• Title/Summary/Keyword: ID 통합

Search Result 122, Processing Time 0.025 seconds

Digital Signature Considering the Medical Information Property on Mobile Environment (모바일 환경에서 의료 정보 특성을 고려한 디지털서명)

  • Kim Yong-Gug;Lee Yeun-Bae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.2
    • /
    • pp.374-379
    • /
    • 2005
  • In the most of medical institution medical information is totally stored in a database and many number of researchers and staffs of the hospital access these information anytime. This can be caused patient's privacy to be violated. Introducing a tool for security should be considered as one of the most important requirement especially in the case that today's medical information service expands into an integrated one. In this paper we review the matters of security threat on a medical information system and propose a secure medical information service model equipped on mobile device such as PDA. Also we propose a security architecture employing a digital signature mechanism to protect the personal information on the model. Proposed architecture can lead the doctor to diagnose with high responsibility, help to build a reliable medical information system. and through the signed data, we can get some useful information against medical strife.

A Study on Anonymous Electronic Prescription based on RSA Cryptosystem (RSA 기반의 익명 전자처방전에 관한 연구)

  • Chung, Chan-Joo;Yun, Jung-Mee;Won, Dong-Ho
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.4
    • /
    • pp.51-62
    • /
    • 2010
  • This paper proposes RSA cryptosystem based anonymous electronic prescription which is issued from university and local hospitals by authorized medical professionals. Electronic prescription is now being used in domestic hospitals where sharing medical records and images are prevailing, facilitated by digitalizing medical information and building network infrastructure between the institutes. Proposed RSA based anonymous electronic prescription makes use of PKI protects the identity exposure of doctors and privacy of patients. While traditional prescription fails to protect identities to mandates party or to health insurance, the proposed RSA based prescription opens the contents of the prescription to health insurance authority only after its prescribing function is finished. The proposed approach along with soon to be deployed electronic ID card will help national health insurance corporation to increase the transparency of national prescription system.

OAuth based Proxy Delegation Service (OAuth 기반의 대리 인증서 위임 서비스)

  • Heo, Daeyoung;Hwang, Suntae
    • Journal of Internet Computing and Services
    • /
    • v.13 no.6
    • /
    • pp.55-62
    • /
    • 2012
  • Grid web applications by standard Web technology are increasingly used to provide grid service to users as normal Web user interface and service. It is however difficult to integrate a grid security system such as Grid Security Infrastructure (GSI) into Web applications because the delegation way of standard Web security is not the same as the one of Grid security. This can be solved by allowing Web applications to get a Grid credential by using an online credential repository system such as MyProxy. In this paper, we investigate the problem that occurs when MyProxy, which assumes mutual trust between a user and Grid web application, is adapted for achieving security integration between Web and Grid, and we propose a new Grid proxy delegation service to delegate a Grid credential to the Web without assuming mutual trust. In the service, the X.509 proxy delegation process is added to OAuth protocol for credential exchange, and authentication can be done by an external service such as OpenID. So, users can login onto the Grid web application in a single sign-on manner, and are allowed to securely delegate and retrieve multiple credentials for one or more Virtual Organizations.

