• Title/Summary/Keyword: 인증절차

Search Result 601, Processing Time 0.025 seconds

Functional Requirements to Develop the Marine Navigation Supporting System for Northern Sea Route (북극해 안전운항 지원시스템 구축을 위한 기능적 요구조건 도출)

  • Hong, Sung Chul;Kim, Sun Hwa;Yang, Chan Su
    • Spatial Information Research
    • /
    • v.22 no.5
    • /
    • pp.19-26
    • /
    • 2014
  • International attention on the Northern Sea Route has been increased as the decreased sea-ice extents in Northern Sea raise the possibility to develop new sea routes and natural resources. However, to protect ships' safety and pristine environments in polar waters, International Maritime Organization(IMO) has been developing the Polar Code to regulate polar shipping. The marine navigation supporting system is essential for ships traveling long distance in the Northern Sea as they are affected by ocean weather and sea-ice. Therefore, to cope with the IMO Polar Code, this research proposes the functional requirements to develop the marine navigation supporting system for the Northern Sea Route. The functional requirements derived from the IMO Polar code consist of arctic voyage risk map, arctic voyage planning and MSI(Marine Safety Information) methods, based on which the navigation supporting system is able to provide dynamic and safe-economical sea route service using the sea-ice observation and prediction technologies. Also, a requirement of the system application is derived to apply the marine navigation supporting system for authorizing ships operating in the Northern Sea. To reflect the proposed system in the Polar Code, continual international exchange and policy proposals are necessary along with the development of sea-ice observation and prediction technologies.

Simple Credit Card Payment Protocols Based on SSL and Passwords (SSL과 패스워드 기반의 신용카드 간편결제 프로토콜)

  • Kim, Seon Beom;Kim, Min Gyu;Park, Jong Hwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.3
    • /
    • pp.563-572
    • /
    • 2016
  • Recently, a plenty of credit card payment protocols have been proposed in Korea. Several features of proposed protocols include: using passwords for user authentication in stead of official certificate for authenticity, and no need to download additional security module via ActiveX into user's devices. In this paper, we suggest two new credit card payment protocols that use both SSL(Security Socket Layer) as a standardized secure transaction protocol and password authentication to perform online shopping and payment. The first one is for the case where online shopping mall is different from PG(Payment Gateway) and can be compared to PayPal-based payment methods, and the second one is for the case where online shopping mall is the same as PG and thus can be compared to Amazon-like methods. Two proposed protocols do not require users to perform any pre-registration process which is separate from an underlying shopping process, instead users can perform both shopping and payment into a single process in a convenient way. Also, users are asked to input a distinct payment password, which increases the level of security in the payment protocols. We believe that two proposed protocols can help readers to better understand the recent payment protocols that are suggested by various vendors, and to analyze the security of their payment protocols.

Experimental Study on the Self-extinguishing Performance of Extruded Polystyrene Insulation for Buildings and Suggestions on Institutional Management (건축용 압출법 단열판(XPS)의 자기소화성에 대한 실험적 연구 및 제도적 관리에 관한 제언)

  • Kang, Jung Ki;Choi, Don Mook
    • Fire Science and Engineering
    • /
    • v.34 no.3
    • /
    • pp.141-149
    • /
    • 2020
  • The Korea Industrial Standards (KS) stipulates methods and test procedures for measuring the horizontal combustibility of cellular plastics exposed to small flames (KS M ISO 9772:2018) and recommendations regarding the magnetic digestion of extruded polystyrene insulation (XPS) for measurement results (KS M 3808:2020). Although products that are certified to conform to KS standards must have burning characteristics (self-extinguishing), they are incinerated and spread by welds at construction sites, causing significant human and property damages. In this study, XPS produced by five companies, certified by KS, and sold in the market were purchased and tested for ignition and diffusion caused by a weld bullion at a construction site. The results showed that the five products had differences in performance. Three out of the five products were found to be self-saturated, but the other two were easily ignited and diffused, making it difficult for them to be self-extinguishing. Based on the result of this experimental investigation in line with the KS regulations, all the three types of products, including two types of products that were incinerated through weld defects, were found to be non-self-extinguishing, as specified in KS M 3808.

