• Title/Summary/Keyword: Digital Certification

Search Result 209, Processing Time 0.022 seconds

A Study on Vulnerability Analysis and Countermeasure in Barcode Payment System (바코드 지불 결제 시스템 취약점 분석 및 대응방안 연구)

  • Lee, Jae Sik;Lee, Sang Hun;Jun, Moon Seog
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.8 no.3
    • /
    • pp.65-74
    • /
    • 2012
  • A barcode is a representative means of cognition. It is either printed on the package of a product or attached to it as a sticker. It is used for the fast cognition of a product at a store. It is considerably cheap to make a barcode. Also, it is possible to read it fast by using a barcode reader. Because of such convenience provided by the barcode, a new system using the barcode as a means of settling payments like a currency or a credit card has been developed. However, due to its characteristics, it is easy to reduplicate, forge or falsify a barcode easily. Therefore, this study focuses on the case of applying the system using barcodes as a means of settling payments without providing solutions for the potential weaknesses. Also, this study suggests various points to consider regarding the creation of safe barcodes as one of the related measures, while providing various methods using additional means of certification other than the one of using barcodes in addition to the way of applying complexity with barcode numbers. Throughout this study, it will be possible to safely establish and operate the payment-settlement system using barcodes.

A Study on FIDO UAF Federated Authentication Using JWT Token in Various Devices (다양한 장치에서 JWT 토큰을 이용한 FIDO UAF 연계 인증 연구)

  • Kim, HyeongGyeom;Kim, KiCheon
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.16 no.4
    • /
    • pp.43-53
    • /
    • 2020
  • There are three standards for FIDO1 authentication technology: Universal Second Factor (U2F), Universal Authentication Framework (UAF), and Client to Authenticator Protocols (CTAP). FIDO2 refers to the WebAuthn standard established by W3C for the creation and use of a certificate in a web application that complements the existing CTAP. In Korea, the FIDO certified market is dominated by UAF, which deals with standards for smartphone (Android, iOS) apps owned by the majority of the people. As the market requires certification through FIDO on PCs, FIDO Alliance and W3C established standards that can be certified on the platform-independent Web and published 『Web Authentication: An API for Accessing Public Key Credentials Level 1』 on March 4, 2019. Most PC do not contain biometrics, so they are not being utilized contrary to expectations. In this paper, we intend to present a model that allows login in PC environment through biometric recognition of smartphone and FIDO UAF authentication. We propose a model in which a user requests login from a PC and performs FIDO authentication on a smartphone, and authentication is completed on the PC without any other user's additional gesture.

A Study on Recognition of Robot Barista Using Social Media Text Mining (소셜미디어 텍스트마이닝을 활용한 로봇 바리스타 인식 탐색 연구)

  • Han Jangheon;An Kabsoo
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.20 no.2
    • /
    • pp.37-47
    • /
    • 2024
  • The food tech market, which uses artificial intelligence robots for the restaurant industry, is gradually expanding. Among them, the robot barista, a representative food tech case for the restaurant industry, is characterized by increasing the efficiency of operators and providing things for visitors to see and enjoy through a 24-hour unmanned operation. This research was conducted through text mining analysis to examine trends related to robot baristas in the restaurant industry. The research results are as follows. First, keywords such as coffee, cafe, certification, ordering, taste, interest, people, robot cafe, coffee barista expert, free, course, unmanned, and wine sommelier were highly frequent. Second, time, variety, possibility, people, process, operation, service, and thought showed high closeness centrality. Third, as a result of CONCOR analysis, a total of 5 keyword clusters with high relevance to the restaurant industry were formed. In order to activate robot barista in the future, it is necessary to pay more attention to functional development that can strengthen its functions and features, as well as online promotion through various events and SNS in the robot barista cafe.

