• Title/Summary/Keyword: Service identity

Search Result 517, Processing Time 0.024 seconds

Study on Service Identity and Identity Framework

  • Kang, Hwa-Sun;Pan, Young-Hwan
    • Journal of the Ergonomics Society of Korea
    • /
    • v.31 no.1
    • /
    • pp.33-40
    • /
    • 2012
  • Objective: Service industry has become the most important industry among various economic activities, as the percentage of service related industry in advanced nations is over 60% of their GDP and the percentage of service industry in South Korea, a traditional manufacturing nation, now takes up over 60% of the entire economy. Background: Such industry paradigm shift has changed consumers from those that simply purchased products into groups of people that evaluate the companies that manufacture products, thereby further intensifying competition among companies and increasing the importance of integrated communication between companies and consumers. However, the excessive existence of sub-identities that have been developed for integrated management of the existing corporate identities, as well as the undifferentiated general management strategies by companies are creating confusion not only for consumers but also for various corporate interest parties. In addition, service identity strategy has become the most important strategy than any other sub-identity strategies in forming corporate identity at the increased importance of corporate service in the era of service industry. However, the current domestic circumstance is that the concept of service identity has not been well established through specific related studies. Method: Accordingly, the existing academic and field studies on the corporate identity(CI), brand identity(BI) and product identity(PI) used for the communication with consumers were reviewed in this study to establish and summarize the concept of service identity(SI) that appeared at the service economization. Results: The purpose is to examine the kind of change that could be brought about by SI for the corporate integrated identity strategy developed through the existing corporate, brand & product image in order to present a new direct in corporate identity strategy according to the industry paradigm shift through a SI centered new corporate identity framework. Conclusion: For preparing the new era of service industry, the corporate integrated identity strategy must be integrate with concept of service identity and which is essential to differential from other companies. Application: The proposed concept and framework of service identity on this paper will help to understand and clearly define why service identity is important factor of the new idea of corporate identities.

PBFT Blockchain-Based OpenStack Identity Service

  • Youngjong, Kim;Sungil, Jang;Myung Ho, Kim;Jinho, Park
    • Journal of Information Processing Systems
    • /
    • v.18 no.6
    • /
    • pp.741-754
    • /
    • 2022
  • Openstack is widely used as a representative open-source infrastructure of the service (IaaS) platform. The Openstack Identity Service is a centralized approach component based on the token including the Memcached for cache, which is the in-memory key-value store. Token validation requests are concentrated on the centralized server as the number of differently encrypted tokens increases. This paper proposes the practical Byzantine fault tolerance (PBFT) blockchain-based Openstack Identity Service, which can improve the performance efficiency and reduce security vulnerabilities through a PBFT blockchain framework-based decentralized approach. The experiment conducted by using the Apache JMeter demonstrated that latency was improved by more than 33.99% and 72.57% in the PBFT blockchain-based Openstack Identity Service, compared to the Openstack Identity Service, for 500 and 1,000 differently encrypted tokens, respectively.

An Identity Authentication Sharing Architecture for Global Internet Environment (글로벌 인터넷 환경을 위한 신원 인증 공유 구조)

  • Park, Seungchul
    • Journal of Information Technology Services
    • /
    • v.12 no.1
    • /
    • pp.259-270
    • /
    • 2013
  • Identity authentication sharing technologies which allow many service providers to share the result of identity authentication of an identity provider receive high attention as alternatives for current problematic identity authentications in the next-generation Internet environment, since they can provide crucial advantages including high usability, cost effectiveness of service providers, and privacy protection. However, in order for the identity authentication sharing technologies to be widely deployed in global Internet scale, the interoperability problem among different identity authentication sharing protocols and the trustworthiness issue among the participating identity providers, service providers, and users should be resolved in advance. This paper firstly analyzes current status of the protocol interoperability issue and existing trust frameworks for identity authentication sharing. And then, based on the result of analysis, this paper proposes a next generation identity authentication sharing architecture for global Internet.

