• Title/Summary/Keyword: 인증국

Search Result 181, Processing Time 0.029 seconds

Efficient and Practical Appraoch to Check Certificate Revocation Status of the WLAN Authentication Server's Public Key (WLAN 인증서버의 인증서 폐지상태 확인 기술)

  • Park DongGook;Cho Kyung-Ryong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.5
    • /
    • pp.958-964
    • /
    • 2005
  • WLAN user authentication is mostly based on user password resulting in vulnerability to the notorious 'offline dictionary attack'. As a way around this problem. EAP-TTLS and PEAP protocols are increasing finding their way into WLANs, which are a sort of combination of password protocols and the TLS public-key protocol. This leads to the use of the public-key certificate of the WLAM authentication server, and naturally the concern arises about its revocation status. It seems, however, that any proper soulution has not been provided to address this concern. We propose a very efficent and proper solution to check the certificate revocation status.

국내.외 정보보호관리 모델에 관한 고찰

  • 이강신;김학범;이홍섭
    • Review of KIISC
    • /
    • v.11 no.3
    • /
    • pp.24-37
    • /
    • 2001
  • 정보화의 급진전에 따라 역기능의 문제도 대폭적으로 증가되고 있는 추세 속에서 이를 극복하고정보화의 급진전에 따라 역기능의 문제도 대폭적으로 증가되고 있는 추세 속에서 이를 극복하고자 하는 노력이 국제적으로 활발하게 전개되고 있다. 보다 체계적이고 비용 효과성을 고려하여 미국, 유럽, 호주 등 많은 선진국가에서는 지난 수년동안 정보를 보호하는 기준이나 지침 등을 학계, 산업계, 연구기관, 정부기관과 공동 또는 자체적으로 개발하여 활용하고 있거나 활용 예정에 있다. 국내에서도 이러한 접근 방식의 중요성을 인식하고 정보통신망이용촉진및정보보호등에관한법률을 개정하여 정보보호관리체계에 대한 인증 제도를 2001년 7월 1일부터 시행하기에 이르렀다. 이에 따라 국내에서도 동 법에 근거하여 인증업무를 수행하게 될 한국정보보호센터에서 국내의 현실에 맞는 정보 보호관리기준 마련 작업을 1년여 동안 추진하여 왔으며, 각고의 노력을 기울이고 있는 상태이다. 이에 따라 본 고에서 는 정보보호관리체계에 대한 구체적인 소개와 더불어 각 국에서 노력을 기울이고 있는 정보보호 관리를 위해 마련하여 온 지침과 절차 및 기준 등의 내용을 소개하고, 각각이 가지고 있는 특성들을 프레임워크 수준에서 살펴보기로 하며, 제시하고 있는 통제사항들을 간략하게 비교함으로써 정보보호관리체계의 수립과 인증 제도의 효과성에 대하여 많은 관련자들의 인식을 제고하고자 한다. 그리고, 향후 정보보호관리체계 수립 및 인증제도의 도입과 운용이 활발하게 이루어지고 활성화될 경우를 미리 준 비하기 위하여 정보보호관리를 위한 성숙도의 측정에 대한 연구 방향을 나름대로 제시하고자 한다.

  • PDF

A Direction-Decision RFID System with a Authentication (인증 기능을 갖는 방향 결정 자율이동 RFID 시스템)

  • Park, Chul-Min;Jo, Heung-Kuk;Lee, Hoon-Jae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.6
    • /
    • pp.1032-1038
    • /
    • 2008
  • RFID is applied in various industry area. The purpose of RFID system is authentication of objects. After Tag's certification, RFID system start to process to be wanted. A RFID electric motor recognizes Tag's action and tails. The application of this system is very wide. For example, a cart in shopping Mall follows customer with a proper Tag. Customer may be very convenient if the cart follows customer autonomously as recognizing the direction of Tag. In this parer, we studied about RFID system that follow objects with a Tag. Finally, we experimented and analysed the proposed system, with Tag, Reader, host computer and electric motion motors.

