• Title/Summary/Keyword: 2단계 인증

Search Result 185, Processing Time 0.022 seconds

An Analysis of the Self-reliance Rate by Element according to the Implementation of Zero Energy Certification System in School Facilities (학교시설 제로에너지인증제 시행에 따른 요소별 자립률 분석)

  • Meang, Joon-Ho;Kim, Sung-Joon;Lee, Seung-Min;Ko, Hyun-Su
    • The Journal of Sustainable Design and Educational Environment Research
    • /
    • v.20 no.1
    • /
    • pp.19-28
    • /
    • 2021
  • The Ministry of Land, Infrastructure, and Transport (MOLIT) is implementing a zero-energy building (ZEB) certification to save energy for the building section and to accelerate the achievement of national greenhouse gases reduction goals in accordance with a new climate regime. In 2014, the MOLIT announced a plan for early activation of the ZEB, and in January 2016, the "Green Buildings Construction Support Act" was revised and established. In addition, the plan was established to gradually spread zero-energy buildings from the public sector in 2020 to the private sector by 2025. Therefore, this study analyzed the self-sufficiency rate of each energy factor according to the implementation of the zero energy building certification of school facilities that belong to the public sector and are included in the mandatory zero energy buildings from 2020.

Consideration on coexistence strategy of GM with non-GM, environmentally friend crops in South Korea (GM과 non-GM, 친환경작물의 공존을 위한 제도 보완의 필요성)

  • Lee, Shin-Woo
    • Journal of Plant Biotechnology
    • /
    • v.35 no.4
    • /
    • pp.245-256
    • /
    • 2008
  • The current legislation in South Korea clearly states that the tolerance threshold on the adventitious presence of GMO in environment-friendly agricultural products is 3.0% and no GM seed should be detected in their planting seed batches. To date, in Korea, there is no approved GM crop for commercial cultivation in field. However, several GM crops including rice, Chinese cabbage, potato and wild turf grass are currently under risk assessment for their environmental release. Also Korean government (Rural Development Administration, RDA) announced that 11 institutes including universities have been currently certified to carry out a risk assessment of GM crops. Meanwhile, the cultivated area and certified quantities of environment-friendly crops (organic, pesticide-free and low-pesticide) are sharply increasing every year according to the report of National Agricultural Products Quality Management Service (NAQS). In detail, in 2007, the certified quantities of environment-friendly agricultural products were elevated up to 100-fold for organic, 171-fold for pesticide-free and 2,324-fold for low-pesticide crops when compared with those in 1999. The total certified quantity of environment-friendly cereal crops in 2007 was equivalent to 6.4% of total production of cereal crops. Moreover, 24% of total production of root and tuber crops such as potato and sweet potato were certified for environment-friendly agricultural products. In these circumstances, I strongly suggest that current legislations on GM crop's safety management should be revised to include strategies for the coexistence of GM with non-GM crops, especially environment-friendly crops before GM crop is approved to be cultivated for commercialization. Since all types of crops are grown in an open environment, the adventitious presence of GM crops among non-GM crops is inevitable if appropriate measures for coexistence are not established for species by species such as isolation distance, workable management measures to minimize admixture.

A Study on the Application Method of Digital Signature to International e-Trade over the Internet (인터넷 전자무역에서의 전자서명 적용방안 연구)

  • Park, Sang-Hwan;Lee, Seok-Lae;Park, Chu-Hwan
    • The Journal of Society for e-Business Studies
    • /
    • v.9 no.3
    • /
    • pp.227-241
    • /
    • 2004
  • With the expansion of internet usage and the advanced technology for information and communication, the international e-Trade environment gradually migrates from the VAN/EDI to the global Internet-based e-Traed on an ebXML framework. In an effort to provide a Internet-based e-Trade environment with a security and trust, this paper analyzes security components and proposed the SSL and ebXML security technologies in order to assure of the trust and security over Internet-based e-Trade. In addition, this paper presents 3-phase methodology to realize the secure and trustworthy Internet-based e-Trade. In summary, as the first phase, the e-Trade business processes are re-engineered and the digital signature council for mutual recognition is orgainzed. And as the second phase, the Internet-based e-Trade system and the concerned digital signature technology are implemented. Finally as third phase, the PKI mutual recognition agreement is signed by parties concerned and then the Internet-based e-trade business is started. Furthermore, this paper presents the promising Internet-based e-Trade models where the digital signature can be applied.

