• Title/Summary/Keyword: User certification

Search Result 198, Processing Time 0.037 seconds

User Visit Certification System using Inaudible Frequency

  • Chung, Myoungbeom
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.7
    • /
    • pp.57-64
    • /
    • 2021
  • In this paper, we propose and test the efficacy of an easy-to-use user location certification system for public places that relies on frequencies outside the audible range for humans. The inaudible frequencies come in signal frequency between 18-20 kHz and are generated by general audio speaker. After an individual's smart device detects the signal frequency, it sends the frequency value, user's personal ID, and user's location to a system server that certifies the user's visit location currently. The system server then saves a user visit record and categorizes it by individual. To show the usefulness of this proposed system, we developed a user visit certification application for smart devices linked to a system server. We then conducted a user visit certification experiment using the proposed system, with the result showing 99.6% accuracy. For a comparison, we then held a user visit certification experiment using a QR code, which confirmed that our proposed system performs better than QR code location certification. This proposed system can thus provide restaurants and other facilities reliable user contact tracing and electronic visitor access lists in the age of COVID-19.

A Study on Enforce the Policy of User Certification in Public Certificate System (공인인증서 시스템의 사용자 인증정책 강화에 관한 연구)

  • Kim, In-Bum;Hwang, Joo-Yong;Park, Won-Hyung
    • Convergence Security Journal
    • /
    • v.10 no.4
    • /
    • pp.69-76
    • /
    • 2010
  • public certification is some kind of electric ID which can prove the valid user, based on open KEY. usually it had been used in the field of government complaint, e-commerce, financial. but recently it expands the its use range through computerization of work process of diversity fields such as e-sports, property, medical industry. because of this reason, importance for user certificate process is gradually rose. The purpose of this paper is looking at the method for user certification of public certificates and draw a way for enforce the user certification process by Vulnerability Analysis. To draw the alternative we study the Authentication Principle and policy structure of public certification system by researching references, has drew the limitation for policy of certification. we provide the guideline to enforce the user certification through conclusion which has been drew from previous step.

The Effectiveness on the Certification of the Defense Quality System (국방 품질경영시스템 인증제도의 효과)

  • Lee, Sang-Jin;Park, Yong-Su
    • Journal of Korean Society for Quality Management
    • /
    • v.35 no.3
    • /
    • pp.100-106
    • /
    • 2007
  • The objective of this paper is to analyze the effect of the defense quality certification system on the military user's dissatisfaction. In this paper, an empirical research is performed to compare the effectiveness of ISO 9000 : 2000 and Korea Defense Quality Certification system 0050-9000. The research result shows that (1) the Defense Quality system is better than ISO 9000 : 2000 to reduce the military user's dissatisfaction level. (2) the Quality Assurance types 4, 5 have more user's dissatisfaction than types 2, 3. (3) small and medium sized companies have more user's dissatisfaction than large companies.

Analyzing the Differential Views between the Designers and the Users on Certification Assessment Criteria of the G-SEED System - Focused on Certification Assessment Criteria for Apartment Buildings - (녹색건축 인증제도 평가항목에 대한 설계 실무자 및 사용자 의식 차이 분석 - 공동주택 인증 평가항목을 중심으로 -)

  • Choi, Yeo-Jin
    • KIEAE Journal
    • /
    • v.15 no.6
    • /
    • pp.87-92
    • /
    • 2015
  • Purpose: The green building certification system in Korea was introduced in 2002 and developed as an improvement version of the G-SEED(Green Standard for Energy and Environmental Design) system in 2013. This study conducts surveys targeting architectural designers and users on significance of certification assessment criteria for apartment buildings on the G-SEED system and examines the differential views between the two groups on assessment criteria. Method: First, The AHP(Analytic Hierarchy Process) method was used to find importance of assessment criteria and then the importances were compared with weighted points on the certification standard. Second, the t-test was used to investigate differential views between designer and user groups on certification assessment criteria based on drawn importances. Result: (1) While designer group considered land use and transportation, energy and environmental pollution, and water circulation management as more important, user group did material and resource, maintenance management, ecological environment, and indoor environment as more important. (2) Based on t-test results, sustainable energy, water circulation system, site management, habitat, acoustical environment, and light environment were found to be different on importance between the two groups.

Inter-Authentication which utilize One-Time Password (One-Time Password를 이용한 상호인증)

  • 강민정;강민수;신현식;김현덕;박연식
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.10a
    • /
    • pp.510-513
    • /
    • 2001
  • OTP(One-time Password) had been used much by method to do user certification so far. Because aspect that user certification that use OTP is efficient and economical fairly is much, it is one of method that can use easily. This treatise would apply OTP in message authentication and wishes to show that OTP is available for inter-authentication. First, examine about OTP's characteristic and overview in introduction, and explain about user certification method to use OTP in main discourse and method of message certification. And finally. wish to examine how OTP offers inter-authentication function.

