• Title/Summary/Keyword: aAuthentication

Search Result 3,431, Processing Time 0.041 seconds

Design of Interoperable DRM System in Home Domain (상호 호환성을 위한 홈 도메인 DRM 설계)

  • Moon, Ju-Young
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.12
    • /
    • pp.117-123
    • /
    • 2010
  • In this paper, we proposed the interoperable DRM(Digital Rights Management) system that allows to redistribute contents safely based on home domain. We tried to solve the problem about contents redistribution between devices under different DRM regime so that we suggested a interoperable DRM system that allow end users to redistribute contents within home domain can solve the restriction and the inconvenience occuring in using contents and at the same time protect the right of contents producer and provider as well. In order that end users can use freely their contents using home digital device without additional payment, we must build a home domain for interoperable DRM system for contents redistribution among devices. If both of exporting device and importing device are authenticated in home domain by HADM(Home Authorized Domain Manager), then the exporting device can redistribute packaged contents under importing DRM regime to the importing device by DIM(DRM Interoperability Manager).

A Study on Design of the Curation System of Instructional Materials for Reusing and Sharing (재사용과 공유를 위한 수업 자료 큐레이션 시스템 기능에 대한 연구)

  • Park, Yang-Ha;Moon, Sung-Been
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.49 no.2
    • /
    • pp.135-168
    • /
    • 2015
  • This study intends to design a curation system to support elementary and secondary schools for reusing and sharing instructional materials efficiently. It is proved through interviewing teachers at the chalkface that they utilize instructional materials, and there are some differences between elementary schools and secondary schools about the media for creating the instructional materials, and the purpose of using them. The functional requirements of curation system for reusing and sharing instructional materials are derived from questionnaires. The investigation of the existing curation systems was conducted to identify the strategies for policy, design, standard, and tools for effective operation of the digital curation system. The tasks and the functions of the curation system designed by reflecting the results of this study are as following. The tasks related to individual workspace include 'authentication', 'system configuration', 'registration' of created materials, 'material keeping' for the individual, and 'reusing (editing)'. The tasks related to sharing workspace contain 'receiving' for sharing, 'archiving' for accessing, 'peer evaluation', 'accessing' through the retrieval, and 'bulletin board'.

Design of the Certificate-based Authorization Policy Module in a PKI Environment (PKI 환경에서 인증서 기반 권한 정책 모듈 설계)

  • Shin, Myeong-Sook;Song, Gi-Beom;Lee, Jeong-Gi;Lee, Cheol-Seung;Lee, Joon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.898-901
    • /
    • 2005
  • In this paper, we design an authorization policy module which provides the safty and reliable authorization of the user to provide the resolution for authorization in distributed environments. PKI have been utilized much by an information security-based structure for Internet electronic commerce, it is developing X.509-based in various application field such as a network security. Especially, it provides good resolution for the authentication of the user in the situation not to meet each other, but it is not enough to provide the resolution of the authorization in distributed computing environments. In this paper, We provide AAS model, which can be used distributed resources by distributed users, and design AAS model which is an authorization policy module in the Linux-based Apache Web server.

  • PDF

A study on Password Input Method to Protect Keyboard hooking (Keyboard hooking 방지를 위한 패스워드 입력 방법 연구)

  • Kang, Seung-Gu;Kwak, Jin-Suk;Lee, Young-Sil;Lee, Hoon-Jae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.241-244
    • /
    • 2011
  • Recently, Due to development of Internet techniques, user suddenly increased that Used of Web services and with out constraints of place and time has been provided. typically, Web services used ID/Password authentication. User confirmed personal data Stored on Web servers after user authorized. web service provider is to provide variety security techniques for the protection personal information. However, recently accident has happened is the malicious attackers may capture user information such as users entered personal information through new keyboard hooking. In this paper, we propose a keyboard hooking protected password input method using CAPTCHA. The proposed password input method is based on entering the password using mouse click or touch pad on the CAPTCHA image. The mapping of CAPTCHA image pixels is random.

  • PDF

ElggSpace: Extension of Elgg SNS for Supporting Collaborative Workspace (ElggSpace: 협업 워크스페이스를 지원하는 Elgg SNS의 확장)

  • Cha, Won-Jun;Park, Jongmoon;Lee, Myung-Joon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.3
    • /
    • pp.631-637
    • /
    • 2014
  • Recently, SNS is widely used for various purposes such as fast decision making or effective business process in educational institutions or enterprise as well as general services for social networking. Unfortunately, all of existing general SNS platforms do not provide user groups with workspaces for sharing information in a hierarchical way, nor support the functionality of workspace backup for migrations. In this paper, we present a collaborative workspace environment named ElggSpace which extends the Elgg SNS platform with the C3ware collaborative middleware. With the help of C3ware, ElggSpace systematically supports collaborative workspaces that enable user groups to share massive resource in cloud storages. In addition, ElggSpace allows high-level access controls for resources management and the functionality of resource backup, supporting effective collaboration.

