• Title/Summary/Keyword: Verification and Certification

Search Result 165, Processing Time 0.031 seconds

A Study on Developing Qualification Criteria in the Private Security Industry (민간경비 자격검정 개선방안에 관한 연구)

  • Choe, Jung-Taek
    • Korean Security Journal
    • /
    • no.18
    • /
    • pp.143-167
    • /
    • 2009
  • As of entering the 21st century, a trend in the field of a private security industry among the advanced countries have been increased a qualification system and train session to meet the needs of professionalism. Intensifying the professionalism in Korea, education and train system has been initiated to change but the oligopoly market already formulated due to impractical selection standard and management of education system. Issuing certification and offering basic training through a designated institution for the purpose of improving quality of the private security industry worker, its practical effectiveness were lower than expectation. Rather certification-holder or security agency, institution or truster's rent-seeking behavior have been increased by occupational licensing system. The founded results, which were associated to problems in selecting and educating to the private security guard, in this study were that any verification has been initiated towards dual-system in official approval and structural problems in education system, and non-existence of verification for professionalism and management capability to security agency owner and its upper managerial level. Current a dual system in an officially authorized verification system and completion of security guard credential requested change to an unified official qualification verification system to solve those problems. Ranges of an applicant to the unified official qualification verification system should be extend to the whole population in the private security industry. Moreover, minimization of the dead-weigh loss, which is caused by oligopoly phenomenon while using its market-dominant status, increasement number of designated institution, which allows self-regulating competition, and endowment of autonomy, which is in selecting education and agency, were requested to solve the problems in selecting and educating to the private security guard. In order to minimize stated problems while maintaining objectiveness, a new manage and supervise institution, which is called a 'private security industry committee', should be establish. The private security industry committee is a formation of governance network which are participated from professional group to civil organization.

  • PDF

A study on the send and receive of the message in the TEDI system (TEDI 시스템상의 메시지 송수신에 관한 고찰)

  • Jeon, Soon-Hwan
    • The Journal of Information Technology
    • /
    • v.7 no.1
    • /
    • pp.43-56
    • /
    • 2004
  • The purpose of this paper is to study the send and receive of the message in the TEDI System. The TEDI System replaces a series of trade documents with electronic date, and it realizes secure and reliable transactions of data among parties by means of open networks, such as the Internet. The TEDI system is composed of Web browsers, TC Serves, a RSP Server, and Certification Servers. TEDI has development the system and legal frame work. Exporters, importers, carriers, banks insurance and companies those who engage in the trade releated business have tested TEDI system and evaluated the legal frame work from the practical point of view. TEDI is now refining the system and preparing for the service. A fundamental feature of the TEDI System is the attribution to participants of data messages through public key certificates issued by certification authorities that allow for verification of digital signatures. Access to servers maintained by such certification authorities also takes place through the internet. In principle, certificates used by any reputable certification authority may be employed as long as they are compatible with X.509 V3.

  • PDF

The Study about Performance Test of Wind turbine (풍력발전기 출력성능 평가에 대한 연구)

  • Ko, Suk-Whan;Jang, Moon-Seok
    • Proceedings of the KIEE Conference
    • /
    • 2011.07a
    • /
    • pp.1348-1349
    • /
    • 2011
  • In this paper, The case of power performance test for 3MW wind-turbine system is introduced. For the verification of power curve and the certification of wind-turbine, power performance test is very important. This paper described the power testing results of a 3MW wind turbine and analysed an uncertainty about the testing. The measured power curves are very closely coincide with the calculated. Total uncertainty of measured data for Power Curve is 120~200kW in the rated power.

  • PDF

Effective Certificate Verification of Wireless PKI Based in WAP (WAP에서 무선 PKI기반의 효율적인 인증서 검증)

  • Shin Jung-Won;Choi Seong-Kwon;Ji Hong-Il;Lee Byong-Rok;Cho Yong-Hwan
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2005.11a
    • /
    • pp.175-180
    • /
    • 2005
  • To data service is offered successfully including electronic commercial transaction in radio Internet, security problem should be solved. Security protocole for radio internet does certification and key exchange by leitmotif and designed because suppose WPKI(WAP Public Key Infrastructure) mainly and use certificate. Wish to discuss efficient certificate verification of PKI that consider radio surrounding hereupon.

  • PDF

A Study on the Dispute Cases and Improvement Related to the FTA Cumulation: A Focus on the KOREA-ASEAN FTA (FTA 원산지누적 분쟁사례와 개선방안 연구: 한-아세안 FTA를 중심으로)

  • Ko, Jai-Kil
    • Journal of Arbitration Studies
    • /
    • v.30 no.4
    • /
    • pp.95-119
    • /
    • 2020
  • Securing a stable supply chain is becoming a significant concern among countries as the global uncertainty rises with the expansion of global protectionism and the result of what the COVID-19 pandemic has brought around the world. This study has investigated dispute cases between customs authority and trade corporations based on the KOREA-ASEAN FTA and suggested the following implications and improvements: Firstly, the extent (varieties) of the proof document on cumulation and its form should be stipulated and provided through consultation between customs from each contracting party. Secondly, it ought to be prescribed as an obligation so that producers located in the third country can cooperate in providing documents for certification of origin. The duty to provide such documentary evidence should also be specified when making EX-IM contracts. Lastly, origin verification provisions regarding cases to which cumulation is applied have to be complemented so that the verification period's extension can be applied and approved. One can expect that the abovementioned responses on cumulation will enhance the availability of KOREA-ASEAN FTA.