FinDID : A DID service supporting the standard service scheme for the financial sector

  • Lee, Young-Eun;Kim, Hye-Won;Lee, Myung-Joon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.5
    • /
    • pp.127-138
    • /
    • 2022
  • In this paper, we present FinDID (Financial Decentralized IDentity), a blockchain-based DID(Decentralized IDentity) service that can flexibly control personal information or credentials through a systematic verification method while complying with the standard service scheme of decentralized identity for the financial sector. DID is an identity management system used in a decentralized environment without a specific certification authority, and as a technology that allows users to control their own information, it can realize self-sovereignty over users' own personal information. Through FinDID, users receive credentials that authenticate their various personal information from the issuer, select only the claims required by the target financial service using their personal electronic wallet, create presentations from credentials. Then they submit it to the financial service, leading to their qualification from the service. FinDID consists of electronic wallet, credential issuer, credential storage, DID service including DID management contract and credential management contract, and financial services using this service scheme. The DID service manages each user's DID and supports all verification processes of the associated identity management scheme.

A Study on the Quantified Point System for Designation of Personal Identity Proofing Service Provider based on Resident Registration Number

  • Kim, JongBae
    • International journal of advanced smart convergence
    • /
    • v.11 no.4
    • /
    • pp.20-27
    • /
    • 2022
  • In this paper, we propose to improve the designation examination criteria of agencies that provide personal identity proofing based on the resident registration number (RRN), a 13-digit number uniquely assigned by the government to identify Korean citizens. In online commerce, etc., the personal identity proofing agency (PIPA) is a place where online users can prove their personal identity by presenting an alternative means instead of their RRN. The designation examination criteria for PIPAs established in 2012 is a revision of the relevant current laws, and there is a problem in applying the designation examination for alternative means of RRN as the current examination standard. Therefore, in this paper, we propose a method to make the current examination criteria applicable to the newly designated examination of the personal identity proofing service provider based on the current RRN alternative method. According to the current designation examination criteria, only those who satisfy all the examination criteria are designated as the PIPA. However, in reality, it is not in line with the purpose of regulatory reform to require that all examination criteria be satisfied. In the proposed method, it is proposed to apply the standard score system for designation of PIPAs, to make the law current, to secure legal compliance, and to establish a new examination standard to provide a new alternative means of personal identity proofing service. By applying the proposed method to the PIPA designation examination, various alternative means of RRN can be utilized in the online commerce service market.

A Dynamic Trust Framework for Sharing Identity Authentication (신원 인증 공유를 위한 동적 신뢰 프레임워크)

  • Park, Seung-Chul
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.10
    • /
    • pp.2199-2206
    • /
    • 2012
  • Identity authentication sharing technology which allows many service providers to share the result of identity authentication of an identity provider provides several important advantages including high usability achieved by avoiding repeated registration of identity information to service providers and single sign-on, cost effectiveness of service providers achieved by outsourcing identity authentication services from identity providers, and privacy protection achieved by exposing identity information only to a limited number of controlled identity providers. However, in order for the identity authentication sharing technologies to be widely deployed in global Internet scale, the trustworthiness issue among the participating identity providers, service providers, and users should be resolved in advance. This paper firstly analyzes existing trust frameworks for identity authentication sharing. And then, based on the result of analysis, this paper proposes a dynamic and open trust framework for identity authentication sharing.

Web Service Framework for Identity Information Sharing (Identity 정보 공유를 위한 Web Service Framework)

  • Cho, Yeong-Sub;Jin, Seung-Hun
    • Proceedings of the IEEK Conference
    • /
    • 2006.06a
    • /
    • pp.155-156
    • /
    • 2006
  • 일반적으로 사용자가 인터넷 서비스를 제공받기 위해서는 자신의 정보를 먼저 등록해야 한다. 그러나 인터넷 서비스의 활용이 많아질수록 이와 같이 선 등록되어야 하는 정보의 양도 많아지며 또한 이들 정보가 불일치하는 문제가 발생한다. 본 논문은 이와 같은 문제를 해결하기 위해 사용자 Identity 정보를 웹 상에서 공유하는 기술인 Liberty Alliance 의 ID-WSF(Identity Web Service Framework)에 대하여 기술한다.

