• Title/Summary/Keyword: 인증효과

Search Result 573, Processing Time 0.022 seconds

User Pre-Authentication Method for Support of Fast Mobility in IEEE 802.11 Wireless LAN (IEEE 802.11 무선랜에서 고속 이동성 지원을 위한 사용자 사전 인증 기법)

  • Kwon, Jung-Ho;Park, Jong-Tae
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.44 no.10
    • /
    • pp.191-200
    • /
    • 2007
  • As the IEEE 802.11 WLAN has widely installed as a high-speed wireless network information infrastructure, there has been growing interest in both security and mobility of mobile terminals. However, for the case of mobile terminal employing IEEE 802.11i security standard, it is known that the user authentication procedure of IEEE 802.1x for stronger security enforcement may, due to its large delay, not be suitable for real-time multimedia communication. In this paper, we have proposed fast authentication method to resolve the above authentication delay problem, and verifies its performance via simulation analysis. Mobile terminals can get AP information reliably, and selectively execute authentication in advance during handover, which results in fast user authentication. In addition, by effectively managing the authentication information in mobile terminal, which are distributed in advance for pre-authentication, the problem of long-time revelation of authentication information has been solved.

A Study on Authentication Technique based on OSGi Service Platform (OSGi 서비스 플랫폼 기반의 인증 기법에 관한 연구)

  • I, Chang-Uk;Hong, Won-Gi;Chang, Hoon
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.36 no.5
    • /
    • pp.387-395
    • /
    • 2009
  • The establishment of security architecture is essential because security vulnerabilities occur such as user's unjustifiable connection for the opened gateway and access to resources without permission in OSGi service platform environment. In this paper, it proposes a authentication technique for an Automatic user authentication which is used the Symmetric Key and the Service bundle authentication to consider the constraints of the hardware in the OSGi service platform environment. Typically, the type of entering a password is used for the user authentication mechanism however OSGi platform environment studies not entering the password but using MAC address and encrypted identifier of the automatic user authentication mechanism because the devices are limited in their input. In this paper, the Symmetric Key is used for bundle authentication mechanism. Therefore operation becomes quick and secure authentication process has been successfully completed by using the time data and a ticket which contains a license. Based on these two different authentication mechanisms, it could eliminate the constraints of resources and improve the convenience of users and administrators. Also it shows an effect from omitting the waiting time to enter a password and reducing operations which need for authentication in the OSGi service platform environment.

A study on the recognition of medical institution workers and the development of the certification system after electronic medical record certification (전자의무기록 인증 후 의료기관 종사자 인식과 인증제 발전을 위한 연구)

  • Cho-Yeal Park
    • Journal of the Health Care and Life Science
    • /
    • v.11 no.2
    • /
    • pp.173-180
    • /
    • 2023
  • In this study, senior general hospital, general hospital medical institutions certified by the Electronic Medical Record System Management Portal in 2021 were surveyed on the recognition of changes in medical information management and EMR system functionality. Through verification, it was implemented to promote future development of the certification system and long-term development of the electronic mandatory record certification system. A total of 1,189 respondents were used for final analysis using structured questionnaires, and in particular, differences in recognition of certification systems and system functionality after EMR certification were verified by conducting average analysis and ANOVA. As a result of analysis, the electronic mandatory record certification system was confirmed to affect positive work changes and perceptions on medical institution workers, and after certification of the electronic mandatory record system, it showed operational effects in many ways. Based on the results of this study in the future, communication follow-up research is needed.

User Authentication Scheme for WiFi Access in a WiBro-based BWAN through Nomadic Access Relay Station (와이브로 기반의 광대역 무선 액세스 망에서 WiFi 액세스 사용자 인증 방안 설계 및 분석)

  • Lee, Yong;Lee, Goo-Yeon
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.45 no.11
    • /
    • pp.37-44
    • /
    • 2008
  • Recently, there have been intensive researches on the wireless Internet access through WiFi WLAN using WiBro network as backhaul link in the Internet service providing business area. However, in the wireless Internet access method, we need to solve the compatibility problem for different user authentications between licensed WiBro network and unlicensed WiFi network for billing and user management. In this paper, we propose an authentication method for WiFi users by BWAN operators through WiNNERs which is RS connecting the two networks, and discuss the effectiveness of the method.

Student Achievements Validation & Interactive Outcomes Rating System: ${\copyright}SAVIORS$ (공학교육인증을 위한 학사지원시스템의 개발과 적용 : ${\copyright}SAVIORS$)

  • Yu In-Keun
    • Journal of Engineering Education Research
    • /
    • v.8 no.3
    • /
    • pp.17-25
    • /
    • 2005
  • Changwon National University has been developing and using a computerized supporting system named SAVIORS for ABEEK(Accreditation Board for Engineering Education of Korea) related tasks since the year of 2001. The main purpose of the development of SAVIORS is to totally computerize all tasks related to ABTEK so that faculty staff may perform their job as readily and efficiently as possible. In this paper, detailed functions and utilization records of the SAVIORS are introduced for sharing the advantages of the system with other institutes.

Hash Function-based Secure Authentication Protocol for Improving Efficiency in RFID System (효율성을 고려한 해시 함수 기반의 안전한 RFID 인증 프로토콜)

  • Kim, Ik-Su
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.4B
    • /
    • pp.428-434
    • /
    • 2009
  • Many RFID authentication protocols have been proposed to build a secure ubiquitous environment. However, existing protocols do not respond recent attacks appropriately and they perform many hash operations to authenticate a large number of tags. In this paper, we propose a hash function-based secure authentication protocol for improving efficiency in RFID system. The proposed protocol is safe to passive attacks and active attacks, and requires only 2 hash operations in a tag and 3 hash operations in a database. Accordingly, the proposed protocol is very effective in RFID system environment which is composed to low-cost tags and a database handling many tags.

