• Title/Summary/Keyword: 인증절차

Search Result 600, Processing Time 0.028 seconds

A Proposal for Certificate Status Validation Using the Call Processing of PCS (PCS의 호처리를 이용한 인증서 상태검증 모델 제안)

  • Lee Young-Sook;Won Dong-Ho;Lee Young-Gyo
    • The Journal of the Korea Contents Association
    • /
    • v.5 no.1
    • /
    • pp.45-53
    • /
    • 2005
  • With the rapid progress of research to offer a convenience of mobile communication, the mobile users can use not only the services of voice call but also the variety services of data communication using Internet. These include Internet Searching, Internet Shopping and Internet banking and Internet stock exchange and electronic payment and so on, based on PKI. Also, the need of data communication between the mobile users has been increased. As it is possible for mobile users to do user authentication, key distribution, encryption, decryption and so on, it is needed the certificate status validation between the mobile users. However due to the PCS(Personal Communication System) had been only designed and implemented for voice call between the mobile users, it is not easy to apply data communication between the mobile users on PKI. Therefore the study of for the data communication between the mobile users in PCS is a few. It is for the data transfer between the mobile users to communicate using call processing of PCS. So, we propose how to process the certificate status validation during call processing for data communication between the mobile users in the PCS.

  • PDF

Development of Information Sharing and Management System for Closed User Group (폐쇄 사용자 그룹을 위한 정보공유 관리 시스템의 개발)

  • Huh, Mi-Young;Hyun, Wook;Kang, Shin-Gak
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2000.10a
    • /
    • pp.324-327
    • /
    • 2000
  • There are developing the World Wide Web systems for their information sharing among certain closed user group. These systems are required five common functions as follows. First, they have to support the web service for Internet users to access easily. Second, Hey have to support the authorization service to confirm the allowed users. Third, they have to support the database service to manage the sharing information among users. Fourth, they have to support the bulletin board service for closed users to discuss. Fifth, they have to support the e-mail service to send e-mail to the certain user subset and mail archive service to save and manage the previous mail information. In this paper, we described the detail function and processing procedure of our implemente system under LINUX operating system. In addition, we described problems occurring in implementation and their solutions.

  • PDF

Estimation of the Effectiveness of Basic Engineering Design Education Through Student Survey (학생 설문을 통한 기초설계 교육효과 평가)

  • Won, Yun-jae
    • Journal of Practical Engineering Education
    • /
    • v.11 no.2
    • /
    • pp.159-165
    • /
    • 2019
  • Engineering design education has been established and implemented as three stages of basic design, element design, and capstone design with the introduction of engineering education accreditation system. In the basic design, the concept and procedure of design is introduced to the beginners of engineering, and the creativity and teamwork is practiced rather than mathematical detailed design for the purpose of being connected to and used effectively in the capstone design. In this study, the opinions of the students performing capstone design after taking basic design were surveyed through questionnaire. Overall, students recognize the importance of basic design education and experienced that it is useful. The results indicate that effective basic engineering design education is being carried out, and are considerably agree to those at the professors in the former survey.

3S: Scalable, Secure and Seamless Inter-Domain Mobility Management Scheme in Proxy Mobile IPv6 Networks (프록시 모바일 IPv6 네트워크에서 3S를 고려한 도메인간 이동성관리 기법)

  • Kang, Min;Jeong, Jong-Pil
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.3
    • /
    • pp.99-114
    • /
    • 2012
  • Proxy Mobile IPv6 (PMIPv6) has received considerable attention between telecommunications and the Internet communities and does not require active participation of the Mobile Node (MN) by way of network-based mobility management. The PMIPv6 domain is studying establishment in progress to support extensively a number of MN by using a low handover latency. In this research, we are propose a novel 3S scheme for building Scalable and Secure and Seamless PMIPv6 domains. In the proposed scheme, all of Mobility Access Gateway (MAG) are acting as the Local Mobility Anchor (LMA) and composing a virtual ring with another MAG. General hashing is used in the efficient distribution-mapping between each MN and the MN's LMA of all MAGs. And, MAG and MN are authenticated using the symmetric key. Through mathematical analysis, we verifies the safety, scalability, and seamless service for 3S. Also, we're propose a handover procedure of 3S and show better than the existing schemes in terms of handover latency.

Captive Flight Test POD System Design for Effective Development in Weapon System (무기체계의 효과적인 개발을 위한 항공탑재시험용 POD 시스템 설계)

  • Park, JungSoo
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.6
    • /
    • pp.25-31
    • /
    • 2018
  • Captive Flight Test (CFT) is one of the most important tests to acquire data when developing complex weapon systems. In this paper, we introduce the design and test result of our POD system for CFT. POD system uses POD set which consists of left and right POD. The exterior and mass properties of POD set are equal to those of fuel tank for aircraft so that we can omit Airworthiness Certification. Also, we adequately placed inner-equipments in order to acquire data including target image, navigation result and reference data to verify and analyse software algorithm. The POD system for CFT we developed is complex system as both mechanical and electronic factors are applied. As we repeatedly performed CFT, useful and various data for weapon development were acquired.

