• Title/Summary/Keyword: 융합인증

Search Result 614, Processing Time 0.031 seconds

Design of ClientCA Operation and Mechanism for e-Commerce Certificate Management (전자거래 인증서 관리를 위한 ClientCA 운영 메커니즘 설계)

  • 김점구;나상엽
    • Convergence Security Journal
    • /
    • v.4 no.2
    • /
    • pp.85-90
    • /
    • 2004
  • A certificate is important media for the purpose of offering user-authentication service on PKI system. In the paper we analyzed management implement which could make the efficient use of a certificate. This implement called ClientCA will make efficient use of the service about user-authentication consisting of the basis in the age of information through efficient management and partial use of each certificates. Especially, ClientCA could be used efficiently by grafting a small group of PKI system which is operated with particular purposes.

  • PDF

Design of Grid Network Management System using LDAP Authentication (LDAP 인증을 이용한 그리드 네트워크 관리 시스템의 설계)

  • 노민기;하지아;안성진
    • Convergence Security Journal
    • /
    • v.2 no.2
    • /
    • pp.179-187
    • /
    • 2002
  • Grid is a infrastructure to connect heterogeneous resources that are scattered over areas with high-speed network and to cooperate with each other. To carry out Grid application, first, network resources should be managed, since the network has to be safe and reliable. GMA suggests an effective architecture for monitoring of resources that are scattered over a wide area. In this paper, basing on GMA, Grid network management system based on web for practical and general network management is designed. Grid network management system has to operate and connect various distributed management system. Using LDAP authentication, as one access system, Grid network management system maintain stability.

  • PDF

국내외 모바일 바이오인식 신융합기술 연구사례 분석

  • Kim, Jason
    • Review of KIISC
    • /
    • v.22 no.4
    • /
    • pp.7-13
    • /
    • 2012
  • 전통적으로 바이오인식기술은 출입국심사(전자여권, 승무원 승객 신원확인), 출입통제(도어락, 출입 근태관리), 행정(무인민원발급, 전자조달), 사회복지(미아찾기, 복지기금관리), 의료(원격의료, 의료진 환자 신원확인), 정보통신(휴대폰인증, PC 인터넷 로그인), 금융(온라인 뱅킹, ATM 현금인출) 등 전세계적으로 다방면에서 폭넓게 보급되어 실생활 깊숙이 자리잡게 되었다. 최근 들어서는 2,000만명의 스마트폰 보급이 폭증하고 NFC칩을 이용한 모바일 지급결제서비스가 개시됨에 따라서, 다양한 모바일 응용서비스 출현과 함께 모바일 기기인증 및 모바일 신융합 응용서비스에 대한 보다 강력한 인증수단을 요구하고 있다. 이에 따라, 본 고에서는 스마트폰을 포함한 모바일기기에 적용된 바이오인식 융합기술, 출입국심사에 적용한 모바일 바이오인식기술, 원격진료를 위한 메디컬 바이오인식기술, 지능형 CCTV에 얼굴인식기술 적용 등 국내외 모바일 바이오인식기술 개발동향과 및 표준화 동향을 살펴보고, 향후 모바일 바이오인식 신융합기술 개발 및 국제표준화 추진방향을 모색하고자 한다.

A Proposal of Beacon and Iris Recognition Based Medical Identification System (비콘과 홍채인식 기반의 의료진 신분확인 시스템 제안)

  • Lim, Se-Jin;Kwon, Hyeok-Dong;Seo, Hwa-Jeong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2020.05a
    • /
    • pp.66-68
    • /
    • 2020
  • 최근 대리수술 (무면허의료행위)과 같이 환자의 안전을 위협하는 사건들이 언론에 보도되고 있다. 대리수술 방지를 위한 수술실 감시카메라 장치 도입 등의 대안이 등장하고 있지만, 의료계의 거센 반발로 인해 시행되기에는 현실적인 어려움이 있다. 하지만 대리 수술과 같은 사건이 빈번하 발생함에 따라 의사에 대한 사회적 신뢰도가 추락하고 있다. 본 논문에서는 근거리 무선 통신 장치인 비콘(Beacon)과 생체인식 중 안잔하고 신뢰할 수 있는 홍채인식을 결합한 의료진 신분 확인 시스템을 제안한다. 이 시스템은 홍채인식을 통해 사용자 인증을 수행함으로써 1차적인 신분확인을 하고 비콘을 통해 의료진이 수술실에 있다는 것을 증명한다. 또한 무작위 주기로 홍채인증을 수행하여 의료진이 초기 인증만 수행하고 수술실을 떠나는 경우를 방지함으로써 집도의에 대한 환자의 신뢰를 보장한다.

A Study on Multi-Signature Scheme for Efficient User Authentication in Metaverse (메타버스 환경에서의 효율적인 사용자 인증을 위한 다중 서명 기법 연구)

  • Jae Young Jang;Soo Yong Jeong;Hyun Il Kim;Chang Ho Seo
    • Smart Media Journal
    • /
    • v.12 no.2
    • /
    • pp.27-35
    • /
    • 2023
  • Currently, online user authentication is perform using joint certificates issued by accredited certification authorities and simple certificates issued by private agency. In such a PKI(Public Key Infrastructure) system, various cryptographic technologies are used, and in particular, digital signatures are used as a core technology. The digital signature scheme is equally used in DID(Decentralized Identity), which is attracting attention to replace the existing centralized system. As such, the digital signature-based user authentication used in current online services is also applied in the metaverse, which is attracting attention as the next-generation online world. Metaverse, a compound word of "meta," which means virtual and transcendent, and "universe," means a virtual world that includes the existing online world. Due to various developments of the metaverse, it is expted that new authentication technologies including biometric authentication will be used, but existing authentication technologies are still being used. Therefore, in this study, we study digital signature scheme that can be efficiently used for user authentication in the developing metaverse. In particular, we experimentally analyze the effectiveness of ECDSA, which is currently used as a standard for digital signatures, and Schnorr signatures, which can quickly verify a large amount of signatures.

