• Title/Summary/Keyword: aAuthentication

Search Result 3,417, Processing Time 0.032 seconds

A Study on the Korea Smart City Certification Index and Demonstration Authentication (국내 스마트시티 인증 지표 및 시범 인증에 관한 연구)

  • Han, Sun-Hee;Shin, Young-Seob;Yu, In-Jae;Lee, Jae-Yong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.1
    • /
    • pp.688-698
    • /
    • 2018
  • The government has recognized the importance of smart city indicators and prepared the legal grounds for the certification of smart cities in the recently revised "Act on Smart City Development and Industrial Promotion." This study derived smart city indicators adequate for the domestic conditions and compatible with the overseas trends by examining and complementing the indicators through an AHP analysis based on consultations and interviews (surveys) with experts and local government officials, who are actually carrying out related projects. In addition, the adequacy and reliability of the indicators were confirmed by verifying and certifying the Korean local governments' smart city plans through demand surveys on a trial basis. This study is meaningful in that it systematically studies the smart city indicators that have gained in importance and reviews their application. The findings of this study can be used as a basis for implementing a smart cities certification system in the future. Recently, the Special Committee on Smart Cities was established under the Committee for the Fourth Industrial Revolution. This committee is composed of civilian members and is working with the Ministry of Land, Infrastructure, and Transport, the Ministry of Science and ICT, etc., to promote the creation of smart cities. It is expected that smart city indicators that include the levels of both domestic and overseas smart cities will boost the active spread of such cities in Korea.

Characterizing a full spectrum of physico-chemical properties of (20S)-and (20R)-ginsenoside Rg3 to be proposed as standard reference materials

  • Kim, Il-Woung;Sun, Won Suk;Yun, Bong-Sik;Kim, Na-Ri;Min, Dongsun;Kim, Si-Kwan
    • Journal of Ginseng Research
    • /
    • v.37 no.1
    • /
    • pp.124-134
    • /
    • 2013
  • The authentication of the physico-chemical properties of ginsenosides reference materials as well as qualitative and quantitative batch analytical data based on validated analytical procedures is a prerequisite for certifying good manufacturing practice (GMP). Ginsenoside Rb1 and Rg1, representing protopanaxadiol and protopanaxatriol ginsenosides, respectively, are accepted as marker substances in quality control standards worldwide. However, the current analytical methods for these two compounds recommended by Korean, Chinese, European, and Japanese pharmacopoeia do not apply to red ginseng preparations, particularly the extract, because of the relatively low content of the two agents in red ginseng compared to white ginseng. In manufacturing fresh ginseng into red ginseng products, ginseng roots are exposed to a high temperature for many hours, and the naturally occurring ginsenoside Rb1 and Rg1 are converted to artifact ginsenosides such as Rg3, Rg5, Rh1, and Rh2 during the heating process. The analysis of ginsenosides in commercially available ginseng products in Korea led us to propose the inclusion of the (20S)- and (20R)-ginsenoside Rg3, including ginsenoside Rb1 and Rg1, as additional reference materials for ginseng preparations. (20S)- and (20R)-ginsenoside Rg3 were isolated by Diaion HP-20 adsorption chromatography, silica gel flash chromatography, recrystallization, and preparative HPLC. HPLC fractions corresponding to those two ginsenosides were recrystallized in appropriate solvents for the analysis of physico-chemical properties. Documentation of those isolated ginsenosides was achieved according to the method proposed by Gaedcke and Steinhoff. The ginsenosides were subjected to analyses of their general characteristics, identification, purity, content quantification, and mass balance tests. The isolated ginsenosides showed 100% purity when determined by the three HPLC systems. Also, the water content was found to be 0.534% for (20S)-Rg3 and 0.920% for (20R)-Rg3, meaning that the net mass balances for (20S)-Rg3 and (20R)-Rg3 were 99.466% and 99.080%, respectively. From these results, we could assess and propose a full spectrum of physico-chemical properties of (20S)- and (20R)-ginsenoside Rg3 as standard reference materials for GMP-based quality control.

A Study on Web Accessibility Evaluation of Public Agency Homepage (공공기관 홈페이지의 웹 접근성 평가에 대한 연구)

  • Kim, Hye-ri;Lee, Sang-joon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.4
    • /
    • pp.19-25
    • /
    • 2017
  • In the reality that the use of the web is becoming commonplace, the general people are complaining about the inconvenience because they are not standardized when using the web site. Especially, the disabled people such as the social underprivileged classes people suffer from the inconvenience due to the web site that is not accessible. The purpose of this study is to conduct an authentication audit to obtain web accessibility certification mark on the homepage of a specific public institution. Through these practical cases, it is possible to improve the recognition of web accessibility by practitioners or managers, And suggest ways to improve the Aging existing public institution web sites. Although there are a lot of existing literature and previous researches, it is still not being newly produced because of lack of awareness of web accessibility, As a result, the users who access the web site of the public institution for the first time are much inconvenienced. In order to solve this problem, this paper compares the Korean web content accessibility guideline 2.1, revised in April 2015, and verified the effectiveness of the guidelines through web accessibility evaluation of specific public institution sites.

