DOI QR코드

DOI QR Code

출력물 보안 관리 시스템을 위한 인터페이스 구축

Interface Construction for Printout Security Management System

  • 한정수 (백석대학교 정보통신학부) ;
  • 김귀정 (백석대학교 정보통신학부)
  • Hon, Jung-Soo (Division of Information Communication, Baekseok University) ;
  • Kim, Gui-Jung (Division of Information Communication, Baekseok University)
  • 투고 : 2018.09.08
  • 심사 : 2018.10.20
  • 발행 : 2018.10.28

초록

출력물관리 시스템은 출력시 수집된 출력 로그 내에 개인정보(주민번호, 카드번호)가 존재하는지 패턴을 분석하여 사용자에게 경고 메시지 팝업 전달, 인쇄 강제 종료, 관리자에게 메일 발송 및 별도 로그 관리 기능을 갖추어야 한다. 인증 관리 역시 사용자 PC에 Agent를 설치하여 등록되어 있는 사용자만 프린트가 가능하며, 사용자 정보에 따라 작업이 허가되거나 거절될 수 있도록 제한 기능을 갖추어야한다. 또한 복합기로 프린트/복사/스캔 사용 시 ID카드 인증 후 문서 출력 및 복합기를 사용할 수 있으며, ID카드 미사용시 디바이스에 ID/PW를 입력 인증 후 복합기를 사용할 수 있도록 구축해야한다. 본 연구에서는 기존의 출력물 보안 방법들 보다 더욱 우수한 기술을 갖추고 있는 보안 업체인 (주)와우소프트와 공동으로 인터페이스를 개발하여 기록물관리 시스템을 위한 인터페이스들을 구축하였다. 또한 출력물관리를 위한 필요한 기본 기능들의 인터페이스를 설계하였으며 이를 바탕으로 출력물관리 시스템 구축에 기여하였다.

The printout management system should analyze the pattern of existence of personal information (resident number, card number) in the output log and users should be provided with functions such as warning message pop-up, forced printing termination, mailing to administrator, independently logs management. Authentication management can also be performed only by registered users by installing an agent on a user PC, and it should have a restriction function to permit or deny work according to user information. In addition, when printing/copying/scanning using this equipment, it is possible to use document printing and multifunction copier after ID card authentication and ID/PW should be input to device when ID card is not used. In this study, we developed these interfaces with WOWSOFT co., Ltd, a security company that has better technology than the existing printout security methods, to construct the printout management system. Also we designed the interface of basic functions necessary for printout management and contributed to the establishment of printout management system.

키워드

참고문헌

  1. G. N. Pham, K. R. Kwon, E. J. Lee & S. H. Lee. (2017). Selective Encryption Algorithm for 3D Printing Model Based on Clustering and DCT Domain. Journal of Computing Science and Engineering, 11(4), 152-159. DOI : 10.5626/JCSE.2017.11.4.152
  2. J. H. Shin & I. S. KIm. (2015). Study on Detection Technique of Privacy Distribution Route based on Interconnection of Security Documents and Transaction ID. Journal of the Korea Institute of Information Security & Cryptology 25(6), 1435-1447. DOI : http://dx.doi.org/10.13089/JKIISC.2015.25.6.1435
  3. L. S. Ho, S. E. A, H. S. Young, L. S. Ha & Pang Sechung. (2015). Printed Matter Security and Print Control System Using Print Data Collecting and Analysis. Proceedings of Symposium of the Korean Institute of communications and Information Sciences, 783-784.
  4. S. G. Kim & W. S. Yoo. (2015). Development of a 3D Printing Open-market System for Copyright Protection and Remote 3D Printing. Journal of the Korean Institute of Industrial Engineers, 41(3), 253-258. DOI : http://dx.doi.org/10.7232/JKIIE.2015.41.3.253
  5. J. K. Baek & J. P. Park. (2013). A Study on Personal Information Control and Security in Printed Matter. Journal of the Korea Academia-Industrial cooperation Society, 14(5), 2415-2421. DOI: http://dx.doi.org/10.5762/KAIS.2013.14.5.2415
  6. J. S. Park & J. C. Ha. (2012). Vulnerability Analysis of Security Document Management in Multi Function Peripheral and Its Countermeasure. The Journal of Korean Institute of Information Technology, 10(6), 133-143. UCI : http://uci.or.kr/G704-001947.2012.10.6.009
  7. T. W. Lee. (2012). A Study on Design and Implementation of Printer Security Integrated Management System. Master dissertation. Konkuk University, Seoul.
  8. M. S. Yim. (2018). An Exploratory Research on Factors Influence Perceived Compliance Cost and Information Security Awareness in Small and Medium Enterprise, Journal of tne Korea Convergence Society, 9(9), 69-81.
  9. S. K. Cho & M. J. Jun. (2012). Privacy Leakage Monitoring System Design for Privacy Protection. Journal of the Korea Institute of Information Security & Cryptology, 22(1), 99-106.
  10. H. J. Lee & D. H. Won. (2011). A Protection Profile for E-Document Issuing System. Journal of the Korea Institute of Information Security & Cryptology, 21(6), 109-117.
  11. I. J. Suk. (2016). Implementation of mobile printing system for security enhancement in the BYOD based mobile of ice environment. Master dissertation. Soongsil University, Seoul.
  12. W. X. Liu, Y. L. Chen, N. F. Liao. (2011). Study of printing security based on grating phase encodin, JOURNAL OF OPTOELECTRONICS LASER, 22(11).
  13. S. J. Simske, M. Sturgill, J. Aronoff & M. Vans. (2010). Factors in a Security Printing & Imaging Based Anti-Counterfeiting Ecosystem (Focal), International Conference on Digital Printing Technologies, 26.
  14. RFC 1157 Simple Network Management Protocol (SNMP), http://www.faqs.org/rfcs/rfc1157.html
  15. L. Lin & W. He. (2008),Status Quo of Security Printing-A Panoramic View at DRUPA, International Conference on Digital Printing Technologies, 24.
  16. S. Simske, P. Mucher & C. Martinez. (2005). Digital Security Printing: Enabling Product Tracking and Authentication Using Existing Product Lines (Interactive), International Conference on Digital Production Printing and Industrial Applications.
  17. Maleshliuski,S.,Gunter,R.(2010),Security Printing Techniques Based on Substrate and Print- Process Individualities, TAGA ProceedIngs.
  18. RFC 3805 Printer MIB v2, http://www.faqs.org/rfcs/rfc3805.html
  19. http://www.archives.go.kr/next/data/standardCondition.do
  20. www.wowsoft.com