• Title/Summary/Keyword: 설계인증

Search Result 1,672, Processing Time 0.036 seconds

Analyzing the Significance of Enhancements in Zero Energy Building Rating Systems: A Comparative Study between Designers and Building Energy Assessors (설계자와 건축물 에너지 평가사 측면의 제로에너지 건축물 인증 활성화를 위한 중요도 비교 분석)

  • Myung, Il;Choi, Jong-Dae;Jung, Ho-Youn;Choi, Jae-Kyu
    • Journal of the Korea Institute of Building Construction
    • /
    • v.23 no.4
    • /
    • pp.453-464
    • /
    • 2023
  • This research conducts a comparative analysis of the perceived importance of advancing zero energy building certification from the viewpoints of two major stakeholders - designers and building energy assessors. Both groups prioritized the importance of policy, technology, education, incentives, and promotion respectively. For designers, enhancing energy efficiency standards, developing a skilled energy workforce, and implementing an office registration system emerged as critical factors in invigorating the certification process. The findings suggest potential avenues for the government to formulate realistic strategies for boosting the certification activity.

Protocol Design for Mutual Authentication of RS_RCCS (RS_RCCS의 상호인증을 위한 프로토콜 설계)

  • Doo, Chang-Ho
    • Journal of the Korea Computer Industry Society
    • /
    • v.7 no.4
    • /
    • pp.271-280
    • /
    • 2006
  • This study is to propose and design a protocol that offers independent authentication with no necessity of certification authority using password between participants in RS_RCCS(Relay Service-based Remote Computing Control System). In RS_RCCS without authentication center that remote service requesters have mutual authentication with many service managers, there needs for a protocol protected from password attacks. Hereupon, this study is to offer an efficient authentication setting and a protocol for RS_RCCS and helpful for the usefulness of resource management.

  • PDF

Design of user authentication mechanism for open mobile web services using OpenID (개방형 모바일 웹 서비스를 위한 OpenID를 이용한 사용자 인증 메커니즘의 설계)

  • Bae, Joon-Hyun;Kim, Sang-Wook
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2007.06d
    • /
    • pp.35-39
    • /
    • 2007
  • OpenID는 웹 서비스를 위한 사용자 중심의 분산형 인증 메커니즘을 제공한다. OpenID를 이용하면 기존의 아이디와 패스워드를 이용한 인증방법보다 더 편리한 회원등록과 로그인 기능을 제공 할 수 있다. 본 논문에서는 OpenID를 이용하여 모바일 웹 환경에서의 사용자 인증 메커니즘을 설계한다. 먼저, 이동통신 망과 무선인터넷에서의 사용자 인증기술에 대해서 분석하고, OpenID를 이용한 개선된 모바일 웹 사용자 인증 메커니즘을 제안한다. 제안하는 메커니즘의 목표는 모바일 웹 사용자에게는 보다 효율적인 회원등록과 로그인 기능을 제공하고, 모바일 웹 서비스 제공자에게는 좀 더 신뢰성 있는 사용자 인증 수단을 제공하는 데 있다.

  • PDF

Design of Location-Based Authentication System using Beacon (Beacon을 이용한 위치기반 인증 시스템 설계)

  • Jo, Hae-Ryong;Lee, Yang-Kyu;Choi, Min
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2015.01a
    • /
    • pp.67-70
    • /
    • 2015
  • 특정 인터넷 서비스는 그 성격에 따라 제한된 위치에서만 서비스를 제공하도록 설계한다. 이러한 시스템 구조에서 사용자의 위치정보는 서비스 접근을 통제하는 과정에서 핵심적으로 사용되며 LSB(Location Based Service), WPS(Wifi Positioning System)와 같은 기술로 제안되었다. 그러나 기존 인증 기법은 대상이 일정하지 않은 불특정 다수의 사용자가 접근하기에 적합하지 않고, 서비스 공급자의 무선 AP를 이용하기 때문에 과도한 서버 부하에 취약하다. 따라서 본 논문에서는 이러한 문제를 해결하기 위해서 Beacon을 이용한 위치기반 인증 시스템을 제안한다. Beacon이란 Bluetooth 기술을 기반으로 근거리 무선 통신 기기이다. 사용자가 서비스 접근 권한을 획득하기 위해 인증 서버에서 요구하는 인증 코드는 BLE(Bluetooth Low Energy)를 사용하는 Beacon이 브로드캐스팅한다. 즉, 사용자는 Beacon이 BLE로 브로드캐스팅한 데이터를 수신할 수 있는 물리적인 범위까지 접근해야 인증 절차를 수행할 수 있다.

  • PDF

An Authentication Protocol Design in RFID System for Mobility (유동성을 지닌 RFID 시스템을 위한 인증 프로토콜 설계)

  • Kim, Young-Jin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.1
    • /
    • pp.122-128
    • /
    • 2010
  • RFID is method used on wireless system. However, this mechanism is not used for authentication and security. Therefore, it is very vulnerable to attacks such as dropping attacks and traffic attacks. the RFID Tags are of the limited nature due to environment factors and there is greater constraints in designing authentication protocol. If we do not RFID to secure corporate information and product all the information will be exposed. The attacker will break into the RFID system and stop the distribution system. So, this paper proposes a new authentication protocol which provides not only unlimited access to Tag and Reader of mobile and connection between Tag and Reader bet also provides authentication mechanism by defining the key distribution.