A Study on the Automated Compatibility Standard Test System for eBook DRM (전자책 DRM을 위한 자동화된 표준정합성 검사 시스템에 관한 연구)

  • Kim, Tae-Hyun;Kang, Ho-Gap;Ahn, Chang-Ju;Cho, Seong-Hwan
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.2
    • /
    • pp.127-136
    • /
    • 2013
  • The study of the compatibility of EPUB DRM, granted by the Korea Copyright Commission, as a CT R & D project (Project Title: The Development of the standard reference software technology for International Standard EPUB-based eBook DRM) developed standards such as profile standards for encryption digital signature and authentication certificates and standards for technical terms of rights information. In 2012, these four standards have been established as the Korean Industrial Standards under the names of 'Encryption specification for EPUB DRM,' 'the Digital signature specification for EPUB DRM,' 'the Certificate specification for EPUB DRM,' and 'Definitions of Right Terms for EPUB DRM' through the ODPF(Open Digital Standardization Forum) and the TTA(Telecommunications Technology Association). The research project also proposed standards of ebook DRM license protocols in order for the four standards to practically apply to ebook DRM compatibility. It is necessary for technology standards to require a compatibility standard test process for testing whether implementations which were developed on the basis of the standard specification, comply with standards. This study suggests an automated compatible standard test method and a test model under the ebook DRM standard technical specification.

A Study on change from an RTU-based substation to IEC 6 1850-based SA substation (RTU 기반 변전소의 IEC 61850 기반 SA 변전소로의 전환에 대한 실증 연구)

  • Yuk, Sim-Bok;Lee, Sung-Hwan;Kim, Chong-il
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.4
    • /
    • pp.436-444
    • /
    • 2018
  • Currently, the new substation automation uses the international standard IEC 61850 communication protocol. KEPCO is also constructing a new substation based on IEC 61850 from 2013 through the pilot application and research and development starting from 2007. However, there are few cases where existing substations(Transformer, T/L GIS, D/L GIS, etc.) have been used, and RTU based substations operating systems have been changed to SA substations based on IEC 61850. Therefore, the introduction of IEC 61850 in existing substation facilities has the advantage of enhancing the substantiality of the substation by reusing existing facilities, improving the interoperability with the latest substations introduced, and converting existing substations into systems suitable for unmanned operation. In this paper, we introduce a case of changing the existing RTU based substation operation system to digital substation using IEC 61850 field information processor, Ethernet switch and SA operation system. Also, IEC 61850 client authentication program and Wireshark, which is a packet analysis tool, verify IEC 61850 conformance and its feasibility.

Vulnerability Analysis and Detection Mechanism against Denial of Sleep Attacks in Sensor Network based on IEEE 802.15.4 (IEEE 802.15.4기반 센서 네트워크에서 슬립거부 공격의 취약성 분석 및 탐지 메커니즘)

  • Kim, A-Reum;Kim, Mi-Hui;Chae, Ki-Joon
    • The KIPS Transactions:PartC
    • /
    • v.17C no.1
    • /
    • pp.1-14
    • /
    • 2010
  • IEEE 802.15.4[1] has been standardized for the physical layer and MAC layer of LR-PANs(Low Rate-Wireless Personal Area Networks) as a technology for operations with low power on sensor networks. The standardization is applied to the variety of applications in the shortrange wireless communication with limited output and performance, for example wireless sensor or virtual wire, but it includes vulnerabilities for various attacks because of the lack of security researches. In this paper, we analyze the vulnerabilities against the denial of sleep attacks on the MAC layer of IEEE 802.15.4, and propose a detection mechanism against it. In results, we analyzed the possibilities of denial of sleep attacks by the modification of superframe, the modification of CW(Contention Window), the process of channel scan or PAN association, and so on. Moreover, we comprehended that some of these attacks can mount even though the standardized security services such as encryption or authentication are performed. In addition to, we model for denial of sleep attacks by Beacon/Association Request messages, and propose a detection mechanism against them. This detection mechanism utilizes the management table consisting of the interval and node ID of request messages, and signal strength. In simulation results, we can show the effect of attacks, the detection possibility and performance superiorities of proposed mechanism.

