• 제목/요약/키워드: Identification Key Management

검색결과 168건 처리시간 0.024초

회전익기 다품종부품 개발을 위한 형상관리 체계 (Configuration Management System for Rotorcraft Multi-Component Developement)

  • 김현기;김학범;김성찬
    • 한국항공운항학회지
    • /
    • 제20권3호
    • /
    • pp.35-43
    • /
    • 2012
  • Medium size rotorcraft consist of approximately 5,000 key components. The components must satisfy the target weight and performance requirement through optimization. Therefore a rotorcraft component has approximately 100 times higher unit cost for mass production than the equivalent of an automobile's, along with huge development cost. Configuration management consists of four main parts : configuration identification, configuration control, configuration audit, and data management. In development programme, configuration management is one of the methods to save development cost, and setting a well-structured configuration management system according to the Military Standard is an important factor in success of the programme. The paper proposes a configuration management system suitable for development of various multi-use components development and presents that the configuration management was performed successfully during dual-use component development programme using the established system.

안전한 키보호 기능을 제공하는 암호 API (A cryptographic API to provide the secure key protection function)

  • 김명희;전문석
    • 한국정보과학회:학술대회논문집
    • /
    • 한국정보과학회 2004년도 가을 학술발표논문집 Vol.31 No.2 (1)
    • /
    • pp.334-336
    • /
    • 2004
  • 국내 전자상거래 제품과의 호환성과 확장성을 위하여 국내 전자서명 표준인 KCDSA(Korean Certificate-based Digital Signature Algorithm) 메커니즘을 PKCS(Public Key Cryptographic Standard) #11 암호 API(Application Programming Interface)에 기능을 추가한다. PKCS #11에서 정의한 키 관리(Hey Management) 함수의 입력 파라미터에 암호화할 키를 바로 입력하면 변조된 키를 전달할 수 있으므로, 본 논문에서는 안전한 키보호(Key Protection) 함수를 새로 정의하여 암호화할 키 대신 사용자 PIN(Personal Identification Number: 패스워드) 입력하여 사용자의 KCDSA 개인키와 공개키를 보다 더 안전하게 보관하고자 한다.

  • PDF

An Empirical Investigation of Task-Technology Fit: Context of RFID in Disaster Management

  • Ahmed, Ashir
    • Asia pacific journal of information systems
    • /
    • 제24권3호
    • /
    • pp.345-370
    • /
    • 2014
  • The notion of technological adoption such as Radio Frequency Identification (RFID) has been examined in various domains such as supply chain management, inventory management and health care. However, there are several unanswered questions surrounding how this technology is adopted in disaster management. This study attempts to explore the potential of RFID in disaster management. The notion of Task-Technology Fit (TTF) is deemed suitable for this purpose and thus used as the theoretical framework that is further validated by employing multiple case studies. The empirical findings indicate that there are six key factors influencing the decision to adopt RFID in disaster management. Some relate to aspects of RFID when it is put into practice, namely cost, compatibility, standardisation, implementation and locatability; while the other key factor relates to privacy and security aspect of information. It is hoped that the findings of this research will inform disaster management organizations to better plan the adoption of RFID for their operations.

An Efficient and Provable Secure Certificateless Identification Scheme in the Standard Model

  • Chin, Ji-Jian;Heng, Swee-Huay;Phan, Raphael C.W.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권7호
    • /
    • pp.2532-2553
    • /
    • 2014
  • In Asiacrypt 2003, Al-Riyami and Paterson proposed the notion of certificateless cryptography, a technique to remove key escrow from traditional identity-based cryptography as well as circumvent the certificate management problem of traditional public key cryptography. Subsequently much research has been done in the realm of certificateless encryption and signature schemes, but little to no work has been done for the identification primitive until 2013 when Chin et al. rigorously defined certificateless identification and proposed a concrete scheme. However Chin et al.'s scheme was proven in the random oracle model and Canetti et al. has shown that certain schemes provable secure in the random oracle model can be insecure when random oracles are replaced with actual hash functions. Therefore while having a proof in the random oracle model is better than having no proof at all, a scheme to be proven in the standard model would provide stronger security guarantees. In this paper, we propose the first certificateless identification scheme that is both efficient and show our proof of security in the standard model, that is without having to assume random oracles exist.