A Study of Key Pre-distribution Scheme in Hierarchical Sensor Networks (계층적 클러스터 센서 네트워크의 키 사전 분배 기법에 대한 연구)

  • Choi, Dong-Min;Shin, Jian;Chung, Il-Yong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.1
    • /
    • pp.43-56
    • /
    • 2012
  • Wireless sensor networks consist of numerous small-sized nodes equipped with limited computing power and storage as well as energy-limited disposable batteries. In this networks, nodes are deployed in a large given area and communicate with each other in short distances via wireless links. For energy efficient networks, dynamic clustering protocol is an effective technique to achieve prolonged network lifetime, scalability, and load balancing which are known as important requirements. this technique has a characteristic that sensing data which gathered by many nodes are aggregated by cluster head node. In the case of cluster head node is exposed by attacker, there is no guarantee of safe and stable network. Therefore, for secure communications in such a sensor network, it is important to be able to encrypt the messages transmitted by sensor nodes. Especially, cluster based sensor networks that are designed for energy efficient, strongly recommended suitable key management and authentication methods to guarantee optimal stability. To achieve secured network, we propose a key management scheme which is appropriate for hierarchical sensor networks. Proposed scheme is based on polynomial key pool pre-distribution scheme, and sustain a stable network through key authentication process.

Investigation of Korean Forest Carbon Offset Program : Current Status and Cognition of Program Participants (산림탄소상쇄제도의 사업참여자 인식 및 현황 분석)

  • Sa, Yejin;Woo, Heesung;Kim, Joonsoon
    • Journal of Korean Society of Forest Science
    • /
    • v.111 no.1
    • /
    • pp.165-176
    • /
    • 2022
  • To raise awareness of carbon reduction in climate change, the Korea Forest Service has developed and adopted a forest carbon offset program, which aims to reduce carbon levels based on forest management. However, to maintain the forest carbon offset program, challenges such as the lack of a forest monitoring system to manage and maintain the program, must be faced. In this context, we investigated the limitations of conducting forest carbon offset programs using a number of interview techniques, including in-depth interview and questionnaire survey methods. The questionnaire surveys were developed based on the results of a literature review along with a preinterview and in-depth survey of the people in charge of the forest carbon offset program. The Irving Seidman technique was adopted for the in-depth interviews. Additionally, descriptive and frequency analyses were conducted to identify the characteristics of perception. Lastly, logistic regression was used to identify the limiting factors that affect the willingness to perform forest carbon offset monitoring activity. Results showed that the project managers or people in charge of the forest carbon offset program lacked expertise in forest carbon offset programs, which negatively affected their willingness to perform monitoring activity. Additionally, the study revealed a number of limiting factors that hindered the monitoring of forest carbon offset projects. Improving understanding using the approaches presented in this study may contribute to increasing the benefits associated with the forest carbon offset program in South Korea.

Revisiting the e-Government Maturity Model: Significance, Limitations, and Suggestions (전자정부 성숙도 모델의 재검토: 모델의 의의와 한계, 실증분석을 통한 제언)

  • SUNG, WOOKJOON
    • Informatization Policy
    • /
    • v.30 no.3
    • /
    • pp.3-28
    • /
    • 2023
  • This study aims to analyze the usage behavior of e-government service users based on the e-government maturity model and provide suggestions for advancement of the e-government services. The changes in Korea's e-government services were analyzed as follows; 1) Proportion of use of e-government services in Korean public services, 2) E-government service types/stages use, 3) Service use by platform 4) User response to e-government service 5) Users' requests for future e-government service usage methods. For the analysis, this study used data from Korea's 2012-2020 e-government usage behavior survey data. As a result of the analysis, first, the proportion of e-government service has been continuously increasing, and second, the use of the e-participation stage is relatively low compared to the presenting information, interaction, and transaction stages. Third, by platform, e-government service has been expanded to various access platforms such as mobile, kiosk, and SNS centering on the web. Fourth, users' satisfaction with e-government service is very high. However, to vitalize e-government services, users requested improvements such as providing one-stop integrated services and simplifying authentication procedures. Based on the analysis results, this study 1) reflects the user's point of view in the maturity model of e-government, 2) considers access to various platforms according to the development of digital technology, 3) improves the e-government maturity model through data-based analysis such as user usage behavior suggested the need.

