• Title/Summary/Keyword: Certificate System

Search Result 577, Processing Time 0.035 seconds

Conceptual Design Strategy of Renewable Energy Application for Building Certification and Mandatory System (신재생에너지설비 건물설치 의무화 및 인증제를 고려한 용량설계 방안)

  • Lee, Kyoung-Ho;Lee, Dong-Won;Kown, Hyeok-Min;Lee, Chang-Jun
    • 한국태양에너지학회:학술대회논문집
    • /
    • 2011.11a
    • /
    • pp.99-104
    • /
    • 2011
  • This paper describes a design strategy at conceptual design stage using RETScreen software tool for building application of renewable energy resources. Currently, government and public buildings are required to adopt renewable energy systems with a minimum requirement for the amount of renewable energy supply. Meanwhile, there is a certificate program for private office buildings to enhance propagation of renewable energy systems. When considering application of renewable energy systems to a building, it is worthwhile developing a method to determine optimal design sizes of renewable energy systems. In the paper, a design strategy is introduced with a couple of case studies to determine optimal capacities of each renewable energy system in a building and suggest to use the method to evaluate the system for the building certificate program and the mandatory renewable target program. Objective functions considered in the study are initial system cost and reduction of CO2 emissions from the system. In the optimization study, it is assumed that solar thermal collectors are installed to satisfy solar fraction of 60%. Other renewable energy systems such as ground-source heat pump, solar PV and non-renewable systems such as electric chiller and gas-fired boiler are sized using an optimal sizing method with RETScreen suggested the authors previously.

  • PDF

Research of Real Time Mutual Authentication System in Wireless Network (무선 네트워크상에서 실시간 상호인증시스템에 관한 연구)

  • Jung, Don-Chul;Han, Seung-Jo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.11
    • /
    • pp.1996-2001
    • /
    • 2006
  • Open System Authentication Method, Shared Key Method, Mac Based Authentication Method are very hard to use in wireless network that needs security. So now, many researches have been performed about 802.1x and user authentication method applying PKI. but certificate verification protocol has been used abolished list called CRL since it's first usage of PKI, there were still has a problem about distribution point. This paper applied CVS to use CA direct not to use CRL and OSCP server in order to improve this problems. Also It suggested the system that can make authentication steps more shorter using authentication server and Mutual authentication system by public certificate(small size/low speed wireless terminal can access to wireless network fast and safely)

Secure Key Management Framework in USN Environment using Certificateless Public Keys (USN 환경에서 비인증서 공개키를 사용하는 보안키 관리 프레임워크)

  • Heo, Joon;Hong, Choong-Seon
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.6
    • /
    • pp.545-551
    • /
    • 2009
  • In this paper, we propose the secure key management framework to connect USN with different network. Although connected USN with different network has no CA (Certificate Authority), it is important to use public key based cryptography system because this network consists of numerous devices. The proposed mechanisms focus on device authentication and public/private key management without existing PKI system of IP network. To solve no CA and certificate problems, the IDC (Identity Based Cryptography) concept is adopted in our proposed mechanism. To verify the possibility of realization, we make an effort to implement the proposed mechanisms to real system. In the test bed, both USN and PLC network are connected to IP network; and proposed mechanisms are implemented to PLC and sensor devices. Through this test using the proposed mechanism, we met the similar performance with symmetric algorithms on key generation and update process. Also, we confirmed possibility of connection between different network and device authentication.

The Study on Improvement Plan of FTA Origin Information Management System (FTA 원산지정보 관리체계 개선방안에 관한 연구)

  • Jin, Byung-Jin
    • International Commerce and Information Review
    • /
    • v.18 no.2
    • /
    • pp.107-127
    • /
    • 2016
  • There has not been enough distribution of documentary evidence of origin at the stage of domestic transaction yet due to the exporter bias of interest in utilizing FTA and shortage of attracting their issues, etc. although about more ten years has passed since Korea-Chile FTA was running. Furthermore, in case of issued and distributed documentary evidence of origin, the accuracy was doubt, so it contains various problems like errors in the certificate of origin issued by the final exporter. Accordingly, this study was to find out the limitations of 'declaration of origin third party confirmation system' operated in order to solve problems of lacking the management ability of origin place of the domestic supplier and improve the accuracy of certificate of origin (comprehensive), and to investigate a method of improvement. To achieve this, this study was to suggest the institutional complementary plans for distribution activation and error prevention on the declaration of origin and introduction plan of loss prevention plan due to the errors in the certificate of origin that the final exporter did not intend in the domestic areas in order to support the use of FTA smoothly for our enterprises.

