• 제목/요약/키워드: Certificate information management

검색결과 195건 처리시간 0.025초

Certification Status Verification System Implementation for Communication of Domain with CSMS (CSMS와 도메인과의 통신을 이용한 인증서 상태 검증 시스템 구현)

  • Lee, Chong-Ho;Lee, Yong-Jun;Kim, Hyun-Chul;Oh, Hae-Seok
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 한국정보처리학회 2003년도 춘계학술발표논문집 (하)
    • /
    • pp.2077-2080
    • /
    • 2003
  • 일반적으로 기존의 도메인으로부터 인증서를 검증하는 방법은 CRL(Certificate Revocation List), OCSP(Online Certificate Status Protocol), Freshest CRL, Delta CRL등이 있으나 CRL 검증 방식에 대해서 여러 단점이 부각되었다. 현재 CRL 검증 방법에 대해서 효율적으로 검증하기 위한 방안이 OCSP, Delta CRL등이 제시하여 서비스를 하고 있는 실정이다. 피러나 이런 검증 서비스 시스템에도 한계성이 드러나게 되었고 그 단점을 보완하기 위한 검증 시스템을 채택하여 기존의 인증서 검증 서비스보다 효율적이고 안정적인 시스템을 구현하기 위해 CSMS(Certificate Status Management Server)를 제시한다. CSMS는 OCSP와 같이 실시간으로 검증과 빠른 서비스로 USER에게로의 응답을 위한 서비스를 제공함으로써 전자상거래를 통한 트랜젝션에 적합한 시스템을 위한 것이다.

  • PDF

A Design and Implementation of Genuine Quotation System of Black Pigs Using UHF RFID (UHF RFID를 활용한 흑돼지 진품인증시스템 설계 및 구현)

  • Ko, Seok-Yong;Kim, Hyu-Chan;Kim, Hyung-Soo
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • 제4권2호
    • /
    • pp.93-100
    • /
    • 2008
  • After free trade, it is increasing to import crops, aquatic products, and livestock which are produce in a foreign land. But it is affect negatively to trust relationships and markets of Jeju's foods because of breaking it out that foreign productions exchange domestic. Therefore, this paper designed and implemented the Genuine Quotation system of Black pigs using UHF RFID. This system is developed for distinguishing spuriousness, then searching information of the product through EPC ONS in EPCIS to print within a screen. Moreover, this intuitional and efficient system is constructed by connecting various sensors and lights. It can be contributed income increase thorough the security for the quality authority of the agricultural & stockbreeding products with FCS, FCG Certificate and the genuine certificate of the black pig which is the one of most typical agricultural & stockbreeding products in the pure Green Province, Jeju.

Secure Management Method for Private Key using Smartphon's Information (스마트폰 고유정보를 이용한 안전한 개인키 관리 방안)

  • Kim, Seon-Joo
    • The Journal of the Korea Contents Association
    • /
    • 제16권8호
    • /
    • pp.90-96
    • /
    • 2016
  • The 3390 million people, around 83% of the adult population in Korea use smartphone. Although the safety problem of the certificate has been occurred continuously, most of these users use the certificate. These safety issues as a solution to 'The owner of a mobile phone using SMS authentication technology', 'Biometric authentication', etc are being proposed. but, a secure and reliable authentication scheme has not been proposed for replace the certificate yet. and there are many attacks to steal the certificate and private key. For these reasons, security experts recommend to store the certificate and private key on usb flash drive, security tokens, smartphone. but smartphones are easily infected malware, an attacker can steal certificate and private key by malicious code. If an attacker snatchs the certificate, the private key file, and the password for the private key password, he can always act as valid user. In this paper, we proposed a safe way to keep the private key on smartphone using smartphone's unique information and user password. If an attacker knows the user password, the certificate and the private key, he can not know the smart phone's unique information, so it is impossible to use the encrypted private key. Therefore smartphone user use IT service safely.

