• Title/Summary/Keyword: 초기인증

Search Result 203, Processing Time 0.025 seconds

The Lightning Effects on Aircraft and Certification (항공기에 대한 낙뢰의 영향과 감항성 인증)

  • Han,Sang-Ho;Lee,Jong-Hui
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.31 no.9
    • /
    • pp.110-120
    • /
    • 2003
  • As the wooden aircraft in the early times has no way to let lightning flow when lighting flash attaches during flight, the aircraft got damage, or caught fire. Though all metal airplane was developed with an advent of aluminum, a lightning accident still occurred including a fire of a fuel tanks. Eventually, NACA declared problems in 1938, and an artificial lightning test began. III succession, FAA established Airworthiness Requirements for certification. The FAA committed test measures study for the protection of an airplane from lightning to SAE. SAE presented the test current and voltage waveforms that simulating natural lightning, and it is utilized on lightning protection certification of an airplane by public. A lightning effects of an airplane through an analysis of lightning mechanism was made in this technical note. Especially, lightning direct effects on aircraft are analyzed and lightning strike zones are described.

Analysis of the Correlation between Armament/Store Integration Criteria and Aircraft Launch Missile Development Process (무장/장착물 통합 기준과 항공기 발사 순항 유도무기 개발 프로세스의 상관성 분석)

  • Choi, Seok-min;Lee, Jong-hong;Kim, Ji-min;Lee, Seoung-pil;Jung, Jae-won
    • Journal of Advanced Navigation Technology
    • /
    • v.22 no.2
    • /
    • pp.84-89
    • /
    • 2018
  • Due to the development of domestic technology, a variety of aircraft launch weapons have been developed, and the importance of aircraft-store integration certification is increasing. The aircraft-Store integration certification is to certify compliance with the armaments/stores integration criteria set out in the Standard ACC and to prove that there is no problem with the safety flight. Therefore, it is necessary to reflect the requirements of the aircraft in the store development process to reduce the design change requirement in the compatibility verification stage. In this paper, the relationship between the Standards ACC, aircraft-store compatibility reference document MIL-HDBK-1763, and the development process of cruise guided weapons have been analyzed. As a result of the analysis, it was concluded that the design changes in the aircraft-store integration certification stage could be reduced if the aerodynamic and structural design requirements were reflected from the conceptual design stage.

Anonymity User Authentication Scheme with Smart Cards preserving Traceability (추적이 가능한 스마트카드 사용자 인증 기법)

  • Kim, Se-Il;Chun, Ji-Young;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.5
    • /
    • pp.31-39
    • /
    • 2008
  • Recently, remote user authentication schemes using smart cards has been researched to provide user privacy because of increasing interest and demands. Previously, provided authentication schemes were only concerned about providing user privacy against outside attackers, but the scheme. which guarantees user privacy against both a remote server and outside attackers, has been recently demanded because the user's information has leaked out through the service providers. When the remote server perceives a user doing a malicious act, the server should be able to trace the malicious user by receiving help from a trust agency. In this paper, we suggest a scheme which not only guarantees user privacy against both a remote server and outside attackers, but also provides traceable anonymity authentication.

Policy of Surging Investment to Early Startups Via Boosting up SAFE in Korea (창업초기투자 촉진을 위한 한국형 SAFE 활성화 방안에 대한 연구)

  • Park, Jin;Yang, Youngseok
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.17 no.6
    • /
    • pp.1-12
    • /
    • 2022
  • This paper put the goal on boosting up early startup investment by delivering and positioning SAFE as the main early startup investment type in Korea. In particular, this paper proves the better fitting of SAFE as to the early stage of venture investment than these of Convertible Note. This paper as referring the previous studies of SAFE as the major keystone issues determining active SAFE applying (legal positioning issue, tax treatment issue, failure of inducing the following investment with uncertainty over maturity) proposes boosting up policy of Korean SAFE. First, as to accounting treatment of SAFE, it suggests SAFE to recognize legally as "the capital" on the Korean Venture Investment Act of introducing SAFE actively as venture investment type. Second, as to tax treatment issue, it proposes on amending venture indication rule as the best alternative of resolving tax issue by accepting SAFE as the investment meeting to venture investment requirement. Third, as benchmarking foreign cases, it delivers the method of modifying foreign SAFE Contract Format by adding up more clauses about safety vehicles against the failure of the following investment and fixing maturity date and event. Ultimately, all resolutions of this paper fall on highlighting the role of Korean Venture Investment Act and Ministry of SMEs and Startups.

A Study on the authentication scheme for Security of Wireless Internet (무선 인터넷에서 보안을 위한 인증방안에 관한 연구)

  • 최용식;강찬희;신승호
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.41 no.11
    • /
    • pp.87-91
    • /
    • 2004
  • The continuing development of the information technology industry and wireless networking has increased the use of mobile device, which provides both portability and mobility. As follows, demands for extended services within the wireless Internet are increasing rapidly. Because it still in its initial stages of development, the wireless Internet presents continuing problems in security and limitations in the content of services. Furthermore, most mobile equipment utilizes the touch pad input method. This input method is inconvenient when a user needs to input a long sentence. This has led to the more convenient development of image selection by using a pen mouse. In order to provide security under these conditions, a HASH code may be used to transmit an array of information and input values, created by the image input at the early stages. Thus, authentication and key exchange are completed securely. Messages are encoded and transmitted, preventing both information drain by insiders and interference from outside.

