• Title/Summary/Keyword: pki

Search Result 545, Processing Time 0.027 seconds

A Study of Authentication Method for Id-Based Encryption Using In M2M Environment (M2M 환경에서 신원기반 암호기법을 활용한 인증기법에 관한 연구)

  • Jin, Byung-Wook;Park, Jae-Pyo;Lee, Keun-Wang;Jun, Mun-Seok
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.4
    • /
    • pp.1926-1934
    • /
    • 2013
  • M2M (Machine-to-Machine Communication) refers to technologies that allow wired and wireless systems to communicate with other devices with similar capabilities. M2M has special features which consist of low electricity consumption, cheap expenses, WAN, WLAN and others. Therefore, it can communicate via a network. Also, it can handle itself without a person's management. However, it has a wireless-communicate weakness because of the machine-communicate request, and also it is difficult to administrate and control each other. So In this Paper, It suggests the safety protocol between Device, Gateway and Network Domain in M2M environment. Proposed protocol is based on ID-Based encryption's certificate and creates session key between the Access Server and the Core Server in the Network Domain. It uses that session key for sending and receiving data in mutual, and adds key renewal protocol so it will automatically update discern result. a comparative analysis of the existing M2M communication technologies and PKI-based certificate technology is compared with the proposed protocol efficiency and safety.

Improvement of Performance for Online Certificate Status Validation (실시간 인증서 상태검증의 성능개선)

  • Jung, Jai-Dong;Oh, Hae-Seok
    • The KIPS Transactions:PartC
    • /
    • v.10C no.4
    • /
    • pp.433-440
    • /
    • 2003
  • According as the real economic activities are carried out in the cyber world and the identity problem of a trade counterpart emerges, digital signature has been diffused. Due to the weakness for real-time validation using the validation method of digital signature, Certificate Revocation List, On-line Certificate Status Protocol was introduced. In this case, every transaction workload requested to verify digital signature is concentrated of a validation server node. Currently this method has been utilized on domestic financial transactions, but sooner or later the limitation will be revealed. In this paper, the validation method will be introduced which not only it can guarantee real-time validation but also the requesting node of certificate validation can maintain real-time certificate status information. This method makes the revocation management node update the certificate status information in real-time to the validation node while revoking certificate. The characteristic of this method is that the revocation management node should memorize the validation nodes which a certificate holder uses. If a certificate holder connects a validation node for the first time, the validation node should request its certificate status information to the above revocation management node and the revocation management node memorizes the validation node at the time. After that, the revocation management node inform the revocation information in real-time to all the validation node registered when a request of revocation happens. The benefits of this method are the fact that we can reduce the validation time because the certificate validation can be completed at the validation node and that we can avoid the concentration of requesting certificate status information to a revocation node.

Implementation of A Patient Card Integrating System Using by IC Card To Share A Medical Information (진료정보 공유를 위한 IC카드 기반 병원 진찰 카드 통합 시스템 구축)

  • Pack D.H.;Lee N.Y.;Kim Y.J.;Lee K.B.
    • Journal of Biomedical Engineering Research
    • /
    • v.24 no.6 s.81
    • /
    • pp.533-541
    • /
    • 2003
  • In the paper. the health card system to integrate several cards into one card for protecting patient's privacy and security problems is proposed. Firstly, it is defined the minimal data set for integrating several patient cards into one card using IC card, and developed the issuing system to issue the integrated patient IC card. In order to secure and certificate a patient's personal information. the integrated patient IC card has applied 3-DES and the PKI certificate authority based Windows 2000 is established. The receipt and reservation system for taking care of a healthcare has developed to cooperate with the existing hospital computer system. The integrating patient IC card system proposed in this paper is implemented to 11 hospitals and used for 1.000 patients. On the result of the simulation. the proposed system can receive or reserve for a patient to take care of healthcare in the simulated hospitals and also establish the basis of the mechanism to share a medical information.

The Recovery of the Deleted Certificate and the Detection of the Private-Key Encryption Password (삭제된 공인인증서의 복구 및 개인키 암호화 패스워드의 검출)

  • Choi, Youn-Sung;Lee, Young-Gyo;Lee, Yun-Ho;Park, Sang-Joon;Yang, Hyung-Kyu;Kim, Seung-Joo;Won, Dong-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.1
    • /
    • pp.41-55
    • /
    • 2007
  • The certificate is used to confirm and prove the user's identity in online finance and stocks business. A user's public key is stored in the certificate(for e.g., SignCert.der) and the private key, corresponding to public key, is stored in the private key file(for e.g., SignPri.key) after encryption using the password that he/she created for security. In this paper, we show that the certificate, deleted by the commercial certificate software, can be recovered without limitation using the commercial forensic tools. In addition, we explain the problem that the private key encryption password can be detected using the SignCert.der and the SignPri.key in off-line and propose the countermeasure about the problem.

A Study on e-B/L Korea Service and its Facilitation Strategies (한국형 전자선하증권 활성화 전략에 관한 연구)

  • Jeong, Yoon-Say
    • International Commerce and Information Review
    • /
    • v.13 no.4
    • /
    • pp.51-79
    • /
    • 2011
  • Korea has accomplished the establishment of the National Single Window for Paperless Trade. Since 1991, it has developed Trade Automation Service System based on EDI technology. In 2003, Korean government and private sectors jointly began to set up National Paperless Trade Service( e-Trade Service) as one of the e-government projects. In 2008, they commenced the uTradeHub Service which was equipped with Internet based e-B/L and e-Nego service systems for the first time in the world To facilitate the service Korea amended its e-Trade facilitation Act and Law by 2007. At the end of 2011, Korea historically recorded its trade volume of 1 trillion US dollars and joined '$1 trillion trade club' as the 9the member country since the country had started international trade less than five decades ago. A rolling out of the e-B/L and e-Nego service will 'ally reduce the transaction costs of trading businesses and accelerate the activation e-trade services. The purposes of the study are to examine 'e-B/L Korea' service and its facilitation strategies as well as identify obstacles to utilize the 'e-B/L Korea' service. The paper reviewed and analyzed Korea's Paperless trade system and distinctive characteristics of the 'e-B/L Korea Service. Parts of the fOWld distinctive characteristics of the Korea's e-B/L service are as follows; It is well equiped with IT and legal system. It also has more that 30,000 potential users who are already uTradeHub service users. The paper indicated several weaknesses of the current system such as global KPI issues, circulation of the electronic documents not only in the domestic market but also among economies, development of the electronic Bill of Exchange. As resolution measures, the paper recommended the introduction of mutual recognition system of PKI among trade partner counties, setting up e-trade solution for small and medium companies, and special attention to raise users' awareness of the e-B/L service.

  • PDF