• Title/Summary/Keyword: 통합키

Search Result 191, Processing Time 0.025 seconds

Design of an Integrated System of XML Digital Signature to XML/EDI (XML/EDI 와 XML 전자서명 통합 시스템의 설계)

  • Jang, Woo-Young;Yoo, Seung-Bum;Jang, In-Gual;Cha, Suk-Il;Shin, Dong-Il;Shin, Dong-Kyoo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2001.04a
    • /
    • pp.407-410
    • /
    • 2001
  • EDI 시스템은 많은 기업들에게 정보통신기술을 활용하여 업무처리시간 및 비용을 절감하고, 품질을 향상시키기 위한 대안으로 사용되어졌다. 그리고, 인터넷으로 인해 세계 어느 곳에서나 필요한 정보를 볼 수 있게 되었으며, 그 와중에 차세대 EDI 시스템들이 출현하였다. 그 중 다양한 문서구조 표현이 가능한 XML 을 활용한 XML/EDI 가 급속하게 확산되었다. 이러한 시스템들은 네트워크를 통해 정보가 전달되므로 보안에 아주 예민하다. 보안 서비스에도 여러 가지가 있지만 전자서명은 큰 비중을 차지한다. 현재 공개키 암호 알고리즘을 이용한 일반적인 전자 서명을 사용하고 있으나 웹에서 표준화가 되어 가고있는 XML 을 이용한 전자서명 기법이 W3C 에서 제안되어 표준화가 진행되고 있으며 이는 EDI 시스템에서 아주 유용하게 이용 가능한 기술이다. 본 논문에서는 전자 문서 교환에 있어서 중요하다고 할 수 있는 XML 전자서명을 XML/EDI 에 적용하여 시스템을 설계하였다.

  • PDF

Authentication Mechanism for Secure Fast Handover in HMIPv6 (HMIPv6 환경에서의 안전한 Fast Handover를 위한 인증 메커니즘)

  • Kim, Min-Kyoung;Kang, Hyun-Sun;Park, Chang-Seop
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.3
    • /
    • pp.91-100
    • /
    • 2007
  • In this paper, We design and propose a protocol for supporting secure and efficient mobility in integrating fast handover and HMIPv6. In the proposed protocol which is AAA-based HMIPv6, if the MN enters the MAP domain for the first time, then it performs an Initial Local Binding Update for authentication. We propose a secure Fast Handover method using the ticket provided by MAP, which includes the secret key for authentication. Also, we analyze and compare security properties of our proposed scheme with those of other scheme using various attack scenario.

The Analysis of Location Privacy Preserving Technology in VANET (VANET에서의 위치 프라이버시 보호 기술 분석)

  • Kim, Young-Min;Jeong, Doo-Hun;Lim, Hun-Jung;Lee, Jun-Ho;Chung, Tai-Myoung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.11a
    • /
    • pp.1241-1244
    • /
    • 2010
  • 인간의 가장 큰 욕구인 편의와 안전을 위해 우리의 곁에서 떨어질 수 없는 것이 차량이다. 그러므로 차량을 이용하면서 겪게 되는 안전과 편의 또한 떼어놓을 수 없는 문제 중에 하나다. 그 편의와 안전을 위해 VANET이 활발히 개발 중이다. VANET은 차량에서 사용되는 근거리/중거리 통신용 무선 프로토콜로써 차량 간 통신인 V2V, 차량과 네트워크 기반구조 간의 통신인 V2I를 지원하는 네트워크로써 다양한 서비스를 제공한다. 이에 학문적, 상업적으로 많은 관심을 받고 있다. 그러나 네트워크 기반의 기술인만큼 사용자의 프라이버시 침해가 큰 문제로 대두되고 있다. 이 중에서도 사용자의 익명성, 추적성, 객체인증에 관한 Location Privacy는 개발과정에서 큰 걸림돌이 되고 있다. 이에 본 논문에서는 VANET에서의 Location Privacy 보호에 대한 기술들의 개략적인 내용을 서술하고, 장단점을 분석하였다. Location Privacy 보호를 위한 기술에는 해쉬통합을 이용한 보호기술, MAC-체인을 이용한 보호기술, 그리고 세션 키 교환을 이용한 보호기술이 있다. 세 가지 기술 중에서 MAC-체인을 이용한 기술이 Location Privacy 보호에 가장 적합하다.

