• Title/Summary/Keyword: 융합인증

Search Result 602, Processing Time 0.026 seconds

A Study on Analysis and Countermeasure of Security threat in NFC (NFC 서비스 보안 위협 분석 및 대응방안 연구)

  • Kim, Hyung-Uk;Kim, Hyung-joo;Kang, Jung-ho;Jun, Moon-seog
    • Journal of Digital Convergence
    • /
    • v.14 no.12
    • /
    • pp.183-191
    • /
    • 2016
  • Most recent trend reveals broader state of provision of NFC service as NFC technology was applied on smartphones which has become core communication tools by providing integrated services such as payment, medical, and personal authentication. Moreover, with integration of original service and NFC technology, new service providers now can handle personal information of original service or can handle other personal information with transition of previous service provider to NFC service provider. Considering current state of security industry along with NFC technology and service, we would like to analyze current stage of security threats and plan the counter strategies to create NFC service structure.

A Study of Security Policy for U-Healthcare Service (U-Healcare 서비스를 위한 보안정책에 관한 연구)

  • Lee, Keun-Ho
    • Journal of Digital Convergence
    • /
    • v.11 no.11
    • /
    • pp.747-751
    • /
    • 2013
  • Researches on U-Healthcare service integrating medical information and IT technologies are actively conducted. U-Healthcare service is the next generation's medical paradigm that ensures conveniences to many users so that the society recognizes the importance and attempts for commercialization through various business model are performed. To form such U-Healthcare service market safely, various policies on the social structure should be established through the standard and the medical law to systemize of the medical information led by the governmen. Especially, the government's security policy to ensure the safety for the government leading visualization of U-Healthcare should be firmly established. Firstly, this paper presents U-healthcare Service and policy guideline. Secondly, it analyzes security threatening factors for the safe U-Healthcare service. By classifying the analyzed security threatening factors based on three major elements of the security, Confidentiality, Integrity and Availability of security policy for each element is proposed.

Convergence Study on Model of Job Design Support Platform Using Big data and AI (빅데이터와 인공지능을 활용한 직업설계 지원 플랫폼 모형에 관한 융합 연구)

  • Noh, Kyoo-Sung;Lee, Joo-Yeoun
    • Journal of Digital Convergence
    • /
    • v.14 no.7
    • /
    • pp.167-174
    • /
    • 2016
  • The university and college turn into the field of job readiness to get a good job and students build a lot of job specification than others and are constantly studying for employment. Then since employment, some people are fortunate to keep the job for lifetime, but for many people work in the workplace did not meet his aptitude with patience and some people move for work several times without perseverance. One of the reasons for job dissatisfaction is that the job does not fit his aptitude. Meantime many organizations conducted the aptitude(Psychology) test. There are limits, however, to find a suitable job. This study was presented as a model of a platform that is a rational and scientific alternative to search course and job. This model is to better understand the individual characteristics using Big data and artificial intelligence, offers several jobs to meet the characteristics among the various professions selectively and supports to select and design an appropriate job based on the field experience, consulting and mentoring.

