• Title/Summary/Keyword: Certification scheme

Search Result 143, Processing Time 0.023 seconds

Web Based Tele-Medicine System including Security Scheme (웹기반 원격진료시스템에서 암호화인증방식이 적용된 회원관리기법)

  • Kim, Seok-Soo
    • Convergence Security Journal
    • /
    • v.5 no.1
    • /
    • pp.19-27
    • /
    • 2005
  • This paper presents the content regarding electronic medical examination chart and data processing for efficient medical examination and fast treatment by realizing remote medical examination system of mutual conversation type among 3 parties(patient, doctor, pharmacist) on internet base, and establishment of database enabled system integration for efficient data processing in both on-line and off-line mode by interconnecting ASP and SQL on IIS 4.0 web server, consultation between patient and doctor, medical examination on off-line mode, transmission of prescription sheet to the pharmacist designated by patient, preparation of medicine, semieternal storage of medical examination data owing to storage and check of medical examination data, more accurate medical examination and prescription using this medical examination data by patient and doctor, and so on. And, data processing between doctor and pharmacist is differently performed based on class such as general member and charge member, and service access right pursuant to this is endowed, so that certification of each member must follow by all means.

  • PDF

A Ticket based Authentication and Payment Scheme for Third Generation Mobile Communications (3세대 이동 통신을 위한 티켓 기반 인증 및 지불 기법)

  • Lee, Byung-Rae;Chang, Kyung-Ah;Kim, Tai-Yun
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.4
    • /
    • pp.368-374
    • /
    • 2002
  • In the third generation mobile telecommunication systems such as UMTS, one of the important problems for value-added services is to check the recoverability of costs used by a mobile user. Previous authentication and payment schemes for value-added services by a mobile user across multiple service domains, rely on the concept of the on-line TTP, which serves as the users certification authority. In the third generation systems with many service providers, a wide range of services, and a diverse user population, authentication mechanisms with the on-line TTP provide a far from ideal solution. In this paper we present an efficient public-key protocol for mutual authentication and key exchange designed for value-added services in the third generation mobile telecommunications systems. The proposed ticket based authentication and payment protocol provides an efficient way for VASP to check the recoverability of costs without communication with the on-line TTP Furthermore, the proposed ticket based protocol can provide anonymous service usage for a mobile user.

A Scheme of Identity Authentication and Anomaly Detection using ECG and Beacon-based Blockchain (ECG와 비콘 기반의 블록체인을 이용한 신원 인증 및 이상징후 탐지 기법)

  • Kim, Kyung-Hee;Lee, Keun-Ho
    • Journal of Internet of Things and Convergence
    • /
    • v.7 no.3
    • /
    • pp.69-74
    • /
    • 2021
  • With the recent development of biometric authentication technology, the user authentication techniques using biometric authentication are increasing. Various problems arised in certification techniques that use various existing methods such as ID/PW. Therefore, recently, a method of improving security by introducing biometric authentication as secondary authentication has been used. In this thesis, proposal of the user authentication system that can detect user identification and anomalies using ECGs that are extremely difficult to falsify through the electrical biometric signals from the heart among various biometric authentication devices is studied. The system detects user anomalies by comparing ECG data received from a wrist-mounted wearable device-type ECG measurement tool with identification and ECG data stored in blockchain form on the database and identifying the user's location through a beacon system.

Development of Certified Reference Materials for Analysis of Heavy Metals in Paints to Cope with Environmental Regulations (환경규제 대응을 위한 페인트 중의 중금속 분석용 인증 표준물질 개발)

