• Title/Summary/Keyword: User certification

Search Result 198, Processing Time 0.027 seconds

The development of the procurement process system for e-Biz of the plant business (플랜트 산업의 e-Biz화를 위한 구매 Process System 개발)

  • Kim Hoi-Sub;Lee Joo-Pyo;Han Sang-hoon;Cho Se-hyoung;Park Chang-Hyun;Han Jae-Bum;Kim Sung-Ho;Kim Gyu-Tae
    • Journal of Internet Computing and Services
    • /
    • v.4 no.5
    • /
    • pp.11-19
    • /
    • 2003
  • Since B2C(Business to Customer) from which e-commerce had originated was replaced by B2B, e-Business has shown fast growth so fa., Recently, e-Procurement by l:n concept is on the development as self-purchase system associated with their own ERP In many conglomerates in the Korean market. However, in order to vitalize e-Biz in the plant industry, we need to set up e-marketplaces where many sellers and buyers can meet each other at the same time, which has become the essential part for success as an expanded business model. In this paper, we expect that the foundation for e-transformation in the plant industry is set up by developing Purchase Process System and related modules as the prerequisite for e-Biz in the plant industry, and this report will provide an exemplary model for e-commerce. The Purchase Process System consists of 1) e-Purchasing Module that manages bidding and contract information based on quotation inquiry, 2) e-Expediting Module that manages information to guarantee the on-time delivery, 3) e-Certification Module that controls user authentification, 4) e-Basic Module that manages the bulletin boards, Q&A, etc.

  • PDF

Development of Antibacterial Hood and Filter for Medical Powered Air Purifying Respirators (PAPR) (의료용 전동공기청정호흡기(PAPR)용 항균성 후드 및 필터 개발)

  • Eunjoo Koh;Nahyun Cho;Yong Taek Lee
    • Membrane Journal
    • /
    • v.33 no.6
    • /
    • pp.398-408
    • /
    • 2023
  • This work developed a hood and filter for antibacterial protective clothing for medical powered air purifying respirators (PAPR) that can be used in medical settings and quarantine against infectious diseases such as Zika virus, Middle East respiratory syndrome (MERS), and coronavirus disease-19 (COVID-19). The hood material of the protective clothing was made of polypropylene spunlace nonwoven fabric (SFS) was used for withstand wind pressure and external physcial pressure. Forthermore, in order to reduce the user's risk of infection, phytoncide-based materials were used on the outer-surface of the hood to achieve a 99.9% antibacterial effect, and the inner-surface were treated with hydro-philic materials to improve absorbency by 25%. In addition to evaluating the artificial blood penetration resistance, dry mi-croorganism penetration resistance, wet bacteria penetration resistance, and bacteriophage penetration resistance required for medical protective clothing hoods, it received a passing evaluation of levels 2-6. Meanwhile, as a result of evaluating the performance of the antibacterial treated spunlace high efficiency particulate air (HEPA) filter, excellent antibacterial properties, dust removal rate, and differential pressure effect were confirmed. All performance evaluations were conducted by an accredited certification body in accordance with the medical PAPR certification standards.

A Study of Service Middleware for Application Based on USN/RFID/GPS (USN/RFID/GPS 응용을 위한 서비스 미들웨어 연구)

  • Moon, Kyeung-Bo;Lee, Chang-Young;Kim, Do-Hyeon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.9 no.5
    • /
    • pp.1284-1288
    • /
    • 2008
  • Recently, there is increasing the development requirement of middleware and interface for GPS(Global Positioning System), RFID(Radio Frequency IDentification), sensor networks. GPS supports a useful location based service. RFID supports products logistic and distribution services through the identification. A sensor network collects a context information, such as humidity, temperature and atmospheric pressure. This paper implements and verifies a integrated service middleware for supporting efficiently process of sensing data collected from RFID, GPS and sensor network. This middleware have the temporary store function, the redundancy exclusion function, certification function, the classification function and the database storage function. Additionary, this middleware connects with low-level adaptor using socket interface and supports the high-level application services using database connection. Therefore, user can develop easily various many ubiquitous application system using proposed middleware instead of each RFID middleware, GPS middleware and, middleware based on sensor network.

A Study on Development of Component based Common Use Passenger Processing Systems for Incheon International Airport (컴포넌트 기반의 차세대 공용여객처리시스템 설계 및 구현 - 인천국제공항 사례 중심으로 -)

  • Kim, Tae-Young
    • Journal of Advanced Navigation Technology
    • /
    • v.15 no.1
    • /
    • pp.147-156
    • /
    • 2011
  • IATA is playing a central role in the process of changing the international technical standards of common-use system which supports the airport check-in and boarding business in conjunction with the airline systems from CUTE to CUPPS. IATA expects that if the airport common-use system is changed to CUPPS, the development and maintenance costs related to the airline's common-use system can be reduced by the implementation of the standard interface about check-in and boarding business-related equipment and the certification of airline applications. Incheon International Airport is in the face of stiff competition with major Northeast Asian Airports to attract more airlines. To be more competitive than other airports, switching over to CUPPS is vital for airline's cost-saving effect. This study builds on CUPPS international technical standards and suggests design and implementation plans of Incheon International Airport's component-based next-generation common use passenger processing systems to support the various functions of user's requirements.

