• Title/Summary/Keyword: 원격 인증

Search Result 287, Processing Time 0.022 seconds

Proxy Server Providing Multi-level Privileges for Network Cameras on the Video Surveillance System (CCTV 대체용 네트워크 카메라의 보안 강화를 위한 다중 접근권한 프락시 서버 구현)

  • Bae, Kwang-Jin;Lee, Kyung-Roul;Yim, Kang-Bin
    • Journal of Internet Computing and Services
    • /
    • v.12 no.2
    • /
    • pp.123-133
    • /
    • 2011
  • This paper introduces security problems on the video surveillance systems where the network cameras are equipped at remote places and isolated from the updated and secure environment and proposes a framework for a proxy server that is delegated to connect to network cameras by providing a secure connections from the clients. The server in the framework is deployed within a secure network, secretes the information for connection to cameras and authenticates the clients. Additionally, it provides a secure video service incorporating multi-level privileges for both images and clients through a encryption key distribution and management facility. Through an implementation of the server and a its deployment, it was proved that In this server implement to multi network camera and we confirm compare direct access to network camera equal video quality of service and it can be protection network camera. We expect that can be secure and integral management about traditional network camera through experimental result.

Design and Implementation of Health Club Management System Using Mobile App (모바일 앱을 이용한 헬스클럽관리 시스템 설계 및 구현)

  • Kim, YunSu;Yoon, KyungBae;Koo, MinJeong
    • Journal of Digital Convergence
    • /
    • v.12 no.11
    • /
    • pp.133-139
    • /
    • 2014
  • This study has designed the system that can manage the amount of exercise required for health management, viewing the health management courses which are currently being operated, register the desire courses and verifying the registered schedules and monthly health performances at a glance by using a mobile application. The advantage of health club management system is automatically transmits the daily exercise information to the server without a separate sensor through a simple QR scanning using a smart phone. Since the overall operating requirements of services and various facilities of health club is transmitted as the data to the remote server through a smart phone, users of various levels including workers, students, housewives, etc can easily access and use the health club management system using the WiFi, LTE, 3G, etc.

Blind Watermarking Using by Multi-wavelet Transform and Binary Image (다중 웨이블릿 변환과 이진영상을 이용한 Blind 워터마킹)

  • Kim, Tae-Ho;Park, Mu-Hun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.413-416
    • /
    • 2005
  • Developement of computer and digitalizing of medical implement are being caused digitalizing of medical image. Medical Images are being managed more by PACS. In this situation comes out many problem about ownership, the right of properity of the medical images and notice wheather the data are modified. Digital watermarking can solve this problem. The proposed schemes have a two weak point that Non-blind method need a original image and Blind method use gaussian watermarking. In this paper, we propose a blind watermarking using binary image in order to easily recognize result of watermark This proposed scheme using wavelet transform and Circular Input method that input in medium-band of frequency domain.

  • PDF

An Extended SNMP Scheme for a Digital Convergence Device with Control Functions (제어 기능을 갖는 디지털 컨버전스 장비를 위한 SNMP 확장에 관한 연구)

  • Heo, Gil;Kim, Eun-Hoe;Choi, Jae-Young
    • The KIPS Transactions:PartA
    • /
    • v.16A no.5
    • /
    • pp.369-380
    • /
    • 2009
  • SNMP (Simple Network Management Protocol) is a standard protocol for management of network devices, and it provides excellent features such as scalability, information management, authentication, encryption, and access control. However, SNMP has a structural weakness to fully support control functions for integrated management of digital convergence devices, and it has a limitation of message length in SNMP communication. In this paper, we present an extended SNMP scheme for integrated management of digital convergence devices with control functions. We modified the SNMP architecture by adding DDS (Device Driver Subsystem) to SNMP engine for controlling different devices and by defining CADM (Control Agent Driver Model), therefore we solved the ambiguity problem between 'set' and 'control' of SNMP. And the extended SNMP made it easy for SNMP applications to use various control functions. The extended SNMP can transport massive high-level information by adding three new SNMP commands which eliminate the limit of message length.

Remote System User Authentication Scheme using Smartcards (스마트카드를 이용한 원격 시스템 사용자 인증 프로토콜)

  • Jeong, Min-Kyoung;Shin, Seung-Soo;Han, Kun-Hee;Oh, Sang-Young
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.3
    • /
    • pp.572-578
    • /
    • 2009
  • Bindu et al. pointed out that Chein et al. scheme is insecure insider attack and man-in-middle attack. And then they proposed new one. In the paper, However, Bindu et al's scheme also have some problems; It is strong masquerading server/user attack and restricted reply attack. Hence we proposed improved scheme. finally, we completely had evaluated the one's security on strong masquerading server/user attack, Insider attack, Restricted attack, Stolen-verifier attack and forward secrecy. In this paper, although proposed scheme includes more operation than Bindu et al. scheme, our scheme overcomes problems of Bindu et al. scheme by the operation that is light as not to influence on modern computing technology.