A Study to develop an ecological audit program in elementary schools for sustainability education (지속가능성 교육을 위한 초등학교 생태감사 프로그램 개발 방안)

  • Kim, Hee-jin;Nam, Young Sook
    • The Journal of Sustainable Design and Educational Environment Research
    • /
    • v.19 no.3
    • /
    • pp.26-37
    • /
    • 2020
  • The purpose of this study is to prepare a plan for the development of an ecological audit program that can be applied to the elementary school curriculum for sustainability education. School ecological audits enable students or groups of students to identify and solve the school's environmental problems on their own, thereby fostering sustainable decision-making and attitudes. As a result of the study through literature research, an ecological audit project learning program applicable to the elementary school curriculum was developed. The developed program is aimed at 6th graders and is composed of 16 steps reflecting the procedural and ecological processes of the ecological audit. In order to settle the developed program in the school site and improve the school sustainability of the developed program, it is necessary to introduce a school environment management system that can periodically monitor the school environment, strengthen the capacity of school teachers, and provide a professional certification system outside the school. In addition, with this bottom-up policy-making system, students can expect to spread a sustainable school culture through environmental education activities.

Validity Assessment of Ed-Program & License for Internet IR Specialist (지식산업 전문인력 정책개발을 위한 정보검색사 교육과 자격 시험제 타당성 분석)

  • 유사라
    • Journal of the Korean Society for information Management
    • /
    • v.18 no.2
    • /
    • pp.77-104
    • /
    • 2001
  • Searching and retrieving information on the Web that define the core-function of Internet IR specialists is one of the activities that practitioners and searchers of LIS fields do exceptionally yell. Various education programs and license examinations for Internet IR specialists have been carried out by many organizations, without consistent monitoring or objective evaluation of those validity and functionality, which community of information professionals requires. This study focused on investigating the current practice of the education and license exam, and identifying problems that hinder the validity of those programs, and alerting the professionals to enhance and expand serious cooperation to keep up with the evolving interests of Internet IR specialists as a great challenge we all(partners, researchers, and policy-makers in government) face.

  • PDF

Satisfaction Level of Construction Quality Management by Survey of The Field Staffs (현장 실무자 대상 조사에 의한 건설공사 품질관리 관련 만족도에 관한 고찰)

  • Park, Hyeong-Geun
    • Korean Journal of Construction Engineering and Management
    • /
    • v.10 no.2
    • /
    • pp.34-45
    • /
    • 2009
  • In domestic, the Quality Management system of construction work has been compounded of the association of regulation which is ground for relevant law and operation of Quality Management system by ISO/KS A 9001(QMS) established by the contractor. Two quality guaranteed systems must be operated with complementary and integrated system, but we can not make full use of QMS of contractor and only run routinized quality management system in all construction project by the standard, methods, process provided in the law. These problems were demanded better condition in the past ten years, since the ISO standards have been introduced. Establishing preventive consideration of quality management by setting a goal of drastic quality guarantee is an urgent problem of construction industry. This study is quick to fellow, which should do three things. 1. The attitude survey related quality management of staff in charge in construction site has run. 2. Base on these results, we adjust satisfaction measurement about operation of construction quality management system. 3. Subsequently, we want to offer our thesis about advanced opinion for the next.

Problems of certificate status validation methods using hash chain and their countermeasure (해쉬체인을 이용한 인증서 상태 검증 방법들의 문제점과 해결 방법)

  • Kang, Hyun-Joong;Ahn, Jeong-Hee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.1
    • /
    • pp.161-167
    • /
    • 2008
  • As the authentication and the integrity methods based on the hash chain are popular, several certificate status validation methods based on the same function are proposd at the moment. In NOVOMODO, a CA generates and releases the hash value to each user. In Jianying Zhou's framework and Jong-Phil Yang's framework, a user generates and releases the hash value to verifier. Therefore, the CA loads are distributed to each user. However, these frameworks are based on the assumption that the CA's secret key is not lost or compromised and the certificates issued by the CA are error-free. Therefore, these frameworks are not suitable in real PKI environments. In this paper, as one hash value generated by CA is included in the user's certificate in addition, the certificate revocation published by CA using that value can be managed. The hash value included in user's certificate is the same for all users. The computation costs, the storage amounts and the release costs are small in the CA. And we modify the procedure for the signature and its validation in Jong-Phil Yang's framework. Our solution is more suitable than those frameworks in real PKI environments.

  • PDF

A Study on the Analysis of Consultation Needs of SMEs through Big-Data (빅데이터 분석을 활용한 중소기업의 상담요구 분석)

  • Lee, Bong-Cheol;You, Yen-Yoo
    • Journal of Digital Convergence
    • /
    • v.16 no.7
    • /
    • pp.27-34
    • /
    • 2018
  • This study was conducted to identify the contents of major consulting needs of SMEs using Big Data and to suggest the efficiency of operation. The subjects of the study were counseling cases posted on the website of the Business Support Center of the Ministry of SMEs and Startups. To do this, from 2009 to March 2018, we crawled about 7,000 cases of counseling cases, followed by word cloud analysis centering on effective keyword. The main results were as follows: First, the frequency of counseling cases in each field was found in the order of establishment, management strategy, human resources, financial order. Second, in word cloud analysis, the most frequent keyword related to counseling demand were small businesses, exports, methods, procedures, registration and authentication. In this study, we obtained research results that we can improve the efficiency of the policy in real time from a new point of view by conducting big data analysis on public policy.