• Title/Summary/Keyword: Certification Services

Search Result 291, Processing Time 0.025 seconds

A Study on the System of Risk Management in the Int'l Trade by Internet Network (인터넷무역위험(貿易危險)의 관리체계(管理體系)에 관한 고찰(考察))

  • Ha, Kang-Hun
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.15
    • /
    • pp.239-261
    • /
    • 2001
  • There are many kinds of risk in int'l trade by internet network, such as credit risk, mercantile risk, contingency risk, exchange risk, physical risk and the risk on internet network. Especially, risk management against credit risk and the risk on internet network are very important. The former is conventional but more important these days. The latter is a new risk that has been incurred owing to the int'l trade by internet network. The system of risk management against the former are firstly, to surely research credit of counterpart by internet, secondly, to certify the entity by password or fingerprint, thirdly, to pay the price under a letter of credit, fourthly, to use the system of int'l trade such as bolero, trade card, finally, to use the authority of electronic trade services. The system of risk management against the latter are firstly, to install the firewall on the own computer network, secondly, to entrust the management own computer network to the network security services firm, thirdly, to electronically communicate with counterpart through the certification authority, finally, to insure against the own network risk with the security insurance company.

  • PDF

Implementation of Secure I-Mail System based on lava (타원곡선 알고리즘을 이용한 안전한 자바 메일 시스템의 설계 및 구현)

  • 이원구;조한진;이재광
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.10a
    • /
    • pp.700-702
    • /
    • 2001
  • As computers and networks become popular, distributing information on the Interment is common in our daily life. Also, the explosion of the Internet, of wireless digital communication and data exchange on Internet has rapidly changed the way we connect with other people. But secure mall is gamins popularity abroad and domestically because of their nature of prodding security. That is. it has been used a variety of fields such as general mail and e-mail for advertisement But, As the data transmitted on network can be easily opened or forged with simple operations. Most of existing e-mall system don't have any security on the transmitted information. Thus, security mail system need to provide security including message encryption, content integrity, message origin authentication, and non-repudiation. In this paper, we design implement secure mall system with non-repudiation service and encryption capability to provide services for certification of delivery and certification of content as well as the basic security services.

  • PDF

A Novel Electronic Voting Mechanism Based on Blockchain Technology

  • Chuan-Hao, Yang;Pin-Chang Su;Tai-Chang Su
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.10
    • /
    • pp.2862-2882
    • /
    • 2023
  • With the development of networking technology, it has become common to use various types of network services to replace physical ones. Among all such services, electronic voting is one example that tends to be popularized in many countries. However, due to certain concerns regarding information security, traditional paper voting mechanisms are still widely adopted in large-scale elections. This study utilizes blockchain technology to design a novel electronic voting mechanism. Relying on the transparency, decentralization, and verifiability of the blockchain, it becomes possible to remove the reliance on trusted third parties and also to enhance the level of trust of voters in the mechanism. Besides, the mechanism of blind signature with its complexity as difficult as solving an elliptic curve discrete logarithmic problem is adopted to strengthen the features related to the security of electronic voting. Last but not least, the mechanism of self-certification is incorporated to substitute the centralized certificate authority. Therefore, the voters can generate the public/private keys by themselves to mitigate the possible risks of impersonation by the certificate authority (i.e., a trusted third party). The BAN logic analysis and the investigation for several key security features are conducted to verify that such a design is sufficiently secure. Since it is expected to raise the level of trust of voters in electronic voting, extra costs for re-verifying the results due to distrust will therefore be reduced.

