• Title/Summary/Keyword: 개인 인증

Search Result 1,546, Processing Time 0.023 seconds

A Roaming Key Management System against Private Key Hijacking (개인키 불법 유출 방지 및 로밍을 위한 로밍 키 관리 시스템)

  • 이평수;이민수;송오영;박세현
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2002.11a
    • /
    • pp.102-105
    • /
    • 2002
  • 본 논문에서는 현재 국내·외에서 개발되고 있고 이미 상용화가 되어 있는 PKI 기반인증 시스템에서 개인키의 로밍을 구현하고 특정 개인 컴퓨터에 개인키가 보관 되어있을 경우 발생할 수 있는 개인키의 불법 유출의 위험을 방지 할 수 있는 Roaming Key Management System의 개발 및 방안 연구를 목적으로 한다. RKMS 는 사용자의 인증서와 개인키를 개인 컴퓨터에 보관하지 않고 신뢰 할 수 있는 키서버에 저장함으로써 개인키 불법 유출을 막을 수 있고 개인키 로밍을 가능하게 한다. RKMS는 현재 발생되어 지고 앞으로 발생될 것으로 예상되어지는 인증서 및 개인키 해킹의 대안의 방법으로 사용되어 질 수 있다. 이를 이용하여 PKI 기반 인증 시스템의 향상된 안정성과 편리성을 구현하고 개인키 누출을 방지할 수 있다.

  • PDF

개인정보보호관리체제 인증제도 구축 사례 연구

  • Park, Eun-Yeop;Choi, Jin-Won;Cho, Tae-Hee
    • Review of KIISC
    • /
    • v.21 no.5
    • /
    • pp.27-36
    • /
    • 2011
  • 국내 주요기업(83개)의 개인정보보호책임자를 대상으로 조사한 결과 1백만명 이상의 개인정보를 수집하고 있는 기업이 61.4%(08년 기준)나 되고 국내 개인정보 침해건수는 2005년 18,000여건이던 건수가 급격하게 증가하여 2008년에는 39,000여건에 이르고 있다. 국민들이 개인정보를 안전하게 관리하는 기업을 손쉽게 식별할 수 있는 기준이나 정보가 미흡한 실정이며, 기업 스스로가 개인정보 침해사고를 사전에 방지하고 개인정보를 안전하게 관리할 수 있는 개인정보보호 체계의 필요성이 절실한 시기이다. 이에 본고에서는 국내 외(개인)정보보호관리체계 동향을 비교 분석하고 국내 환경에 적합하도록 개인정보보호에 특화된 개인정보보호관리체계 인증제도를 소개하고 구축에 필요한 방법을 선구축한 기업의 입장에서 살펴보고자 한다.

A Research on the development of evaluation model for the government's recognition regarding the program accrediting organizations in Higher Education (고등교육 프로그램 평가인증기관의 정부인정 평가모형 개발에 관한 연구)

  • Kim, Kyung-Soo;Hwang, Myung-Ku;Lee, Tae-Hee
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.1
    • /
    • pp.87-98
    • /
    • 2012
  • The Ministry of Education, Science and Technology has been implementing the government's recognition project regarding the program accrediting organizations in Higher Education. This research is to establish an evaluation model for the government's recognition process of the program accrediting organizations, and develop the evaluation categories, items and indices for the model. The research has set the concept for the government's recognition regarding the program accrediting organizations and designed an evaluation model for such organizations. The evaluation model embraces a preliminary evaluation process, assessing an eligibility of the accrediting organizations for the higher education based on the formalities set forth for the government recognition organization accrediting process. It also includes the main evaluation process, which assess the eligibility based on the evaluation standards stipulated in the associated legislation and regulations. In addition, through in-depth verification processes by experts, this research finalized 2 evaluation domains, 5 evaluation categories, 24 evaluation items and 33 evaluation indices.

