• 제목/요약/키워드: 원격 인증

Search Result 287, Processing Time 0.022 seconds

Applying Tenneling and Protocol for Extranet VPN Construction (엑스트라넷 VPN 구축을 위한 효율적 터널링 및 프로토콜 적용)

  • 장희진;조용구;소우영
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2003.05b
    • /
    • pp.53-56
    • /
    • 2003
  • 엑스트라넷은 기업협력간 업무처리 또는 인증된 고객에게 서비스를 제공하기 위하여 사설망 서비스를 제공한다. 최근에는 비용이나 보안적 측면을 고려하여 기업간에 VPN을 이용한 엑스트라넷 구축이 활성화되고 있다. 엑스트라넷 VPN 구축 시 필요한 터널링 및 프로토콜은 아직까지 국내에서 표준화에 기반한 적용방안이나 권고가 부족한 실정이다. 본 논문에서는 엑스트라넷 VPN 구현형태에 따라 인트라넷 VPN과 원격접속 VPN으로 구분하여 터널링 및 프로토콜의 기능 및 성능을 비교 분석하여 두 가지 구분에 요구되는 서비스와 보안에 따라 효율적으로 터널링 및 프로토콜을 적용하는 방안에 대하여 논하고자 한다.

  • PDF

The Design of a Secure Patch Distribution Architecture (안전한 패치 분배 구조 설계)

  • 손태식;김진원;박일곤;문종섭;서정택;임을규;이철원
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.10c
    • /
    • pp.559-561
    • /
    • 2002
  • 시스템이나 네트워크 보안에 있어 관련된 페치의 업데이트는 보안의 최우선적 사항이다. 그러므로 패치 분배과정에 있어 패치 정보가 누출된다는 것은 시스템이나 네트워크의 취약성이 그대로 노출되는 것과 같은 문제를 발생시킨다. 본 논문에서는 일반적인 인터넷 환경에서의 패치 분배가 아닌 특정 조직이나 기관의 도매인 내부에서 안전하게 패치를 분배할 수 있는 구조에 대하여 제안한다. 본 제안 구조에서는 서버 인증서 기반의 사용자 인증, SKIP 모듈러스를 사용하는 DH 키분배, 패치 체크섬 암호화를 통한 기밀성ㆍ무결성 보장, 원격지에서의 패치 자동 설치 기능을 제공한다.

  • PDF

A Design of Scalable SNMP Agent Bundle Based on OSGi Framework (OSGi 프레임워크기반 확장형 SNMP 에이전트 번들 설계)

  • Hwang Tae-In;Park Kwang-Roh
    • Journal of The Institute of Information and Telecommunication Facilities Engineering
    • /
    • v.1 no.1
    • /
    • pp.40-50
    • /
    • 2002
  • A traditional agent was difficult to upgrade and to add MIB implementation code to it because most SNMP agent designs had MIB that was not a self-contained module. To solve this problem, we design the SNMP agent bundle composed of remotely uploadable SNMP agent core bundle and MIB Bundle Also, downloadable server bundle and user administration bundle is added to SNMP agent bundle to download MIB bundle from bundle server. By designing MB-MIB, we enable the network manager to monitor status of MIB bundle on managed devices. The network manager is allowed to install and upgrade the SNMP module or MIB remotely on line. This is the major benefit of designing the SNMP agent bundle based on OSGi. Finally, we expect the network manager to reduce time and expenses in managing enormous networks by using the SNMP agent bundle.

  • PDF

Cryptanalysis of Remote User Authentication Scheme (원격 사용자 인증 구조의 암호학적 분석)

  • Choi, Jong-Seok;Shin, Seung-Soo;Han, Kun-Hee
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.2
    • /
    • pp.327-333
    • /
    • 2009
  • In 2004, Das et al. proposed a scheme for preserving a user anonymity. However, In 2005, Chien and Chen pointed out that Das et al. scheme fail to protect the user anonymity, and proposed a new scheme. And then in 2007, Hu et al. pointed out that Chien and Chen scheme also has some problems; it is Strong masquerading server/user attack, Restricted replay attack, Denial of service attack. it also slow wrong password detection, and proposed a new scheme. In 2008, Bindu et al. repeatedly pointed out on Chien and Chen scheme and proposed their scheme. However, we point out that all of their scheme also has some problems; it is not to protect the user anonymity and Denial of service attack. In addition, Bindu et al. is vulnerable to Strong masquerading server/user attack. Therefore, we demonstrate that their scheme also have some problems; it is the user anonymity and denial of service attack as above.

Digital Watermarking of Medical Image Based on Public Key Encryption Algorithm Considering ROI (ROI를 고려한 공개키 암호화 알고리즘 기반 의료영상 디지털 워터마킹)

  • Lee Hyung-Kyo;Kim Hee-Jung;Seong Tack-Young;Kwon Ki-Ryong;Lee Jong-Keuk
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.11
    • /
    • pp.1462-1471
    • /
    • 2005
  • Recently, the medical image has been digitized by the development of computer science and digitization of the medical devices. There are needs for database service of the medical image and long term storage because of the construction of PACS(picture archiving and communication system) following DICOM(digital imaging communications in medicine) standards, telemedicine, and et al. However, it also caused some kinds of problems, such as illegal reproduction of medical image, proprietary rights and data authentication. In this paper, we propose the new digital watermarking technique for medical image based on public key encryption algorithm for integrity verification. It prevents illegal forgery that can be caused after transmitting medical image data remotely. The watermark is the value of bit-plane in wavelet transform of the original image for certification method of integrity verification. We proposed the embedding regions are randomly chosen considering ROI, and a digital signature is made using hash function of MD5 which input is a secret key. The experimental results show that the watermark embedded by the proposed algorithm can survive successfully in image processing operations and that the watermark's invisibility is good.