A Study on Open Based Network Security System Architecture (개방형 네트워크 보안 시스템 아키텍처에 관한 연구)

  • Kim, Chang-Su;Kim, Tak-Chen;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.06a
    • /
    • pp.782-785
    • /
    • 2007
  • If existing system need to expand security part, the security was established after paying much cost, processing of complicated installation and being patient with inconvenience at user's view because of closed structure. In this thesis, those defects could be overcome by using open security tools and constructing security server, which is firewall of 'bastion' form including proxy server, certification server and so on. Also each security object host comes to decide acceptance or denial where each packet comes from, then determines security level each hosts. Precisely it is possible choosing the packets from bastion host or following at the other policies. Although an intruder enter into inside directly, it is constructed safely because encryption algorithm is applied at communication with security object host. This thesis suggests more flexible, independent and open security system, which improves existing security through systematic linkage between system security and network security.

  • PDF

Watermark Authentication Cryptography for Medical Image Security (의료영상 보안을 위한 워터마크 인증 암호화 기법)

  • Cho, Young-bok;Woo, Sung-Hee;Lee, Sang-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.4
    • /
    • pp.759-766
    • /
    • 2017
  • In this paper, we preserve the transparency of digital contents by compressing and storing the medical image for a certain period so as to be safe and robust against various attacks of medical images. The proposed algorithm generates an encrypted image authentication code that extracts the feature value of the original image and combines it with the user's information. in order to extract hidden data, the authentication code is first decrypts the encrypted medical image and extracts the hidden data using the spatial characteristics of image. The proposed algorithm guarantees integrity when comparing extracted authentication code and newly generated authentication code for image authentication after directly inserting it into content itself through watermarking. We have proved various security of attack of image data and proved that the certification rate is improved to 98.4%.

Distributed Authentication Model using Multi-Level Cluster for Wireless Sensor Networks (무선센서네트워크를 위한 다중계층 클러스터 기반의 분산형 인증모델)

  • Shin, Jong-Whoi;Yoo, Dong-Young;Kim, Seog-Gyu
    • Journal of the Korea Society for Simulation
    • /
    • v.17 no.3
    • /
    • pp.95-105
    • /
    • 2008
  • In this paper, we propose the DAMMC(Distributed Authentication Model using Multi-level Cluster) for wireless sensor networks. The proposed model is that one cluster header in m-layer has a role of CA(Certificate Authority) but it just authenticates sensor nodes in lower layer for providing an efficient authentication without authenticating overhead among clusters. In here, the m-layer for authentication can be properly predefined by user in consideration of various network environments. And also, the DAMMC uses certificates based on the threshold cryptography scheme for more reliable configuration of WSN. Experimental results show that the cost of generation and reconfiguration certification are decreased but the security performance are increased compared to the existing method.

  • PDF

Certificate-based SSO Protocol Complying with Web Standard (웹 표준을 준수하는 인증서기반 통합 인증 프로토콜)

  • Yun, Jong Pil;Kim, Jonghyun;Lee, Kwangsu
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.8
    • /
    • pp.1466-1477
    • /
    • 2016
  • Public key infrastructure(PKI), principle technology of the certificate, is a security technology providing functions such as identification, non-repudiation, and anti-forgery of electronic documents on the Internet. Our government and financial organizations use PKI authentication using ActiveX to prevent security accident on the Internet service. However, like ActiveX, plug-in technology is vulnerable to security and inconvenience since it is only serviceable to certain browser. Therefore, the research on HTML5 authentication system has been conducted actively. Recently, domestic bank introduced PKI authentication complying with web standard for the first time. However, it still has inconvenience to register a certification on each website because of same origin policy of web storage. This paper proposes the certificate based SSO protocol that complying with web standard to provide user authentication using certificate on several sites by going around same origin policy and its security proof.

Privacy Model based on RBAC for U-Healthcare Service Environment (u-헬스케어 환경에서 환자의 무결성을 보장하는 RFID 보안 프로토콜)

  • Rhee, Bong-Keun;Jeong, Yoon-Su;Lee, Sang-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.3
    • /
    • pp.605-614
    • /
    • 2012
  • Nowadays u-healthcare which is very sensitive to the character of user's information among other ubiquitous computing field is popular in medical field. u-healthcare deals extremely personal information including personal health/medical information so it is exposed to various weaknees and threats in the part of security and privacy. In this paper, RFID based patient's information protecting protocol that prevents to damage the information using his or her mobile unit illegally by others is proposed. The protocol separates the authority of hospital(doctor, nurse, pharmacy) to access to patient's information by level of access authority of hospital which is registered to management server and makes the hospital do the minimum task. Specially, the management server which plays the role of gateway makes access permission key periodically not to be accessed by others about unauthorized information except authorized information and improves patient's certification and management.

Digital Contents Protection Without Server Authentication Using Smart Cards (스마트 카드를 이용한 서버 인증이 필요 없는 디지털 콘텐츠 보호 기법)

  • Kim, Young-Sik;Lim, Dae-Woon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.3C
    • /
    • pp.133-139
    • /
    • 2011
  • Nowadays, it is considered as an important task to protect digital contents from illegal use and reproduction. In many cases, there are secure servers to authenticate the allowed users and the user authentication process is performed by communication between the servers and users. However, if the number of users and contents are increased, the servers should treat a large amount of authentication loads and the authentication cost will be considerably increased. Moreover, this scheme is not adequate for some players in which only a limited function of communication is deployed. In order to solve this problem, this paper proposes an authentication method which can certificate both the digital contents and players, and prevent illegal reproduction without the certification server. The proposed scheme is secure in the replay attack, the man in the middle attack, and data substitution attack.