• Title/Summary/Keyword: Key Certification

Search Result 261, Processing Time 0.031 seconds

Development of wearable device with smart key function and convergence of personal bio-certification and technology using ECG signal (심전도 신호를 이용한 개인 바이오인증 기술 융합과 smart key 기능이 탑재된 wearable device 개발)

  • Bang, Gul-Won
    • Journal of Digital Convergence
    • /
    • v.20 no.5
    • /
    • pp.637-642
    • /
    • 2022
  • Self-authentication technology using electrocardiogram (ECG) signals is drawing attention as a self-authentication technology that can replace existing bio-authentication. A device that recognizes a digital electronic key can be mounted on a vehicle to wirelessly exchange data with a car, and a function that can lock or unlock a car door or start a car by using a smartphone can be controlled through a smartphone. However, smart keys are vulnerable to security, so smart keys applied with bio-authentication technology were studied to solve this problem and provide driver convenience. A personal authentication algorithm using electrocardiogram was mounted on a watch-type wearable device to authenticate bio, and when personal authentication was completed, it could function as a smart key of a car. The certification rate was 95 per cent achieved. Drivers do not need to have a smart key, and they propose a smart key as an alternative that can safely protect it from loss and hacking. Smart keys using personal authentication technology using electrocardiogram can be applied to various fields through personal authentication and will study methods that can be applied to identification devices using electrocardiogram in the future.

An Improved Side Channel Power Analysis with OP-Amp (OP-Amp를 적용한 향상된 부채널 전력분석 방법)

  • Kim, JinBae;Ji, JaeDeok;Cho, Jong-Won;Kim, MinKu;Han, Dong-Guk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.3
    • /
    • pp.509-517
    • /
    • 2015
  • Side Channel Analysis of applying the power-consumption was known as effective method to analyze the key of security device based on chip. The precedential information of power-consumption was measured by the voltage distribution method using by series connection of resistor. This method was dependent on the strength of the voltage. If the voltage cannot be acquired much information which is involved with the key, the information of power-consumption significantly might be influenced by noise. If so, some of the information of power-consumption might be lost and distorted. Then, this loss can reduce the performance of the analysis. For the first time, this paper will be introduced the better way of the improvement with using the method of Current to Voltage Converter with OP-Amp. The suggested method can reduce the effect of the noise which is included in the side channel information. Therefore we can verify the result of our experiments which is provided with the improvement of the performance of side channel analysis.

A Study on Enforce the Policy of User Certification in Public Certificate System (공인인증서 시스템의 사용자 인증정책 강화에 관한 연구)

  • Kim, In-Bum;Hwang, Joo-Yong;Park, Won-Hyung
    • Convergence Security Journal
    • /
    • v.10 no.4
    • /
    • pp.69-76
    • /
    • 2010
  • public certification is some kind of electric ID which can prove the valid user, based on open KEY. usually it had been used in the field of government complaint, e-commerce, financial. but recently it expands the its use range through computerization of work process of diversity fields such as e-sports, property, medical industry. because of this reason, importance for user certificate process is gradually rose. The purpose of this paper is looking at the method for user certification of public certificates and draw a way for enforce the user certification process by Vulnerability Analysis. To draw the alternative we study the Authentication Principle and policy structure of public certification system by researching references, has drew the limitation for policy of certification. we provide the guideline to enforce the user certification through conclusion which has been drew from previous step.

A Design of Protocol Management System for Aggregating Messages based on Certification between Vehicles (차량간 인증 기반 메시지 집계 프로토콜 관리시스템 설계)

  • Lee, ByungKwan;Jeong, EunHee
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.18 no.4
    • /
    • pp.43-51
    • /
    • 2013
  • This paper proposes the design of protocol management system for aggregationg messages based on certification between vehicles which not only prevents the messages between vehicles from being forged and altered by Sybil attack by authenticating the them, and but also provides the efficient communication by aggregating the redundant vehicle messages which frequently happens when communicating. For this, the proposed system proposes the SKLC(Session Key Local Certificate) design which is a local certificate based on a session key, and the MAP(Message Aggregation Protocol) design which aggregates the redundant vehicle messages. Therefore, when the proposed system checks the certificate of vehicle, it provides the reliable information securely by verifying the integrity of vehicle with a hash function operation, and improves communication efficiency by reducing the processing time.

A Study on the Improvement of Green Building Certification System;Focused on the contrastive analysis of domestic and foreign system (국내 친환경건축물 인증제도의 개선방향에 관한 연구;국내.외 친환경건축물 인증제도의 비교분석을 중심으로)

  • Chun, Sang-Hyun;Oh, Se-Gyu
    • Proceeding of Spring/Autumn Annual Conference of KHA
    • /
    • 2006.11a
    • /
    • pp.382-385
    • /
    • 2006
  • After incoming the notion of eco-friendly building, many organizations developed green building assessment programs and in the late of 2001, those programs were unified to one program, 'Green Building Certification(GBC)'. Many problems, however, arose after unification of programs and now the study to solve those problems is impending. The purpose of this study is to make suggestions to solve problems of GBC through analyzing characteristics of several abroad and well developed programs. The key points of the analysis were 1) characteristics of assessment organizations, 2) structures of programs, and 3) characteristics of assessment methods and systems. The results of the study showed that GBC didn't have any positive connections with the academia, the developer and the consumer, and did have lack of assessment efficiency and accuracy.

