• Title/Summary/Keyword: Key Certification

Search Result 264, Processing Time 0.027 seconds

Efficient Security Method Using Mobile Virtualization Technology And Trustzone of ARM (모바일 가상화 기술과 ARM의 Trustzone을 사용한 효율적인 보안 방법)

  • Choi, Hwi-Min;Jang, Chang-Bok;Kim, Joo-Man
    • Journal of Digital Convergence
    • /
    • v.12 no.10
    • /
    • pp.299-308
    • /
    • 2014
  • Today, a number of users using smartphone is very rapidly increasing by development of smartphone performance and providing various services. Also, they are using it for enjoying various services(cloud service, game, banking service, mobile office, etc.). today's mobile security solution is simply to detect malicious code or stay on the level of mobile device management. In particular, the services which use sensitive information, such as certificate, corporation document, personal credit card number, need the technology which are prevented from hacking and leaking it. Recently, interest of these mobile security problems are increasing, as the damage cases been occurred. To solve the problem, there is various security research such as mobile virtualization, ARM trustzone, GlobalPlatform for mobile device. Therefore, in this paper, I suggested efficient method that uses the mobile virtualization techniques of certification, security policy and access control, password/key management, safe storage, etc. and Trustzone of ARM for preventing information leakage and hacking.

Drivers for Trust and Continuous Usage Intention on OTP: Perceived Security, Security Awareness, and User Experience (OTP에 대한 신뢰 및 재사용의도의 결정요인: 인지된 보안성, 보안의식 및 사용자경험을 중심으로)

  • Yun, Hae-Jung;Jang, Jae-Bin;Lee, Choong-C.
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.12
    • /
    • pp.163-173
    • /
    • 2010
  • PKI(Public Key Infrastructure)-based information certification technology has some limitations to be universally applied to mobile banking services, using smart phones, since PKI is dependent on the specific kind of web browser, Internet Explorer. OTP(One Time Password) is considered to be a substitute or complementary service of PKI, but it still shows low acceptance rate. Therefore, in this research, we analyze why OTP has not been very popular, and provide useful implications of making OTP more extensively and frequently used in the mobile environment. Perceived security of OTP was set as a higher-order construct of integrity, confidentiality, authentication, and non-repudiation. Research findings show that security awareness and perceived security of OTP is positively associated, and the relationship between perceived security and trust on OTP is statistically significant. Also, trust is positively related to intention to use OTP continuously.

A Light-weight PKM Mutual Authentication Protocol for Improving Initial Authentication in WiMAX (WiMAX 초기 인증을 향상시킨 경량화된 PKM 상호 인증 프로토콜)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Cheol;Lee, Sang-Ho
    • The KIPS Transactions:PartC
    • /
    • v.16C no.2
    • /
    • pp.257-266
    • /
    • 2009
  • Now a days, as increased the use of mobile units like a laptop computer and PDA, the demand for high speed internet service is increasing. On the other hand, PKMv2 which is provided from IEEE 802.16e cannot support fully on the security of high speed internet service. This paper proposes light-weight mutual authentication protocol which solved security problem of PKMv2 related to integrity of mobile node for transmission of safe high speed data of mobile node operating in mobile WiMAX environment. Proposed mutual authentication protocol increases the efficiency as the user in network can move in network safely without additional procedure of authentication between subscriber and base station after user's initial authentication. Also, the proposed mutual authentication protocol is safe from the security attack (the man-in-the-middle attack and reply attack) between subscriber and base station by generating a key adopt to PRF() function using random number and secret value in order to secure certification.

The Necessity for a Trauma Surgeon and the Trauma Surgeon's Role in the Trauma Care System (외과의사 관점에서 외상전문의의 필요성과 과제)

