner. The device utilizes a reservoir which can be reused once the drug has completely diffused from it. This micro-reservoir based fabricated device has been successfully tested using niosomes of insulin drug filled in, which was then sealed with a magnetic membrane of 20 µm thick and was actuated by applying magnetic field. The deflection of the membrane on application of magnetic field results in the drug release from the reservoir. The discharge of the drug solution and the release rates was controlled by external magnetic field. The simulation of the membrane deflection using COMSOL software was carried out to optimize the concentration of the ferrous nanopowder in PDMS matrix. The characterization of the devices was implemented in-vitro on water and in-vivo on Wistar rats. It was also validated using high-performance liquid chromatography (HPLC) by observing characteristic peak of insulin. The blood samples showed the retention time of 2.79 min at λ max of 280 nm which further authenticated the effectiveness of the proposed work. This noninvasive fabricated device provides reusability, precise control and can enable the patient or a physician to actively administrate the drug when required.

  6. Enhanced Two-Factor Authentication and Key Agreement Using Dynamic Identities in Wireless Sensor Networks.

    PubMed

    Chang, I-Pin; Lee, Tian-Fu; Lin, Tsung-Hung; Liu, Chuan-Ming

    2015-11-30

    Key agreements that use only password authentication are convenient in communication networks, but these key agreement schemes often fail to resist possible attacks, and therefore provide poor security compared with some other authentication schemes. To increase security, many authentication and key agreement schemes use smartcard authentication in addition to passwords. Thus, two-factor authentication and key agreement schemes using smartcards and passwords are widely adopted in many applications. Vaidya et al. recently presented a two-factor authentication and key agreement scheme for wireless sensor networks (WSNs). Kim et al. observed that the Vaidya et al. scheme fails to resist gateway node bypassing and user impersonation attacks, and then proposed an improved scheme for WSNs. This study analyzes the weaknesses of the two-factor authentication and key agreement scheme of Kim et al., which include vulnerability to impersonation attacks, lost smartcard attacks and man-in-the-middle attacks, violation of session key security, and failure to protect user privacy. An efficient and secure authentication and key agreement scheme for WSNs based on the scheme of Kim et al. is then proposed. The proposed scheme not only solves the weaknesses of previous approaches, but also increases security requirements while maintaining low computational cost.

  7. South African managers in public service: On being authentic

    PubMed Central

    Simbhoo, Nirvana

    2014-01-01

    South African managers in public service consistently face challenges related to managing a well-adjusted and productive diverse workforce. Following the notion that leadership authenticity fosters positive psychological employee capacity, the aim of this study was to explore the meaning essence of authenticity as lived in the work–life experiences of senior managers in public service. Five senior managers in public service were purposefully selected based on their articulated challenges with being authentic at work, whilst attending a diversity sensitivity workshop. From a hermeneutic phenomenological perspective, in-depth interviews were used, and an interpretative phenomenological analysis yielded two predominant themes offering a description of what it means to be authentic. Authenticity is experienced as an affective state that results from a continuous self-appraisal of the extent to which expression of self is congruent with a subjective and socially constructed expectation of self in relation to others. Authenticity seems to develop through a continuous process of internal and external adaptation, and it leads to ultimately building a differentiated yet integrated identity of self. A reciprocal dynamic between feeling authentic and self-confidence alludes to the potential importance of authenticity dynamics in identity work. PMID:24434054

  8. South African managers in public service: on being authentic.

    PubMed

    Barnard, Antoni; Simbhoo, Nirvana

    2014-01-01

    South African managers in public service consistently face challenges related to managing a well-adjusted and productive diverse workforce. Following the notion that leadership authenticity fosters positive psychological employee capacity, the aim of this study was to explore the meaning essence of authenticity as lived in the work-life experiences of senior managers in public service. Five senior managers in public service were purposefully selected based on their articulated challenges with being authentic at work, whilst attending a diversity sensitivity workshop. From a hermeneutic phenomenological perspective, in-depth interviews were used, and an interpretative phenomenological analysis yielded two predominant themes offering a description of what it means to be authentic. Authenticity is experienced as an affective state that results from a continuous self-appraisal of the extent to which expression of self is congruent with a subjective and socially constructed expectation of self in relation to others. Authenticity seems to develop through a continuous process of internal and external adaptation, and it leads to ultimately building a differentiated yet integrated identity of self. A reciprocal dynamic between feeling authentic and self-confidence alludes to the potential importance of authenticity dynamics in identity work.

