• Title/Summary/Keyword: 인증제

Search Result 1,003, Processing Time 0.026 seconds

Limit on transition of energy source for drone : Focusing on regulation and certification (드론 에너지원 전환의 한계 : 규제와 인증을 중심으로)

  • Sang Ik, Han
    • Journal of Digital Policy
    • /
    • v.1 no.2
    • /
    • pp.47-52
    • /
    • 2022
  • The absolute dependence on GPS signals for positioning, unstable flight, and short flight time due to battery limitations are the major problems to extend the practical use of drones in the industry. In particular, the short flight time of about 20 minutes is a big issue to the use of drones, and to overcome this, the liquid hydrogen powered drone is being actively developed. However, the revision of the current regulation and certification system for liquid hydrogen powered drone has not been completed yet, making it difficult to test, certify, and commercialize the hydrogen powered drone, which eventually becomes a problem in pre-occupying the increasing drone market. In this paper, we analyze the development trends of hydrogen powered drone and provide the current issues on regulations and certification systems for hydrogen powered drone.

Secure modified AKE protocol against man-in-the-middle attack (Man-in-the-middle attack에 강한 변형된 AKE 프로토콜)

  • Chang, Sung-Ryul;Cho, Hyun-Ho;Rhee, Kyung-Hyune
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.05c
    • /
    • pp.2085-2088
    • /
    • 2003
  • 인터넷의 발전과 함께 사용자 인증 기술도 발전하였다. 이러한 사용자 인증 기술 중 패스워드 인증기술이 특정 컴퓨터 또는 통신 시스템 서버의 서비스를 요구하는 클라이언트의 신분을 확인하는 기술로 가장 널리 사용되고 있다. 그러나 일반적으로 사용되는 패스워드 인증의 약한 안전성으로 인한 보안 사고는 매년 증가하고 있고, 그 피해 또한 상당하다. 본 논문은 이런 패스워드 인증 방식 중 강한 인증으로 분류되는 AKE 프로토콜에 대해 분석하고, man-in-the-middle attack이 가능하다는 것을 보인 후, 이 취약점을 보완하여 제 3의 신뢰기관을 두지 않고 두 파티간의 상호인증이 가능한 변형된 AKE 프로토콜을 제안한다.

  • PDF

An Authentication Technique by Data Hiding Using Watermarking Technique (워터마킹 기법을 이용한 데이터의 은닉에 의한 인증 기법)

  • Kang, Seok;Aoki, Yoshinao;Kim, Yong-Gi
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.10a
    • /
    • pp.787-789
    • /
    • 2003
  • 네트워크 상에서 특정의 시스템 또는 컴퓨터에 접속하려고 하는 사람이 정당한 사용자인지를 판단, 그 결과에 근거하여 접근을 제어하는 일련의 프로그램 또는 하드웨어 장치들을 인증 시스템이라 하며, 최근에 들어 정보보호 측면에 있어서 그 중요성이 커지고 있다. 본 논문에서는 인증 데이터를 암호화 또는 부호화 시켜서 전송하는 종래의 인증 알고리즘과는 달리, 인증 데이터를 이미지와 같은 제3의 미디어에 은닉시켜서 전송함으로써 인증을 실시하는 새로운 인증 기법을 제안함과 아울러 시뮬레이션 결과를 제시함으로써 제안된 방법의 유효성을 나타내고 있다.

  • PDF

The Study of Parents' Perception on Accreditation System of Public Type Child Care Centers (공공형 어린이집 공인 인증제도에 대한 부모의 인식 연구)

  • Lim, Hye Young;Kim, Hyun Joo
    • Korean Journal of Childcare and Education
    • /
    • v.10 no.5
    • /
    • pp.63-82
    • /
    • 2014
  • This research surveyed parents' perception on the accreditation system of public type child care centers with 202 parents of 7 public type child care centers in K-province. The results were as follows. First, concerning the necessity of the accreditation system of public type child care centers, high necessity was shown. Second, concerning the influence of the accreditation system on child care center selection, positive responses were shown. Third, the concerning level of perception on the accreditation system of public type child care centers, parents had focused on only the tuition of child care centers. The conclusion was that publicity activities are necessary for parents to understand the goal and role of public type child care centers and to have social concern on it through the various media. The parents' opinion of public type child care centers should be surveyed and is reflected on the accreditation system of public type child care centers for increasing the choices on the public type child care centers.

Efficient Authentication of Aggregation Queries for Outsourced Databases (아웃소싱 데이터베이스에서 집계 질의를 위한 효율적인 인증 기법)

  • Shin, Jongmin;Shim, Kyuseok
    • Journal of KIISE
    • /
    • v.44 no.7
    • /
    • pp.703-709
    • /
    • 2017
  • Outsourcing databases is to offload storage and computationally intensive tasks to the third party server. Therefore, data owners can manage big data, and handle queries from clients, without building a costly infrastructure. However, because of the insecurity of network systems, the third-party server may be untrusted, thus the query results from the server may be tampered with. This problem has motivated significant research efforts on authenticating various queries such as range query, kNN query, function query, etc. Although aggregation queries play a key role in analyzing big data, authenticating aggregation queries has not been extensively studied, and the previous works are not efficient for data with high dimension or a large number of distinct values. In this paper, we propose the AMR-tree that is a data structure, applied to authenticate aggregation queries. We also propose an efficient proof construction method and a verification method with the AMR-tree. Furthermore, we validate the performance of the proposed algorithm by conducting various experiments through changing parameters such as the number of distinct values, the number of records, and the dimension of data.

