• Title/Summary/Keyword: 공유 인증

Search Result 395, Processing Time 0.029 seconds

Safety Performance Evaluation of Blowers for 1kW Class Stationary Fuel Cell System (1kW급 건물용 연료전지시스템 블로워의 안전성능 평가)

  • Lee, Jungwoon;Kim, Younggyu
    • 한국신재생에너지학회:학술대회논문집
    • /
    • 2011.05a
    • /
    • pp.90.2-90.2
    • /
    • 2011
  • 세계 각 국에서는 선진국을 중심으로 기후변화와 치솟는 유가에 대응하기 위하여 다양한 에너지원의 확보를 위해 부단히 노력하고 있다. 특히, 신재생에너지원 중 에너지 지속성이 가장 우수한 연료전지의 경우 1kW급 건물용 연료전지시스템이 도시가스 인프라가 가장 우수한 한국 및 일본을 중심으로 상용화에 가장 근접해 있는 실정이다. 일본의 경우 가정용 연료전지시스템 '에너팜'의 일부 제품이 올해부터 200만엔대로 가격을 내려 보급되어질 예정이고, 아직은 경제성이 떨어지지만 연료전지 조기 상용화를 위해 시스템 가격저감을 통한 기술개발이 한창이다. 또한 700W급 고체산화물형 연료전지시스템을 세계에서 처음 시판 계획을 가지고 있다. 국내의 경우 2009년도부터 시작된 '그린홈 보급확대를 위한 건물용 연료전지 보조기기 가격저감 기술개발'연구를 통해 블로워, 밸브, 유량계 및 펌프 등의 보조기기의 단가를 낮추고자 기술개발에 박차를 가하고 있다. 이에 따른 연료전지 부품 가격저감 기술이 국내 건물용 연료전지 시장보급의 활력소가 되기를 기대한다. 본 연구에서는 건물용 연료전지의 보조기기인 블로워의 가격저감을 위한 연구의 일환으로 블로워의 안전성능 평가를 통한 보조기기의 가격저감 및 안전성을 확보하고자 한다. 1kW급 건물용 연료전지시스템의 여러 블로워 중 도시가스용 연료승압 블로워, 선택산화 공기 블로워, 버너 공기 블로워 및 캐소드 공기 블로워의 안전성능 평가를 수행하였고, 평가결과의 공유를 통하여 국내 블로워 제조사의 설계방향을 제시하고 연료전지시스템의 안전성을 확인하고자 한다. 특히, 내구성, 기밀, 가혹조건시험 및 소음, 진동, 습도, 온도와 같은 내주위환경시험 등의 평가결과 비교를 통하여, 연료전지 부품 인증기준을 재정립하여 연료전지 부품산업의 조기 활성화를 도모하고자 한다.

  • PDF

A Study on the Social Media Sharing Intention by Exhibition Visitors -Focused on D Museum Plastic-Fantastic and Instagram- (전시방문객의 소셜미디어 공유의도에 관한 연구 -디뮤지엄의 Plastic Fantastic과 Instagram을 중심으로-)

  • Kim, Chaeeun;Lee, Joonhan;Kim, Sun Mee
    • Journal of Fashion Business
    • /
    • v.22 no.4
    • /
    • pp.20-29
    • /
    • 2018
  • Today, visitors of art galleries like to share their life in their communities than interacting with artwork. Meantime, image sharing of an exhibition on social media has become more important than actual watching of the artwork. Accordingly, most of the galleries have started paying more attention in organizing an exhibition environment for proof-shots to attract more visitors. We initially conducted research about the internet environment from the late 1990s to the recent years and analyzed the changing watching patterns of the exhibition since the advent of social media. Secondly, for empirical case analysis, we selected 'Plastic Fantastic' held in D-Museum as the target of analysis. The analysis targeted 500 recent postings that were discovered on Instagram on March 4, 2018, as 'Plastic-Fantastic'(in Korean). The methods of analysis included classification types of image, hashtag, and text on Instagram and were arranged in an order of relation to the exhibits. Based on the image analysis, 44.2% of the images involved exhibition displays; the others included a person or other goods. Based on the results of the text and hashtag analysis, only 3.6% of posting included information about the exhibition and 56.4% had non-related inflow hashtags only with image. The behavior of these shares is likely to gradually lose the inherent meaning of the exhibition and to the value rather than imparting the artistic thrill that viewers derive from art. Exhibition should try to seek deep interaction between the display, audience, and social media users, rather than encouraging the visitors to take proof-shots.