  9. Study on the security of the authentication scheme with key recycling in QKD

    NASA Astrophysics Data System (ADS)

    Li, Qiong; Zhao, Qiang; Le, Dan; Niu, Xiamu

    2016-09-01

    In quantum key distribution (QKD), the information theoretically secure authentication is necessary to guarantee the integrity and authenticity of the exchanged information over the classical channel. In order to reduce the key consumption, the authentication scheme with key recycling (KR), in which a secret but fixed hash function is used for multiple messages while each tag is encrypted with a one-time pad (OTP), is preferred in QKD. Based on the assumption that the OTP key is perfect, the security of the authentication scheme has be proved. However, the OTP key of authentication in a practical QKD system is not perfect. How the imperfect OTP affects the security of authentication scheme with KR is analyzed thoroughly in this paper. In a practical QKD, the information of the OTP key resulting from QKD is partially leaked to the adversary. Although the information leakage is usually so little to be neglected, it will lead to the increasing degraded security of the authentication scheme as the system runs continuously. Both our theoretical analysis and simulation results demonstrate that the security level of authentication scheme with KR, mainly indicated by its substitution probability, degrades exponentially in the number of rounds and gradually diminishes to zero.

  10. 7 CFR 1.22 - Authentication.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 1 2013-01-01 2013-01-01 false Authentication. 1.22 Section 1.22 Agriculture Office of the Secretary of Agriculture ADMINISTRATIVE REGULATIONS Official Records § 1.22 Authentication. When a request is received for an authenticated copy of a document that the agency determines to make...

  11. Authentic Montessori: The Teacher Makes the Difference

    ERIC Educational Resources Information Center

    Huxel, Alexa C.

    2013-01-01

    What are the elements that make up authentic Montessori? Is Montessori something concrete or abstract? Are there intangibles that make Montessori what it is? Many classrooms today have Montessori materials and small tables and chairs. Are they authentic Montessori? When examining areas that traditionally make defining authentic Montessori…

  12. 36 CFR 1275.66 - Reproduction and authentication of other materials.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... authentication of other materials. 1275.66 Section 1275.66 Parks, Forests, and Public Property NATIONAL ARCHIVES... Reproduction and authentication of other materials. (a) Copying of materials, including tape recordings... materials when necessary for the purpose of the research. (c) The fees for reproduction and authentication...

  13. 22 CFR 92.37 - Authentication procedure.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Authentication procedure. 92.37 Section 92.37... Notarial Acts § 92.37 Authentication procedure. (a) The consular officer must compare the foreign official...) Where the State law requires the consular officer's certificate of authentication to show that the...

  14. 7 CFR 1.22 - Authentication.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 1 2010-01-01 2010-01-01 false Authentication. 1.22 Section 1.22 Agriculture Office of the Secretary of Agriculture ADMINISTRATIVE REGULATIONS Official Records § 1.22 Authentication. When a request is received for an authenticated copy of a document that the agency determines to make...

  15. Authentic leadership: becoming and remaining an authentic nurse leader.

    PubMed

    Murphy, Lin G

    2012-11-01

    This article explores how chief nurse executives became and remained authentic leaders. Using narrative inquiry, this qualitative study focused on the life stories of participants. Results demonstrate the importance of reframing, reflection in alignment with values, and the courage needed as nurse leaders progress to authenticity.

  16. Nondestructive method for detecting defects in photodetector and solar cell devices

    DOEpatents

    Not Available

    The invention described herein is a method for locating semiconductor device defects and for measuring the internal resistance of such devices by making use of the intrinsic distributed resistance nature of the devices. The method provides for forward-biasing a solar cell or other device while it is scanning with an optical spot. The forward-biasing is achieved with either an illuminator light source or an external current source.

  17. Nondestructive method for detecting defects in photodetector and solar cell devices

    DOEpatents

    Sawyer, David E.

