• Title/Summary/Keyword: Certification Services

Search Result 296, Processing Time 0.026 seconds

Implementation of Offline Payment Solution using USIM in IMT-2000 (IMT-2000 단말기용 USIM상에서의 오프라인 지불 솔루션 탑재에 관한 연구)

  • 백장미;하남수;홍인식
    • Journal of Korea Multimedia Society
    • /
    • v.6 no.5
    • /
    • pp.849-860
    • /
    • 2003
  • As mobile device is becoming more popular, E-Commerce changes into M-Commerce. Especially, IMT-2000 (International Mobile Telecommunication 2000) service is prepared for M-Commerce and this has USIM (Universal Subscriber Identity Module) as a core of certification of individuality and transactions. As a result, the area of mobile service going to expand by USIM. But, mobile services using USIM leave much to be desired, and developed application don't variety. In this paper, for the efficient design of USIM, the structure of USIM and protocol is analyzed, and secure payment solution in USIM is proposed. Specially, offline payment system is proposed for the verification of proposed protocols including security, saving, and calculation of balance. finally, the simulation of proposed payment system on USIM is performed using Java Card.

  • PDF

A Design for Network Security System via Non-security Common Network (일반망과 보안망을 연계한 네트워크 보안체계 설계)

  • Cho, Chang-Bong;Lee, Sang-Guk;Dho, Kyeong-Cheol
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.12 no.5
    • /
    • pp.609-614
    • /
    • 2009
  • In this paper, we have proposed a design for security network system passing through the non-security network which is commonly used for various networking services. Based on the security requirements which are assumed that the large classified data are bi-transmitted between a server and several terminals remotely located, some application methods of security techniques are suggested such as the network separation technique, the scale-down application technique of certification management system based on the PKI(Public Key Infrastructure), the double encryption application using the crypto-equipment and the asymmetric keys encryption algorithm, unrecoverable data deleting technique and system access control using USB device. It is expected that the application of this design technique for the security network causes to increase the efficiency of the existing network facilities and reduce the cost for developing and maintaining of new and traditional network security systems.

Roles of Safety Management System (SMS) in Aircraft Development

  • Lee, Won Kwan;Kim, Seung Jo
    • International Journal of Aeronautical and Space Sciences
    • /
    • v.16 no.3
    • /
    • pp.451-462
    • /
    • 2015
  • Safety is the first priority in civil aviation, and so the International Civil Aviation Organization (ICAO) has introduced and mandated the use of Safety Management Systems (SMS) by airlines, airports, air traffic services, aircraft maintenance organizations, and training organizations. The aircraft manufacturing industry is the last for which ICAO has mandated the implementation of SMS. Since SMS is a somewhat newer approach for most manufacturers in the aviation industry, they hardly believe in the value of implementing SMS. The management of safety risk characteristics that occur during early aircraft development stages and the systematic linkage that the safety risk has to do with an aircraft in service could have a significant influence on the safe operation and life cycle of the aircraft. This paper conducts a case analysis of the McDonnell Douglas MD-11 accident/incident to identify the root causes and safety risk levels, and also verified why aircraft manufacturing industry should begin to adopt SMS in order to prevent aircraft accident.

Evaluating the Technical Efficiency of Service Operations Using DEA Models: An Application to Contact Center Services (DEA 모형에 의한 서비스 운영의 기술적 효율성 평가: 컨택센터 서비스를 중심으로)

  • Cho, Geon;Lee, Kyoung-Jae;So, Soon-Hu
    • Journal of Korean Society for Quality Management
    • /
    • v.37 no.2
    • /
    • pp.1-11
    • /
    • 2009
  • Recently, many companies have been very interested in CRM(Customer Relationship Management). Most companies have been also considering the contact center as a key CRM channel, because it is a contact point between customers and companies. It turns out that the contact center handles over 70% of all customer-company interactions and the success or failure of a company can be determined by the customer satisfaction with contact center experiences. Despite of the strategic importance of the contact center, there has been few empirical study on the efficiency of contact center operations in the literature. One of the main purposes of this study is to evaluate the efficiency of contact centers so as to not only identify the current status of contact center operations, but also suggest ways to improve operational efficiency. For this purpose, we apply a non-parametric efficiency measurement method, DEA (Data Envelopment Analysis), to 57 domestic contact centers in order to compare their relative efficiency. It is expected that the measurement methods suggested in this study can be applied to various issues such as service KS certification, outsourcing service management, and the productivity analysis of service personnel.