A study on Mutual Authentication of Copyright between Korea-China and Trade Cooperation (한.중 저작권 상호인증과 통상협력과제)

  • Lee, Chan-Do
    • International Commerce and Information Review
    • /
    • v.16 no.1
    • /
    • pp.3-24
    • /
    • 2014
  • When the Korean Wave was sweeping over China, Asia, Other Countries, Some people worried that the ambiguity of the copyright act would obstruct export of the entertainment contents. To solve this problem, the copyright authentication was introduced in the copyright act, enforcement for its, etc. There are two authentication systems at copyright. One is right authentication protected by copyright, Other one is licence authentication received from the owner. This study is meant to seeking the problem of insufficient regulation related to copyright authentication. According to analysis of FGI in this study, the existing system does not support a proper and specific way how to suggest a long term perspective in the transaction of Korean Contents between Korea and China. The key to success of copyright authentication system between Korea and China depends upon the implementation of the system of copyright mutual authentication. To do so, In reality, laws, institutions, technologies, policies, and operations, etc. should be Inter-operability. Also we should realize that this system gives mutual benefits at transaction between the two countries. Thus, it is important for two countries to effort trade cooperation continuously.

  • PDF

A Study on the Certification System for Offline Stores Selling Copyrighted Contents: Copyright OK Case (정품 콘텐츠 판매 오프라인 업체 인증제도 방안 연구: 저작권 OK 사례)

  • Gyoo Gun Lim;Jae Young Choi;Woong Hee Lee
    • Information Systems Review
    • /
    • v.19 no.4
    • /
    • pp.27-42
    • /
    • 2017
  • With the rapid development in network, graphic technology, and digital technology, content industry is emerging as an important industry for new cultural development and economic development. The development in digital content technology has remarkably expanded the generation and distribution of contents, thereby creating new value and extending into a large distribution market. However, the ease of distribution and duplication, which characterizes digital technology, has increased the circulation of illegal contents due to illegal copying, theft, and alteration. The damage caused by this illegal content is severe. Currently, a copyright protection system targeting online sites is available. By contrast, no system has been established for offline companies that sell offline genuine content, which compete with online companies. The demand for content of overseas tourists is increasing due to the Korean wave craze. Nevertheless, many offline content providers have lost competitiveness due to illegal content distribution with online companies. In this study, we analyzed the case and status of similar copyright certification systems in Korea and overseas through previous research and studied a system to certify the offline genuine contents business. In addition to the case analysis, we focused on interviews obtained through in-depth interviews with the copyright stakeholders. We also developed a certification framework by establishing the certification domain, certification direction, and incentive of the certification system for offline businesses with genuine content. Selected certification direction is ethical, open, inward, store, and rigid (post evaluation). This study aimed to increase awareness among consumers about the use of genuine content and establish a transparent trading order in a healthy content market.

생체신호를 이용한 텔레바이오인식기술 동향 및 전망

  • Kim, Jason;Lee, Saewoom
    • Review of KIISC
    • /
    • v.26 no.4
    • /
    • pp.41-46
    • /
    • 2016
  • 전통적으로 바이오인식기술은 출입국심사(전자여권, 승무원 승객 신원확인), 출입통제(도어락, 출입통제 근태관리), 행정(무인민원발급, 전자조달), 사회복지(미아찾기, 복지기금관리), 의료(원격의료, 의료진 환자 신원확인), 정보통신(휴대폰 PC 인터넷 인증), 금융(온라인 뱅킹, ATM 현금인출) 등 다방면에서 폭넓게 보급되어 실생활에서 널리 활용되고 있다. [그림1]은 신체적 특징(Physiological biometrics)과 행동적 특징(Behavioral biometrics)을 이용한 사용자 인증기술인 바이오인식기술의 유형과 함께 각 기술별 보안취약점(괄호 안 빨강색글자)을 나타내고 있다. 최근 들어, 모바일 지급결제서비스 ATM 인출기 인터넷전문은행 등과 같은 핀테크 분야에서 비대면 인증기술로 바이오인식기술이 각광을 받기 시작했다. 한편, 가짜지문 등 기존의 신체적 특징을 이용한 바이오인식기술의 위변조 위협에 대한 우려 존재함에 따라 뇌파 심전도 근전도 맥박 등 살아있는 사람의 행동적(신체의 기능적) 특징을 이용한 생체신호를 이용하여 비대면 인증기술로서 활용하기 위하여 주요 선진국에서 차세대 바이오인식 기술개발이 가속화되고 있는 추세이다.[1] 또한, 이러한 생체신호는 최근에 삼성전자, LG전자, 애플 등에서 스마트워치를 통해 심장박동수를 측정하고 스마트폰을 통하여 모바일 지급결제, 헬스케어 등과 같은 IoT 모바일 융복합 응용서비스에 활용될 전망이다. 본고에서는 뇌파 심전도(심박수)와 같은 생체신호를 측정하는 스마트워치 밴드형 의복형 또는 패치형태의 웨어러블 디바이스와 같은 생체신호센서, 생체신호 인증기술 및 관련표준화 동향을 고찰해 보기로 한다. 국내외 관련기술과 표준화 동향을 면밀히 분석하여 지난 2015년 5월29일에 발족한 국내외 전문가그룹인 KISA"모바일 생체신호 인증기술 표준연구회"(이하 KISA 표준연구회)가 구심점이 되어 한국형 생체신호를 이용한 차세대 텔레바이오인식기술에 대한 연구개발과 국내외 표준화 추진에 박차를 가할 계획이다.

