• Title/Summary/Keyword: 전자인증

Search Result 1,512, Processing Time 0.027 seconds

The development of the procurement process system for e-Biz of the plant business (플랜트 산업의 e-Biz화를 위한 구매 Process System 개발)

  • Kim Hoi-Sub;Lee Joo-Pyo;Han Sang-hoon;Cho Se-hyoung;Park Chang-Hyun;Han Jae-Bum;Kim Sung-Ho;Kim Gyu-Tae
    • Journal of Internet Computing and Services
    • /
    • v.4 no.5
    • /
    • pp.11-19
    • /
    • 2003
  • Since B2C(Business to Customer) from which e-commerce had originated was replaced by B2B, e-Business has shown fast growth so fa., Recently, e-Procurement by l:n concept is on the development as self-purchase system associated with their own ERP In many conglomerates in the Korean market. However, in order to vitalize e-Biz in the plant industry, we need to set up e-marketplaces where many sellers and buyers can meet each other at the same time, which has become the essential part for success as an expanded business model. In this paper, we expect that the foundation for e-transformation in the plant industry is set up by developing Purchase Process System and related modules as the prerequisite for e-Biz in the plant industry, and this report will provide an exemplary model for e-commerce. The Purchase Process System consists of 1) e-Purchasing Module that manages bidding and contract information based on quotation inquiry, 2) e-Expediting Module that manages information to guarantee the on-time delivery, 3) e-Certification Module that controls user authentification, 4) e-Basic Module that manages the bulletin boards, Q&A, etc.

  • PDF

Innovation Patterns of Machine Learning and a Birth of Niche: Focusing on Startup Cases in the Republic of Korea (머신러닝 혁신 특성과 니치의 탄생: 한국 스타트업 사례를 중심으로)

  • Kang, Songhee;Jin, Sungmin;Pack, Pill Ho
    • The Journal of Society for e-Business Studies
    • /
    • v.26 no.3
    • /
    • pp.1-20
    • /
    • 2021
  • As the Great Reset is discussed at the World Economic Forum due to the COVID-19 pandemic, artificial intelligence, the driving force of the 4th industrial revolution, is also in the spotlight. However, corporate research in the field of artificial intelligence is still scarce. Since 2000, related research has focused on how to create value by applying artificial intelligence to existing companies, and research on how startups seize opportunities and enter among existing businesses to create new value can hardly be found. Therefore, this study analyzed the cases of startups using the comprehensive framework of the multi-level perspective with the research question of how artificial intelligence based startups, a sub-industry of software, have different innovation patterns from the existing software industry. The target firms are gazelle firms that have been certified as venture firms in South Korea, as start-ups within 7 years of age, specializing in machine learning modeling purposively sampled in the medical, finance, marketing/advertising, e-commerce, and manufacturing fields. As a result of the analysis, existing software companies have achieved process innovation from an enterprise-wide integration perspective, in contrast machine learning technology based startups identified unit processes that were difficult to automate or create value by dismantling existing processes, and automate and optimize those processes based on data. The contribution of this study is to analyse the birth of artificial intelligence-based startups and their innovation patterns while validating the framework of an integrated multi-level perspective. In addition, since innovation is driven based on data, the ability to respond to data-related regulations is emphasized even for start-ups, and the government needs to eliminate the uncertainty in related systems to create a predictable and flexible business environment.

Improved Security for Fuzzy Fingerprint Vault Using Secret Sharing over a Security Token and a Server (비밀분산 기법을 이용한 보안토큰 기반 지문 퍼지볼트의 보안성 향상 방법)

  • Choi, Han-Na;Lee, Sung-Ju;Moon, Dae-Sung;Choi, Woo-Yong;Chung, Yong-Wha;Pan, Sung-Bum
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.1
    • /
    • pp.63-70
    • /
    • 2009
  • Recently, in the security token based authentication system, there is an increasing trend of using fingerprint for the token holder verification, instead of passwords. However, the security of the fingerprint data is particularly important as the possible compromise of the data will be permanent. In this paper, we propose an approach for secure fingerprint verification by distributing both the secret and the computation based on the fuzzy vault(a cryptographic construct which has been proposed for crypto-biometric systems). That is, a user fingerprint template which is applied to the fuzzy vault is divided into two parts, and each part is stored into a security token and a server, respectively. At distributing the fingerprint template, we consider both the security level and the verification accuracy. Then, the geometric hashing technique is applied to solve the fingerprint alignment problem, and this computation is also distributed over the combination of the security token and the server in the form of the challenge-response. Finally, the polynomial can be reconstructed from the accumulated real points from both the security token and the server. Based on the experimental results, we confirm that our proposed approach can perform the fuzzy vault-based fingerprint verification more securely on a combination of a security token and a server without significant degradation of the verification accuracy.