RFID Tag Ownership Relocation Protocol Based on Trusted Third Party (신뢰받는 제3자 기반의 RFID 태그 소유권 이전 프로토콜)

  • Kim, Young-Sik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.3
    • /
    • pp.568-574
    • /
    • 2015
  • Recently RFID not only is widely utilized in various fields such as inventory management, merchandize logistics, etc., but also, has evolved as an important component of the Internet of Things (IoT). According to increasing the utilization field of RIFD, studies for security and privacy for RFID system have been made diverse. Among them, the ownership transfer protocols for RFID tags have also been proposed in connection with the purchase of products embedded with RFID tag. Recently, Kapoor and Piramuthu proposed a RFID ownership transfer protocol to solve the problems of security weakness of the previous RFID ownership transfer protocols. In this paper, we show that Kapoor-Piramuthu's protocol also has security problems and provide a new protocol to resolve them. Security analysis of newly proposed protocol shows the security concerns are resolved.

A Study on Performance Evaluation and Security Measures of U-IT Electrical Safety Integrated Management System's Module (U-IT 전기안전통합관리시스템의 모듈별 성능평가와 보안방법 연구)

  • Park, Dea-Woo;Choi, Choung-Moon;Kim, Eung-Sik
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.307-310
    • /
    • 2010
  • Ubiquitous society to build basic infrastructure in the power supply and power equipment safety is important. U-City in order to prevent the disaster of U-IT Power Equipment Performance Module and the security for the safety of the U-City is necessary. In this paper, the power unit of U-IT module, temperature sensor, humidity sensor, equipped with sensors arranged throughout the fire, and home distribution boards, Home Network Wall-Pad, Blocker, MPNP black boxes, arc detection, arc safety equipment, outlet of the modular performance evaluation and security measures will be studied. U-IT power devices and sensors to analyze the information conveyed by proactive risk and ensure safety, access control, authentication, security safeguards, such as U-IT integrated management system for electrical safety and strengthen the security, safety and security with a U-City will contribute to the construction and operation.

  • PDF

Vulnerability Analysis of Bluetooth Communication based on GNU Radio (GNU Radio 기반 블루투스 통신 취약점 분석)

  • Kim, Tae-Yong;Lee, Hoon-Jae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.11
    • /
    • pp.2014-2020
    • /
    • 2016
  • In general, automatic access control management system using smart door-lock must be always exposed to security vulnerability during wireless communication based on Bluetooth. In particular, important information such as a secrete key can be exposed to the attacker when the authentication protocol has been operating in the wireless section. Therefore important information exchanged in the radio section needs to be properly encrypted. In order to analyze security vulnerability for automatic access control management system of public facilities such as subway vent, GNU Radio platform and HackRF device will be considered and experimented. Proposed experimental system to perform software based power analysis attack could be very effectively applied. As a result, important information such as packet type, CRC, length of data, and data value can be easily decoded from wireless packet obtained from HackRF device on GNU Radio platform. Constructed experimental system will be applied to avoid some security problems.

Design and Implementation of a Secure E-Mail System using Elliptic Curve Cryptosystem (타원곡선 암호 시스템을 이용한 보안 메일 시스템의 설계 및 구현)

  • Lee, Won-Goo;Kim, Sung-Jun;Lee, Hee-Gyu;Mun, Ki-Young;Lee, Jae-Kwang
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.4
    • /
    • pp.333-345
    • /
    • 2002
  • As computers and networks become popular, distributing information on the Internet is common in our daily life. Also, the explosion of the Internet, of wireless digital communication and data exchange on Internet has rapidly changed the way we connect with other people. But secure mail is gaining popularity abroad and domestically because of their nature of providing security. That is. It has been used a variety of fields such as general mail and e-mail for advertisement. But, As the data transmitted on network can be easily opened or forged with simple operations. Most of existing e-mail system don't have any security on the transmitted information. Thus, security mail system need to provide security including message encryption, content integrity, message origin authentication, and non-repudiation. In this paper, we design and implement secure mail system with secure key agreement algorithm, non-repudiation service, and encryption capability to provide services for certification of delivery and certification of content as well as the basic security services.

A study on the method of the personnel recording of DHRMIS (국방인사정보체계의 인사기록방법에 관한 연구)

  • Cho, Young-Pyong;Yang, Hae-Sool
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.13 no.2
    • /
    • pp.88-99
    • /
    • 2008
  • In this article, DHRMIS being developed with ERP at resent realizes the personnel affairs recording procedures that all the Ministry of National Defense, the army, the navy and the air force can use on personnel affairs in order to solve the problem of the personnel recording procedures of the MND and each of the troops such as using manual affairs together with computation affairs, absence of electronic recording managements in some of the institutions MND, insufficiency of real time recording, and excess of centralized managements to present and record the personnel data. The personnel recording procedures consist of standardized personnel recording procedures and definition of the personnel recording procedures. This personnel recording procedures propose 3 improvements such as an atomic electronic recording management, a real time recording affair, effective centralization and distribution of verification authority so as to guarantee authentication, integrity, reliance, and accessibility of personnel data. When proposed personnel recording procedures are realized through developing DHRMS, these can bring on unification of 10 recording management systems, reduction of recording management time from 45 days to 3 days, distribution of verification authority MND, each of the troops, each of the institutes, an individual, and reduction of some of the manual documents.

  • PDF