• Title/Summary/Keyword: Digital Certificates

Search Result 52, Processing Time 0.021 seconds

Consumer Acceptance of Mobile Gift Certificates - Focused on UTAUT2 - (밀레니얼 세대의 모바일 상품권 수용태도에 관한 연구 - 확장된 통합기술수용모형을 중심으로 -)

  • Choi, Byung-Cheon;Kim, Hye-Jin;Chung, Ji-Bok
    • Journal of Digital Convergence
    • /
    • v.17 no.9
    • /
    • pp.97-104
    • /
    • 2019
  • With the development and spread of smart devices, the proportion of mobile shopping is gradually increasing, and the market for mobile gift certificates is also increasing. This study examines the usage status and acceptance attitude of mobile gift certificates for university students who are major customers of mobile gift certificates. Also, based on the extended integrated technology acceptance model (UTAUT2), the results of the analysis of the mediating effect of the intention of the user on the relationship between acceptance of mobile vouchers and recommendation intention were presented. As a result of the analysis, it was shown that the effort expectation, hedonic motivation, price utility, and habit had significant influence on the intention to use the mobile gift certificates. Also, the intention to use mobile gift certificates has mediating effects between effort expectation, hedonic motivation, price utility and recommendation intention. The results of this study can be applied to strategic marketing such as recruitment of new customers through mobile gift certificates while explaining customers' acceptance of technology to mobile gift vouchers or future prospective customers.

Authentication Model of PKI-based Security Gateway using Blockchain having Integrity (무결성이 보장된 블록체인 기술을 활용한 PKI 기반 보안 게이트웨이의 인증 모델)

  • Kim, Young Soo;Mun, Hyung-Jin
    • Journal of Digital Convergence
    • /
    • v.19 no.10
    • /
    • pp.287-293
    • /
    • 2021
  • Recently, public certificates issued by nationally-recognized certification bodies have been abolished, and internet companies have issued their own common certificates as certification authority. The Electronic Signature Act was amended in a way to assign responsibility to Internet companies. As the use of a joint certificate issued by Internet companies as a certification authority is allowed, it is expected that the fraud damage caused by the theft of public key certificates will increase. We propose an authentication model that can be used in a security gateway that combines PKI with a blockchain with integrity and security. and to evaluate its practicality, we evaluated the security of the authentication model using Sugeno's hierarchical fuzzy integral, an evaluation method that excludes human subjectivity and importance degree using Delphi method by expert group. The blockchain-based joint certificate is expected to be used as a base technology for services that prevent reckless issuance and misuse of public certificates, and secure security and convenience.

A Method of Anonymity Authentication using the Public Certificate (공인인증서를 이용한 익명인증 방법)

  • Lee, Young Gyo;Ahn, Jeong Hee
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.1
    • /
    • pp.115-129
    • /
    • 2010
  • As the fixed mobile communication tools using the internet are developed, the off-line services are serviced through on-line on the internet. our society is divided into the real world and the cyber world. In the cyber world, the authentication to the user is absolutely required. The authentication is divided into the real-name authentication and the anonymous authentication by the kind of the internet service provider. There are some ISPs needed the real-name authentication and there are others ISPs needed the anonymity authentication. The research about the anonymity authentication is steadily established to these days. In this paper, we analyze the problem about blind signature, group signature, ring signature, and traceable signature. And we propose a method of anonymity authentication using the public certificate. In the proposal, the anonymity certificate have the new structure and management. Certificate Authority issues several anonymity certificates to a user through the real-name authentication. Several anonymity certificates give non-linked and non-traceability to the attacker.

Cryptanalysis and Improvement of an Efficient Certificateless Signature Scheme

  • Li, Jiguo;Huang, Xinyi;Mu, Yi;Wu, Wei
    • Journal of Communications and Networks
    • /
    • v.10 no.1
    • /
    • pp.10-17
    • /
    • 2008
  • In traditional digital signature schemes, certificates signed by a trusted party are required to ensure the authenticity of the public key. In Asiacrypt 2003, the concept of certificateless signature scheme was introduced. The advantage of certificateless public key cryptography successfully eliminates the necessity of certificates in the traditional public key cryptography and simultaneously solves the inherent key escrow problem suffered in identity-based cryptography. Recently, Yap et al. proposed an efficient certificateless signature scheme and claimed that their scheme is existentially unforgeable in the random oracle model. In this paper, we show that the certificateless signature scheme proposed by Yap et al. is insecure against public key replacement attacks. Furthermore, we propose an improved certificateless signature scheme, which is existentially unforgeable against adaptive chosen message attacks under the computational Diffie-Hellman assumption in the random oracle model and provide the security proof of the proposed scheme.