A Design and Implementation of a LOCAL-LOINC Mapping System for the Standardization of a Laboratory Code (진단검사코드 표준화를 위한 LOCAL-LOINC 코드 매핑 시스템의 설계 및 구현)

  • Song, Hyr-Ju;Ahn, Hoo-Young;Park, Young-Ho;Kim, Shine-Young;Kim, Hyung-Hoe
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2008.06c
    • /
    • pp.203-207
    • /
    • 2008
  • 본 논문에서는 의료기관의 검사코드인 LOCAL 코드(Local Code)를 LOINC 코드(Local Laboratory Result Code)와 매핑하기 위한 알고리즘을 구현하고, 이를 기반으로, LOCAL 코드의 매핑 및 입력을 지원하는 새로운 시스템을 제안한다. 이를 위해, 먼저, LOCAL 코드를 변환하여 LOINC의 여섯 가지 속성을 추출한 대응 코드로 생성한다. 추출한 대응코드는 LOINC 코드와 매핑하는 키 값이 된다. 대응코드와 LOINC 코드의 매핑은 각 속성을 우선순위에 따라 비교하는 과정을 포함하며, 매핑 결과 수에 따라 자동 매핑되거나, 상 하위 개념을 조합 또는 System 코드를 재검색하는 결과 최소화 단계를 수행한다. 본 연구에서는 매핑 알고리즘을 기반으로 LOINC 코드로 매핑 하고, 새로운 LOCAL 코드를 LOINC 코드로 입력할 수 있는 새로운 시스템을 구축하였다. 본 연구의 목표는 LOINC를 활용하여 방대한 진단검사 결과데이터를 표준화하고, 이를 통해 의료 기관 간 EMR을 실현하고 구축하는 기반요소를 마련하는데 있다. 본 연구를 통해, 국내 의료기관 간 검사 결과의 통합과 호환이 가능하게 할 것이며, 검사코드의 표준화를 위한 기반요소를 마련할 수 있을 것으로 기대한다.

  • PDF

Development of Bi-directional Grading Method for Uniform Easy-order System -Focused on Blouse for Adult Female- (유니폼의 이지오더 시스템을 위한 양방향 그레이딩 개발 -성인여성 블라우스를 중심으로-)

  • Choi, Young-Lim;Nam, Yun-Ja;Choi, Kueng-Mi
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.33 no.6
    • /
    • pp.860-868
    • /
    • 2009
  • To provide adequate fit for women over a range of sizes, the grading process should reflect their body dimensions. Current methods of creating sized garments are not addressing the need for a good or even an adequate fit for the easy-order system. This study suggests a grading rule allocating system that can improve the appropriateness of clothing for uniform easy-order system. Also, the study proposes a bi-directional grading method subdivided to horizontal and vertical direction. The grading rule allocating system suggested the size increments which improve the fitness of uniform. Using the 5th Size Korea data, the crosstabulation was conducted with 1305 females in the age group $20{\sim}49$ years, and the size increments including $155\sim165$ of height section and $79\sim94$ of bust section, was selected for easy-order system. Also, the bi-directional grading method subdivided in horizontal and vertical direction was followed by factor analysis based on the circumference and height. And the grading rules were calculated by regression analysis.

Clustered Tributaries-Deltas Architecture for Energy Efficient and Secure Wireless Sensor Network (무선 센서 네트워크에서 에너지 효율성과 보안성을 제공하기 위한 클러스터 기반의 Tributaries-Deltas)

  • Kim, Eun-Kyung;Seo, Jae-Won;Chae, Ki-Joon;Choi, Doo-Ho;Oh, Kyung-Hee
    • The KIPS Transactions:PartC
    • /
    • v.15C no.5
    • /
    • pp.329-342
    • /
    • 2008
  • The Sensor Networks have limitations in utilizing energies, developing energy-efficient routing protocol and secure routing protocol are important issues in Sensor Network. In the field of data management, Tributaries and Deltas(TD) which incorporates tree topology and multi-path topology effectively have been suggested to provide efficiency and robustness in data aggregation. And our research rendered hierarchical property to TD and proposed Clustering-based Tributaries-Deltas. Through this new structure, we integrated efficiency and robustness of TD structure and advantages of hierarchical Sensor Network. Clustering-based Tributaries-Deltas was proven to perform better than TD in two situations through our research. The first is when a Base Station (BS) notices received information as wrong and requests the network's sensing data retransmission and aggregation. And the second is when the BS is mobile agent with mobility. In addition, we proposed key establishment mechanism proper for the newly proposed structure which resulted in new Sensor Network structure with improved security and energy efficiency as well. We demonstrated that the new mechanism is more energy-efficient than previous one by analyzing consumed amount of energy, and realized the mechanism on TmoteSKY sensor board using TinyOS 2.0. Through this we proved that the new mechanism could be actually utilized in network design.