Smart Phone and Vehicle Authentication Scheme with M2M Device (M2M 기기에서 스마트폰 및 차량 인증 기법)

  • Yeo, Seong-Gwon;Lee, Keun-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.2 no.4
    • /
    • pp.1-7
    • /
    • 2011
  • As the developing of the information technology, M2M market that is using communication between devices is growing rapidly and many companies are involved in M2M business. In this paper, the concept of telematics and vulnerabilities of vehicle network security are discussed. The convergence of vehicle and information technology, the development of mobile communication technology have improved quality of service that provided to user but as a result security threats has diverse. We proposed new business model that be occurred to the participation of mobile carriers in telematics business and we analyzed mobile radio communication network security vulnerabilities. We proposed smart phone and Vehicle authentication scheme with M2M device as a way to solve vulnerabilities.

The Biometric Authentication Scheme Capable of Multilevel Security Control (보안레벨 조절이 가능한 바이오메트릭 인증 기법)

  • Yun, Sunghyun
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.2
    • /
    • pp.9-14
    • /
    • 2017
  • A fingerprint is unique to each person and can be represented as a digital form. As the fingerprint is the part of human body, fingerprint recognition is much more easy to use and secure rather than using password or resident card for user authentication. In addition, as the newly released smart phones have built-in camera and fingerprint sensors, the demand for biometric authentication is increasing rapidly. But, the drawback is that the fingerprint can be counterfeited easily and if it's exposed to the hacker, it cannot be reused. Thus, the original fingerprint template should be transformed for registration and authentication purposes. Existing transformation functions use passcode to transform the original template to the cancelable form. Additional module is needed to input the passcode, so it requires more cost and lowers the usability. In this paper, we propose biometric authentication scheme that is economic and easy to use. The proposed scheme is consisted of cancelable biometric template creation, registration and user authentication protocols, and can control several security levels by configuring the number of fingerprints and scan times. We also analyzed that our scheme is secure against the brute-force attack and the active attacks.

A Study on Safe Authentication Method for Security Communication in RFID Environment (RFID 환경에서 보안 통신을 위한 안전한 인증 방안에 관한 연구)

  • Ko, Hoon;Kim, Bae-Hyun;Kwon, Moon-Taek
    • Convergence Security Journal
    • /
    • v.5 no.3
    • /
    • pp.59-65
    • /
    • 2005
  • Ubiquitous computing environment has a lot of different things as for applying existing security technical. It needs authentication method which is different kinks of confidence level or which satisfies for privacy of user's position. Using range localizes appoint workstation or it uses assumption which is satify environment of client in Kerberos authentication method which is representation of existing authentication method but it needs new security mechanism because it is difficult to offer the condition in ubiquitous computing environment. This paper want to prove the result which is authentication method for user authentication and offering security which are using wireless certificate from experiment in ubiquitous environment. Then I propose method which is offering security and authentication in ubiquitous environment.

  • PDF

A Study on Security Risk according to the activation of Bio-Authentication Technology (바이오 인증 기술의 활성화에 따른 보안 위험성에 관한 연구)

  • Jeon, Jeong Hoon
    • Convergence Security Journal
    • /
    • v.16 no.5
    • /
    • pp.57-63
    • /
    • 2016
  • In recent years, there is growing interest in 'Fin-tech' in the domestic and international financial sector. And a variety of services in such a situation has emerged. To ensure the safety of from hacking attacks, many new technologies have been developed. These leading technology is the Bio-authentication method that you consider applying to the financial sector. Bio authentication is using biometric information. Also it is known that can cope the threat of fabrication and modifying attacks with shared and stored. However, Recently, When you look at hacking incidents of biometric data(560 million cases) in the United States Office of Personnel Management and advent of the fingerprints counterfeit technology, We can be known that should be reconsidered about the safety of bio-certification. Especially, it should be provided with a response measures for the problem of embezzlement that biometric information already been leaked. Thereby In this paper, by investigating biometric technologies and practices applied and of the vulnerability factor in many industries, it expected to be utilized in the prepared threats countermeasures in accordance with the application of the biometric authentication technology in a future.

The necessity of Smart Factory's Standards and Certification System Based on Grounded theory (근거이론에 의한 스마트공장 표준 및 인증제도 도입 필요성)

  • Shin, Jong-Chang;Kim, Kyung-Ihl
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.2
    • /
    • pp.203-208
    • /
    • 2018
  • This study is concerned with the introduction and operation of smart factories. In order to accomplish the purpose of research, we made a standard system of smart factory and investigated the recognition system. This study was conducted as a grounded theory methodology among qualitative research methodologies. The results of the study are the necessity of a tool to appropriately evaluate the new manufacturing process management system and related management activities to achieve the successful introduction of smart factories and the management performance of the organization. In order to successfully implement the Smart Factory Certification System, it is necessary to establish a certification organization system, enact relevant laws and amendments, operate government-led pilot projects, train professional workers, and establish incentive policies.