• Title/Summary/Keyword: 방문 인증

Search Result 72, Processing Time 0.024 seconds

농장탐방 - 분야별 전문가에 맡겨 운영 극대화

  • Choe, In-Hwan
    • KOREAN POULTRY JOURNAL
    • /
    • v.43 no.12
    • /
    • pp.142-145
    • /
    • 2011
  • 이번호에는 산란종계장으로 처음 우수종계장에 선정된 충청남도 당진군 합덕읍에 위치한 재성농장을 방문하였다. 재성농장은 조인(주) 직영농장으로 지난 6월 13일 HACCP적용작업장(업소 농장)으로 지정받았으며 종계장 검정성적 및 생산실적, 위생방역 수준, 경영개선사례, 사육입지조건을 평가하여 종계장의 자율경쟁을 유도하고 부화장 및 실용계 농장의 우수종란 병아리 선택지표 제공을 통한 편익을 도모하고자 실시된 2011 종계장 종합평가에서 지난 6월 17일 분양검정, 방역위생, 경영개선, 사육입지, 능력검정 실적 등에서 우수한 성적으로 2011 우수종계장 인증을 받았다.

성인병 뉴스 제320호

  • The Korea Association of Chronic Disease
    • The Korean Chronic Disease News
    • /
    • no.320
    • /
    • pp.1-17
    • /
    • 2007
  • 전국 지자체 보건사업 종합평가/"생활습관병 퇴치 정책도입 필요"/고혈압.당뇨병환자 직접 등록관리/'방문건강관리'로 고혈압 관리율 향상/세계폐암학회, 담배 판매 금지 촉구/"폐암 진단 기준 세분화된다"/세계폐암학회 2007년 담배규제선언문/서울대병원, 브랜드 경쟁력 1위/세브란스병원 국제적으로 인증/충남도청 이전지에 '건양대학병원' 설립/55세 이상 남성... 5%가 전립선암/"순한 담배가 선암성 폐암 일으킨다"/골다공증 척추골절, 직접성형 96% 만족/건강투자전략의이해/"살기 좋은 웰빙 도봉"-도봉구보건소/"생각이 바뀌면 운명이 달라진다"

  • PDF

A Scalable and Practical Authentication Protocol in Mobile IP (Mobile IP에서 확장성과 실용성 있는 인증 프로토콜 제안 및 분석)

  • Lee, Yong;Lee, Goo-Yeon
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.42 no.11
    • /
    • pp.35-44
    • /
    • 2005
  • In Mobile IP protocol, because a mobile node still uses its home IP address even though it moves to foreign network from home network, authentication among mobile node, foreign network and home network is critical issue. Many researches about this issue have been based on shared secret, for example mobile node and home agent authenticate each other with pre-shared symmetry key. And they missed several security issues such as replay attack. Although public key scheme could be applied to this issue easily, since the public key cryptography is computationally complicated, it still has the problem that it is not practical to realistic environment. In this paper, we describe several security issues in Mobile IP protocol. And we propose new Mobile IP authentication protocol that is applicable to realistic environment using public key algorithm based on certificate. It has scalability for mobile nodes and is applicable to the original Mobile IP protocol without any change. Finally we prove security of the proposed protocol and that it might not affect performance of the original Mobile IP protocol.

Design of a Secure Session Key Exchange Method for tow Latency Handoffs (Low Latency Handoffs를 위한 안전한 세션 키 교환 기법 설계)

  • Kim Hyun-Gon;Park Chee-Hang
    • Journal of Internet Computing and Services
    • /
    • v.5 no.3
    • /
    • pp.25-33
    • /
    • 2004
  • Mobile IP Low Latency Handoffs(l) allow greater support for real-time services on a Mobile IP network by minimizing the period of time when a mobile node is unable to send or receive IP packets due to the delay in the Mobile IP Registration process. However, on Mobile IP network with AAA servers that are capable of performing Authentication, Authorization, and Accounting(AAA) services, every Registration has to be traversed to the home network to achieve new session keys, that are distributed by home AAA server, for a new Mobile IP session. This communication delay is the time taken to re-authentication the mobile node and to traverse between foreign and home network even if the mobile node has been previously authorized to old foreign agent. In order to reduce these extra time overheads, we present a method that performs Low Latency Handoffs without requiring further involvement by home AAA server. The method re-uses the previously assigned session keys. To provide confidentiality and integrity of session keys in the phase of key exchange between agents, it uses a key sharing method by gateway foreign agent that performs a trusted thirty party. The proposed method allows the mobile node to perform Low Latency Handoffs with fast as well as secure operation.