  • Yu, Byung Kyu;Sun, Yle Shik
    • Journal of Environmental Analysis, Health and Toxicology
    • /
    • v.21 no.4
    • /
    • pp.209-219
    • /
    • 2018
  • In the areas of RoHS, WEEE, ELV and REACH, reinforcement of environmental regulations against harmful substances is a global trend not only in EC but also in all over the world. In the fields of Korea's major export products such as material parts, electrical and electronic products and automobile parts, we are responding to these regulations consistently. To develop reference material for analyzing lead and cadmium in paints, the candidate materials were produced through the screening process which separated shapes and sizes. To secure the traceability of the candidate materials produced, the characteristics and uncertainties are estimated by ICP-AES analysis using the primary reference material. The short-term and long-term stabilities also are evaluated in parallel. In order to calculate the final certification value of the candidate material, the verification were carried out by the performance evaluation through the comparison among the KOLAS (Korea Laboratory Accreditation Scheme) laboratories, and the CRM was produced in accordance with ISO Guide 35. The certified values and uncertainties of Pb and Cd of the final paint standard, determined according to the joint analysis among laboratories, are Pb [($191.4{\pm}3.1$) mg/kg, ($944.1{\pm}5.6$) mg/kg] and Cd [($45.0{\pm}2.6$) mg/kg, ($225.5{\pm}3.5$) mg/kg]. These standard materials were developed to enhance the reliability of measurement analysis, including the validity and traceability of measurement results. Also it is expected that the CRM will be used as QCM (quality control material) for the product design and the process monitoring, so that regulation and management of hazardous heavy metals can be systematically implemented.

Ontology-based Course Mentoring System (온톨로지 기반의 수강지도 시스템)

  • Oh, Kyeong-Jin;Yoon, Ui-Nyoung;Jo, Geun-Sik
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.2
    • /
    • pp.149-162
    • /
    • 2014
  • Course guidance is a mentoring process which is performed before students register for coming classes. The course guidance plays a very important role to students in checking degree audits of students and mentoring classes which will be taken in coming semester. Also, it is intimately involved with a graduation assessment or a completion of ABEEK certification. Currently, course guidance is manually performed by some advisers at most of universities in Korea because they have no electronic systems for the course guidance. By the lack of the systems, the advisers should analyze each degree audit of students and curriculum information of their own departments. This process often causes the human error during the course guidance process due to the complexity of the process. The electronic system thus is essential to avoid the human error for the course guidance. If the relation data model-based system is applied to the mentoring process, then the problems in manual way can be solved. However, the relational data model-based systems have some limitations. Curriculums of a department and certification systems can be changed depending on a new policy of a university or surrounding environments. If the curriculums and the systems are changed, a scheme of the existing system should be changed in accordance with the variations. It is also not sufficient to provide semantic search due to the difficulty of extracting semantic relationships between subjects. In this paper, we model a course mentoring ontology based on the analysis of a curriculum of computer science department, a structure of degree audit, and ABEEK certification. Ontology-based course guidance system is also proposed to overcome the limitation of the existing methods and to provide the effectiveness of course mentoring process for both of advisors and students. In the proposed system, all data of the system consists of ontology instances. To create ontology instances, ontology population module is developed by using JENA framework which is for building semantic web and linked data applications. In the ontology population module, the mapping rules to connect parts of degree audit to certain parts of course mentoring ontology are designed. All ontology instances are generated based on degree audits of students who participate in course mentoring test. The generated instances are saved to JENA TDB as a triple repository after an inference process using JENA inference engine. A user interface for course guidance is implemented by using Java and JENA framework. Once a advisor or a student input student's information such as student name and student number at an information request form in user interface, the proposed system provides mentoring results based on a degree audit of current student and rules to check scores for each part of a curriculum such as special cultural subject, major subject, and MSC subject containing math and basic science. Recall and precision are used to evaluate the performance of the proposed system. The recall is used to check that the proposed system retrieves all relevant subjects. The precision is used to check whether the retrieved subjects are relevant to the mentoring results. An officer of computer science department attends the verification on the results derived from the proposed system. Experimental results using real data of the participating students show that the proposed course guidance system based on course mentoring ontology provides correct course mentoring results to students at all times. Advisors can also reduce their time cost to analyze a degree audit of corresponding student and to calculate each score for the each part. As a result, the proposed system based on ontology techniques solves the difficulty of mentoring methods in manual way and the proposed system derive correct mentoring results as human conduct.

