• Title/Summary/Keyword: authorization system

Search Result 240, Processing Time 0.023 seconds

Design and Implementation of the Specialized Business-Work Management System(WMS) Using Mobile App and GPS (모바일 앱과 GPS를 이용한 특화된 근무관리시스템(WMS) 설계 및 구현에 대한 연구)

  • Koo, MinJeong;Yoon, KyungBae;Ko, ChangBae
    • Journal of Digital Convergence
    • /
    • v.11 no.8
    • /
    • pp.359-365
    • /
    • 2013
  • Companies recently tend to move their business sites to a customer-centered location and the work place is changed from specific time and place to a working environment of anytime and anywhere the job can be done. Therefore, the design and implementation of business-work management system using mobile applications has been actively researched. In this study, the business-work management system, a mobile application using GPS, is immediately transmitted to ERP system and is stored into a company's formula DB, at such sites outside the company as business trip destinations, training institutions, and outside meetings, through smartphone-based GPS location information using WiFi, 3G, LTE, or 4G. In this way, it is aimed to design and develop the mobile application system to obtain rapid authorization in connection with electro nic document approval system. Also, this study is to measure the system's productivity and expected effects through the users' survey results by actual application of the designed and developed system to companies.

Development of Secure Entrance System using AOP and Design Pattern (관점지향 소프트웨어 개발 방법론과 디자인 패턴을 적용한 출입 보안 시스템 개발)

  • Kim, Tae-Ho;Cheon, Hyeon-Jae;Lee, Hong-Chul
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.3
    • /
    • pp.943-950
    • /
    • 2010
  • A secure entrance system is complicated because it should have various functions like monitoring, logging, tracing, authentication, authorization, staff locating, managing staff enter-and-leave, and gate control. In this paper, we built and applied a secure entrance system for a domestic nuclear plant using Aspect Oriented Programming(AOP) and design pattern. Using AOP has an advantage of clearly distinguishing the role for each functional module because building a system separated independently from the system's business logic and security logic is possible. It can manage system alternation flexibility by frequent change of external environment, building a more flexible system based on increased code reuse, efficient functioning is possible which is an original advantage of AOP. Using design pattern enables to design by structuring the complicated problems that arise in general software development. Therefore, the safety of the system can also be guaranteed.

Design of Face Recognition System for Authentication of Internet Banking User (인터넷 뱅킹의 사용자 인증을 위한 얼굴인식 시스템의 설계)

  • 배경율
    • Journal of Intelligence and Information Systems
    • /
    • v.9 no.3
    • /
    • pp.193-205
    • /
    • 2003
  • In this paper, we suggest user authentication and authorization system for internet banking by face recognition. The system is one of Biometrics technology to verify and authorize personnel identification and is more unobtrusive than the other technologies, because they use physiological characteristics such as fingerprint, hand geometry, iris to their system that people have to touch it. Also, the face recognition system requires only a few devices such as a camera and keypad, so it is easy to apply it to the real world. The face recognition algorithms open to the public are separated by their analysis method differ from what characteristic of the human face use. There are PCA (principal Component Analysis), ICA (Independent Component Analysis), FDA (Fisher Discriminant Analysis). Among these, physiological data of encrypted form is translated utilizing PCA which is the most fundamental algorithm that analyze face feature, and we suggests design method of user authentication system that can do send-receive fast and exactly.

  • PDF

A Study on Improvement in Quality System Evaluation for Production Approval of Aircraft and Parts (항공기 및 부품 생산승인을 위한 품질시스템 평가기준 개선 연구)

  • Kang-Yi Lee;Jae-Hoon Han;Jung-Sam Lee
    • Journal of Aerospace System Engineering
    • /
    • v.17 no.6
    • /
    • pp.118-126
    • /
    • 2023
  • Most of the aerospace industries establish the SAE AS9100 Quality Management System, and acquire commercial certification by the 3rd party. Nevertheless, they repeatably have to cope with similar quality system evaluation by the airworthiness authority for the production certificate, parts manufacturer approval, and technical standard order authorization in accordance with the applicable regulations. The current quality system evaluation criteria of the airworthiness authority could be recommended for reforms in order to reduce duplication and correspond to the industrial development and environmental changes. In this paper, we propose measures to reform the authority's evaluation criteria through comparative analysis among the IAQG SAE AS9100, the FAA quality system codes, and the MOLIT ACSEP requirements.

Design of User Access Authentication and Authorization System for VoIP Service (사용자 접근권한 인증을 이용한 안전한 VoIP 시스템 설계)

  • Yang, Ho-Kyung;Kim, Jin-Mook;Ryou, Hwang-Bin;Park, Choon-Sik
    • Convergence Security Journal
    • /
    • v.8 no.4
    • /
    • pp.41-49
    • /
    • 2008
  • VoIP is a service that changes the analogue audio signal into a digital signal and then transfers the audio information to the users after configuring it as a packet; and it has an advantage of lower price than the existing voice call service and better extensibility. However, VoIP service has a system structure that, compared to the existing PSTN (Public Switched Telephone Network), has poor call quality and is vulnerable in the security aspect. To make up these problems, TLS service was introduced to enhance the security. In practical system, however, since QoS problem occurs, it is necessary to develop the VoIP security system that can satisfy QoS at the same time in the security aspect. In this paper, a user authentication VoIP system that can provide a service according to the security and the user through providing a differential service according to the approach of the users by adding AA server at the step of configuring the existing VoIP session is suggested. It was found that the proposed system of this study provides a quicker QoS than the TLS-added system at a similar level of security. Also, it is able to provide a variety of additional services by the different users.