  • Lee, Kug Jong
    • Journal of Trauma and Injury
    • /
    • v.21 no.1
    • /
    • pp.1-7
    • /
    • 2008
  • When man first walked on this planet, injury must have been a close encounter of the first kind. The outbreak of World War I, during a period of rapid scientific growth in the basic sciences, demonstrated the need to develop better methods of care for the wounded, methods that were later applicable to the civilian population. Trauma is a multisystem disease and, as such, benefits from almost any advance in medical science. As we learn more about the physiology and the biochemistry of various organ systems, we can provide better management for trauma victims. Improved imaging techniques, better appreciation of physiologic tolerance, and increased understanding of the side effects of specific surgical procedures have combined to reduce operative intervention as a component of trauma patient care. On the other hand, because of this rapid development of medical science, only a few doctors still have the ability to treat multisystem injuries because almost doctor has his or her specialty, which means a doctor tends to see only patients with diagnoses in the doctor's specialty. Trauma Surgeons are physicians who have completed the typical general surgery residency and who usually continue with a one to two year fellowship leading to additional board certification in Surgical Critical Care. It is important to note that trauma surgeons do not need to do all kinds of operations, such as neurosurgery and orthopedic surgery. Trauma surgeons are not only a surgeon but also general medical practitioners who are very good at critical care and coordination of patient. In order to achieve the best patient outcomes, trauma surgeons should be involved in prehospital Emergency Medical Services, the Trauma Resuscitation Room, the Operating Room, the Surgical Intensive Care and Trauma Unit, the Trauma Ward, the Rehabilitation Department, and the Trauma Outpatient Clinic. In conclusion, according to worldwide experience and research, the trauma surgeon is the key factor in the trauma care system, so the trauma surgeon should receive strong support to accomplish his or her role successfully.

A Study on the Improvement of Regulations for AMO Global Recognition System of International Civil Aviation Organization (정비조직인증 국제인정체계 대응을 위한 규정 개선 연구)

  • Choe, Yunseon;Lee, Sunkyung;Lee, Chaeyoung
    • Journal of Aerospace System Engineering
    • /
    • v.14 no.3
    • /
    • pp.32-41
    • /
    • 2020
  • The International Civil Aviation Organization (ICAO) in 2015 proposed a road-map for the global recognition system of the Approved Maintenance Organization (AMO) fto mitigate the redundant work and regulatory burdens of the aviation industry and authorities on the certification and oversight activities of the State of Registry. Since then, the ICAO standards and guidelines have been revised accordingly with the goal of implementing the system in 2024. Korea should actively prepare for this AMO global recognition system to cope with the ICAO road-map appropriately as well as to develop the Maintenance Repair Overhaul (MRO) industry. Thus, this paper focused on the ratings and limitations system, a key element of the AMO, and proposes the improvement of domestic regulatory/administrative rules necessary for the global recognition system, through the review of newly established ICAO standards/guidelines and the comparative analysis of leading aviation countries' and Korean system/requirements.

A Study on Methods for Developing by Nurturing Clean Thermal Power Generation Technology (청정화력발전 기술 육성 방안 연구)

  • Kim, Yeong-Mi;Lee, Won-Hak
    • Journal of Climate Change Research
    • /
    • v.9 no.2
    • /
    • pp.197-207
    • /
    • 2018
  • The Korean government views coal-fired power plants as the key cause of the fine dust generation, and is developing an energy policy to replace and demolish old coal-fired power plants. According to the Eighth Power Supply Base Plan (2017-2031), the maximum power capacity in 2030 is expected to be 100.5GW, which is 17.9% higher than the current level (85.2GW). The plan aims to reduce the facility size and power generation ratio from nuclear and coal resources to even lower levels than today, and to rapidly expand power generation from new and renewable energy. Despite that, the proportion of coal power generation is still much higher than other resources, and it is expected that the reliance on goal will maintain for next several decades. Under such circumstances, the development, supply, and expansion of clean coal technology (CCT) that is eco-friendly and highly efficient, is crucial to minimize the emission of pollutants such as carbon dioxide and fine dust, as well as maximize the energy efficiency. The Korean government designated the Yong-Dong Thermoelectric Power Plant in Gangneung to develop clean coal power generation, and executed related projects for three years. The current study aims to suggest a plan to develop parts, technologies, testing, evaluation, certification, and commercialization efforts for coal-fired power generation, In addition, the study proposes a strategy to vitalize local economy and connect the development with creation of more jobs.