ID-based Tripartite Multiple Key Agreement Protocol Combined with Key Derivation Function (키 유도함수를 결합한 ID 기반 3자 복수키 동의 프로토콜)

  • Lee Sang-Gon;Lee Hoon-Jae
    • Journal of Internet Computing and Services
    • /
    • v.7 no.3
    • /
    • pp.133-142
    • /
    • 2006
  • The purpose of the multiple key agreement protocol is to get efficiency in computational and communicational aspects compared to multiple executions of single key agreement protocol. However ID based tripartite multiple key agreement protocols have been proposed, it is reported that they can not resist unknown key-share attack or impersonation attack. How to design a secure and efficient ID-based authenticated tripartite multiple key agreement scheme to prevent all kinds of attacks remains an open problem. This paper proposes a multiple key agreement scheme combing the existing single key agreement protocol with a key derivation function. The proposed scheme can not only increase computational efficiency compared to the existing multiple key agreement protocol, but can ensure security of the proposed schemes by using a security proofed single key agreement protocol and key derivation function.

  • PDF

Wireless Internet Payment Protocol Using Weil Pairing Method (무선인터넷에서 Weil Pairing 기법을 적용한 지불 프로토콜)

  • Jin Shi-Mei;Lee Hyun-Ju;Rhee Chung-Sei
    • The Journal of the Korea Contents Association
    • /
    • v.5 no.3
    • /
    • pp.9-17
    • /
    • 2005
  • Recently, there are rapid development of information and communication technology and rapid growing of e-business users. We propose a method for security problem on the internet environment which changes from wire internet to wireless internet or wire/ wireless internet. Wireless e-business adopts credit card WPP protocol and AIP protocol proposed by ASPeCT. WAP, one of the protocol used by WPP has weakness of leaking out information from WG which connected wire and wireless communication. Certification chain based AIP protocol requires a lot of computation time and user IDs are known to others. We propose a Micro-Payment protocol based on credit card. Our protocol use the encryption techniques of the public key with ID to ensure the secret of transaction in the step of session key generation. IDs are generated using ECC based Weil pairing. We also use the certification with hidden electronic sign to transmit the payment result. The proposed protocol also solves the privacy protection and Non-repudiation problem.

  • PDF

Study on the Security Threat Factors of Social Network Services (소셜 네트워크 서비스의 보안 위협요인에 관한 연구)

  • Jeon, Jeong Hoon
    • Convergence Security Journal
    • /
    • v.19 no.4
    • /
    • pp.115-121
    • /
    • 2019
  • Recently, as the use of smart devices is becoming more common, various and convenient services are being developed. Among these services, the Social Network Service(SNS) is easily accessible anywhere, anytime. In particular, as well as sharing information, it forms a social relationship in cyberspace to expand new connections, and the SNS account is used as an authentication means of other services to provide users with speed and convenience at all times. However, despite the many advantages of SNS, due to security vulnerabilities occurring in the interworking process with various services, accidents of personal information are constantly occurring, and it is urgent to prepare countermeasures against potential risk factors. It is a necessary situation. Therefore, in this paper, the use of SNS is expected to increase rapidly in the future, and it is expected that it will be used as the basic data for developing the countermeasures by learning the countermeasures according to the security threats of the SNS.

Smartphone Camera Control System in connection with Personnel Access Rights (인원 출입 권한과 연계한 스마트폰 카메라 제어 시스템)

  • Jeon, Byung-Jin;Han, Kun-Hee;Shin, Seung-Soo
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.11
    • /
    • pp.93-101
    • /
    • 2017
  • The purpose of this paper is to investigate the effect of the smart phone camera on the company's employees or employees of partner companies, we want to block things in advance. In this paper, we propose a smart phone camera control system which is connected with the personnel access right which enables to share the photographed image of the authorized user and the data shot only within the enterprise. To this end, we have developed the installation status of smart phone control program (MCS: Mobile Camera Control System) of employees, employees and visitors of company, and experimented and analyzed whether the smart phone control program installed in the authorized area. In addition, when visitors visited the company, the effect of prevention of photograph shooting through smart phone camera and the cost of seal sticker attached to the smart phone camera lens part were reduced.