복수 K-FIDO 기기 환경에서의 인증키 관리 (Certified Key Management in Multi K-FIDO Device Environment)

  • 이병천
    • 정보보호학회논문지
    • /
    • 제27권2호
    • /
    • pp.293-303
    • /
    • 2017
  • 생체인식 기술을 이용하여 기존의 패스워드를 대체하기 위한 FIDO(Fast IDentity Online)[1,7] 기술이 빠르게 성장하고 있다. FIDO 기술은 생체인식 기술을 이용한 편리한 사용자 인증과 스마트카드 기술을 이용한 안전한 키관리 기능을 제공하지만 사용자 신원인증 기술이 함께 제공되지 않아 사용자가 FIDO 기기를 원격 서버에 초기 등록하는 과정에서는 기존의 전통적인 신원인증 방식을 이용할 수밖에 없다. K-FIDO[3]는 이런 단점을 해결하기 위하여 FIDO 기술과 인증서기반 기술을 하나의 기기에 접목시킨 것으로 사용자의 초기등록 과정에서 인증서 기반 인증을 이용할 수 있게 하였다. 그런데 사용자들이 복수의 K-FIDO 기기를 사용하는 유비쿼터스 환경이 빠르게 도래할 것으로 예상되는데, 이런 환경에서는 만일 기존의 방식대로 하나의 인증서를 여러 기기에 복사하여 사용하거나, 기기별로 별도의 인증서를 발급받아 사용하게 된다면 많은 문제가 발생할 것으로 예상된다. 본 논문에서는 자체확장인증[4] 방식을 이용하여 복수 K-FIDO 기기 환경에서 인증키 관리의 편의성을 향상시킬 수 있는 방안을 제시한다.

텍스트마이닝을 활용한 품질 4.0 연구동향 분석 (Understanding of the Overview of Quality 4.0 Using Text Mining)

  • 김민준
    • 품질경영학회지
    • /
    • 제51권3호
    • /
    • pp.403-418
    • /
    • 2023
  • Purpose: The acceleration of technological innovation, specifically Industry 4.0, has triggered the emergence of a quality management paradigm known as Quality 4.0. This study aims to provide a systematic overview of dispersed studies on Quality 4.0 across various disciplines and to stimulate further academic discussions and industrial transformations. Methods: Text mining and machine learning approaches are applied to learn and identify key research topics, and the suggested key references are manually reviewed to develop a state-of-the-art overview of Quality 4.0. Results: 1) A total of 27 key research topics were identified based on the analysis of 1234 research papers related to Quality 4.0. 2) A relationship among the 27 key research topics was identified. 3) A multilevel framework consisting of technological enablers, business methods and strategies, goals, application industries of Quality 4.0 was developed. 4) The trends of key research topics was analyzed. Conclusion: The identification of 27 key research topics and the development of the Quality 4.0 framework contribute to a better understanding of Quality 4.0. This research lays the groundwork for future academic and industrial advancements in the field and encourages further discussions and transformations within the industry.

A Study on Efficient Data De-Identification Method for Blockchain DID

  • Min, Youn-A
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제13권2호
    • /
    • pp.60-66
    • /
    • 2021
  • Blockchain is a technology that enables trust-based consensus and verification based on a decentralized network. Distributed ID (DID) is based on a decentralized structure, and users have the right to manage their own ID. Recently, interest in self-sovereign identity authentication is increasing. In this paper, as a method for transparent and safe sovereignty management of data, among data pseudonymization techniques for blockchain use, various methods for data encryption processing are examined. The public key technique (homomorphic encryption) has high flexibility and security because different algorithms are applied to the entire sentence for encryption and decryption. As a result, the computational efficiency decreases. The hash function method (MD5) can maintain flexibility and is higher than the security-related two-way encryption method, but there is a threat of collision. Zero-knowledge proof is based on public key encryption based on a mutual proof method, and complex formulas are applied to processes such as personal identification, key distribution, and digital signature. It requires consensus and verification process, so the operation efficiency is lowered to the level of O (logeN) ~ O(N2). In this paper, data encryption processing for blockchain DID, based on zero-knowledge proof, was proposed and a one-way encryption method considering data use range and frequency of use was proposed. Based on the content presented in the thesis, it is possible to process corrected zero-knowledge proof and to process data efficiently.

