• Title/Summary/Keyword: Digital Certification

Search Result 209, Processing Time 0.024 seconds

항공전자부품의 품질인증

  • 한상호
    • The Magazine of the IEIE
    • /
    • v.21 no.11
    • /
    • pp.75-85
    • /
    • 1994
  • Safety and Reliability assessments of Avionics Parts must be conducted essentially in the step of disign and manufacture as it constitutes a major field of aircraft critical operation. Recently Avionics parts fabrication techniques are continuously developing by applying digital techniques. Airborne computer is being adopted on an aircraft for flight is being adopted on an aircraft for flight safety augmentation and simplification of controls including reduction of human error. Therefore inspection and evaluation procedures should be developed in order to accomodate such trends. The number of avionics parts is approximitely 72% of total TSO parts, so it is expected high added-values through manufactures of TSO parts in aircraft industries. Particuarly avionics parts must be manufacturered with our own technology to be used in Mid-class aircraft which will be developed soon. Along with this, preparation of Certification Procedures is essential for Avionics Parts.

  • PDF

The development standard research for railway safety software (철도 안전 소프트웨어를 위한 개발 기준 연구)

  • Lee, Young-Jun;Kim, Jang-Yoel;Cha, Kyung-Ho;Cheon, Se-Woo;Lee, Jang-Soo;Kwon, Ki-Choon;Jung, Ui-Jin
    • Proceedings of the KSR Conference
    • /
    • 2007.05a
    • /
    • pp.968-973
    • /
    • 2007
  • The systems such as the railway control system, satellite control system and nuclear power plant control system are the safety critical systems because the failure of them could lead to risk significant events. These softwares of digital systems must follow the life cycle process from the beginning of software development to guarantee their safety and reliability. The NRC(Nuclear Regulatory Commission) Reg Guide of nuclear fields, the RTCA/DO-178B standard which is used to acquire the certification for software in industrial aero field in European Union and United State, the DEF STAN 00-55 standard for the safety of electronic weapon in England, the IEC 601-1-4 for medical equipment and the IEC 62279 for railway system recommended the development life cycle. This paper introduces the development process and compares each other. Also it indicates applicable development criteria for the software of systems related to railway fields and describes the detailed procedure of development criteria. We describe the procedure to make the software development criteria in nuclear filed. For the software development related to railways, the process from plan phase to maintenance phase must be satisfied. The safety and reliability is guaranteed through these standards.

  • PDF

Design and Implementation of EAI(Enterprise Application Integration) System for Privacy Information (개인정보 보호를 위한 EAI 시스템 설계 및 구현)

  • Kim, Yong Deok;Jun, Moon Seog
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.1
    • /
    • pp.51-58
    • /
    • 2013
  • This paper describes the design and implementation of the PKI-based EAI system which is used for delivery of sensitive personal information between business systems. For this purpose, we propose a key exchange protocol with some key process : Diffie-Hellman Schema is used to provide forward secrecy, public key-based digital signature is used for EAI Server authentication, data integrity. In addition, in order to minimize the performance impact on the overall EAI systems. The EAI server was designed simply to be used only as a gateway. This paper shows the implementation of Korea public key authentication algorithm standard and a symmetric encryption algorithm for data encryption.

Development of Program Outcomes Evaluation System for Multidisciplinary Major in Design and Software (디자인과 소프트웨어 융합전공의 프로그램 학습성과 평가체계 개발)

  • Choi, Ji-Eun;Kim, Hakil;Jin, Sung-Hee
    • Journal of Engineering Education Research
    • /
    • v.22 no.6
    • /
    • pp.74-88
    • /
    • 2019
  • In recent years, the design has formed and operated convergence education in conjunction with many other academic fields, and ABEEK also encourages the participation of convergence engineering programs. The purpose of this study is to require design and software convergence major to operate program that accord engineering education certification criteria to develop a program outcomes evaluation system and examine its validity. The program outcomes evaluation system was developed in accordance with development research methods and procedures. As a result, developed evaluation system program outcomes for convergence-based program outcomes: convergence ability, creative thinking ability, entrepreneur ability, and design ability. Finally, it revised and supplemented them through expert validity examine. Expert validity review included 9 experts in engineering, IT engineering, education technology, and design. The validity, usefulness, intelligibility, universality, and explanatory power of the evaluation system were reviewed. The results of this study are expected to provide practical tools for operating ABBEK of convergence programs between design and engineering.