Digital Contents Protection Without Server Authentication Using Smart Cards (스마트 카드를 이용한 서버 인증이 필요 없는 디지털 콘텐츠 보호 기법)

  • Kim, Young-Sik;Lim, Dae-Woon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.3C
    • /
    • pp.133-139
    • /
    • 2011
  • Nowadays, it is considered as an important task to protect digital contents from illegal use and reproduction. In many cases, there are secure servers to authenticate the allowed users and the user authentication process is performed by communication between the servers and users. However, if the number of users and contents are increased, the servers should treat a large amount of authentication loads and the authentication cost will be considerably increased. Moreover, this scheme is not adequate for some players in which only a limited function of communication is deployed. In order to solve this problem, this paper proposes an authentication method which can certificate both the digital contents and players, and prevent illegal reproduction without the certification server. The proposed scheme is secure in the replay attack, the man in the middle attack, and data substitution attack.

Digital Video Watermarking Using Block Reordering Algorithm Based on DCT (DCT 기반의 블록 재정렬 알고리즘을 이용한 디지털 비디오 워터마킹)

  • Kim Kyoung-Sik;Park Kyung-Jun;Ko Hyung Hwa
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.7C
    • /
    • pp.696-705
    • /
    • 2005
  • The rapid progress of the software has enabled individuals to copy and remake digital contents, which was only done by professionals. However, this rapid growth of software has brought many other defects. As a solution to the problems, contents producer needs to have certification and inspection of its contents text and hold the proprietary rights. In this paper, the new video watermarking scheme is proposed which is appropriate for the requirements mentioned for digital video contents and it is applied to MPEG-2 video encoder and decoder. In order to insert watermark sequence for digital video data, watermarking used blocks reordering algorithm and SCL(secret code list). It is satisfied two properties of cryptography that confidentiality and integrity. We test the proposed algorithm to see its performance in terms of watermark capacity, compression robustness and visual quality impact. According to the experiment of proposed watermarking algorithm, we obtained satisfactory results that watermark can still be extracted after MPEG-2 re-encoding at lower bit rates. It is important property for data hiding and user authentication in video data.

A Study on the Improvement of Information Education for the Elderly (고령층 정보화 교육 활성화 방안에 관한 연구)

  • Kim, Chaekak
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.4
    • /
    • pp.57-69
    • /
    • 2017
  • The ability to use and utilize information technology devices in the knowledge-based society shows many differences in terms of quality of life. However, in the case of the elderly, the elderly suffer difficulties in acquiring information technology due to their aging characteristics, so they can not easily adapt to rapidly changing societies. Therefore, it is becoming more and more important to educate the elderly who are trying to adapt to the new environment of knowledge-based society. Therefore, in this study, we analyzed the previous researches of the researchers related to the elderly informatization education and the report of the actual situation of the digital divide of the government, and identified the problems and suggested ways to activate the effective education for the aged. The following suggestions are made to activate information education. First, there is a need for systematic promotion and professional counseling on the need for information education for the elderly learners. Second, the development of various curriculum that can be used in real life. Third, development of customized learning materials. etc. Fourth, Obtain a professional lecturer for the elderly. It is limited to lecturers who have completed teaching and learning methods that reflect the characteristics of the elderly. Fifth, the introduction of qualification certification system that can measure the level of informatization of the elderly learners. Sixth, building e-learning system for elderly people. Seventh, to establish a new organization dedicated solely to information education for the elderly. When these parts are realized, it will help elderly people to improve their quality of life through alleviation of solitude and alienation.

A Study on the Digital Signature and Certification Authority (전자서명(電子署名)과 인증(認證)에 관한 연구(硏究))

  • Kim, Young-Joon
    • International Commerce and Information Review
    • /
    • v.3 no.1
    • /
    • pp.83-104
    • /
    • 2001
  • 전자문서를 이용한 전자거래는 비접촉, 비대면으로 이루어지기 때문에 거래당사자간에 상대방의 신원과 거래의사의 진정성 여부를 확인하기 어렵고, 타인으로 위장하여 전자문서 등을 부정하게 사용할 위험이 있다. 또한 전자문서는 유통되는 과정에서 위 변조가 용이하고, 문서작성 사실을 입증하기 곤란할 뿐만 아니라, 전송 내용의 비밀 유지가 곤란하다는 문제점이 있다. 이 같이 전자문서 및 전자거래가 가지는 문제점을 해소하기 위한 방안이 암호기술을 이용한 전자서명과 인중문제이다. 세계 각국은 전자거래에서 전자문서의 내용을 증명하고 거래의 진정성을 법적으로 확보하기 위한 관련 법제를 추진하고 있다. 우리 나라도 전자서명법을 제정하여 1999년 7월부터 시행하고 있으며, 비록 전자거래법과 갈이 시행초기라서 아직 법규정이 미비하나 전자거래의 시발점을 열었다는 점에서 의의가 크다고 할 수 있다. 이와 관련하여 전자거래에서 전자서명과 인증과 관한 기술적 내용과 일반적 논의를 살펴보고, 이와 관련된 국내외 동향과 최근 제정하여 시행중인 전자거래법과 시행령 시행규칙의 주요 내용을 검토하고 이를 중심으로 향후 전자서명 인증관련 주요 과제 및 방전 방안을 검토하고자 한다.