  • PDF

A Study on the PKI technology for the Mobile Phone (무선 인터넷 환경에 적합한 PKI 기술 연구)

  • Lee, Jae-Il;Jung, Chan-Ju;Lee, Yong;Song, Ju-Seok
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2003.07a
    • /
    • pp.167-172
    • /
    • 2003
  • 무선 단말기에서 인터넷 서비스를 제공하기 위한 인터넷 접속 프로토콜이 등장함에 따라 무선 인터넷 사용의 편리성과 특성에 대한 인식이 급속한 속도로 확산되고 있다. 무선 인터넷에서 전자상거래를 비롯한 데이터 서비스가 성공적으로 제공되기 위해서는 반드시 해결되어야 할 요소가 보안이다. 무선 인터넷의 안전한 전자상거래 서비스를 제공하기 위해서는 통신정보에 대한 기밀성, 개체인증 등의 정보보호를 위한 기능과 부인방지 기능 등을 제공해야 한다. 공개키 기반구조 (Public Key Infrastructure, PKI)는 사용자에게 정보보호기능과 부인방지 기능을 제공한다. 본 논문에서는 무선 인터넷 환경에 적용 가능한 공개키 기반구조 적용 모델을 제안한다.

  • PDF

A study of the scenario for improvement of NPKI system (공인인증제도 개선방안 시나리오 연구)

  • Park, Kyung-Hye
    • Journal of Digital Convergence
    • /
    • v.8 no.4
    • /
    • pp.59-71
    • /
    • 2010
  • The purpose of this paper is the improvement of NPKI management policy in Korea. In order to reach the issue of EC certification problems, we examined first the institutions and system accredited NPKI for checking on the status and problems. We studied the alternatives for the improvement of NPKI system through brainstorming with experts, they had drawn possible scenarios and chosen optimal policy measures of the public key infrastructure.

  • PDF

The Potential Impacts of Recent Developments in Timber Certification Schemes on the Korean Forest Products Trade (우리 나라 임산물무역(林産物貿易)에 대한 목재인증제(木材認證制)의 잠재적(潛在的) 영향(影響))

  • Joo, Rin Won;Lee, Seong Youn
    • Journal of Korean Society of Forest Science
    • /
    • v.89 no.3
    • /
    • pp.368-377
    • /
    • 2000
  • This study was conducted to examine the recent developments in timber certification schemes at global level such as FSC certification and ISO 14001 system and to analyze their potential impacts on the Korean forest products trade. Data and information on standards and procedure of timber certification and certified forest lands were collected from relevant papers, statistics and reports published by regional and international organizations. In order to analyze the impacts on the Korean forest products trade, questionnaire survey to the affected parties was conducted on acknowledge of key words relating to environment and trade and on the additional amount of willingness to pay for a labeled timber from environmentally sound and sustainably managed forests. Quantities of certified timbers supplied would continue to increase due to lots of timber certification schemes developed and implemented at national, regional and global levels and growing interests in certification from many countries. Demand for certified timbers, however, is far from clear at this stage. The deciding factor would be consumer reaction to the certified products. In the short run, the timber certification would have a little impacts on forest products imports into Korean markets since domestic purchasers do not have much interests in environment related trade measures and their willingness to pay price premiums for certified timbers is not high. However, it could be expected that timber certification has negative impacts on exports of forest products, such as flooring and plywood, to developed European markets where timber certification is used as a trade barrier.

  • PDF

A Secure Micro-Payment Protocol based on Credit Card in Wireless Internet (무선인터넷에서 신용카드기반의 안전한 소액 지불 프로토콜)

  • Kim Seok mai;Kim Jang Hwan;Lee Chung sei
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.12C
    • /
    • pp.1692-1706
    • /
    • 2004
  • Recently, there are rapid development of information and communication and rapid growth of e-business users. Therefore we try to solve security problem on the internet environment which charges from wire internet to wireless internet or wire/wireless internet. Since the wireless mobile environment is limited, researches such as small size, end-to-end and privacy security are performed by many people. Wireless e-business adopts credit card WPP protocol and AIP protocol proposed by ASPeCT. WAP, one of the protocol used by WPP has weakness of leaking out information from WG which conned wire and wireless communication. certification chain based AIP protocol requires a lot of computation time and user IDs are known to others. We propose a Micro-Payment protocol based on credit card. Our protocol use the encryption techniques of the public key with ID to ensure the secret of transaction in the step of session key generation. IDs are generated using ECC based Weil Paring. We also use the certification with hidden electronic sign to transmit the payment result. The proposed protocol solves the privacy protection and Non-repudiation p개blem. We solve not only the safety and efficiency problem but also independent of specific wireless platform. The protocol requires the certification organization attent the certification process of payment. Therefore, other domain provide also receive an efficient and safe service.