  • PDF

Multiplex Certification System Using XML For WBI (WBI에서의 XML 다중인증 시스템)

  • 신영준;이동휘;김정재;김귀남
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.297-302
    • /
    • 2004
  • Internet becomes absolutely necessary tools due to rapid progress of information technology. Educational correspondence abount an age of information demand is a education focused on a learner and remote education based on information technology. WBI(Web Based Instruction) is a formation that remotly educate a learner using web, possible mutual reaction between instructor and learner, submint various studying material, has a good point to overcome spatial restriction. Internal and external standardization working is accelerated and recently XML security studies are activated using XML which is next generation web standard document format. And XML electronic signature raise interworking between digital signature systems used by various field of using XML document. Using these merit and complementing defect are main contents that users have to pay about Certification service to get CA certificate from 2004 june. This paper propose multiplex Certification remote education agent system using XML digital signature to satisfy security requirement.

  • PDF

Implementation of Intelligent Home Network System using Wireless Sensor (무선센서를 이용한 지능형 홈네트워크 시스템 구현)

  • Ju, Jae-han;Na, Seung-kwon
    • Journal of Advanced Navigation Technology
    • /
    • v.21 no.3
    • /
    • pp.294-299
    • /
    • 2017
  • Home network service is evolving into a service that can receive contents such as remote education, home automation, remote meter reading and various entertainment anytime and anywhere by connecting all household appliances in home with wired and wireless network. In this paper, an intelligent home gateway installed at home is connected to the mobile communication terminal from the outside to solve the problems of the existing home network and configure and maintain a more efficient and comfortable home network environment for the user, In the window, the login page is activated to confirm the user access authority, and the user proceeds the authentication procedure through own login information. When the normal authentication procedure is performed, the intelligent home gateway maintains only the network connection with the user, and the user presents the intelligent home network system using the RFID which is accessed by the intelligent home network system.

Security Vulnerability and Countermeasures in Smart Farm (스마트 팜에서의 보안 취약점 및 대응 방안에 관한 연구)

  • Chae, Cheol-Joo;Han, Sang-Kyun;Cho, Han-Jin
    • Journal of Digital Convergence
    • /
    • v.14 no.11
    • /
    • pp.313-318
    • /
    • 2016
  • Recently, the smart farm development using a PC and smart phone to manag the farm for improving competitiveness is in progress. In the smart farm, by using the various ICT technology including RFID, Wi-Fi, ZigBee, Wireless LAN, and etc., the growing environment of the crop and animals can be managed with the remote. By using the network including not only the TCP/IP based wired network but also ZigBee, Wireless LAN, and etc., each of the devices installed in the smart farm transmits the growing environment data to the server. So, smart farms have information and network security vulnerability. Therefore, we propose the method that analyzes the security vulnerability which can begenerated in the smart farm and user authentication method.

Web Based Tele-Medicine System including Security Scheme (웹기반 원격진료시스템에서 암호화인증방식이 적용된 회원관리기법)

  • Kim, Seok-Soo
    • Convergence Security Journal
    • /
    • v.5 no.1
    • /
    • pp.19-27
    • /
    • 2005
  • This paper presents the content regarding electronic medical examination chart and data processing for efficient medical examination and fast treatment by realizing remote medical examination system of mutual conversation type among 3 parties(patient, doctor, pharmacist) on internet base, and establishment of database enabled system integration for efficient data processing in both on-line and off-line mode by interconnecting ASP and SQL on IIS 4.0 web server, consultation between patient and doctor, medical examination on off-line mode, transmission of prescription sheet to the pharmacist designated by patient, preparation of medicine, semieternal storage of medical examination data owing to storage and check of medical examination data, more accurate medical examination and prescription using this medical examination data by patient and doctor, and so on. And, data processing between doctor and pharmacist is differently performed based on class such as general member and charge member, and service access right pursuant to this is endowed, so that certification of each member must follow by all means.

  • PDF

An Enhancement of The Enterprise Security for Access Control based on Zero Trust (제로 트러스트 기반 접근제어를 위한 기업 보안 강화 연구)

  • Lee, Seon-A;Kim, Beomseok;Lee, Hyein;Park, Wonhyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.2
    • /
    • pp.265-270
    • /
    • 2022
  • With the advent of the Fourth Industrial Revolution, the paradigm of finance is also changing. As remote work becomes more active due to cloud computing and coronavirus, the work environment changes and attack techniques are becoming intelligent and advanced, companies should accept new security models to further strengthen their current security systems. Zero trust security increases security by monitoring all networks and allowing strict authentication and minimal access rights for access requesters with the core concept of doubting and not trusting everything. In addition, the use of NAC and EDR for identification subjects and data to strengthen access control of the zero trust-based security system, and strict identity authentication through MFA will be explained. Therefore, this paper introduces a zero-trust security solution that strengthens existing security systems and presents the direction and validity to be introduced in the financial sector.