Management Method for Private Key File of PKI using Container ID of USB memory (USB 메모리의 컨테이너ID를 이용한 PKI 기반의 개인키 파일의 안전한 관리 방안)

  • Kim, Seon-Joo;Joe, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.10
    • /
    • pp.607-615
    • /
    • 2015
  • Mosts user of internet and smart phone has certificate, and uses it when money transfer, stock trading, on-line shopping, etc. Mosts user stores certificate in a hard disk drive of PC, or the external storage medium. In particular, the certification agencies are encouraged for user to store certificate in external storage media such as USB memory rather than a hard disk drive. User think that the external storage medium is safe, but when it is connect to a PC, certificate may be copied easily, and can be exposed to hackers through malware or pharming site. Moreover, if a hacker knows the user's password, he can use user's certificate without restrictions. In this paper, we suggest secure management scheme of the private key file using a password of the encrypted private key file, and a USB Memory's hardware information. The private key file is protected safely even if the encrypted private key file is copied or exposed by a hacker. Also, if the password of the private key file is exposed, USB Memory's container ID, additional authentication factor keeps the private key file safe. Therefore, suggested scheme can improve the security of the external storage media for certificate.

An Operating Scheme for the Course-based Qualification System at the Four-Year University Level: Focused on the KOREATECH Case (4년제 대학 과정평가형 자격과정 운영방안: 코리아텍 사례를 중심으로)

  • Oh, Chang-Heon;Kang, Seung-Chan;Min, Dong-Kyun;Om, Kiyong
    • Journal of Practical Engineering Education
    • /
    • v.8 no.1
    • /
    • pp.39-47
    • /
    • 2016
  • Owing to increasing concern that jobseekers are wasting too much time and effort building up so-called "spec" skills to get a decent job, many companies including state-run enterprises are now hiring rookies based on their job competency rather than test scores unrelated to the job. However, universities which are mainly responsible for training professional personnel needed for various kinds of companies and factories are reluctant to adopt NCS-based educational courses. The NCS defines how much knowledge and skill are required to work in a certain industry and then evaluates them. Although the Korean government and several junior colleges have been tentatively operating the course-based qualification system at the "industrial technician" level since 2014, the results are falling far short of diverse stakeholders' expectations. Therefore, there are urgent needs to study how to develop NCS-based curriculum at the university level, and how to strengthen the linkage between work, training, and qualification.

Trends and Interpretation of Life Cycle Assessment (LCA) for Carbon Footprinting of Fruit Products: Focused on Kiwifruits in Gyeongnam Region (과수의 탄소발자국 표지를 위한 LCA 동향 및 해석: 경남지역 참다래를 중심으로)

  • Deurer, Markus;Clothier, Brent;Huh, Keun-Young;Jun, Gee-Ill;Kim, In-Hea;Kim, Dae-Il
    • Horticultural Science & Technology
    • /
    • v.29 no.5
    • /
    • pp.389-406
    • /
    • 2011
  • As part of a feasibility study for introducing carbon labeling of fruit products in Korea, we explore the use of carbon footprints for Korean kiwifruit from Gyeongnam region as a case study. In Korea, the Korean Environmental Industry and Technology Institute (KEITI) is responsible for the carbon footprint labeling certification, and has two types of certification programs: one program focuses on climate change response (carbon footprint labeling analysis) and the other on low-carbon products (reduction of carbon footprints analysis). Currently agricultural products have not yet been included in the program. Carbon labeling could soon be a prerequisite for the international trading of agricultural products. In general the carbon footprints of various agricultural products from New Zealand followed the methodology described in the ISO standards and conformed to the PAS 2050. The carbon footprint assessment focuses on a supply chain, and considers the foreground and the background systems. The basic scheme consists of four phases, which are the 'goal', 'scope', 'inventory analysis', and 'interpretation' phases. In the case of the carbon footprint of New Zealand kiwifruit the study tried to understand each phase's contribution to total GHG emissions. According to the results, shipping, orchard, and coolstore operation are the main life cycle stages that contribute to the carbon footprint of the kiwifruit supply chain stretching from the orchard in New Zealand to the consumer in the UK. The carbon emission of long-distance transportation such as shipping can be a hot-spot of GHG emissions, but can be balanced out by minimizing the carbon footprint of other life cycle phases. For this reason it is important that orchard and coolstore operations reduce the GHG-intensive inputs such as fuel or electricity to minimize GHG emissions and consequently facilitate the industry to compete in international markets. The carbon footprint labeling guided by international standards should be introduced for fruit products in Korea as soon as possible. The already established LCA methodology of NZ kiwifruit can be applied for fruit products as a case study.

