• Title/Summary/Keyword: Digital Certification

Search Result 208, Processing Time 0.022 seconds

DESIGNIN AND OPERATION OF DIGITAL EVIDENCE MANAGEMENT SYSTEM APPLYING COMPUTER FORENSICS AND ELECTRONIC CERTIFICATION (전자증거 관리시스템의 설계)

  • 김종섭;하옥현;김귀남
    • Proceedings of the Safety Management and Science Conference
    • /
    • 2001.05a
    • /
    • pp.275-280
    • /
    • 2001
  • DESIGNIN AND OPERATION OF DIGITAL EVIDENCE MANAGEMENT SYSTEM APPLYING COMPUTER FORENSICS AND ELECTRONIC CERTIFICATION Digital evidence will be used as a term, which means the electronic form of information which is necessary to confirm or prove the factum of all kinds of behaviors committed through the devices which have data processing ability including computer. It is expected that there will be the increase of legal conflicts surrounding electronic commerce activities as well as the increase of cyber crimes, as the number of Internet users are getting bigger. In order to solve the problems of conflicts derived from electronic commerce, the factum of electronic commerce activities must be confirmed. In order to confirm the factum of electronic commerce activities, the evidence is prerequisite. Almost all evidences relating to the electronic commerce activities exist in digital form. For the reason that the digital evidence can be easily damaged and changed, special management is required to collect, analyze, and preserve the digital evidence. In order to meet this requirement, this study proposes a basic model of digital evidence management system applying computer forensics and electronic authentication.

  • PDF

A study on Development of Certification Schemes for Cloud Security (국내 클라우드 보안 인증스킴 개발에 관한 연구)

  • Jung, Jin-Woo;Kim, Jungduk;Song, Myeong-Gyun;Jin, Chul-Gu
    • Journal of Digital Convergence
    • /
    • v.13 no.8
    • /
    • pp.43-49
    • /
    • 2015
  • As the cloud computing law was passed in March, 2015, many private companies and public organizations give consideration to introduce cloud computing services. However, most of them are still concerned about the security issues in cloud computing services. To solve the problem, a certification system of cloud security is necessary as an enabler for adoption of the trusted cloud services. There have been a number of studies about certification systems for cloud security, but only few studies exist about certification scheme of cloud security. Therefore, in this study, foreign certification systems for cloud security are analyzed to draw requirements for developing a domestic certification scheme for cloud security. Based on the result of analysis, this study proposes the three certification schemes of cloud security, which have been reviewed by the focus group interview method to draw advantages and disadvantages of each scheme.

Digital Content Certification and Management Technology Based on Blockchain Technology

  • Jang, Eun-Gyeom
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.11
    • /
    • pp.121-128
    • /
    • 2021
  • After entering the 4th Industrial Revolution, the digital content market, which was only dependent on existing contents supply enterprises, is providing various digital content through the participation of users like YouTube. Accordingly, it activated the digital content market, but it causes a negative influence on the digital content market due to the copyright of the creator and the indiscriminate illegal use and usage of the content. This study researched digital content management technology based on blockchain technology to protect digital content and the copyright of the creator. The suggested technology protects the digital content and the copyright holder and discerns the users and prevents the indiscriminate approach and illegal use of digital content. For the safe management of digital content, hash function applied as the certification technology of blockchain is used to certify the users and manage the digital content and provide integrity and authentication service.

A Study on the Certification System for Offline Stores Selling Copyrighted Contents: Copyright OK Case (정품 콘텐츠 판매 오프라인 업체 인증제도 방안 연구: 저작권 OK 사례)

  • Gyoo Gun Lim;Jae Young Choi;Woong Hee Lee
    • Information Systems Review
    • /
    • v.19 no.4
    • /
    • pp.27-42
    • /
    • 2017
  • With the rapid development in network, graphic technology, and digital technology, content industry is emerging as an important industry for new cultural development and economic development. The development in digital content technology has remarkably expanded the generation and distribution of contents, thereby creating new value and extending into a large distribution market. However, the ease of distribution and duplication, which characterizes digital technology, has increased the circulation of illegal contents due to illegal copying, theft, and alteration. The damage caused by this illegal content is severe. Currently, a copyright protection system targeting online sites is available. By contrast, no system has been established for offline companies that sell offline genuine content, which compete with online companies. The demand for content of overseas tourists is increasing due to the Korean wave craze. Nevertheless, many offline content providers have lost competitiveness due to illegal content distribution with online companies. In this study, we analyzed the case and status of similar copyright certification systems in Korea and overseas through previous research and studied a system to certify the offline genuine contents business. In addition to the case analysis, we focused on interviews obtained through in-depth interviews with the copyright stakeholders. We also developed a certification framework by establishing the certification domain, certification direction, and incentive of the certification system for offline businesses with genuine content. Selected certification direction is ethical, open, inward, store, and rigid (post evaluation). This study aimed to increase awareness among consumers about the use of genuine content and establish a transparent trading order in a healthy content market.