  • PDF

Design of a Secure and Fast Handoff Method for Mobile If with AAA Infrastructure (AAA 기반 Mobile IP 환경에서 안전하고 빠른 핸드오프 기법 설계)

  • 김현곤
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.1
    • /
    • pp.79-89
    • /
    • 2004
  • Mobile IP Low Latency Handoffs allow greater support for real-time services on a Mobile W network by minimizing the period of time when a mobile node is unable to send or receive IP packets due to the delay in the Mobile IP Registration process. However, on Mobile IP network with AAA servers that are capable of performing Authentication, Authorization, and Accounting(AAA) services, every Registration has to be traversed to the home network to achieve new session keys, that are distributed by home AAA server, for a new Mobile IP session. This communication delay is the time taken to re-authenticate the mobile node and to traverse between foreign and home network even if the mobile node has been previously authorized to old foreign agent. In order to reduce these extra time overheads, we present a method that performs Low Latency Handoffs without requiring funker involvement by home AAA server. The method re-uses the previously assigned session keys. To provide confidentiality and integrity of session keys in the phase of key exchange between agents, it uses a key sharing method by gateway foreign agent that Performs a ousted thirty party. The Proposed method allows the mobile node to perform Low Latency Handoffs with fast as well as secure operation

Navigation System Using Drone for Visitors (드론을 활용한 방문객 길 안내 시스템)

  • Seo, Yeji;Jin, Youngseo;Park, Taejung
    • Journal of Digital Contents Society
    • /
    • v.18 no.1
    • /
    • pp.109-114
    • /
    • 2017
  • In our modern society, the utilization of the advanced drone which is capable of performing variety of tasks has been gradually increasing. In this paper, we present an application, similar to the prototype "Skycall" that had been introduced in the MIT Senseable City. To assess this concept, we have implemented a prototype of drone-based pedestrian navigation depending on the Android smartphone. Our system is not only able to guide the user in a very complicated place, where buildings are compacted, but also to block unauthorized visitors from accessing the facilities. And we discuss some problems we found and suggest the direction to address them.

A Mobility Management Scheme based on the Mobility Pattern of Mobile Networks (이동 네트워크의 이동 패턴에 기반을 둔 이동성 관리 기법)

  • Yang, Sun-Ok;Kim, Sung-Suk
    • Journal of KIISE:Information Networking
    • /
    • v.35 no.4
    • /
    • pp.345-354
    • /
    • 2008
  • Recently, small-scale mobile network which is composed of many mobile devices in a man becomes popular. Also, Examples of large-scale mobile network can be thought access networks deployed on public transportation such as ships, trains and buses. To provide seamless mobility for mobile nodes in this mobile network, binding update messages must be exchanged frequently. However, it incurs network overhead increasingly and decreases energy efficiency of mobile router. If we try to reduce the number of the messages to cope with the problem, it may happen the security -related problems conversely Thus, mobile router needs a effective algorithm to update location information with low cost and to cover security problems. In this paper, mobility management scheme based on mobile router's mobility pattern is proposed. Whenever each mobile router leaves a visiting network, it records related information as moving log. And then it periodically computes mean resident time for all visited network, and saves them in the profile. If each mobile router moves into the visited network hereafter, the number of binding update messages can be reduced since current resident time may be expected based on the profile. At this time, of course, security problems can happen. The problems, however, are solved using key credit, which just sends some keys once. Through extensive experiments, bandwidth usages are measured to compare binding update messages in proposed scheme with that in existing scheme. From the results, we can reduce about 65% of mobility-management-related messages especially when mobile router stays more than 50 minutes in a network. Namely, the proposed scheme improves network usage and energy usage of mobile router by decreasing the number of messages and authorization procedure.