Practice and Improvement Scheme of Management of Human Resources in Korean Private Security Service Industry (한국 민간경비 인적자원 확보관리의 실태 및 개선방안)

  • Suh, Sang-Yul;Park, Jun-Seok
    • Korean Security Journal
    • /
    • no.16
    • /
    • pp.81-99
    • /
    • 2008
  • Despite its legal, systematic and quantitative growth, Korean private security has not been showing satisfactory level of qualitative growth comparing to quantitative growth as it socially shocked with recent occurrence of the events and accidents. People on demand of security are making use of private security service to offset insufficient supply of security power as, especially, the incendiarism at Sungryemun last February brought out security issues for nationally important facilities and cultural assets, and other cases showed that the police would not cope with the appropriate security services under the current security system for protecting the life and property of people. For the supplementation of security power, the private security service is prevalent, but lots of service providers would not overcome its small business scale, except some large-sized security providers. There are some problem occurred as some providers employed staff who would not have the stuff for performing security service and they even committed illegal actions. Some opinions pointed out that it should come up with measures as they socially lose their credit. Therefore, this research suggests the recognition of the importance and the improvement measures of human resources management as follows. Security Service needs: 1. control of criteria for the employment/recruitment of human resources; 2. inducement of qualitative improvement of security service by ensuring excellent quality of human resources; 3. elevation of morale of organizational members with the operation of efficient promotion system; 4. introduction of professional certification system for the inflow of excellent quality of human resources.

  • PDF

Regional Adaptation of the Genus Cypripedium in Korea and Micropropagation with Seed

  • Lee, Joung Kwan;Kwon, Young Hee;Kim, Hee Kyu;Kim, Kyung Ok;Park, Jae Seong;Jeong, Mi Jin;Son, Sung Won;Suh, Gang Uk
    • Proceedings of the Plant Resources Society of Korea Conference
    • /
    • 2019.10a
    • /
    • pp.23-23
    • /
    • 2019
  • Cypripedium is an orchid genus of over 50 species widely distributed in the northern temperate zone, with a few taxa extending central America and the Himalayas and the southwesternmost tip of China in Asia. Of the known species approximately two thirds are found in China. In Korea, 4 species were reported to find with rare popularity ; C. macranthos, C. guttatum, C. japonicum, and C. calceolus. The seed has a firm brown fusiform testa with an opening at one end where the micropyle of the ovule was situated. Cypripedium has small, fusiform, wind-dispersed seeds that weigh about $1{\sim}2{\mu}g$ and range from 0.1 to 2 mm long and 0.07 to 0.4 mm across. The germination of Cypripedium was previously thought to be hard to cultivate in one's garden and impossible to propagate artificially, nowadays lab-propagated seedlings are readily available in EU or United States. We had already reported the successful micropropagation of lady's slipper orchids with green pod sowing methods. The collected Cypripedium species and hybrids were planted in Korea National Arboretum (KNA) on Oct. 2018. The 11 species including C. candidum and the 31 hybrids such as C. Ingrid were introduced from Germany with CITES certification. The lady's slipper orchids bloomed on May to June, and the flowers were pollinated in the same species or hybrids to get seeds for in vitro germination on 2~3 days after fully flowering. The green pods were collected after 49~70 days after pollination. The 6 species of Cypripedium seeds were easily germinated on the POM within 70 days after sowing, and the 12 hybrids PLBs were observed with small roots. We had established the scheme of lady's slipper orchids germination in 3 months with green pods, and get the possibility of seedling in 10 months of sowing in vitro.

  • PDF