A Novel Electronic Voting Mechanism Based on Blockchain Technology

  • Chuan-Hao, Yang;Pin-Chang Su;Tai-Chang Su
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제17권10호
    • /
    • pp.2862-2882
    • /
    • 2023
  • With the development of networking technology, it has become common to use various types of network services to replace physical ones. Among all such services, electronic voting is one example that tends to be popularized in many countries. However, due to certain concerns regarding information security, traditional paper voting mechanisms are still widely adopted in large-scale elections. This study utilizes blockchain technology to design a novel electronic voting mechanism. Relying on the transparency, decentralization, and verifiability of the blockchain, it becomes possible to remove the reliance on trusted third parties and also to enhance the level of trust of voters in the mechanism. Besides, the mechanism of blind signature with its complexity as difficult as solving an elliptic curve discrete logarithmic problem is adopted to strengthen the features related to the security of electronic voting. Last but not least, the mechanism of self-certification is incorporated to substitute the centralized certificate authority. Therefore, the voters can generate the public/private keys by themselves to mitigate the possible risks of impersonation by the certificate authority (i.e., a trusted third party). The BAN logic analysis and the investigation for several key security features are conducted to verify that such a design is sufficiently secure. Since it is expected to raise the level of trust of voters in electronic voting, extra costs for re-verifying the results due to distrust will therefore be reduced.

Secure Key Management Framework in USN Environment using Certificateless Public Keys (USN 환경에서 비인증서 공개키를 사용하는 보안키 관리 프레임워크)

  • Heo, Joon;Hong, Choong-Seon
    • Journal of KIISE:Information Networking
    • /
    • 제36권6호
    • /
    • pp.545-551
    • /
    • 2009
  • In this paper, we propose the secure key management framework to connect USN with different network. Although connected USN with different network has no CA (Certificate Authority), it is important to use public key based cryptography system because this network consists of numerous devices. The proposed mechanisms focus on device authentication and public/private key management without existing PKI system of IP network. To solve no CA and certificate problems, the IDC (Identity Based Cryptography) concept is adopted in our proposed mechanism. To verify the possibility of realization, we make an effort to implement the proposed mechanisms to real system. In the test bed, both USN and PLC network are connected to IP network; and proposed mechanisms are implemented to PLC and sensor devices. Through this test using the proposed mechanism, we met the similar performance with symmetric algorithms on key generation and update process. Also, we confirmed possibility of connection between different network and device authentication.

A Design of Certificate Management Method for Secure Access Control in IoT-based Cloud Convergence Environment (IoT기반 클라우드 융합환경에서 안전한 접근제어를 위한 인증서 관리기법 설계)

  • Park, Jung-Oh
    • Journal of Convergence for Information Technology
    • /
    • 제10권7호
    • /
    • pp.7-13
    • /
    • 2020
  • IoT which is the core IT of the 4th industrial revolution, is providing various services from users in the conversion with other industries. The IoT convergence technology is leading the communication paradigm of communication environment in accordance with the increase of convenience for users. However, it is urgently needed to establish the security measures for the rapidly-developing IoT convergence technology. As IoT is closely related to digital ethics and personal information protection, other industries should establish the measures for coping with threatening elements in accordance with the introduction of IoT. In case when security incidents occur, there could be diverse problems such as information leakage, damage to image, monetary loss, and casualty. Thus, this paper suggests a certificate management technique for safe control over access in IoT-based Cloud convergence environment. This thesis designed the device/user registration, message communication protocol, and device renewal/management technique. On top of performing the analysis on safety in accordance with attack technique and vulnerability, in the results of conducting the evaluation of efficiency compared to the existing PKI-based certificate management technique, it showed about 32% decreased value.