PROBLEMS AND SOLUTION OF IDENTIFICATION AND APPROVAL OF PRIVATELY FINANCED INFRASTRUCTURE PROJECTS IN CHINA

  • Xiangrong Du;Tsunemi Watanabe
    • 국제학술발표논문집
    • /
    • The 1th International Conference on Construction Engineering and Project Management
    • /
    • pp.731-736
    • /
    • 2005
  • The governmental attitude toward private investment and financing for infrastructure projects has changed from the initial prohibition to the current encouragement in China, which has been embodied in the legal documents and administrative process. However, the problem of identification, bidding, and approval procedure for privately financed infrastructure projects has been observed in policies and administrative measures promulgated by different or even the same government branches, which is prohibitive factors for smooth project implementation. After analysis of the identification, bidding, and approval process of infrastructure projects, the authors proposed a simplified and alternative procedure and clarified the key points of relevant project documents.

  • PDF

멀티미디어 콘텐츠 보호를 위한 스마트 홈 환경 (Smart Home Environment for the Protection of Multimedia Digital Contents)

  • 최기현;장경수;신호진
    • 한국인터넷방송통신학회논문지
    • /
    • 제11권2호
    • /
    • pp.189-196
    • /
    • 2011
  • 디지털 콘텐츠는 IT 산업의 핵심적인 콘텐츠로 인터넷의 발전과 더불어 다양한 분야에서 개발되고 있다. 사용자의 멀티미디어 장비가 다양해지고 성능이 향상되어 감에 따라 디지털 콘텐츠 보호는 더욱 복잡해지고 다양한 보호 시스템 개발을 요구한다. DRM(Digital Rghts Management)은 대표적인 콘텐츠 보호 시스템이며 이 기술 기반으로 다양한 콘텐츠 보호 기법이 등장하고 있다. 그러나 콘텐츠와 배포형태에 따른 다수의 기술을 적용해야하는 문제점과 "analog hole" 문제 및 키 분배 방식의 비효율성으로 인해 안전하게 보호하기 어렵다. 본 논문에서는 이러한 문제점을 해결하기 위해서 RFID(Radio Frequency Identification) 기술을 이용한 콘텐츠의 인증 및 보호 시스템 제안하고 스마트 홈 환경에서 자유로운 콘텐츠의 복제 및 효율적인 콘텐츠관리가 가능함을 보인다.

The Information Distribution Role of Facebook in Universities

  • NGUYEN, Thi Nguyet Dung;NGUYEN, Thi Thu Huong;NGUYEN, Thi Phuong Anh;NGUYEN, Thi Thu Huong;VU, Thi Phuong Thao
    • 유통과학연구
    • /
    • 제20권5호
    • /
    • pp.75-84
    • /
    • 2022
  • Purpose: The paper employs the theory of planned behaviour, social identity theory, social presence theory, and social exchange theory to propose a model for using the social media platform Facebook in distributing information in universities. Research design, data and methodology: Data were obtained from 618 students at Hanoi University of Industry (HaUI) in Vietnam. The study used structural equation modeling in SPSS and the statistical analysis software AMOS version 24 to explore the information distribution role of Facebook. Results: Findings reveal that subjective norms and social presence play a key role in driving students to use Facebook for studying. In addition, university administrators can boost student satisfaction and academic achievement through Facebook. Interestingly, students who strongly identify with the brand name of the university have a strong connection with the university are more likely to engage in behaviors supportive toward the university. Conclusions: These findings show that Facebook had played a key information distribution role in universities. Thus, the study provides the executive board of the university and teachers can gain new understanding of why students employ Facebook for studying as well as capitalize on the platform to improve several operational metrics such as brand identification, student satisfaction, and academic achievement.