• Title/Summary/Keyword: Decentralized Identifier

Search Result 20, Processing Time 0.028 seconds

Design and implementation of access control systems using decentralized identifier technology (탈중앙화 신원증명을 이용한 출입통제 시스템의 설계 및 구현)

  • Lee, Sang-Geun;Kim, Do-Hyeong;Jung, Soon-Ki
    • Convergence Security Journal
    • /
    • v.21 no.2
    • /
    • pp.37-46
    • /
    • 2021
  • Decentralized Identifier (DID) technology is a technology that uses blockchain technology to prove an individual's identity through information owned by the individual rather than through a central system. In this paper, we would like to present an access control system using decentralized identifier technology. The access control system using decentralized identifier technology (DID access control system) is a system that allows users to verify their identity from the DID blockchain server through their smartphone (mobile employee ID) and access when they are confirmed to be registered in the access control system. Through this, access control can be managed only by verifying identification with smartphones (mobile employee ID) and DID blockchain servers without having to store information to prove an individual's identity in the access control system.

A Study on the Feedforward Neural Network Based Decentralized Controller for the Power System Stabilization (전력계토 안정화 제어를 위한 신경회로만 분산체어기의 구성에 관한 연구)

  • 최면송;박영문
    • The Transactions of the Korean Institute of Electrical Engineers
    • /
    • v.43 no.4
    • /
    • pp.543-552
    • /
    • 1994
  • This paper presents a decentralized quadratic regulation architecture with feedforward neural networks for the control problem of complex systems. In this method, the decentralized technique was used to treat several simple subsystems instead of a full complex system in order to reduce training time of neural networks, and the neural networks' nonlinear mapping ability is exploited to handle the nonlinear interaction variables between subsystems. The decentralized regulating architecture is composed of local neuro-controllers, local neuro-identifiers and an overall interaction neuro-identifier. With the interaction neuro-identifier that catches interaction characteristics, a local neuro-identifier is trained to simulate a subsystem dynamics. A local neuro-controller is trained to learn how to control the subsystem by using generalized Backprogation Through Time(BTT) algorithm. The proposed neural network based decentralized regulating scheme is applied in the power System Stabilization(PSS) control problem for an imterconnected power system, and compared with that by a conventional centralized LQ regulator for the power system.

A Model for Self-Authentication Based on Decentralized Identifier (탈중앙화 신원증명에 기반한 본인 인증 모델)

  • Kim, Ho-Yoon;Han, Kun-Hee;Shin, Seung-Soo
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.11
    • /
    • pp.66-74
    • /
    • 2021
  • With the development of the Internet, user authentication technology that proves me online is improving. Existing ID methods pose a threat of personal information leakage if the service provider manages personal information and security is weak, and the information subject is to the service provider. In this study, as online identification technology develops, we propose a DID-based self-authentication model to prevent the threat of leakage of personal information from a centralized format and strengthen sovereignty. The proposed model allows users to directly manage personal information and strengthen their sovereignty over information topics through VC issued by the issuing agency. As a research method, a self-authentication model that guarantees security and integrity is presented using a decentralized identifier method based on distributed ledger technology, and the security of the attack method is analyzed. Because it authenticates through DID Auth using public key encryption algorithms, it is safe from sniffing, man in the middle attack, and the proposed model can replace real identity card.

Neighbor-Referenced Coordination of Multi-robot Formations (다중 로봇의 네이버기준 편대제어)

  • Lee, Geun-Ho;Chong, Nak-Young
    • The Journal of Korea Robotics Society
    • /
    • v.3 no.2
    • /
    • pp.106-111
    • /
    • 2008
  • This paper presents a decentralized coordination for a small-scale mobile robot teams performing a task through cooperation. Robot teams are required to generate and maintain various geometric patterns adapting to an environment and/or a task in many cooperative applications. In particular, all robots must continue to strive toward achieving the team's mission even if some members fail to perform their role. Toward this end, given the number of robots in a team, an effective coordination is investigated for decentralized formation control strategies. Specifically, all members are required first to reach agreement on their coordinate system and have an identifier (ID) for role assignment in a self-organizing way. Then, employing IDs on individual robots within a common coordinate system, a decentralized neighbor-referenced formation control is realized to generate, keep, and switch between different geometric shapes. This approach is verified using an in-house simulator and physical mobile robots. We detail and evaluate the formation control approach, whose common features include self-organization, robustness, and flexibility.

  • PDF

A study on the Application of Distributed ID Technology based on Blockchain for Welfare Blind Spot Management (복지사각지대 관리를 위한 블록체인 분산 ID기술 적용 연구)

  • Min, Youn A
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.6
    • /
    • pp.145-150
    • /
    • 2020
  • The importance of managing blind spots in the welfare crisis is increasing. Accordingly, in order to manage the blind spot of the welfare crisis, it is necessary to manage the social safety net with the contents of supporting income and self-reliance of low-income families, and actively discovering and supporting poor and crisis households. In this paper, we reviewed various problems related to blind spots for the management of welfare blind spots, and proposed the applicability of blockchain-based distributed ID and the possibility of distributed ID technology in stages by considering the range of blind spots.

