• Title/Summary/Keyword: 원격 인증

Search Result 287, Processing Time 0.021 seconds

Research on the Zero Trust Trend Analysis and Enterprise Security Enhancement (제로트러스트 동향 분석 및 기업 보안 강화 연구)

  • Min Gyu Kim;Chanyoung Kang;Sokjoon Lee
    • Smart Media Journal
    • /
    • v.12 no.5
    • /
    • pp.46-57
    • /
    • 2023
  • As the COVID-19 pandemic and the development of IT technology have led to the gradual popularization of remote and telecommuting, cloud computing technology is advancing, and cyber attack techniques are becoming more sophisticated and advanced. In response to these trends, companies are increasingly moving away from traditional perimeter-based security and adopting Zero Trust to strengthen their security. Zero Trust, based on the core principle of doubting and not trusting everything, identifies all traffic and grants access permissions through a strict authentication process to enhance security. In this paper, we analyze the background of Zero Trust adoption and the adoption policies and trends of countries that are proactively promoting its implementation. Additionally, we propose necessary efforts from governments and organizations to strengthen corporate security and considerations for companies when applying Zero Trust.

The Design of Remote Control System using Bluetooth Wireless Technology (블루투스 무선기술을 응용한 원격제어 시스템의 설계)

  • 전형준;이창희
    • Journal of the Korea Computer Industry Society
    • /
    • v.4 no.4
    • /
    • pp.547-552
    • /
    • 2003
  • In this thesis, interference phenomena of bluetooth networks requiring Security were minimized; strengthened security of piconet by assigning an identical PIN code to bluetooth devices, which was establishing a specific piconet during authentication stage. To establish a bluetooth piconet system. an unique ID was assigned to each bluetooth device, communication algorithms having different data formats between devices was designed, and an embedded hardware module using ARM processor and uCOS-II RTOS was implemented. About 30% of CPU efficiency in the module was increased by modifying functions including block parameters to work as nonblocking; by the increased efficiency of total piconet, the module could be used as an access point. The module could transmit maximum 10 frames of image and also audio signal by switching the packet effectively according to channel condition. By above-mentioned process, video, audio, and data could be well transmitted by the bluetooth managing program and the possibility of a commercial remote control system using bluetooth technology was suggested.

  • PDF

Transmitting/Receiving of Standard Health Data Using Bluetooth HDP on the Android Platform (안드로이드에서 블루투스 HDP를 이용한 표준건강정보의 송수신)

  • Park, Young-Jin;Cho, Hui-Sup;Son, Jong-Wuk
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.5
    • /
    • pp.464-470
    • /
    • 2013
  • These days, with increasing interest about the health care, research about standard for transmitting/receiving data of health device has been actively conducted. Standardization and testing / certification is underway through the IEEE 11073 PHD, Health Level Seven and the Continua Health Alliance, it'll continue to be more research and experiments in the future. In this paper, we introduce the IEEE 11073 PHD standards for exchange of remote health information and the Bluetooth Health Device Profile(HDP) for health device profile of the Bluetooth technology, also we conducted experiments about exchange health information between health device and smart device which are adapted the IEEE 11073 PHD and Bluetooth HDP. Transmitting/receiving of the IEEE 11073 PHD standard protocol using the Bluetooth HDP profile between health device and smart device can be known by this experiment, and it expect to implement variety of remote medical services through health device supporting these standards in future.

Changes in the environment of electronic finance and its challenges -Focusing on the prospects and implications of changes in electronic finance- (국내 전자금융의 환경 변화와 그 과제 -전자금융의 변화 전망과 시사점을 중심으로-)

  • Kim, Daehyun
    • Journal of Digital Convergence
    • /
    • v.19 no.5
    • /
    • pp.229-239
    • /
    • 2021
  • For this study, we have extensively analyzed the presentation data of the government's financial-related departments and the data of each financial institution and electronic financial institution.. As a result, In Korea's electronic financial environment, real changes such as first) expansion of non-face-to-face finance, second) teleworking in the financial sector, third) abolition of accredited certification, fourth) advanced voice phishing, fifth) openness of the financial industry and diversification of forms, sixth) the'walletless society'. In addition to the above, however, global changes triggered by the Fourth Industrial Revolution spread to the financial security sector, making it difficult to respond to problems such as artificial intelligence/ deep learning/ user analysis/ deepfake technology. As the proportion of electronic finance is increasing socially, it should be studied in the fields of electronic finance and its environment, and crime and criminal investigation.

A study of the status of UAS Certification System and Airworthiness Standards (민간 무인항공기시스템 인증체계 현황 및 관련규정 연구 동향 분석)

  • Ahn, Hyojung;Park, Jonghyuk;Yoo, Seungwoo
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.42 no.10
    • /
    • pp.893-901
    • /
    • 2014
  • UAS and related technology have been mainly developed for military use but, in recent years, various types of civil UAS have been using in a variety of applications. For example, there are multicopters to shoot aerial photography, pesticide spraying unmanned helicopter, and in addition there are radio control (R/C) aircraft to be used for hobbyists. UAV has spread rapidly enough that permitted experts as well as the public can use it but the related safety regulations are not properly equipped. We investigated the status of domestic and international UAS certification system and airworthiness standards. And the trends in research for the development and modification of the certification system were studied in this paper. As a result, most countries have studied to develop the related regulations and especially ICAO has tried to develop RPAS manual, standards and recommended plans and modify the related ICAO annex through the research group, ICAO UASSG. Based on the manual and SARPs, authorities, related organizations and companies have prepared to develop and modify regulations in accordance with the actual situation of each country.