IC카드 동향 및 향후 과제

  • Kim, Yeong-Gap;Lee, Yong-Ho;Choe, Myeong-Hyeon;Kim, Gwang-Hyeon
    • Review of Korean Society for Internet Information
    • /
    • v.9 no.2
    • /
    • pp.27-36
    • /
    • 2008
  • 2008년 상반기 국내 민간최종소비지출 중 카드 사용비중은 54%로, 이제 카드는 결제수단의 최대 강자로 자리잡았다. 경제활동인구 1인당 신용카드 소지수도 2002년 4.6매에서 2005년 3.5매로 떨어졌다가 2008년도까지 3.8매 선으로 안정되고 있다. 신용카드 이외의 은행, 증권, 저축은행 등의 현금인출용 카드와 교통카드, 모바일 칩카드, 백화점카드, 학생증카드, 직원ID카드, 마일리지카드, 기타 멤버십카드 등을 합하면 국민들의 지갑은 현금보다도 플라스틱카드로 두툼해져 있다. 이동통신서비스 사업자들은 이동통신단말기를 이용하여 다양한 서비스를 개발 제공함으로써 시장의 주도권을 노리고 있고, 교통카드 사업자들은 자사의 전자화폐인 교통카드로 주도권을 지키려 하고 있으며, 기존의 강자였던 은행과 카드사들은 고객을 빼앗기지 않기 위해 고객이 필요로 하는 다양한 서비스는 제공하면서도 주도권은 지키려고 하는 경쟁과 협력이 활발하게 전개되고 있다. 한편, MS카드는 읽기/쓰기가 쉬워 정보유출, 위변조, 복제 등을 통한 사고의 위험이 커서, 선진국뿐 아니라 중동, 중남미, 아시아 국가들까지도 IC카드로의 전환이 진행되고 있다. 국제브랜드 카드사들은 2006년 1월부터 IC카드가 MS 단말기에서 부정 사용될 경우 그 책임을 매입사에 전가시키는 제도(Transitional Chip Liability Shift Program)를 시행하고 있어 국내 카드사들의 피해도 예상된다. 금융감독 당국은 2003년 2월 “IT및 전자금융 안전성 제고대책”에 의거 2008년 말까지 100% IC카드로 전환을 목표로 연도별 전환목표를 통보하고 지도감독하고 있다. 이에 따라 은행의 현금카드는 2008년 6월까지, 신용카드는 2008년 12월까지 전환을 수행하고 있으나, 기타 금융권이나 카드사용자들은 비용부담, 재고소진 등의 문제로 잘 지켜지지 않고 있다. 특히 가맹점 단말기를 교체하여야 할 VAN사 들은 교체비용이 자기 자본을 상회하는 어려움으로 POS나 CAT단말은 거의 전환이 진행되지 않고 있어 IC카드를 가지고 있어도 MS를 이용하는 형편이다. 카드의 종류는 주도권 경쟁으로 늘어만 가고 있어 애초 취지처럼 하나의 카드로 다양한 사업자의 서비스가 통합되기 어려운데다, 단말기의 표준화도 어려워 막상 카드를 안전하고 편리하게 사용하여야 할 소비자들의 지갑만 무거워지고 있다. 본고는 이렇게 우리의 생활 깊숙이 들어온 카드를 편리하고 안전하게 사용할 수 있도록 하는 인프라는 과연 어느 수준이고 시장의 주자들은 어느 방향으로가고 있는지 살펴보고 그 문제점과 과제를 제시하고자 한다.

  • PDF

Global Wireless LAN Roaming Status in Korea and Its Development Methods (국내 글로벌 무선랜 로밍 구축 현황 및 발전 방안)

  • Wang, Gicheol;Cho, Jinoh;Cho, Gihwan
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.7
    • /
    • pp.15-21
    • /
    • 2015
  • Due to the appearance of various mobile terminals like smartphone, smartpad, and smartwatch and tremendous development of WiFi technology, data utilization rate on WiFi network is significantly increasing. As a result, users are wanting to use WiFi network using only a simple identification at a visited place as if they are at their home institute. In this paper, we review the domestic status of eduroam service which supports global extension of wireless network access environment and present the future development perspective of the service in Korea. Besides, we shed light on the current status of WiFi sharing service between domestic universities and propose some methods to facilitate the join of domestic universities in eduroam service.

Big Data Processing and Performance Improvement for Ship Trajectory using MapReduce Technique

  • Kim, Kwang-Il;Kim, Joo-Sung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.10
    • /
    • pp.65-70
    • /
    • 2019
  • In recently, ship trajectory data consisting of ship position, speed, course, and so on can be obtained from the Automatic Identification System device with which all ships should be equipped. These data are gathered more than 2GB every day at a crowed sea port and used for analysis of ship traffic statistic and patterns. In this study, we propose a method to process ship trajectory data efficiently with distributed computing resources using MapReduce algorithm. In data preprocessing phase, ship dynamic and static data are integrated into target dataset and filtered out ship trajectory that is not of interest. In mapping phase, we convert ship's position to Geohash code, and assign Geohash and ship MMSI to key and value. In reducing phase, key-value pairs are sorted according to the same key value and counted the ship traffic number in a grid cell. To evaluate the proposed method, we implemented it and compared it with IALA waterway risk assessment program(IWRAP) in their performance. The data processing performance improve 1 to 4 times that of the existing ship trajectory analysis program.

Maritime Cyber Security Issues and Risk Management Trends (해양 사이버 보안사고 및 위험 관리 사항 동향)

  • Dong-Woo Kang;Ki-Hwan Kim;Young-Sil Lee
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.23 no.4
    • /
    • pp.209-215
    • /
    • 2022
  • The International Maritime Organization, which is in charge of the international maritime environment and ship safety, has rapidly promoted cyber systems for international dimension agreement and efficiency improvement and improved nautical efficiency. Nevertheless, maritime cyber system attacks still occur every year, and in particular, the number of international maritime cyber security incidents in 2021 appeared to increase sharply compared to 2020. This paper discusses the areas that should be taken into account in order to reduce the increasing sophistication of maritime cyber security. To this end, we will look at typical cases of cyber attacks that have increased sharply in 2021 and analyze the causes of the continuous occurrence of maritime cyber security incidents. In addition, we present several cyber system proposals regarding the current state of maritime cyber systems and the solutions to the problems they face, as well as the matters to be addressed for future maritime cyber systems that will be advanced.

