• 제목/요약/키워드: Identification Key Management

검색결과 168건 처리시간 0.028초

지문 인식 기반의 개인키 위탁 시스템의 설계 (Design of a Private Key Escrow System based on the Fingerprint Identification)

  • 신용녀;이용준
    • 디지털산업정보학회논문지
    • /
    • 제4권2호
    • /
    • pp.21-28
    • /
    • 2008
  • There are some problems on the system that uses a password comprising a digital signature to identify the secret key owner under the public key infrastructure. For example, the password can be difficult to remember or easy to be disclosure, and users should make more complex password to protect it. A number of studies have been proceeded in order to overcome these defects using the fingerprint identification technologies, but they need to change the current standard of public key infrastructure. On the suggested private key escrow system, the private key can be withdrawn only through the enrollment and identification of a fingerprint template after it is saved to a reliable third system. Therefore, this new private key escrow system can remove previous inconveniences of managingthe private key on current public key infrastructure, and it exhibited superior results in terms of the evaluation items when compared with the integrated method of the existing fingerprint identification and public key infrastructure.

인증서를 이용한 개인식별번호 확인 및 키분배 통합 프로토콜 (The Integrated Identification Number Checking and Key Management Protocol with Certificates)

  • 김성덕;정재동;원동호
    • 정보처리학회논문지C
    • /
    • 제12C권3호
    • /
    • pp.317-322
    • /
    • 2005
  • 기존의 인증서를 이용한 사용자 인증(Authentication) 또는 개인식별(Identification)은 인증서의 공개키에 대응하는 비밀키의 소유자가 인증서의 소유자 필드에 설정된 DN의 사용자임을 확인하는 과정에 한정되며, 인증서의 실 소유자가 실세계의 누군인가를 파악할 수 없다는 문제점이 있었다. 이를 보완하기 위해 인증서 소유자의 주민등록번호와 같은 식별번호를 인증서 확장필드에 안전하게 포함시키는 방법이 기술규격으로 만들어져 국내 공인인증체계에 적용되고 있다. 본 논문에서는 ECC 암호알고리즘을 이용하여 사이트 로그인과정에서 개인식별, 키분배, 그리고 식별번호를 이용한 소유자 확인이 가능한 통합 프로토콜을 제안한다.

KEY BARRIERS AND THEIR STRATEGIC RESPONSES TO ACTIVATE KNOWLEDGE SHARING IN CONSTRUCTION ORGANIZATIONS

  • Tae-Wan Kim ;Hyoun-Woo Joh
    • 국제학술발표논문집
    • /
    • The 1th International Conference on Construction Engineering and Project Management
    • /
    • pp.403-408
    • /
    • 2005
  • Being in a knowledge-based industry, many construction organizations are seeking to manage their own knowledge in an effective way. To manage knowledge, the organizations must motivate in-house people to share their knowledge. However, some barriers to knowledge sharing do exist and researches on these barriers considering construction organizations' characteristics seem rare. This study aims to identify key barriers to knowledge sharing considering the characteristics of construction organizations. Based on the identification, strategic responses to each key barrier are presented in two perspectives of technical and behavioral approach to activate knowledge sharing.

  • PDF

Parameter Identification of 3R-C Equivalent Circuit Model Based on Full Life Cycle Database

  • Che, Yanbo;Jia, Jingjing;Yang, Yuexin;Wang, Shaohui;He, Wei
    • Journal of Electrical Engineering and Technology
    • /
    • 제13권4호
    • /
    • pp.1759-1768
    • /
    • 2018
  • The energy density, power density and ohm resistance of battery change significantly as results of battery aging, which lead to decrease in the accuracy of the equivalent model. A parameter identification method of the equivale6nt circuit model with 3 R-C branches based on the test database of battery life cycle is proposed in this paper. This database is built on the basis of experiments such as updating of available capacity, charging and discharging tests at different rates and relaxation characteristics tests. It can realize regular update and calibration of key parameters like SOH, so as to ensure the reliability of parameters identified. Taking SOH, SOC and T as independent variables, lookup table method is adopted to set initial value for the parameter matrix. Meanwhile, in order to ensure the validity of the model, the least square method based on variable forgetting factor is adopted for optimizing to complete the identification of equivalent model parameters. By comparing the simulation data with measured data for charging and discharging experiments of Li-ion battery, the effectiveness of the full life cycle database and the model are verified.

