• Title/Summary/Keyword: 디지털 인증

Search Result 653, Processing Time 0.021 seconds

해킹 증가로 보안컨설팅 급부상

  • Park, Min-Sik
    • Digital Contents
    • /
    • no.11 s.78
    • /
    • pp.14-16
    • /
    • 1999
  • 국내 인터넷 쇼핑몰 시장이 1천억대로 증가했지만 아직까지 소비자들은 제품에 대한 정보부족과 대금 지불시 정보 유출에 대한 불안으로 인터넷 구매를 꺼려하고 있다. 이를 반영하듯 최근 인터넷 모범 상점 인증위원회에 인증을 신청한 대형 쇼핑몰 업체가 잇따라 보안 심사에서 탈락한 것으로 알려져 심각성을 보여주었다. 국내 인터넷 쇼핑몰 보안 현황에 대해 살펴봤다.

  • PDF

Improvement of the Data Authentication of CCN (CCN 데이터 인증 기술의 성능 개선 연구)

  • KIM, DAEYOUB
    • Journal of Digital Convergence
    • /
    • v.15 no.8
    • /
    • pp.341-349
    • /
    • 2017
  • CCN proposes that intermediate network nodes on a network path for a transmitted data-packet cache the data-packet. If the nodes receive request packets for the cached data, the nodes can directly respond to the request-packets using the cached data. Since a request-packet can be responded by one of the intermediate nodes on a path of the request-packet, both faster response time and decreased data transmission amount are expected comparing to the existing host centric networking. However, CCN is vulnerable against forgery attacks because data-packet receivers cannot identify a data provider. Hence, a data authentication scheme is essentially needed to make CCN more secure. But such a data authentication process is one of the main causes of CCN-based service delays. This paper first analyzes the problems of a CCN data authentication scheme, then proposes an improved authentication operation scheme for efficiently authenticating data, and finally evaluates its performance.

Authentication Method using Multiple Biometric Information in FIDO Environment (FIDO 환경에서 다중 생체정보를 이용한 인증 방법)

  • Chae, Cheol-Joo;Cho, Han-Jin;Jung, Hyun Mi
    • Journal of Digital Convergence
    • /
    • v.16 no.1
    • /
    • pp.159-164
    • /
    • 2018
  • Biometric information does not need to be stored separately, and there is no risk of loss and no theft. For this reason, it has been attracting attention as an alternative authentication means for existing authentication means such as passwords and authorized certificates. However, there may be a privacy problem due to leakage of personal information stored in the server. To overcome these weaknesses, FIDO solved the problem of leakage of personal information on the server by using biometric information stored on the user device and authenticating. In this paper, we propose a multiple biometric authentication method that can be used in FIDO environment. In order to utilize multiple biometric information, fingerprints and EEG signals can be generated and used in FIDO system. The proposed method can solve the problem due to limitations of existing 2-factor authentication system by authentication using multiple biometric information.

Network Overhead Improvement for MHT-based Content Authentication Scheme (MHT 기반 콘텐츠 인증 기술의 전송량 개선)

  • KIM, DAEYOUB
    • Journal of Digital Convergence
    • /
    • v.16 no.1
    • /
    • pp.271-279
    • /
    • 2018
  • Various technologies have been developed to more efficiently share content such as P2P and CDN. These technologies take a common approach that request packets are responded by distributed network nodes, not by a single distributor. Such approaches not only resolve network congestion around content distributors, but also make it possible to distribute content regardless of the system and network status of content distributors. However, when receiving content from distributed nodes/hosts, not from authenticated distributors, users cannot practically identify which node/host sent content to them. Due to this characteristic, various hacking caused by the malicious modification of content is possible. Therefore, to make such approaches more secure, a content authentication technique is required. In this paper, we propose a improved operation of MHT used in CCN for authenticating distributed content. Then we evaluate the proposed method by comparing its performance with the existing technology.

A Comparison Study between Korean Cloud Service Certification Systems and U.S. FedRAMP (한국의 클라우드 서비스 인증제도와 미국의 FedRAMP의 비교 연구)

  • Seo, Kwang-Kyu
    • Journal of Digital Convergence
    • /
    • v.10 no.11
    • /
    • pp.59-65
    • /
    • 2012
  • The evolution of cloud computing service over the recent years is potentially one of the major advances in information and communication technology. However, if cloud computing service is to achieve its potential, there needs to be a clear understanding of the various issues such as service security, performance and availability and so on, both from the perspectives of the providers and the consumers of the cloud service. As more and more information on individuals, companies and public sectors are placed in the cloud service, concerns are beginning to grow about just how safe and reliable an environment it is. In order to overcome these situations, the Korea cloud service certification system and U.S. FedRAMP were performed in each country. This paper aims at comparing and analyzing between Korean cloud service certification systems and U.S. FedRAMP and describing the difference between them. Eventually, we propose the improvement strategy of Korea cloud service certification systems based on the comparison results between them.