A Basic Study on the Application of Text-Maining Method for Qualitative Evaluation through Barrier Free Certification in School Facilities (학교시설의 장애물 없는 생활환경(Barrier Free) 인증 사례를 통한 정성평가 텍스트마이닝 기법 적용에 관한 기초연구)

  • Yun, Pyeong-Se;Lee, Jong-Kuk
    • The Journal of Sustainable Design and Educational Environment Research
    • /
    • v.19 no.1
    • /
    • pp.25-35
    • /
    • 2020
  • Since the introduction and operation of BF certification, a total of 6,432 certificates has been issued until February 2020, of which educational research facilities make 1,091 cases (754 preliminary certification, 337 main certification) out of 6,237 buildings, acquiring BF certification of about 20%. Qualitative evaluation is conducted with focus on the three items of BF-certified building evaluation index, which are medium facilities, internal facilities, and sanitary facilities, and major keywords are the deducted through the Text Mining analysis of the derived results. As a result, problems with access paths occurred in the case of the facilities, and assessment indicators for users were found to be necessary among the assessment of the steps of the internal facilities. Finally, we could see that sanitation facilities needed to improve toilets installed in residential development facilities. Based on the results obtained, the study seeks to suggest directions for improving the evaluation index required for BF-certified school facilities.

Scheme for Verification Between Mobile Devices in a Service with Expiration Time by Using Zero-knowledge Proof (영지식 증명을 이용한 가입기간이 정해진 서비스에서 이동 통신 기기간 인증 기법)

  • Park, Young-Hoon;Seo, Seung-Woo
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.3
    • /
    • pp.23-32
    • /
    • 2013
  • As the mobile communication technology is developed, the services for communication between the mobile devices are provided, and the amount of usage is increasing tremendously. For the device-to-device communication, the device should be verified if it is a service member. The existing verification schemes include interactions with the third party, while this may cause the problems that the bandwidth is dissipated and the devices which are out of the communication range of the base station cannot communicate with other devices. To solve such problems, we propose a new scheme for verification between mobile devices without interaction of third party. For the proposed scheme, we develop and employ a new zero-knowledge proof protocol, which verifies the device's membership and its expiration time. Furthermore, the scheme guarantees privacy of the mobile device since it checks the encrypted verification message without decrypting, and protects replaying attack since it uses challenge-response method.

A Study on the Analysis of Self-Assessment Form based on Certification of Barrier Free in School Facilities (학교시설의 장애물 없는 생활환경(BF) 인증기준 자체평가서 분석에 관한 연구)

  • Yun, Pyeong-Se;Lee, Jong-Kuk
    • The Journal of Sustainable Design and Educational Environment Research
    • /
    • v.18 no.3
    • /
    • pp.16-27
    • /
    • 2019
  • Based on basic studies on the current status index of BF certification application for school facilities according to the BF certification implementation, this study sought to improve the direction of the different BF certification evaluation indexes for school facilities by investigating and analyzing the status of BF Reservation Certification for elementary schools. A comparative analysis of the status and evaluation indexes of 30 elementary schools in the Gyeongsang region that included indicators of external and internal facilities, sanitary facilities, guidance facilities, and other facilities indicated that school facilities are insufficient to discriminate based on criteria and thus need to be updated for accurate grading. For school facilities that are open for anyone to use, quality improvement should be induced by improving standards and adjusting points for items that earn middle and lower grades.

Analysis and Study of Safety Technical Standards in Domestic Photovoltaic Field (국내 태양광분야 안전성 기술기준 분석 및 연구)

  • Yoon, Yongho
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.6
    • /
    • pp.207-212
    • /
    • 2018
  • The increase in the size and the uptake of PV systems is leading to significant increase in the penetration of PV into local electricity grids. The increased penetration of PV is impacting on grid operation and in particular the voltage within the local grid can be significantly influenced by the various PV systems. The current global situation of environmental pollution, climate change and energy demand urgently requires dramatic political, economic and technical decisions in order to avoid a potential collapse of environmental and social systems. Around the world, electricity remains the vital component of national and international development. The implementation of renewable energy resources can provide solutions to these challenges by stimulating the early implementation of economically viable sustainable energy technologies.