• Title/Summary/Keyword: 융합인증

Search Result 614, Processing Time 0.036 seconds

The Research on Blockchain-based Secure loT Authentication (블록체인 기반 사물인터넷 인증 연구)

  • Hong, Sunghyuck;Park, Sanghee
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.11
    • /
    • pp.57-62
    • /
    • 2017
  • With various sensors and communications capabilities, the Internet is growing larger as the internet can communicate with the Internet. Given the growing vulnerability of the internet market, the development of security and security is increasing, and the development of the internet is actively evolving and the development of the internet is actively being carried out. In particular, it is required to introduce lightweight and secure authentication schemes, especially those that are difficult to use due to the difficulty of using authentication schemes. Thus, the safety of the secure authentication system of the Internet is becoming very important. Therefore, in this thesis, we propose certification technologies on secure objects to ensure correct, safe communication in the context of the internet context.

Air Certificcation Proposal of Augmented Reality and Virtual Reality Technology (증강현실 및 가상현실 기술의 항공 인증 제안)

  • Choi, Jeong-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.11
    • /
    • pp.285-289
    • /
    • 2021
  • This paper identifies the development trend of aviation software certification regulation and introduces the certification regulation optimized for aviation for the application of augmented reality and virtual reality software to aviation maintenance industry. This regulation is expected to provide stability and reliability of augmented reality and virtual reality software applied to aviation maintenance industry by applying strict certification regulations to augmented reality and virtual reality software applied to aviation maintenance industry.We would like to present certification regulations that take into account problems that are difficult to define previously used DO-178B, and DO-178C.

A Comparative Study on National and International Hospital Accreditation Systems Focusing on Korea, the U.S., and Australia (의료기관인증제도의 국내외 비교 연구 -한국, 미국 및 호주 중심으로-)

  • You, Sun-Ju;Kim, Myo-Gyeong;Kim, Yoo-Mi;Choi, Yun-Kyoung
    • Journal of Convergence for Information Technology
    • /
    • v.7 no.4
    • /
    • pp.27-38
    • /
    • 2017
  • The purpose of this study was to ascertain new policies fo the development of the Korean Hospital Accreditation Program (HAP) by comparing and reviewing the domestic HAP of Korea, the U. S. and Australia as well as the International Accreditation Program of the International Society for Health Care Quality. The results of this study are as follows. First, it is necessary to improve the standards of the HAP such as 'patient and community centered standards' and 'staffing related standards'. Second, it is necessary to strengthen patient safety through the HAP. Third, the linkage among the HAP, clinical indicators and patient experience evaluation should be strengthened. Fourth, the competencies of surveyors should be improved. Fifth, the HAP of small and medium hospitals also needs to be vitalized. Sixth, it is necessary to improve the disclosure of the healthcare quality evaluation results. The findings of this study can be used as a basis to improve the Korean HAP.

Biometric Information and OTP based on Authentication Mechanism using Blockchain (블록체인을 이용한 생체정보와 OTP 기반의 안전한 인증 기법)

  • Mun, Hyung-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.3
    • /
    • pp.85-90
    • /
    • 2018
  • Blockchain technology provides distributed trust structure; with this, we can implement a system that cannot be forged and make Smart Contract possible. With blockchain technology emerging as next generation security technology, there have been studies on authentication and security services that ensure integrity. Although Internet-based services have been going with user authentication with password, the information can be stolen through a client and a network and the server is exposed to hacking. For the reason, we suggest blockchain technology and OTP based authentication mechanism to ensure integrity. In particular, the Two-Factor Authentication is able to ensure secure authentication by combining OTP authentication and biometric authentication without using password. As the suggested authentication applies multiple hash functions and generates transactions to be placed in blocks in order for biometric information not to be identified, it is protected from server attacks by being separate from the server.

A Model for Self-Authentication Based on Decentralized Identifier (탈중앙화 신원증명에 기반한 본인 인증 모델)

  • Kim, Ho-Yoon;Han, Kun-Hee;Shin, Seung-Soo
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.11
    • /
    • pp.66-74
    • /
    • 2021
  • With the development of the Internet, user authentication technology that proves me online is improving. Existing ID methods pose a threat of personal information leakage if the service provider manages personal information and security is weak, and the information subject is to the service provider. In this study, as online identification technology develops, we propose a DID-based self-authentication model to prevent the threat of leakage of personal information from a centralized format and strengthen sovereignty. The proposed model allows users to directly manage personal information and strengthen their sovereignty over information topics through VC issued by the issuing agency. As a research method, a self-authentication model that guarantees security and integrity is presented using a decentralized identifier method based on distributed ledger technology, and the security of the attack method is analyzed. Because it authenticates through DID Auth using public key encryption algorithms, it is safe from sniffing, man in the middle attack, and the proposed model can replace real identity card.