OpenID Based User Authentication Scheme for Multi-clouds Environment (멀티 클라우드 환경을 위한 OpenID 기반의 사용자 인증 기법)

  • Wi, Yukyeong;Kwak, Jin
    • Journal of Digital Convergence
    • /
    • v.11 no.7
    • /
    • pp.215-223
    • /
    • 2013
  • As cloud computing is activated, a variety of cloud services are being distributed. However, to use each different cloud service, you must perform a individual user authentication process to service. Therefore, not only the procedure is cumbersome but also due to repeated authentication process performance, it can cause password exposure or database overload that needs to have user's authentication information each cloud server. Moreover, there is high probability of security problem that being occurred by phishing attacks that result from different authentication schemes and input scheme for each service. Thus, when you want to use a variety of cloud service, we proposed OpenID based user authentication scheme that can be applied to a multi-cloud environment by the trusted user's verify ID provider.

An Study on the Effects of ISMS Certification and the Performance of Small and Medium Enterprises (중소기업에 대한 ISMS 인증효과와 영향요인에 관한 연구)

  • Kim, In Kwan;Park, Jaemin;Jeon, Joong Yang
    • Journal of Digital Convergence
    • /
    • v.11 no.1
    • /
    • pp.47-60
    • /
    • 2013
  • This paper focuses on the role of international standards related to industrial technology and to analyze determinants to affect ISMS and its performance. Particularly its financial and operational performance were measured by survey aiming at an influence of certification and its performances. The variables explaining the performance were drawn out from factor analysis and then critical variables to affect performance were discovered by ANOVA and regression analysis. As a result of the analysis considering heteroscedastic and factor analysis, type of business and firm size were not significantly related to the performance but the existence of information security unit, investment in information security and the status of security consciousness in executives and employees were positively related. As a result, this study shows that security certification should be implemented with suitable capabilities and the investments to protect from leaking industrial technology and proved the importance of the security certification as an infrastructures and system.

디지털콘텐츠(S/W) 품질인증제도개선방안

  • 김용재
    • Proceedings of the CALSEC Conference
    • /
    • 2003.09a
    • /
    • pp.268-273
    • /
    • 2003
  • □ e-비즈니스의 활성화로 비대면 거래의 특성과 유료화의 증가에 따른 거래 당사자간의 분쟁을 예방하는 차원에서 디지털콘텐츠의 품질을 향상시키는 방안을 강구 ㆍ우리나라 디지털콘텐츠(S/W) 품질 완성도 향상을 위한 제3차 시험 필요 ㆍ선진국의 기술보호 장벽에 대한 제도적 대안 필요 ㆍ해외 시험소 이용에 따른 비용유출 방지 과다한 초기 투자비용의 부담으로 민간업체에서 운영 불가능 ㆍ사전 검증된 고급품질의 디지털콘텐츠(S/W)공급으로 사용자 구매 촉진 ㆍ고급품질의 디지털콘텐츠(S/W) 공급으로 사용자 만족도 향상르로 우리나라 산업 발전에 기여 ㆍ고급품질의 지지털콘텐츠(S/W) 공급으로 수입대체로 인한 국제 수지 개선 효과

  • PDF

워터마킹 기법을 이용한 생체정보 보호

  • 김태해;정승환;정용화;문대성;문기영
    • Review of KIISC
    • /
    • v.15 no.6
    • /
    • pp.31-40
    • /
    • 2005
  • 21세기를 맞이하면서 정보통신기술의 발전과 인터넷 이용 확산 등으로 사용자 인증이 중요한 문제로 대두되고 있다. 패스워드 또는 PIN(Personal Identification Number)을 이용한 사용자 인증 방법이 현재까지 널리 쓰이고 있으나 타인에게 노출되거나 잊어버리는 등의 문제점이 있다. 이러한 문제를 해결하기 위하여 개인의 고유한 생체정보를 이용한 주요 정보 보호 및 사용자 인증 등의 연구가 활발히 진행되고 있다. 그러나 이러한 생체인식 기술을 대규모 응용에 적용하기 위해서는 생체정보의 안전한 저장/전송/처리 등 생체정보 보호에 대한 연구가 필수적이다. 본 고에서는 디지털 컨텐츠 보호에 사용되는 워터마킹 기법을 이용하여 이러한 생체정보를 보호하려는 경우 발생하는 이슈와 관련 연구 동향을 소개한다.

A Study on Authentication for Distributed Directory System (분산 디렉토리 시스템에서의 인증에 관한 연구)

  • 최성민;이인숙;장청룡;원동호
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 1992.11a
    • /
    • pp.41-54
    • /
    • 1992
  • 본 논문에서는 정보를 효율적으로 저장, 관리, 전송할 수 있는 기능을 담당하는 분산 디렉토리 시스템(X. 500시리즈)의 모델과 MHS와의 연계 방안을 알아 보고, 이 시스템에서의 인증 방식 중의 하나인 상세 인증(strong authentication)의 문제점과 그 해결 방안을 제시하였다. 또한 X. 509 권고안에서의 디지털 서명을 생성하는 구체적인 방법으로 특정 성질을 갖는 공개키 암호 방식인 RSA를 이용하였으나 본 논문에서는 ElGamal 방식을 분산 디렉토리 시스템에 적용시킴으로써 RSA 방식이 아닌 다른 방식도 X. 509에 적용 가능하다는 것을 보였다.

  • PDF