방송통신사업자의 스마트미디어 전략에 대한 탐색적 연구: HTML5, 클라우드 컴퓨팅 등의 기술적 배경을 근간으로

  • Song, Min-Jeong
    • Broadcasting and Media Magazine
    • /
    • v.18 no.1
    • /
    • pp.89-104
    • /
    • 2013
  • 다양한 스마트기기 간 및 앱(Application) 간 연동을 통한 스마트미디어 생태계 환경에서 애플(Apple), 구글(Google), 마이크로소프트(Microsoft) 등 SW(Software) 기반 OS(Operating System) 플랫폼들은 개별 체제 강화를 더욱 견고히 하고 있다. 생태계 내 타(他) 구성원들은 이들에 의한 제약이 더욱 심해지자, 웹 문서의 표준화(HTML5)나 클라우드 컴퓨팅(Cloud computing) 같은 개방화된 기술들을 환영한다. 실제로 최근 웹 애플리케이션(Web application) 개발과 개발자들의 OS 플랫폼 이탈은 이러한 변화의 단면을 보여주기 시작했다. 본 고는 SW 중심에서 서비스 중심으로 이동 중인 플랫폼 경쟁 환경에서 네트워크를 보유 중인 방송통신사업자들의 새로운 스마트미디어 전략 방향을 제시하는데 그 목적을 둔다. 이를 위해 두 가지 기술적 배경인 HTML5와 클라우드 컴퓨팅 기술들을 살펴본 후, 그 동안 SW 중심 플랫폼 경쟁 환경에서 주도권을 빼앗겼다고 깨달은 방송통신사업자가 취해야 할, 두 가지 새로운 기술적 환경에서의 스마트미디어 전략을 제시하였다. 분석 결과, HTML5가 모바일 분야의 핵심 기술이 될 전망이지만, 단기적으로는 여전히 미성숙 문제가 제기될 것으로 보이며, 기존 경쟁력을 유지하려는 OS 사업자들의 가치사슬 통합 전략이 가시화되고 있는 환경이 목격된다. 또한, 클라우드 서비스 제공도 이미 이들 OS사업자들의 기존 생태계 유지를 위한 핵심 툴로 이미 활용되기 시작했다. 그럼에도 불구하고 HTML5와 클라우드 컴퓨팅은 방송통신사업자들에게 생태계 주도권을 탈환할 수 있는 중요한 기술로 인식되고 있다. 따라서 본 연구에서는 이를 기반으로 세 가지 이용자 경험인 '경계 없는', '동질적인', '끊김 없는' 이용자 경험(User Experience) 제공을 위해 노력하는 선도적인 사례 탐색이 시도되었으며, 이를 통해 방송통신사업자들의 미래 스마트미디어 전략 방향이 도출되었다. '경계 없는' 서비스에서는 구글, 애플 외의 멀티OS 전략과 기존 OS의 앱 서비스 대항마인 아마존(Amazon), 페이스북(Facebook) 등과의 적극적 서비스 제휴, '동질적인' 서비스에서는 클라우드 기반 주요 콘텐츠 플랫폼 제휴와 방송통신 가입자 기반의 All-IP기반으로의 확대, 마지막으로 '끊김 없는' 서비스에서는 SNS, LBS, 가상현실 등과의 매쉬업(Mash-up)과 의료, 금융 등과의 융합서비스 개발을 통한 스마트홈 전략 추진, 인증 및 결제시스템의 개방화 등이 제시되었다.

A Study on Group Key Generation and Exchange using Hash Collision in M2M Communication Environment (M2M 통신 환경에서 해시 충돌을 이용한 그룹키 생성 및 교환 기법 연구)

  • Song, Jun-Ho;Kim, Sung-Soo;Jun, Moon-Seog
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.5
    • /
    • pp.9-17
    • /
    • 2019
  • As the IoT environment becomes more popular, the safety of the M2M environment, which establishes the communication environment between objects and objects without human intervention, becomes important. Due to the nature of the wireless communication environment, there is a possibility of exposure to security threats in various aspects such as data exposure, falsification, tampering, deletion and privacy, and secure communication security technology is considered as an important requirement. In this paper, we propose a new method for group key generation and exchange using trap hash collision hash in existing 'M2M communication environment' using hash collision, And a mechanism for confirming the authentication of the device and the gateway after the group key is generated. The proposed method has attack resistance such as spoofing attack, meson attack, and retransmission attack in the group communication section by using the specificity of the collision message and collision hash, and is a technique for proving safety against vulnerability of hash collision.

The Improvement Plan of the Individual Information Protection of the Law on the Development of Cloud Computing and User Protection (클라우드 컴퓨팅 발전 및 이용자 보호에 관한 법률상 개인정보 보호에 대한 개선방안)

  • Lee, Hie-Houn
    • The Journal of the Convergence on Culture Technology
    • /
    • v.5 no.1
    • /
    • pp.219-225
    • /
    • 2019
  • Today, in the era of the 4th Industrial Revolution, the cloud computing sector has advantages for cost reduction and efficiency of work, but problems related to privacy may arise. Therefore, the law on the development of cloud computing and user protection should be improved to enable providers of cloud computing services to proactively identify whether or not they contain their personal information, or to take steps to protect their privacy. And this same law is desirable to improve the implementation of a national mandatory certification system for privacy protection systems for cloud computing businesses. This same law is also desirable that cloud computing service providers create direct accountability for privacy breaches and appropriate scope for those responsibilities.

