• Title/Summary/Keyword: certification authority

Search Result 150, Processing Time 0.027 seconds

Extended 3-Party Mutual Authentication Protocols for the Virtual Home Environment in Next Generation Mobile Networks (차세대 이동통신 네트워크의 Virtual Home Environment 구조에 적용 가능한 3자간 상호 인증 프로토콜)

  • Jeong, Jong-Min;Lee, Goo-Yeon;Lee, Yong
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.40 no.4
    • /
    • pp.22-29
    • /
    • 2003
  • In the virtual home environment (VHE), which was proposed to offer global roaming and personal service environment portability, user's profiles and service logics are conveyed from home network to visited network to provide services at the visited network. Because user's profiles and service logics may contain confidential information, some procedures for mutual authentication among entities for offering confidence are needed. For these issues, we propose and analyze three 3-Party mutual authentication Protocols adaptable to the VHE in 3G ; password based mutual authentication protocol, mutual authentication protocol with CHAP and key exchange and mutual authentication protocol with trusted third party.

A Study on The Mutually Authentication Mechanism for The Safe Electronic Signature (안전한 전자서명을 위한 상호인증 메커니즘에 관한 연구)

  • Choi, Sang-Wook;Chae, Cheol-Joo;Lee, Jae-Kwang
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.772-775
    • /
    • 2008
  • As the wireless communication technology developed, the Electric Commerce using a mobile was activated. WPKI was developed in order to guarantee the stability of the Electric Commerce but it is difficult to be ensured for the safe PKI service which is the same at the wire communication in the technical because of restriction of the mobile terminal. In this paper, we propose the authentication system for the electronic financial service which is safe and is effective in consideration of the restrictive characteristic of the mobile terminal. Moreover, the encryption algorithm for the safe electronic signature is proposed. In WPKI, this makes the cross certification of each certificate authority possible. Moreover, a stability was enhanced through the signature authentication using KCDSA and SEED algorithm.

  • PDF

A Credit Card based Payment Protocol Assuring End-to-End Security in Wireless Internet (무선인터넷에서의 종단간 보안을 제공하는 신용카드 기반의 지불 프로토콜)

  • 임수철;강상승;이병래;김태윤
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.6
    • /
    • pp.645-653
    • /
    • 2002
  • The WPP payment protocol uses the WAP protocol to enable credit card payment on the wireless internet. Since the security of the WAP protocol is based on the WTLS security protocol, there exists an end-to-end security weakness for the WPP payment protocol. This paper is suggesting a payment protocol, which is making use of the Public-Key Cryptosystem and the Mobile Gateway, so assuring end-to-end security independently of specific protocols. As the on-line certification authority is participating on the authentication process of the payment protocol, the suggested payment protocol enables wireless devices to get services from service providers on other domains.

Common Criteria of statistics using DEVS Modeling (DEVS 모델링을 이용한 보안제품 공동평가 통계)

  • Lee, Ki Sung;Kim, Tae Kyung;Seo, Hee Suk
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.2
    • /
    • pp.71-80
    • /
    • 2010
  • This thesis is purposed on developing security product co-evaluation statistics administrate program which is can administrate or analysis CC accreditation product using by DEVS modeling via portal site of member of CCRA. Via developing security product evaluation statistics administrate program, it can analysis the trend of all countries of the world in many ways, and noticed the ways of evaluation and accreditation of most countries via scheme analysis. Except this, it can analysis the situation of accreditation trend of any countries via data analysis of ICCC 2009. Also, For trend analysis to evaluation technique of CCRA member, it analyzed up to date technology and policy of the evaluation organization and the Certification Authority of most countries. And it peformed analysis the most trend of information security of evaluation authorization in CCRA member countries. In this program, It provide the function of trend statistics analysis which can statically analyzed the evaluation accreditation trends of most countries and automatical statistics by categorization ( by Product, Class and statistics in national) and report creation functions which can easily extraction and use the needed data. It has been updated the related informations until latest accredited product using by CC(Common Criteria) portal home page's data.

Issues and Improvements on the Country of Origin Labeling System for Consumer Protection in Korea (소비자보호를 위한 한국 원산지표시제도의 문제점과 개선방안)

  • Jin, Byung-Jin;Lim, Byeong-Ho
    • Korea Trade Review
    • /
    • v.44 no.2
    • /
    • pp.143-157
    • /
    • 2019
  • The purpose of this study is to review domestic and foreign origin labeling system in order to implement origin labeling system in the perspective of protecting the interests of consumers, and to suggest governmental improvements by analyzing problems embedded in current labeling system. The results analysis show complexity of related legal system, lack of expertise at the stage of labeling, and inefficiency of crackdown authority. The improvement could be suggested in two ways: supporting plans for the ones who have duty of labeling and improvement plans in origin management system. As supporting plans, we suggest the need for an automatic origin determination system, appropriate education on origin stakeholders, and introduction of origin certification system. For improvement plans, there are unification of country of origin labeling related laws, utilization of FTA product specific rules, and QR code, expert confirmation system. Since the origin labeling issue has become important, proactive and quick responses must follow with thorough examination the effect of the origin labeling on consumer welfare.