건강과 자연농업-제229호

  • Jeong, Jin-Yeong
    • THE HEALTH and ORGANIC FARMING
    • /
    • no.229
    • /
    • pp.1-12
    • /
    • 2006
  • 한.미 자유무역협상(FTA) 서둘지 말아야/학교급식은 직영해야 한다/우리의 산야초/연속 강우에 따른 과일나무 잎의 갈변에 대하여/벼 멀칭재배의 이론과 기술/소화불량증과 생활습관/아이들건강과 먹을거리 패러다임의 전환/제7회 동아시아 친환경 벼 심포지엄/홍성서,제5회 아시아 오리농법대회/두가지 비료로 유기농작물의 고품질 다수확 생산을 체계적으로 보다 쉽게 하는 방법/충남,친환경농업 육성 '박차'/벼흰잎마름병은 어떤 병인가?/빛을 이용한 해충의 방제/제천 명암 환경농업 작목반/국내외 친환경농축산물의 생산 및 인증실태/남양주시에서 친환경농산물 인증서 수여 및 인증자 교육 실시/해충의 습성을 이용한 퇴치/7월중 새식구 명단/예산당국,내년 유기질비료 예산 '동결' 토양개량제 '감축' 방침/제9회 충남유기농업인대회/충북도지부 월례회의/불량비료 17개 제품 적발/방제비용 절감 '친환경보조제'개발/농진청, '탑프루트' 프로젝트 적용과실 본격출하/유기 및 일반 농산물의 품질 비교에 관한 연구/당도진단

  • PDF

품질 인증 등록, 흑운모 · 녹차유정란 생산현장

  • Jang, Seong-Yeong
    • KOREAN POULTRY JOURNAL
    • /
    • v.38 no.6 s.440
    • /
    • pp.120-123
    • /
    • 2006
  • 선모자연농원(대표 양승덕)은 지난 2006년 3월 10일 우리 시대에 맞는 친환경 생산물을 이용해 무항생제, 항산화제로 소비자에게 깨끗하고 신선한 계란을 공급하고자 3년간의 지속적인 연구 끝에 흑운모와 녹차를 함유한 유정란의 품질인증을 받았고, 현재 특허등록을 위해 출원한 상태이다.(출원번호 40-2006-0012500). 양승덕 사장은 흑운모가 황토와 맥반석보다 약 3배 이상 원적외선 방사율(94%)이 높으며 게르마늄 함유량이 36ppm에 이르는 생명의 돌로서 예전부터 흑운모석을 약돌이라 부른 것에 착안하여 산란계에도 흑운모 분말을 배합한 사료를 급여하였다. 본고는 웰빙시대에 걸 맞는 흑운모, 녹차의 기능과 이를 이용해 국내에서 어렵게 생산한 "흑운모 · 녹차유정란"의 특성을 살려 생산하는 현장을 취재하였다.

  • PDF

Comparison on the Korea New Technology Certification System (한국의 신기술 인증제도 비교)

  • 송학현;최세하;김하식;김윤호
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.7
    • /
    • pp.1363-1368
    • /
    • 2003
  • The subject of the national new Technology certification system is in which domestic enterprise have competition above international market. Rep. of the korea Government Ministry of Information and communication(MIC), Ministry of science and technology(MOST), Ministry of Commerce, Industry and energy(MOCIE), Ministry of Construction and Transportation(MOCT), Ministry of Marin and fishery(MOAf) executive the certification Regulations. These Ministry have the new Technology certification rules each of the scope of the their nam job. These rules same the subject, proposal qualification and the property, but difference certification reference. So, this article suggestions about new Technology certification system.

A Study on Multi_Kerberos Authentication Mechanism based on Certificate (인증서기반의 Multi_Kerberos 인증시스템에 관한 연구)

  • Shin, Kwang-Cheul;Cho, Sung-Je
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.3
    • /
    • pp.57-66
    • /
    • 2006
  • In this paper. proposes Multi_Kerberos certification mechanism that improve certification service of based on PKINIT that made public in IETF CAT Working Group. This paper proposed to a certificate other realm because search position of outside realm through DNS and apply X.509 directory certification system, to get public key from DNS server by chain (CertPath) between realms by certification and key exchange way that provide service between realms applying X.509, DS/DNS of based on PKINIT, in order to provide regional services. This paper proposed mechanism that support efficient certification service about cross realm including key management. the path generation and construction of Certificate using Validation Server, and recovery of Session Key. A Design of Multi_Kerberos system that have effects simplify of certification formality that reduce procedures on communication.

  • PDF

A Study on Public Key Cryptographic Authentication System Providing Key Distribution and Recovery in the Initial Authentication (초기인증에서 키 분배 및 복구를 지원하는 공개키 암호 인증시스템에 관한 연구)

  • Shin Kwang-Cheul;Cho Sung-Je
    • Journal of Internet Computing and Services
    • /
    • v.7 no.3
    • /
    • pp.83-91
    • /
    • 2006
  • In this paper, we improved a cryptography system model based on the secure initial authentication public key with PKINIT of authentication and key recovery protocol. It is applied to all fields of cryptography system using certificate. This study presents two mechanisms to authenticate between member users. The first mechanism is initial authentication and distribution of session key by public key cryptography based on certificate between entity and server, and the second mechanism is a key recovery support protocol considering loss of session key in the secure communication between application servers.

  • PDF