Comparison of Muscle Strength between Dominant and Non-dominant Sides of College Students in Their 20s according to Contraction Type (수축 형태에 따른 20대 대학생의 우세 측과 비우세 측의 근력비교)

  • Jong-Hyup Lee;Seung-Kyu Lee;Young-Sun Na;Jeong-Woo Jeon;Jae-Ho Yu;Ji-Heon Hong;Jin-Seop Kim;Dong-Yeop Lee
    • Journal of The Korean Society of Integrative Medicine
    • /
    • v.12 no.2
    • /
    • pp.47-53
    • /
    • 2024
  • Purpose : This study investigated the effects of concentric and eccentric contractions on muscle strength using an isokinetic dynamometer (ID) in college students in their 20s. It aimed to understand the impact of differences between the dominant and non-dominant sides on strength asymmetry and to elucidate the clinical implications of these differences to establish an appropriate posture and environment for patients. Methods : The experiment was conducted with 30 healthy adult participants. Prior to the experiment, participants underwent a warm-up targeting the shoulders, and efforts were made to eliminate factors that could potentially influence the measurement results. Subsequently, the maximum safe range of motion of shoulder joint abduction, extension, and flexion was measured using an isokinetic muscle function testing device. Muscle strength was assessed using concentric and eccentric contractions alternating between the dominant and non-dominant sides, and paired sample t-tests were used for the analysis. Results : There was no significant difference between bilateral peak torques for eccentric contraction in shoulder joint abduction, extension, and flexion (p>0.05). There was also no significant difference between bilateral peak torques for concentric contraction in shoulder joint abduction, extension and flexion (p>0.05). Conclusion : This study found no statistically significant difference in muscle strength between the dominant and non-dominant sides during concentric and eccentric contractions. However, previous studies have shown significant differences between the dominant and non-dominant sides during eccentric and concentric contractions during internal shoulder rotation in the general population, as well as significant differences in the upper trapezius muscle. Therefore, further research is needed to support the application of different intensities for bilateral muscle strengthening exercises in clinical practice.

Fandom-Persona Design based on Social Network Analysis (소셜 네트워크 분석을 이용한 팬덤 페르소나 디자인)

  • Sul, Sanghun;Seong, Kihun
    • Journal of Internet Computing and Services
    • /
    • v.20 no.5
    • /
    • pp.87-94
    • /
    • 2019
  • In this paper, the method of analyzing the unformatted data of consumers accumulated on social networks in the era of the Fourth Industrial Revolution by utilizing data from the service design and social psychology aspects was proposed. First, the fandom phenomenon, which shows subjective and collective behavior in a space on a social network rather than physical space, was defined from a data service perspective. The fandom model has been transformed into a collective level of customer Persona that has been analyzed at a personal level in traditional service design, and social network analysis that analyzes consumers' big data has been presented as an efficient way to pattern and visually analyze it. Consumer data collected through social leasing were pre-processed by column based on correlation, stability, missing, and ID-ness. Based on the above data, the company's brand strategy was divided into active and passive interventions and the effect of this strategic attitude on the growth direction of the consumer's fandom community was analyzed. To this end, the fandom model of consumers was proposed by dividing it into four strategies that the brand strategy had: stand-alone, decentralized, integrated and centralized, and the fandom shape of consumers was proposed as a growth model analysis technique that analyzes changes over time.

Predictive Modeling of the Bus Arrival Time on the Arterial using Real-Time BIS Data (실시간 BIS자료를 이용한 간선도로의 버스도착시간 예측모형구축에 관한 연구)

  • Kim, Tae Gon;Ahn, Hyeun Chul;Kim, Seung Gil
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.29 no.1D
    • /
    • pp.1-9
    • /
    • 2009
  • Bus information system(BIS), as a part of the intelligent transportation system(ITS), is one of the most advanced public transportation systems which provide the real-time bus traffic information for the users waiting the buses at the bus stop. However, correct bus information data, such as the present bus location, the user waiting time, the bus arrival time, etc. are not provided for the bus users because the proper bus arrival time predictive models are not used yet in most of the cities operating the bus information system, including the metropolitan City of Ulsan. Thus, the purpose in this study is to investigate real-time bus traffic characteristic data for identifying the bus operation characteristics on the arterial under the study in the metropolitan City of Ulsan, analyze real-time bus traffic characteristic data on the ID locations of the arterial under the study, construct the optimal unit segment models for the unit segments which are the bus stop, node and travel section using the exponential smoothing, weighted smoothing and Kalman Filter methods, respectively, and finally suggest the optimal integrated model for predicting the real-time bus arrival time at the bus stop of the arterial under the study.