• 제목/요약/키워드: digital certification

검색결과 208건 처리시간 0.025초

무결성이 보장된 블록체인 기술을 활용한 PKI 기반 보안 게이트웨이의 인증 모델 (Authentication Model of PKI-based Security Gateway using Blockchain having Integrity)

  • 김영수;문형진
    • 디지털융복합연구
    • /
    • 제19권10호
    • /
    • pp.287-293
    • /
    • 2021
  • 최근 국가가 공인하는 인증기관에서 발행하는 공인인증서를 폐지하고 인터넷 기업이 자체적으로 공동인증서를 발급하면서 그 책임을 부여하는 방법으로 전자서명법이 개정되었다. 인터넷 기업이 인증기관으로서 발행하는 공동 인증서의 사용이 허용되면서 공개키 인증서 도용에 따른 사기 피해의 확대가 예상된다. 무결성과 보안성이 내재된 블록체인에 PKI를 결합한 보안 게이트웨이에서 사용할 수 있는 인증 모델을 제안하였다. 제안 모델의 실용성 평가를 위해서 전문가 집단을 활용한 델파이 기법으로 중요도를 도출하고 인간의 주관성을 배제하는 평가방법인 수게노의 계층퍼지적분을 이용한 인증 모델의 보안성을 평가했다. 블록체인 기반 공동인증서는 무분별한 공인인증서의 발행과 오남용을 방지하고 보안성과 편의성이 확보된 서비스의 기반기술로 활용이 기대된다.

체육 중등교사 임용시험의 교과교육학 하위영역에 대한 출제경향 분석 (Trend Analysis of Sport Pedagogy Sub-Domain in Secondary Teacher Certification Examination)

  • 조기범;김승용
    • 디지털융복합연구
    • /
    • 제19권4호
    • /
    • pp.339-347
    • /
    • 2021
  • 본 연구는 객관식 문항이 폐지된 이후인 2014년부터 2020년까지 7년간 체육 중등교사 임용시험의 교과교육학 문항을 한국교육과정평가원에서 제시한 평가내용요소를 근거로 분석하였다. 연구결과로 교과교육학 문항은 7년간 48문항이 출제되었으며, 83개의 하위질문이 발견되었다. 시사점으로는 첫째, 하위질문 개수의 빈도가 높아지면서 통합형 문제가 출제되고 있다. 둘째, 출제 문항 영역의 심각한 불균형 문제가 드러났다. 셋째, 체육교수학습 및 평가, 체육교육과정 영역에 지나친 출제 의존도를 보이고 있었다. 넷째, 교과내용학과 중복되는 평가 영역이 존재함에 따라 혼란이 가중되었다. 그러므로 한국교육과정평가원의 기존 평가 영역별 분류표를 기반으로 평가 내용 요소에 대한 정의가 명확하게 내려져야 하며 신뢰로운 교사시험을 위해 특정 학자와 이론에 의존에서 벗어나 학교현장에서 도움이 될 수 있는 문항들이 개발될 필요가 있다.

미용사 헤어 국가기술 자격증 실기과제가 헤어디자이너의 직무 태도에 미치는 영향 (The Influence of Hairdresser National Technology Certification Practical Tasks on Hair Designers' Job Attitude)

  • 오정선;박장순
    • 디지털융복합연구
    • /
    • 제20권5호
    • /
    • pp.819-825
    • /
    • 2022
  • 전문 직업인으로서 자질과 실력을 검증하기 위한 미용사 국가기술 자격증의 중요성이 증가하는 가운데 헤어 실기과제에 대하여 헤어디자이너가 지각하는 직무 태도 연구를 통해 성취동기와 직무 태도 향상이 필요한 시점이다. 이에 헤어살롱에서 근무하는 헤어디자이너의 직무 태도에 미치는 영향을 연구한 결과 미용사 헤어 국가기술 자격증 실기과제 중 블로우 드라이는 헤어디자이너의 직무 효능감을 유발하는 것으로 나타났고, 두피 스켈링과 샴푸는 헤어디자이너의 직무만족도를 유발하는 것으로 나타났다. 연구 결과를 바탕으로 가발에만 국한되는 비현실적 실기기법이 아닌 미용산업체에서 고객에게 다양한 기법으로 유용하게 적용할 수 있는 실용성을 가미한 자격증 실기과제에 대한 다양한 제시가 가능해지며, 체계적인 교육과 헤어디자이너의 직무 태도 향상을 유도하고자 한다. 더불어 본 연구는 헤어디자이너의 성취동기 향상을 위한 다양한 실기과제 개발의 기초자료를 제공하리라 사료한다.