The Effect of Preferential Purchase Policy for Technologically Developed Products on Growth of SMEs (기술개발제품 우선구매 제도가 중소기업의 성장에 미치는 영향)

  • Young-Jin Kim;Yong-Seok Cho;Woo-Hyoung Kim
    • Korea Trade Review
    • /
    • v.48 no.3
    • /
    • pp.43-68
    • /
    • 2023
  • In this study, in relation to "Chapter 3 Support for Priority Purchase of Technology Development Products" of the 「Market Channel Support Act」, this study investigated the positive growth impact of technology development products subject to preferential purchase on small and medium sized enterprises. The data used for empirical verification is for 371 companies that obtained certification for technology development products subject to preferential purchase in 2016 and Data from SMEs were collected from 2017 to 2021, Sales, operating profit, and net profit was identified, and empirical verification. And conducted through statistical analysis to determine whether it had a positive effect on the growth factors of SMEs. In addition, data from 225 technology development product certification companies were collected, and empirical testing was conducted through t-test analysis on the change in growth factors before and after acquiring certification. As a result of statistical analysis, it was found that the total assets, certified sales, operating profit, and net profit, which are the growth factors of a company, are all positively affected according to the type of technology development product certification. However, in the case of authentication types, some authentications showed significant negative results. In addition, significant results were derived that after acquiring certification had a positive effect on growth factors than before acquiring certification. Consistent with this conclusion, I think that it is effective for technology development-based SMEs to enter the public procurement market and utilize the technology development product priority purchase policy for market exploitation and corporate growth. And the government should strengthen the market support policy to create demand so that SMEs can enter the procurement market and actively utilize the preferential purchase system, and come up with an improvement plan so that public institutions can actively utilize the preferential purchase system.

An Integrated Model of ISO 9001:2000 and CMMI for ISO Registered Organization (ISO 인증 조직의 CMMI 도입을 위한 ISO 9001:2000-CMMI 통합모델)

  • 현승훈;윤준호;이진영;이종원;유찬우;우치수;이병정
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.10b
    • /
    • pp.481-483
    • /
    • 2004
  • ISO family와 CMMI는 조직의 소프트웨어 프로세스 개선을 위한 표준과 지침을 제공한다. ISO 9001은 품질경영 시스템에 관한 표준인 반면 CMMI는 프로세스 개선을 위한 모델이다. ISO 인증 조직은 지속적인 프로세스 개선을 위하여 CMMI를 적용할 필요가 있다. 그러나 용어나 적용 범위 및 내용의 상세함 등의 차이로 인해, ISO 인증 조직이 CMMI를 도입함에 있어서 어려움이 따른다. 이 논문에서는 ISO 인증 조직이 효과적으로 CMMI를 도입하기 위한 모델을 제안한다. 먼저 ISO 9001:2000의 요구사항과 CMMI 실행지침 사이의 관계를 기준에 따라 일대일 관계로 대응시킨다. 그런 후 CMMI 실행지침들을 ISO 9001:2000 용어와 형식으로 바꾸어 ISO 9001:2000 요구사항과 통합한 모델을 만든다. 이러한 모델은 ISO 조직에게 기존 자산과 새롭게 도입해야 할 사항을 통합 모델을 가지고 차이 분석(Gap Analysis)을 통해 보다 용이하게 식별할 수 있게 도움을 줄 것이다.

  • PDF

Requirement Analysis and Design of an Engineering Certification Program, CEA System (공학교육인증프로그램 운영 효과 증진을 위한 CEA시스템의 요구분석 및 설계)

  • Jeon, Ju-Hyun
    • Proceedings of The KACE
    • /
    • 2017.08a
    • /
    • pp.225-226
    • /
    • 2017
  • 이공계 위기론을 해결하기 위해 ABET주도로 시작된 공학교육인증은 우리나라에도 도입되었으며 성과중심교육을 기본철학으로 하는 공학교육인증에서 프로그램 학습성과의 평가는 매우 중요하다. ABEEK에서 강조하고 있는 교과기반평가(Course Embedded Assessment, 이하 CEA)는 그 유용성에도 불구하고 학습성과 연계와 코스 연계 등이 전산시스템으로 지원되지 않아 교육현장에서 잘 반영되지 않는 문제점이 있으며 이로 인해 인증을 위한 자체평가보고서 작성시 PD교수들의 어려움이 있다. 이에 운영자들의 의견을 반영하여 CEA평가 시스템을 구현하기 위한 사용자 권한 중심의 요구분석과 시스템 설계를 진행 하였다.

  • PDF

A study on the policy-based wireless network implementation (정책기반 무선네트워크 구현에 관한 연구)

  • Kang, Oh-Hyung;Lee, Ji-Hyun;Shin, Seong-Yoon;Park, Ki-Hong;Rhee, Yang-Won
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2009.01a
    • /
    • pp.245-248
    • /
    • 2009
  • 무선네트워크 환경에서 인증과 암호화를 함으로서 보안이 강화되는 효과가 있으나 무선네트워크를 이용하는 이용자들에 대한 권한이 동일하게 부여되면 접근성에 문제점이 대두됨에 따라 이용자 그룹별로 인터넷 이용에 대한 접근권한을 제어함으로서 다양한 학내 구성원, 계약직, 방문자, 시민 등 에게 보안측면과 운영성에 편리성을 가져올 수 있다. 관리자기 정책을 만들어 각각의 액세스포인트에 정책을 적용하고 사용자가 인증을 받을 때 인증서버에서 사용자에 대한 필터아이디를 액세스포인트에 전달해줌으로서 사용자에 대한 정책규칙이 적용된다.

  • PDF