Proposal of Promotion Strategy of Mobile Easy Payment Service Using Topic Modeling and PEST-SWOT Analysis (모바일 간편 결제 서비스 활성화 전략 : 토픽 모델링과 PEST - SWOT 분석 방법론을 기반으로)

  • Park, Seongwoo;Kim, Sehyoung;Kang, Juyoung
    • Journal of Intelligence and Information Systems
    • /
    • v.28 no.4
    • /
    • pp.365-385
    • /
    • 2022
  • The easy payment service is a payment and remittance service that uses a simple authentication method. As online transactions have increased due to COVID-19, the use of an easy payment service is increasing. At the same time, electronic financial industries such as Naver Pay, Kakao Pay, and Toss are diversifying the competition structure of the easy payment market; meanwhile overseas fintech companies PayPal and Alibaba have a unique market share in their own countries, while competition is intensifying in the domestic easy payment market, as there is no unique market share. In this study, the participants in the easy payment market were classified as electronic financial companies, mobile phone manufacturers, and financial companies, and a SWOT analysis was conducted on the representative services in each industry. The analysis examined the user reviews of Google Play Store via a topic modeling analysis, and it employed positive topics as strengths and negative topics as weaknesses. In addition, topic modeling was conducted by dividing news articles into political, economic, social, and technology (PEST) articles to derive the opportunities and threats to easy payment services. Through this research, we intend to confirm the service capabilities of easy payment companies and propose a service activation strategy that allows gaining the upper hand in the market.

External Auditing on Absorbed Dose Using a Solid Water Phantom for Domestic Radiotherapy Facilities (고체팬텀을 이용한 국내 방사선 치료시설의 흡수선량에 대한 조사)

  • Choi, Chang-Heon;Kim, Jung-In;Park, Jong-Min;Park, Yang-Kyun;Cho, Kun-Woo;Cho, Woon-Kap;Lim, Chun-Il;Ye, Sung-Joon
    • Radiation Oncology Journal
    • /
    • v.28 no.1
    • /
    • pp.50-56
    • /
    • 2010
  • Purpose: We report the results of an external audit on the absorbed dose of radiotherapy beams independently performed by third parties. For this effort, we developed a method to measure the absorbed dose to water in an easy and convenient setup of solid water phantom. Materials and Methods: In 2008, 12 radiotherapy centers voluntarily participated in the external auditing program and 47 beams of X-ray and electron were independently calibrated by the third party’s American Association of Physicists in Medicine (AAPM) task group (TG)-51 protocol. Even though the AAPM TG-51 protocol recommended the use of water, water as a phantom has a few disadvantages, especially in a busy clinic. Instead, we used solid water phantom due to its reproducibility and convenience in terms of setup and transport. Dose conversion factors between solid water and water were determined for photon and electron beams of various energies by using a scaling method and experimental measurements. Results: Most of the beams (74%) were within ${\pm}2%$ of the deviation from the third party's protocol. However, two of 20 X-ray beams and three of 27 electron beams were out of the tolerance (${\pm}3%$), including two beams with a >10% deviation. X-ray beams of higher than 6 MV had no conversion factors, while a 6 MV absorbed dose to a solid water phantom was 0.4% less than the dose to water. The electron dose conversion factors between the solid water phantom and water were determined: The higher the electron energy, the less is the conversion factor. The total uncertainty of the TG-51 protocol measurement using a solid water phantom was determined to be ${\pm}1.5%$. Conclusion: The developed method was successfully applied for the external auditing program, which could be evolved into a credential program of multi-institutional clinical trials. This dosimetry saved time for measuring doses as well as decreased the uncertainty of measurement possibly resulting from the reference setup in water.

