• Title/Summary/Keyword: User certification

Search Result 199, Processing Time 0.028 seconds

A Study on Floor Slip Resistance Standard and Test Method for BF Certification (BF인증을 위한 바닥 마감재 미끄럼 성능기준 및 측정방법에 대한 연구)

  • Shin, Dong-Hong;Seong, Ki-Chang;Park, Kwang-Jae
    • Journal of The Korea Institute of Healthcare Architecture
    • /
    • v.25 no.3
    • /
    • pp.75-83
    • /
    • 2019
  • Purpose: There are no clear criteria for slip performance in the BF certification process, so the evaluator relies on subjective judgments depending on the field situation. Physical criteria for determining the slip performance of various floor finishes are not clear. C.S.R., the only criterion currently being used to check slip performance, may raise questions about its coverage, feasibility and reliability. Method: For an analysis of domestic standards and status, KS L 1001, KS M 3510, and KS F 2375. External standards are analyzed for ADA Standard, ANSI Standard, and BS EN Standard. Analyze the test methods and evaluation criteria of O-Y-PSM, BPT, and the dynamic slip resistance test used in these criteria. It also presents an improvement plan for the rational presentation of standards. Results: To date, various kinds of test methods and measuring devices of the slip resistance coefficient have been developed, but there are not many ways to trust useful results related to user safety. Reliability and thoroughly verified test methods and criteria should be used to assess the slip performance of the floor. In order to improve the standard for the evaluation of slip performance in Korea, the existing standard should first be raised to the same level as the overseas standard, and the application of the discriminatory standard should be applied considering the characteristics and usage patterns of each space. Implication: Currently, Korean standards propose various test methods, but the proper use of test methods, scope and assessment criteria are not established, so improvement of the comprehensive standard is necessary.

Writing System for Farming Diary using Public Data (공공데이터를 활용한 영농일지 작성 시스템)

  • Kwon, Daecheol;Kim, Sanggeun;Kim, Neunghoe
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.22 no.6
    • /
    • pp.179-184
    • /
    • 2022
  • As public data opened its doors in line with the era of the 4th Industrial Revolution, agricultural public data also increased. Currently, the majority of farmers are writing farming diaries due to eco-friendly certification and basic public interest direct payment projects. However, it is a difficult task for busy farmhouses in the aging agricultural community to write farming diaries. Therefore, there have been cases where farming diaries have been filled out on behalf of the farmhouses. However, one may get disadvantaged in terms of receiving eco-friendly certification and public interest direct payment projects. In succession, this paper proposes a system to conveniently write farming diaries by checking the farming diary data stored in the server via categories of crops and dates and finding farming diary public data suitable for the user to automatically fill out the diary.

Management Method for Private Key File of PKI using Container ID of USB memory (USB 메모리의 컨테이너ID를 이용한 PKI 기반의 개인키 파일의 안전한 관리 방안)

  • Kim, Seon-Joo;Joe, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.10
    • /
    • pp.607-615
    • /
    • 2015
  • Mosts user of internet and smart phone has certificate, and uses it when money transfer, stock trading, on-line shopping, etc. Mosts user stores certificate in a hard disk drive of PC, or the external storage medium. In particular, the certification agencies are encouraged for user to store certificate in external storage media such as USB memory rather than a hard disk drive. User think that the external storage medium is safe, but when it is connect to a PC, certificate may be copied easily, and can be exposed to hackers through malware or pharming site. Moreover, if a hacker knows the user's password, he can use user's certificate without restrictions. In this paper, we suggest secure management scheme of the private key file using a password of the encrypted private key file, and a USB Memory's hardware information. The private key file is protected safely even if the encrypted private key file is copied or exposed by a hacker. Also, if the password of the private key file is exposed, USB Memory's container ID, additional authentication factor keeps the private key file safe. Therefore, suggested scheme can improve the security of the external storage media for certificate.

A Study on Time Conviction Based on PKI for Suitable IMT-2000 Service (IMT-2000 서비스에 적합한 PKI 기반 시점확인 서비스에 관한 연구)

  • 이덕규;이임영
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.2
    • /
    • pp.211-222
    • /
    • 2004
  • By development of wireless mobile communication, many users increased. But, in case of 1st generation or 2nd generation, transfer communication service was not satisfying high speed wireless internet Communication consumer's request such as other multimedia service because serviced based on voice and text basically. Can get through service such as data and transfer multimedia service that is not service of voice putting first in wireless hereafter. Problems by much development of service are happening, because a transmit is exposed, problem point that wireless network is much unlawful stealing use and tapping etc. As is different from this, problem can happen in service side. Can take next time for these example. By user that is not right can happen. Need method to keep away purpose that is enemy of third party in contract between both men as well as problem for document or accounting information which the third user that is enemy of third party is shared. By solution about problems, certification of contents for document and visual point confirmation must it. Applied service or certification of contents service that is rapidly point of time that is using in wire to solve problem that refer in front in this treatise in IMT-2000 to develop hereafter. Way to propose proposed efficient way using individual in IMT-2000 just as it is.

