• Title/Summary/Keyword: 공인 인증

Search Result 959, Processing Time 0.025 seconds

Converting Paper and Image Formats of EMR to XML for Electronic Signature (EMR 서식 및 이미지 형식 기록의 전자인증을 위한 XML 변환)

  • Moon, Woo-Young;Kim, Byung-Ki
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2006.11a
    • /
    • pp.629-632
    • /
    • 2006
  • 최근 EMR(Electronic Medical Record, 전자의무기록)에 대한 관심이 높아지면서 EMR을 도입하는 병원이 늘어나는 추세이다. EMR은 법적 효력과 증거력의 보유하기 위하여 정부가 인정하는 공인 인증기관으로부터 인증서를 발급받아 전자서명법에 따라 암호화 및 기명날인하여 별도의 저장장치에 관리하도록 하고 있다. 이러한 일련의 과정에서 EMR 데이터를 XML 문서나 다른 형식의 문서로 변환하게 된다. 본 논문은 XML 스키마에 따른 문서 생성이 용이한 텍스트나 코드화된 의무기록 뿐만 아니라 각종서식, 이미지 및 검사지 등 다양한 형식 기록의 전자인증을 위해 XML 문서로 변환하는 연구이며, 특히 표준화되기 힘든 비정형 기록들에 대한 XML 문서 변환 방법을 제안하고 이를 구현하였다.

  • PDF

An efficient Authentication and Key Agreement Protocol in Mobile Systems (이동 시스템에서의 효율적인 인증 및 키 교환 프로토콜)

  • 최영근;김순자
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.2
    • /
    • pp.73-82
    • /
    • 2001
  • In this paper we propose an efficient authentication and key agreement protocol which has been designed specifically for use with low powered computationally weak equipment such as Cellular phone and PDA(Personal Digital Assistant). Imple-menting the protocol based on the Rabin cryptosystem provides the efficiency requirements for mobile communications including minimum number of passes and low computational lead. The paper outlines the new protocol, examines it s various aspects, and compares them to those representative authentication and key agreement protocols.

Enhanced Fast Handoff Protocol using Temporary Handoff Key (THK) (임시 핸드오프 키를 이용한 Fast 핸드오프 프로토콜)

  • Cho, Sung-Jae;Choi, Hyoung-Kee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.11a
    • /
    • pp.1202-1205
    • /
    • 2007
  • 최근 무선랜의 이용이 급격하게 증가하고 있는 추세이다. 무선랜은 이동통신에 비해 빠른 데이터 전송이 가능하여 화상통신, VoIP, 동영상 스트리밍 등 멀티미디어 서비스에 적합하다. 하지만 무선랜은 서비스 제공 영역이 작기 때문에 사용자가 자주 이동할 경우 핸드오프가 발생하여 딜레이가 증가한다. 딜레이에 민감한 멀티미디어의 경우 서비스 품질에 영향을 받을 수 있으므로 이에 대한 고려가 필요하다. 본 논문에서는 핸드오프의 인증 과정에서 발생하는 딜레이를 줄이기 위해 핸드오프 할 때 사용되는 임시 키인 THK 의 사용을 제안한다. THK 를 이용할 경우 인증 서버를 이용하지 않고도 인증이 가능하며 사용하는 메시지의 양도 작기 때문에 딜레이 감소가 가능하다. 시뮬레이션 결과는 우리가 제안한 프로토콜을 이용할 경우 현재 사용 중인 프로토콜에 비해 최고 2 배의 성능 향상을 얻을 수 있음을 보여준다.

Preprocessing Algorithm for Enhancement of Fingerprint Identification (지문이미지 인증률 향상을 위한 전처리 알고리즘)

  • Jung, Seung-Min
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.44 no.3
    • /
    • pp.61-69
    • /
    • 2007
  • This paper proposes new preprocessing algorithm to extract minutiae in the process of fingerprint recognition. Fingerprint images quality enhancement is a topic phase to ensure good performance in a topic phase to ensure good performance in a Automatic Fingerprint Identification System(AFIS) based on minutiae matching. This paper proposes an algorithm to improve fingerprint image preprocessing to extract minutiae accurately based on directional filter. We improved the suitability of low quality fingerprint images to better suit fingerprint recognition by using valid ridge vector and ridge probability of fingerprint images. With the proposed fingerprint improvement algorithm, noise is removed and presumed ridges are more clearly ascertained. The algorithm is based on five step: computation of effective ridge vector, computation of ridge probability, noise reduction, ridge emphasis, and orientation compensation and frequency estimation. The performance of the proposed approach has been evaluated on two set of images: the first one is self collected using a capacitive semiconductor sensor and second one is DB3 database from Fingerprint Verification Competition (FVC).

Qualification Process of T700/701K Engine for KUH (한국형 기동헬기 엔진 (T700/701K) 인증 과정)

  • Jung, Yong-Wun;Kim, Jae-Hwan;Ahn, Iee-Ki
    • Proceedings of the Korean Society of Propulsion Engineers Conference
    • /
    • 2011.11a
    • /
    • pp.344-347
    • /
    • 2011
  • This paper presents qualification process of the T700/701K turbo-shaft engine for Korean Utility Helicopter(KUH). The T700/701K is the rear-drive variant of the GE's T700-701C/D engine which was qualified for military applications in the world. The main scope of the development is the modification from a front-drive engine to a rear-drive one, the performance enhancement of the power turbine and the incorporation of two channel FADEC(Full Authority Digital Engine Control) system for more reliable operation. Therefore, T700/701K engine must be qualified by Korean government in order to perform a flight in the country. Reflecting the influence of developing scope, the main requirements including performance and control are verified by test and analysis, while the requirement for module or component that is same to that of T700-701C/D are verified by similarity.