A Multi-Level Access Control Scheme on Dynamic Multicast Services (동적 멀티캐스트 서비스상의 다단계 접근통제 기법)

  • 신동명;박희운;최용락
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.6
    • /
    • pp.47-58
    • /
    • 2002
  • The access control techniques, which can control unauthorized members to access to multicast service, have not been studied very often while there are a lot of on-going study on secure multicast architecture, multicast key distribution and sender authentication scheme have been studied. Multi level access control scheme in multicast can be used in a remote secure conference or to provide graduated multimedia services to each customers. In fact, multicast network has its own virtual networks according to different security levels. However, Early schemes are not effective when it protects unauthorized access in multi-access network environment. Furthermore this scheme does not provide us with hierarchical access control mechanism. This paper, therefore, proposes hierarchical access control scheme to provide the effectiveness in network layer by security level comparison. And we also suggests hierarchical key distribution scheme for multi level access control in application layer and effective hierarchical key renewal scheme in dynamic multicast environment which is easy to join and leaving the multicast group.

CSfC Network Security Architecture Analysis for the Assurance of Commercial Security Solutions in Defense Area (국방 상용보안제품 도입을 위한 CSfC(Commercial Solutions for Classified Program) 네트워크 보안 아키텍처 분석)

  • Lee, Yong-joon;Park, Se-joon;Park, Yeon-chool
    • Journal of Internet Computing and Services
    • /
    • v.22 no.6
    • /
    • pp.91-97
    • /
    • 2021
  • The United States is responding to evolving cyberattacks through the Commercial Solutions for Classified Program (CSfC). Authorized safety evaluation and certification are being carried out so that US government agencies can quickly introduce civilian commercial security products into the national pavilion. Commercial security products registered in the CSfC process can be used by defense agencies through a rapid approval process. Defense agencies approve commercial security products without duplicate evaluation. Approved security products can reduce the time, cost, and cost of the approval process required to implement the defense information system. In this study, security control for 4 types of network security architecture MSC (Multi-Site Connectivity), MA (Mobile Access), Campus WLAN, and DAR (Data at Rest) proposed by the US National Security Agency (NSA) for introduction to national defense A detailed analysis was performed on the items.

Cloud Security Scheme Based on Blockchain and Zero Trust (블록체인과 제로 트러스트 기반 클라우드 보안 기법)

  • In-Hye Na;Hyeok Kang;Keun-Ho Lee
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.2
    • /
    • pp.55-60
    • /
    • 2023
  • Recently, demand for cloud computing has increased and remote access due to home work and external work has increased. In addition, a new security paradigm is required in the current situation where the need to be vigilant against not only external attacker access but also internal access such as internal employee access to work increases and various attack techniques are sophisticated. As a result, the network security model applying Zero-Trust, which has the core principle of doubting everything and not trusting it, began to attract attention in the security industry. Zero Trust Security monitors all networks, requires authentication in order to be granted access, and increases security by granting minimum access rights to access requesters. In this paper, we explain zero trust and zero trust architecture, and propose a new cloud security system for strengthening access control that overcomes the limitations of existing security systems using zero trust and blockchain and can be used by various companies.

Enhancement of Enterprise Security System Using Zero Trust Security (제로 트러스트 보안을 활용한 기업보안시스템 강화 방안)

  • Lee, Seon-a;Kim, Beom Seok;Lee, Hye in;Park, Won hyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.214-216
    • /
    • 2021
  • It proposes a plan to strengthen the limitations of existing corporate security systems based on Zero-Trust. With the advent of the era of the Fourth Industrial Revolution, the paradigm of security is also changing. As remote work becomes more active due to cloud computing and COVID-19, security issues arising from the changed IT environment are raised. At the same time, in the current situation where attack techniques are becoming intelligent and advanced, companies should further strengthen their current security systems by utilizing zero trust security. Zero-trust security increases security by monitoring all data communications based on the concept of doubting and trusting everything, and allowing strict authentication and minimal access to access requestors. Therefore, this paper introduces a zero trust security solution that strengthens the existing security system and presents the direction and validity that companies should introduce.

  • PDF

Python Package Production for Agricultural Researcher to Use Meteorological Data (농업연구자의 기상자료 활용을 위한 파이썬 패키지 제작)

  • Hyeon Ji Yang;Joo Hyun Park;Mun-Il Ahn;Min Gu Kang;Yong Kyu Han;Eun Woo Park
    • Korean Journal of Agricultural and Forest Meteorology
    • /
    • v.25 no.2
    • /
    • pp.99-107
    • /
    • 2023
  • Recently, the abnormal weather events and crop damages occurred frequently likely due to climate change. The importance of meteorological data in agricultural research is increasing. Researchers can download weather observation data by accessing the websites provided by the KMA (Korea Meteorological Administration) and the RDA (Rural Development Administration). However, there is a disadvantage that multiple inquiry work is required when a large amount of meteorological data needs to be received. It is inefficient for each researcher to store and manage the data needed for research on an independent local computer in order to avoid this work. In addition, even if all the data were downloaded, additional work is required to find and open several files for research. In this study, data collected by the KMA and RDA were uploaded to GitHub, a remote storage service, and a package was created that allows easy access to weather data using Python. Through this, we propose a method to increase the accessibility and usability of meteorological data for agricultural personnel by adopting a method that allows anyone to take data without an additional authentication process.