  • PDF

A Study on Multi-Signature Scheme for Efficient User Authentication in Metaverse (메타버스 환경에서의 효율적인 사용자 인증을 위한 다중 서명 기법 연구)

  • Jae Young Jang;Soo Yong Jeong;Hyun Il Kim;Chang Ho Seo
    • Smart Media Journal
    • /
    • v.12 no.2
    • /
    • pp.27-35
    • /
    • 2023
  • Currently, online user authentication is perform using joint certificates issued by accredited certification authorities and simple certificates issued by private agency. In such a PKI(Public Key Infrastructure) system, various cryptographic technologies are used, and in particular, digital signatures are used as a core technology. The digital signature scheme is equally used in DID(Decentralized Identity), which is attracting attention to replace the existing centralized system. As such, the digital signature-based user authentication used in current online services is also applied in the metaverse, which is attracting attention as the next-generation online world. Metaverse, a compound word of "meta," which means virtual and transcendent, and "universe," means a virtual world that includes the existing online world. Due to various developments of the metaverse, it is expted that new authentication technologies including biometric authentication will be used, but existing authentication technologies are still being used. Therefore, in this study, we study digital signature scheme that can be efficiently used for user authentication in the developing metaverse. In particular, we experimentally analyze the effectiveness of ECDSA, which is currently used as a standard for digital signatures, and Schnorr signatures, which can quickly verify a large amount of signatures.

Design and Implementation of U-healthcare system with zigbee in service integration system (서비스 통합 시스템에서 지그비를 이용한 유비쿼터스 헬스케어 시스템의 설계 및 구현)

  • Jang, Mun-Suck;Shin, Kwang-Sik;Cheong, Jin-Ha;Yee, Yang-Hee;Shim, Jae-Hong;Lee, Eung-Hyuk;Choi, Sang-Bang
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.11 s.353
    • /
    • pp.16-24
    • /
    • 2006
  • In this paper, we implement a U-healthcare system that can be applied to a service integration system. This system consists of a wireless network system a sensor module, and a integration server. The wireless network system collects data and the sensor module measures body fat, blood pressure, quantity of exercise, and SPO2. The server integrates user certification, security service and VOD service and collects user health information in real-time, and sends the data in case of emergency to a doctor or guardian.

A Design of Certificate Password Recovery Using Decentralized Identifier (DID를 사용한 인증서 암호 복구)

  • Kim, Hyeong-uk;Kim, Sang-jin;Kim, Tae-jin;Yu, Hyeong-geun
    • Journal of Venture Innovation
    • /
    • v.2 no.2
    • /
    • pp.21-29
    • /
    • 2019
  • In the public certificate technology commonly used in Korea, users have a cumbersome problem of always resetting when they forget their password. In this paper, as a solution to this problem, we propose a secure authentication certificate password recovery protocol using blockchain, PKI, and DID for distributed storage. DID is a schema for protecting block ID in blockchain system. The private key used in the PKI is configured as a user's biometric, for example, a fingerprint, so that it can completely replace the memory of the complex private key. To this end, based on the FIDO authentication technology that most users currently use on their smartphones, the process of authenticating a user to access data inside the block minimizes the risk of an attacker taking over the data.

Design of Security Module using Key Exchange Protocol in Digital Contents (키 교환 프로토콜을 이용한 디지털콘텐츠 보호 모듈 설계)

  • 권도윤;이경원;김정호
    • The Journal of the Korea Contents Association
    • /
    • v.3 no.3
    • /
    • pp.40-46
    • /
    • 2003
  • In the paper, designed digital contents security module to check unlawfulness reproduction and distribution of digital contents. This paper applied Diffie-Hellman algorithm that use discrete logarithm and random number as primary for public key application to create encryption key that agree each other through communication channel between DCPS and HOST, and applied Triple DES repeat DES 3 times through 2 different encryption key that is selecting ANSI X9.17 that is key management standard, ISO 8732 and PEM(Privacy-Enhanced Mail) etc. by secondary protection for safe transmission of digital contents in transmission line. Designed security module consist of key exchange module, key derivation module and copy protection processing module. Digital contents security module that design in this thesis checks reproduction and distribution of digital contents by unauthenticated user through user certification function and digital contents encryption function, and protect digital contents transmission line.

  • PDF

Performance Comparison of UWB DS-CDMA/OFDM/MC-CDMA System in S-V Channel Environment (S-V채널 환경에서 UWB DS-CDMA/OFDM/MC-CDMA 시스템 성능 비교)

  • Lee Hyung-Ki;Kwak Kyung-Sup
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.42 no.11
    • /
    • pp.53-60
    • /
    • 2005
  • In this paper, we analyze the performance of UWB MC-CDMA system and compareit with DS-CDMA and OFDM systems, which have been drafting in standardization even now. Too many Rake Fingers are needed in the DS-CDMA system to separate multi-path signals, which results in highsystem complexity. OFDM radio power fails to qualify for FCC certification unless frequency hopping. From this reason, MC-CDMA system considered is proposed in this paper. It has lower complexity compared with DS-CDMA and shows good performance against frequency selective fading. In addition, for a wide-band communication, less radio power per spectrum is allowed in the MC-CDMA system than in an OFDM system. Simulation result show that the DS-CDMA system has better performance with single user, but MC-CDMA system shows best performance in case of multi user environment.

Web contents deformation detection method by BHO (BHO 이용한 웹 컨텐츠 변조 탐지 방법)

  • Mo, Jeong-Hoon;Chung, Man-Hyun;Cho, Jae-Ik;Moon, Jong-Sub
    • Journal of Advanced Navigation Technology
    • /
    • v.15 no.4
    • /
    • pp.655-663
    • /
    • 2011
  • Recently, with improvement of internet service technology, web service has been affecting the environment for computing user. Not only current events, economics, game, entertainment, but also personal financial system is processed by web pages through internet. When data transmission is implemented on the internet, webpage acquire text form code and transform them to DOM information, and then shows processed display to user by web browser. However, those information are not only easily accessed by diversified route, but also easily deformed by intentional purpose. Furthermore, it is also possible to acquire logon information of users and certification information by detouring security mechanism. Therefore, this dissertation propose the method to verify integrity of web contents by using BHO which is one of the Add-On program based on MS Internet Explorer platform which is one of major web browser program designed by MicroSoft to detect any action of webpage deformation.