Auto-compatibility Analysis for Ka-band payload of COMS

  • Park, Jae-Woo;Lee, Seong-Pal;Baek, Myung-Jin
    • Journal of Satellite, Information and Communications
    • /
    • v.2 no.2
    • /
    • pp.41-47
    • /
    • 2007
  • The first geostationary satellite made by Korea, COMS, has the three different payload ; Meteorological sensor, Oceanographic sensor and Ka-band communication payload. There are Meteorological & Ocean Data Communication Subsystem(MODCS) and Telemetry, Command and Ranging Subsystem(TC&R) as other RF radiation sources. MODCS transmits and receives Meteo and Ocean measurement data from/to earth using L-band and TC&R using S-band. The Ka-band communication payload will provide high-speed multimedia services and communication services for natural disaster such as prediction, prevention, and recovery services in the government communications network.Ka-band beacon is for the earth antenna pointing and the experiment of rain fading. This paper gives the analysis results about the mutual radiation effect on Ka-band communication payload, Ka-band beacon, MODCS and TC&R. Up/Down link power and coupling factor including the geometrical position and distance of antenna, filter rejection and degradation factor due to the different polarization are considered. The results show MODCS and TC&R are compatible for Ka-band communication payload and Ka-band beacon does not interfere with MODCS and TC&R normal operation.

  • PDF

Efficient Implementation of Pseudorandom Functions for the e-seal Protection Protocol (E-seal 보안 프로토콜을 위한 Pseudorandom Function의 효율적인 구현)

  • Min Jung-Ki;Kang Seok-Hun;Chung Sang-Hwa;Kim Dong-Kyue
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2006.06a
    • /
    • pp.715-718
    • /
    • 2006
  • e-seal은 RFID 기술을 사용하여 원격에서 자동으로 봉인상태를 확인할 수 있는 컨테이너 봉인 장치를 말한다. RFID의 특징상 반도체 칩에 기록된 정보를 제 삼자가 쉽게 판독 및 변조할 수 있다는 취약점이 있는 실정이다. ISO에서는 RFID의 취약점을 보안하기 위한 표준작업(ISO 18185)을 진행 중이다. 이 중, ISO 18185-4는 e-seal에 저장되는 자료나 리더와의 RF통신에서 데이터 보호를 위한 표준이며, 관련된 연구로는 Active-RFID 인증 프로토콜과 ISO 18185-4를 위한 보고서로 제출된 보안 프로토콜 등이 있다. 제안된 e-seal 보안 프로토콜을 적용하기 위해서는 e-seal과 리더 간의 데이터를 암/복호화 키를 Pseudorandom Function(PRF)을 이용하여 마스터 키로부터 MTK(Mutual Transient Key)를 유도하고, MTK를 암/복호화 키로 사용해야 할 필요가 있다. 본 논문에서는 현재 보안 프로토콜에서 사용되고 있는 PRF에 대해 살펴보고, e-seal 환경에서 PRF를 소프트웨어로 구현하였다. 구현 결과 해시 함수를 기반으로 하는 PFR보다 암호화 알고리즘 AES를 기반으로 하는 PRF이 더 좋은 성능을 보였으며, 블록 암호화 알고리즘인 AES-128을 어셈블리어로 구현함으로써 PRF를 최적화하였다.

  • PDF

Group Key Management Method for Secure Device in Smart Home Environment (스마트홈 환경에서의 안전한 디바이스 관리를 위한 그룹키 관리 기법)

  • Ryu, Ho-Seok;Kwak, Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.2
    • /
    • pp.479-487
    • /
    • 2015
  • According to IT development, smart home services is providing remote service, monitoring service and other various services through smart home devices based on network. But, smart home environment exists security threats such as data falsification, illegal authentication and invasion of privacy through a malicious device. Smart home is studying to prevent these security threats, but the studies of smart home environment security are still in early stage of development and the studies of group key management method is lacking in smart home. In this paper, we propose the group key management method for secure device in smart home.

Design and Implementation of a Proxy-based Mobile Grid Services Framework (프록시 기반의 모바일 그리드 서비스 프레임워크 설계 및 구현)

  • Kim, Min-Gyu;Park, Si-Yong;Lee, Bong-Hwan
    • Journal of Internet Computing and Services
    • /
    • v.8 no.3
    • /
    • pp.85-98
    • /
    • 2007
  • In distributed computing paradigm, mobile surrogate systems have not gained wide acceptance because of security concerns that have not been suitably addressed yet. Currently even the widely used Grid middleware, Globus, does not have a host authentication mechanism, which makes it hard to provide high performance Grid computing capabilities to mobile clients. In this paper, a mobile Grid service framework is designed and implemented in order to provide Grid services to mobile host such as PDA. The surrogate host-based system allows mobile hosts to be provided with Grid services while moving. The implemented mobile Grid services system has been applied to mobile healthcare system which utilizes Grid computing for ECG signal processing. The presented system framework can be used as a secure enterprise mobile healthcare system for hospital physicians.

  • PDF

Study For Watermarking Technique In Medical Image (의료영상에서의 워터마킹 기법에 관한 연구)

  • 남기철;박무훈
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.11a
    • /
    • pp.348-351
    • /
    • 2002
  • Recently, the medical imaging field has been digitalized by the development of computer science and digitization of the medical devices. There are needs of the medical imaging database service and long term storage today because of the installation of PACS system following DICOM standards, telemedicine and etc. and ,also, the illegal distortion of the medical information, data authentication and copyright are being happened. In this paper, we propose watermarking technique as a method which can protect private informations and medical imaging from geometric distortion. Because many watermarks for images are sensitive to geometric distortion, we present a algorithm that is insensitive to RST distortion in medical image. we observed the robustness against several of the signal processing and attacks in medical imaging field by embedding watermark after making a region which is insensitive to RST distortion by using FFT and LPM transformation.

  • PDF