    1981-01-01

    The invention described herein is a method for locating semiconductor device defects and for measuring the internal resistance of such devices by making use of the intrinsic distributed resistance nature of the devices. The method provides for forward-biasing a solar cell or other device while it is scanning with an optical spot. The forward-biasing is achieved with either an illuminator light source or an external current source.

  18. Ninth Grade Student Responses to Authentic Science Instruction

    NASA Astrophysics Data System (ADS)

    Ellison, Michael Steven

    This mixed methods case study documents an effort to implement authentic science and engineering instruction in one teacher's ninth grade science classrooms in a science-focused public school. The research framework and methodology is a derivative of work developed and reported by Newmann and others (Newmann & Associates, 1996). Based on a working definition of authenticity, data were collected for eight months on the authenticity in the experienced teacher's pedagogy and in student performance. Authenticity was defined as the degree to which a classroom lesson, an assessment task, or an example of student performance demonstrates construction of knowledge through use of the meaning-making processes of science and engineering, and has some value to students beyond demonstrating success in school (Wehlage et al., 1996). Instruments adapted for this study produced a rich description of the authenticity of the teacher's instruction and student performance. The pedagogical practices of the classroom teacher were measured as moderately authentic on average. However, the authenticity model revealed the teacher's strategy of interspersing relatively low authenticity instructional units focused on building science knowledge with much higher authenticity tasks requiring students to apply these concepts and skills. The authenticity of the construction of knowledge and science meaning-making processes components of authentic pedagogy were found to be greater, than the authenticity of affordances for students to find value in classroom activities beyond demonstrating success in school. Instruction frequently included one aspect of value beyond school, connections to the world outside the classroom, but students were infrequently afforded the opportunity to present their classwork to audiences beyond the teacher. When the science instruction in the case was measured to afford a greater level of authentic intellectual work, a higher level of authentic student performance on science classwork was also measured. In addition, direct observation measures of student behavioral engagement showed that behavioral engagement was generally high, but not associated with the authenticity of the pedagogy. Direct observation measures of student self-regulation found evidence that when instruction focused on core science and engineering concepts and made stronger connections to the student's world beyond the classroom, student self-regulated learning was greater, and included evidence of student ownership. In light of the alignment between the model of authenticity used in this study and the Next Generation Science Standards (NGSS), the results suggest that further research on the value beyond school component of the model could improve understanding of student engagement and performance in response to the implementation of the NGSS. In particular, it suggests a unique role environmental education can play in affording student success in K-12 science and a tool to measure that role.

  19. A secure smart-card based authentication and key agreement scheme for telecare medicine information systems.

    PubMed

    Lee, Tian-Fu; Liu, Chuan-Ming

    2013-06-01

    A smart-card based authentication scheme for telecare medicine information systems enables patients, doctors, nurses, health visitors and the medicine information systems to establish a secure communication platform through public networks. Zhu recently presented an improved authentication scheme in order to solve the weakness of the authentication scheme of Wei et al., where the off-line password guessing attacks cannot be resisted. This investigation indicates that the improved scheme of Zhu has some faults such that the authentication scheme cannot execute correctly and is vulnerable to the attack of parallel sessions. Additionally, an enhanced authentication scheme based on the scheme of Zhu is proposed. The enhanced scheme not only avoids the weakness in the original scheme, but also provides users' anonymity and authenticated key agreements for secure data communications.

  20. Interception and modification of network authentication packets with the purpose of allowing alternative authentication modes

    DOEpatents

    Kent, Alexander Dale [Los Alamos, NM

    2008-09-02

    Methods and systems in a data/computer network for authenticating identifying data transmitted from a client to a server through use of a gateway interface system which are communicately coupled to each other are disclosed. An authentication packet transmitted from a client to a server of the data network is intercepted by the interface, wherein the authentication packet is encrypted with a one-time password for transmission from the client to the server. The one-time password associated with the authentication packet can be verified utilizing a one-time password token system. The authentication packet can then be modified for acceptance by the server, wherein the response packet generated by the server is thereafter intercepted, verified and modified for transmission back to the client in a similar but reverse process.