The Reliability Evaluation of User Account on Facebook (페이스북 사용자 계정의 신뢰도 평가에 대한 연구)

  • Park, Jeongeun;Park, Minsu;Kim, Seungjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.6
    • /
    • pp.1087-1101
    • /
    • 2013
  • Most people are connected to Social Network Services (SNS) through smart devices. Social Network Services are tools that transport information fast and easily. It does not care where he or she comes from. A lot of information circulates and is shared on Social Network Services. but Social Network Services faults are magnified and becoming a serious issue. For instance, malicious users generate multiple IDs easily on Facebook and he can use personal information of others on purpose, because most people tend to undoubtedly accept friend requests. In this paper, we have specified research scope to Facebook, which is one of most popular Social Network Services in the world. We propose a way of minimizing the number of malicious actions on Facebook from malignant users and malicious bots by setting criteria and applying reputation system.

A Study on Design Security Management Evaluation Model for Small-Medium size Healthcare Institutions (중소형 의료기관 보안관리 평가모델 설계 연구)

  • Kim, Ja Won;Chang, Hang Bae
    • The Journal of Society for e-Business Studies
    • /
    • v.23 no.1
    • /
    • pp.89-102
    • /
    • 2018
  • In this paper, the security characteristics of healthcare institutions were derived through analysis of previous research, and the characteristics and status of small and medium sized healthcare institutions were surveyed through field surveys of small and medium sized healthcare institutions. The security management evaluation model for small and medium sized healthcare institutions was designed and verified based on the security characteristics of small and medium healthcare institutions. For the design, we compared and analyzed existing security management system and evaluation certification system of healthcare institutions. We also confirmed the proposed security management evaluation model and the degree of sharing. In addition, we conducted validation for the statistical verification of the proposed security management evaluation model for small and medium sized healthcare institutions, and we performed the relative priority analysis through AHP analysis to derive the weight for each item. The result of this study is expected to be used as a standard of security management evaluation model that can be practiced in small and medium sized healthcare institutions.

Design of a Secure Session Key Exchange Method for tow Latency Handoffs (Low Latency Handoffs를 위한 안전한 세션 키 교환 기법 설계)

  • Kim Hyun-Gon;Park Chee-Hang
    • Journal of Internet Computing and Services
    • /
    • v.5 no.3
    • /
    • pp.25-33
    • /
    • 2004
  • Mobile IP Low Latency Handoffs(l) allow greater support for real-time services on a Mobile IP network by minimizing the period of time when a mobile node is unable to send or receive IP packets due to the delay in the Mobile IP Registration process. However, on Mobile IP network with AAA servers that are capable of performing Authentication, Authorization, and Accounting(AAA) services, every Registration has to be traversed to the home network to achieve new session keys, that are distributed by home AAA server, for a new Mobile IP session. This communication delay is the time taken to re-authentication the mobile node and to traverse between foreign and home network even if the mobile node has been previously authorized to old foreign agent. In order to reduce these extra time overheads, we present a method that performs Low Latency Handoffs without requiring further involvement by home AAA server. The method re-uses the previously assigned session keys. To provide confidentiality and integrity of session keys in the phase of key exchange between agents, it uses a key sharing method by gateway foreign agent that performs a trusted thirty party. The proposed method allows the mobile node to perform Low Latency Handoffs with fast as well as secure operation.

  • PDF

Study on Face recognition algorithm using the eye detection (눈 검출을 이용한 얼굴인식 알고리즘에 관한 연구)

  • Park, Byung-Joon;Kim, Ki-young;Kim, Sun-jib
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.8 no.6
    • /
    • pp.491-496
    • /
    • 2015
  • Cloud computing has emerged with promise to decrease the cost of server additional cost and expanding the data storage and ease for computer resource sharing and apply the new technologies. However, Cloud computing also raises many new security concerns due to the new structure of the cloud service models. Therefore, the secure user authentication is required when the user is using cloud computing. This paper, we propose the enhanced AdaBoost algorithm for access cloud security zone. The AdaBoost algorithm despite the disadvantage of not detect a face inclined at least 20, is widely used because of speed and responsibility. In the experimental results confirm that a face inclined at least 20 degrees tilted face was recognized. Using the FEI Face Database that can be used in research to obtain a result of 98% success rate of the algorithm perform. The 2% failed rate is due to eye detection error which is the people wearing glasses in the picture.