• Title/Summary/Keyword: Identifier System

Search Result 264, Processing Time 0.025 seconds

A Study on Methods for Project-Oriented Service Connection (과제중심 서비스 연계 방안에 관한 연구)

  • Kim, tae-hyun;Kim, yun-jeong;Kwon, lee-nam;Kim, jae-soo
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2007.11a
    • /
    • pp.70-74
    • /
    • 2007
  • National R&D Projects provide the central axis to weave the valuable information derived from variable projects and their participants. Thus to efficiently manage and utilize the National R&D information, the project-oriented management system has to be established and its information must to be articulated with each other. Using the connected relations the system can provide an efficient way to easily gain and share the information. To do this the National R&D information management systems and the identifier management system must to be builded and the common services and functions connecting the systems have to be provided. On this study, by defining these constituents and their relationships we're going to establish the base of promotion of National R&D Information utilization.

  • PDF

Development and Applications of Ecological Data Portal Service (EcoBank) for Sharing Ecological Information of Korea (생태정보의 공유를 위한 생태정보 포털서비스 (EcoBank) 구축 및 활용 방안)

  • Sung, Sunyong;Kwon, Yong Su;Kim, Ki Dong
    • Korean Journal of Ecology and Environment
    • /
    • v.51 no.3
    • /
    • pp.212-220
    • /
    • 2018
  • Ecological and ecosystem database is becoming very necessary to understand origins and relationship between human and nature and also to minimize disturbance caused by human activities. An ecological information portal can play important roles as a computing system to collect knowledge, distributed research findings and separated data from researchers. In this study, we designed and developed ecological information portal service (EcoBank 1.0) for collecting and providing ecological information for diverse classes of stakeholders. To reach the goal, we had reviewed related and comparable ecological database portals to design conceptual structure of EcoBank system including database management framework. Then, we developed some functions of ecosystem analysis for each stake-holders (researchers, general public and policy makers). As a result of this study, we successfully designed of EcoBank system covering the functions of Digital Object Identifier(DOI) publishing and data quality management process. Also, we (1) applied ecological indices for calculating biodiversity by administrative boundary for policy makers, (2) provided statistical information of econature map for general public and distribution characteristics of species for researchers. To make a successful establishment of EcoBank, we have to collect and build up related database and offer various and reliable ecological data consistently. We expect that the successful construction of EcoBank will help not only to accomplish sustainable development goals but also to raise the welfare of ecosystem in Korea.

Automatic Payload Signature Update System for Classification of Recent Network Applications (최신 네트워크 응용 분류를 위한 자동화 페이로드 시그니쳐 업데이트 시스템)

  • Shim, Kyu-Seok;Goo, Young-Hoon;Lee, Sung-Ho;Sija, Baraka D.;Kim, Myung-Sup
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.1
    • /
    • pp.98-107
    • /
    • 2017
  • In these days, the increase of applications that highly use network resources has revealed the limitations of the current research phase from the traffic classification for network management. Various researches have been conducted to solutions for such limitations. The representative study is automatic finding of the common pattern of traffic. However, since the study of automatic signature generation is a semi-automatic system, users should collect the traffic. Therefore, these limitations cause problems in the traffic collection step leading to untrusted accuracy of the signature verification process because it does not contain any of the generated signature. In this paper, we propose an automated traffic collection, signature management, signature generation and signature verification process to overcome the limitations of the automatic signature update system. By applying the proposed method in the campus network, actual traffic signatures maintained the completeness with no false-positive.

Biometric and Identity Reference Protection (개인식별정보와 바이오인식정보의 보호기법)

  • Shin, Yang-Nyuo;Kwan, Man-Jun;Lee, Yong-Jun;Park, Jin-Il;Chun, Myung-Geun
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.19 no.2
    • /
    • pp.160-167
    • /
    • 2009
  • This paper describes how to protect the personal information of a biometric reference provider wherein biometric reference and personally identifiable information are bounded in a biometric system. To overcome the shortcomings of the simple personal authentication method using a password, such as identify theft, a biometric system that utilizes physical and behavioral characteristics of each person is usually adopted. In the biometric system, the biometric information itself is personal information, and it can be used as an unique identifier that can identify a particular individual when combining with the other information. As a result, secure protection methods are required for generating, storing, and transmitting biometric information. Considering these issues, this paper proposes a method for ensuring confidentiality and integrity in storing and transferring personally identifiable information that is used in conjunction with biometric information, by extending the related X9.84 standard. This paper also outlines the usefulness of the proposition by defining a standard format represented by ASN.1, and implementing it.

Device Authentication System in IoT environment (IoT 환경의 단말 인증 시스템)

  • Dong-Yeon, Kang;Ji-Soo, Jeon;Sung-Hwa, Han
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.27 no.1
    • /
    • pp.97-102
    • /
    • 2023
  • IoT is being used in a lot of industry domain such as smart home, smart ocean, smart energy, and smart farm, as well as legacy information services. For a server, an IoT device using the same protocol is a trusted object. Therefore, a malicious attacker can use an unauthorized IoT device to access IoT-based information services and access unauthorized important information, and then modify or extract it to the outside. In this study, to improve these problems, we propose an IoT device authentication system used in IoT-based information service. The IoT device authentication system proposed in this study applies identifier-based authentication such as MAC address. If the IoT device authentication function proposed in this study is used, only the authenticated IoT device can access the server. Since this study applies a method of terminating the session of an unauthorized IoT device, additional research on the access deny method, which is a more secure authentication method, is needed.

