• Title/Summary/Keyword: ID기반

Search Result 784, Processing Time 0.03 seconds

Development of Integrated Spatial Information Identifier for Developing 3D Cadastral Information System (3차원 지적정보시스템 개발을 위한 통합 공간정보식별자 개발)

  • Song, Myung Su;Song, Sang Cheol;Jang, Yong Gu;Lee, Sung Ho
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.20 no.4
    • /
    • pp.11-17
    • /
    • 2012
  • The study aims to secure an integrated UFID system-based ID system as it defines the three-dimensional land registration record through selection and standardization of objects. By comparing the integrated ID system secured by the study and the objected ID system proposed by Seoul City, the study came up with practicality of the integrated ID system for the three-dimensional land registration record information system. An integrated UFID-based intellectual spacial information which is consisted of 41 figures in total was developed by the study. The study confirmed the practicality of the integrated ID system by comparing it with the objected ID of the three dimensional land registration record information system established by Seoul City.

ID 기반 암호방식을 이용한 데이터 공유와 권한 관리

  • Park, Kwang-Yong;Song, You-Jin
    • Review of KIISC
    • /
    • v.19 no.4
    • /
    • pp.78-84
    • /
    • 2009
  • 최근 인터넷의 급속한 보급으로 인해 많은 정보가 네트워크를 통해서 전송되고 있는 가운데 보안상의 위험을 고려하여 비밀정보를 암호화하여 전송한다. 본 논문에서는 비밀정보를 안전하게 보내기 위해 ID기반 암호방식을 이용하여 암호화된 데이터의 공유와 권한관리에 대하여 검토하고자 한다.

ID-Based Cryptosystem and Its Implementation (ID 기본 암호 시스팀과 그 실현)

  • 박영옥;염흥열;이만영
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 1991.11a
    • /
    • pp.5-18
    • /
    • 1991
  • 유한체상의 이산 대수 문제에 안전성의 기반을 둔 ID 기본 암호 시스팀에 대해 연구하고 실제적인 예로써 시스팀의 기능을 실현한다. 기반이 되는 암호 및 서명 방식으로는 EIGamal의 시스팀을 이용한다. 그리고 사용자들의 공모로 인한 시스팀에의 공격 형태를 분석하여 이 시스팀의 안전성에 관한 조건을 유도한다.

  • PDF

A Study on the Analysis of Authentication and ID-based key Management Protocol in Online Game Environment (온라인 게임 환경에서 인증 및 ID 기반 키 관리프로토콜 분석 연구)

  • Lee, Yang-Sun;Park, Sang-Oh
    • Journal of Advanced Navigation Technology
    • /
    • v.15 no.4
    • /
    • pp.664-671
    • /
    • 2011
  • The development of IT technology and breakthrough of the network and the wired network, wireless network boundaries disappear and wired and wireless integrated service environment is the advent in online game environment. However, the wired and wireless integrated service environment appropriate security technology is still inactive, wired and wireless integration environment due to the characteristic as well as security threats wired network and security threats in wireless networks should be considered. Therefore, This wired and wireless integrated environment has been considering studied various, Among them wired and wireless environment considering the lightweight of ID-based authentication and key management has been in progress. In recent, Moon et al. pervasive environment in authentication and ID-based key management protocol is proposed. However, Moon et al.'s scheme is use the ID-based public-key approach to decreased the amount of computation. However, pairing by using a technique similar to the existing public key scheme can represent the amount of computation. Therefore, In this paper the way of Moon etc in security vulnerability analysis.

An ID-based Blind Signature Scheme using the Gap Diffie-Hellman Group in Wireless Environments (무선환경에 적합한 GaP Diffie-Hellman 그룹을 사용한 ID 기반 은닉서명 방식)

  • 김현주;김수진;원동호
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.6
    • /
    • pp.720-728
    • /
    • 2003
  • Blind signature is such a signature scheme that conceals the contents of signature itself and who is the user of the signature make user's anonymity possible. For this reason, they are used in security services such as electronic cashes and electronic votes in which the behavior of actor should not be exposed. In this paper we propose an ID-based blind signature scheme from Gap Diffie-Hellman group. Its security is based on the hardness of Computational Diffie-Hellman Problem. Proposed scheme efficiently improve against existing blind signature scheme by using two-pass protocol between two users and by reducing computation process. Therefore it can be used efficiently in wireless PKI environment.