Design of an Visitor Identification system for the Front Door of an Apartment using Deep learning (딥러닝 기반 이용한 공동주택현관문의 출입자 식별 시스템 설계)

  • Lee, Min-Hye;Mun, Hyung-Jin
    • Journal of the Korea Convergence Society
    • /
    • v.13 no.4
    • /
    • pp.45-51
    • /
    • 2022
  • Fear of contact exists due to the prevention of the spread of infectious diseases such as COVID-19. When using the common entrance door of an apartment, access is possible only if the resident enters a password or obtains the resident's permission. There is the inconvenience of having to manually enter the number and password for the common entrance door to enter. Also, contactless entry is required due to COVID-19. Due to the development of ICT, users can be easily identified through the development of face recognition and voice recognition technology. The proposed method detects a visitor's face through a CCTV or camera attached to the common entrance door, recognizes the face, and identifies it as a registered resident. Then, based on the registered information of the resident, it is possible to operate without contact by interworking with the elevator on the server. In particular, if face recognition fails with a hat or mask, the visitor is identified by voice or additional authentication of the visitor is performed based on the voice message. It is possible to block the spread of contagiousness without leaving any contactless function and fingerprint information when entering and exiting the front door of an apartment house, and without the inconvenience of access.

Design of the ACCESS (Address Certification Co-opErating SyStem) in Financial Institution (금융기관의 주소인증공동이용시스템 설계)

  • Park, Min-Gab;Jeon, Min-Ho;Yang, Hae-Sool
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2005.05a
    • /
    • pp.663-666
    • /
    • 2005
  • 은행, 저축은행, 신용정보회사 등 금융기관에서는 채권관리 및 회수, 각종 우편물 발송 등의 업무처리를 위해 채무자 또는 고객의 최종 주소의 파악이 필요하다. 주소 파악을 위한 업무프로세스는 금융기관 직원이 채무자와 사실 관계를 증명하는 서류를 작성하고, 행정기관에 직접 방문하여 민원서류를 발급 받는 등 Off-line으로 이루어지고 있다. 이러한 민원서류 발급 업무량은 경제상황의 악화와 그에 따른 신용불량자의 대거 발생 등으로 인해 지속적으로 증대되고 있다. 따라서 행정전산망과 금융전산망을 서로 연결하여 신속하게 정보를 파악할 수 있도록 하는 주소 인증공동이용시스템(ACCESS, Address Certification Co-opErating SyStem)을 구축하는 것이 필요한 실정이다. 이에 본 연구에서는 ACCESS를 구축을 위한 설계를 통하여, 행정기관 민원서류 발급업무 담당자, 금융기관 해당업무 종사자 등의 업무를 대폭 줄임으로서 산업생산성을 제고 하는 방안을 제시하고자 한다. 또한 향후 행정전산망과 금융전산망의 연결체계에서 새롭게 구축될 다양한 정보서비스의 유형을 처리 할 수 있는 기반을 마련하여, 효율적인 정보의 공유와 유통 및 이를 통한 시너지효과를 창출하고, 정보자원의 활용 및 가치를 극대화하고자 한다.

  • PDF

Performance Evaluation and Suggestions Based on the 2013 Child Care Center Accreditation System (2013년도 어린이집 평가인증 운영체계 개선에 따른 성과평가와 개선안)

  • Jae, Kyung Sook
    • Korean Journal of Childcare and Education
    • /
    • v.11 no.1
    • /
    • pp.501-521
    • /
    • 2015
  • This study aims to examine the effects of the main eight items amended in the 2013 child care center accreditation system and to provide suggestions. The participants in the study were 200 child care center teachers and staff; 150 professionals consisting of public officials in charge of child care, members for the accreditation committee, and inspectors at the site; and 144 parents. They participated in an on-line questionnaire survey conducted during the end of February, 2014. The survey questions regarding the eight changed items were the same to all the three participating groups, and three more questions were asked to child care center teachers and staff. The collected data were analyzed with frequencies and percentages to present general recognition level. For a group comparison, analysis of variance was first performed among 3 professional groups, all of which has the same size. When there was not a statistically significant difference among the three groups, the second analysis of variance was done among three groups of professionals including the three groups, teachers and staff, and parents. The results showed that there were differences in recognition among the groups regarding each changed item in the 2013 child care center accreditation system, but overall, the groups evaluated the main amendments positively and the changes were considered appropriate and necessary. However, it was found that in-depth reviews are needed of procedure unification to check the basics to require legal compliance; management of unaccredited centers such as valid period reduction and no accreditation, or limit for re-accreditation application; and the burdens of child care centers about surprise visits and notice of inspection dates in advance.