  1. Screening of Carotenoids in Tomato Fruits by Using Liquid Chromatography with Diode Array-Linear Ion Trap Mass Spectrometry Detection.

    PubMed

    Gentili, Alessandra; Caretti, Fulvia; Ventura, Salvatore; Pérez-Fernández, Virginia; Venditti, Alessandro; Curini, Roberta

    2015-08-26

    This paper presents an analytical strategy for a large-scale screening of carotenoids in tomato fruits by exploiting the potentialities of the triple quadrupole-linear ion trap hybrid mass spectrometer (QqQLIT). The method involves separation on C30 reversed-phase column and identification by means of diode array detection (DAD) and atmospheric pressure chemical ionization-mass spectrometry (APCI-MS). The authentic standards of six model compounds were used to optimize the separative conditions and to predict the chromatographic behavior of untargeted carotenoids. An information dependent acquisition (IDA) was performed with (i) enhanced-mass scan (EMS) as the survey scan, (ii) enhanced-resolution (ER) scan to obtain the exact mass of the precursor ions (16-35 ppm), and (iii) enhanced product ion (EPI) scan as dependent scan to obtain structural information. LC-DAD-multiple reaction monitoring (MRM) chromatograms were also acquired for the identification of targeted carotenoids occurring at low concentrations; for the first time, the relative abundance between the MRM transitions (ion ratio) was used as an extra tool for the MS distinction of structural isomers and the related families of geometrical isomers. The whole analytical strategy was high-throughput, because a great number of experimental data could be acquired with few analytical steps, and cost-effective, because only few standards were used; when applied to characterize some tomato varieties ('Tangerine', 'Pachino', 'Datterino', and 'Camone') and passata of 'San Marzano' tomatoes, our method succeeded in identifying up to 44 carotenoids in the 'Tangerine'" variety.

  2. Relations between Student Perceptions of Assessment Authenticity, Study Approaches and Learning Outcome

    ERIC Educational Resources Information Center

    Gulikers, Judith T. M.; Bastiaens, Theo J.; Kirschner, Paul A.; Kester, Liesbeth

    2006-01-01

    This article examines the relationships between perceptions of authenticity and alignment on study approach and learning outcome. Senior students of a vocational training program performed an authentic assessment and filled in a questionnaire about the authenticity of various assessment characteristics and the alignment between the assessment and…

  3. School Principals' Authentic Leadership and Teachers' Psychological Capital: Teachers' Perspectives

    ERIC Educational Resources Information Center

    Feng, Feng-I

    2016-01-01

    This study examined teachers' perceptions of principals' authentic leadership and the relationship of authentic leadership to teachers' psychological capital in Taiwan. A total of 1,429 elementary and secondary school teachers were surveyed. The results showed that teachers perceived their principals' authentic leadership as moderate and that the…

  4. 21 CFR 1311.125 - Requirements for establishing logical access control-Individual practitioner.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... substance prescriptions and who has obtained a two-factor authentication credential as provided in § 1311... his two-factor authentication credential to satisfy the logical access controls. The second individual... authentication factor required by the two-factor authentication protocol is lost, stolen, or compromised. Such...

  5. 31 CFR 363.21 - When may you require offline authentication and documentary evidence?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... authentication and documentary evidence? 363.21 Section 363.21 Money and Finance: Treasury Regulations Relating... TreasuryDirect § 363.21 When may you require offline authentication and documentary evidence? We may require offline authentication and documentary evidence at our option. [74 FR 19419, Apr. 29, 2009] ...

  6. 21 CFR 1311.110 - Requirements for obtaining an authentication credential-Individual practitioners eligible to use...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Requirements for obtaining an authentication... Prescriptions § 1311.110 Requirements for obtaining an authentication credential—Individual practitioners... credentialing office) may conduct identity proofing and authorize the issuance of the authentication credential...

  7. Toward Developing Authentic Leadership: Team-Based Simulations

    ERIC Educational Resources Information Center

    Shapira-Lishchinsky, Orly

    2014-01-01

    Although there is a consensus that authentic leadership should be an essential component in educational leadership, no study to date has ever tried to find whether team-based simulations may promote authentic leadership. The purpose of this study was to identify whether principal trainees can develop authentic leadership through ethical decision…

  8. Learning How to Lead: A Lifetime Journey

    ERIC Educational Resources Information Center

    Baugher, Shirley L.

