• Title/Summary/Keyword: Electronic access certification

Search Result 14, Processing Time 0.018 seconds

A Design of Certificate Password Recovery Using Decentralized Identifier (DID를 사용한 인증서 암호 복구)

  • Kim, Hyeong-uk;Kim, Sang-jin;Kim, Tae-jin;Yu, Hyeong-geun
    • Journal of Venture Innovation
    • /
    • v.2 no.2
    • /
    • pp.21-29
    • /
    • 2019
  • In the public certificate technology commonly used in Korea, users have a cumbersome problem of always resetting when they forget their password. In this paper, as a solution to this problem, we propose a secure authentication certificate password recovery protocol using blockchain, PKI, and DID for distributed storage. DID is a schema for protecting block ID in blockchain system. The private key used in the PKI is configured as a user's biometric, for example, a fingerprint, so that it can completely replace the memory of the complex private key. To this end, based on the FIDO authentication technology that most users currently use on their smartphones, the process of authenticating a user to access data inside the block minimizes the risk of an attacker taking over the data.

A Study about weight grant of Authentication level in USN environment

  • Choi, Bae-Young;Ahn, Byung-Ryul;Chung, Tai-Myoung
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2005.11a
    • /
    • pp.165-168
    • /
    • 2005
  • The objects, which can be personal digital assistants, electronic rings, doors or even clothes, offer embedded chips with computation facilities and are generally called artifacts. I later realized that this was not so the real problem is actually authentication. Recent results indicate scalability problems for flat ad hoc networks. Sensor network achieves function that handle surrounding information perception through sensor and sensed information to network that is consisted of sensor nodes of large number. Research about new access control techniques and height administration techniques need authentication information persons' certification assurance level classification in sensor network environment which become necessary different view base with authentication information at node for application of AAA technology in USN environment that must do authentication process using information that is collected from various sensor mountings. So, get base authentication information in sensor type and present weight grant model by security strength about authentication information through information who draw. In this paper collected information of sensor nodes model who give weight drawing security reinforcement as authentication information by purpose present be going to. and Must be able to can grasp special quality of each sensor appliances in various side and use this and decide authentication assurance level for value estimation as authentication information elements. Therefore, do to define item that can evaluate Authentication information elements thus and give simple authentication assurance level value accordingly because applying weight. Present model who give authentication assurance level value and weight for quotation according to security strength.

  • PDF

Web Based Tele-Medicine System including Security Scheme (웹기반 원격진료시스템에서 암호화인증방식이 적용된 회원관리기법)

  • Kim, Seok-Soo
    • Convergence Security Journal
    • /
    • v.5 no.1
    • /
    • pp.19-27
    • /
    • 2005
  • This paper presents the content regarding electronic medical examination chart and data processing for efficient medical examination and fast treatment by realizing remote medical examination system of mutual conversation type among 3 parties(patient, doctor, pharmacist) on internet base, and establishment of database enabled system integration for efficient data processing in both on-line and off-line mode by interconnecting ASP and SQL on IIS 4.0 web server, consultation between patient and doctor, medical examination on off-line mode, transmission of prescription sheet to the pharmacist designated by patient, preparation of medicine, semieternal storage of medical examination data owing to storage and check of medical examination data, more accurate medical examination and prescription using this medical examination data by patient and doctor, and so on. And, data processing between doctor and pharmacist is differently performed based on class such as general member and charge member, and service access right pursuant to this is endowed, so that certification of each member must follow by all means.

  • PDF

A Plan to Operate a Beach through Safety Management Prevention Using ICT Technology (ICT기술을 활용한 안전관리 방역을 통한 해수욕장 운영 방안)

  • An, Tai-Gi
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.12
    • /
    • pp.22-29
    • /
    • 2021
  • COVID-19, which has spread around the world, is also affecting local economic industries such as the domestic tourism industry and the service industry. In particular, the quality of life is threatened as safety prevention rules related to infectious diseases such as social distancing have been regularized. The purpose of this study is to analyze the impact on safety quarantine on users of the summer festival at Songho Beach in Haenam, a summer resort. In addition, it protrudes through big data surveys, demographic analysis, and technology analysis on the management of users who have changed in the COVID-19 era. It is expected to be a reference material by utilizing practical data on users in the future. In addition, this study is significant that it has been reviewed for safety and satisfaction for tourists using the summer beach festival through quarantine management using ICT technology in the COVID-19 situation, and needs to be used as good guidelines and examples for this study in the future.