A Security SoC embedded with ECDSA Hardware Accelerator (ECDSA 하드웨어 가속기가 내장된 보안 SoC)

  • Jeong, Young-Su;Kim, Min-Ju;Shin, Kyung-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.7
    • /
    • pp.1071-1077
    • /
    • 2022
  • A security SoC that can be used to implement elliptic curve cryptography (ECC) based public-key infrastructures was designed. The security SoC has an architecture in which a hardware accelerator for the elliptic curve digital signature algorithm (ECDSA) is interfaced with the Cortex-A53 CPU using the AXI4-Lite bus. The ECDSA hardware accelerator, which consists of a high-performance ECC processor, a SHA3 hash core, a true random number generator (TRNG), a modular multiplier, BRAM, and control FSM, was designed to perform the high-performance computation of ECDSA signature generation and signature verification with minimal CPU control. The security SoC was implemented in the Zynq UltraScale+ MPSoC device to perform hardware-software co-verification, and it was evaluated that the ECDSA signature generation or signature verification can be achieved about 1,000 times per second at a clock frequency of 150 MHz. The ECDSA hardware accelerator was implemented using hardware resources of 74,630 LUTs, 23,356 flip-flops, 32kb BRAM, and 36 DSP blocks.

Mashup for Instant and Simple Search using OpenAPIs (OpenAPI를 이용하여 간결함과 즉시성을 가진 검색 매쉬업)

  • Hwang, Ki-Tae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.2
    • /
    • pp.41-49
    • /
    • 2011
  • This paper introduces a new search model which can retrieve information instantly and easily about a given search word on Internet and control search spaces diversely. In the existing web searches, because the user has to stop his work, run web browsers, connect to special internet sites, and type the search word by keyboard. it is a long way and not a simple way. Also the search result is too much. The user suffers difficulties of multiple searches for different categories such as dictionary, image, video clips, etc. The software implemented in this paper enables for the user to select search word simply at any documents on the screen and make search started by simply pressing CRTL key and left button of the mouse simultaneously. The software is a mash up style using the Open API which is provided by a web site and can be freely available in any other sites. By calling different Open APIs of several web sites, the mash-up software can integrate search functions of many different sites. We evaluate that the software implemented in this paper will be a good reference of mash-up as one with characteristics of easy and instant search, simple result, diversity of search category, and scalability of search functions.

A Study of Flexible Identity Design System (가변적 아이덴티티 시스템에 관한 고찰)

  • Kim, Min
    • Archives of design research
    • /
    • v.13 no.3
    • /
    • pp.303-312
    • /
    • 2000
  • Identity Design System, based on the principle of market economy, has developed over last half a century. The essence of identity program is to establish the corporate Image from dispersion to integral ion through design. There is no doubt that identity design became an inevitable necessity as a market In tool . The circumstance of corporate identity, however , has been changed since the revolution of telecommunication by computer which had an important effect upon today's market The development of computer communication allows people with different taste to achieve their needs from var ious kinds of information. Today's market is shitting from uniformity to diversity It is more difficult to create a corporate Image through conventional method. To meet the challenges of today's market, the communication of corporate identity will ultimately reflect the complexity of the market by adapting the flexible conoept of identity design. The level of flexibility in identity system should be determined depending on the management and market Eng strategy. Flexible Identity System (FIS) would be the best solution for some cases such as; a company with various fields, a company with sensitivity to the contemporary trend, and a company with an emotional appeal to consumers. FIS, with the capacity of a chameleon, can not only adopt the various circumstantial flanges, but also maintain the up-to-date corporate image .

  • PDF

An Area-Efficient Design of Merged TEA Block Cipher for Mobile Security (모바일 보안용 병합 TEA 블록 암호의 면적 효율적인 설계)

  • Sonh, Seungil;Kang, Min-Goo
    • Journal of Internet Computing and Services
    • /
    • v.21 no.3
    • /
    • pp.11-19
    • /
    • 2020
  • In this paper, a merged TEA block cipher processor which unifies Tiny Encryption Algorithm(TEA), extended Tiny Encryption Algorithm(XTEA) and corrected block TEA(XXTEA) is designed. After TEA cipher algorithm was first designed, XTEA and XXTEA cipher algorithms were designed to correct security weakness. Three types of cipher algorithm uses a 128-bit master key. The designed cipher processor can encrypt or decrypt 64-bit message block for TEA/XTEA and variable-length message blocks up to 256-bit for XXTEA. The maximum throughput for 64-bit message blocks is 137Mbps and that of 256-bit message blocks is 369Mbps. The merged TEA block cipher designed in this paper has a 16% gain on the area side compared to a lightweight LEA cipher. The cryptographic IP of this paper is applicable in security module of the mobile areas such as smart card, internet banking, and e-commerce.