A Study on the Current Situation and Improved Method for the Smombie through Field Survey and ICT Trend Analysis (현장 조사와 ICT 동향 분석을 통한 스몸비 현황과 개선 방안 연구)

  • Lee, Dong Hoon;Oh, Hye Soo;Jang, Jae Min;Jeong, Jong Woon;Yang, Sang Oon
    • Journal of the Korean Society of Safety
    • /
    • v.35 no.5
    • /
    • pp.74-85
    • /
    • 2020
  • Smart phone zombie or Smombie means pedestrians who walk without attention to their surroundings because they are focused upon their smart phone. Because the traffic accidents and injuries caused by Smombie have been increased rapidly in recent years, the social attention and policies are needed to prevent it. This study was conducted to analyze Smombie's current status and some solutions used before and to propose new improved method through the latest ICT trend. In this study, we did the field survey to check Smombies at several places in Seoul through people counting, and found that a lot of pedestrians still use the smart phone while walking. And we analyzed many case studies about some solutions to prevent Smombies previously. The case studies include legal regulations, government policies, smart phone app services and facilities that are used before. We studied them through internet searches and reference studies and we also checked the current operating situation as visiting several places that the solutions actually has been operated. Therefore, we found there are some limitations in previous solutions in terms of effectiveness and management. To consider new solution that can be expected to overcome the limitations, we analyzed the latest ICT trends focused on features to utilize the Smombie prevention, especially video recognition and digital signage. In these days, video recognition has been developed rapidly with assistance of AI technology and it can recognize the specific pedestrian's characteristics such as holding smart phone as well as hair style, clothes, backpack and etc. On the other hands, the digital signage is the convergence device that includes big display, network connection and various IoT sensors. It can be used as public media in many places for public services as well as advertising. Through these analysis results, we show the requirements and the user scenario for the improved method to prevent Smombie. Finally, we propose to develop R&D technology to recognize Smombie exactly as pedestrian attributes and to spread creative contents to increase pedestrian's interest and engagement for Smombie prevention through digital signage.

Analysis of Nursing Services of Oncology Advanced Practice Nurses from the View Point of Structure and Process (종양전문간호사가 제공한 간호서비스의 구조.과정적 측면의 분석)

  • Kim, Min-Young
    • Journal of Korean Academy of Nursing Administration
    • /
    • v.14 no.3
    • /
    • pp.352-363
    • /
    • 2008
  • Purpose: The purpose of this study was to investigate nursing services of Oncology Advanced Practice Nurses(OAPNs) from the view point of structure and process. Methods: Roles and practices of OAPNs for cancer patients on chemotherapy were investigated by semi-structured interview and survey. Subjects were 14 OAPNs in 3 hospitals. Results: OAPNs had high level of education and certification than registered nurses. Most subjects of OAPNs were patients on chemotherapy and OAPNs used most of their time in education and expert nursing practice. 57.1% of OAPNs used delegated order. They were satisfied with their job in general, but satisfaction in communication with nurse manager or resident doctor was low. Conclusion: These results will be the concrete explanation for the nursing services of OAPNs. On the basis of theses results, more study about effects of OAPNs will be needed.

  • PDF

A New Access Certification System with Temporal Key Stroke Information (키 입력 시간차이를 이용한 새로운 접속인증 시스템 소개)

  • Choi, Wonyong;Kim, Sungjin;Heo, Kangin;Moon, Gyu
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.5 no.4
    • /
    • pp.45-53
    • /
    • 2015
  • In this paper, an approach of temporal certification system that can be easily added on current character-based certification system is newly introduced. This technique enhances the security of the password certification process by exploiting temporal information for each character's stroke timing, and using them as another feature of certification information, on top of character comparison process. There are three different temporal conditions: maximum, minimum and no-option. The maximum condition along with a time number (usually 0.2 second or less) means that the next key input should be punched within the time limit, while the minimum condition means the next key stroke should be typed after the time lapse specified. With no-option condition chosen, user can punch the password without any timing constraints. Prototype was developed and tested with four number password case. In comparison with 104 cases, this new approach increases the cases more than 10 digits, enhancing the security of the certification process. One big advantage of this new approach is that user can update his/her password only with different timing constraints, still keeping the same characters, that will enhance the security system management efficiency in a very simple way. Figures and pictures along with process flow are included for the validity of the idea.