Development of Communication Emulate Technique in control system for Automatic Machine. (자동화 기기를 위한 제어 시스템에서의 통신 Emulate 개발)

  • 이범석;정화영
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2000.05a
    • /
    • pp.101-106
    • /
    • 2000
  • 자동화 기기 분야에서 컴퓨터의 적용 및 응용은 하드웨어 발달에 따라 매우 빠르고 민감하게 반영되어왔다. 이는 컴퓨터 하드웨어의 빠른 개발 주기에 맞춰 저 가격, 고 효율성, 높은 신뢰성, 호환성 등의 장점을 가진 PC가 현대의 컴퓨터 흐름을 주도하게 되면서 자동화 산업분야 또한 이를 적용하여 왔기 때문이다. 이에 따라, 자동화 기기 분야에서는 고 가격, 긴 개발기간 등을 필요로 했던 과거와 달리 저 가격, 짧은 개발기간, 다양한 개발환경 등을 이룰 수 있었다. 또한, 생산량 증가에만 의존하던 과거와 달리 현대에 이르러서는 시스템의 최적화, 효율의 극대화, 시스템의 안정성, 운용의 편리성, 호환성 등의 개념들이 도입되고 있는 것이다. 자동화 기기를 구성하는 요인으로는 크게 시스템의 틀을 이루는 기계부분과 이를 제어하는 제어 시스템부로 나뉠 수 있다. 제어 시스템에서는 기계부분의 동작을 제어하는 동작 제어부와 이에 관한 정보를 화면에 나타내는 GUI(Graphical User Interface)부분으로 나뉘게된다. 현재에는 이를 통합하여 하나의 하드웨어에서 제어부와 GUI를 모두 담당하는 방법이 연구 진행되고 있으나, 하드웨어를 둘로 나누거나 하나로 하여도 제어부와 GUI 사이의 통신부분은 빼놓을 수 없는 요소가 된다. 따라서, 본 논문에서는 시스템의 안정성을 위하여 두 시스템간에 송·수신되는 데이터를 추적할 수 있도록 하는 Emulate 기법을 구현 및 개발하고자 한다. 이는, 두 시스템간의 통신 데이터를 실시간으로 누적, 저장하여 사용자로 하여금 시스템의 운용상태를 분석할 수 있게 하였으며, 시스템 오류발생 시 Emulate 자료를 근거로 시스템의 운용상태를 파악할 수 있게 하였다.근 제한기능을 제공하며 각 클라이언트와 서버간의 실시간 연결 혹은 지연연결을 지원하는 독립적인 애플리케이션이다. 이러한 처방전달 메시징시스템을 구성하는 각 요소에 대해 정의하고 개념적 모델을 설계하고자 한다.에게 청구되며, 소비자에게 전송 되는 청구서는 사용자DB를 참조하여 사용자가 미리 정의한 원하는 형태로 변환되어 전달되며, 필요시 암호화 과정을 거치는 것이 가능해야 한다. 전송된 청구서는 전자우편의 경우, 암호해독이 가능한 전용 브라우저를 통해 열람 되며, 이는 다시 전용 브라우저를 통해 지불인증이 승인되어 청구 제시서버에게 전송된다. EBPP 시스템의 제어 흐름은 크게 기업이 청구 정보를 소비자에게 제시하는 흐름과 소비자의 지불 승인으로 인해 기업이 은행에 지불을 요구하는 흐름으로 구분할 수 있다. 본 논문에서는 통합 청구서버 및 정구 제시서버의 역할 및 구성 요소들에 대해 서술하고, EBPP 시스템과 연동하여야 하는 메일 서버와의 상호 작용에 대해 서술할 것이다. 본 시스템을 아직 구현이 되지 않은 관계로 시스템의 성능 등의 수치적 결과를 제시할 수 없는 상태다., 취약계층을 위한 일차의료, 의약관리), ${\circled}2$ 보건소 조직 개편 및 민간의료기관과 협력체계 확립, ${\circled}3$ 전문인력 확보 및 인력구성 조정, 그리고 ${\circled}4$ 방문보건사업의 강화 등이다., 대사(代謝)와 관계(關係)있음을 시사(示唆)해 주고 있다.ble nutrient (TDN) was highest in booting stage (59.7%); however no significant difference was foun

  • PDF

Design of V2I Based Vehicle Identification number In a VANET Environment (VANET 환경에서 차대번호를 활용한 V2I기반의 통신 프로토콜 설계)

