• Title/Summary/Keyword: Connected Value 인증

Search Result 6, Processing Time 0.022 seconds

Disconnection of Wireless LAN Attack and Countermeasure (무선 LAN 연결 해제 공격과 보안)

  • Hong, Sunghyuck
    • Journal of Digital Convergence
    • /
    • v.11 no.12
    • /
    • pp.453-458
    • /
    • 2013
  • In a wireless LAN environment, security is the most important. Security of 802.11 standard has many vulnerabilities of the network attack. IEEE has created mechanisms to security for this vulnerability. But the vulnerabilities is characteristic of broadcast in the air in wireless LAN, it is more disclosure then other network environments. In a wireless LAN environment, it can be accessed to the wireless LAN after authentication. Authentication process is one of most important because of the first security step. However, in the authentication process is not mentioned in the method of reducing the disclosure maximum fundamental. Therefore, in this research, the vulnerability of 802.11 are presented and how to do de-authentication in 802.11.

A Study on Zero Knowledge Proof Blockchain Personal Information Authentication Using Smartphone (스마트폰을 이용한 영지식증명 블록체인 개인정보 인증에 관한 연구)

  • Lee Kwangkyu
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.19 no.3
    • /
    • pp.37-44
    • /
    • 2023
  • In the future society, a means to verify the identity of the information owner is required at the beginning of most services that the information owner encounters, and the emergence and gradual spread of digital identification that proves the identity of the information owner is essential. In addition, as the utilization value of personal information increases, discussions on how to provide personal information are active. Therefore, there is a need for a personal information management method necessary for building a hyper-connected society that is safe from various hacking, forgery, alteration, and theft by allowing the owner to directly manage and provide personal information management. In this study, a decentralized identity information management model that overcomes the problems and limitations of the centralized identity management method of personal information and manages and selectively provides personal information by the information owner himself and implemented a smart personal information provision system(SPIPS: Smart Personal Information Provision System) using a smartphone.

A Security Model Analysis Adopt to Authentication State Information in IPTV Environment (IPTV 환경에서 가입자의 인증 상태정보를 이용한 인증보안 모델 설계)

  • Jeong, Yoon-Su;Jung, Yoon-Sung;Kim, Yong-Tae;Park, Gil-Cheol;Lee, Sang-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.3B
    • /
    • pp.421-430
    • /
    • 2010
  • Now a days, as a communications network is being broadband, IPTV(Internet Protocol Television) service which provides various two-way TV service is increasing. But as the data which is transmitted between IPTV set-top box and smart card is almost transmitted to set-top box, the illegal user who gets legal authority by approaching to the context of contents illegally using McComac Hack Attack is not prevented perfectly. In this paper, set-top box access security model is proposed which is for the protection from McComac Hack Attack that tries to get permission for access of IPTV service illegally making data line which is connected from smart card to set-top box by using same kind of other set-top box which illegal user uses. The proposed model reports the result of test which tests the user who wants to get permission illegally by registration the information of a condition of smart card which is usable in set-top box in certification server so that it prevents illegal user. Specially, the proposed model strengthen the security about set-top box by adapting public key which is used for establishing neighbor link and inter-certification process though secret value and random number which is created by Pseudo random function.

EA Study on Practical Engineering Education through the Design and Configure of Safe Running Type Drones (안전 주행형 무인기의 설계 및 제작을 통한 실천 공학 교육에 관한 연구)

  • Jo, Yeong-Myeong;Lee, Sang-Gwon;Chang, Eun-Young
    • Journal of Practical Engineering Education
    • /
    • v.9 no.1
    • /
    • pp.7-13
    • /
    • 2017
  • This study will provide a practical plan of engineering education through the study of major activities connected with the production of works to accomplish the graduation conditions by completing the comprehensive design subject and the result of the performance. The designed subject is to measure the minimum safety distance during driving using the obstacle detection function of the ultrasonic sensor and to perform the avoidance algorithm based on the measurement value of the acceleration gyro sensor. It is proposed an access surveillance system that minimizes the damage of drones, surrounding objects, and people, and improves air mobility. Experimental results show that the obstacles around the drone are detected by five ultrasonic sensors and the difference of output value is applied to each motor of the drone and obstacle avoidance is confirmed. In addition, the content and level of the data for measuring the achievement of learning achievement in the engineering education certification program were used and the results were confirmed to be consistent with the description of the engineering problem level required for the graduates of 4-year engineering college.

The Performance and Effectiveness Analysis of Standardization in Construction R&D Project (건설R&D 성과사례분석을 통한 건설기술 표준화 성과 및 효과 분석)

  • Lee, Kyo-Sun;Yun, Won Gun;Kim, Kyong Ju;Chin, Kyung-Ho
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.35 no.6
    • /
    • pp.1431-1438
    • /
    • 2015
  • According to the report from OECD, 80% of world trade quantity was influenced by standard, 50% of EU trade demand certification of forced standard. This leads to develop standard connected with R&D in most country and company worldwide. Recently, Technical standards have advantage of reduction of production cost and market dominating power. Standardization of construction technology has very important role that ouput of R&D refer to KS, national construction standards and it activates in the market. However, domestic construction research related to effectiveness of standadization fall short of expectation in comparison with manufacturing industry. This study present criteria that can analyze the performance and effectiveness in construction R&D project connected with standardization. And it applied domestic R&D cases (finished from 2000 to 2009), analyzes ouput of standadization and economic effect to verify the value of construcion technology standardization.

Situations of GAP certified ginseng and 4P's strategies (GAP 인증인삼 현황과 4P 전략)

  • Hong, Seung-Jee;Kim, Kwan-Hoo
    • Korean Journal of Agricultural Science
    • /
    • v.38 no.2
    • /
    • pp.369-381
    • /
    • 2011
  • Ginseng in Korea has not only the big production value but also till a good reputation from overseas in the name of 'Korea Ginseng'. Having spread rapidly nationwide from 2000 year, its production keeps on increasing but its consumption becomes lazy and its price is also falling down because of comsumer's concern about mainly overusing pesticide for ginseng. In order to cope with this problem, the government introduced the GAP certification system to ginseng in 2006 to reflect consumer's needs for food safety. This system will be a good opportunity to promote ginseng consumption dramatically. In this aspect it is very important to know how well this system is established and how ginseng farmers build marketing strategies to draw new wind in the market. This study was carried out to look over the GAP certified ginseng system and show its marketing strategies using 4P's(product, place, promotion and price). The main results are as follows. GAP ginseng system currently has some weaknesses such as lack of systematic certification management and after-service, nonrealistic certification fee and poor linkage from production to consumption. In the marketing mix strategies, product strategy suggests that the most desirable appearance be transplanted ginseng filled with branch roots and 4 to 5 year-ginseng, and it is necessary to choose multi-brand strategy divided for present into for self-sufficiency and family brand strategy by use if its brand enlarges to processed products in the future. In the place strategy, 3 stages like 'producer group' - 'GAP certified facility' - 'sales shop' are based as the physical marketing channel according to traceability, and connected with giant retail market and environment friendly stand, and if its sales volume enlarges, it should be considered the GAP ginseng specialized marketplace which is a type of chain store. In the promotion strategy, the promotion of government level is necessary at first and producer alliances require the promotion targeting at the group of women under 40 with differentiation from price, quality, and safety. In the price strategy, the early stage-high price strategy which sets 20~25% higher for self-sufficiency and 30~35% for present is desirable.