Secure MAC address-based Authentication on X.509 v3 Certificate in Group Communication (그룹 통신을 위한 안전 MAC 주소 기반 X.509 인증서에 관한 연구)

  • Hong, Sung-Hyuck
    • Journal of Internet Computing and Services
    • /
    • v.9 no.4
    • /
    • pp.69-77
    • /
    • 2008
  • I propose adding users’Media Access Control (MAC) addresses to standard X.509 certificates to provide more secure authentication. The MAC address can be added by the issuing Certification Authority (CA) to the "extensions" section of the X.509 certificate. I demonstrate that when two users with MAC address information on their digital certificates communicate, the MAC address on the first user’s certificate can be easily verified by the second user. In this way, security can be improved without markedly degrading system performance and the level of initial trust between participants in virtual communities will be improved.

  • PDF

The Development Model of a non-rechargeable wrist-type smart-band for the vulnerable group

  • YU, Kyoungsung;SHIN, Seung-Jung
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.14 no.1
    • /
    • pp.170-181
    • /
    • 2022
  • We live in a digital age. Smartphones are used by everyone from children to the elderly. And many smart devices are pouring out and changing our daily life a lot. However, even in the development of this digital age, there are some marginalized groups. There are also those who are reluctant to expose their information in the digital age. They have difficulty making reservations on their smartphones, using payment systems, logging into the site using various authentication and verification procedures, and entering and leaving buildings. We still carry most IDs, seals, certificates, etc. in physical form. Those who use smartphones are enjoying the convenience of the times. However, among the underprivileged, the desire to pass everything with only one device is growing. In this study, the most suitable smart band model was proposed by collecting the Delphi survey and the opinions of the general public. Future research is required to improve practical usability and utility by developing cheaper and more convenient models.

A Study on the send and receive of the message in the Bolero System (볼레로 시스템상의 메시지 송수신에 관한 고찰)

  • 전순환
    • The Journal of Information Technology
    • /
    • v.4 no.2
    • /
    • pp.1-23
    • /
    • 2001
  • The purpose of this paper is to study the send and receive of the Message in the Bolero System. Bolero System is the business processes and methods, together with the digital information system, which are provided by Bolero International for communicating Messages and Documents and facilitating business transactions, as well as the Bolero Rulebook and Operating Rules governing their use. The advantage of bolero.net include speed, cost and efficiency. First, bolero.net moves cirtical information and transactions more quickly than paper can move. Second, a message costs much less to transmit through bolero.net than via couriers and other paper means. Third, because bolero.net logs and tracks all transactions centrally, less data gets lost and fewer data entry errors occur. Bolero International is the certifier for all certificates used in the Bolero System at present. It takes significant responsibility and liability for the certificates that it issues in each Operational Service Contract. In the future, Bolero International may devolve the task of serving as certifier to one or more other qualified institutions.

  • PDF

A Study on Multi-Signature Scheme for Efficient User Authentication in Metaverse (메타버스 환경에서의 효율적인 사용자 인증을 위한 다중 서명 기법 연구)

  • Jae Young Jang;Soo Yong Jeong;Hyun Il Kim;Chang Ho Seo
    • Smart Media Journal
    • /
    • v.12 no.2
    • /
    • pp.27-35
    • /
    • 2023
  • Currently, online user authentication is perform using joint certificates issued by accredited certification authorities and simple certificates issued by private agency. In such a PKI(Public Key Infrastructure) system, various cryptographic technologies are used, and in particular, digital signatures are used as a core technology. The digital signature scheme is equally used in DID(Decentralized Identity), which is attracting attention to replace the existing centralized system. As such, the digital signature-based user authentication used in current online services is also applied in the metaverse, which is attracting attention as the next-generation online world. Metaverse, a compound word of "meta," which means virtual and transcendent, and "universe," means a virtual world that includes the existing online world. Due to various developments of the metaverse, it is expted that new authentication technologies including biometric authentication will be used, but existing authentication technologies are still being used. Therefore, in this study, we study digital signature scheme that can be efficiently used for user authentication in the developing metaverse. In particular, we experimentally analyze the effectiveness of ECDSA, which is currently used as a standard for digital signatures, and Schnorr signatures, which can quickly verify a large amount of signatures.

A Study of the Alternative Means of Korean Resident Registration Number using the Authorized Certificate (공인인증서를 이용한 주민등록번호 대체수단에 관한 연구)

  • Lee, Young Gyo;Ahn, Jeong Hee
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.3
    • /
    • pp.107-117
    • /
    • 2014
  • The personal information extrusion accident(hacking, improper maintenance) by the internet has been increased rapidly during the last ten-year period. The personal information includes Korean resident registration number, name, cellphone number, home telephone number, E-mail address, home address, etc. Korean resident registration number is unchangeable from the cradle to the grave. Illegally accessed personal information can be wrongfully resoled or used at phishing scam. In this paper, we propose a alternative means of Korean resident registration number using the authorized certificate. The authorized certificate is in use safely in Internet. The authorized certificate(included Chinese name) is in used in offline service, the authorized certificate(included English name) is used in online(for government service) and the authorized certificate(not included name) is used in online(for private service). The authorized certificates are possible for discard, republication. The method can reduce the possibility of the personal information extrusion.