  • Lee, Joo-Kwan;Park, Byeong-Il;Park, Jae-Pyo;Jun, Mun-Seok
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.12
    • /
    • pp.7292-7301
    • /
    • 2014
  • With the development of IT Info-Communications technology, the vehicle with a combination of wireless-communication technology has resulted in significant research into the convergence of the component of existing traffic with information, electronics and communication technology. Intelligent Vehicle Communication is a Machine-to-Machine (M2M) concept of the Vehicle-to-Vehicle. The Vehicle-to-Infrastructure communication consists of safety and the ease of transportation. Security technologies must precede the effective Intelligent Vehicle Communication Structure, unlike the existing internet environment, where high-speed vehicle communication is with the security threats of a wireless communication environment and can receive unusual vehicle messages. In this paper, the Vehicle Identification number between the V2I and the secure message communication protocol was proposed using hash functions and a time stamp, and the validity of the vehicle was assessed. The proposed system was the performance evaluation section compared to the conventional technique at a rate VPKI aspect showed an approximate 44% reduction. The safety, including authentication, confidentiality, and privacy threats, were analyzed.

Analysis of Near Field for Base Station Panel Antenna(4 X 2 Dipole Array) (기지국용 판넬 안테나(4 X 2 Dipole Array)의 근역장 분석)

  • Lee, Dugro;Park, Ju-Derk;Choi, Jae-Ic;Kim, Nam
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.15 no.5
    • /
    • pp.473-479
    • /
    • 2004
  • In this paper, power density in near field is calculated about analytic object which has comparatively large volume in considering used wavelength such as cellular base station antenna. Panel sector antenna which is used widespreadly in domestic cellular wireless communication system is modeled and electromagnetic field distribution in reactive near field region is calculated by FDTD (Finite Difference Time Domain) method. After that, antenna gain in far field region is obtain by near to far transformation. Power spectral density in radiated near field is calculated in applying to gain-based model with antenna gain in far field. Finally, compliance distance is obtained in considering the result from radiated near field calculation and basic restrictions on occupational and general public exposure limits in ICNIRP guideline. In the center of main radiating position, the result from gain-based model is -14.55 ㏈m and the result from surface scanning method is -15.75 ㏈m. When the losses from cables and connectors used in measurement are considered, the results from gain-based model and surface scanning method are nearly coincident.

A Web Accessability Compliance Framework for Website Development: A Case of W Bank Internet Banking Project - (웹사이트 개발을 위한 웹접근성 준수 프레임워크: - W 은행 인터넷 뱅킹 시스템 구축 사례 -)

  • Kim, Yoosin;Jeong, Seung Ryul
    • Journal of Internet Computing and Services
    • /
    • v.14 no.5
    • /
    • pp.87-99
    • /
    • 2013
  • As Internet advances, websites with simpel HTML pages are changing to complex web application systems with enormous contents and various services. With this trend, it is noted that situations where Web accessibility of the old and the handicapped is inhibited are growing. To solve this problem, The Disability Discrimination Act has been enacted since April 2013. This act triggers massive website reorganization efforts. However, in order for the huge and sophisticated web applications and web sites to ensure a web accessibility, a framework is required to throughout the web site development. Based on thorough review of website development methodologies, web accessibility compliance standards, and various web accessibility issues related to website characteristics, this study proposes a practice oriented "Web Accessibility Compliance Framework". The current study also examines the usefulness and value of this framework by applying it to the internet banking development project of W bank and receiving a certificate for high quality website complying web accessibility standards.

RMCS Plan and the Embodiment for the Home Network Service which is Safeent (안전한 Home Network 서비스를 위한 RMCS 설계 및 구현)

  • Sun, Jae-Hoon;Lee, Dong-Hwi;J. Kim, Kui-Nam
    • Convergence Security Journal
    • /
    • v.5 no.2
    • /
    • pp.19-27
    • /
    • 2005
  • As home network is increasing to use, home network industry is developing too. Also, it is to be a popular subject in the network's topics. In this reasons, home network become a important thing because home gateway function is working between access network and home network. In the home network, it relates on the personal computer, home pad, and digital television. But, home gateway is not prepared standard point about techniques. Therefore, many kind of technique want to try for developing of home gateway's functions. Usually, we use ID/PASSWORD method in network control system. But, we found a lot of problems about classical network system while we experienced Jan/25 big trouble. We are considering about that home network system are using same network net. Therefore, seriously we have to check about security and safety at the home network's environment. This report focus on the home network's environment to control for using and efficiency and then it wants to find ways to protect from the internal and external attacks. Existing ID/PASSWORD method it used a electronic signature and the security against the approach from of external watch, the MIB structure of role base and the security of the Home network which leads the authority control which is safe even from the Home network inside it strengthened it used compared to it proposed.

  • PDF