Design and Implementation of Digital Jikin using Smartphone Application

  • Hong, Daewon;Kang, Miju;Chun, Junchul
    • Journal of Internet Computing and Services
    • /
    • v.18 no.5
    • /
    • pp.87-94
    • /
    • 2017
  • Due to the recent advances of IT industry, many companies and institutions have been used electronic documents rather than original paper copies. However, the characteristic of electronic document allows it to be readily damaged from proscribed copying, counterfeit, and falsification. These can cause the serious security problems for electronic documents. Conventional security methods for digital documents involve adding a separated image or marker, but these methods can reduce the readability of document. Therefore, we proposed a digital Jikin (Korean traditional stamp) which is normally used to identify the source or author of a document in asia. The proposed digital Jikin can preserve the readability of electronic document while protecting the document from proscribed copying, counterfeit, or falsification using image processing approach. In this paper, a digital Jikin application is designed and implemented under android platform and it converts the critical information of document onto the digital Jikin. The proposed digital Jikin contains important information in the boundary of Jikin not only about the author of documents or source, but also keywords, number of images, and many more. Therefore, the authenticity of document or whether the document has been altered or not by other person can be evaluated by the server. The proposed digital Jikin can be sent to a server through the wireless networks and can be stored using PHP and MySQL. We believe that the proposed method can offer the better and simple solution for strengthening the security of electronic document.

A Credit Card based Payment Protocol Assuring End-to-End Security in Wireless Internet (무선인터넷에서의 종단간 보안을 제공하는 신용카드 기반의 지불 프로토콜)

  • 임수철;강상승;이병래;김태윤
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.6
    • /
    • pp.645-653
    • /
    • 2002
  • The WPP payment protocol uses the WAP protocol to enable credit card payment on the wireless internet. Since the security of the WAP protocol is based on the WTLS security protocol, there exists an end-to-end security weakness for the WPP payment protocol. This paper is suggesting a payment protocol, which is making use of the Public-Key Cryptosystem and the Mobile Gateway, so assuring end-to-end security independently of specific protocols. As the on-line certification authority is participating on the authentication process of the payment protocol, the suggested payment protocol enables wireless devices to get services from service providers on other domains.

Measuring the Technical Efficiency of service Operation with DEA : An Application to Call Center service (DEA 기법에 의한 서비스 운영의 기술적 효율성 분석 : 콜센터 서비스 사례연구)

  • So, Sun-Hu;Lee, Gyeong-Jae;Jo, Geon
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2008.10b
    • /
    • pp.316-321
    • /
    • 2008
  • In the present emerging global economy, as the focus is shifted from manufacturing to service sector, the efficiency of service operations is crucial for the county's sustainable growth and development. As one of the fastest growing service sector industries in South Korea, the call center has become an inevitable part of customer service for most companies. Despite of the strategic importance of the call center, there has been no empirical study on the efficiency of call center service operations in the literature. The main purpose of this study is to evaluate the technical efficiency of call center services so as to not only identify the current status of call center service operations, but also suggest ways to improve service operations efficiency. For this purpose, we apply a non-parametric efficiency measurement method, DEA (Data Envelopment Analysis), to domestic call centers in order to compare their relative efficiency. Based on DEA evaluations, we provided specific directions for the inefficient call centers to possibly improve their operation efficiencies. It is expected that the measurement methods suggested in this study can be applied to various issues such as service KS certification, service operations management, and the productivity analysis of service personnel.