Design and Verification of Applied Public Information Based Authentication Protocol in the Message Security System (공개정보를 이용한 메시지 보안 시스템의 인증 프로토콜 설계 및 검증)

  • 김영수;신승중;최흥식
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.8 no.1
    • /
    • pp.43-54
    • /
    • 2003
  • E-Commerce, characterized by the exchange of message, occurs between individuals, organizations, or both. A critical promotion factor of e-Commerce is message authentication, the procedure that allows communicating parties to verify the received messages are authentic. It consists of message unforgery, message non-repudiation, message unalteration, and origin authentication. It is possible to perform message authentication by the use of public key encryption. PGP(Pretty Good Privacy) based on X.400 MHS(Message Handling System) and PKC(Public Key Cryptosystem) makes extensive use of message exchange. In this paper we propose, design and implement NMAP(New Message Authentication Protocol), an applied public information based encryption system to solve the message authentication problem inherent in public key encryption such as X.400 protocol and PGP protocol and were to cope with the verification of NMAP using fuzzy integral. This system is expected to be use in the promotion of the e-Commerce and can perform a non-interactive authentication service.

  • PDF

A Model for Self-Authentication Based on Decentralized Identifier (탈중앙화 신원증명에 기반한 본인 인증 모델)

  • Kim, Ho-Yoon;Han, Kun-Hee;Shin, Seung-Soo
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.11
    • /
    • pp.66-74
    • /
    • 2021
  • With the development of the Internet, user authentication technology that proves me online is improving. Existing ID methods pose a threat of personal information leakage if the service provider manages personal information and security is weak, and the information subject is to the service provider. In this study, as online identification technology develops, we propose a DID-based self-authentication model to prevent the threat of leakage of personal information from a centralized format and strengthen sovereignty. The proposed model allows users to directly manage personal information and strengthen their sovereignty over information topics through VC issued by the issuing agency. As a research method, a self-authentication model that guarantees security and integrity is presented using a decentralized identifier method based on distributed ledger technology, and the security of the attack method is analyzed. Because it authenticates through DID Auth using public key encryption algorithms, it is safe from sniffing, man in the middle attack, and the proposed model can replace real identity card.

Anonymous Remote User Authentication Scheme with Smart Card (익명성을 제공하는 스마트카드 사용자 인증 프로토콜)

  • Kim, Se-Il;Rhee, Hyun-Sook;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.2
    • /
    • pp.139-144
    • /
    • 2007
  • Due to the increasing use of Internet and spread of ubiquitous environment the security of private information became an important issue. For this reason, many suggestions have been made in order to protect the privacy of users. In the study of authentication system using a smart card which is one of the methods for protecting private information, the main idea is to offer user anonymity. In 2004, Das et al. suggested an authentication system that guarantees anonymity by using a dynamic ID for the first time. However, this scheme couldn't guarantee complete anonymity as the identity of the user became revealed at log-in phase. In 2005, Chien at al. suggested a authentication system that guarantees anonymity, but this was only safe to the outsider(attacker). In this paper, we propose a scheme that enables the mutual authentication between the user and the sewer by using a smart card. For the protection of the user privacy, we suggest an efficient user authentication system that guarantees perfect anonymity to both the outsider and remote server.

A Study on the Improvement of Evaluation Items for Customized BF Certification in School Facilities -Focusing on the Delphi survey- (학교시설 맞춤형 BF인증을 위한 평가항목 개선방향에 관한 연구 -델파이조사를 중심으로-)

  • Maeng, Joon-Ho;Kim, Sung-Joong;Song, Byung-Joon;Kim, Jae-Young;Yun, Pyeong-Se
    • The Journal of Sustainable Design and Educational Environment Research
    • /
    • v.22 no.2
    • /
    • pp.1-16
    • /
    • 2023
  • This paper reports on three Delphi surveys based on draft evaluation items with the aim of deriving evaluation items prior to developing a BF certification index for school facilities in order to make the index safe and convenient. To this end, problems were formulated using content analysis and follow-up evaluation of existing BF certification indicators. Draft BF certification evaluation items for school facilities were proposed. The adequacy of each evaluation item was verified using a Delphi survey. Experts and working-level groups, such as university professors, architects, public officials, certification agencies, and organizations for disabled persons, provided feedback for all evaluation items for school facility BF, which was incorporated in the final evaluation items. As a result of the Delphi surveys, in addition to the existing 8 evaluation items, a total of 75 evaluation items were proposed as maintenance items, 12 as improvement review items, and 15 as new evaluation items.

