• Title/Summary/Keyword: Authorization System

Search Result 240, Processing Time 0.025 seconds

A study on the on-the-spot survey of Road occupation Information using mobile techniques (모바일 기술을 활용한 도로점용민원 현장조사 방안 연구)

  • Kim, Byung-Kon;Kim, Jin-Uk;Jeong, Seong-Yun;Kim, Young-Jin;Kim, Tae-Hak
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • 2007.11a
    • /
    • pp.832-835
    • /
    • 2007
  • The purpose of this study is to suggest the on-the-spot survey method of road occupation information. The on-the-spot survey method is proposed through the analysis of information searching function, document and process. The decision of road occupation permission and the grasp of illegal occupation status are closely connected with national rights and interests. To keep the road occupation permission and illegal occupation status, the easy acquisition of road occupation information is very important. But the person in charge of road occupation have a difficulty in obtaining occupation information because that information is still managed by paper drawing. Accordingly. this study develop the on-the-spot survey tool of road occupation using the occupation information that is managed by Construction Authorization & Permission System and the mobile techniques like UMPC. As the result of this study. the efficiency on the authorization. permission. and public grievance of construction project has improved

  • PDF

An Off-line Dictionary Attack on Command Authorization in TPM and its Countermeasure (TPM에서 명령어 인가에 대한 오프라인 사전 공격과 대응책)

  • Oh, Doo-Hwan;Choi, Doo-Sik;Kim, Ki-Hyun;Ha, Jae-Cheol
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.4
    • /
    • pp.1876-1883
    • /
    • 2011
  • The TPM is a hardware chip for making a trusted environment on computing system. We previously need a command authorization process to use principal TPM commands. The command authorization is used to verify an user who knows a usage secret to TPM chip. Since the user uses a simple password to compute usage secret, an attacker can retrieve the password by evasdropping messages between user and TPM chip and applying off-line dictionary attack. In this paper, we simulate the off-line dictionary attack in real PC environment adopted a TPM chip and propose a novel countermeasure to defeat this attack. Our proposed method is very efficient due to its simplicity and adaptability without any modification of TPM command structures.

Main/Sub Device Authentication and Authorization Protocol in Ubiquitous Office Network (유비쿼터스 오피스 네트워크에서의 Main/Sub 디바이스 인증/인가 프로토콜)

  • Moon, Jong-Sik;Lee, Im-Yeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.5
    • /
    • pp.105-118
    • /
    • 2009
  • In modern society, as the rapid development of IT technology combined with the computer-based high-speed communication networks makes it possible to provide a wide spectrum of services and devices, we have been confronting a new cultural transformation era, referred to as the information society. However, the requirements to be considered in security aspect have became more complicated and diversified, and there remains the same security weaknesses as in the existing media or protocol. Particularly, the office network device with roaming is susceptible to the different kinds of attacks such as terminal hacking, virus attacks, and information leakage because the computing capacity is relatively low and the loading of already developed security functions is difficult. Although developed as one solution to this problems, PKI security authentication technology isn't suitable for multi-domain environments providing uonments proffice network service, and so the development of a novel authentication system is needed. Therefore, in this paper researched the roaming and device authentication/auth for multitechnology using an ID-based public key, authorization ticket, and Sub-device ticket with a purpose to contribute to the development of the secured and efficient technology.

A new satellite CAS using password-based protocol (패스워드 기반 프로토콜을 이용한 새로운 위성 한정 수신 시스템)

  • Kim, Young-Soo;Sohn, Ki-Wook;Yang, Hyung-Kyu;Won, Dong-Ho
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.12
    • /
    • pp.3597-3605
    • /
    • 1999
  • We introduce a new satellite Conditional Access System(CAS) that a subscriber could watch a pay-TV knowing only his or her identity and password, without using a smart card. For this new system, two password-based protocols are presented which not only share a session key and authenticate each other but also download an authorization key. This system has some merits: First, compared with current systems, it reduces the amount of computations by eliminating the AK-encryption module in SMS(Subscriber Management System) and simplifying the receiver's CW-decryption process. Second, since this system does not need an expensive Card Adaptive Device(CAD), it can reduce costs. finally it provides descrambler independence allowing it to be used through any TV set-top box that includes a descrambler, unlike the current system that a descrambler is linked with a smart card.

  • PDF

The Extended Authentication Protocol using E-mail Authentication in OAuth 2.0 Protocol for Secure Granting of User Access (OAuth 2.0 프로토콜에서 E-mail을 이용한 사용자 권한 인증)

  • Chae, Cheol-Joo;Choi, Kwang-Nam;Choi, Kiseok;Yae, Yong-Hee;Shin, YounJu
    • Journal of Internet Computing and Services
    • /
    • v.16 no.1
    • /
    • pp.21-28
    • /
    • 2015
  • Currently there are wide variety of web services and applications available for users. Such services restrict access to only authorized users, and therefore its users often need to go through the inconvenience of getting an authentication from each service every time. To resolve of such inconvenience, a third party application with OAuth(Open Authorization) protocol that can provide restricted access to different web services has appeared. OAuth protocol provides applicable and flexible services to its users, but is exposed to reply attack, phishing attack, impersonation attack. Therefore we propose method that after authentication Access Token can be issued by using the E-mail authentication. In proposed method, regular user authentication success rate is high when value is 5 minutes. However, in the case of the attacker, the probability which can be gotten certificated is not more than the user contrast 0.3% within 5 minutes.