Anomaly Detection System of Smart Farm ICT Device (스마트팜 ICT기기의 이상탐지 시스템)

  • Choi, Hwi-Min;Kim, Joo-Man
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.2
    • /
    • pp.169-174
    • /
    • 2019
  • This paper propose a system to notify the user that detects failure of malfunction of smart farm ICT devices. As the fourth industrial revolution approaches, agriculture is also fused with ICT technology to improve competitiveness. Smart farming market is rapidly growing every year, but there is still a lack of standardization and certification systems. Especially, smart farm devices that are widely used in Korea are different in product specifications, software and hardware are developed separately, and quality and compatibility are poor. Therefore, a system that can recognize the abnormality of the equipment due to the frequent damage of farmers using low cost smart farm equipment is needed. In this paper, we review smart farm domestic and overseas policy trends and domestic smart agriculture trends, analyze smart farm failure or malfunctions and proactively prevent them, and propose a system to inform users when problems occur.

Implications and Roles of Blockchain for Smart City (스마트도시에서 블록체인이 갖는 함의와 그 역할)

  • Cho, Jaewoo
    • Journal of the Korean Regional Science Association
    • /
    • v.37 no.2
    • /
    • pp.35-48
    • /
    • 2021
  • Modern cities are changing to 'smart cities' dramatically with the introduction and development of the fourth industrial revolution technologies. Among these technologies blockchain is unique because it not only embraces technological innovation but also societal revolution. Therefore, blockchain is expected to play a pivotal role for contributing comprehensive development of smart city. The current research and policy atmosphere in Korea, however, is that blockchain is just a new technology and its broader impacts are overlooked. This study argues that blockchain has significant effects on smart cities not only from technological perspectives but also from social, economic, institutional, governmental perspectives. Further, this study suggests three categories that blockchain can help the development of smart city: technology, socio-economic, and governance, with examples of existing blockchin projects. However, these projects have been builting separately without any interaction under the common hood of 'smart city'. To emhance influences of blockchain on smart cities in positive ways, private companies, policy maker, and citizend are supposed to consider and discuss about publi sector's blockchain that is commonly used in at the smart city level.

Experience of middle-aged female workers participating in cardio-cerebrovascular disease prevention management programs using mobile app (중년 여성 근로자의 모바일 앱을 활용한 심뇌혈관질환 예방관리 프로그램 참여 경험)

  • Yang, Hye Kyung
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.3
    • /
    • pp.105-113
    • /
    • 2021
  • This study is a qualitative study that conducted one-on-one in-depth interviews and focus group interviews to understand the meaning of the experience of participating in a cardio-cerebrovascular disease prevention management program using a mobile app for middle-aged female workers. The subjects of this study were 26 female workers over 50 years of age who participated in a cardio-cerebrovascular disease prevention program using a mobile app in a department store. Participating experience derived from the research result were 'Pleasure of getting to know', 'Activation of mutually friendly relations', 'health concerns take care of me ', 'Accepting an unfamiliar culture', 'Convenience as if receiving counseling anywhere. Through these results, it was shown that the mobile app improves the will to practice health behavior, and it is suggested that a standard to guarantee that the mobile app is a safe program is necessary to reduce anxiety about unfamiliar programs when installing the mobile app.

The Improvement of Information Protection Service Cost Model in Public Institution (공공기관 정보보호서비스 대가 모델의 개선 방안)

  • Oh, Sangik;Park, Namje
    • The Journal of Korean Institute of Information Technology
    • /
    • v.17 no.7
    • /
    • pp.123-131
    • /
    • 2019
  • In this paper, related studies were investigated by dividing them into cost-benefit analysis, security continuity services, and SW-centric calculations. The case analysis was conducted on A institutions in the United States, Japan and South Korea. Based on this, an improvement model was prepared through comparison with the current system. The SCS(Security Continuity Service) performance evaluation system-based information protection service cost calculation model is proposed. This method applies a service level agreement(SLA) and NIST Cybersecurity framework that are highly effective through cost-effectiveness analysis and calculates consideration based on characteristics, performance criteria, and weights by information protection service. This model can be used as a tool to objectively calculate the cost of information protection services at public institutions. It is also expected that this system can be established by strengthening the current recommended statutory level to the enforceability level, improving the evaluation system of state agencies and public institutions, introducing a verification system of information protection services by national certification bodies, and expanding its scope to all systems.