제도 & 시행 (3) - 친환경 인증 "모든 신축건축물로 확대"

  • 대한설비건설협회
    • 월간 기계설비
    • /
    • s.239
    • /
    • pp.28-30
    • /
    • 2010
  • 국토해양부(장관 정종환)와 환경부(장관 이만의)는 6개 용도의 신축건축물에만 가능했던 친환경건축물 인증을 모든 용도의 신축건축물에 가능토록 하는 "친환경건축물의 인증에 관한 규칙" 개정안을 지난 5월17일 개정 공포('10.7.1 시행)했다. 이번 개정안은 저탄소 녹색건축물의 공급을 활성화하기 위해 모든 용도의 신축건축물에 대한 친환경인증[공공건축물(1만$m^2$ 이상)은 의무화, 민간건축물은 자발적 참여로 운영] 평가기준 마련과 인증기관의 전문성 강화 등을 주요내용으로 하고 있으며, 취 등록세 감면 등 인센티브 제도가 원활히 시행될 수 있도록 인증시기 및 절차를 개선하고, 인증등급을 세분화(2 $\rightarrow$ 4등급)하는 내용도 포함됐다. 국토해양부와 환경부는 이번 조치로 민간분야의 경우 본인들이 인센티브를 받기를 원하는 경우에는 친환경건축물 인증을 받을 수 있도록 하는 등 민간분야의 친환경설계를 적극 유도할 수 있는 기반을 마련했으며, "친환경건축물의 인증에 관한 규칙"의 차질 없는 시행을 위해 7월 1일까지 "친환경건축물 인증기준" (국토해양부, 환경부 공동 고시)을 개정할 계획이다. 한편, 내년부터는 기존 건축물도 친환경건축물 인증을 받을 수 있도록 그 대상범위를 확대해 나갈 예정이다.

  • PDF

The Study of ABEEK Accreditation Assessment Draft Statement in 2006 (2006년 공학교육 프로그램 인증평가 예비논평서 분석 연구)

  • Kang, So-Yeon;Kim, Mee-Kyoung;Kim, Myoung-Lang;Choi, Keum-Jin
    • Journal of Engineering Education Research
    • /
    • v.10 no.1
    • /
    • pp.77-85
    • /
    • 2007
  • Though accreditation demands considerable ongoing effort on the part of the college, about 10 percent of Korean engineering colleges has been accredited for 5years by ABEEK. It is true that engineering accreditation contributed the Korean engineering education to improve. Many engineering colleges which had prepared the engineering accreditation developed the integrating system for the engineering education, and over 50 engineering education research centers which assisted to programs in accreditation were founded. Also the faculty commitment to quality programs and excellence in teaching, continuous counseling for students, portfolio guiding and continuous quality improvement(CQI) etc. were performed for accreditation preparation. The engineering colleges preparing accreditation has made efforts for satisfying accreditation criteria, but it is difficult of modifying education systems which have been maintained by now. In addition, engineering colleges need guideline how to satisfy standards. The purpose of this study is to analyze draft statement of 4 universities which were evaluated in 2006 and to suggest the minimal resources for engineering colleges to prepare accreditation.

Preconditioning process for Finger Vein Recognition (지정맥인식을 위한 전처리 과정)

  • KIM, Jung-han;CHO, Kyoung-lae;KIM, Sang-yoon;Kang, Sung-in;Bae, Seong-Ho;LEE, Byoung-do
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.827-829
    • /
    • 2013
  • 생체인식을 통한 개인 인증방법에는 지문인식과, 홍채인식 등이 활발하게 연구가 진행되고 있다. 본 논문에서는 생체인식을 통한 개인 인증 방법 중 우측 검지손가락 정맥을 이용한 방법을 사용하였다. 적외선 LED 8개를 이용하여 적외선을 손가락에 투과하여 CMOS카메라를 통하여 영상을 획득하는 정맥인식장치를 개발하고 영상을 채집한다. ROI영역을 추출하여 손가락 정맥인식을 위한 영상부분만 추출한다. 추출된 영상을 통하여 미디언 필터를 이용하여 noise를 제거하고 히스토그램 평활화를 통한 정맥영역을 부각시킨다. 특히 지역적 히스토그램 평활화를 통해서 보다 정확한 정맥의 영역을 찾는다. 지역적 히스토그램 평활화를 통한 영상을 이진화를 시키고 세선화를 통해서 이후 패터매칭을 통한 개인 인증방법에 대한 전처리 영상을 구한다.

  • PDF