  • PDF

Certificate-based SSO Protocol Complying with Web Standard (웹 표준을 준수하는 인증서기반 통합 인증 프로토콜)

  • Yun, Jong Pil;Kim, Jonghyun;Lee, Kwangsu
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.8
    • /
    • pp.1466-1477
    • /
    • 2016
  • Public key infrastructure(PKI), principle technology of the certificate, is a security technology providing functions such as identification, non-repudiation, and anti-forgery of electronic documents on the Internet. Our government and financial organizations use PKI authentication using ActiveX to prevent security accident on the Internet service. However, like ActiveX, plug-in technology is vulnerable to security and inconvenience since it is only serviceable to certain browser. Therefore, the research on HTML5 authentication system has been conducted actively. Recently, domestic bank introduced PKI authentication complying with web standard for the first time. However, it still has inconvenience to register a certification on each website because of same origin policy of web storage. This paper proposes the certificate based SSO protocol that complying with web standard to provide user authentication using certificate on several sites by going around same origin policy and its security proof.

A Study on Certification System for Aircraft Engines and Auxiliary Power Units (항공기 엔진 및 보조동력장치 인증제도 현황)

  • Lee, Eunhee;Lee, Kang-Yi;Kim, Jinhee
    • Proceedings of the Korean Society of Propulsion Engineers Conference
    • /
    • 2017.05a
    • /
    • pp.194-197
    • /
    • 2017
  • Aircraft engine and auxiliary power units are certified in processes of design, production according to airworthiness requirements. The aircraft engines shall demonstrate compliance with the design and production through the Type Certificate and the auxiliary power unit shall demonstrate compliance with the design and production through the Technical Standards Order Approval. MOLIT(Ministry of Land, Infrastructure and Transport) established the law and the airworthiness requirements for aircraft engines such as KAS Part 33 but didn't issue the Technical Standards Order for auxiliary power unit. In this paper, we proposed and explained the plan for improvement of our aircraft engines industry through building and expanding the certification infra-structure for aircraft engines and auxiliary power unit.

  • PDF

An Authentication Model based Fingerprint Recognition for Electronic Medical Records System (지문인식 기반의 전자의무기록 시스템 인증 모델)

  • Lee, Yong-Joon
    • The KIPS Transactions:PartC
    • /
    • v.18C no.6
    • /
    • pp.379-388
    • /
    • 2011
  • Ensuring the security of medical records is becoming an increasingly important problem as modern technology is integrated into existing medical services. As a consequence of the adoption of EMR(Electronic Medical Records) in the health care sector, it is becoming more and more common for a health professional to edit and view a patient's record. In order to protect the patient's privacy, a secure authentication model to access the electronic medical records system must be used. A traditional identity based digital certificate for the authenticity of EMR has private key management and key escrow of a user's private key. In order to protect the EMR, The traditional authentication system is based on the digital certificate. The identity based digital certificate has many disadvantages, for example, the private key can be forgotten or stolen, and can be easily escrow of the private key. Nowadays, authentication model using fingerprint recognition technology for EMR has become more prevalent because of the advantages over digital certificate -based authentication model. Because identity-based fingerprint recognition can eliminate disadvantages of identity-based digital certificate, the proposed authentication model provide high security for access control in EMR.

Analysis and Study of Safety Technical Standards in Domestic Photovoltaic Field (국내 태양광분야 안전성 기술기준 분석 및 연구)

  • Yoon, Yongho
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.6
    • /
    • pp.207-212
    • /
    • 2018
  • The increase in the size and the uptake of PV systems is leading to significant increase in the penetration of PV into local electricity grids. The increased penetration of PV is impacting on grid operation and in particular the voltage within the local grid can be significantly influenced by the various PV systems. The current global situation of environmental pollution, climate change and energy demand urgently requires dramatic political, economic and technical decisions in order to avoid a potential collapse of environmental and social systems. Around the world, electricity remains the vital component of national and international development. The implementation of renewable energy resources can provide solutions to these challenges by stimulating the early implementation of economically viable sustainable energy technologies.

A Key Redistribution Method for Enhancing Energy Efficiency in Dynamic Filtering based Sensor Networks (동적 여과 기법 기반 센서 네트워크의 에너지 효율을 높이기 위한 키 재분배 결정 방법)

  • Sun, Chung-Il;Cho, Tae-Ho
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.1
    • /
    • pp.125-131
    • /
    • 2010
  • In wireless sensor networks application, sensor nodes are randomly deployed in wide and opened environment typically. Since sensor networks have these features, it is vulnerable to physical attacks in which an adversary can capture deployed nodes and use them to inject a fabricated report into the network. This threats of network security deplete the limited energy resource of the entire network using injected fabricated reports. A dynamic en-route filtering scheme is proposed to detect and drop the injected fabricated report. In this scheme, node executes the key redistribution to increases the detection power. It is very important to decide the authentication key redistribution because a frequent key redistribution can cause the much energy consumption of nodes. In this paper, we propose a key redistribution determining method to enhance the energy efficiency and maintain the detection power of network. Each node decides the authentication key redistribution using a fuzzy system in a definite period. The proposed method can provide early detection of fabricated reports, which results in energy-efficiency against the massive fabricated report injection attacks.