Construction of DNA Profile Data Base of Strawberry Cultivars Using Microsatellite Markers (Microsatellite 마커를 이용한 딸기 품종의 DNA Profile Database 구축)

  • Hong, Jee-Hwa;Choi, Keun-Jin;Kwon, Yong-Sham
    • Horticultural Science & Technology
    • /
    • v.32 no.6
    • /
    • pp.853-863
    • /
    • 2014
  • This study was carried out to construct a DNA profile database of 100 strawberry cultivars using microsatellite markers. Two hundred seventy four microsatellite primer pairs were screened with a set of 21 strawberry cultivars with different morphological traits. Twenty five primer pairs were selected because they produced reliable and reproducible fingerprints. These primer pairs were used to develop DNA profiles of 100 strawberry cultivars. Three to thirteen alleles were detected by each marker with an average of 7.50. The average polymorphism information content varied from 0.331 to 841 (average 0.706). Cluster analysis showed that the 100 cultivars were divided into 7 major groups reflecting geographic origin and pedigree information. Moreover, most of the cultivars could be discriminated by marker genotypes. These markers will be useful as a tool for the protection of plant breeders' intellectual property rights in addition to providing the means to intervene seed disputes relating to variety authentication.

A Credit Card Sensing System based on Shared Key for Promoting Electronic Commerce (전자상거래 촉진을 위한 공유키 기반 신용카드 조회 시스템)

  • Jang, Si-Woong;Shin, Byoung-Chul;Kim, Yang-Kok
    • The KIPS Transactions:PartD
    • /
    • v.10D no.6
    • /
    • pp.1059-1066
    • /
    • 2003
  • In this paper, the magnetic sensing system is designed and implemented for the safe security in internet commerce system. When the payment is required inthe internet commerce system, the magnetic sensing system will get the information from a credit card without keyboard input and then encrypt and transmit the information to server. The credit card sensing system, which is proposed in this paper, is safe from keyboard hacking because it encrypts card information immediately in its internal chip and sends the information to host system. For the protection of information, the magnetic sensing system is basically based on a synchronous stream cipher cryptosystem which is related to a group of matrices. The size of matrices and the bits of keys for the best performances are determined for various cases. It is shown that for credit card payments. matrices of size 2 have good performance even at most 128bits keys with the consideration of inverse matrices. For authentication of general-purpose data, the magnetic sensing system needs more than 1.5KB data and in this case, the optimum size of matrices is 2 or 3 at more 256bits keys with consideration of inverse matrices.

Shoulder Surfing Attack Modeling and Security Analysis on Commercial Keypad Schemes (어깨너머공격 모델링 및 보안 키패드 취약점 분석)

  • Kim, Sung-Hwan;Park, Min-Su;Kim, Seung-Joo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1159-1174
    • /
    • 2014
  • As the use of smartphones and tablet PCs has exploded in recent years, there are many occasions where such devices are used for treating sensitive data such as financial transactions. Naturally, many types of attacks have evolved that target these devices. An attacker can capture a password by direct observation without using any skills in cracking. This is referred to as shoulder surfing and is one of the most effective methods. There has been only a crude definition of shoulder surfing. For example, the Common Evaluation Methodology(CEM) attack potential of Common Criteria (CC), an international standard, does not quantitatively express the strength of an authentication method against shoulder surfing. In this paper, we introduce a shoulder surfing risk calculation method supplements CC. Risk is calculated first by checking vulnerability conditions one by one and the method of the CC attack potential is applied for quantitative expression. We present a case study for security-enhanced QWERTY keyboard and numeric keypad input methods, and the commercially used mobile banking applications are analyzed for shoulder surfing risks.

(An HTTP-Based Application Layer Security Protocol for Wireless Internet Services) (무선 인터넷 서비스를 위한 HTTP 기반의 응용 계층 보안 프로토콜)

  • 이동근;김기조;임경식
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.3
    • /
    • pp.377-386
    • /
    • 2003
  • In this paper, we present an application layer protocol to support secure wireless Internet services, called Application Layer Security(ALS). The drawbacks of the two traditional approaches to secure wireless applications motivated the development of ALS. One is that in the conventional application-specific security protocol such as Secure HyperText Transfer Protocol(S-HTTP), security mechanism is included in the application itself. This gives a disadvantage that the security services are available only to that particular application. The other is that a separate protocol layer is inserted between the application and transport layers, as in the Secure Sockets Layer(SSL)/Transport Layer Security(TLS). In this case, all channel data are encrypted regardless of the specific application's requirements, resulting in much waste of network resources. To overcome these problems, ALS is proposed to be implemented on top of HTTP so that it is independent of the various transport layer protocols, and provides a common security interface with security applications so that it greatly improves the portability of security applications. In addition, since ALS takes advantages of well-known TLS mechanism, it eliminates the danger of malicious attack and provides applications with various security services such as authentication, confidentiality integrity and digital signature, and partial encryption. We conclude this paper with an example of applying ALS to the solution of end-to-end security in a present commercial wireless protocol stack, Wireless Application Protocol.