Authentication Mechanism for Secure Fast Handover in HMIPv6 (HMIPv6 환경에서의 안전한 Fast Handover를 위한 인증 메커니즘)

  • Kim, Min-Kyoung;Kang, Hyun-Sun;Park, Chang-Seop
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.3
    • /
    • pp.91-100
    • /
    • 2007
  • In this paper, We design and propose a protocol for supporting secure and efficient mobility in integrating fast handover and HMIPv6. In the proposed protocol which is AAA-based HMIPv6, if the MN enters the MAP domain for the first time, then it performs an Initial Local Binding Update for authentication. We propose a secure Fast Handover method using the ticket provided by MAP, which includes the secret key for authentication. Also, we analyze and compare security properties of our proposed scheme with those of other scheme using various attack scenario.

Industry Trend for Optical Switching of Broadcasting Common Reception System (방송공동수신설비의 광전환 산업동향)

  • Kim, Young-Chul
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2013.06a
    • /
    • pp.227-228
    • /
    • 2013
  • 본 논문은 2012년도 12월 31일 새벽 4시를 기하여 아날로그 지상파텔레비전이 디지털 지상파텔레비전으로 완전 전환되어짐에 따라 초고속정보통신건물인증에서 "특등급"건물도 필수적으로 광장비(광수신기)가 댁내의 세대단자함에 들어가야 함으로서 현재의 산업적 보급 현황에 대하여 알아보고자 한다. 방송공동수신설비에서 가장 중요한 설비로서 세대단자함에 광수신기가 들어가야 하지만, 최근의 경기침체로 인하여 건설경기도 침체됨으로서 구내통신설비에도 영향이 있는 것으로 파악되고 있다. 2009년 11월에 개정된 "방송공동수신설비의 설치기준에 관한 고시"와 초고속정보통신건물인증업무 처리지침 개정에 따라 특등급의 공동주택은 광선로 및 광 장비가 도입되어야 하나 초기 품질의 안정화나 장비의 활성화가 안되는 상황에서 고가의 장비가 일반적이었으나, 현재는 일부 대단히 단지가 조성됨으로서 추가적인 인하요건이 발생하고, 향후 1~2년 안에 점진적으로 가격과 품질이 안정화가 이루질 것으로 예상된다.

  • PDF

Robust Bidirectional Verification Scheme for Detecting Sinkhole Attacks in INSENS of Sensor Networks (센서 네트워크의 INSENS에서 싱크홀 공격을 탐지하기 위한 강인한 양방향 인증 기법)

  • Song, Kyu-hyun;Cho, Tae-ho
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2015.01a
    • /
    • pp.77-80
    • /
    • 2015
  • 무선통신을 기반으로 하는 WSN은 통신의 특성상 네트워크보안에 취약점을 가진다. 무선통신의 취약점은 누구나 네트워크에 접근이 가능하다는 것이다. 이에 따라 침입에 강인한 무선 센서 네트워크인 INtrusion-tolerant routing protocol for wireless SEnsor NetworkS(INSENS)가 제안됨으로써 WSN의 초기 라우팅 설정 시 침입하는 공격자를 사전에 차단할 수 있게 되었다. 그러나 라우팅 설정 후에 노드가 공격자에 의해 훼손당하게 된다면, 노드의 주요정보를 이용해 공격자는 또다시 라우팅 공격이 가능해진다. 본 논문에서는 공격자에 의해 훼손된 노드가 라우팅 공격 중 대표적인 공격인 싱크홀 공격 메시지를 방송하였을 때, 페어와이즈 키를 통해 효과적으로 공격메시지를 차단하는 양방향인증기법을 제안한다. 이로써 INSENS에서 발생하는 싱크홀 공격을 차단함으로써 WSN의 보안 강화에 기여한다.

  • PDF

Authentication Protocol based on IDAM-AS for Non-Realtime IPTV (비실시간 IPTV를 위한 IDAM-AS 기반의 인증 프로토콜)

  • Seo, Dae-Hee;Baek, Jang-Mi;Moon, Yong-Hyuk;Nam, Taek-Yong;Nah, Jae-Hoon
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2010.06d
    • /
    • pp.1-4
    • /
    • 2010
  • 최근 인터넷의 급속한 발전은 초고속 인터넷망을 이용해 양방향 텔레비전 서비스의 IPTV에 대한 연구 및 상용화를 촉진하고 있다. IPTV는 초고속 인터넷망을 기반으로 다양한 콘텐츠 및 부가 서비스를 제공하는 방송 통신 융합 서비스중의 하나이다. 그러나 콘텐츠의 재사용에 따른 디바이스의 안전한 보안 서비스를 제공하지 않을 경우 비즈니스 모델의 상용화에 많은 보안 취약성이 발생할 수 있어 이를 위한 연구가 요구되고 있다. 따라서 본 논문에서는 기존의 IPTV에서 적용되고 있는 카드 기반의 취약성을 보완하고 비 실시간 IPTV 서비스를 위한 자동화된 재사용 콘텐츠의 멀티 에이전트 시스템인 IDAM-AS를 기반으로 디바이스의 안전한 초기 등록과 인증 과정을 제안한다. 제안 방식은 분산된 에이전트를 관리할 수 있는 IDAM-AS를 정의하고 이를 이용해 사용자의 최소의 정보 입력을 통해 재사용 콘텐츠에 대한 자동화된 서비스가 이루어지도록 하였다.

  • PDF

Development Strategy of Biometrics Industry (생체인식산업 발전전략)

  • 박성욱;김현종;이현우;고성혁
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.11a
    • /
    • pp.754-757
    • /
    • 2002
  • We live in a world of the internet industrial revolution. In this revolutionary period individual identification is a major problem. This Paper observes present conditions and it presents a development strategy.

  • PDF