A Study on Secure Kerberos Authentication using Trusted Authority in Network Structure (네트웍 환경에서 안전한 Kerberos 인증 메커니즘에 관한 연구)

  • 신광철;정진욱
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.2
    • /
    • pp.123-133
    • /
    • 2002
  • In Network Environment, Kerberos certification mechanism to require Kerberos server in other area unconditionally belief. Also, Kerberos server in cooperation area must be share server of other area and secret key. To solve these two problems, this paper proposed safe security mechanism of doing to ably IETF CAT's PKINIT/PKCROSS a1gorithm with Public Key Infrastructure and use Directory System and service between realms do trust and prove each Kerberos trust center base. Also, Although Kerberos server of each area must be foreknowing each server's secret key and public key, Obtain through Trust center and acquire each area's public key and common symmetric key, Application server excluded process that must register key in Key Distribution Center.

A Study of Patient's Privacy Protection in U-Healthcare (유헬스케어에서 환자의 프라이버시 보호 방안 연구)

  • Jeong, Yoon-Su;Lee, Sang-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.4
    • /
    • pp.913-921
    • /
    • 2012
  • On the strength of the rapid development and propagation of U-healthcare service, the service technologies are full of important changes. However, U-healthcare service has security problem that patient's biometric information can be easily exposed to the third party without service users' consent. This paper proposes a distributed model according authority and access level of hospital officials in order to safely access patients' private information in u-Healthcare Environment. Proposed model can both limit the access to patients' biometric information and keep safe system from DoS attack using time stamp. Also, it can prevent patients' data spill and privacy intrusion because the main server simultaneously controls hospital officials and the access by the access range of officials from each hospital.

A Study on the Dispute Cases and Improvement Related to the FTA Cumulation: A Focus on the KOREA-ASEAN FTA (FTA 원산지누적 분쟁사례와 개선방안 연구: 한-아세안 FTA를 중심으로)

  • Ko, Jai-Kil
    • Journal of Arbitration Studies
    • /
    • v.30 no.4
    • /
    • pp.95-119
    • /
    • 2020
  • Securing a stable supply chain is becoming a significant concern among countries as the global uncertainty rises with the expansion of global protectionism and the result of what the COVID-19 pandemic has brought around the world. This study has investigated dispute cases between customs authority and trade corporations based on the KOREA-ASEAN FTA and suggested the following implications and improvements: Firstly, the extent (varieties) of the proof document on cumulation and its form should be stipulated and provided through consultation between customs from each contracting party. Secondly, it ought to be prescribed as an obligation so that producers located in the third country can cooperate in providing documents for certification of origin. The duty to provide such documentary evidence should also be specified when making EX-IM contracts. Lastly, origin verification provisions regarding cases to which cumulation is applied have to be complemented so that the verification period's extension can be applied and approved. One can expect that the abovementioned responses on cumulation will enhance the availability of KOREA-ASEAN FTA.

A Security Model Analysis Adopt to Authentication State Information in IPTV Environment (IPTV 환경에서 가입자의 인증 상태정보를 이용한 인증보안 모델 설계)

  • Jeong, Yoon-Su;Jung, Yoon-Sung;Kim, Yong-Tae;Park, Gil-Cheol;Lee, Sang-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.3B
    • /
    • pp.421-430
    • /
    • 2010
  • Now a days, as a communications network is being broadband, IPTV(Internet Protocol Television) service which provides various two-way TV service is increasing. But as the data which is transmitted between IPTV set-top box and smart card is almost transmitted to set-top box, the illegal user who gets legal authority by approaching to the context of contents illegally using McComac Hack Attack is not prevented perfectly. In this paper, set-top box access security model is proposed which is for the protection from McComac Hack Attack that tries to get permission for access of IPTV service illegally making data line which is connected from smart card to set-top box by using same kind of other set-top box which illegal user uses. The proposed model reports the result of test which tests the user who wants to get permission illegally by registration the information of a condition of smart card which is usable in set-top box in certification server so that it prevents illegal user. Specially, the proposed model strengthen the security about set-top box by adapting public key which is used for establishing neighbor link and inter-certification process though secret value and random number which is created by Pseudo random function.

The Research on Job Analysis of Horse-Riding Instructor (승마지도사에 관한 직무분석 연구)

  • Lee, Byung-Wook;Kang, Kyoung-Kyoon;Yi, Joo-Wook;Lee, In-Kyung
    • Journal of vocational education research
    • /
    • v.33 no.3
    • /
    • pp.145-167
    • /
    • 2014
  • The purpose of this research is to prepare the measures for evaluating the job of horse-riding instructor and improvement related to it and for distributing horse-riding industry effectively. Forsuch, we tried to analyze job of horse-riding instructor. Inparticular, we have developed DACUM chart of horse-riding instructor through DACUM method and experts related to it. As result, we found out eight duties and hundreds of job and arranged seven duty areas in total and eighty-two executed works. In addition, as experts said, the horse-riding instructor is the one who 'instructs people learning horse-riding in horse-riding facility and manages horses, horse-riding equipment and man-power.' Such results provide the procedure of horse-riding instructor cultivation which has been presently underway with many viewpoints. Especially, there are three educational processes and subject materials related to horse-riding instructor's examination(Hipologia, Horse-treatment technique, Horse Health management). However, as result of analysis on duty, we found out that racecourse management and horse-riding education theory has been needed to be added and complemented as well. In addition, the work and duty of analysis can be used to be made use up of as work profile and specification and such data can be also made use of as standard of training and submission. Through this study there should be a necessary work to distinguish between re-drafting and role of duty in its own right related to certification of horse-riding instructor in future and it would be necessary to develop study that is able to connect them all to certificate. What is more, there should be work and measure required for rethinking of utility of certification.