아이핀 대량 부정발급 사고에 대한 개선방법 연구 (A Study of the Improvement Method of I-pin Mass Illegal Issue Accident)

  • 이영교;안정희
    • 디지털산업정보학회논문지
    • /
    • 제11권2호
    • /
    • pp.11-22
    • /
    • 2015
  • The almost of Web page has been gathered the personal information(Korean resident registration number, name, cell-phone number, home telephone number, E-mail address, home address, etc.) using the membership and log-in. The all most user of Web page are concerned for gathering of the personal information. I-pin is the alternative means of resident registration number and has been used during the last ten-year period in the internet. The accident of I-pin mass illegal issue was happened by hacker at February, 2015. In this paper, we analysis the problems of I-pin system about I-pin mass illegal issue accident and propose a improvement method of it. First, I-pin issue must be processed by the off-line of face certification in spite of user's inconvenience. Second, I-pin use must be made up through second certification of password or OTP. The third, the notification of I-pin use must be sent to the user by the text messaging service of cell-phone or the E-mail. The forth, I-pin must be used an alternative means of Korean resident registration number in Internet. The methods can reduce the problems of I-pin system.

CC와 CEM의 평가요구사항 분석 (Analysis of Evaluation Requirement for CC and CEM)

  • 강연희;방영환;최성자;이강수
    • 디지털콘텐츠학회 논문지
    • /
    • 제5권2호
    • /
    • pp.95-100
    • /
    • 2004
  • 정보보호 수준을 향상시키기 위해 정보보호시스템 평가$\cdot$인증에 대한 필요성이 높아지고 있으며 선진국에서는 정보화 역기능 위험 방지를 위해 제도적 일환으로 자국의 환경에 적합한 평가$\cdot$인증제도를 마련하여 정보보호시스템을 평가해 오고 있다. 그러나 상이한 평가기준의 적용으로 인한 시간 및 비용 소모의 문제점이 발생되었으며 이를 해결하기 위한 노력으로 현재 정보보호 시스템 평가를 위한 상호인증을 위해 공통평가기준(CC : Common Criteria)과 공통평가방법론(CEM : Common Evaluation Methodology)을 사용하고 있다. 선진화된 평가제도의 조기 정착과 효율적인 평가 준비 및 수행방법을 위한 정보보호시스템 평가 참여자들의 평가기준 및 방법론에 대한 유연하고 능동적인 해석이 필요하다.

  • PDF

Wireless Ad Hoc Network에서 보안 영역과 노드 인증을 이용한 보안 라우팅 기법에 관한 연구 (A Study on Secure Routing using Secure Zone and Nodes Authentication in Wireless Ad Hoc Network)

  • 양환석
    • 디지털산업정보학회논문지
    • /
    • 제10권3호
    • /
    • pp.161-169
    • /
    • 2014
  • Wireless Ad Hoc Network is suitable for emergency situations such as and emergency, disaster recovery and war. That is, it has a characteristic that can build a network and use without help of any infrastructure. However, this characteristic is providing a cause of many security threats. In particular, routing attack is not applied the existing routing methods as it is and it is difficult to determine accurately whether nodes that participate in routing is malicious or not. The appropriate measure for this is necessary. In this paper, we propose a secure routing technique through a zone architecture-based node authentication in order to provide efficient routing between nodes. ZH node is elected for trust evaluation of the member nodes within each zone. The elected ZH node issues a certification of the member nodes and stores the information in ZMTT. The routing involvement of malicious nodes is blocked by limiting the transfer of data in the nodes which are not issued the certification. The superior performance of the proposed technique is confirmed through experiments.