Speaker Verification Model Using Short-Time Fourier Transform and Recurrent Neural Network (STFT와 RNN을 활용한 화자 인증 모델)

  • Kim, Min-seo;Moon, Jong-sub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.6
    • /
    • pp.1393-1401
    • /
    • 2019
  • Recently as voice authentication function is installed in the system, it is becoming more important to accurately authenticate speakers. Accordingly, a model for verifying speakers in various ways has been suggested. In this paper, we propose a new method for verifying speaker verification using a Short-time Fourier Transform(STFT). Unlike the existing Mel-Frequency Cepstrum Coefficients(MFCC) extraction method, we used window function with overlap parameter of around 66.1%. In this case, the speech characteristics of the speaker with the temporal characteristics are studied using a deep running model called RNN (Recurrent Neural Network) with LSTM cell. The accuracy of proposed model is around 92.8% and approximately 5.5% higher than that of the existing speaker certification model.

A Study on the Origin Verification of China and the Cases disapproved under Korea-China FTA (한·중 FTA체제에서 중국의 원산지검증제도와 원산지불인정사례 연구)

  • Bae, Myong-Ryeol;Shim, Sang-Ryul
    • Korea Trade Review
    • /
    • v.42 no.2
    • /
    • pp.297-318
    • /
    • 2017
  • This study reviews the origin verification system of China via literature research and analyzes cases of Korean exports origin disapproved of Chinese customs clearance, to provide origin verification strategy recommendations for Korean companies exporting to China under Korea-China FTA. We reviewed the provisions of Chinese rules of origin and analyzed origin disapproved cases gathered from various presentations. The main results of the study have the following implications; First, the customs authority needs to establish a consultation channel with the customs authority of China, and origin certification issuing agencies should provide exporters with consulting services in the certificate issuing stage to reduce verification risk. Second, exporters need to pay attention to the formal requirements of the proof of origin, utilize the advance rulings program of differences in classification of items between Korea and China, and monitor regulatory change in China.

  • PDF

A Case Study of FTA Utilization on the Violation of Determining the Country of Origin (FTA 원산지결정기준 위반의 유형별 사례분석 및 대응방안)

  • Yun, Jun Ung;Lee, Chun Su
    • International Commerce and Information Review
    • /
    • v.17 no.2
    • /
    • pp.201-223
    • /
    • 2015
  • Concerning post-verification which is after the application of FTA preferential tariffs, in cases such as Korea-EFTA and Korea-ASEAN, the growing trend of post-verifications was restricted and there was no active research concerning this; whereas with Korea-EU FTA which adopted indirect verification for post-verification, the demand for post-verification has been rising constantly each year; and for Korea-US FTA which has adopted direct verification, a new approach to post-verification research is needed as it began genuine post-verification regarding many national enterprises only after a year and a half since the agreement. This study will consider the counter measures that can be taken for post-verification, through case of studies on the factors influencing violation of determining the country of origin for export company regarding verification of FTA. Result of this case study regarding the determining a violation of origin, The main cause of the violation factors on the essential & general principles(goods wholly obtained, value added criteria) are lack of understanding agreement & manpower. but Violation of the parties to a transaction & the origin certification are lack of advanced preparation and effected violation of principle of good faith. Finally, In this study help countermeasures of export company through the Detailed analysis of the type & implications deriving from verification of origin.

  • PDF

A Study on the Efficient Compliance Method for Airworthiness Certification in the field of Flying Qualities of Military Aircraft (군용항공기 비행성 분야의 효율적인 감항인증 입증방법에 대한 고찰)

  • Kang, Myungsoo;Kim, Chong-sup;Koh, GiOk;Lim, Sang-soo;Kim, Byoung soo
    • Journal of Aerospace System Engineering
    • /
    • v.16 no.4
    • /
    • pp.95-108
    • /
    • 2022
  • Airworthiness certification is critical, in ensuring the flight safety of military aircraft for development tests and production operations. The MIL-HDBK-516C, latest airworthiness certification document, handles the field of flying qualities in Chapter 6 (flight technology), and refers to specific chapters of MIL-STD-1797B, which is the specification document for developing military aircraft. Since the MIL-STD-1797B released in 2006 by the U.S. Department of Defense is not disclosed to other countries, the Chapter 6 (flight technology) of MIL-HDBK-516B Expanded, the former certification standards pursuant to flying qualities, has to be applied to military aircraft being developed in the Republic of Korea. However the requirements of Chapter 6 of MIL-HDBK-516B Expanded comprise unclear sentences, because of contents from various development specifications. Also, clarification is needed in that the same requirements have to be verified in different criteria. In this paper, the results of this study present an effective verification method, for acquiring the airworthiness certification in field of flying qualities based on MIL-HDBK-516B Expanded.

A Self-Authentication and Deniable Efficient Group Key Agreement Protocol for VANET

  • Han, Mu;Hua, Lei;Ma, Shidian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.7
    • /
    • pp.3678-3698
    • /
    • 2017
  • With the rapid development of vehicular ad hoc Network (VANET), it has gained significant popularity and received increasing attentions from both academics and industry communities in aspects of security and efficiency. To address the security and efficiency issues, a self-authentication and deniable efficient group key agreement protocol is proposed in this paper. The scheme establishes a group between road side units (RSUs) and vehicles by using self-authentication without certification authority, and improves certification efficiency by using group key (GK) transmission method. At the same time, to avoid the attacker attacking the legal vehicle by RSUs, we adopt deniable group key agreement method to negotiation session key (sk) and use it to transmit GK between RSUs. In addition, vehicles not only broadcast messages to other vehicles, but also communicate with other members in the same group. Therefore, group communication is necessary in VANET. Finally, the performance analysis shows superiority of our scheme in security problems, meanwhile the verification delay, transmission overheard and message delay get significant improvement than other related schemes.