• Title/Summary/Keyword: 초기인증

Search Result 204, Processing Time 0.029 seconds

To study the preservation technology and a secret-sign technology (전자상거래를 위한 보안기술 및 암호기술에 대한 연구)

  • 김영호;조정길
    • Proceedings of the KAIS Fall Conference
    • /
    • 2001.11a
    • /
    • pp.220-223
    • /
    • 2001
  • 본 논문은 인터넷과 통신매체의 확산과 더불어 최근에는 기업간, 기업과 정부간에 주로 정형적인 문서교환에 활용되던 초기의 EDI(Electronic Data Interchange)가 멀티미디어 정보교환이 가능한 인터넷의 보급, 확산과 함께 소비자를 대상으로 하는 전자상거래(EC : Electronic Commerce)로 급속히 확산되고 있으며, 이를 지원하기 위해 기업의 정보화 기반을 구현하는 ERP(Enterprise Resource Planning)도 요구되고 있다. 그러나, 전자상거래는 네트워크를 통하여 형성되므로 사용자들은 서로 만나지 않고 거래하게 된다. 이는 전자상거래의 장점이기도 하지만, 반대로 상호간의 신분에 대한 인증이 쉽지 않다는 단점이 된다. 본 논문에서는 이러한 위험을 방지하기 위한 보안기술 및 암호기술에 대해 연구하고자 한다.

건국대 친환경농산물인증센터 개소기념 학술대회

  • Gang, Chang-Won
    • KOREAN POULTRY JOURNAL
    • /
    • v.38 no.10 s.444
    • /
    • pp.102-106
    • /
    • 2006
  • 우리나라에서도 소비자들의 필요를 충족시키고 환경생태계를 보전하며 외국 유기농산물의 국내시장 잠식을 막아내기 위해 유기농업의 필요성을 인식하게 되었다. 즉 우리 농업을 지속가능(sustainable agriculture)한 산업으로 발전시켜 국제경쟁력을 높이기 위해 1990년대 초기부터 이에 관련된 각종 세미나, 정보교환, 토론, 전시회 등이 열리고 1998년도에는 정부에서도“친환경농업 원년의 해”로 선포하게 되어 친환경 유기농업발전에 가속도가 붙게 되었다. 그러나 이들은 대 부분 유기경종농업에 국한된 것들이었고, 유기동물성 식품공급을 위한 유기축산 부분은 매우 미진하였다. 국내 유기축산의 역사는 극히 일천하고 이제 걸음마를 시작했다고 할 수 있겠다.

  • PDF

ECG-based Biometric Authentication Using Random Forest (랜덤 포레스트를 이용한 심전도 기반 생체 인증)

  • Kim, JeongKyun;Lee, Kang Bok;Hong, Sang Gi
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.54 no.6
    • /
    • pp.100-105
    • /
    • 2017
  • This work presents an ECG biometric recognition system for the purpose of biometric authentication. ECG biometric approaches are divided into two major categories, fiducial-based and non-fiducial-based methods. This paper proposes a new non-fiducial framework using discrete cosine transform and a Random Forest classifier. When using DCT, most of the signal information tends to be concentrated in a few low-frequency components. In order to apply feature vector of Random Forest, DCT feature vectors of ECG heartbeats are constructed by using the first 40 DCT coefficients. RF is based on the computation of a large number of decision trees. It is relatively fast, robust and inherently suitable for multi-class problems. Furthermore, it trade-off threshold between admission and rejection of ID inside RF classifier. As a result, proposed method offers 99.9% recognition rates when tested on MIT-BIH NSRDB.

The problem resolution algorithm in ESP protocol (ESP 프로토콜에서의 문제점 보완 알고리즘)

  • Lee, Yeong-Ji;Kim, Tae-Yun
    • The KIPS Transactions:PartC
    • /
    • v.9C no.2
    • /
    • pp.189-196
    • /
    • 2002
  • IPSec is a protocol which provides data encryption, message authentication and data integrity on public and open network transmission. In IPSec, ESP protocol is used when it needs to Provide data encryption, authentication and integrity in real transmission Packets. ESP protocol uses DES-CBC encryption mode when sender encrypts packets and receiver decrypts data through this mode IV is used at that tome. This vague has many risks of attack during transmission by attacker because it is transferred clean and opened. If IV value is modified, then decryption of ESP data is impossible and higher level information is changed. In this paper we propose a new algorithm that it encrpty IV values using DES-ECB mode for preventing IV attack and checks integrity of whole ESP data using message authentication function. Therefore, we will protect attacks of IV and data, and guarantee more safe transmission on the public network.

WiMAX Security Mechanism for Minimizing Performance load of Base Station (베이스 스테이션의 성능부하를 최소화하기 위한 WiMAX 보안 메커니즘)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Cheol;Lee, Sang-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.10
    • /
    • pp.1875-1882
    • /
    • 2008
  • Nowadays, usage of mobile unit which has a characteristic of low cost and high efficiency is being generalized because of frequent use of internet-based variable service and application in IEEE 802.16 WiMAX. A study for handling a security problem of high speed internet service is rising while the use of a mobile is being generalized. This paper suggests a security mechanism which provides safety from certification load of SS and a security attack as well as a basic function which is provided from IEEE 802.16e standard to satisfy security demand of IEEE802.16 WiMAX. The proposed mechanism exchangeskey material information for TEK and data code by using 난수(?) and secret value created by SS and BS, also reduces capacity load of BS not to perform an additional certificate procedure of BS by using the early certification information and certificate of SS.

