• Title/Summary/Keyword: authorization system

Search Result 240, Processing Time 0.026 seconds

Design and Implementation of USIM Security Module for the Wireless Network Interworking (무선 네트워크 연동을 위한 USIM 보안 모듈 설계 및 구현)

  • Kim, Choon-Soo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.2
    • /
    • pp.41-49
    • /
    • 2007
  • USIM(UMTS Subscriber Identity Module) technology that accept 3GPP(3rd Generation Partnership Project) standards for information security supports security function in 3GPP. Supported security functions of USIM are confidentiality of user identity, mutual authentication and key agreement between end user and network, confidentiality of user data and data integrity. It is very important technology in wireless network. It makes secure environment that user and service provider can use securely mobile service in network. In this paper, design and implementation USIM security module that supports common network access method and authentication protocol in 3GPP and WLAN(Wireless LAN) and AAA (3A-Authentication Authorization Accounting) server system based RADIUS.

Attribute Certificate Profile Research (속성인증서 프로화일 연구)

  • 윤이중;류재철
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.5
    • /
    • pp.75-84
    • /
    • 2001
  • Existent public key certificates provide authentication information through some information on user\`s public key. However, an attribute certificate which stores and manage user\`s attribute information, provides various privilege information such as position, privilege and role. In recent, international organizations establishes standards on attribute certificate, and the researches and developments on attribute certificate have been widely made. In addition it may be expected to be used many real application area requiring for authorization information as well as authentication information. Therefore, this paper considers background and standardization trends of attribute certificate and describes the profile and related techniques of attribute certificate currently established by IETF. In addition, it introduces and access control system using attribute certificate and specifies applications of attribute certificate.

A Study on Security Enhancement for the Use and Improvement of Blockchain Technology (보안성 강화를 위한 블록체인기술의 활용과 개선방안 연구)

  • Seung Jae Yoo
    • Convergence Security Journal
    • /
    • v.23 no.1
    • /
    • pp.63-68
    • /
    • 2023
  • In this study, in relation to blockchain protocol and network security, we study the configuration of blockchain and encryption key management methods on smart contracts so that we can have a strong level of response to MITM attacks and DoS/DDoS attacks. It is expected that the use of blockchain technology with enhanced security can be activated through respond to data security threats such as MITM through encryption communication protocols and enhanced authentication, node load balancing and distributed DDoS attack response, secure coding and vulnerability scanning, strengthen smart contract security with secure consensus algorithms, access control and authentication through enhanced user authentication and authorization, strengthen the security of cores and nodes, and monitoring system to update other blockchain protocols and enhance security.

Development of Information Sharing and Management System for Closed User Group (폐쇄 사용자 그룹을 위한 정보공유 관리 시스템의 개발)

  • Huh, Mi-Young;Hyun, Wook;Kang, Shin-Gak
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2000.10a
    • /
    • pp.324-327
    • /
    • 2000
  • There are developing the World Wide Web systems for their information sharing among certain closed user group. These systems are required five common functions as follows. First, they have to support the web service for Internet users to access easily. Second, Hey have to support the authorization service to confirm the allowed users. Third, they have to support the database service to manage the sharing information among users. Fourth, they have to support the bulletin board service for closed users to discuss. Fifth, they have to support the e-mail service to send e-mail to the certain user subset and mail archive service to save and manage the previous mail information. In this paper, we described the detail function and processing procedure of our implemente system under LINUX operating system. In addition, we described problems occurring in implementation and their solutions.

  • PDF

A Study on the traffic signal system based on Visible Light Communication (가시광 통신 기반의 교통 및 신호 시스템에 관한 연구)

  • Geum, Dong-Woo;Kwon, Kyung-Dong;Chae, Yun-Chang;Hwang, Ji-Young;Kim, Cheol-Min;Kim, So-Yong;Koh, Seok-Joo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.05a
    • /
    • pp.668-670
    • /
    • 2018
  • Recently, VLC(Visible Light Communication), which is a technology to communicate wirelessly by carrying information in lights based on LED, is getting attention. If we use the VCL, we don't need to receive authorization because it uses the existing industrial infrastructure(LED infrastructure) and frequency band together and there is the little possibility of interference and it has a high level of security by removing visible light in a portion where data transfer is not required. These are the advantage of VCL. In this paper, we study the traffic and signal system based on Visible Light Communication with consideration for these advantages.