신분증 분실에 따른 피해 및 대응책에 관한 연구 (A Study of the Damage and the Countermeasure by Identification Card Loss)

  • 이영교;안정희
    • 디지털산업정보학회논문지
    • /
    • 제13권3호
    • /
    • pp.53-64
    • /
    • 2017
  • Korean Identification card or driver license is usually used to verify one's identity in Korea. These are also used as an adult certification. Since the form of these ID card is an analog and it needs to be checked with naked eyes, it might be used maliciously. Someone who's got someone else's ID card can do other things. Therefore, it must be reported rapidly when ID card is lost or stolen. The most serious problem might be occurred when they do not recognize and report the loss. They might suffer from pecuniary or mental damage such as opening a mobile phone service, providing loan or credit card, opening a personal checking account, etc. Thus, this study suggests and compares the ways of avoiding these problems. First, the most effective way is to send the authorization code via mobile phones in consideration of build-up period and cost. The person in charge of business processing department using ID card sends the authorization code via registered mobile phone. The owners submits it to the person and their identifications are confirmed. Next effective way is that the person in charge of business processing department using ID card sends text messages via registered mobile phone. Lastly, the most ineffective way is to introduce and implement the electronic ID card ultimately even though it is expensive and takes a long time to build up the system.

Design and Implementation of Digital Jikin using Smartphone Application

  • Hong, Daewon;Kang, Miju;Chun, Junchul
    • 인터넷정보학회논문지
    • /
    • 제18권5호
    • /
    • pp.87-94
    • /
    • 2017
  • Due to the recent advances of IT industry, many companies and institutions have been used electronic documents rather than original paper copies. However, the characteristic of electronic document allows it to be readily damaged from proscribed copying, counterfeit, and falsification. These can cause the serious security problems for electronic documents. Conventional security methods for digital documents involve adding a separated image or marker, but these methods can reduce the readability of document. Therefore, we proposed a digital Jikin (Korean traditional stamp) which is normally used to identify the source or author of a document in asia. The proposed digital Jikin can preserve the readability of electronic document while protecting the document from proscribed copying, counterfeit, or falsification using image processing approach. In this paper, a digital Jikin application is designed and implemented under android platform and it converts the critical information of document onto the digital Jikin. The proposed digital Jikin contains important information in the boundary of Jikin not only about the author of documents or source, but also keywords, number of images, and many more. Therefore, the authenticity of document or whether the document has been altered or not by other person can be evaluated by the server. The proposed digital Jikin can be sent to a server through the wireless networks and can be stored using PHP and MySQL. We believe that the proposed method can offer the better and simple solution for strengthening the security of electronic document.

교육적 가치를 높이는 디지털배지 설계와 활용 연구 (Research on the Design and Use of Digital Badges to Increase Educational Value)

  • 민연아;이지은
    • 한국IT서비스학회지
    • /
    • 제22권6호
    • /
    • pp.71-86
    • /
    • 2023
  • The rapid change in industry and the technological gap give rise to social demand for upskilling and reskilling and spread of alternative education. Against this backdrop, digital certification and career management tools can be used to manage various types of learning activities comprehensively. Digital badges provide various kinds of history information related to individual learning, and the reliability and transparency of the issued information can be strengthened by applying blockchain technology. There have been various discussions about digital badges for a long time, but due to the lack of standards to support the issuance and distribution of digital badges, they have been partially used in some areas. However, interest in digital badges is increasing due to the development of related technologies, establishment of standards, paradigm changes in higher education, and government policies related to nurturing digital talent. This paper deals with the use of digital badges for efficient and transparent learning management and career management in an online learning environment. The researcher analyzes the technical characteristics and use cases of digital badges, and proposes a plan for use in online higher education based on them.

적층식 제조(Additive manufacturing) 기술동향 (Technology Trend of the additive Manufacturing (AM))

  • 오지원;나현웅;최한신
    • 한국분말재료학회지
    • /
    • 제24권6호
    • /
    • pp.494-507
    • /
    • 2017
  • A three-dimensional physical part can be fabricated from a three-dimensional digital model in a layer-wise manner via additive manufacturing (AM) technology, which is different from the conventional subtractive manufacturing technology. Numerous studies have been conducted to take advantage of the AM opportunities to penetrate bespoke custom product markets, functional engineering part markets, volatile low-volume markets, and spare part markets. Nevertheless, materials issues, machines issues, product issues, and qualification/certification issues still prevent the AM technology from being extensively adopted in industries. The present study briefly reviews the standard classification, technological structures, industrial applications, technological advances, and qualification/certification activities of the AM technology. The economics, productivity, quality, and reliability of the AM technology should be further improved to pass through the technology adoption lifecycle of innovation technology. The AM technology is continuously evolving through the introduction of PM materials, hybridization of AM and conventional manufacturing technologies, adoption of process diagnostics and control systems, and enhanced standardization of the whole lifecycle qualification and certification methodology.