• Title/Summary/Keyword: Digital Certification

Search Result 208, Processing Time 0.028 seconds

A Study on the Current Situation and Improved Method for the Smombie through Field Survey and ICT Trend Analysis (현장 조사와 ICT 동향 분석을 통한 스몸비 현황과 개선 방안 연구)

  • Lee, Dong Hoon;Oh, Hye Soo;Jang, Jae Min;Jeong, Jong Woon;Yang, Sang Oon
    • Journal of the Korean Society of Safety
    • /
    • v.35 no.5
    • /
    • pp.74-85
    • /
    • 2020
  • Smart phone zombie or Smombie means pedestrians who walk without attention to their surroundings because they are focused upon their smart phone. Because the traffic accidents and injuries caused by Smombie have been increased rapidly in recent years, the social attention and policies are needed to prevent it. This study was conducted to analyze Smombie's current status and some solutions used before and to propose new improved method through the latest ICT trend. In this study, we did the field survey to check Smombies at several places in Seoul through people counting, and found that a lot of pedestrians still use the smart phone while walking. And we analyzed many case studies about some solutions to prevent Smombies previously. The case studies include legal regulations, government policies, smart phone app services and facilities that are used before. We studied them through internet searches and reference studies and we also checked the current operating situation as visiting several places that the solutions actually has been operated. Therefore, we found there are some limitations in previous solutions in terms of effectiveness and management. To consider new solution that can be expected to overcome the limitations, we analyzed the latest ICT trends focused on features to utilize the Smombie prevention, especially video recognition and digital signage. In these days, video recognition has been developed rapidly with assistance of AI technology and it can recognize the specific pedestrian's characteristics such as holding smart phone as well as hair style, clothes, backpack and etc. On the other hands, the digital signage is the convergence device that includes big display, network connection and various IoT sensors. It can be used as public media in many places for public services as well as advertising. Through these analysis results, we show the requirements and the user scenario for the improved method to prevent Smombie. Finally, we propose to develop R&D technology to recognize Smombie exactly as pedestrian attributes and to spread creative contents to increase pedestrian's interest and engagement for Smombie prevention through digital signage.

A Study on the Certification System in Electromic Commerce (전자상거래(電子商去來)의 인증체계(認證體系)에 관한 고찰(考察))

  • Ha, Kang Hun
    • Journal of Arbitration Studies
    • /
    • v.9 no.1
    • /
    • pp.367-390
    • /
    • 1999
  • The basic requirements for conducting electronic commerce include confidentiality, integrity, authentication and authorization. Cryptographic algorithms, make possible use of powerful authentication and encryption methods. Cryptographic techniques offer essential types of services for electronic commerce : authentication, non-repudiation. The oldest form of key-based cryptography is called secret-key or symmetric encryption. Public-key systems offer some advantages. The public key pair can be rapidly distributed. We don't have to send a copy of your public key to all the respondents. Fast cryptographic algorithms for generating message digests are known as one-way hash function. In order to use public-key cryptography, we need to generate a public key and a private key. We could use e-mail to send public key to all the correspondents. A better, trusted way of distributing public keys is to use a certification authority. A certification authority will accept our public key, along with some proof of identity, and serve as a repository of digital certificates. The digital certificate acts like an electronic driver's license. The Korea government is trying to set up the Public Key Infrastructure for certificate authorities. Both governments and the international business community must involve archiving keys with trusted third parties within a key management infrastructure. The archived keys would be managed, secured by governments under due process of law and strict accountability. It is important that all the nations continue efforts to develop an escrowed key in frastructure based on voluntary use and international standards and agreements.

  • PDF

Multi-Certification of Agent System Using XML (XML 전자서명을 이용한 다중인증 멀티 에이전트시스템)

  • J. Kim, Kui-Nam
    • Convergence Security Journal
    • /
    • v.5 no.1
    • /
    • pp.29-34
    • /
    • 2005
  • Internet becomes absolutely necessary tools due to rapid progress of information technology. Educational correspondence about an age of information demand is focused on a learner and remote education based on information technology WBI(Web Based Instruction) is a formation that remotly educate a learner using web, possible mutual reaction between instructor and learner, submit various studying material, has a good point to overcome spatial restriction. Internal and external standardization working is accelerated and recently XML security studies are activated using XML which is next generation web standard document format. In this paper, we propose multi-Certification of agent system using XML digital signature to satisfy security requirement.