  • PDF

A Color Image Watermarking Method for Embedding Audio Signal

  • Kim Sang Jin;Kim Chung Hwa
    • Proceedings of the IEEK Conference
    • /
    • 2004.08c
    • /
    • pp.631-635
    • /
    • 2004
  • The rapid development of digital media and communication network urgently brings about the need of data certification technology to protect IPR (Intellectual property right). This paper proposed a new watermarking method for embedding contents owner's audio signal in order to protect color image IPR. Since this method evolves the existing static model and embeds audio signal of big data, it has the advantage of restoring signal transformed due to attacks. Three basic stages of watermarking include: 1) Encode analogue ID owner's audio signal using PCM and create new 3D audio watermark; 2) Interleave 3D audio watermark by linear bit expansion and 3) Transform Y signal of color image into wavelet and embed interleaved audio watermark in the low frequency band on the transform domain. The results demonstrated that the audio signal embedding in color image proposed in this paper enhanced robustness against lossy JPEG compression, standard image compression and image cropping and rotation which remove a part of image.

  • PDF

Design and Implementation of Web-based Electronic Bidding System using XML (웹 기반의 XML을 활용한 전자 입찰 시스템의 설계 및 구현)

  • 윤선희
    • The Journal of Information Systems
    • /
    • v.10 no.1
    • /
    • pp.127-146
    • /
    • 2001
  • The area of business applications in the internet are extended enormously in result of fast development of computing and communication technologies, increase of internet use, and use of intranet/extranet in enterprise information system. Widely spread the use of the internet, there are various applications for Business to Business (B to B) or Business to Customer(B to C) model that are based on the intranet or extranet. This paper designed and implemented the Web-based Electronic Bidding System for Business to Business (B to B) model. The technical issues of electronic bidding system in the internet are involved in the connection between web client and server, electronic data interchange for the contract document, and security solution during the bidding and contracting processes. The web-based electronic bidding system in this paper is implemented using Java applet and servlet as a connection interface for web client and server, XML/EDI-based documents for a bid and a contract, and bidding server and notary server for enhancing the security using PKI(Public Key Infrastructure)-based public key cryptography, digital signature and Certification Authority(CA).

  • PDF

A Study on the Electronic Payment - Laying Stress on the Risk Analysis and Reliability- (전자결제에 관한 연구 - 위험분석과 신뢰성확보방안을 중심으로 -)

  • Choi, Seok Boom
    • Journal of Arbitration Studies
    • /
    • v.9 no.1
    • /
    • pp.323-365
    • /
    • 1999
  • The digital revolution is happening much more quickly and Internet Commerce and Electronic Commerce is having a profound influence on the global trade and internal commerce, revolutionize the way of doing business, especially retail and direct marketing. Owing to Internet, an increasing share of business transactions occurs online. Electronic payment is essential for the smooth progress of the electronic commerce as electronic payment plays the important role in the electronic commerce, that is, the value transfer resulting from the electronic commerce. So far, there have not been a considerable emphasis on the risks residing in the electronic payment and money. So, this paper deals with the risks in the electronic payment and money, in particular technical risks and social risks, and the reliability-increasing schemes to prevent the risks in the electronic payment. The reliability-increasing schemes relate to the security of the electronic payment systems and certification authority and key management, transaction rules between the parties concerned in the electronic payment.

  • PDF