Improved Dynamic ID-based Remote User Authentication Scheme Using Smartcards (스마트카드를 이용한 향상된 동적 ID기반 원격 사용자 인증 기술)

  • Shim, Hee-Won;Park, Joonn-Hyung;Noh, Bong-Nam
    • Journal of Internet Computing and Services
    • /
    • v.10 no.4
    • /
    • pp.223-230
    • /
    • 2009
  • Among the remote user authentication schemes, password-based authentication methods are the most widely used. In 2004, Das et al. proposed a "Dynamic ID Based Remote User Authentication Scheme" that is the password based scheme with smart-cards, and is the light-weight technique using only one-way hash algorithm and XOR calculation. This scheme adopts a dynamic ID that protects against ID-theft attack, and can resist replay attack with timestamp features. Later, many flaws of this scheme were founded that it allows any passwords to be authenticated, and can be vulnerable to impersonation attack, and guessing attack. By this reason many modifications were announced. These scheme including all modifications are similarly maintained security against replay the authentication message attack by the timestamp. But, if advisory can replay the login immediately, this attempt can be succeeded. In this paper, we analyze the security vulnerabilities of Das scheme, and propose improved scheme which can resist on real-time replay attack using the counter of authentication. Besides our scheme still secure against impersonation attack, guessing attack, and also provides mutual authentication feature.

  • PDF

The development of RFID multi-codes converter based on ID profiles (ID 프로파일을 이용한 RFID 멀티 코드 변환기 연구)

  • Lee, Chang-Yeol;Mo, Hee-Sook
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.2
    • /
    • pp.124-133
    • /
    • 2009
  • There are many different ID representation forms depending on the media or applications. In case of RFID tag, ID representation form must be followed by the rule of ISO/IEC 15962. In this study, we developed the efficient ID conversion algorithm between ID representation form on RFID tag and Internet. The main idea is on the use of XML based ID profiles and three step logical IDs forms. The algorithm was tested by the typical three kinds of real IDs such as EPC, ISO/IEC 15459 KKR Code, and mCode which are the typical meta-IDs can be defined in ISO/IEC 18000-6C tag.

A "Paradoxical" identity-based scheme based on $\gamma^{th}$-residuosity problem and discrete logarithm problem (고차잉여류 문제와 이산대수 문제에 기반을 둔 역석적인 id-based암호 시스템)

  • 박성준
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.4 no.2
    • /
    • pp.90-118
    • /
    • 1994
  • 본 논문에서는 certificatoin-based 방식이 아닌 id-based방식이면서도 사용자가 자신의 비밀키를 선택할 수 있는 역설적인 id-based 방식을 제안한다. 제안한 방식은 Girault가 제안한 self-certified공개키 개념을 id-based방식에 적용한 것이다. 제안한 방식의 안전성은 고차잉여류 문제와 이산대수 문네에 기반을 두고 있다.

Design of Data Source Based-IDS (데이터소스기반의 침입탐지시스템 설계)

  • Cho, A-Aeng;Park, Ik-Su;Lee, Kyoung-Hyo;Oh, Byeong-Kyun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2004.05a
    • /
    • pp.1217-1220
    • /
    • 2004
  • 현재까지 IDS는 관리자의 개입 없이는 효과적인 운용이 불가능하고, IDS를 사용하더라도 여전히 침입 발생 가능성이 있고, 다양한 우회 가능성이 존재한다. 본 논문에서는 기존에 제안된 침입탐지 시스템을 분석하고, C-Box에 규정된 정책을 이용한 데이타소스 기반의 침입탐지 시스템을 설계하여 이를 실험하였다. 본 연구는 데이터 소스 기반에서 침입 탐지 방법 기준의 비정상적인 형태에 의한 탐지와 오류에 의한 탐지기법을 적용하였으며, IDS에 침입 탐지 정책을 설계하였고, 규정에 의한 정책중심의 침입탐지 기법을 정상적인 동작과 비정상적인 동작을 구분하는 경계를 정의한다. 또한, 침입탐지 정책을 이용한 호스트기반 IDS를 설계하고 구현함으로서 정보시스템의 취약성을 보완할 수 있었다. 침입탐지 실험을 위한 시스템 호출 기술은 커널에 프로세스들의 특성을 자세하게 정의하고, 이를 실행할 수 있도록 기반을 구축함으로서 가능하게 하였다.

  • PDF

A study of the STEP-based Data Repository and P&ID-3D CAD Model Connected Pilot System at Nuclear Power Plant (원전 대상의 STEP 기반 데이터 저장소 및 P&ID와 3차원 CAD 모델 연계에 관한 연구)

  • 안호준;조광종;박찬국;한순홍;안경익;최영준
    • Proceedings of the Korea Society for Energy Engineering kosee Conference
    • /
    • 2004.05a
    • /
    • pp.395-400
    • /
    • 2004
  • This study is that STEP based Data Repository of APR1400 Nuclear Power Plant Reactor Coolant System is developed. The STEP based Data Repository is accessed by Web-based and an attribute data of Reactor Coolant System Equipment is offered. Also, a P&ID drawing file & 3D CAD Model of Reactor Coolant System is loaded. The P&ID drawing file of Reactor Coolant System Equipment Model is connected with 3D CAD Model file. This 2D/3D CAD Model connected Prototype system confirms a real layout of Reactor Coolant System.

  • PDF