  • PDF

Blockchain-Based Access Control Audit System for Next Generation Learning Management (차세대학습관리를 위한 블록체인 기반의 접근제어 감사시스템)

  • Chun, Ji Young;Noh, Geontae
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.9 no.11
    • /
    • pp.351-356
    • /
    • 2020
  • With the spread of COVID-19 infections, the need for next-generation learning management system for undact education is rapidly increasing, and the Ministry of Education is planning future education through the establishment of fourth-generation NEIS. If the fourth-generation NEIS System is well utilized, there are advantages such as providing personalized education services and activating the use of educational data, but a solution to the illegal access problem in an access control environment where strict authorization is difficult due to various user rights. In this paper, we propose a blockchain-based access control audit system for next-generation learning management. Sensitive personal information is encrypted and stored using the proposed system, and when the auditor performs an audit later, a secret key for decryption is issued to ensure auditing. In addition, in order to prevent modification and deletion of stored log information, log information was stored in the blockchain to ensure stability. In this paper, a hierarchical ID-based encryption and a private blockchain are used so that higher-level institutions such as the Ministry of Education can hierarchically manage the access rights of each institution.

A Study on the Security Vulnerability for Android Operating System (안드로이드 운영체제의 보안 취약점에 관한 연구)

  • Cho, Hee-Hoon;Kim, Jong-Bae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.224-226
    • /
    • 2015
  • Recently, Android-based mobile devices has increased. Thus increasing market share of the Android operating system. However, in the case of the Android operating system, it has the relatively large number of security vulnerabilities Unlike other closed operating systems. Most Android application requires the identity of the mobile device or over-authorization approval. This information can be a security threat. In addition, in the event of a security problem because obtaining the user's consent during the installation of the application is the user responsible. If these problems persist, loss of reliability of the user operating system, as well as to feel a resistance when using an Android application. In this paper, we investigate a security vulnerability in the Android operating system, and proposed countermeasures.

  • PDF

Signal Interlocking System of a Programmable Logic Controller Improvement Report (신호보안설비 전자연동장치(PLC) 개선 관련 보고)

  • Seok, Tae-Woo;Ko, Yang-Og;Yoo, Do-Gyun
    • Proceedings of the KSR Conference
    • /
    • 2007.11a
    • /
    • pp.623-628
    • /
    • 2007
  • Metro Subway System is widely known as the leader of public transportation in a metropolitan area. The signal interlocking is one of the most important organs that plays a major role in the system. By improving the quality of signal interlocking on of the traffic system and keeping its maintenance on a high level will not only repair the current state, but it will also let the PLC(Programmable Logic Controller). The Non-Vital relay of No. 3, 4 Line are the most one of the unstable system, device, which underwent a process of fine manufacture establishment and a close examination, obtained as a new device. Utilizing the equipment with cautious preservation on the system will enhance the current state of the signal device. Especially, the test for improvement and development based upon the technique that decreases the frequency of defect produced will further precipitate its efficiency. With authorization of imposing the newly made equipment will bring improvement to the signal technology and to the industry at largest extent.

  • PDF

Case Study on Certification System of Parts Repair for Commercial Aircraft Engine (상용항공기 엔진부품 수리 인증체계에 관한 사례연구)

  • Chang-Tak Lee
    • Journal of Aerospace System Engineering
    • /
    • v.17 no.4
    • /
    • pp.95-103
    • /
    • 2023
  • Aircraft engine parts repair is a field belonging to the lowest level in the hierarchy of the aircraft industry, and it is marginalized in terms of research, compared to aircraft manufacturing or maintenance that belong to the upper level. On the other hand, in 2019, Korean Air's Powerplant Maintenance Center paid USD $130 million to foreign countries for engine parts repair, making it an industry with great need for localization. To achieve the goal of localizing engine parts repair, a certification system is needed that can perform independent repairs based on the development of repair technology, aligning contractual relationships with engine manufacturers, and free from dependence on engine manufacturers or foreign repair companies. The purpose of this study is to provide a basis for subsequent research to secure an actual certification system by suggesting the need for securing such a certification system.

Designing Password Input System Resistant on Shoulder Surfing Attack with Statistical Analysis (Shoulder Surfing 공격을 고려한 패스워드 입력 시스템 구현 및 통계적 검증)

  • Lim, Soo Min;Kim, Hyoung Joong;Kim, Seong Kee
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.49 no.9
    • /
    • pp.215-224
    • /
    • 2012
  • Using password on system is easy to build and shorten the access time to authorize user, which is high in use for vary system that requires users' authorization. Many input device are able to perform the password system easily, such as PC, smart-phone, tablet PC, etc. Beside the high usability of password, physical attack occurs when user put their password on the device, known as Shoulder Surfing attack. It used to be formed in numbers, characters or mix of different kinds, but new kind of password arose. Exploiting image or making scenarios are those kinds which are able to reflect users' intentions. Not many estimation exists for new password, so there's need to be standard for those new password for highlighting usability and accessability. In this paper, we propose password system with simple image and switching key-board to test statistical method to estimate usability on the password.