  • PDF

A Study on the Specialization of University Education about Healthcare Facility Design in USA (미국 대학에서 의료복지시설 디자인 교육 특성화에 대한 연구)

  • Moon, Changho
    • Journal of The Korea Institute of Healthcare Architecture
    • /
    • v.17 no.1
    • /
    • pp.7-14
    • /
    • 2011
  • This paper is intended to suggest some reference materials for future specialization of university education about healthcare facility design in Korea, by reviewing the degree systems and curriculum of 5 universities where architecture departments have specialized program for healthcare facility design in USA. Research method includes the navigation of related homepages, the e-mail contacts with the professors in charge, and the analysis of collected materials. Some conclusions can be summarized as following : Degrees of the specialized programs under concentration or track system are awarded as the same title as master program in the department of Architecture. Specialized education programs can be largely classified by concentration/track systems( Clemson University, University of Kansas and Arizona State University) which are operated independently in general and certificate system(Texas A&M University and Texas Tech University) which adds some healthcare related courses to general master program in the department of Architecture. As distinctive curriculum from 5 Universities, Clemson University which offers almost courses related to healthcare facility design, University of Kansas which provides internships(6 credits each) for summer term & fall semester of 2nd year, and Texas Tech University where certificate program is co-operated by architecture and nursing department can be mentioned. In order to pursuit the specialization of university education about healthcare facility design in the department of Architecture, it would be desirable to proceed it after setting the direction such as concentration, track or certificate system according to the various circumstances & conditions of the department concerned.

A Design of Smart Banking System using Digital Signature based on Biometric Authentication (바이오인증 기반의 전자서명을 이용한 스마트 뱅킹 시스템 설계)

  • Kim, Jae-Woo;Park, Jeong-Hyo;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.9
    • /
    • pp.6282-6289
    • /
    • 2015
  • Today, there is an increasing number of cases in which certificate information is leak, and accordingly, electronic finance frauds are prevailing. As certificate and private key a file-based medium, are easily accessible and duplicated, they are vulnerable to information leaking crimes by cyber-attack using malignant codes such as pharming, phishing and smishing. Therefore, the use of security token and storage toke' has been encouraged as they are much safer medium, but the actual users are only minimal due to the reasons such as the risk of loss, high costs and so on. This thesis, in an effort to solve above-mentioned problems and to complement the shortcomings, proposes a system in which digital signature for Internet banking can be made with a simply bio-authentication process. In conclusion, it was found that the newly proposed system showed a better capability in handling financial transitions in terms of safety and convenience.

Development plans of FTA Experts in Product Areas (상품분야 FTA 전문 인력 양성 방안)

  • LIM, Mok-Sam;CHOI, Mi-Soo
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.70
    • /
    • pp.159-179
    • /
    • 2016
  • Companies do not be resolved by the FTA services of external aid should be operational by assigning dedicated personnel inside the company. FTA is a choice, not an essential trade agreement requirements. If the exporter contracts to provide a certificate of origin in trade agreements, it shall issue a certificate of origin of goods originating management is performed. When considering the future trend of spreading wide FTA, it should be extended to one year to take advantage of the FTA Certificate of Origin environments utilizing a comprehensive environment for regional countries that require proof of origin between certain countries, such as current. FTA utilization of the future is to utilize the GVC(Global Value Chain) efficiently. In other words, the expansion of the consumer market and take advantage of an efficient production base across borders. These environmental changes are needed development of the FTA utilization promotion and FTA experts. The experts studying how to procure raw materials or intermediate goods exports in a variety of regional foreign countries, to meet the rules of origin is required for a successful FTA utilization. One of the objectives of Origin managers are qualified experts in the country of origin can take advantage of the FTA plan. Therefore, managers of origin shall collect their ability to expand the understanding and information about the industry as an international business perspective beyond the Certificate of Origin. In addition, it should be in their best learning expertise for the introduction and development of country of origin control system in an effort to effectively perform its international FTA utilization. Once the FTA is more widespread in the future and build a common origin information it must not be disconnected until the export enterprises from terminal manufacturers systematically. Therefore origin management is preferred by expanding the knowledge base of teaching and learning in the common sense to the universal subject of specialization from professional schools to promote the relevant departments so that they can be opened in a college or university. An FTA hub linking East and West, also need the confidence that in order to become a center of Glabal Supply Chain Using an FTA Certificate of Origin and stable environment for importers to import products from the country offers. Certificate of Origin and all of them thoroughly exporters and companies related to the administration of origin and should create an atmosphere that can effectively respond to the origin verification. Korea shall endeavor to elicit a geopolitical value (FTA Hub), as well as securing a competitive advantage in the global industry leverage, trading at a reasonable price competitive products thereby enhancing production and economic growth through the FTA.