A Study on the Certification System in Electromic Commerce (전자상거래(電子商去來)의 인증체계(認證體系)에 관한 고찰(考察))

  • Ha, Kang Hun
    • Journal of Arbitration Studies
    • /
    • v.9 no.1
    • /
    • pp.367-390
    • /
    • 1999
  • The basic requirements for conducting electronic commerce include confidentiality, integrity, authentication and authorization. Cryptographic algorithms, make possible use of powerful authentication and encryption methods. Cryptographic techniques offer essential types of services for electronic commerce : authentication, non-repudiation. The oldest form of key-based cryptography is called secret-key or symmetric encryption. Public-key systems offer some advantages. The public key pair can be rapidly distributed. We don't have to send a copy of your public key to all the respondents. Fast cryptographic algorithms for generating message digests are known as one-way hash function. In order to use public-key cryptography, we need to generate a public key and a private key. We could use e-mail to send public key to all the correspondents. A better, trusted way of distributing public keys is to use a certification authority. A certification authority will accept our public key, along with some proof of identity, and serve as a repository of digital certificates. The digital certificate acts like an electronic driver's license. The Korea government is trying to set up the Public Key Infrastructure for certificate authorities. Both governments and the international business community must involve archiving keys with trusted third parties within a key management infrastructure. The archived keys would be managed, secured by governments under due process of law and strict accountability. It is important that all the nations continue efforts to develop an escrowed key in frastructure based on voluntary use and international standards and agreements.

  • PDF

A Study on the ISO 9000 Family Certification to Improve of Services Quality for Library (도서관 서비스 품질 제고를 위한 ISO 9000 인증 도입에 관한 연구)

  • Cho, Yoon-Hee
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.36 no.3
    • /
    • pp.215-232
    • /
    • 2002
  • The Quality Management System is based on a system approach method. The Library and information center analyze the requirement of the customer, and manage to be interactive process so that we reach an information service level which the customer expects. This study accomplished theoretical review of ISO 9000 as International Quality Management System, investigated the trend for change of ISO 9000 certification systems. We reviewed ISO 9000 family which the Library and Information center possible apply and presented the requirement in the library and Information center with the process to need for a Quality Management System certification.

Patient Authentication Protocol for Synchronization between Implantable Medical Device (체내 삽입장치간 동기화를 위한 환자 인증 프로토콜)

  • Jeong, Yoon-Su;Kim, Yong-Tae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.1
    • /
    • pp.49-56
    • /
    • 2013
  • Among U-healthcare services adapting the latest IT technique and medical technique, a body-injecting device technique providing medical service to a patient who has incurable disease. But the body-injecting device technique can be easily exposed during wireless section to the third person and it can be used illegally. This paper proposes certification protocol which certifies a patient and hospital staff using random number created by certification server and a patient with hospital staff by synchronization. Specially, the proposed protocol uses security information created by information registered in certification server previously by a patient and hospital staff so that in keeps from accessing of third person who didn't get approval. And it gives more stability.

Eco-Friendly Behaviors and Trust Mechanism in Building Satisfaction and Loyalty (만족도와 충성도 구축에 있어서의 친환경 행동과 신뢰 메커니즘)

  • Debora, LEE
    • The Korean Journal of Franchise Management
    • /
    • v.14 no.1
    • /
    • pp.57-74
    • /
    • 2023
  • Purpose: As global interest in environmental issues increases, the demand for green products/services is increasing. Companies are establishing eco-friendly policies to meet the changing expectations of customers. Therefore, this study aims to analyze the effect of eco-friendly behavior and third-party certification on trust, satisfaction, and loyalty as well as the mediating role of satisfaction based on SOR and signaling theory. Research design, data and methodology: This study collected data from 501 respondents who visited restaurant and analyzed using measurement model with SPSS 28.0 and SmartPLS 4. Results: First, restaurants' eco-friendly behavior and third-party certification (TPC) positively influenced trust while these did not influence satisfaction. Second, trust positively influenced satisfaction. Third, trust and satisfaction positively influenced loyalty. Fourth, TPC had stronger impact on trust and satisfaction compared to eco-friendly behavior in female group while TPC had stronger impact on trust in male group. Conclusions: This study emphasized the importance of TPC over eco-friendly behavior. Restaurants should maintain pro-environmental behaviors such as reducing single-use items while obtaining TPC such as ISO and LEED certifications to increase customer trust. It also found the importance of trust and satisfaction in securing loyal customers. Restaurants should make efforts to build bonds with customers through authentic marketing such as events that encourage customer participation.