Authentication Algorithm using Random Graphic Code (무작위적인 그래픽 코드를 이용한 인증 알고리즘)

  • Jeong, Pil-Seong;Cho, Yang-Hyun
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.12
    • /
    • pp.63-69
    • /
    • 2019
  • Using a smartphone allows quick and easy authentication and payment. However, smartphone security threats are evolving into a variety of new hacking technologies, and are changing to attacks specific to the mobile environment. Therefore, there is a demand for an authentication method suitable for a mobile environment. In order to solve security weaknesses in knowledge-based authentication, many companies provide two-step authentication services such as OTP(One Time Password) to provide authentication services such as finance, games, and login. Although OTP service is easy to use, it is easy to duplicate random number table and has a disadvantage that can be reused because it is used as valid value within time limit. In this paper, we propose a mechanism that enables users to quickly and easily authenticate with high security using the authentication method that recognizes special characters through smartphone's dedicated application.

Design of the Personalized User Authentication Systems (개인 맞춤형 사용자 인증 시스템 설계)

  • Kim, Seong-Ryeol
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.6
    • /
    • pp.143-148
    • /
    • 2018
  • In this paper, we propose a personalized user authentication system (PUAS) that can be used in multiple stages in user authentication by customizing the password keyword to be used in user authentication. The proposal concept is that the user oneself defines the password keyword to be used in user authentication so as to cope with a passive retransmission attack which reuses the password obtained when the server system is accessed in user authentication. The authentication phase is also designed so that it can be expanded in multiple stages in a single step. Also, it is designed to store user-defined password related information in an arbitrary encrypted place in the system, thereby designing to disable the illegal access of the network. Therefore, even if an intruder accesses the system using the proposed system, it is possible to generate personal authentication information by generating a password keyword through unique personal information possessed only by an individual and not know the place where the generated authentication information is stored, It has a strong security characteristic.

Design of An Authentication System Proper for Hybrid Cloud Computing System (하이브리드 클라우드 컴퓨팅 환경에 적합한 인증시스템 설계)

  • Lee, Geuk;Ji, Jae-Won;Chun, Hyun-Woo;Lee, Kyu-Won
    • Convergence Security Journal
    • /
    • v.11 no.6
    • /
    • pp.31-36
    • /
    • 2011
  • Cloud computing is a system which efficiently utilizes resources. In this paper, we propose 2-factor authentication system combing PKI, ID_PW and location information. The proposed method improve the security of hybrid cloud systems and manage resources more safely.

Design of Secure Internet Phone using Smart Card (스마트카드를 이용한 안전한 인터넷 전화 설계)

  • 박진호;정진욱
    • Convergence Security Journal
    • /
    • v.2 no.1
    • /
    • pp.59-68
    • /
    • 2002
  • The smart card including memory and processor is able to simple process such as privilege unauthorized access and used to Authentication System for security. In this paper, we propose using the smart card in the key exchange phase when secure Internet phones conversation, so certainly guarantee to mutual authentication and secret communication.

  • PDF

Learning Outcomes of Design and Software Convergence Major for Engineering Education Accreditation (공학교육인증을 위한 디자인과 소프트웨어 융합전공의 학습성과)

  • Choi, Ji-Eun;Jin, Sung-Hee
    • Journal of Digital Convergence
    • /
    • v.17 no.5
    • /
    • pp.51-63
    • /
    • 2019
  • In the rapidly changing society since the Fourth Industrial Revolution, the cultivation of convergence talents that can solve complex problems is emerging as an important issue. The purpose of this study is to propose the core competencies required to establish the program learning outcomes of the engineering and education curriculum, which is the accreditation standard of engineering education proposed by ABEEK(Accreditation Board for Engineering Education of Korea). Case study methodology was applied to achieve the purpose of the study. The case of analysis is design and software convergence majors of domestic and foreign universities. The educational objectives and course syllabi were analyzed. As a result of the research, four core competencies to be achieved in the design and software convergence majors were derived in addition to the ten program outcomes presented by ABEEK. New core competencies are convergence ability, creative thinking, entrepreneurship, and design ability. The result of this study is expected to contribute to the development of the evaluation system for the convergence engineering education field.