  • PDF

Improving the reliability of Certificate bodies of Environmentally-Friendly Agricultural Products (친환경농산물 인증기관의 신뢰도 제고방안 - 민간인증기관 설문조사 결과를 바탕으로 -)

  • Shin, Y.K.;Park, J.K.
    • Journal of Practical Agriculture & Fisheries Research
    • /
    • v.17 no.1
    • /
    • pp.113-124
    • /
    • 2015
  • The purposes of this study is to draw up some measures for improving the reliability of certificate bodies of environmentally-friendly agricultural products in Korea. For the purpose, this study investigated the current states of certification system through a survey of the private certificate bodies. Based on the survey, the main goals of this study are as follows : First, the main reason of providing the certification services is the academic-industrial collaboration(21.7%) followed by the revenue seeking of the organizations (20.0%). Second, the average number of cases per private certificate bodies is 277 cases for 1,195 farms, and the average net revenue per authority is estimated as 16.84 million Won with the average total revenue of 262.09 million Won and the average total cost of 255.04 million Won. Third, in order to improve the reliability of the certificate bodies requires a variety of policy options.

The Secure Key Store to prevent leakage accident of a Private Key and a Certificate (인증서와 개인키 유출 방지를 위한 보안키 저장소 Secure Key Store)

  • Park, Young-Jin;Kim, Seon-Jong;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.1
    • /
    • pp.31-40
    • /
    • 2014
  • In Korea, the Public Key Infrastructure (PKI) has been introduced. For secure information transmission and identification, the electronic signature authorization system of a certificate-based is built, and then the service provide.The certificate is stored in location what users can easily access and copy. Thus, there is a risk that can be stolen by malware or web account hacking. In addition, private key passwords can be exposed by the logging tool, after keyboard security features are disabled. Each of these security weaknesses is a potential conduit for identity theft, property/asset theft, and theft of the actual certificates. The present study proposes a method to prevent the private key file access illegally. When a certificate is stored, the private key is encrypted by the dependent element of the device, and it is stored securely. If private key leakage occurs, the retrieved key could not be used on other devices.

Study on a Secure Authentication and Authorization Protocol based on Kerberos (커버로스 기반의 안전한 인증 및 허가 프로토콜 에 관한 연구)

  • 김은환;김명희;전문석
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.5C
    • /
    • pp.737-749
    • /
    • 2004
  • Kerberos authenticates clients using symmetric-key cryptography, and supposed to Oust other systems of the realm in distributed network environment. But, authentication and authorization are essential elements for the security. In this paper, we design an efficient and secure authentication/authorization mechanism by introducing the public/private-key and installing the proxy privilege server to Kerberos. In the proposed mechanism, to make a system more secure, the value of the session key is changed everytime using MAC(message authentication code) algorithm with the long-term key for user-authentication and a random number exchanged through the public key. Also, we reduce the number of keys by simplifying authentication steps. Proxy privilege server certifies privilege request of client and issues a privilege attribute certificate. Application server executes privilege request of client which is included a privilege attribute certificate. Also, a privilege attribute certificate is used in delegation. We design an efficient and secure authentication/authorization algorithm with Kerberos.