The design of User authentication system by using Public key cryptography system and one time password (공개키 암호화 시스템과 일회성 패스워드를 이용한 사용자 인증 시스템 설계)

  • 이상준;김영길
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.05a
    • /
    • pp.498-501
    • /
    • 2002
  • In the process of Log-In to the system, clear User authentication is the beginning of the information protection service. In the open communication system of today, it is true that a password as security instrument and the inner mechanism of the system and cryptography algorithm for the support of this are also poor. For this reason, this dissertation had a final aim to design the user authentication system, which offer the accuracy and safety. It used RSA and CBC mode of DES as cryptography algorithm and used the Challenge-Response scheme at a authentication protocol and designed the User authentication system to which user access using one time password, output of token to guarantee the safety of the authentication protocol. Alto by using the Public key cryptography algorithm, it could embody the more safe User authentication system.

  • PDF

Design of Multi-Authentication Server for user authentication in SaaS platform (SaaS 플랫폼 사용자 인증을 위한 Multi-Authentication Server 설계)

  • Kim, Young-Man;Lim, Seung-Yong;Kang, Min-Cheol;Lee, Jin-Bem;Ban, Eun-Young;Lim, Jun-Hyun;Han, Jae-Il
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.897-900
    • /
    • 2011
  • 최근 새로운 소프트웨어 배포 방식인 SaaS가 주목을 받고 있다. SaaS는 원활하고 효율적인 서비스 제공을 위하여 소프트웨어 서비스를 제공하는 SaaS 어플리케이션과 과금, 사용자 인증과 같은 공통 서비스들을 제공하는 SaaS 플랫폼으로 역할이 분리되어 있다. 이런 배경을 바탕으로 본논문에서는 효율적인 사용자인증을 위한 SaaS 플랫폼의 사용자인증 서비스인 Multi-Authentication Server를 설계 한다. 본논문에서 설계되는 Multi-Authentication Server는 OpenID, OAuth, CAS, X.509 프로토콜을 통합하여 웹기반의 사용자인증 서비스를 구현한다. 마지막으로 웹기반 사용자 인증의 보안성 한계 극복과, 최근 하드웨어 보안기능을 이용하여 RADIUS 프로토콜과 TPM칩을 통합한 하드웨어 기반 네트워크 인증서비스를 제공한다.

Analysis of the Importance from Detailed Work (Role) of the Construction Manager for G-SEED Certification in the Design Phase (녹색건축인증을 위한 설계단계 건설사업관리자의 세부 업무(역할)별 중요도 분석)

  • Lee, Duhwan;Kang, Seongmi
    • Korean Journal of Construction Engineering and Management
    • /
    • v.21 no.6
    • /
    • pp.103-112
    • /
    • 2020
  • In this study, based on actual project implementation cases, task management plans for construction management related green building certification were derived in major stages. Accordingly, the importance from details of construction management tasks for the operation and management process of the schematic design phase, design development phase, and construction document phase, focusing on G-SEED certification, was analyzed. In addition, major items were derived based on the weight of additional construction costs and acquisition scores through previous research cases on the analysis of construction costs for G-SEED certification, and the importance from details of construction management tasks on the major items of G-SEED certification was analyzed. As a result, the review and confirmation of the elements of reflection related to G-SEED in the schematic design phase, the adequacy of design documents and the connectivity of design phase in the design development phase were important. And the review and confirmation of the items directly related to the construction phase in the construction document phase were important.

A Design of DA_UDC(Double Authentication User.Device.Cross) Module using OTA(One Time Authentication) Key in Home Network Environment (홈 네트워크 환경에서 OTA(One Time Authentication)키를 이용한 DA_UDC(Double Authentication User.Device.Cross) 모듈 설계)

  • Jeong, Eun-Hee;Lee, Byung-Kwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.4B
    • /
    • pp.419-427
    • /
    • 2009
  • This paper propose DA-UDC(Double Authentication User, Device, Cross) Module which solves the cost problem and the appropriation of Certificate using User Authentication, Device Authentication and Cross Authentication with OTA(One Time Authentication) Key, and which is designed not to subscribe to the service of Home network business. Home Server transmits its public key which is needed to create OTA to the user which passed the first step of authentication which verifies User ID, Device ID and Session Key. And it performs the second step of authentication process which verifies the OTA key created by a user. Whenever the OTA key of DA-UDC module is generated, the key is designed to be changed. Therefore, DA-UDC Module prevents the exposure of User and Device ID by performing the two steps of authentication and enhances the authentication security of Home Network from malicious user with OTA key. Also, DA-UDC Module is faster than the existing authentication system in processing speed because it performs authentication calculation only once. Though DA-UDC Module increases data traffic slightly because of the extra authentication key, it enhances the security more than the existing technique.

A Study of Authentication Design for Youth (청소년을 위한 인증시스템의 설계에 관한 연구)

  • Hong, Ki-Cheon;Kim, Eun-Mi
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.8 no.4
    • /
    • pp.952-960
    • /
    • 2007
  • Most Websites perform login process for authentication. But simple features like ID and Password have no trust because most people worry about appropriation. So the youth can easily access illegal media sites using other's ID and Password. Therefore this paper examine features be adaptable to authentication system, and propose a design of authentication system using multiple features. A proposed authentication system has two categories, such as low-level and high-level method. Low-level method consists of grant of authentication number through mobile phone from server and certificate from authority. High-level method combines ID/Password and features of fingerprint, character, voice, face recognition systems. For this, this paper surveys six recognition systems such as fingerprint, face, iris, character, vein, voice recognition system. Among these, fingerprint, character, voice, face recognition systems can be easily implemented in personal computer with low cost accessories. Usage of multiple features can improve reliability of authentication.

  • PDF