A Study on Authentication and Authorization on Entity in Grid (Grid 환경에서 엔티티 인증과 권한부여에 관한 연구)

  • Kug, Joung-Ook;Lee, Jae-Kwang
    • The KIPS Transactions:PartC
    • /
    • 제10C권3호
    • /
    • pp.273-280
    • /
    • 2003
  • When an existing user authorization systems in Grid access many user to local system and subject DN (Distinguished Name) in a user-proxy authenticate and ID in local system is one-to-one mapping, they have difficulties in ID management, memory resource management and resource management. At this, a variety of subject DN is shared of one local ID in an existing Grid. But this faces many difficulties in applying all requirements for many Grid users. Thus, we suppose user authorization system based on a certificate not them based on ID in this paper. That is, we add user's access level to extension field in a certificate, and make a supposed authorization system decide access limitation level on resources instead of an existing ID mapping methods.

Trusted Certificate Validation Scheme for Open LBS Application Based on XML Web Services

  • Moon, Ki-Young;Park, Nam-Je;Chung, Kyo-Il;Sohn, Sung-Won;Ryou, Jae-Cheol
    • Journal of Information Processing Systems
    • /
    • 제1권1호
    • /
    • pp.86-95
    • /
    • 2005
  • Location-based services or LBS refer to value-added service by processing information utilizing mobile user location. With the rapidly increasing wireless Internet subscribers and world LBS market, the various location based applications are introduced such as buddy finder, proximity and security services. As the killer application of the wireless Internet, the LBS have reconsidered technology about location determination technology, LBS middleware server for various application, and diverse contents processing technology. However, there are fears that this new wealth of personal location information will lead to new security risks, to the invasion of the privacy of people and organizations. This paper describes a novel security approach on open LBS service to validate certificate based on current LBS platform environment using XKMS (XML Key Management Specification) and SAML (Security Assertion Markup Language), XACML (extensible Access Control Markup Language) in XML security mechanism.

Korea's Logistics Education and Certification System to Support Globalization (글로벌 시대의 물류전문인력 육성 과제)

  • 안승범
    • Journal of Korea Port Economic Association
    • /
    • 제17권2호
    • /
    • pp.89-110
    • /
    • 2001
  • Recent trends in globalization and informatization underscore the importance of logistics. As a result, there is a need for skilled and specialized logisticians. Third Party Logistics (TPL) and Supply Chain Management (SCM) require logisticians with a broad base of knowledge in areas such as multimodal transport, international trade, information technology computers, finance, operations management, etc. This study conducted a survey to find out the opinions of demanders and suppliers. The results of the surrey show that there are more skilled logisticians in the field of management, computer works in manager level and system management. The survey also found that the certificate exam, which the Ministry of Construction and Transportation started in 1997 as the "Certified Logistics Manager" exam, should have more questions in areas such as foreign languages, computers, logistics information, management skills, etc. To produce better logisticians in Korea, the government will have to invest more into their education, especially near the major ports and metropolitan areas. In addition, it is important that universities and companies work together to provide students with internship and other field-experience teaming opportunities. Logistics education centers should be built at the national level. In addition, the existing certification should be divided into two separate certifications: one for ordinary logistics, and one for international logistics. To further improve the certification system, short-answer or essay questions should be added to the second exam, and an additional certification for the highest level logisticians, a so-called "professional logisticians certificate," needs to be introduced.ntroduced.

  • PDF

A Comparative Analysis of PKI Authentication and FIDO Authentication (PKI 인증과 FIDO 인증에 대한 비교 분석)

  • Park, Seungchul
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • 제21권7호
    • /
    • pp.1411-1419
    • /
    • 2017
  • The two factor authentication capability, private key possession and key protection password knowledge, and the strong public key cryptography protocol of PKI authentication have largely contributed to the rapid construction of Internet transaction trusted infrastructure. The reusability of a certificate-based identity for every PKI site was another contribution factor of the spread of PKI authentication. Nevertheless, the PKI authentication has been criticised mainly for the cost of PKI construction, inconvenience of individual certificate management, and difficulties of password management. Recently FIDO authentication has received high attention as an alternative of the PKI authentication. The FIDO authentication is also based on the public key cryptography which provides strong authentication services, but it does not require individual certificate issuance and provides user-friendly and secure authentication services by integrating biometric technologies. The purpose of this paper is to concretely compare the PKI-authentication and FIDO-authentication and, based on the analysis result, to propose their corresponding applications.