  • PDF

A Study on the Construction of Charging System for Small Electric Vehicles Less than 1 [kW] (1[kW] 이하의 소형 전동차량용 충전설비 구축에 관한 연구)

  • Kim, Keunsik
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.12
    • /
    • pp.93-99
    • /
    • 2019
  • Small electric vehicles, such as electric bicycles or electric kickboards, operate with the power charged in a battery mounted in the vehicle, and some of these users use emergency power sockets installed in apartments or public facilities without getting permission. For this reason, the necessity for a simple method to approve the use of power with instant payment system rises for the building managers and small vehicle users as well. In this paper, we propose a technique to charge batteries for small electric vehicles with less than 1 [kW] through a power supply control device installed on the existing 15 [A]. sockets on the common residential properties or public buildings. It also describes the power user authorization algorithm and how to charge fees for the power used. As a result of this research, this paper shows how the user authentication power supply system with the effect of preventing power theft can be realized by creating an environment in which a battery in a small electric vehicle can be easily charged.

Advanced WLAN Authentication Mechanism using One-time Session Key based on the Vulnerability Analysis in Nespot Wireless Lan System (Nespot 무선랜 사용자 인증 취약점 분석 및 일회용 세션키 기반 무선랜 인증 기법)

  • Lee, Hyung-Woo
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.8
    • /
    • pp.1101-1110
    • /
    • 2008
  • Nespot provides a convenient wireless internet connection service. The existing IEEE 802.1X EAP-MD5 authentication mechanism can be achieved based on ID/password information for a wireless connection. The Nespot system offers an advanced accounting and authorization procedure for providing wireless user authentication mechanism. However, many problems were found on the existing Nespot EAP-MD5 mechanism such as a ill value exposure, a leakage of personal information on wireless authentication procedure and a weakness on Nespot mutual authentication mechanism. Therefore, we analyzed the limitation of the existing IEEE 802.1X EAP-MD5 certification system, and suggested a one-time session key based authentication mechanism. And then we offered a simplified encryption function on the Nespot certification process for providing secure mutual authentication process.

  • PDF

A study on User Authentication Technology of Numeric based Pattern Password (숫자기반의 패턴 형식 패스워드 사용자인증 기술)

  • Ju, Seung-Hwan;Seo, Hee-Suk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.9
    • /
    • pp.65-73
    • /
    • 2012
  • The traditional text-based password is vulnerable guessing, dictionary attacks, keyloggers, social engineering, stole view, etc. these vulnerability effect more serious problem in a mobile environment. In this study, By using the pattern number to enter the password of an existing four-digit numeric password, User easily use to new password system. The technology on pattern based numerical password authorization proposed in this paper would intensify the security of password which holds existing 10 numbers of cases by authorizing a user and would not invade convenience of use by providing high security and making users memorize only four numbers like old method. Making users not have inconvenience and raising complexity, it would have a strength to an shoulder surfing attack of an attacker. So I study password system that represents the shape-based of number. I propose the new password system to prevent peeking attacks and Brute-force attack, and this proposal is to review the security and usability.

A study on development of qualification item of e-Learning instructional designer (e-Learning 교수설계자 자격종목 개발 연구)

  • Rha, Hyeon-Mi;Chang, Hea-Jung;Chung, Ran
    • Journal of The Korean Association of Information Education
    • /
    • v.13 no.2
    • /
    • pp.169-182
    • /
    • 2009
  • The purpose of this paper is to develop the qualification system of instructional designer in e-Learning field in order to provide e-learning experts for industry. The shortage of human resources is a serious problem in the e-learning industry. The following set of objectives were formulated to fulfill the study purpose. First, analyze the present situations and suggestions of the e-learning expert. Second, to analyze current states of private qualification administration/qualification administration authorization in e-learning field. Third, analyze the needs of universities and companies in e-learning qualification administration. Finally, based on the above three objectives, the study developed the practical qualification system, job analysis, methods and questions for an examination of e-learning instructional designer.

  • PDF

A Study on U-Drawing Information System Based on Risk Assessment (위험성 평가 기반의 U-도면정보 시스템에 관한 연구)

  • Ko, Jae-Wook;Yoo, Jin-Hwan;Lee, Heon-Seok
    • Journal of the Korean Institute of Gas
    • /
    • v.11 no.2 s.35
    • /
    • pp.71-77
    • /
    • 2007
  • This research proposes the U-drawing information system (U-DIS) based on risk assessment. One of the most outstanding features of U-DIS is to perform the Quantitative Risk Assessment directly on the screen utilizing the Process Information. U-DIS revolutionizes the existing way to do a risk assessment and helps finding information more efficiently and simply. It is designed to open all CAD drawing files on the web-based environment without having the CAD S/W installed on the PC. The U terminal platform in U-DIS supports IPv6 and wireless broadband network and U-DIS can be accessible through a sensor or personal authorization. This results in providing a systematic safety enhancement tool considering not only the operation of the process but also its risk level in the equipment industry. Additionally to aid the decision making process it offers comprehensive and thorough information based on engineering technical theory.

  • PDF