• Title/Summary/Keyword: Certificate information management

Search Result 195, Processing Time 0.019 seconds

Approved Exporter Status in Korea (한국의 인증수출자 제도에 관한 법적 고찰)

  • Lee, Chang-Sook;Kim, Jong-Chill
    • International Commerce and Information Review
    • /
    • v.13 no.4
    • /
    • pp.351-373
    • /
    • 2011
  • Certificates of Origin(C/O) are necessary to gain benefits from preferential tariff treatment under the Free Trade Agreement(FTA). The C/O can be issued by issuing authorities or by exporters themselves. Recently, due to signed FTA such as Korean-EU FTA, issuance of self-declared C/O by exporters is increasing. In order to be qualified to issue self -declared C/O, exporters are required to acquire Approved Exporter status. An Approved Exporter is only required to present an invoice to substitute the certificate. The invoice contains an Approved Exporter number and a declaration that states the goods comply with the origin requirements. Either certification or notarization is not necessary. In result, the exporters are responsible for application of a preferential tariff under the self-declared C/O which issued incorrectly, even if it is not intentional. Therefore, in this paper, we studied authorization for Approved Exporter status and the practical use of its status. If companies obtain more Approved Exporter status, the effects of FTA would be maximized due to application of a preferential tariff under the C/O.

  • PDF

Public Key-Based Operator Authentication Mechanism for Access Control of Multi-Control Systems in OT Control Network (OT제어망에서 다중 제어시스템 접근통제용 공개키 기반 운용자 인증 방안)

  • Kim, Dae-Hwi;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.9
    • /
    • pp.64-75
    • /
    • 2022
  • The method of accessing multiple control systems in the OT control network centered on operation technology uses the operator authentication technology of each control system. An example is ID/PW operator authentication technology. In this case, since the OT control network is composed of multiple control systems, operator authentication technology must be applied to each control system. Therefore, the operator must bear the inconvenience of having to manage authentication information for each control system he manages. To solve these problems, SSO technology is used in business-oriented IT networks. However, if this is introduced into the OT control network as it is, the characteristics of the limited size of the OT control network and rapid operator authentication are not reflected, so it cannot be seen as a realistic alternative. In this paper, a public key-based authentication mechanism was newly proposed as an operator authentication technology to solve this problem. In other words, an integrated public key certificate that applies equally to all control systems in the OT control network was issued and used to access all control systems, thereby simplifying the authentication information management and making access to the control system more efficient and secure.

Study on WP-IBE compliant Mobile IPSec (WP-IBE 적용 Mobile IPSec 연구)

  • Choi, Cheong Hyeon
    • Journal of Internet Computing and Services
    • /
    • v.14 no.5
    • /
    • pp.11-26
    • /
    • 2013
  • In the wireless Internet, it is so restrictive to use the IPSec. The MIPv4 IPSec's path cannot include wireless links. That is, the IPSec of the wireless Internet cannot protect an entire path of Host-to-Host connection. Also wireless circumstance keeps a path static during the shorter time, nevertheless, the IKE for IPSec SA agreement requires relatively long delay. The certificate management of IPSec PKI security needs too much burden. This means that IPSec of the wireless Internet is so disadvantageous. Our paper is to construct the Mobile IPSec proper to the wireless Internet which provides the host-to-host transport mode service to protect even wireless links as applying excellent WP-IBE scheme. For this, Mobile IPSec requires a dynamic routing over a path with wireless links. FA Forwarding is a routing method for FA to extend the path to a newly formed wireless link. The FA IPSec SA for FA Forwarding is updated to comply the dynamically extended path using Source Routing based Bind Update. To improve the performance of IPSec, we apply efficient and strong future Identity based Weil Pairing Bilinear Elliptic Curve Cryptography called as WP-IBE scheme. Our paper proposes the modified protocols to apply 6 security-related algorithms of WP-IBE into the Mobile IPSec. Particularly we focus on the protocols to be applied to construct ESP Datagram.