  • PDF

Image-based 3D Face Modeling (영상기반 3차원 얼굴 모델링)

  • 민경필;전준철;박구락
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.04c
    • /
    • pp.169-171
    • /
    • 2003
  • 현실감 있는 얼굴 모델을 생성하기 위한 방법은 70년대부터 계속되었지만, 얼굴 구조의 복잡성, 색상과 텍스처의 다양한 분포, 잔주름과 같은 미세한 부분을 표현하기 어렵다는 정들로 인해 아직까지도 계속 연구되어지고 있다. 본 논문은 기존의 하드웨어 의존적인 3차원 얼굴 모델을 생성 방법이 아닌 2차원 얼굴 영상만으로 얼굴 모델을 생성하는 방법을 제시한다. 연구 수행 단계는 크게 얼굴 영역 검출 과정과 얼굴 모델링 과정으로 나뉘어지며, 얼굴 영역 검출을 위해 정규화된 TS 색상값과 얼굴의 피부색에 대한 평균과 공분산을 이용한 마할라노비스 거리 측정법을 이용한다. 얼굴 모델링 과정에서는 2차원 영상으로부터 3차원 정보를 추출한 뒤 일반 얼굴 모델에 변형을 주어 모델을 생성한다. 보다 현실감 있는 모델을 생성하기 위해 텍스쳐 매핑 기법을 추가한다. 본 연구를 통해 생성되는 얼굴 모델은 아바타 생성, 화상회의, 인증 시스템과 같은 분야에 적용 가능하며, 입력 영상에 대한 제약점을 줄이고 또한 사람의 손이 거치지 않고 전체적으로 자동화되어 처리할 수 있는 시스템을 제안한다.

  • PDF

Analysis of Power Efficiency in according to S-MAC attack in the Sensor Network (센서네트워크에서 S-MAC 공격에 따른 전력 효율성 분석)

  • Hong, Jin-Keun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.2
    • /
    • pp.345-350
    • /
    • 2009
  • In this paper, it is reviewed vulnerability of security in S-MAC communication protocol of sensor network, and analyzed in the respect of power efficiency, which is consumed at each stage of communication procedure in according to vulnerability of denial of service. Therefore, from research results, it can be induced the need of authentication scheme, which is considered reliability, efficiency and security of normal S-MAC communication.

Analysis of the Effect of ISO 9000 Certification Based on Crosby's Quality Management Maturity Grid (국내 제조업체의 ISO 9000 인증취득 효과분석 -크로스비의 품질경영 성숙단계의 관점에서-)

  • 홍성근;류문찬
    • Journal of Korean Society for Quality Management
    • /
    • v.26 no.2
    • /
    • pp.1-16
    • /
    • 1998
  • The effect of ISO 9000 jcertification for quality management is investigated. 213 domestic manufacturing companies which had been certified more than one and half year ago were selected to send the questionnaires for a field survey. Among them 89 were returned. Crosby's Quality Management Maturity Grid' is utilized for analyzing the effect of ISO 9000 certification aquistion. Comparisons for the QM maturity level are made between before- and after-aquisition. It is shown that, on the average, the QM maturity level had been increased from awakening (stage 2) to the mid point of enlightenment(stage 3) and wisdom(stage 4).

  • PDF

무인이동체 드론의 취약점분석 및 대응기술 연구 동향

  • Kim, Myoungsu;You, Ilsun;Yim, Kangbin
    • Review of KIISC
    • /
    • v.30 no.2
    • /
    • pp.49-57
    • /
    • 2020
  • 군사 등의 특수 목적으로만 사용되었던 무인비행체 드론이 최근 상용 수준의 간결한 구조와 저가화가 가능해지면서 여러 제조업체를 통하여 민간분야의 다양한 응용에 활용 가능함을 증명하고 있다. 그러나 제조업체들 간의 시장 우위 선점을 위한 과열 경쟁으로 인하여 보안 안전성 검증 단계를 거치지 않은 드론과 이에 수반되는 애플리케이션이 시장에 바로 출시되면서 이들이 우리 사회를 향한 공격도구로 활용될 수 있다는 새로운 잠재적 위협이 우려되고 있다, 이와 관련하여 현재 드론과 애플리케이션과의 연결 및 데이터 통신 과정에서 완성도가 낮은 접근제어 기술이나 암호화되지 않은 통신방식을 비롯하여 드론 내부 소프트웨어의 코딩 상의 문제점 등에 의하여 다양한 취약점이 노출되고 있는 상태이다. 이러한 취약점들로 인하여 드론의 인증 해제 및 하이재킹을 통한 불법 영상촬영이나 개인정보의 유출 등을 비롯하여 특정 목표물을 향한 드론의 고의적 추락 등이 발생할 경우 재산 피해뿐만 아니라 인명 피해까지 발생할 수 있다. 특히, 현재의 드론 응용은 초기단계여서 향후 다양한 응용과 유관 기술들이 폭넓게 전개되어야 하는 시점에서 이러한 사고 가능성은 매우 심각하게 인식되어야 할 것이다. 더구나 제4차 산업혁명 시대의 드론은 비상시를 위한 다이나믹 모바일 게이트웨이 역할까지도 수행하여야 하는 환경에서 악의적인 행위는 전체 사회로 확산될 우려도 있으므로 미래 사회의 드론을 위한 안전문제는 매우 시급하고 중대하다고 할 수 있다. 이에 본 고에서는 현재까지 발표된 드론에 대한 다양한 보안위협을 조사하고 이러한 보안 위협을 요소별로 분류하여 정리하였다. 본 기고가 간단하게나마 정리한 내용을 통하여 다양한 보안위협에 대한 대응기술을 준비하기 위한 시발점이 되었으면 한다.