    2005-01-01

    Much has been written about theories of leadership, leadership qualities, and the development of leadership. In this article, the author focuses on the work of Kevin Cashman, who proposed the following "Five Touchstones" that are crucial to authentic leadership: (1) Know Yourself Authentically; (2) Listen Authentically; (3) Express Authentically;…

  9. Authenticity in the Bureau-Enterprise Culture: The Struggle for Authentic Meaning

    ERIC Educational Resources Information Center

    Woods, Philip A.

    2007-01-01

    This article emphasizes the extent to which conceptions of authenticity are forged through social interaction and socially mediated identities and how, in turn, authentic leadership involves the transformation of the organizational, social or cultural order in which leadership is situated. The overarching context for this exploration of authentic…

  10. Teachers' Development Model to Authentic Assessment by Empowerment Evaluation Approach

    ERIC Educational Resources Information Center

    Charoenchai, Charin; Phuseeorn, Songsak; Phengsawat, Waro

    2015-01-01

    The purposes of this study were 1) Study teachers authentic assessment, teachers comprehension of authentic assessment and teachers needs for authentic assessment development. 2) To create teachers development model. 3) Experiment of teachers development model. 4) Evaluate effectiveness of teachers development model. The research is divided into 4…

  11. Trustworthiness and Authenticity: Alternate Ways To Judge Authentic Assessments.

    ERIC Educational Resources Information Center

    Hipps, Jerome A.

    New methods are needed to judge the quality of alternative student assessment, methods which complement the philosophy underlying authentic assessments. This paper examines assumptions underlying validity, reliability, and objectivity, and why they are not matched to authentic assessment, concentrating on the constructivist paradigm of E. Guba and…

  12. Fabrication of biomolecules self-assembled on Au nanodot array for bioelectronic device.

    PubMed

    Lee, Taek; Kumar, Ajay Yagati; Yoo, Si-Youl; Jung, Mi; Min, Junhong; Choi, Jeong-Woo

    2013-09-01

    In the present study, an nano-platform composed of Au nanodot arrays on which biomolecules could be self-assembled was developed and investigated for a stable bioelectronic device platform. Au nanodot pattern was fabricated using a nanoporous alumina template. Two different biomolecules, a cytochrome c and a single strand DNA (ssDNA), were immobilized on the Au nanodot arrays. Cytochorme c and single stranded DNA could be immobilized on the Au nanodot using the chemical linker 11-MUA and thiol-modification by covalent bonding, respectively. The atomic structure of the fabricated nano-platform device was characterized by scanning electron microscopy (SEM) and atomic force microscopy (AFM). The electrical conductivity of biomolecules immobilized on the Au nanodot arrays was confirmed by scanning tunneling spectroscopy (STS). To investigate the activity of biomolecule-immobilized Au-nano dot array, the cyclic voltammetry was carried out. This proposed nano-platform device, which is composed of biomolecules, can be used for the construction of a novel bioelectronic device.

  13. Digital Mammography with a Mosaic of CCD-Arrays

    NASA Technical Reports Server (NTRS)

    Jalink, Antony, Jr. (Inventor); McAdoo, James A. (Inventor)

    1996-01-01

    The present invention relates generally to a mammography device and method and more particularly to a novel digital mammography device and method to detect microcalcifications of precancerous tissue. A digital mammography device uses a mosaic of electronic digital imaging arrays to scan an x-ray image. The mosaic of arrays is repositioned several times to expose different portions of the image, until the entire image is scanned. The data generated by the arrays during each exposure is stored in a computer. After the final exposure, the computer combines data of the several partial images to produce a composite of the original x-ray image. An aperture plate is used to reduce scatter and the overall exposure of the patient to x-rays. The novelty of this invention is that it provides a digital mammography device with large field coverage, high spatial resolution, scatter rejection, excellent contrast characteristics and lesion detectability under clinical conditions. This device also shields the patient from excessive radiation, can detect extremely small calcifications and allows manipulation and storage of the image.