  • PDF

User Authentication Protocol through Distributed Process for Cloud Environment (클라우드 환경을 위한 분산 처리 사용자 인증 프로토콜)

  • Jeong, Yoon-Su;Lee, Sang-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.4
    • /
    • pp.841-849
    • /
    • 2012
  • Cloud computing that provides IT service and computer resource based on internet is now getting attention. However, the encrypted data can be exposed because it is saved in cloud server, even though it is saved as an encrypted data. In this paper, user certification protocol is proposed to prevent from illegally using of secret data by others while user who locates different physical position is providing secret data safely. The proposed protocol uses one way hash function and XOR calculation to get user's certification information which is in server when any user approaches to particular server remotely. Also it solves user security problem of cloud.

Smart Card Certification-Authority Distribution Scheme using Attributes-Based Re-Encryption (속성기반 재 암호화를 이용한 스마트카드 인증권한 분배스킴)

  • Seo, Hwa-Jeong;Kim, Ho-Won
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.5 no.3
    • /
    • pp.168-174
    • /
    • 2010
  • User authentication is an important requirement to provide secure network service. Therefore, many authentication schemes have been proposed to provide secure authentication, such as key agreement and anonymity. However, authority of scheme is limited to one's self. It is inefficient when authenticated users grant a certification to other users who are in an organization which has a hierarchical structure, such as a company or school. In this paper, we propose the first authentication scheme to use Attributes-Based Re-encryption that creates a certification to other users with specified attributes. The scheme, which has expanded from Rhee et al. scheme, has optimized computation performance on a smart card, ensuring the user's anonymity and key agreement between users and server.

Design of Security Service Model in Dynamic Cloud Environment (동적 클라우드 환경에 적합한 보안 서비스 모델 설계)

  • Jeong, Yoon-Su
    • Journal of Convergence Society for SMB
    • /
    • v.2 no.2
    • /
    • pp.35-41
    • /
    • 2012
  • The rapid development of cloud computing and mobile internet service changes to an mobile cloud service environment that can serve and pay computing source that users want anywhere and anytime. But when user misses mobile device, the respond to any threat like user's personal information exposal is insufficient. This paper proposes cloud service access control model to provide secure service for mobile cloud users to other level users. The proposed role-based model performs access authority when performs user certification to adapt various access security policy. Also, the proposed model uses user's attribute information and processes before user certification therefore it lowers communication overhead and service delay. As a result, packet certification delay time is increased 3.7% and throughput of certification server is increased 10.5%.

  • PDF

Improvement of Reliability in Cause Analysis of Industrial Accidents (산업재해 원인분석의 신뢰도 제고방안 연구)

  • Choi, Gi Heung
    • Journal of the Korean Society of Safety
    • /
    • v.29 no.6
    • /
    • pp.1-8
    • /
    • 2014
  • Safety certification and inspection of dangerous machines and equipments used in industries are to save lives of workers and properties involved. Cause analysis of industrial accidents is essential to prove the effectiveness of such certification and inspection. This study focuses on suggesting systematic method for cause analysis of industrial accidents associated with dangerous machines and devices. Incorporating transition from the current user-oriented indirect regulations to more manufacturer and user balanced direct regulations, suggested method coupled with safety certification, safety inspection, safety management and safety education will guarantee more effective prevention of industrial accidents.

A Study on Problems of Certification System in International Electronic Commerce (전자무역(電子貿易)에서 제도상(制度上) 인증(認證)시스템의 문제점(問題點)에 관한 고찰(考察))

  • Oh, Hyon-Sok
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.23
    • /
    • pp.291-320
    • /
    • 2004
  • Electronic transaction using electronic documents be carried without direct person to person meeting, there is the possibility to use other's identity illegally without notice and to verity authenticity of transaction. It is very hard to find out that the electronic documents on the process of submitting is forged documents or not and also has much difficulty in maintaining transmitting secret. Therefore, to solve such problems on electronic transactions, certification system with cryptography skill are inevitably necessary. Also there is needed legal base in the electronic document as functional equivalent of the paper document. Recently there are so many commercial certification service provider(CPS) such as Identrus, Bolero, TEDI but their establishment of CPS, certification process, guideline and so on are different each CPS. Therefore, this kind of situation can make user confuse. To introduce and develop the electronic certification in the international electronic commerce not domestic electronic commerce, it need to authorize and operate certification authority under the uniform regulation base. But, because the laws and guidelines that related to electronic certification system are different among the nations and international organizations, it need to compare laws and guidelines. In conclusion, the most important thing to resolve problems surrounded certification and develope certification system in the international electronic commerce make uniform rule of international electronic certification to recognize internationally from each nation or at least, need to harmony laws and guideline in each nations.

  • PDF