The Recognition Comparison for the Utilization State of Smart Devices and Culinary Education Application Development of High School Students (고등학생의 스마트 기기 활용 실태와 조리교육 애플리케이션 개발에 대한 인식 비교 연구)

  • Kang, Keoung-Shim
    • Journal of Digital Convergence
    • /
    • v.10 no.11
    • /
    • pp.619-626
    • /
    • 2012
  • The purpose of this study is to compare and analyze the utilization state of smart devices and the recognition level of educational application development of the general high school and the specialized high school. Specialized high school students preferred the utilization of smart devices more and daily spent on the devices more time than general high school students. As for the learning field, language for the general high school and the certificate of qualification for the specialized high school were shown high. The merit of smart device utilization is the use of spare time and its infrastructure was most required. The most expected content is a video lecture for the general high school and cooperative learning for the specialized high school and the most satisfied point was mobility. The specialized high school students feel more necessity about the application development for culinary education and had a plan to utilize it more and more preferred practice videos. As for the food development areas, the general high school students hoped simple food and the specialized high school students did cooking technician food and they both hoped the application to be uploaded in portal sites and the department homepage. The application development for culinary education is required to focus simulation learning including practice videos and cooking recipes and add an evaluation function to check the academic achievement levels. It is required to provide the subject goals of each course and concrete information on solving problems. Contents including video, music, texts need to be attached to improve learning immersion. There should be the beginning and development of a lesson and the flow of arrangement and communication between main bodies of learning should be improved by utilization of SNS cooperative learning services.

Development of Standard Process for Private Information Protection of Medical Imaging Issuance (개인정보 보호를 위한 의료영상 발급 표준 업무절차 개발연구)

  • Park, Bum-Jin;Yoo, Beong-Gyu;Lee, Jong-Seok;Jeong, Jae-Ho;Son, Gi-Gyeong;Kang, Hee-Doo
    • Journal of radiological science and technology
    • /
    • v.32 no.3
    • /
    • pp.335-341
    • /
    • 2009
  • Purpose : The medical imaging issuance is changed from conventional film method to Digital Compact Disk solution because of development on IT technology. However other medical record department's are undergoing identification check through and through whereas medical imaging department cannot afford to do that. So, we examine present applicant's recognition of private intelligence safeguard, and medical imaging issuance condition by CD & DVD medium toward various medical facility and then perform comparative analysis associated with domestic and foreign law & recommendation, lastly suggest standard for medical imaging issuance and process relate with internal environment. Materials and methods : First, we surveyed issuance process & required documents when situation of medical image issuance in the metropolitan medical facility by wire telephone between 2008.6.1$\sim$2008.7.1. in accordance with the medical law Article 21$\sim$clause 2, suggested standard through applicant's required documents occasionally - (1) in the event of oneself $\rightarrow$ verifying identification, (2) in the event of family $\rightarrow$ verifying applicant identification & family relations document (health insurance card, attested copy, and so on), (3) third person or representative $\rightarrow$ verifying applicant identification & letter of attorney & certificate of one's seal impression. Second, also checked required documents of applicant in accordance with upper standard when situation of medical image issuance in Kyung-hee university medical center during 3 month 2008.5.1$\sim$2008.7.31. Third, developed a work process by triangular position of issuance procedure for situation when verifying required documents & management of unpreparedness. Result : Look all over the our manufactured output in the hospital - satisfy the all conditions $\rightarrow$ 4 place(12%), possibly request everyone $\rightarrow$ 4 place(12%), and apply in the clinic section $\rightarrow$ 9 place(27%) that does not medical imaging issuance office, so we don't know about required documents condition. and look into whether meet or not the applicant's required documents on upper 3month survey - satisfy the all conditions $\rightarrow$ 629 case(49%), prepare a one part $\rightarrow$ 416 case(33%), insufficiency of all document $\rightarrow$ 226case(18%). On the authority of upper research result, we are establishing the service model mapping for objective reception when image export situation through triangular position of issuance procedure and reduce of friction with patient and promote the patient convenience. Conclusion : The PACS is classified under medical machinery that mean indicates about higher importance of medical information therefore medical information administrator's who already received professional education & mind, are performer about issuance process only and also have to provide under ID checking process exhaustively.

  • PDF