  • PDF

Design of DC-DC Buck Converter Using Micro-processor Control (마이크로프로세서 제어를 이용한 DC-DC Buck Converter 설계)

  • Jang, In-Hyeok;Han, Ji-Hun;Lim, Hong-Woo
    • Journal of Advanced Engineering and Technology
    • /
    • v.5 no.4
    • /
    • pp.349-353
    • /
    • 2012
  • Recently, Mobile multimedia equipments as smart phone and tablet pc requirement is increasing and this market is also being expanded. These mobile equipments require large multi-media function, so more power consumption is required. For these reasons, the needs of power management IC as switching type dc-dc converter and linear regulator have increased. DC-DC buck converter become more important in power management IC because the operating voltage of VLSI system is very low comparing to lithium-ion battery voltage. There are many people to be concerned about digital DC-DC converter without using external passive device recently. Digital controlled DC-DC converter is essential in mobile application to various external circumstance. This paper proposes the DC-DC Buck Converter using the AVR RISC 8-bit micro-processor control. The designed converter receives the input DC 18-30 [V] and the output voltage of DC-DC Converter changes by the feedback circuit using the A/D conversion function. Duty ratio is adjusted to maintain a constant output voltage 12 [V]. Proposed converter using the micro-processor control was compared to a typical boost converter. As a result, the current loss in the proposed converter was reduced about 10.7%. Input voltage and output voltage can be displayed on the LCD display to see the status of the operation.

Design of Digital License for Ownerships Certification While Preserving the Original Program Source Code (프로그램 소스 코드의 원본을 공개하지 않는 소유권 증명을 위한 디지털 라이센스 설계)

  • Kim Hyung-Jong;Lee Dong-Seob;Cha Byung-Rae
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.4
    • /
    • pp.29-37
    • /
    • 2006
  • The intellectual property system was very important to the past industrial society. It is so important to the 21C information age. It is a leading role to developing these information society. Not only the digital content control but the technology of program source code for the intellectual property is so much mean to international competition. On occurring disputation property, we have to prove the fact, there is a problem to show the original source code. In this paper, we simulate the digital licence for program source code to prevent the infringement of copyright and the tipping-off information.

  • PDF

A System Unauthorized Access using MAC Address and OTP (MAC Address와 OTP를 이용한 비인가 접근 거부 시스템)

  • Shin, Seung-Soo;Jeong, Yoon-Su
    • Journal of Digital Convergence
    • /
    • v.10 no.3
    • /
    • pp.127-135
    • /
    • 2012
  • This study improves the existing user identification method using user ID and password. The new protocol protecting unauthorized access is designed and developed using user's ID, password, and OTP for user certification as well as MAC address for computer identification on networks. The safety on trials of unauthorized certification is tested and analyzed for four types following the criterion of information acquisition.

PGP Certification System in Blockchain Environments (블록체인 환경에서의 PGP 인증 시스템)

  • Kim, Daehan;Seo, Kyungryong
    • Journal of Korea Multimedia Society
    • /
    • v.23 no.5
    • /
    • pp.658-666
    • /
    • 2020
  • PGP is an encryption software designed to provide information protection, security and authentication services for online communication systems. The characteristic of behavior done on the Internet is that you don't know the other person. It is very important to protect information from someone you cannot trust. So identification of the other person is an important task. PGP uses an digital signature algorithm to verify the identity of the other party. However, it is not accurate to check the other party's credibility. PGP increases trust as other users sign more on public keys of user. In other words, credibility is not perfect. In this paper, PGP certification system that key management in Ethereum blockchain, one of the blockchain platforms, is proposed. Key management in blockchain ensures data integrity, transparency and reliability.

Scanner Certification Tool for the Standardization of Digitized Documents: Focusing on Target Factors and Measurement Programs

  • Park, Hyung-Ju;Har, Dong-Hwan
    • International Journal of Contents
    • /
    • v.6 no.3
    • /
    • pp.25-29
    • /
    • 2010
  • Scanners play an important role in digitally reproducing the color and imaging of original documents used in public offices; however, the current system lacks a standard for digitized documents created by scanners, complicating efforts to create a digitized system. In particular, macrography cannot guarantee the accuracy and reliability of digitalized color documents, pictures, and photographs created by scanners. To this end, we develop a standardized evaluation tool and test target to certify digitalized documents created by a scanner in the domestic environment. In this study, we enhance the accuracy and reliability of scanned data to create an advanced standard evaluation tool for scanners. Moreover, to produce a scanner certification standard, we overcome existing problems related to the growing market. We anticipate that this new standard will see a high degree of application in the current environment.

A Study on Requirements Analysis for Obtaining Intrinsic Safety Certification (본질안전인증 취득을 위한 요구조건 분석에 관한 연구)

  • Oh, Kyutae
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.54 no.1
    • /
    • pp.147-151
    • /
    • 2017
  • Areas of concentrations that can be exploited at all times, such as gas reservoirs in crude oil tanks, are called zero zones. In order to use various equipment in Zone 0, an intrinsically safe certification must be obtained that can guarantee that sparks will not occur in nature. Most devices that acquire intrinsic safety certification are mostly simple single-component devices or devices. In this study, it was a very difficult process because we intend to acquire the intrinsic safety certification of an electronic circuit including an ultrasonic generator and a microcontroller in which hundreds of components are mounted on a PCB substrate. Through this study, we have been able to understand how to design a circuit for intricate intrinsic safety certification. and Using the results of this study, it will be easier to design intrinsically safe circuits when trying to develop a circuit that can obtain intrinsic safety certification.