• Title/Summary/Keyword: digital certification

Search Result 209, Processing Time 0.024 seconds

A Digital Right Management System based on Shared Key fool for Video Data Protection (동영상 데이터 보호를 위한 공유 키 풀 기반의 DRM 시스템)

  • Kim Jung-Jae;Park Jae-Pyo;Jun Moon-Seog
    • The KIPS Transactions:PartC
    • /
    • v.12C no.2 s.98
    • /
    • pp.183-190
    • /
    • 2005
  • In this thesis, first, we propose I-frame encryption techniques of video data for video data itself encryption and propose license agent that processing user's certification and decryption in client system automatically when user execute encrypted video data in system server. License agent runs user's certification, encryption and decryption of video data based on PID(Public Key Infrastructure) using shared key-pool when execute of video data. Also, compose duplex buffer control and propose real time decryption method using efficient buffer scheduling to reduce much playing delay times that happen processing decryption when execute of videoa data of high-capacity.

Implementation of Secure I-Mail System based on lava (타원곡선 알고리즘을 이용한 안전한 자바 메일 시스템의 설계 및 구현)

  • 이원구;조한진;이재광
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.10a
    • /
    • pp.700-702
    • /
    • 2001
  • As computers and networks become popular, distributing information on the Interment is common in our daily life. Also, the explosion of the Internet, of wireless digital communication and data exchange on Internet has rapidly changed the way we connect with other people. But secure mall is gamins popularity abroad and domestically because of their nature of prodding security. That is. it has been used a variety of fields such as general mail and e-mail for advertisement But, As the data transmitted on network can be easily opened or forged with simple operations. Most of existing e-mall system don't have any security on the transmitted information. Thus, security mail system need to provide security including message encryption, content integrity, message origin authentication, and non-repudiation. In this paper, we design implement secure mall system with non-repudiation service and encryption capability to provide services for certification of delivery and certification of content as well as the basic security services.

  • PDF

Securing the Private Key in the Digital Certificate Using a Graphic Password (그래픽 비밀번호를 활용한 공인인증서 개인키 보호방법에 관한 연구)

  • Kang, Byung-Hoon;Kim, Beom-Soo;Kim, Kyung-Kyu
    • The Journal of Society for e-Business Studies
    • /
    • v.16 no.4
    • /
    • pp.1-16
    • /
    • 2011
  • A digital certificate mandated by the Electronic Signature Act has become familiar in our daily lives as 95% of the economically active population hold certificates. Due to upgrades to 256 bit level security that have become effective recently, the security and reliability of digital certificates are expected to increase. Digital certificates based on Public Key Infrastructure (PKI) have been known as "no big problem," but the possibility of password exposure in cases of leaked digital certificates still exists. To minimize this vulnerability, various existing studies have introduced alternative password methods, expansion of certificate storage media, and multiple certification methods. These methods perform enhanced functions but also have limitations including the fact that the secureness of passwords is not guaranteed. This study suggests an alternative method for enhancing the level of password secureness as a way to improve password security. This new method improves security management and enhances the convenience of using digital technologies. The results may be used for developing digital certificate related security technologies and research in the future.

Detection and Quantification of Apple Stem Grooving Virus in Micropropagated Apple Plantlets Using Reverse-Transcription Droplet Digital PCR

  • Kim, Sung-Woong;Lee, Hyo-Jeong;Cho, Kang Hee;Jeong, Rae-Dong
    • The Plant Pathology Journal
    • /
    • v.38 no.4
    • /
    • pp.417-422
    • /
    • 2022
  • Apple stem grooving virus (ASGV) is a destructive viral pathogen of pome fruit trees that causes significant losses to fruit production worldwide. Obtaining ASGV-free propagation materials is essential to reduce economic losses, and accurate and sensitive detection methods to screen ASGV-free plantlets during in vitro propagation are urgently necessary. In this study, ASGV was sensitively and accurately quantified from in vitro propagated apple plantlets using a reverse transcription droplet digital polymerase chain reaction (RT-ddPCR) assay. The optimized RT-ddPCR assay was specific to other apple viruses, and was at least 10-times more sensitive than RT-real-time quantitative PCR assay. Furthermore, the optimized RT-ddPCR assay was validated for the detection and quantification of ASGV using micropropagated apple plantlet samples. This RT-ddPCR assay can be utilized for the accurate quantitative detection of ASGV infection in ASGV-free certification programs, and can thus contribute to the production of ASGV-free apple trees.

The Effect of Quality Management System of Small and Medium Manufacturing Companies on Management Performance in the Age of Digital Transformation: Focusing on the Leadership Mediation Effect (디지털 전환시대에 중소제조기업의 품질경영시스템이 경영성과에 미치는 영향: 리더십 매개효과를 중심으로)

  • Lee, JuYong
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.18 no.1
    • /
    • pp.163-177
    • /
    • 2022
  • The purpose of this study is to analyze the impact of quality management system requirements, which are techniques for management innovation to secure competitiveness of small and medium-sized manufacturers, on management performance as economic uncertainties increase and non-face-to-face culture spread. To this end, a survey was conducted on small and medium-sized manufacturing companies that maintain ISO certification. As a result of the study, first, it was found that planning had a positive effect on management performance among the requirements of the quality management system. Second, it was found that improvement among the requirements of the quality management system had a positive effect on management performance. Third, in the relationship between the requirements of the quality management system and management performance, leadership was found to have a complete mediating effect on planning. This means that the CEO plays a large role in establishing strategies for companies to gain a competitive advantage and will contribute to establishing all measures.