A Study on Distributed OCSP for minimizing the load of OCSP Server based on PKI (PKI환경의 OCSP서버 부하 감소를 위한 OCSP 분산 기법)

  • Ko, Hoon;Jang, Eui-Jin;Shin, Yong-Tae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.6
    • /
    • pp.97-106
    • /
    • 2003
  • The important factor in Public-Key Infrastructure is the authentication to correspondent. We receive the digital certificate for authentication between each other, and then we check the existence of validity on the certificate by Certification Revocation List(CRL). But, To use CRL is the scheme used in offline status. So, it is impossible to refer to the latest information and the CRL scheme which is used after downloading is variously unsuitable to getting bigger of the CRL size as time goes on. Therefore, we prefer OCSP(Online Certificate Status Protocol) used in online to CRL used in offline. Consequently, we propose the scheme which provides the request of fast verification in case of requesting the verification on the certificate by owning the same update information to Certificate Registry and distributed OCSP.

Research on Business Job Specification through Employment Information Analysis (채용정보 분석을 통한 비즈니스 직무 스펙 연구)

  • Lee, Jong Hwa;Lee, Hyun Kyu
    • The Journal of Information Systems
    • /
    • v.31 no.1
    • /
    • pp.271-287
    • /
    • 2022
  • Purpose This research aims to study the changes in recruitment needed for the growth and survival of companies in the rapidly changing industry. In particular, we built a real company's worklist accounting for the rapidly advancing data-driven digital transformation, and presented the capabilities and conditions required for work. Design/methodology/approach we selected 37 jobs based on NCS to develop the employment search requirements by analyzing the business characteristics and work capabilities of the industry and company. The business specification indicators were converted into a matrix through the TF-IDF process, and the NMF algorithm is used to extract the features of each document. Also, the cosine distance measurement method is utilized to determine the similarity of the job specification conditions. Findings Companies tended to prefer "IT competency," which is a specification related to computer use and certification, and "experience competency," which is a specification for experience and internship. In addition, 'foreign language competency' was additionally preferred depending on the job. This analysis and development of job requirements would not only help companies to find the talents but also be useful for the jobseekers to easily decide the priority of their specification activities.

Secure Certificates Duplication Method Among Multiple Devices Based on BLE and TCP (BLE 및 TCP 기반 다중 디바이스 간 안전한 인증서 복사 방법)

  • Jo, Sung-Hwan;Han, Gi-Tae
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.2
    • /
    • pp.49-58
    • /
    • 2018
  • A certificate is a means to certify users by conducting the identification of the users, the prevention of forgery and alteration, and non-repudiation. Most people use an accredited certificate when they perform a task using online banking, and it is often used for the purpose of proving one's identity in issuing various certificates and making electronic payments in addition to online banking. At this time, the issued certificate exists in a file form on the disk, and it is possible to use the certificate issued in an existing device in a new device only if one copies it from the existing device. However, most certificate duplication methods are a method of duplication, entering an 8-16 digit verification code. This is inconvenient because one should enter the verification code and has a weakness that it is vulnerable to security issues. To solve this weakness, this study proposes a method for enhancing security certificate duplication in a multi-channel using TCP and BLE. The proposed method: 1) shares data can be mutually authenticated, using BLE Advertising data; and 2) encrypts the certificate with a symmetric key algorithm and delivers it after the certification of the device through an ECC-based electronic signature algorithm. As a result of the implementation of the proposed method in a mobile environment, it could defend against sniffing attacks, the area of security vulnerabilities in the existing methods and it was proven that it could increase security strength about $10^{41}$ times in an attempt of decoding through the method of substitution of brute force attack existing method.