A study of the scenario for improvement of NPKI system (공인인증제도 개선방안 시나리오 연구)

  • Park, Kyung-Hye
    • Journal of Digital Convergence
    • /
    • v.8 no.4
    • /
    • pp.59-71
    • /
    • 2010
  • The purpose of this paper is the improvement of NPKI management policy in Korea. In order to reach the issue of EC certification problems, we examined first the institutions and system accredited NPKI for checking on the status and problems. We studied the alternatives for the improvement of NPKI system through brainstorming with experts, they had drawn possible scenarios and chosen optimal policy measures of the public key infrastructure.

  • PDF

Design and Implementation of Serial Key Certification System Using Smartcard (스마트카드를 이용한 시리얼 키 인증 시스템 구현 및 설계)

  • Kim, Yu-Doo;Moon, Il-Young
    • Journal of Advanced Navigation Technology
    • /
    • v.11 no.4
    • /
    • pp.473-478
    • /
    • 2007
  • Current certification system use serial key for protect copyright of software and digital contents. But It is not efficient system, because It is not protect copyright through create virtual key or use public key. So we research on various cryptology for prevent illegal copy of serial key, but It is not enough protection of copyright that use software technology only. In this paper, we propose certification system using smart card for protect copyright of software and digital contents.

  • PDF

Development of an Evaluation System for BIM-based Friendly-Environment Preliminary Certification -Focusing on the Evaluation of Minimizing Waste Material in the Apartment unit plan- (BIM기반 친환경 예비인증 평가시스템 개발에 관한 연구 -단위세대 평면에서 폐기물 최소화 평가를 대상으로-)

  • Oh, Kunsoo;Song, Jeonghwa;Kim, Kyung Hwan
    • Journal of Digital Contents Society
    • /
    • v.13 no.4
    • /
    • pp.483-490
    • /
    • 2012
  • The evaluation procedure of friendly-environment Preliminary certification is traditionally done by hand. It takes much time and a lot of manpower. Sometimes it is subject to the evaluator's experience. The solution to these problems is to systematize the evaluation procedure. The system can provide an objective standard for evaluation. It can develop more reliable standard, prevent errors, and save time. Therefore, this research suggests the evaluation system using the architectural information based BIM. To do this, the current study examines the possibility of evaluation system of friendly-environment Preliminary certification.

Limit on transition of energy source for drone : Focusing on regulation and certification (드론 에너지원 전환의 한계 : 규제와 인증을 중심으로)

  • Sang Ik, Han
    • Journal of Digital Policy
    • /
    • v.1 no.2
    • /
    • pp.47-52
    • /
    • 2022
  • The absolute dependence on GPS signals for positioning, unstable flight, and short flight time due to battery limitations are the major problems to extend the practical use of drones in the industry. In particular, the short flight time of about 20 minutes is a big issue to the use of drones, and to overcome this, the liquid hydrogen powered drone is being actively developed. However, the revision of the current regulation and certification system for liquid hydrogen powered drone has not been completed yet, making it difficult to test, certify, and commercialize the hydrogen powered drone, which eventually becomes a problem in pre-occupying the increasing drone market. In this paper, we analyze the development trends of hydrogen powered drone and provide the current issues on regulations and certification systems for hydrogen powered drone.

A Study of the Cross Certification in Internet Banking (인터넷뱅킹에서의 상호인증에 관한 연구)

  • Lee, Young Gyo;Ahn, Jeong Hee
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.3
    • /
    • pp.87-97
    • /
    • 2014
  • Pharming attack is a confidence trick that the hacker catch away customers financial information on Internet banking. At first, a hacker installs malicious execution code on customers PC in secret. As a customer tries to connect a Internet banking Web site, the malicious code changes it to phishing site in Internet explorer. The hacker catch away customers financial information in process of internet banking. The hacker steals money from customer's bank account using stolen information. PKI is a widespread and strong technology for providing the security using public key techniques. The main idea of PKI is the digital certificate that is a digitally signed statement binding an user's identity information and his public key. The Internet banking service stands on the basis of PKI. However, the bank is trusted in natural, the only customer is certified in the present Internet banking. In this paper, we propose a method of cross certification in Internet banking. The customer certify a bank and the bank certify the customer in proposed method. The method can service to customer the secure Internet banking about pharming attack. We compare the proposed method with other methods.