The Evaluation of Effectiveness of Green Management Accreditation for Hospitals (의료기관의 녹색경영인증기준에 대한 유효성 평가)

  • Kim, Jang-Mook;Kang, Jung-Kyu
    • Journal of Digital Convergence
    • /
    • v.12 no.9
    • /
    • pp.265-274
    • /
    • 2014
  • We sought to derive an overall strategy for green business certification of medical institutions and to propose the improvement directions for green management evaluation systems through applying the criteria to medical institutions. A self-assessment survey was conducted at 44 targeted hospitals across the country, and the 2012 green management evaluation criteria for healthcare services were used as assessment tools. As a result, only 11 of the 44 hospitals were eligible for green business certification. By type, hospitals with more than 400 beds, hospitals in Seoul and the Gyeonggi area (${\geq}$ 400 beds) and private hospitals (${\geq}$ 400 beds) received relatively high scores. In an analysis of the mean score, only the difference between the hospitals with ${\geq}$ 400 beds and < 400 beds was statistically significant. When we analyzed the interviews of the hospitals with lower scores, it is important to change the awareness of executives and employees, to establish vision/strategy/objective, to promote relatively small-scale activities, and to establish long-term plans. To improve green management evaluation systems, it is necessary to reset the assessment area, to control scoring and weights, to create certification grades, and to adjust additional points.

A Study on The Preference Analysis of Personal Information Security Certification Systems: Focused on SMEs and SBs (개인정보보호 인증제도 선호도 분석에 관한 연구: 중소기업 및 소상공인을 중심으로)

  • Park, Kyeong-Tae;Kim, Sehun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.911-918
    • /
    • 2014
  • Over the past few years, security breaches have been consistently reported around the world. Especially, people's personal information are at risk of being breached as the firms gather and utilize the information for their marketing purposes. As an effort to revamp their data infrastructures, companies have rebuilt their system that almost every data, including the personal information, are stored within the digital database. However, this migration provides easier access to the database but it has also increased the system vulnerability. As the data can be easily exposed to the unauthorized personnel both intentionally and unintentionally, it is necessary for companies to establish a set of security protocol and operate the personal information protection system. There are two major certified security system in South Korea; PIMS from KISA and PIPL from NIA. This paper analyzes the preferences of SMEs and small business using conjoint attributes of PIMS and PIPL. The study shows that the business owners take post certification rewards as the most important factor. It also shows that the attributes that have the highest utility rates are the following; 1) KISA certification, 2) 79 points of protection counter measurements, 3) 28 items of life cycle, 3) 50 percent discount on certification fee, and 4) Reduced amount of fine for personal information leakage incident.

Digital Watermarking of Medical Image Based on Public Key Encryption Algorithm Considering ROI (ROI를 고려한 공개키 암호화 알고리즘 기반 의료영상 디지털 워터마킹)

  • Lee Hyung-Kyo;Kim Hee-Jung;Seong Tack-Young;Kwon Ki-Ryong;Lee Jong-Keuk
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.11
    • /
    • pp.1462-1471
    • /
    • 2005
  • Recently, the medical image has been digitized by the development of computer science and digitization of the medical devices. There are needs for database service of the medical image and long term storage because of the construction of PACS(picture archiving and communication system) following DICOM(digital imaging communications in medicine) standards, telemedicine, and et al. However, it also caused some kinds of problems, such as illegal reproduction of medical image, proprietary rights and data authentication. In this paper, we propose the new digital watermarking technique for medical image based on public key encryption algorithm for integrity verification. It prevents illegal forgery that can be caused after transmitting medical image data remotely. The watermark is the value of bit-plane in wavelet transform of the original image for certification method of integrity verification. We proposed the embedding regions are randomly chosen considering ROI, and a digital signature is made using hash function of MD5 which input is a secret key. The experimental results show that the watermark embedded by the proposed algorithm can survive successfully in image processing operations and that the watermark's invisibility is good.

  • PDF

ADAM: An Approach of Digital Asset Management system (사후 디지털 자산 관리 시스템에 관한 연구)

  • Moon, Jeong-Kyung;Kim, Hwang-Rae;Kim, Jin-Mook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.9
    • /
    • pp.1977-1982
    • /
    • 2012
  • Social network service user or smart phone user is very convenient, because there are supported to various social network services such as Facebook, Twitter, Flickr, Naver blog, Daum blog, and so on. This Is very good because they store multimedia datas that user wants to cyber space if they want it conveniently. But, if social network user increases, space of cloud storage increases sharply, and when social network service used user dies then they have big problems such as they did not know in existing. Typically, problems of notice, dissemination, storage, and inheritance for digital asset can happen representatively. Now, If successor send relation information of he and his dead user that is family to social network service provider then service provider checks it. And successor may can use, save and only backup are possible after confirm of family relation truth. Therefore, We wish to propose ADAM that successor may can inherit digital assets easily, conveniently, and safely in this paper. If someone use ADAM, successor submits information about dead and own family relation in the third certification party. And ADAM can be inherited freely and conveniently about digital assets as general assets passing through right inheritance process.

PKI-based Distribution System of the User's Permission about Broadcast Program (PKI를 통한 방송프로그램 사용자 권한 유통시스템)

  • Im, Dae-Myung;Park, Ki-Chul;Lee, Joo-Young;Nam, Je-ho;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.649-652
    • /
    • 2009
  • Now Broadcasting system of TV has been developed from analogue to digital we call that IPTV(Internet Protocol Television) or DCATV(Digital Cable Television). But, The characteristics of digital broadcasting is the high-quality contents of easily and almost no damage piracy, and Copyright loss is increasing by Internet, P2P(Peer to Peer) and personal path. Nevertheless user's permissions that recorded and reuse of broadcasting can't restraint, And Training Materials etc. use of fair program needs to be separated from illegality. In this paper using a digital certificate permit the use of stored program to authorized user and user of fair purpose, And illegal distribution of restriction design and implement a distribution system.

  • PDF