  • PDF

Multi-session authentication scheme for secure authentication and session management of cloud services environment (클라우드 서비스 환경의 안전한 인증과 보안세션 관리를 위한 다중세션 인증 기법)

  • Choi, Do-hyeon;Park, Jung-oh
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.9
    • /
    • pp.2056-2063
    • /
    • 2015
  • Recently, as the service scale of cloud service is expanded, an anxiety due to concerns on new vulnerabilities and security related incidents and accidents are also increasing. This paper proposes a certification scheme for multiple session management of security sessions which are generated after the user authentication. The proposed session multiplexing scheme enables the independent management of security sessions in the level of virtualization (hypervisor) within the service provider. As a result of performance analysis, providing a strong safety due to session multiplexing and mutual authentication, and the superiority of performance was proven by comparing it with the existing mutual authentication encryption algorithms.

User certification module development of Gallery-Auction for NFC-based 2 Factor mobile electronic payment (NFC 기반 2 Factor 모바일 전자결제를 위한 갤러리-옥션의 사용자인증 모듈 개발)

  • Jo, Won Oh;Cha, Yoon Seok;Oh, Soo Hee;Choi, Myeong Soo;Kim, Hyung Jong
    • Smart Media Journal
    • /
    • v.6 no.3
    • /
    • pp.29-40
    • /
    • 2017
  • Lately weight for smartphone mounted to function for NFC is increasing, rapidly. Because of this, NFC related technology is made by many companies. We developed Gallery-Auction for security enhancements and new services of NFC-based 2 factor electronic payment system. Enhanced security features development of user authentication module through fingerprint recognition to apply FIDO authentication technology and developed electronic contract voice service of Gallery-Auction using TTS(Text to Speech). Therefore we enhanced convenient and simple authentication method and security through NFC mobile electronic payment.

An Interoperability Certification Framework for the Information Systems in MND (국방정보시스템을 위한 상호운용성 인증 프레임워크)

  • Seo, Min-Woo;Seo, Hyung-Jun;Kim, Young-Do;Son, Tae-Jong
    • 한국IT서비스학회:학술대회논문집
    • /
    • 2006.05a
    • /
    • pp.326-333
    • /
    • 2006
  • 최근 정보시스템들은 전사적으로 통합 운영이 가능해지는 복합시스템으로 발전해 나가는 추세이며, 사용자들이 원하는 정보를 쉽게 공유할 수 있고, 시스템 간의 정보가 보다 유기적으로 흐를 수 있는 환경이 요구되고 있다. 이와 같은 복합시스템에서는 상호운용성이 그 중요한 이슈로 다루어지며, 정보시스템 상호운용성 향상을 위하여 많은 절차와 정보기술이 개발되어 적용되고 있다. 우리 국방 분야에서는 네트워크중심전(NCW) 개념 등을 구현하기 위하여 전장관리정보시스템과 자원관리정보시스템 간의 상호운용성에 대한 중요성을 강조하고 있다. 따라서 본 논문에서는 국방정보시스템 간의 상호운용성 분야에 대하여 구체적이고 체계적인 정책 수립을 위해 국방정보시스템의 개발 단계를 크게 개발 전, 개발 중, 개발 후의 세 단계로 구분하여, 그에 따라 각각 조직 및 임무, 수행절차, 기술 및 도구, 제도 및 규정등 네가지 관점을 가지는 2차원 형태의 국방정보시스템 상호운용성 인증 프레임워크를 처음으로 설계하여 제안하였다. 또한, 제안한 프레임워크를 우리 국방 환경에 적용하기 위하여 원칙, 조직, 절차(단 ${\cdot}$ 중장기적), 기술도구, 관련 규정 제(개)정안 등의 분야들에 대해 각각 방안들을 제안하고 있다.

  • PDF