An Establishment of Functional Test Facility for ICT-Convergence Equipment of Vessel : Focused on Maritime Digital Interfaces and Main Navigation Communication Systems (선박 ICT융합 장비 기능시험 시설 구축 연구 : 선박 디지털 인터페이스 및 주요 항해통신장비를 중심으로)

  • Hwang, Hun-Gyu;Kim, Bae-Sung;Woo, Snag-Min;Woo, Yun-Tae;Shin, Il-Sik
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.5
    • /
    • pp.754-763
    • /
    • 2018
  • The maritime ICT-convergence equipment are essentially required to a type approval (TA) certification that needs environmental and functional tests, to install in vessel. The environmental test is to experiment the possession for required durabilities of the target device in maritime environment, and the functional test is to check the required functions of target equipment based on international standard. In Korea, the environmental testing facilities amount to 227 sites, but there is no functional testing facility. Because of this, we establish a function test facility for the maritime ICT-equipment. In this paper, we analyze and design the functional testing requirement and required interlocking simulators for digital interfaces and navigation communication equipment. We propose the 2-steps of functional testing procedures, which are single test and integration test, to improve the reliability of testing result. The single test is to examine own functions of the target device, and the integration test is to check harmonized operation with other navigation and communication devices.

A Phenomenological Approach toward The Problems of Squash Referee's Decision Making Experience (스쿼시 심판들이 경험하는 판정어려움에 대한 현상학적 접근)

  • Lee, Byung-Hyuk;Lee, So-Mi
    • Journal of Digital Convergence
    • /
    • v.16 no.2
    • /
    • pp.471-477
    • /
    • 2018
  • The Journal of Digital Policy & Management. This space is for the abstract of your study in EnThis research aims to analyze the difficulties associated with the squash referee's decision by using the phenomenological analysis of Giorgi. With such approach, this paper investigated the fundamental causes of the difficulties of the decision making process of the referee, and then argues the needs for eliminating such causes. Five referees were recruited as the study participants, among the experienced referees with more than 10-year experience and 2nd grade certification, issued by the Korea Squash Federation. The research was conducted between June 2015 and July 2016. Participatory observation, semi-structured in-depth interview. Following Giorgian four-step phenomenological analysis, all transcribed interview data were categorized into three components-'problems from the individual situation', 'problems from the social situation', and 'problems from the circumstantial situation'. Although the referees are one of major factors that determine the success and failure of the game, their working condition is far from the ideal, as observed in the problems above. Therefore, to improve the quality of the judgement, it is most important to reward the referees, who are the subject of the decision, with better economic treatment. Such improvement of the working condition of the referees is also highly related with the reproduction and professionalization of the referees.

The Problems in Digital Watermarking into Intra-Frames of H.264/AVC (H.264-기반 인트라 프레임의 디지털 워터마킹 문제)

  • Choi, Hyun-Jun;Seo, Young-Ho;Kim, Dong-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.2
    • /
    • pp.233-242
    • /
    • 2009
  • This paper intend to show the affect of the intra-prediction on the typical digital watermarking method and the fact that the watermarking method has very low effectiveness when it is performed for the intra-frames of H.264. The target watermarking method was the one for imperceptibility and robustness and was assumed to be performed during the intra-compression process by the H.264 technique. Also this method was assumed to insert watermark data and to extract it for certification if needed. The problem is that the resulting data from the re-engineering of the watermark insertion process to extract the watermark data is different from the one before. We experimentally showed that it stems from the intra-prediction itself. That is, we showed that the resulting image data from only compression without watermarking changes if it is re-compressed by the same conditions as the first compression and it is because the intra-prediction modes as well as the coefficient values change. Also, we applied one blind and one semi-blind watermarking methods to show that the typical attacks after watermarking makes this problem much more serious and lowers the effectiveness of the watermarking method dramatically. Therefore we concluded by considering the experimental data that a typical watermarking method which has been researched so far cannot guarantee the effectiveness of intra-frame watermarking and it is highly required to developed a new kind of methodologies.