  14. On the efficacy of spatial sampling using manual scanning paths to determine the spatial average sound pressure level in rooms.

    PubMed

    Hopkins, Carl

    2011-05-01

    In architectural acoustics, noise control and environmental noise, there are often steady-state signals for which it is necessary to measure the spatial average, sound pressure level inside rooms. This requires using fixed microphone positions, mechanical scanning devices, or manual scanning. In comparison with mechanical scanning devices, the human body allows manual scanning to trace out complex geometrical paths in three-dimensional space. To determine the efficacy of manual scanning paths in terms of an equivalent number of uncorrelated samples, an analytical approach is solved numerically. The benchmark used to assess these paths is a minimum of five uncorrelated fixed microphone positions at frequencies above 200 Hz. For paths involving an operator walking across the room, potential problems exist with walking noise and non-uniform scanning speeds. Hence, paths are considered based on a fixed standing position or rotation of the body about a fixed point. In empty rooms, it is shown that a circle, helix, or cylindrical-type path satisfy the benchmark requirement with the latter two paths being highly efficient at generating large number of uncorrelated samples. In furnished rooms where there is limited space for the operator to move, an efficient path comprises three semicircles with 45°-60° separations.

  15. Final report: Mapping Interactions in Hybrid Systems with Active Scanning Probes

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Berezovsky, Jesse

    2017-09-29

    This project aimed to study and map interactions between components of hybrid nanodevices using a novel scanning probe approach. To enable this work, we initially constructed a flexible experimental apparatus allowing for simultaneous scanning probe and confocal optical microscopy measurements. This setup was first used for all-optical measurements of nanostructures, with the focus then shifting to hybrid devices in which single coherent electron spins are coupled to micron-scale ferromagnetic elements, which may prove useful for addressing single spins, enhanced sensing, or spin-wave-mediated coupling of spins for quantum information applications. A significant breakthrough was the realization that it is not necessarymore » to fabricate a magnetic structure on a scanning probe – instead a ferromagnetic vortex core can act as an integrated, solid state, scanning probe. The core of the vortex produces a very strong, localized fringe field which can be used analogously to an MFM tip. Unlike a traditional MFM tip, however, the vortex core is scanned within an integrated device (eliminating drift), and can be moved on vastly faster timescales. This approach allows the detailed investigation of interactions between single spins and complex driven ferromagnetic dynamics.« less

  16. First Experiences with the Trimble SX10 Scanning Total Station for Building Facade Survey

    NASA Astrophysics Data System (ADS)

    Lachat, E.; Landes, T.; Grussenmeyer, P.

    2017-02-01

    The use of Terrestrial Laser Scanner (TLS) tends to become a solution in many research areas related to large scale surveying. Meanwhile, the technological advances combined with the investigation of user needs have brought to the design of innovative devices known as scanning total stations. Such instruments merge in a unique hardware both scanning and surveying facilities. Even if their scanning rate is often reduced compared to conventional TLS, they make it possible to directly georeference laser scanning projects and to complete them with measurements of individual points of interest. The recent Trimble SX10 which was launched on the market in early October 2016 has been tested and some experiences carried out with it are reported in this paper. The analyses mainly focus on the survey of a building facade. Next to laser scanning survey, a photogrammetry campaign using an Unmanned Aerial Vehicle (UAV) has been carried out. These different datasets are used to assess the Trimble SX10 issued point clouds through a set of comparisons. Since georeferencing is possible either directly or indirectly using this device, data processed both ways are also compared to conclude about the more reliable method.

  17. [Causes for change in producing areas of geo-authentic herbs].

    PubMed

    Liang, Fei; Li, Jian; Zhang, Wei; Zhang, Rui-Xian

    2013-05-01

    Geo-authentic herbs lay stress on their producing areas. The producing areas of most geo-authentic herbs have never changed since the ancient times. However, many other geo-authentic herbs have experienced significant changes in the long history. There are two main causes for the change in producing areas of herbs-change of natural environment and development of human society, which are restricted by each other and play a great role throughout the development process of geo-authentic herbs.