Design of ULID-based Location-Sensing Service Model (ULID 기반 위치 인식 서비스 모델의 설계)

  • Nam, Kwang-Woo
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.8 no.4
    • /
    • pp.143-154
    • /
    • 2005
  • This paper proposes the location acquisition methods and LBS(location-based services) system using RFID(radio frequency identification) tags with location information in ubiquitous city. Location information is checked using RFID tags attached to various buildings. stores and road signs. And various LBSs are provided based on the location information. Traditionally, when the location information is obtained by a GPS, the precision of the location information may deteriorate due to geographical displacement of a satellite and GPS receivers, for example shadow zone by building, in-door environment, and heavy cloud. The objective of this paper is to provide a ULID(universal location identification) data structure, a ULID-based location acquisition method and an LBS system, in which precise location information is extracted using RFID tags attached to various buildings, stores and road signs and ULID and also danger of information leakage is minimized so that an LBS of ubiquitous environment can be provided to a user.

  • PDF

A Secure Authentication Model Using Two Passwords in Client Server Systems (클라이언트 서버 시스템 환경하에서 2개의 패스워드를 사용하는 안전한 인증 모델)

  • Lee, Jae-Woo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.3
    • /
    • pp.1350-1355
    • /
    • 2011
  • It is very important issues to protect many system resources using authorized client authentication in distributed client server systems. So it is not enough to prevent unauthorized opponents from attacking our systems that client authentication is performed using only the client's identifier and password. In this paper, we propose a secure authentication database modeling with two authentication keys such as a client authentication key and a server authentication key. The proposed authentication model can be used making high quality of computer security using two authentication keys during transaction processing. The two authentication keys are created by client and server, and are used in every request transaction without user's extra input. Using the proposed authentication keys, we can detect intrusion during authorized client's transaction processing because we can know intrusion immediately through comparing stored authentication keys in client server systems when hackers attack our network or computer systems.

A Study for Suggesting Online Reference Resources' Metadata Elements Based on the Users' Perceptions (이용자 인식조사를 기반으로 한 참고정보원 메타데이터 항목 제안에 관한 연구)

  • Noh, Young-Hee
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.21 no.2
    • /
    • pp.81-96
    • /
    • 2010
  • This study aimed to suggest metadata elements for online reference resource systems based on users' perceptions. We surveyed librarians in four types of libraries, asking them indicate the need for each of 17 metadata elements. The survey results were compared to the current data input rates of the system, which has been operating for the past two years. Based on both the respondent data and current data input rates, we suggested that title, description, subject, creator, type, identifier, language, coverage, location, and tag elements must be included in the system as the metadata elements for online reference resources. n addition, the input rates of creator and copyright were 20.20% and 18.30%, respectively, but the respondents answered that these items were needed 82.15% and 82.77%, respectively. Therefore, these two items are necessary as metadata elements. On the other hand, the data input rates of type, source, date, relation, and contribution were less than 3%, but almost 70% of respondents answered that all these items were needed. So further research should be performed to determine whether or not these items are needed for online reference resource systems.

Design of the Autogenous Context Service and Middleware for Ubiquitous Environments (유비쿼터스 환경을 위한 자생적 컨텍스트 서비스와 미들웨어의 설계)

  • Oh Hae-Seok;Oh Dong-Yeol
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.8
    • /
    • pp.1088-1098
    • /
    • 2005
  • Context-Aware is a one of the important researches in ubiquitous computing for providing optimal service to users by acquiring user's intentions and environmental information. Diverse researches are focused on the users and its environment facts for Context-Aware base and introduce a sensing based middleware which engages sever/sensor that operates identifier information to provide services. Context-Aware service which is limited by users and environment facts has the problem of overlapping sensing, unnecessary searching and anonymity of users. Also Server-Centric Context-Aware system requires very high cost to manage and operate the services. On this paper, We introduce Autogenous Context service model to simplify the Context-Aware process and design the middleware which performs decentralize management for Context-Aware information of user's portable devices to minimize problems which is occurred during the management and operation of existing Context-Aware system.

  • PDF

A Study on the Applications of Blockchain Transactions and Smart Contracts in Recordkeeping (블록체인 트랜잭션과 스마트 컨트랙트를 활용한 기록관리 적용 방안 연구)

  • Wang, Hosung;Moon, Shinhye;Han, Nungwoo
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.20 no.4
    • /
    • pp.81-105
    • /
    • 2020
  • This study examines the possibility of applying various recordkeeping methods through a platform built in 2019 by the National Archives of Korea. In particular, it aims to develop a way to track and store transactions using blockchain and to design and present the method of records management automation using smart contracts. In this regard, a literature review, a system analysis of CAMS and MAM, interviews with the experts, designing, implementation, and the development of the system's proof of concept were performed. These efforts resulted in the proposal of an archives and records management strategy utilizing blockchain, which guarantees transparency and accountability by preserving an audit trail on recordkeeping activities.