Network Architecture and Fast Vertical Handover Scheme for UMTS-WLAN Interworking (UMTS-WLAN 간 빠른 수직적 핸드오버 제공을 위한 연동망 모델 및 핸드오버 방식)

  • Kim, In-Cheol;Lee, Sung-Kuen;Kim, Eal-Lae;Park, Jin-Woo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.8B
    • /
    • pp.492-501
    • /
    • 2007
  • UMTS-WLAN interworking approach can make the best use of the advantages of both networks by eliminating the stand-alone defects of the two services. For the interworking mechanisms of WLANs and UMTS networks, two major solutions have been proposed, namely loose coupling and tight coupling. The loose coupling approach provides separate data paths for WLAN and UMTS. On the other hand, the tight coupling provides a full integration of the WLAN network and the UMTS core network. The loose coupling has been preferred due to the simplicity and less reconfiguration requirement. However, loose coupling is worse in seamless mobility, QoS provision, and network security. In order to lessen the problems involved in the UMTS-WLAN interworking approaches, we propose a new interworking network architecture and a fast vertical handover scheme by employing Mobility Anchor(MA) for interworking between the two different networks. MA can enable authentication and session initialization before L2 handover of the mobile terminal, so that the seamless and fast vertical handover become possible. Thru analysis and numerical experiments, we proved that the proposed scheme has been validated.

Fingerprint Recognition using Information of Ridge Shape of Minutiae (특징점의 융선형태 정보를 이용한 지문인식)

  • Park Joong-Jo;Lee Kil-Ho
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.6 no.2
    • /
    • pp.67-73
    • /
    • 2005
  • Recently, the social requirement of personal identification techniques has been increasing. Fingerprint recognition is one of the biometries methods that has been widely used for this requirement. This paper proposes the fingerprint matching algorithm that uses the information of the ridge shapes of minutiae. In which, the data of the ridge shape are expressed in one-dimensional discrete-time signals. In our algorithm, we obtain one-dimensional discrete-time signals for ridge at every minutiae from input and registered fingerprints, and find pairs of minutia which have the similar ridge shape by comparing input fingerprint with registered fingerprint, thereafter we find candidates of rotation angle and moving displacement from the pairs of similar minutia, and obtain the final rotation angle and moving displacement value from those candidates set by using clustering method. After that, we align an input fingerprint by using obtained data, and calculate the matching rate by counting the number of corresponded pairs of minutia within the overlapped area of an input and registered fingerprints. As a result of experiment, false rejection rate(FRR) of $18.0\%$ at false acceptance rate(FAR) of $0.79\%$ is achieved.

  • PDF

Effective Perceived Noise Level Prediction for a Propeller driven UAV by using Wind Tunnel Test Data (풍동실험결과를 이용한 프로펠러 무인 항공기의 환경인증소음 예측에 관한 연구)

  • Ryi, Jae-Ha;Rhee, Wook;Choi, Jong-Soo
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.41 no.1
    • /
    • pp.10-16
    • /
    • 2013
  • This paper discussed a procedure for noise certification of Aircraft and predicting the full scale over-flight noise of propeller from acoustic wind tunnel measurement of small scale propeller. Noise Certification Procedures is established from International Civil Aviation Organization(ICAO). The data manipulations are then discussed in extrapolation to simulation flight distance and flight simulation. One of the most important point of flight simulation is adjustments for differences between wind tunnel test conditions and flight test conditions. To simulated the noise level estimation procedure for noise data post-process, simulate procedures from data of the wind tunnel noise measurement and the flight noise measurement by using a 7kg degree UAV. This study confirmed an effectively noise estimation procedures by wind tunnel noise test and flight noise test.

Modeling of Infectious Information Hiding System for Video Contents using the Biological Virus (생물학적 바이러스를 이용한 비디오 콘텐츠의 전염성 정보은닉 시스템 모델링)

  • Jang, Bong-Joo;Lee, Suk-Hwan;Kwon, Ki-Ryong
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.49 no.3
    • /
    • pp.34-45
    • /
    • 2012
  • In this paper, we proposed and modeled a video contents protection system based on the infectious information hiding(IIH) technique as using characteristics of biological viruses. Our proposed IIH System considered the requisite important information for video contents protection as the infectious virus, and suggested a new paradigm about video contents protection that transmitted infectious information from contents(host) or video CODECs(viral vector). Also, we modeled the Pathogen, Mutant and Contagion virus as the infectious information and defined technical tools about verification of infectious information, kernel based IIH, contents based IIH and creation/regeneration of infectious information as main techniques for our IIH system. Finally, through simulations that carried the infectious information by using conventional information hiding algorithms as kernel based and contents based IIH techniques, we verified possibilities of our proposed IIH system.