Military Application of Two-factor Authentication to Data Leakage and Access Prevention (데이터 유출 및 접근방지를 위한 이중 인증방식의 군(軍) 적용방안)

  • Jung, Ui Seob;Kim, Jee Won;Kim, Jae Hyun;Jeong, Chan ki
    • Convergence Security Journal
    • /
    • v.18 no.5_2
    • /
    • pp.21-27
    • /
    • 2018
  • Most of the Internet users in Korea are issued certificates and use them for various tasks. For this reason, it is recommended that accredited certification authorities and security related companies and use public certificates on USB memory and portable storage devices rather than on the user's desktop. Despite these efforts, the hacking of the certificate has been continuously occurring and the financial damage has been continuing. Also, for security reasons, our military has disabled USB to general military users. Therefore, this study proposes a two-factor method using the unique information of the USB memory and the PC which is owned by the user, and suggests a method of managing the private key file secure to the general user. Furthermore, it will be applied to national defense to contribute to the prevention of important data and prevention of access by unauthorized persons.

  • PDF

Indonesia 2017: Return of Pancasila on the Eve of the Presidential Election (인도네시아 2017: 빤짜실라의 귀환과 대선 국면의 도래)

  • SUH, Jiwon;KIM, Hyung-Jun
    • The Southeast Asian review
    • /
    • v.28 no.2
    • /
    • pp.147-179
    • /
    • 2018
  • Basuki Tjahaja Purnama, Jakarta's Ex-Governor, lost his re-election bid in 2017 and then was jailed on a charge of blasphemy. After his defeat, the rhetorics of Indonesian politics was divided into two opposing sides: anti-Communism and 'pribumi' of the radical Islamic movements and Pancasila of the Jokowi administration. Although Islamic political parties are now preoccupied with their own coalitional politics and survivals, rather than solidarity of Islamic forces, the rising Islamic sentiments confirmed by the Jakarta election indicate that religion will continue to be a key variable in Indonesian politics. Meanwhile, ex-military generals who declared themselves as candidates in the 2018 regional election and the 2019 presidential election, as well as a few measures used by the Jokowi administration against extra-parliamentary political opponents, remind us of Suharto's New Order. Steady growth continues in economy. The raise of minimum wage enlarged middle classes and led to a decline of the poverty rate. Jokowi's commitment to building infrastructure has made tangible achievements. Under these circumstances, enhanced cooperation between Indonesia and South Korea is laudable, though any such cooperation must fully incorporate local sociocultural contexts, such as the strengthened halal certification system.

An Implementation of the Security Service on Internet Mail System (인터넷 메일 시스템에서의 정보보호 서비스 구현)

  • 강명희;신효영;유황빈
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.7 no.2
    • /
    • pp.107-122
    • /
    • 1997
  • Most of the currently used electronic mail system has the threat of security such as illegal leak of message, forgery, uncertain identity, denial of sending and receiving, and so forth. The security for this system is not satisfied yet, thus we explore these problems. In this thesis, we implement the security services for internet mail system which cover the weakness for traditional mail system. This system provides not only security services which PEM and PGP provides (i.e message confidentiality, message integrity, originator authentication, non-repudiation of origin), but also message replay prevention. and non-denial of recipient using certification of contents. In addition, this system increases security of the digital signature by signing with signature block formatting on the creation of it. And it increases security of the digital enveloping by encrypting with encryption block formatting of message encryption key.

Analysis of Ecological Data Repository Operation Status and EcoBank Service Proposal (생태 분야 데이터 리포지터리 운영 현황 분석 및 EcoBank 서비스 제안)

  • Juseop Kim;Hyosuk Kang;Suntae Kim
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.57 no.4
    • /
    • pp.289-310
    • /
    • 2023
  • Sharing and reusing data has become essential. Data repositories are a key tool for sharing and reusing this data. The purpose of this study is to propose the service of EcoBank, which is being built and operated by the National Institute of Ecology. To achieve the research purpose, 10 out of 123 foreign data repositories in the field of ecology registered on re3data.org were selected, investigated, and analyzed. As a result of the analysis, three services were derived in common. The three services consist of first, research data policy, second, research data quality review, and research data management training and workshops. Here, in order to share EcoBank's global data, it is necessary to register with a data repository registry such as re3data.org, and it is proposed that certification be promoted to ensure the reliability and quality of the repository.