A Medical Staff Identification System by Using of Beacon, Iris Recognition and Blockchain (비콘과 홍채인식, 블록체인 기반의 의료진 신분확인 시스템 제안)

  • Lim, Se Jin;Kwon, Hyeok Dong;Seo, Hwa Jeong
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.10 no.1
    • /
    • pp.1-6
    • /
    • 2021
  • Recently, incidents such as proxy surgery (unlicensed medical practice) have been reported in the media that threaten the safety of patients. Alternatives such as the introduction of operating room surveillance camera devices to prevent proxy surgery are emerging, but there are practical difficulties in implementing them due to strong opposition from the medical community. However, the social credibility of doctors is falling as incidents such as proxy surgery occur frequently. In this paper, we propose a medical staff identification system combining Beacon and iris recognition. The system adds reliability by operating on the blockchain network. The system performs primary identification by performing user authentication through iris recognition and proves that the medical staff is in the operating room through beacons. It also ensures patient trust in the surgeon by receiving beacon signals in the background and performing iris authentication at random intervals to prevent medical staff from leaving the operating room after only performing initial certification.

Secret Sharing based Node Authentication in FANET (FANET에서의 비밀분산 기반 노드 인증)

  • Yang Ji Hun;Lee Soo Jin
    • Convergence Security Journal
    • /
    • v.22 no.4
    • /
    • pp.25-34
    • /
    • 2022
  • This paper proposes a secret sharing based fast node authentication technique applicable to Flying Ad-Hoc Network (FANET) that can be used to construct self-organized communication network in multi drones and drone squadrons operations. Before deployment, each node stores an exponential share, exponential secret and a portion of PUF CRP table. After being deployed in the field, in the early-stage of network formation, each node broadcasts its ID, exponential share and a hash value of PUF Response and pseudo-random number. Then each node performs a reconstruction of the exponential secret using the exponential shares transmitted from neighboring nodes. When the exponential secret is reconstructed, simultaneous authentication is completed for all nodes that have transmitted the exponential share used in the reconstruction. A node that transmits an incorrect exponential share to disturb the reconstruction of the exponential secret during the authentication process can be detected before performing the reconstruction through the verification of the hash value, and will be excluded from the reconstruction.

Between the UE and the MME in LTE Initial Attach the Environment of Procedures and Encryption for Secure Transmission IMSI (LTE 환경에서 UE와 MME간 Initial Attach 절차의 안전한 IMSI 전송을 위한 암호화)

  • Choi, Won-Kyu;Kim, Hyung-Ju;Yoo, Han-Na;Jun, Moon-Seog
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.11a
    • /
    • pp.839-841
    • /
    • 2013
  • LTE 환경에서 초기 망 접속을 위한 UE와 MME 간의 사용자의 정보에 대한 인증을 위하여 IMSI, GUTI 등의 정보를 요청, 승인 하게 된다. 이 과정에서 사용자의 유일한 식별값인 IMSI를 새로운 MME로 전송하는 경우 별도의 암호화 과정 없이 평문의 IMSI 값이 전송되어진다. 이로 인하여 평문으로 전송되는 IMSI값에 대한 보안 위협이 발생하고, 이로 인하여 사용자 추적, 단말 추적 등 사용자의 Privacy에 대한 침해 및 가장 공격 등이 발생된다. 본 논문에서는 UE와 MME간 초기 통신과정에서 IMSI에 대한 암호화를 통하여 안전성 강화에 대한 제안을 한다.

Studies on Target Market of GAP Certified Raw-Ginseng (GAP 인증 수삼의 표적시장 연구)

  • Kim, Gwan-Hou;Lee, Ka-Soon;Yi, Doo-Hee;Hong, Seung-Jee
    • Food Science and Preservation
    • /
    • v.18 no.5
    • /
    • pp.684-691
    • /
    • 2011
  • This study was carried out to suggest producers' marketing direction for GAP certified rawginseng using STP(segmentation, targeting and positioning). In order to fulfill this object, conjoint analysis and cluster analysis were used. The main results are as follows. Based on the results of part worth for attributes such as safety, size, and price, GAP certified raw-ginseng, large size, and low price were preferred to conventional ginseng, small size, and high price respectively. In the relative importance for each attributes, safety was 47.2%, size was 30.0%, and price was 17.8%. As a result of market segmentation, 3 consumer groups(large size preferred, safety preferred, lower price preferred) were classified. Among those groups, the safety preferred group was selected as a target market for GAP certified raw-ginseng and its market size was estimated approximately 2,968 tons which is 26.8% of total raw ginseng market.

A Study on the Estimation of Additional Cost for the Certification of Zero Energy Apartment Buildings (공동주택 제로에너지빌딩 인증을 위한 적정가산비 산정에 관한 연구)

  • Sa, Yong-gi;Haan, Chan Hoon
    • Korean Journal of Construction Engineering and Management
    • /
    • v.20 no.5
    • /
    • pp.21-30
    • /
    • 2019
  • Environmental and energy issues such as abnormal climate and depletion of fossil fuel due to global warming have emerged as a critical task to threaten human survival. As a result, interest in the Zero Energy Building is increasing as it is an innovative building that can significantly contribute to building energy reduction and greenhouse gas reduction. In the market, however, the added cost of construction is a major stumbling block to the revitalization of the Zero Energy certification. In this study, general private apartment complexes were selected for research, detailed elements for Zero Energy certification were presented based on the construction criteria for eco-friendly houses from the initial design stage, and the cost efficiency analysis of the components for certification were presented. It has been analyzed that only Grade 3 certification can be implemented in apartments due to technical level and physical limitations. Also, after reviewing the cost trend during the lifecycle cost, all expenses can be recovered within 13 years after completion only in the case of grade 5 of the Zero Energy Building. The additional costs proposed in the present study are reflected appropriately in the review of projects for apartments scheduled for order in the future to contribute to the revitalization of the Zero Energy Building certification.