  18. Assessment of the accuracy of AortaScan for detection of abdominal aortic aneurysm (AAA).

    PubMed

    Abbas, A; Smith, A; Cecelja, M; Waltham, M

    2012-02-01

    AortaScan AMI 9700 is a portable 3D ultrasound device that automatically measures the maximum diameter of the abdominal aorta without the need for a trained sonographer. It is designed to rapidly diagnose or exclude an AAA and may have particular use in screening programs. Our objective was to determine its accuracy to detect AAA. Subjects from our AAA screening and surveillance programs were examined. The aorta was scanned using the AortaScan and computed tomography (CT). Ninety-one subjects underwent imaging (44 AAA on conventional ultrasound surveillance and 47 controls). The largest measurement obtained by AortaScan was compared against the CT-aortic measurement. The mean aortic diameter was 2.8 cm. The CT scan confirmed the diagnosis of AAA in 43 subjects. There was one false positive measurement on conventional ultrasound. AortaScan missed the diagnosis of AAA in eight subjects. There were thirteen false positive measurements. The sensitivity, specificity, positive and negative predictive values were 81%, 72%, 72% and 81% respectively. A device to detect AAA without the need for a trained operator would have potential in a community-based screening programme. The AortaScan, however, lacks adequate sensitivity and significant technical improvement is necessary before it could be considered a replacement for trained screening personnel. Copyright © 2011 European Society for Vascular Surgery. Published by Elsevier Ltd. All rights reserved.

  19. Client/server approach to image capturing

    NASA Astrophysics Data System (ADS)

    Tuijn, Chris; Stokes, Earle

    1998-01-01

    The diversity of the digital image capturing devices on the market today is quite astonishing and ranges from low-cost CCD scanners to digital cameras (for both action and stand-still scenes), mid-end CCD scanners for desktop publishing and pre- press applications and high-end CCD flatbed scanners and drum- scanners with photo multiplier technology. Each device and market segment has its own specific needs which explains the diversity of the associated scanner applications. What all those applications have in common is the need to communicate with a particular device to import the digital images; after the import, additional image processing might be needed as well as color management operations. Although the specific requirements for all of these applications might differ considerably, a number of image capturing and color management facilities as well as other services are needed which can be shared. In this paper, we propose a client/server architecture for scanning and image editing applications which can be used as a common component for all these applications. One of the principal components of the scan server is the input capturing module. The specification of the input jobs is based on a generic input device model. Through this model we make abstraction of the specific scanner parameters and define the scan job definitions by a number of absolute parameters. As a result, scan job definitions will be less dependent on a particular scanner and have a more universal meaning. In this context, we also elaborate on the interaction of the generic parameters and the color characterization (i.e., the ICC profile). Other topics that are covered are the scheduling and parallel processing capabilities of the server, the image processing facilities, the interaction with the ICC engine, the communication facilities (both in-memory and over the network) and the different client architectures (stand-alone applications, TWAIN servers, plug-ins, OLE or Apple-event driven applications). This paper is structured as follows. In the introduction, we further motive the need for a scan server-based architecture. In the second section, we give a brief architectural overview of the scan server and the other components it is connected to. The third chapter exposes the generic model for input devices as well as the image processing model; the fourth chapter reveals the different shapes the scanning applications (or modules) can have. In the last section, we briefly summarize the presented material and point out trends for future development.

  20. Individualism and the Extended-Self: Cross-Cultural Differences in the Valuation of Authentic Objects

    PubMed Central

    Gjersoe, Nathalia L.; Newman, George E.; Chituc, Vladimir; Hood, Bruce

    2014-01-01

    The current studies examine how valuation of authentic items varies as a function of culture. We find that U.S. respondents value authentic items associated with individual persons (a sweater or an artwork) more than Indian respondents, but that both cultures value authentic objects not associated with persons (a dinosaur bone or a moon rock) equally. These differences cannot be attributed to more general cultural differences in the value assigned to authenticity. Rather, the results support the hypothesis that individualistic cultures place a greater value on objects associated with unique persons and in so doing, offer the first evidence for how valuation of certain authentic items may vary cross-culturally. PMID:24658437

Top