피어 그룹을 위한 ID 기반의 그룹키 관리 프로토콜 (ID-Based Group Key Management Protocols for Dynamic Peer Groups)

  • 박영호;이경현
    • 한국멀티미디어학회논문지
    • /
    • 제7권7호
    • /
    • pp.922-933
    • /
    • 2004
  • 최근 분산 시스템이나 협업 시스템을 위한 피어 투 피어(Peer-to-Peer) 네트워크에 대한 연구가 진행되고 있으며 암호학 분야에서는 pairing을 이용한 ID 기반의 공개키 암호 기법에 대한 연구가 활발히 이루어지고 있다. 본 논문에서는 동적 피어 그룹(Dynamic Peer Group, DPG) 멤버간의 안전한 그룹통신을 위한 ID 기반의 그룹키 관리 기법을 제안한다. 각 멤버들은 Private Key Generator(PKG)로부터 자신의 ID에 대한 공개키/개인키쌍을 발급 받으나, 그룹키를 관리하기 위한 중앙 관리개체를 이용하지 않고 멤버들간의 협력(collaboration)을 통해 자발적으로 그룹키를 관리함으로써 중앙 관리개체의 오류에 대한 문제(single-point of failure)를 예방할 수 있다. 그리고 동적 피어 그룹의 성질을 고려하여 멤버의 참여와 탈퇴에 대한 그룹키의 비밀성을 제공한다.

  • PDF

A need-awaring multi-agent approach to nomadic community computing for ad hoc need identification and group formation

  • 최근호;권오병
    • 한국지능정보시스템학회:학술대회논문집
    • /
    • 한국지능정보시스템학회 2005년도 공동추계학술대회
    • /
    • pp.183-192
    • /
    • 2005
  • Recently, community computing has been proposed for group formation and group decision-making. However, legacy community computing systems do not support group need identification for ad hoc group formation, which would be one of key features of ubiquitous decision support systems and services. Hence, this paper aims to provide a multi-agent based methodology to enable nomadic community computing which supports ad hoc need identification and group formation. Focusing on supporting group decision-making of relatively small sized multiple individual in a community, the methodology copes with the following three characteristics: (1) ad hoc group formation, (2) context-aware group need identification, and (3) using mobile devices working in- and out-doors. NAMA-US, an RFID-based prototype system, has been developed to show the feasibility of the idea proposed in this paper.

  • PDF

RFID 연구 논문에 대한 주제어 분석 (A Keyword analysis on the RFID research papers)

  • 양병학
    • 대한안전경영과학회지
    • /
    • 제14권3호
    • /
    • pp.221-227
    • /
    • 2012
  • This research is a key words analysis on Radio Frequency Identification. Key words were collected from Korean research papers in the electronic library DBpia. 700 papers published from 2001 to 2011 were included. The number of collected key words is 1460. The trend of publishing research papers was increased rapidly from 2005, reached peak at 2009 and decreased after 2010. Majority of key words were related to hardware, information technology and standardization. Selected 128 key words were analyzed and clustered by social network analysis to find a relationship among key words on RFID.

A manufacturability measurement for design for manufacturing in net shape process

  • Lee, Chang-Ho
    • 한국경영과학회:학술대회논문집
    • /
    • 대한산업공학회/한국경영과학회 1994년도 춘계공동학술대회논문집; 창원대학교; 08월 09일 Apr. 1994
    • /
    • pp.467-477
    • /
    • 1994
  • The objective of this research is to develop a manufacturability measurement model for process and material screening. The process and material screening is the key requirement for implementing the Design for Manufacturability (Concurrent Engineering). A computerized system realizing this model then is developed to aid designers. Identification of the key factors which influence technical manufacturability, decision variables and their characteristics, conceptual framework for implementing the model are suggested. Manufacturability measure for quantifying the consistency of between the product requirements and the manufacturing capability is important contribution of this research. The focus is on net shape manufacturing process such as diecasting, forging, metal forming and injection molding.

블록체인 환경에서의 PGP 인증 시스템 (PGP Certification System in Blockchain Environments)

  • 김대한;서경룡
    • 한국멀티미디어학회논문지
    • /
    • 제23권5호
    • /
    • pp.658-666
    • /
    • 2020
  • PGP is an encryption software designed to provide information protection, security and authentication services for online communication systems. The characteristic of behavior done on the Internet is that you don't know the other person. It is very important to protect information from someone you cannot trust. So identification of the other person is an important task. PGP uses an digital signature algorithm to verify the identity of the other party. However, it is not accurate to check the other party's credibility. PGP increases trust as other users sign more on public keys of user. In other words, credibility is not perfect. In this paper, PGP certification system that key management in Ethereum blockchain, one of the blockchain platforms, is proposed. Key management in blockchain ensures data integrity, transparency and reliability.

An expert system for problem identification

  • 최덕원;정차성
    • 한국경영과학회:학술대회논문집
    • /
    • 대한산업공학회/한국경영과학회 1996년도 춘계공동학술대회논문집; 공군사관학교, 청주; 26-27 Apr. 1996
    • /
    • pp.713-716
    • /
    • 1996
  • Managers are constantly facing problems. Some problems are treated with special connotation. Others are solved as a daily routine. While other problems disppear into the realm of oblivion without even recognized by managers. Some of the unrecognized or overlooked problems may cause a serious failure. It is also likely that there is a better solution approach even though we have been using a generally accepted method. Problem identification is a neglected area by researchers and managers, although they are facing problems everday. This paper provides a review of the theories pertained to problem definition and problem identification as the beginning stage of the problem solving process. Based on these theories, we provide an expert system which can assist managers for a better problem solving. Knowledge base for problem identification and recommaendation of tools for the problem solving is the key ingredient of the expert system.

  • PDF