Secure QoS Billing System Using Audit Trail Subsystem Design & Implementation (감사 추적 시스템 설계 및 구현을 통한 안전한 QoS 빌링 시스템)

  • Park, U-Chul;Kim, Jeong-Nyeo;Lee, Byeong-Ho
    • The KIPS Transactions:PartC
    • /
    • v.8C no.5
    • /
    • pp.597-606
    • /
    • 2001
  • In this paper, we propose the delay sensitive traffic and a high bandwidth QoS service in order to supply real-time traffic such as VoIP, multimedia service. We use IntServ over DiffServ network to supply end-to-end QoS service in the IETF. We define the proposed QoS services which are Best, Good, Default service. We analyze the performance using NS simulator with end to end QoS service in IntServ over DiffServ network. The proposed billing system uses the Accounting, Authentication, Authorization (AAA) functions of RADIUS protocol and proposes the dynamic pricing method according to network usage state using end-to-end QoS of IntServ over DiffServ network. In order to secure billing system, we design and implement audit trail system by the IEEE POSIX.1E standard.

  • PDF

Comparison of Internal and External Frameworks for Units on Magnets in Elementary Science Textbooks First Developed by the Authorization System (검정제에 의해 최초 개발된 초등과학교과서들의 자석 단원에 대한 내외적 체제 비교)

  • Seongsoo, Jeon
    • Journal of The Korean Association For Science Education
    • /
    • v.42 no.5
    • /
    • pp.525-542
    • /
    • 2022
  • The purpose of this study is to comparatively analyze the internal and external frameworks of elementary science textbooks, which first appeared as the authorization system of elementary science textbooks changed from the national government system. In order to confirm the purpose of the authorization system to support the development of diverse and creative textbooks, this study compared 7 authorized textbooks with the national textbook developed as the 'Use of Magnets' unit of the 2015 revised science curriculum. In this study, the textbook's framework was largely divided into an external framework and an internal framework for the 'Use of Magnets' unit of elementary science textbooks, and quantitative and qualitative analyses were conducted in parallel according to each subcategory. According to the research results, in the external framework of textbook units, all textbooks had the same structure: unit introduction, scientific inquiry, creative convergence, unit arrangement, and scientific reading materials. The framework in the 'Use of Magnets' unit of the 7 types of authorized textbooks was found to have some differences according to the textbook development team's interpretation of the curriculum achievement standards and many commonalities that maintained the framework in the national textbooks. In addition, the characteristics of each textbook were clearly revealed in some areas not specified in curriculum such as unit introduction activities and science reading materials, a meaningful change was also found in that the level of inquiry activity was classified and operated in response to the uniform inquiry activity operation of the existing government textbooks.

E-mail Sending-Server Authorization Method using a Distance Estimation Algorithm between IP Addresses for Filtering Spam (스팸메일 차단을 위해 IP 주소간 거리 측정 알고리즘을 이용하는 전자우편 발송서버의 권한확인 방법)

  • Yim Hosung;Shim Jaehong;Choi Kyunghee;Jung Gihyun
    • The KIPS Transactions:PartC
    • /
    • v.12C no.5 s.101
    • /
    • pp.765-772
    • /
    • 2005
  • In this paper, we propose E-mail sending-server authorization method using a distance estimation algorithm between W addresses to check whether the E-mail sending server is registered in the domain of mail sending server or belongs to the domain for filtering spam mail. This method utilizes the distance between the IP address of sending server and IP addresses registered in the DNS to figure out that the E-mail sending server exists in the domain to filter spam mail. The experimental result of applying the proposed algorithm to sample E-mails gathered in a large size laboratory says that 88 percents of legitimate E-mails and only 10 percents of spam mails are sent by servers in the same domains of senders. The algorithm may be effectively used to block spam mails sent by servers outside of the domains of mail senders. It may be also hired as a temporary E-mail protecting system until the standard E-mail authorization protocol is fully deployed.

A Study of the Damage and the Countermeasure by Identification Card Loss (신분증 분실에 따른 피해 및 대응책에 관한 연구)

  • Lee, Younggyo;Ahn, Jeonghee
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.3
    • /
    • pp.53-64
    • /
    • 2017
  • Korean Identification card or driver license is usually used to verify one's identity in Korea. These are also used as an adult certification. Since the form of these ID card is an analog and it needs to be checked with naked eyes, it might be used maliciously. Someone who's got someone else's ID card can do other things. Therefore, it must be reported rapidly when ID card is lost or stolen. The most serious problem might be occurred when they do not recognize and report the loss. They might suffer from pecuniary or mental damage such as opening a mobile phone service, providing loan or credit card, opening a personal checking account, etc. Thus, this study suggests and compares the ways of avoiding these problems. First, the most effective way is to send the authorization code via mobile phones in consideration of build-up period and cost. The person in charge of business processing department using ID card sends the authorization code via registered mobile phone. The owners submits it to the person and their identifications are confirmed. Next effective way is that the person in charge of business processing department using ID card sends text messages via registered mobile phone. Lastly, the most ineffective way is to introduce and implement the electronic ID card ultimately even though it is expensive and takes a long time to build up the system.

A Change of U.S. Ballistic Missile Defense Strategy (미국 탄도미사일방어 전략의 변화)

  • Park, Tae-Yong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.371-372
    • /
    • 2017
  • The United States has built a missile defense system from the Cold War era, but since the end of the Cold War era, there have been many changes in international situation and threats. The forces of power divided between the United States and the Soviet Union have become increasingly threatened by China's willingness to expand its external influence, declaration of strong Russia and North Korea and Iran's nuclear armament and advanced ballistic missile technology. In response to this threat change, the Missile Defense Agency(MDA) has established strategies and policies, but its parent law has not been revised. United States changed to the FY2017 National Defense Authorization Act (FY2017 NDAA) including changed missile defense strategy. In this paper, I check US ballistic missile defense strategies included in the FY2017 NDAA and compare what changes have been made in existing strategies.

  • PDF