The Reliable Communication Method for Self-Sovereign Identity Ecosystems (자기주권 신원 생태계를 위한 신뢰할 수 있는 통신 방법)

  • Chio, Gyu Hyun;Kim, Geun-Hyung
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.3
    • /
    • pp.91-98
    • /
    • 2022
  • With the recent increase in interest in metaverse in which virtual and physical spaces are digitally fused, many activities in physical spaces are expected to take place in web-based virtual spaces. Therefore, there is a need for research on a self-sovereign identity system that can secure privacy and mutual trust in a DID(decentralized identifier)-based virtual space environment. We, in this paper, developed and validated a reliable communication method consisting of DIDComm messages, a procedure for generating distributed identifiers, asymmetric keys, and DID documents based on Hyperledger Indy and DIDComm open sources. The developed communication method can be applied to verify each other by exchanging additional information and verifiable credentials for trust among communication participants.

A Research on the Use of DID Using a Private Blockchain (프라이빗 블록체인을 사용한 DID 활용 연구)

  • Park, Jong-Gyu;Kwon, Seong-Geun;Kwon, Ki-Ryong;Lee, Suk-Hwan
    • Journal of Korea Multimedia Society
    • /
    • v.24 no.6
    • /
    • pp.760-767
    • /
    • 2021
  • The identity verification is one of the most important technologies in online services. Many services in society are provided online, and the service is provided after confirming the user's identity. Users can do a lot of things online, but they also have side effects. Online digital information is easily manipulated and it is difficult to verify its authenticity, causing social confusion. Accordingly, there has been a movement for individuals to directly manage their identity information using DID. In this paper, we propose a system that can authenticate identity by directly adding own personal information and issuing an identifier using DID technology based on a private blockchain. Then, to verify the proposed system, the scenario is executed and verified.

A Design of Certificate Password Recovery Using Decentralized Identifier (DID를 사용한 인증서 암호 복구)

  • Kim, Hyeong-uk;Kim, Sang-jin;Kim, Tae-jin;Yu, Hyeong-geun
    • Journal of Venture Innovation
    • /
    • v.2 no.2
    • /
    • pp.21-29
    • /
    • 2019
  • In the public certificate technology commonly used in Korea, users have a cumbersome problem of always resetting when they forget their password. In this paper, as a solution to this problem, we propose a secure authentication certificate password recovery protocol using blockchain, PKI, and DID for distributed storage. DID is a schema for protecting block ID in blockchain system. The private key used in the PKI is configured as a user's biometric, for example, a fingerprint, so that it can completely replace the memory of the complex private key. To this end, based on the FIDO authentication technology that most users currently use on their smartphones, the process of authenticating a user to access data inside the block minimizes the risk of an attacker taking over the data.

Consideration factors in implementing blockchain technology-based DID platform using ANP methodology - From a two-sided market perspective - (ANP 방법론을 이용한 블록체인 기술 기반 DID 플랫폼 구현 시 고려요소 - 양면시장 관점에서-)

  • Choi, Seungho;Youn, Daemyung
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.27 no.4
    • /
    • pp.127-136
    • /
    • 2022
  • As technological development continues, platforms with more diverse structures are emerging. Existing research predicts that a new structure based on technology and innovation will affect the two-sided market. This study evaluated the decentralized identifier (DID) platform, a new platform based on blockchain technology, of the importance of this platform from the perspective of the two-sided market. Using the Analytic Network Process, IT, platform, and blockchain experts conducted a dual comparison survey. Data with a consistency ratio value of 0.1 or less were selected and analyzed for 12 data. The research results showed the importance of service quality, policy support, openness, and uncertainty. This study is expected to be used to support the development of strategic decision-making for blockchain and DID platform-based business companies.

Implementation and Utilization of Decentralized Identity-Based Mobile Student ID (분산 ID 기반 모바일 학생증 구현과 활용)

  • Cho, Seung-Hyun;Kang, Min-Jeong;Kang, Ji-Yun;Lee, Ji-Eun;Rhee, Kyung-Hyune
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.6
    • /
    • pp.1115-1126
    • /
    • 2021
  • In this paper, we developed a mobile student ID providing a self sovereignty identity (SSI) which replaces the conventional plastic-type student ID that includes private information of a student such as a name, a student number, a facial photo, etc. The implemented mobile student ID solves the problem of exposing student's identity due to a loss or a theft of a plastic-type student ID, and it has a structure and process of FRANCHISE model which is developed by a concept of a decentralized Identity(DID) of a Blockchain, in which specialized for convenience as an electronic student ID through an application on a smart phone device. In addition, it protects student's privacy by controlling personal information on oneself. By using a smartphone, not only it easily identifies the student but also it expands to several services such as participation in school events, online authentication, and a student's exchange program among colleges.