  • PDF

Development of Design Identity for Service Robot (로봇의 디자인 아이덴티티 개발)

  • Kim, Hyun-Jeong;Kim, Jae-Wook;Oh, Hyo-Jung;Kim, Myung-Suk
    • The Journal of Korea Robotics Society
    • /
    • v.4 no.2
    • /
    • pp.81-87
    • /
    • 2009
  • As expanding of service robots into the human life, the needs of robots are increased. The experts group forecasted that the robot market would grow rapidly in a short time, robot companies should compete with others for prior occupation in a market. In this research, we proposed a framework of robot identity design based on building methods of product identity and developed a case study. Identity is one of the strategies to distinguish from competitors through managing image united. It is possible to apply this identity approach on robot area, which was used for making image of companies, brands, and products. In general, identity has visual, invisual features, which can be classified into three elements; Robot Philosophy, Functional Affordance, Family Look. Robot philosophy means the vision or philosophy of a company through robot development, functional affordance is a character or role to serve and family look includes visual design elements like as shape, color, material, graphic, behavior etc. We suggest that this guide will be applied to build identity of following series of a model, models of same service group and all models of a company or commercial space.

  • PDF

PRIAM: Privacy Preserving Identity and Access Management Scheme in Cloud

  • Xiong, Jinbo;Yao, Zhiqiang;Ma, Jianfeng;Liu, Ximeng;Li, Qi;Ma, Jun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.1
    • /
    • pp.282-304
    • /
    • 2014
  • Each cloud service has numerous owners and tenants, so it is necessary to construct a privacy preserving identity management and access control mechanism for cloud computing. On one hand, cloud service providers (CSP) depend on tenant's identity information to enforce appropriate access control so that cloud resources are only accessed by the authorized tenants who are willing to pay. On the other hand, tenants wish to protect their personalized service access patterns, identity privacy information and accessing newfangled cloud services by on-demand ways within the scope of their permissions. There are many identity authentication and access control schemes to address these challenges to some degree, however, there are still some limitations. In this paper, we propose a new comprehensive approach, called Privacy pReserving Identity and Access Management scheme, referred to as PRIAM, which is able to satisfy all the desirable security requirements in cloud computing. The main contributions of the proposed PRIAM scheme are threefold. First, it leverages blind signature and hash chain to protect tenant's identity privacy and implement secure mutual authentication. Second, it employs the service-level agreements to provide flexible and on-demand access control for both tenants and cloud services. Third, it makes use of the BAN logic to formally verify the correctness of the proposed protocols. As a result, our proposed PRIAM scheme is suitable to cloud computing thanks to its simplicity, correctness, low overhead, and efficiency.

Recognition of Customers on Necessity of Hospital Brand Identity and Service Value (병원 브랜드아이덴티티의 필요성과 서비스가치 관련성에 대한 소비자들의 인식)

  • Lee, Young-Hwan;Ha, Au-Hyun
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.8
    • /
    • pp.551-559
    • /
    • 2017
  • This study was to find out recognition of customers on association between necessity of Hospital Brand Identity and service value, to suggest efficiency contents of public relations(PR) for give shape to positive emotion or emotional empathy about hospital. The result of study, necessity of Brand Identity in hospital PR contents was recognized to order facility environment specialized sector of medical service scale of hospital reputation of doctor, recognized to higher necessity of Hospital Brand Identity in case lower to use of practical hospital. In association between necessity of Brand Identity and service value of Hospital Brand Identity was confirmed to be higher recognize service value if more higher recognize necessity about scale and reputation of doctor. Accordingly, to suggest PR contents for give shape to positive and emotional empathy in relation of customers, small and medium hospitals will important finding process a specific character in each other hospitals, the value will be consider for efficiency marketing to reflect opinions of customers.