Measures for Training Military Information Security Professional Personnel for Cyber Security (사이버 안보를 위한 군(軍) 정보보호 전문인력 양성방안)

  • Lee, Kwang-ho;Kim, Heung-Taek
    • Convergence Security Journal
    • /
    • v.17 no.2
    • /
    • pp.145-151
    • /
    • 2017
  • The Cyberspace of the Republic of Korea Army is continuously threatened by enemies. Means for responding to such cyber threats are ultimately Military information security professional personnel. Currently, however, there are only a handful of advanced information security professional persons in Republic of Korea Army, and a lack of systematic training is inadequate. Therefore, in this thesis, we surveyed the information security professional human resource policies of USA, UK, Israel, and Japan. In addition, the policy to train professional human resources specialized in defense cyber security, we proposed training of specialist talent of 4 steps and medium and long term plan, step-by-step training system sizing, introduction of certification system.

User authentication using touch positions in a touch-screen interface (터치스크린을 이용한 터치 위치기반 사용자 인증)

  • Kim, Jin-Bok;Lee, Mun-Kyu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.1
    • /
    • pp.135-141
    • /
    • 2011
  • Recent advances in mobile devices and development of various mobile applications dealing with private information of users made user authentication in mobile devices a very important issue. This paper presents a new user authentication method based on touch screen interfaces. This method uses for authentication the PIN digits as well as the exact locations the user touches to input these digits. Our method is fully compatible with the regular PIN entry method which uses numeric keypads, and it provides better usability than the behavioral biometric schemes because its PIN registration process is much simpler. According to our experiments, our method guarantees EERs of 12.8%, 8.3%, and 9.3% for 4-digit PINs, 6-digit PINs, and 11-digit cell phone numbers, respectively, under the extremely conservative assumption that all users have the same PIN digits and cell phone numbers. Thus we can guarantee much higher performance in identification functionality by applying this result to a more practical situation where every user uses distinct PIN and sell phone number. Finally, our method is far more secure than the regular PIN entry method, which is verified by our experiments where attackers are required to recover a PIN after observing the PIN entry processes of the regular PIN and our method under the same level of security parameters.

An Improved High-Performance Protocol for Security Vulnerability of GSM based on SIM Card (SIM 카드 기반 보안 취약성을 개선한 고성능 GSM 보안 프로토콜)

  • Kim, Hee-Jung;Jeon, Ha-Yong;Lee, Ju-Hwa;Jung, Min-Soo
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.7
    • /
    • pp.902-911
    • /
    • 2007
  • GSM platform is a hugely successful wireless technology and an unprecedented story of global achievement. In less than ten years since the first GSM network was commercially launched, it became the world's leading and fastest growing mobile standard, using over 1 billion GSM subscribers across more than 200 countries of the world. GSM platform evolved into 3th generation mobile communication which includes not only voice call services but also the international roaming and various kinds of the multimedia services. GSM is an essential element techniques a safe data transmission and a personal private protection while support services. However, a crypto algorithm and a secure protocol for a safe data communication using GSM are indicating various kinds of problems. In this paper, we propose a more safer and more efficient authentication protocol in 3th generation network through analysis of GSM security mechanism of 2th/2.5th generation. This security protocol offers enforced security efficiency by using user verification between SIM/ME and reduction of authentication and key agreement step between SIM/ME/AuC.

  • PDF